Sample records for mobile internet protocol

  1. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    ERIC Educational Resources Information Center

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  2. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    PubMed Central

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-01

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109

  3. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    PubMed

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  4. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    DTIC Science & Technology

    2006-12-01

    Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a

  5. Analysis of Handoff Mechanisms in Mobile IP

    NASA Astrophysics Data System (ADS)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  6. Development of Mobile Communications in Slovenia: Looking to the Future Global Information (Mobile/Internet) Society.

    ERIC Educational Resources Information Center

    Simonic, Tomaz; Mlinar, Tomi

    2000-01-01

    Discusses the planning and provision of mobile communications in Slovenia and suggests areas that will be developed in the future. Topics include the global mobile market; digital mobile networks; evolution from voice to multimedia services; wireless application protocol; the Internet; general packet radio service; and universal mobile…

  7. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  8. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  9. CoAP-Based Mobility Management for the Internet of Things

    PubMed Central

    Chun, Seung-Man; Kim, Hyun-Su; Park, Jong-Tae

    2015-01-01

    Most of the current mobility management protocols such as Mobile IP and its variants standardized by the IETF may not be suitable to support mobility management for Web-based applications in an Internet of Things (IoT) environment. This is because the sensor nodes have limited power capacity, usually operating in sleep/wakeup mode in a constrained wireless network. In addition, sometimes the sensor nodes may act as the server using the CoAP protocol in an IoT environment. This makes it difficult for Web clients to properly retrieve the sensing data from the mobile sensor nodes in an IoT environment. In this article, we propose a mobility management protocol, named CoMP, which can effectively retrieve the sensing data of sensor nodes while they are moving. The salient feature of CoMP is that it makes use of the IETF CoAP protocol for mobility management, instead of using Mobile IP. Thus CoMP can eliminates the additional signaling overhead of Mobile IP, provides reliable mobility management, and prevents the packet loss. CoMP employs a separate location management server to keep track of the location of the mobile sensor nodes. In order to prevent the loss of important sensing data during movement, a holding mode of operation has been introduced. All the signaling procedures including discovery, registration, binding and holding have been designed by extending the IETF CoAP protocol. The numerical analysis and simulation have been done for performance evaluation in terms of the handover latency and packet loss. The results show that the proposed CoMP is superior to previous mobility management protocols, i.e., Mobile IPv4/v6 (MIPv4/v6), Hierarchical Mobile IPv4/v6 (HMIPv4/v6), in terms of the handover latency and packet loss. PMID:26151214

  10. Application of Mobile Router to Military Communications

    NASA Technical Reports Server (NTRS)

    Stewart, David H.; Ivancic, William D.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent

    2002-01-01

    Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile-router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile-router is software code that resides in a network router. A Mobile-Router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both the government and commercial sectors. This technology will be applied to the wireless battlefield. NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is the enabling technology for communication via the Internet or Intranets to aircraft. Information such as weather, air traffic control, voice and video can be easily and inexpensively transmitted to the aircraft using Internet protocols. The mobile router can be incorporated into emergency vehicles particularly ambulances and life-flight aircraft to provide real-time connectivity back to the hospital and healthcare experts. Commercial applications include entertainment services, IP telephone, and Internet connectivity for cruise ships, commercial shipping, tour busses, aircraft, and eventually cars. This paper will briefly describe the mobile router operation. An upcoming wide area network field test with application to US Coast Guard communications will be described. The paper will also highlight military and government networks that will benefit from the deployment of mobile router and the associated applications.

  11. Migrating an Online Service to WAP - A Case Study.

    ERIC Educational Resources Information Center

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  12. Personal digital assistant-based, internet-enabled remote communication system for a wearable pneumatic biventricular assist device.

    PubMed

    Nam, Kyoung Won; Lee, Jung Joo; Hwang, Chang Mo; Choi, Seong Wook; Son, Ho Sung; Sun, Kyung

    2007-11-01

    Currently, personal mobile communication devices have become quite common, and the applications of such devices have expanded quickly. Remote communication systems might be employed for the telemonitoring of patients or the operating status of their medical devices. In this article, we describe the development of a mobile-based artificial heart telemanagement system for use in a wearable extracorporeal pneumatic biventricular assist device, which is capable of telemonitoring and telecontrolling the operating status of the ventricular assist device from any site. The system developed herein utilized small mobile phones for the client device and adopted a standard transmission control protocol/Internet protocol communication protocol for the purposes of telecommunication. The results of in vitro and animal experiments showed that the telemanagement system developed herein operated in accordance with the desired parameters.

  13. Mobile Router Developed and Tested

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2002-01-01

    The NASA Glenn Research Center, under a NASA Space Act Agreement with Cisco Systems, has been performing joint networking research to apply Internet-based technologies and protocols to space-based communications. As a result of this research, NASA performed stringent performance testing of the mobile router, including the interaction of routing and the transport-level protocol. In addition, Cisco Systems developed the mobile router for both commercial and Government markets. The code has become part of the Cisco Systems Internetworking Operating System (IOS) as of release 12.2 (4) T--which will make this capability available to the community at large. The mobile router is software code that resides in a network router and enables entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both Government and commercial sectors, including the "wireless battlefield." NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is also a key enabling technology for aviation-based information applications. Mobile routing will make it possible for information such as weather, air traffic control, voice, and video to be transmitted to aircraft using Internet-based protocols. This technology shows great promise in reducing congested airways and mitigating aviation disasters due to bad weather. The mobile router can also be incorporated into emergency vehicles (such as ambulances and life-flight aircraft) to provide real-time connectivity back to the hospital and health-care experts, enabling the timely application of emergency care. Commercial applications include entertainment services, Internet protocol (IP) telephone, and Internet connectivity for cruise ships, commercial shipping, tour buses, aircraft, and eventually cars. A mobile router, which is based on mobile IP, allows hosts (mobile nodes) to seamlessly "roam" among various IP subnetworks. This is essential in many wireless networks. A mobile router, unlike a mobile IP node, allows entire networks to roam. Hence, a device connected to the mobile router does not need to be a mobile node because the mobile router provides the roaming capabilities. There are three basic elements in the mobile IP: the home agent, the foreign agent, and the mobile node. The home agent is a router on a mobile node's home network that tunnels datagrams for delivery to the mobile node when it is away from home. The foreign agent is a router on a remote network that provides routing services to a registered mobile node. The mobile node is a host or router that changes its point of attachment from one network or subnetwork to another. In mobile routing, virtual communications are maintained by the home agent, which forwards all packets for the mobile networks to the foreign agent. The foreign agent passes the packets to the mobile router, which then forwards the packets to the devices on its networks. As the mobile router moves, it will register with its home agent on its whereabouts via the foreign agent to assure continuous connectivity.

  14. Mobile-ip Aeronautical Network Simulation Study

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Tran, Diepchi T.

    2001-01-01

    NASA is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AATT), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This report presents the results of a simulation study of mobile-ip for an aeronautical network. The study was performed to determine the performance of the transmission control protocol (TCP) in a mobile-ip environment and to gain an understanding of how long delays, handoffs, and noisy channels affect mobile-ip performance.

  15. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  16. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  17. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  18. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    NASA Astrophysics Data System (ADS)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  19. Impact of VoIP and QoS on Open and Distance Learning

    ERIC Educational Resources Information Center

    Saxena, P. C.; Jasola, Sanjay; Sharma, Ramesh C.

    2006-01-01

    Voice over Internet Protocol (VoIP) is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support…

  20. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-09-01

    secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless

  1. Application of Mobile-ip to Space and Aeronautical Networks

    NASA Technical Reports Server (NTRS)

    Leung, Kent; Shell, Dan; Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.

    2001-01-01

    The National Aeronautics and Space Administration (NASA) is interested in applying mobile Internet protocol (mobile-ip) technologies to its space and aeronautics programs. In particular, mobile-ip will play a major role in the Advanced Aeronautic Transportation Technology (AAT-F), the Weather Information Communication (WINCOMM), and the Small Aircraft Transportation System (SATS) aeronautics programs. This paper describes mobile-ip and mobile routers--in particular, the features, capabilities, and initial performance of the mobile router are presented. The application of mobile-router technology to NASA's space and aeronautics programs is also discussed.

  2. A model for the distribution of watermarked digital content on mobile networks

    NASA Astrophysics Data System (ADS)

    Frattolillo, Franco; D'Onofrio, Salvatore

    2006-10-01

    Although digital watermarking can be considered one of the key technologies to implement the copyright protection of digital contents distributed on the Internet, most of the content distribution models based on watermarking protocols proposed in literature have been purposely designed for fixed networks and cannot be easily adapted to mobile networks. On the contrary, the use of mobile devices currently enables new types of services and business models, and this makes the development of new content distribution models for mobile environments strategic in the current scenario of the Internet. This paper presents and discusses a distribution model of watermarked digital contents for such environments able to achieve a trade-off between the needs of efficiency and security.

  3. Optimising the Use of Wireless Application Protocol (WAP) Sites for Listening Activities in a Korean English as a Foreign Language (EFL) Context

    ERIC Educational Resources Information Center

    Nah, Ki Chune

    2011-01-01

    Using the Internet through a mobile phone for learning English as a foreign language (EFL) listening skills has significant potential, and language learners in South Korea hold clearly positive attitudes towards using this. However, the barriers discouraging language learners from using the Internet for EFL listening have not yet been thoroughly…

  4. Robust and Cost-Efficient Communication Based on SNMP in Mobile Networks

    NASA Astrophysics Data System (ADS)

    Ryu, Sang-Hoon; Baik, Doo-Kwon

    A main challenge in the design of this mobile network is the development of dynamic routing protocols that can efficiently find routes between two communicating nodes. Multimedia streaming services are receiving considerable interest in the mobile network business. An entire mobile network may change its point of attachment to the Internet. The mobile network is operated by a basic specification to support network mobility called Network Mobility (NEMO) Basic Support. However, NEMO basic Support mechanism has some problem in continuous communication. In this paper, we propose robust and cost-efficient algorithm. And we simulate proposed method and conclude some remarks.

  5. Transition plan.

    DOT National Transportation Integrated Search

    2009-02-02

    Although the 9-1-1 system has been a success for nearly 40 years, changes in the publics use of : technology, the saturation of the mobile market, and the spread of Voice over Internet Protocol (VoIP) : telephony over broadband are contributing to...

  6. Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2003-07-01

    Mobile ad hoc networking (MANET) supports self-organizing, mobile infrastructures and enables an autonomous network of mobile nodes that can operate without a wired backbone. Ad hoc networks are characterized by multihop, wireless connectivity via packet radios and by the need for efficient dynamic protocols. All routers are mobile and can establish connectivity with other nodes only when they are within transmission range. Importantly, ad hoc wireless nodes are resource-constrained, having limited processing, memory, and battery capacity. Delivery of high quality-ofservice (QoS), real-time multimedia services from Internet-based applications over a MANET is a challenge not yet achieved by proposed Internet Engineering Task Force (IETF) ad hoc network protocols in terms of standard performance metrics such as end-to-end throughput, packet error rate, and delay. In the distributed operations of route discovery and maintenance, strong interaction occurs across MANET protocol layers, in particular, the physical, media access control (MAC), network, and application layers. The QoS requirements are specified for the service classes by the application layer. The cross-layer design must also satisfy the battery-limited energy constraints, by minimizing the distributed power consumption at the nodes and of selected routes. Interactions across the layers are modeled in terms of the set of concatenated design parameters including associated energy costs. Functional dependencies of the QoS metrics are described in terms of the concatenated control parameters. New cross-layer designs are sought that optimize layer interdependencies to achieve the "best" QoS available in an energy-constrained, time-varying network. The protocol design, based on a reactive MANET protocol, adapts the provisioned QoS to dynamic network conditions and residual energy capacities. The cross-layer optimization is based on stochastic dynamic programming conditions derived from time-dependent models of MANET packet flows. Regulation of network behavior is modeled by the optimal control of the conditional rates of multivariate point processes (MVPPs); these rates depend on the concatenated control parameters through a change of probability measure. The MVPP models capture behavior of many service applications, e.g., voice, video and the self-similar behavior of Internet data sessions. Performance verification of the cross-layer protocols, derived from the dynamic programming conditions, can be achieved by embedding the conditions in a reactive routing protocol for MANETs, in a simulation environment, such as the wireless extension of ns-2. A canonical MANET scenario consists of a distributed collection of battery-powered laptops or hand-held terminals, capable of hosting multimedia applications. Simulation details and performance tradeoffs, not presented, remain for a sequel to the paper.

  7. Performance Evaluation of FAST TCP Traffic-Flows in Multihomed MANETs

    NASA Astrophysics Data System (ADS)

    Mudassir, Mumajjed Ul; Akram, Adeel

    In Mobile Ad hoc Networks (MANETs) an efficient communication protocol is required at the transport layer. Mobile nodes moving around will have temporary and rather short-lived connectivity with each other and the Internet, thus requiring efficient utilization of network resources. Moreover the problems arising due to high mobility, collision and congestion must also be considered. Multihoming allows higher reliability and enhancement of network throughput. FAST TCP is a new promising transport layer protocol developed for high-speed high-latency networks. In this paper, we have analyzed the performance of FAST TCP traffic flows in multihomed MANETs and compared it with standard TCP (TCP Reno) traffic flows in non-multihomed MANETs.

  8. The SHIP: A SIP to HTTP Interaction Protocol

    NASA Astrophysics Data System (ADS)

    Zeiß, Joachim; Gabner, Rene; Bessler, Sandford; Happenhofer, Marco

    IMS is capable of providing a wide range of services. As a result, terminal software becomes more and more complex to deliver network intelligence to user applications. Currently mobile terminal software needs to be permanently updated so that the latest network services and functionality can be delivered to the user. In the Internet, browser based user interfaces assure that an interface is made available to the user which offers the latest services in the net immediately. Our approach combines the benefits of the Session Initiation Protocol (SIP) and those of the HTTP protocol to bring the same type of user interfacing to IMS. SIP (IMS) realizes authentication, session management, charging and Quality of Service (QoS), HTTP provides access to Internet services and allows the user interface of an application to run on a mobile terminal while processing and orchestration is done on the server. A SHIP enabled IMS client only needs to handle data transport and session management via SIP, HTTP and RTP and render streaming media, HTML and Javascript. SHIP allows new kinds of applications, which combine audio, video and data within a single multimedia session.

  9. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  10. IoT real time data acquisition using MQTT protocol

    NASA Astrophysics Data System (ADS)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  11. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  12. NG9-1-1 preliminary transition plan.

    DOT National Transportation Integrated Search

    2008-04-01

    Although the 9-1-1 system has been an unqualified success story for more than 30 years, changes in the : publics use of technology, the saturation of the mobile market, and the spread of Voice over Internet : Protocol (VoIP) telephony over broadba...

  13. A Multifactor Secure Authentication System for Wireless Payment

    NASA Astrophysics Data System (ADS)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  14. Computer and mobile technology interventions to promote medication adherence and disease management in people with thalassemia

    PubMed Central

    Badawy, Sherif M; Morrone, Kerry; Thompson, Alexis; Palermo, Tonya M

    2018-01-01

    This is a protocol for a Cochrane Review (Intervention). The objectives are as follows: To identify and assess the effects of computer and mobile technology interventions designed to facilitate medication adherence and disease management in individuals with thalassemia, including: evaluating the effects of using computer and mobile technology interventions for medication adherence and disease management on health and behavioural outcomes;identifying and assessing the effects of computer and mobile technology interventions specific to different age groups (children, adolescents and adults) and type of modality (e.g. cell phone, the Internet). PMID:29861660

  15. Research of Ad Hoc Networks Access Algorithm

    NASA Astrophysics Data System (ADS)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  16. Overview of NASA Glenn Aero/Mobile Communications Demonstrations

    NASA Technical Reports Server (NTRS)

    Brooks, David; Hoder, Doug; Wilkins, Ryan

    2004-01-01

    The Glenn Research Center at Lewis Field (GRC) has been involved with several other NASA field centers on various networking and RF communications demonstrations and experiments since 1998. These collaborative experiments investigated communications technologies new to aviation, such as wideband Ku satcom, L-band narrowband satcom, and IP (Internet Protocol), using commercial off-the-shelf (COTS) components These technologies can be used to distribute weather and hazard data, air traffic management and airline fleet management information, and passenger cabin Internet service.

  17. Overview of NASA Glenn Aero/Mobile Communication Demonstrations

    NASA Technical Reports Server (NTRS)

    Brooks, David; Hoder, Doug; Wilkins, Ryan

    2004-01-01

    The Glenn Research Center at Lewis Field (GRC) has been involved with several other NASA field centers on various networking and RF communications demonstrations and experiments since 1998. These collaborative experiments investigated communications technologies new to aviation, such as wideband Ku satcom, L-band narrowband satcom, and IP (Internet Protocol), using commercial off-the-shelf (COTS) components These technologies can be used to distribute weather and hazard data, air traffic management and airline fleet management information, and passenger cabin Internet service.

  18. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  19. Integration of FMIPv6 in HMIPv6 to Improve Hand-over Performance

    NASA Astrophysics Data System (ADS)

    Patil, Dipali P.; Patil, G. A.

    2010-11-01

    Mobile users move frequently between networks, as they stay connected to the Internet. Thus, as mobility increases across networks, handovers will significantly impact the quality of the connection and user application. Handover performance is very important when evaluating IP mobility protocols. Since handover request are driven by several needs such as cost reduction criteria, network resource optimization and service related requirements. Current works to support seamless mobility in IPv6 network are classified into HMIPv6 and FMIPv6. These two approaches have pros and cons respectively and are being standardized independently in IETF. If one can integrate properly these two approaches, it is expected that the one can get more effective protocols that can provide better handover performance. This paper integrates FHMIPv6 in HMIPv6 (F-HMIPv6) so as to provide effectively fast handover on the hierarchical Mobile IPv6. The simulation performed using Ns-2 extensions to show that a performance of proposed system is better in terms of packet loss and hand-over delay.

  20. Advanced Networks in Motion Mobile Sensorweb

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  1. Mobility management techniques for the next-generation wireless networks

    NASA Astrophysics Data System (ADS)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  2. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    NASA Astrophysics Data System (ADS)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  3. [Construction of DICOM-WWW gateway by open source, and application to PDAs using the high-speed mobile communications network].

    PubMed

    Yokohama, Noriya

    2003-09-01

    The author constructed a medical image network system using open source software that took security into consideration. This system was enabled for search and browse with a WWW browser, and images were stored in a DICOM server. In order to realize this function, software was developed to fill in the gap between the DICOM protocol and HTTP using PHP language. The transmission speed was evaluated by the difference in protocols between DICOM and HTTP. Furthermore, an attempt was made to evaluate the convenience of medical image access with a personal information terminal via the Internet through the high-speed mobile communication terminal. Results suggested the feasibility of remote diagnosis and application to emergency care.

  4. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  5. Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing

    NASA Astrophysics Data System (ADS)

    G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.

    2012-04-01

    Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.

  6. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  7. Drive to miniaturization: integrated optical networks on mobile platforms

    NASA Astrophysics Data System (ADS)

    Salour, Michael M.; Batayneh, Marwan; Figueroa, Luis

    2011-11-01

    With rapid growth of the Internet, bandwidth demand for data traffic is continuing to explode. In addition, emerging and future applications are becoming more and more network centric. With the proliferation of data communication platforms and data-intensive applications (e.g. cloud computing), high-bandwidth materials such as video clips dominating the Internet, and social networking tools, a networking technology is very desirable which can scale the Internet's capability (particularly its bandwidth) by two to three orders of magnitude. As the limits of Moore's law are approached, optical mesh networks based on wavelength-division multiplexing (WDM) have the ability to satisfy the large- and scalable-bandwidth requirements of our future backbone telecommunication networks. In addition, this trend is also affecting other special-purpose systems in applications such as mobile platforms, automobiles, aircraft, ships, tanks, and micro unmanned air vehicles (UAVs) which are becoming independent systems roaming the sky while sensing data, processing, making decisions, and even communicating and networking with other heterogeneous systems. Recently, WDM optical technologies have seen advances in its transmission speeds, switching technologies, routing protocols, and control systems. Such advances have made WDM optical technology an appealing choice for the design of future Internet architectures. Along these lines, scientists across the entire spectrum of the network architectures from physical layer to applications have been working on developing devices and communication protocols which can take full advantage of the rapid advances in WDM technology. Nevertheless, the focus has always been on large-scale telecommunication networks that span hundreds and even thousands of miles. Given these advances, we investigate the vision and applicability of integrating the traditionally large-scale WDM optical networks into miniaturized mobile platforms such as UAVs. We explain the benefits of WDM optical technology for these applications. We also describe some of the limitations of WDM optical networks as the size of a vehicle gets smaller, such as in micro-UAVs, and study the miniaturization and communication system limitations in such environments.

  8. Innovation in sexually transmitted disease and HIV prevention: internet and mobile phone delivery vehicles for global diffusion.

    PubMed

    Swendeman, Dallas; Rotheram-Borus, Mary Jane

    2010-03-01

    Efficacious behavioral interventions and practices have not been universally accepted, adopted, or diffused by policy makers, administrators, providers, advocates, or consumers. Biomedical innovations for sexually transmitted disease (STD) and HIV prevention have been embraced but their effectiveness is hindered by behavioral factors. Behavioral interventions are required to support providers and consumers for adoption and diffusion of biomedical innovations, protocol adherence, and sustained prevention for other STDs. Information and communication technology such as the Internet and mobile phones can deliver behavioral components for STD/HIV prevention and care to more people at less cost. Recent innovations in STD/HIV prevention with information and communication technology-mediated behavioral supports include STD/HIV testing and partner interventions, behavioral interventions, self-management, and provider care. Computer-based and Internet-based behavioral STD/HIV interventions have demonstrated efficacy comparable to face-to-face interventions. Mobile phone STD/HIV interventions using text-messaging are being broadly utilized but more work is needed to demonstrate efficacy. Electronic health records and care management systems can improve care, but interventions are needed to support adoption. Information and communication technology is rapidly diffusing globally. Over the next 5-10 years smart-phones will be broadly disseminated, connecting billions of people to the Internet and enabling lower cost, highly engaging, and ubiquitous STD/HIV prevention and treatment support interventions.

  9. A neural networks-based hybrid routing protocol for wireless mesh networks.

    PubMed

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  10. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    PubMed Central

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  11. Evaluation of QoS supported in Network Mobility NEMO environments

    NASA Astrophysics Data System (ADS)

    Hussien, L. F.; Abdalla, A. H.; Habaebi, M. H.; Khalifa, O. O.; Hassan, W. H.

    2013-12-01

    Network mobility basic support (NEMO BS) protocol is an entire network, roaming as a unit which changes its point of attachment to the Internet and consequently its reachability in the network topology. NEMO BS doesn't provide QoS guarantees to its users same as traditional Internet IP and Mobile IPv6 as well. Typically, all the users will have same level of services without considering about their application requirements. This poses a problem to real-time applications that required QoS guarantees. To gain more effective control of the network, incorporated QoS is needed. Within QoS-enabled network the traffic flow can be distributed to various priorities. Also, the network bandwidth and resources can be allocated to different applications and users. Internet Engineering Task Force (IETF) working group has proposed several QoS solutions for static network such as IntServ, DiffServ and MPLS. These QoS solutions are designed in the context of a static environment (i.e. fixed hosts and networks). However, they are not fully adapted to mobile environments. They essentially demands to be extended and adjusted to meet up various challenges involved in mobile environments. With existing QoS mechanisms many proposals have been developed to provide QoS for individual mobile nodes (i.e. host mobility). In contrary, research based on the movement of the whole mobile network in IPv6 is still undertaking by the IETF working groups (i.e. network mobility). Few researches have been done in the area of providing QoS for roaming networks. Therefore, this paper aims to review and investigate (previous /and current) related works that have been developed to provide QoS in mobile network. Consequently, a new proposed scheme will be introduced to enhance QoS within NEMO environment, achieving by which seamless mobility to users of mobile network node (MNN).

  12. An Authentication Protocol for Future Sensor Networks.

    PubMed

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.

  13. An Authentication Protocol for Future Sensor Networks

    PubMed Central

    Bilal, Muhammad; Kang, Shin-Gak

    2017-01-01

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN-logic) and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols. PMID:28452937

  14. DARPA Internet Program. Internet and Transmission Control Specifications,

    DTIC Science & Technology

    1981-09-01

    Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information

  15. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    PubMed

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  16. The future of 3D and video coding in mobile and the internet

    NASA Astrophysics Data System (ADS)

    Bivolarski, Lazar

    2013-09-01

    The current Internet success has already changed our social and economic world and is still continuing to revolutionize the information exchange. The exponential increase of amount and types of data that is currently exchanged on the Internet represents significant challenge for the design of future architectures and solutions. This paper reviews the current status and trends in the design of solutions and research activities in the future Internet from point of view of managing the growth of bandwidth requirements and complexity of the multimedia that is being created and shared. Outlines the challenges that are present before the video coding and approaches to the design of standardized media formats and protocols while considering the expected convergence of multimedia formats and exchange interfaces. The rapid growth of connected mobile devices adds to the current and the future challenges in combination with the expected, in near future, arrival of multitude of connected devices. The new Internet technologies connecting the Internet of Things with wireless visual sensor networks and 3D virtual worlds requires conceptually new approaches of media content handling from acquisition to presentation in the 3D Media Internet. Accounting for the entire transmission system properties and enabling adaptation in real-time to context and content throughout the media proceeding path will be paramount in enabling the new media architectures as well as the new applications and services. The common video coding formats will need to be conceptually redesigned to allow for the implementation of the necessary 3D Media Internet features.

  17. Cyberspace modernization. An interest protocol planning advisory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.; McLane, Victor N.

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less

  18. A Novel Inexpensive Use of Smartphone Technology for Ecological Momentary Assessment in Middle-Aged Women.

    PubMed

    Ehlers, Diane K; Huberty, Jennifer; Buman, Matthew; Hooker, Steven; Todd, Michael; de Vreede, Gert-Jan

    2016-03-01

    Commercially available mobile and Internet technologies present a promising opportunity to feasibly conduct ecological momentary assessment (EMA). The purpose of this study was to describe a novel EMA protocol administered on middle-aged women's smartphones via text messaging and mobile Internet. Women (N = 9; mean age = 46.2 ± 8.2 y) received 35 text message prompts to a mobile survey assessing activity, self-worth, and self-efficacy over 14 days. Prompts were scheduled and surveys were administered using commercial, Internet-based programs. Prompting was tailored to each woman's daily wake/sleep schedule. Women concurrently wore a wrist-worn accelerometer. Feasibility was assessed via survey completion, accelerometer wear, participant feedback, and researcher notes. Of 315 prompted surveys, 287 responses were valid (91.1%). Average completion time was 1.52 ± 1.03 minutes. One participant's activity data were excluded due to accelerometer malfunction, resulting in complete data from 8 participants (n = 252 [80.0%] valid observations). Women reported the survey was easily and quickly read/completed. However, most thought the accelerometer was inconvenient. High completion rates and perceived usability suggest capitalizing on widely available technology and tailoring prompting schedules may optimize EMA in middle-aged women. However, researchers may need to carefully select objective monitors to maintain data validity while limiting participant burden.

  19. A comparative signaling cost analysis of Macro Mobility scheme in NEMO (MM-NEMO) with mobility management protocol

    NASA Astrophysics Data System (ADS)

    Islam, Shayla; Abdalla, Aisha H.; Habaebi, Mohamed H.; Latif, Suhaimi A.; Hassan, Wan H.; Hasan, Mohammad K.; Ramli, H. A. M.; Khalifa, Othman O.

    2013-12-01

    NEMO BSP is an upgraded addition to Mobile IPv6 (MIPv6). As MIPv6 and its enhancements (i.e. HMIPv6) possess some limitations like higher handoff latency, packet loss, NEMO BSP also faces all these shortcomings by inheritance. Network Mobility (NEMO) is involved to handle the movement of Mobile Router (MR) and it's Mobile Network Nodes (MNNs) during handoff. Hence it is essential to upgrade the performance of mobility management protocol to obtain continuous session connectivity with lower delay and packet loss in NEMO environment. The completion of handoff process in NEMO BSP usually takes longer period since MR needs to register its single primary care of address (CoA) with home network that may cause performance degradation of the applications running on Mobile Network Nodes. Moreover, when a change in point of attachment of the mobile network is accompanied by a sudden burst of signaling messages, "Signaling Storm" occurs which eventually results in temporary congestion, packet delays or even packet loss. This effect is particularly significant for wireless environment where a wireless link is not as steady as a wired link since bandwidth is relatively limited in wireless link. Hence, providing continuous Internet connection without any interruption through applying multihoming technique and route optimization mechanism in NEMO are becoming the center of attention to the current researchers. In this paper, we propose a handoff cost model to compare the signaling cost of MM-NEMO with NEMO Basic Support Protocol (NEMO BSP) and HMIPv6.The numerical results shows that the signaling cost for the MM-NEMO scheme is about 69.6 % less than the NEMO-BSP and HMIPv6.

  20. Obesity and outpatient rehabilitation using mobile technologies: the potential mHealth approach

    PubMed Central

    Castelnuovo, Gianluca; Manzoni, Gian Mauro; Pietrabissa, Giada; Corti, Stefania; Giusti, Emanuele Maria; Molinari, Enrico; Simpson, Susan

    2014-01-01

    Obesity is currently an important public health problem of epidemic proportions (globesity). Inpatient rehabilitation interventions that aim at improving weight-loss, reducing obesity-related complications and changing dysfunctional behaviors, should ideally be carried out in a multidisciplinary context with a clinical team composed of psychologists, dieticians, psychiatrists, endocrinologists, nutritionists, physiotherapists, etc. Long-term outpatient multidisciplinary treatments are likely to constitute an essential aspect of rehabilitation. Internet-based technologies can improve long-term obesity rehabilitation within a collaborative approach by enhancing the steps specified by psychological and medical treatment protocols. These outcomes may be augmented further by the mHealth approach, through creating new treatment delivery methods to increase compliance and engagement. mHealth (m-health, mobile health) can be defined as the practice of medicine and public health, supported by mobile communication devices for health services and information. mHealth applications which can be implemented in weight loss protocols and obesity rehabilitation are discussed, taking into account future research directions in this promising area. PMID:24959157

  1. Hybrid model for wireless mobility management using IPv6

    NASA Astrophysics Data System (ADS)

    Howie, Douglas P.; Sun, Junzhao; Koivisto, Antti T.

    2001-07-01

    Within the coming decade, there will be a dramatic increase in the availability of inexpensive, computationally powerful mobile devices running applications which use the Internet Protocol (IP) to access multimedia services over broad-band wireless connections. To this end, there has been extensive research and standardization in the areas of Mobile IP and IPv6. The purpose of this paper is to apply this work to the issues involved in designing a mobility model able to adapt to different wireless mobile IP scenarios. We describe the usefulness of this model in the 4th generation mobile multimedia systems to come. This new model has been synthesized through a comparative analysis of current mobile IP models where particular attention has been given to the problems of mobile IP handoff and mobility management and their impact on QoS. By applying a unique perspective to these problems, our model is used to set a roadmap for future mobile IPv6 testbed construction.

  2. Space Network IP Services (SNIS): An Architecture for Supporting Low Earth Orbiting IP Satellite Missions

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2005-01-01

    The NASA Space Network (SN) supports a variety of missions using the Tracking and Data Relay Satellite System (TDRSS), which includes ground stations in White Sands, New Mexico and Guam. A Space Network IP Services (SNIS) architecture is being developed to support future users with requirements for end-to-end Internet Protocol (IP) communications. This architecture will support all IP protocols, including Mobile IP, over TDRSS Single Access, Multiple Access, and Demand Access Radio Frequency (RF) links. This paper will describe this architecture and how it can enable Low Earth Orbiting IP satellite missions.

  3. Architecture and Protocol of a Semantic System Designed for Video Tagging with Sensor Data in Mobile Devices

    PubMed Central

    Macias, Elsa; Lloret, Jaime; Suarez, Alvaro; Garcia, Miguel

    2012-01-01

    Current mobile phones come with several sensors and powerful video cameras. These video cameras can be used to capture good quality scenes, which can be complemented with the information gathered by the sensors also embedded in the phones. For example, the surroundings of a beach recorded by the camera of the mobile phone, jointly with the temperature of the site can let users know via the Internet if the weather is nice enough to swim. In this paper, we present a system that tags the video frames of the video recorded from mobile phones with the data collected by the embedded sensors. The tagged video is uploaded to a video server, which is placed on the Internet and is accessible by any user. The proposed system uses a semantic approach with the stored information in order to make easy and efficient video searches. Our experimental results show that it is possible to tag video frames in real time and send the tagged video to the server with very low packet delay variations. As far as we know there is not any other application developed as the one presented in this paper. PMID:22438753

  4. Architecture and protocol of a semantic system designed for video tagging with sensor data in mobile devices.

    PubMed

    Macias, Elsa; Lloret, Jaime; Suarez, Alvaro; Garcia, Miguel

    2012-01-01

    Current mobile phones come with several sensors and powerful video cameras. These video cameras can be used to capture good quality scenes, which can be complemented with the information gathered by the sensors also embedded in the phones. For example, the surroundings of a beach recorded by the camera of the mobile phone, jointly with the temperature of the site can let users know via the Internet if the weather is nice enough to swim. In this paper, we present a system that tags the video frames of the video recorded from mobile phones with the data collected by the embedded sensors. The tagged video is uploaded to a video server, which is placed on the Internet and is accessible by any user. The proposed system uses a semantic approach with the stored information in order to make easy and efficient video searches. Our experimental results show that it is possible to tag video frames in real time and send the tagged video to the server with very low packet delay variations. As far as we know there is not any other application developed as the one presented in this paper.

  5. A Server-Based Mobile Coaching System

    PubMed Central

    Baca, Arnold; Kornfeind, Philipp; Preuschl, Emanuel; Bichler, Sebastian; Tampier, Martin; Novatchkov, Hristo

    2010-01-01

    A prototype system for monitoring, transmitting and processing performance data in sports for the purpose of providing feedback has been developed. During training, athletes are equipped with a mobile device and wireless sensors using the ANT protocol in order to acquire biomechanical, physiological and other sports specific parameters. The measured data is buffered locally and forwarded via the Internet to a server. The server provides experts (coaches, biomechanists, sports medicine specialists etc.) with remote data access, analysis and (partly automated) feedback routines. In this way, experts are able to analyze the athlete’s performance and return individual feedback messages from remote locations. PMID:22163490

  6. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  7. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...: This is a summary of the Commission's Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech...), Internet Protocol Relay (IP Relay), and IP captioned telephone service (IP CTS) as compensable forms of TRS...

  8. Implementing Internet of Things in a military command and control environment

    NASA Astrophysics Data System (ADS)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  9. An mHealth Framework to Improve Birth Outcomes in Benue State, Nigeria: A Study Protocol.

    PubMed

    Ezeanolue, Echezona Edozie; Gbadamosi, Semiu Olatunde; Olawepo, John Olajide; Iwelunmor, Juliet; Sarpong, Daniel; Eze, Chuka; Ogidi, Amaka; Patel, Dina; Onoka, Chima

    2017-05-26

    The unprecedented coverage of mobile technology across the globe has led to an increase in the use of mobile health apps and related strategies to make health information available at the point of care. These strategies have the potential to improve birth outcomes, but are limited by the availability of Internet services, especially in resource-limited settings such as Nigeria. Our primary objective is to determine the feasibility of developing an integrated mobile health platform that is able to collect data from community-based programs, embed collected data into a smart card, and read the smart card using a mobile phone-based app without the need for Internet access. Our secondary objectives are to determine (1) the acceptability of the smart card among pregnant women and (2) the usability of the smart card by pregnant women and health facilities in rural Nigeria. We will leverage existing technology to develop a platform that integrates a database, smart card technology, and a mobile phone-based app to read the smart cards. We will recruit 300 pregnant women with one of the three conditions-HIV, hepatitis B virus infection, and sickle cell trait or disease-and four health facilities in their community. We will use Glasgow's Reach, Effectiveness, Adoption, Implementation, and Maintenance framework as a guide to assess the implementation, acceptability, and usability of the mHealth platform. We have recruited four health facilities and 300 pregnant women with at least one of the eligible conditions. Over the course of 3 months, we will complete the development of the mobile health platform and each participant will be offered a smart card; staff in each health facility will receive training on the use of the mobile health platform. Findings from this study could offer a new approach to making health data from pregnant women available at the point of delivery without the need for an Internet connection. This would allow clinicians to implement evidence-based interventions in real time to improve health outcomes. ClinicalTrials.gov NCT03027258; https://clinicaltrials.gov/ct2/show/NCT03027258 (Archived by WebCite at http://www.webcitation.org/6owR2D0kE). ©Echezona Edozie Ezeanolue, Semiu Olatunde Gbadamosi, John Olajide Olawepo, Juliet Iwelunmor, Daniel Sarpong, Chuka Eze, Amaka Ogidi, Dina Patel, Chima Onoka. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 26.05.2017.

  10. Service discovery with routing protocols for MANETs

    NASA Astrophysics Data System (ADS)

    Gu, Xuemai; Shi, Shuo

    2005-11-01

    Service discovery is becoming an important topic as its use throughout the Internet becomes more widespread. In Mobile Ad hoc Networks (MANETs), the routing protocol is very important because it is special network. To find a path for data, and destination nodes, nodes send packets to each node, creating substantial overhead traffic and consuming much time. Even though a variety of routing protocols have been developed for use in MANETs, they are insufficient for reducing overhead traffic and time. In this paper, we propose SDRP: a new service discovery protocol combined with routing policies in MANETs. The protocol is performed upon a distributed network. We describe a service by a unique ID number and use a group-cast routing policy in advertisement and request. The group-cast routing policy decreases the traffic in networks, and it is efficient to find destination node. In addition, the nodes included in the reply path also cache the advertisement information, and it means when each node finds a node next time, they can know where it is as soon as possible, so they minimize the time. Finally, we compare SDRP with both Flood and MAODV in terms of overload, and average delay. Simulation results show SDRP can spend less response time and accommodate even high mobility network environments.

  11. Securing Real-Time Sessions in an IMS-Based Architecture

    NASA Astrophysics Data System (ADS)

    Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco

    The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.

  12. Analysis of interference performance of tactical radio network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong

    2017-08-01

    Mobile Ad hoc network has a strong military background for its development as the core technology of the backbone network of US tactical Internet. And which tactical radio network, is the war in today's tactical use of the Internet more mature form of networking, mainly used in brigade and brigade following forces. This paper analyzes the typical protocol AODV in the tactical radio network, and then carries on the networking. By adding the interference device to the whole network, the battlefield environment is simulated, and then the throughput, delay and packet loss rate are analyzed, and the performance of the whole network and the single node before and after the interference is obtained.

  13. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  14. Genomics-Based Security Protocols: From Plaintext to Cipherprotein

    NASA Technical Reports Server (NTRS)

    Shaw, Harry; Hussein, Sayed; Helgert, Hermann

    2011-01-01

    The evolving nature of the internet will require continual advances in authentication and confidentiality protocols. Nature provides some clues as to how this can be accomplished in a distributed manner through molecular biology. Cryptography and molecular biology share certain aspects and operations that allow for a set of unified principles to be applied to problems in either venue. A concept for developing security protocols that can be instantiated at the genomics level is presented. A DNA (Deoxyribonucleic acid) inspired hash code system is presented that utilizes concepts from molecular biology. It is a keyed-Hash Message Authentication Code (HMAC) capable of being used in secure mobile Ad hoc networks. It is targeted for applications without an available public key infrastructure. Mechanics of creating the HMAC are presented as well as a prototype HMAC protocol architecture. Security concepts related to the implementation differences between electronic domain security and genomics domain security are discussed.

  15. Aerospace physiology.

    DOT National Transportation Integrated Search

    2004-01-01

    This document defines the protocol standards for the Internet Protocol Suite (IPS), which is commonly referred to as Transmission Control Protocol/Internet Protocol (TCP/IP) protocols used for data communications within the National Airspace System (...

  16. A mobile mapping system for spatial information based on DGPS/EGIS

    NASA Astrophysics Data System (ADS)

    Pei, Ling; Wang, Qing; Gu, Juan

    2007-11-01

    With the rapid developments of mobile device and wireless communication, it brings a new challenge for acquiring the spatial information. A mobile mapping system based on differential global position system (DGPS) integrated with embedded geographic information system (EGIS) is designed. A mobile terminal adapts to various GPS differential environments such as single base mode and network GPS mode like Virtual Reference Station (VRS) and Master- Auxiliary Concept (MAC) by the mobile communication technology. The spatial information collected through DGPS is organized in an EGIS running in the embedded device. A set of mobile terminal in real-time DGPS based on GPRS adopting multithreading technique of serial port in manner of simulating overlapped I/O operating is developed, further more, the GPS message analysis and checkout based on Strategy Pattern for various receivers are included in the process of development. A mobile terminal accesses to the GPS network successfully by NTRIP (Networked Transport of RTCM via Internet Protocol) compliance. Finally, the accuracy and reliability of the mobile mapping system are proved by a lot of testing in 9 provinces all over the country.

  17. The Internet and Education: Some Lessons on Privacy and Pitfalls.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1997-01-01

    Most users have misconceptions about how the Internet works. Provides a brief history of the Internet and Transmission Control Protocol/Internet Protocol (TCP/IP); discusses electronic mail, privacy, and voluntary and involuntary information gathering; and contrasts the Internet and libraries, focusing on the Internet's lack of consistent…

  18. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  19. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  20. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  1. Mobile internet and technology for optical teaching reform in higher education

    NASA Astrophysics Data System (ADS)

    Zhou, Muchun; Zhao, Qi; Chen, Yanru

    2017-08-01

    There are some problems in optical education such as insufficient flexibility, individuality and adaptability to students who need information and education at present. The development of mobile internet and technology provides support to solve these problems. Basic characteristics, advantages and developments of these techniques used in education are presented in this paper. Mobile internet is introduced to reform the classroom teaching of optical courses. Mobile network tool selection, teaching resources construction and reform in teaching methods are discussed. Academic record and sampling surveys are used to assess intention to adopt mobile internet and learning effect of academic major of students, the results show that high quality optical education can be offered by adopting mobile internet and technologies in traditional instruction.

  2. Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2001-03-01

    The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two agents on a host station sharing a common goal can be merged or married to compose a new agent. Application of the two-layer set of algorithms for mobile agent evolution, performed in a distributed processing environment, is made to the QoS management functions of the IP multimedia IM sub-network of the third generation 3G Wideband Code-division Multiple Access W-CDMA wireless network.

  3. The Potential Impact of Internet and Mobile Use on Headache and Other Somatic Symptoms in Adolescence. A Population-Based Cross-Sectional Study.

    PubMed

    Cerutti, Rita; Presaghi, Fabio; Spensieri, Valentina; Valastro, Carmela; Guidetti, Vincenzo

    2016-07-01

    The purpose of this cross-sectional study was to determine whether migraine or tension-type headaches are associated with abuse of the internet and/or mobile phones and to explore whether headache and the abuse of the two technologies are associated with sleep disturbances and other self-reported somatic symptoms. In the last several years, estimates indicate the increasing pervasiveness of the internet and other technologies in the lives of young people, highlighting the impact on well-being. A population-based cross-sectional study was conducted between February 2013 and June 2014. The initial sample was composed of 1004 Italian students (aged 10-16 years) recruited within public middle schools not randomly selected in central Italy. The final convenience sample consisted of 841 students (Males = 51.1%; Females = 48.9%) who were included in the analysis. Data were collected using self-reported measures. Headache was reported by 28.0% of the total sample. A significant relationship was determined with gender (χ(2) (1) = 7.78, P < .01), with female students being overrepresented in the headache group. Approximately 39.6% of subjects were non-abusers of both technologies, internet and mobile. Mobile only abusers were approximately 26.0% of the study population; internet only abusers were approximately 14.9%; and abusers of both media were 19.5%. No significant relationship was found between students with and without headache with respect to the abuse of internet and mobile phone categories (headache was, respectively, the 26% in no abusers, the 30% in internet abusers, the 29% in mobile abusers, and the 29% in internet and mobile abusers, P = .86). Additionally, also by excluding the no headache group, the relationship between the two groups of headache (migraine and tension type headache) and the abuse of media (tension type headache was the 31% in no abusers, the 43% in internet abusers, the 49% in mobile abusers, and the 29% in internet and mobile abusers) is not statistically significant (P = .06). No significant relationship emerged between headache and the internet and mobile phone addiction groups (headache was the 28% in no addiction group, the 35% in mobile addiction group, the 25% of internet addiction group, and the 28% in mobile and internet addiction group, P = .57) as well as no significant relationship was found when only the different headache types were considered (tension type headache was the 39% in no addiction group, the 40% in mobile addiction group, the 32% in internet addiction group, and the 31% in mobile and internet addiction group, P = .71). Daily internet users reported higher median scores for somatic symptoms than the occasional internet users in the no-headache group (Kruskal-Wallis χ(2) (1) = 5.44, P = .02) and in the migraine group (Kruskal-Wallis χ(2) (1) = 6.54, P = .01). Results highlighted the potential impact of excessive internet and mobile use, which ranges from different types of headache to other somatic symptoms. Further studies are needed to confirm these findings and to determine if there is a need for promoting preventive health interventions, especially in school setting. © 2016 American Headache Society.

  4. SATNET development and operation. Pluribus satellite IMP development. Remote site maintenance. Internet operations and maintenance. Mobile access terminal network. TCP for the HP3000. TCP-TAC. TCP for VAX-UNIX. Combined quarterly technical report

    NASA Astrophysics Data System (ADS)

    Bressler, R. D.

    1981-11-01

    This quarterly technical report describes work on the development of and experimentation with packet broadcast by satellite; on development of Pluribus Satellite IMPs; on a study of the technology of Remote Site Maintenance; on Internetwork monitoring; on shipboard satellite communications; and on the development of Transmission Control Protocols for the HP3000, TAC, and VAX-UNIX.

  5. Subjective Audio Quality over a Secure IEEE 802.11n Draft 2.0 Wireless Local Area Network

    DTIC Science & Technology

    2009-03-01

    hereafter referred to as 802.11) provide users with mobile connectivity without the need for expensive and inflexible wiring. The 802.11n extension, for...through another protocol, such as Secure / Multipurpose Internet Mail Extensions ( S /MIME). SDPS is, therefore, not a complete solution for secure key...number of packets per second (“Pkts/ s ”) are visible. Audio recordings are taken at AFIT within range of several other 802.11g APs as shown in Figure

  6. Media perspective - new opportunities for reaching audiences

    NASA Astrophysics Data System (ADS)

    Haswell, Katy

    2007-08-01

    The world of media is experiencing a period of extreme and rapid change with the rise of internet television and the download generation. Many young people no longer watch standard TV. Instead, they go on-line, talking to friends and downloading pictures, videos, music clips to put on their own websites and watch/ listen to on their laptops and mobile phones. Gone are the days when TV controllers determined what you watched and when you watched it. Now the buzzword is IPTV, Internet Protocol Television, with companies such as JOOST offering hundreds of channels on a wide range of subjects, all of which you can choose to watch when and where you wish, on your high-def widescreen with stereo surround sound at home or on your mobile phone on the train. This media revolution is changing the way organisations get their message out. And it is encouraging companies such as advertising agencies to be creative about new ways of accessing audiences. The good news is that we have fresh opportunities to reach young people through internet-based media and material downloaded through tools such as games machines, as well as through the traditional media. And it is important for Europlanet to make the most of these new and exciting developments.

  7. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned... Registration and Documentation of Disability for Eligibility to Use IP Captioned Telephone Service, CG Docket...

  8. 78 FR 49717 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services... Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...

  9. IPv6 and IPsec Tests of a Space-Based Asset, the Cisco Router in Low Earth Orbit (CLEO)

    NASA Technical Reports Server (NTRS)

    Ivancic, William; Stewart, David; Wood, Lloyd; Jackson, Chris; Northam, James; Wilhelm, James

    2008-01-01

    This report documents the design of network infrastructure to support testing and demonstrating network-centric operations and command and control of space-based assets, using IPv6 and IPsec. These tests were performed using the Cisco router in Low Earth Orbit (CLEO), an experimental payload onboard the United Kingdom--Disaster Monitoring Constellation (UK-DMC) satellite built and operated by Surrey Satellite Technology Ltd (SSTL). On Thursday, 29 March 2007, NASA Glenn Research Center, Cisco Systems and SSTL performed the first configuration and demonstration of IPsec and IPv6 onboard a satellite in low Earth orbit. IPv6 is the next generation of the Internet Protocol (IP), designed to improve on the popular IPv4 that built the Internet, while IPsec is the protocol used to secure communication across IP networks. This demonstration was made possible in part by NASA s Earth Science Technology Office (ESTO) and shows that new commercial technologies such as mobile networking, IPv6 and IPsec can be used for commercial, military and government space applications. This has direct application to NASA s Vision for Space Exploration. The success of CLEO has paved the way for new spacebased Internet technologies, such as the planned Internet Routing In Space (IRIS) payload at geostationary orbit, which will be a U.S. Department of Defense Joint Capability Technology Demonstration. This is a sanitized report for public distribution. All real addressing has been changed to psueco addressing.

  10. Exploring the Logic of Mobile Search

    ERIC Educational Resources Information Center

    Westlund, Oscar; Gomez-Barroso, Jose-Luis; Compano, Ramon; Feijoo, Claudio

    2011-01-01

    After more than a decade of development work and hopes, the usage of mobile Internet has finally taken off. Now, we are witnessing the first signs of evidence of what might become the explosion of mobile content and applications that will be shaping the (mobile) Internet of the future. Similar to the wired Internet, search will become very…

  11. Mobile internet technologies and their application to intelligent transportation systems

    DOT National Transportation Integrated Search

    2003-01-01

    The worlds of mobile communication and the Internet are rapidly converging. This new domain, which is being touted as the "Wireless Web" or "Mobile Internet", is in its infancy and will require a number of complex technologies to mature and converge ...

  12. 78 FR 54201 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and... further possible actions necessary to improve internet protocol captioned telephone relay service (IP CTS... for calculating the compensation rate paid to IP CTS providers. This action is necessary to ensure...

  13. 106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink

    DTIC Science & Technology

    2017-07-31

    Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit

  14. Avoiding Biased-Feeding in the Scheduling of Collaborative Multipath TCP.

    PubMed

    Tsai, Meng-Hsun; Chou, Chien-Ming; Lan, Kun-Chan

    2016-01-01

    Smartphones have become the major communication and portable computing devices that access the Internet through Wi-Fi or mobile networks. Unfortunately, users without a mobile data subscription can only access the Internet at limited locations, such as hotspots. In this paper, we propose a collaborative bandwidth sharing protocol (CBSP) built on top of MultiPath TCP (MPTCP). CBSP enables users to buy bandwidth on demand from neighbors (called Helpers) and uses virtual interfaces to bind the subflows of MPTCP to avoid modifying the implementation of MPTCP. However, although MPTCP provides the required multi-homing functionality for bandwidth sharing, the current packet scheduling in collaborative MPTCP (e.g., Co-MPTCP) leads to the so-called biased-feeding problem. In this problem, the fastest link might always be selected to send packets whenever it has available cwnd, which results in other links not being fully utilized. In this work, we set out to design an algorithm, called Scheduled Window-based Transmission Control (SWTC), to improve the performance of packet scheduling in MPTCP, and we perform extensive simulations to evaluate its performance.

  15. Avoiding Biased-Feeding in the Scheduling of Collaborative Multipath TCP

    PubMed Central

    2016-01-01

    Smartphones have become the major communication and portable computing devices that access the Internet through Wi-Fi or mobile networks. Unfortunately, users without a mobile data subscription can only access the Internet at limited locations, such as hotspots. In this paper, we propose a collaborative bandwidth sharing protocol (CBSP) built on top of MultiPath TCP (MPTCP). CBSP enables users to buy bandwidth on demand from neighbors (called Helpers) and uses virtual interfaces to bind the subflows of MPTCP to avoid modifying the implementation of MPTCP. However, although MPTCP provides the required multi-homing functionality for bandwidth sharing, the current packet scheduling in collaborative MPTCP (e.g., Co-MPTCP) leads to the so-called biased-feeding problem. In this problem, the fastest link might always be selected to send packets whenever it has available cwnd, which results in other links not being fully utilized. In this work, we set out to design an algorithm, called Scheduled Window-based Transmission Control (SWTC), to improve the performance of packet scheduling in MPTCP, and we perform extensive simulations to evaluate its performance. PMID:27529783

  16. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first

  17. Internet Connections: Understanding Your Access Options.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1994-01-01

    Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…

  18. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets

    PubMed Central

    Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently. PMID:28968450

  19. Implementation of fast handover for proxy mobile IPv6: Resolving out-of-order packets.

    PubMed

    Kang, Byungseok; Anh, Khuong Quoc; Choo, Hyunseung

    2017-01-01

    Mobile IP allows for location-independent routing of IP datagrams on the Internet. Mobile IP specifies how a mobile node (MN) registers with its home agent and how the home agent routes datagrams to the MN through the tunnel. Current Mobile IP protocols have difficulties meeting the stringent handover delay requirements of future wireless networks. Fast handover for Proxy Mobile IPv6 (FPMIPv6) is used to resolve handover latency and packet loss problems that occur in the Proxy Mobile IPv6 (PMIPv6) protocol. However, while implementing the FPMIPv6 scheme in a testbed, we encounter the out-of-order packet (OoOP) problem. The cause of this problem is the existence of two paths for data transmitted from a correspondent node (CN) to an MN. Since the problem affects the quality of service (QoS) of the network and the performance of the MN, we propose a new scheme using the last packet marker and packet buffering to solve this problem in FPMIPv6. The new Mobile Access Gateway (MAG) can control and deliver the data transmitted via the old path or the new path to an MN in order, using the last packet marker to notify the end of the data delivery in the old path and the packet buffering for holding the data delivered in the new path. We implement both the proposed scheme and FPMIPv6 in a testbed as a real network environment to demonstrate the correctness, cost effectiveness, and performance of the proposed scheme. A performance evaluation reveals that the proposed scheme can handle the OoOP problem efficiently.

  20. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. The Development and Piloting of a Mobile Data Collection Protocol to Assess Compliance With a National Tobacco Advertising, Promotion, and Product Display Ban at Retail Venues in the Russian Federation

    PubMed Central

    Grant, Ashley S; Spires, Mark H; Cohen, Joanna E

    2016-01-01

    Background Tobacco control policies that lead to a significant reduction in tobacco industry marketing can improve public health by reducing consumption of tobacco and preventing initiation of tobacco use. Laws that ban or restrict advertising and promotion in point-of-sale (POS) environments, in the moment when consumers decide whether or not to purchase a tobacco product, must be correctly implemented to achieve the desired public health benefits. POS policy compliance assessments can support implementation; however, there are challenges to conducting evaluations that are rigorous, cost-effective, and timely. Data collection must be discreet, accurate, and systematic, and ideally collected both before and after policies take effect. The use of mobile phones and other mobile technology provide opportunities to efficiently collect data and support effective tobacco control policies. The Russian Federation (Russia) passed a comprehensive national tobacco control law that included a ban on most forms of tobacco advertising and promotion, effective November 15, 2013. The legislation further prohibited the display of tobacco products at retail trade sites and eliminated kiosks as a legal trade site, effective June 1, 2014. Objective The objective of the study was to develop and test a mobile data collection protocol including: (1) retailer sampling, (2) adaptation of survey instruments for mobile phones, and (3) data management protocols. Methods Two waves of observations were conducted; wave 1 took place during April-May 2014, after the advertising and promotion bans were effective, and again in August-September 2014, after the product display ban and elimination of tobacco sales in kiosks came into effect. Sampling took place in 5 Russian cities: Moscow, St. Petersburg, Novosibirsk, Yekaterinburg, and Kazan. Lack of access to a comprehensive list of licensed tobacco retailers necessitated a sampling approach that included the development of a walking protocol to identify tobacco retailers to observe. Observation instruments were optimized for use on mobile devices and included the collection of images/photos and the geographic location of retailers. Data were uploaded in real-time to a remote (“cloud-based”) server accessible via Internet and verified with the use of a data management protocol that included submission of daily field notes from the research team for review by project managers. Results The walking protocol was a practical means of identifying 780 relevant retail venues in Russia, in the absence of reliable sampling resources. Mobile phones were convenient tools for completing observation checklists discretely and accurately. Daily field notes and meticulous oversight of collected data were critical to ensuring data quality. Conclusions Mobile technology can support timely and accurate data collection and also help monitor data quality through the use of real-time uploads. These protocols can be adapted to assess compliance with other types of public health policies. PMID:27580800

  2. The Development and Piloting of a Mobile Data Collection Protocol to Assess Compliance With a National Tobacco Advertising, Promotion, and Product Display Ban at Retail Venues in the Russian Federation.

    PubMed

    Grant, Ashley S; Kennedy, Ryan D; Spires, Mark H; Cohen, Joanna E

    2016-08-31

    Tobacco control policies that lead to a significant reduction in tobacco industry marketing can improve public health by reducing consumption of tobacco and preventing initiation of tobacco use. Laws that ban or restrict advertising and promotion in point-of-sale (POS) environments, in the moment when consumers decide whether or not to purchase a tobacco product, must be correctly implemented to achieve the desired public health benefits. POS policy compliance assessments can support implementation; however, there are challenges to conducting evaluations that are rigorous, cost-effective, and timely. Data collection must be discreet, accurate, and systematic, and ideally collected both before and after policies take effect. The use of mobile phones and other mobile technology provide opportunities to efficiently collect data and support effective tobacco control policies. The Russian Federation (Russia) passed a comprehensive national tobacco control law that included a ban on most forms of tobacco advertising and promotion, effective November 15, 2013. The legislation further prohibited the display of tobacco products at retail trade sites and eliminated kiosks as a legal trade site, effective June 1, 2014. The objective of the study was to develop and test a mobile data collection protocol including: (1) retailer sampling, (2) adaptation of survey instruments for mobile phones, and (3) data management protocols. Two waves of observations were conducted; wave 1 took place during April-May 2014, after the advertising and promotion bans were effective, and again in August-September 2014, after the product display ban and elimination of tobacco sales in kiosks came into effect. Sampling took place in 5 Russian cities: Moscow, St. Petersburg, Novosibirsk, Yekaterinburg, and Kazan. Lack of access to a comprehensive list of licensed tobacco retailers necessitated a sampling approach that included the development of a walking protocol to identify tobacco retailers to observe. Observation instruments were optimized for use on mobile devices and included the collection of images/photos and the geographic location of retailers. Data were uploaded in real-time to a remote ("cloud-based") server accessible via Internet and verified with the use of a data management protocol that included submission of daily field notes from the research team for review by project managers. The walking protocol was a practical means of identifying 780 relevant retail venues in Russia, in the absence of reliable sampling resources. Mobile phones were convenient tools for completing observation checklists discretely and accurately. Daily field notes and meticulous oversight of collected data were critical to ensuring data quality. Mobile technology can support timely and accurate data collection and also help monitor data quality through the use of real-time uploads. These protocols can be adapted to assess compliance with other types of public health policies.

  3. Reducing the Handover Delay in FMIPv6 Using Proactive Care-of Address Scheme

    NASA Astrophysics Data System (ADS)

    Li, Yong; Jin, Depeng; Su, Li; Zeng, Lieguang

    To deal with the increasing number of mobile devices accessing the Internet and the increasing demands of mobility management, IETF has proposed Mobile IPv6 and its fast handover protocol FMIPv6. In FMIPv6, the possibility of Care-of Address (CoA) collision and the time for Return Routability (RR) procedure result in long handover delay, which makes it unsuitable for real-time applications. In this paper, we propose an improved handover scheme for FMIPv6, which reduces the handover delay by using proactive CoA acquisition, configuration and test method. In our proposal, collision-free CoA is proactively prepared, and the time for RR procedure does not contribute to the handover delay. Furthermore, we analyze our proposal's benefits and overhead tradeoff. The numerical results demonstrate that it outperforms the current schemes, such as FMIPv6 and enhanced FMIPv6, on the aspect of handover delay and packet transmission delay.

  4. Mobile Internet Revenues: An Empirical Study of the I-Mode Portal.

    ERIC Educational Resources Information Center

    Jonason, Andreas; Eliasson, Gunnar

    2001-01-01

    Discusses new electronic commerce applications enabled by mobility and personalization over mobile devices; considers the convergence of the wireless, the fixed Internet, and the media industries; describes innovative pricing models; and reports results from a survey of users of I-mode, a wireless Internet service offering Web browsing and email…

  5. [Validation of two brief scales for Internet addiction and mobile phone problem use].

    PubMed

    Beranuy Fargues, Marta; Chamarro Lusar, Andrés; Graner Jordania, Carla; Carbonell Sánchez, Xavier

    2009-08-01

    This study describes the construction and validation process of two questionnaires designed to assess the addictive use of Internet and mobile phones. The scales were applied to a sample of 1,879 students. Results support a two-factor model, presenting an acceptable internal consistency and indices of convergent and discriminant validity. The Questionnaire of Experiences Related to Internet was found to assess intra- and interpersonal conflicts related to Internet use. The Questionnaire of Experiences Related to the Mobile Phone was found to assess conflicts related to mobile phone abuse and to maladaptive emotional and communicational patterns. Our results indicate that the mobile phone does not produce the same degree of addictive behavior as Internet; it could rather be interpreted as problematic use. Men displayed more addictive use of Internet, whilst women seemed to use the mobile phone as a means for emotional communication. It seems that the use of both technologies is more problematic during adolescence and normalizes with age toward a more professional and less playful use, and with fewer negative consequences.

  6. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  7. Internet and Intranet Use with a PC: Effects of Adapter Cards, Windows Versions and TCP/IP Software on Networking Performance.

    ERIC Educational Resources Information Center

    Nieuwenhuysen, Paul

    1997-01-01

    Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…

  8. Dissent in Digital: The Internet and Dissent in Authoritarian States

    ERIC Educational Resources Information Center

    Fielder, James Douglas

    2012-01-01

    Does the Internet facilitate anti-regime dissent within authoritarian states? I argue that the Internet fosters dissent mobilization through three factors: distance, decentralization and interaction. First, the Internet fosters dissent mobilization by allowing protesters to communicate relatively cheaply and instantaneously over great distances.…

  9. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... the Internet, this service has become subject to abuse. Among other things, persons have been using IP...] Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to-Speech.... ACTION: Final rule. SUMMARY: In this document, the Commission adopts a measure that prohibits Internet...

  10. Use of the Internet and mobile-based "apps" for sex-seeking among men who have sex with men in New York City.

    PubMed

    Grosskopf, Nicholas A; LeVasseur, Michael T; Glaser, Debra B

    2014-11-01

    The Internet continues to be a popular venue for men who have sex with men (MSM) to seek sexual partners. Increased sexual risk behavior has been linked to MSM who use the Internet to seek partners. However, there has been little research on how new mobile-based social networking applications ("apps") may affect sex-seeking and sexual risk behaviors of MSM. One hundred twenty-six MSM in New York City were recruited to complete an online survey on the use of the Internet and other technology for sex-seeking. The authors collected data on variables of interest including sexual sensation seeking, gay identity affirmation, internalized homophobia, Internet/app use, and sexual behavior with men met via the Internet and mobile apps. Results indicated that men who use both the Internet and mobile apps to seek partners were younger and reported higher incomes (p<.05) than men who used the Internet only. There were no significant differences between the groups with regard to race, sexual sensation seeking, gay identity affirmation, or internalized homophobia, indicating that the use of mobile-based apps for sex-seeking may be simply an example of evolving technologies. These findings may provide insight for the feasibility and planning of effective mobile app-based HIV/STI programs for MSM. © The Author(s) 2014.

  11. 47 CFR 14.61 - Obligations with respect to internet browsers built into mobile phones.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Obligations with respect to internet browsers... GENERAL ACCESS TO ADVANCED COMMUNICATIONS SERVICES AND EQUIPMENT BY PEOPLE WITH DISABILITIES Internet... internet browsers built into mobile phones. (a) Accessibility. If on or after October 8, 2013 a...

  12. 47 CFR 14.61 - Obligations with respect to internet browsers built into mobile phones.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Obligations with respect to internet browsers... GENERAL ACCESS TO ADVANCED COMMUNICATIONS SERVICES AND EQUIPMENT BY PEOPLE WITH DISABILITIES Internet... internet browsers built into mobile phones. (a) Accessibility. If on or after October 8, 2013 a...

  13. E-Rehabilitation - an Internet and mobile phone based tailored intervention to enhance self-management of cardiovascular disease: study protocol for a randomized controlled trial.

    PubMed

    Antypas, Konstantinos; Wangberg, Silje C

    2012-07-09

    Cardiac rehabilitation is very important for the recovery and the secondary prevention of cardiovascular disease, and one of its main strategies is to increase the level of physical activity. Internet and mobile phone based interventions have been successfully used to help people to achieve this. One of the components that are related to the efficacy of these interventions is tailoring of content to the individual. This trial is studying the effect of a longitudinally tailored Internet and mobile phone based intervention that is based on models of health behaviour, on the level of physical activity and the adherence to the intervention, as an extension of a face-to-face cardiac rehabilitation stay. A parallel group, cluster randomized controlled trial. The study population is adult participants of a cardiac rehabilitation programme in Norway with home Internet access and mobile phone, who in monthly clusters are randomized to the control or the intervention condition. Participants have access to a website with information regarding cardiac rehabilitation, an online discussion forum and an online activity calendar. Those randomized to the intervention condition, receive in addition tailored content based on models of health behaviour, through the website and mobile text messages. The objective is to assess the effect of the intervention on maintenance of self-management behaviours after the rehabilitation stay. Main outcome is the level of physical activity one month, three months and one year after the end of the cardiac rehabilitation programme. The randomization of clusters is based on a true random number online service, and participants, investigators and outcome assessor are blinded to the condition of the clusters. The study suggests a theory-based intervention that combines models of health behaviour in an innovative way, in order to tailor the delivered content. The users have been actively involved in its design, and because of the use of Open-Source software, the intervention can easily and at low-cost be reproduced and expanded by others. Challenges are the recruitment in the elderly population and the possible underrepresentation of women in the study sample. Funding by Northern Norway Regional Health Authority. Trial registry http://www.clinicaltrials.gov: NCT01223170.

  14. Back from the beach but hanging on the telephone? English adolescents' attitudes and experiences of mobile phones and the internet.

    PubMed

    Madell, Dominic; Muncer, Steven

    2004-06-01

    Recently, a number of commentators have suggested that growth in use of the Internet may be slowing, and its impact may have been exaggerated. However, a disproportionate number of the nonusers tend to be those over the age of 50, and the young are most likely to go online eventually. Therefore, the most appropriate people to survey with regard to Internet use are adolescents and young adults who are likely to be the Internet users or nonusers of the future. This survey was conducted to find out more about the activities and opinions of secondary-school aged children who do, and do not, use the Internet. Mobile phone use was also examined in this survey as this has also shown a meteoric rise in adults and more particularly in young people. Generally, the survey revealed that children aged between 11 and 16 years old are quite comfortable with the Internet, use it a moderate amount and for a variety of purposes. However, boys were more likely to use the Internet than girls and sometimes for slightly different purposes. Reasons for not using the Internet generally revolved around a lack of access to equipment. Furthermore, a higher percentage of adolescents have mobile phones than adults and girls are more likely to own a mobile phone than boys. Mobile phones were also used for a variety of purposes, most notably making and receiving calls and text-messaging. The most common reasons for children not owning a mobile phone was because they had no need for one. Finally, a significant positive relationship between the use of emails and text messaging suggests that the mobile phone may supplement some of the previous functions of the Internet.

  15. Hardware platform for multiple mobile robots

    NASA Astrophysics Data System (ADS)

    Parzhuber, Otto; Dolinsky, D.

    2004-12-01

    This work is concerned with software and communications architectures that might facilitate the operation of several mobile robots. The vehicles should be remotely piloted or tele-operated via a wireless link between the operator and the vehicles. The wireless link will carry control commands from the operator to the vehicle, telemetry data from the vehicle back to the operator and frequently also a real-time video stream from an on board camera. For autonomous driving the link will carry commands and data between the vehicles. For this purpose we have developed a hardware platform which consists of a powerful microprocessor, different sensors, stereo- camera and Wireless Local Area Network (WLAN) for communication. The adoption of IEEE802.11 standard for the physical and access layer protocols allow a straightforward integration with the internet protocols TCP/IP. For the inspection of the environment the robots are equipped with a wide variety of sensors like ultrasonic, infrared proximity sensors and a small inertial measurement unit. Stereo cameras give the feasibility of the detection of obstacles, measurement of distance and creation of a map of the room.

  16. Optimising text messaging to improve adherence to web-based smoking cessation treatment: a randomised control trial protocol

    PubMed Central

    Graham, Amanda L; Jacobs, Megan A; Cohn, Amy M; Cha, Sarah; Abroms, Lorien C; Papandonatos, George D; Whittaker, Robyn

    2016-01-01

    Introduction Millions of smokers use the Internet for smoking cessation assistance each year; however, most smokers engage minimally with even the best designed websites. The ubiquity of mobile devices and their effectiveness in promoting adherence in other areas of health behaviour change make them a promising tool to address adherence in Internet smoking cessation interventions. Text messaging is used by most adults, and messages can proactively encourage use of a web-based intervention. Text messaging can also be integrated with an Internet intervention to facilitate the use of core Internet intervention components. Methods and analysis We identified four aspects of a text message intervention that may enhance its effectiveness in promoting adherence to a web-based smoking cessation programme: personalisation, integration, dynamic tailoring and message intensity. Phase I will use a two-level full factorial design to test the impact of these four experimental features on adherence to a web-based intervention. The primary outcome is a composite metric of adherence that incorporates general utilisation metrics (eg, logins, page views) and specific feature utilisation shown to predict abstinence. Participants will be N=860 adult smokers who register on an established Internet cessation programme and enrol in its text message programme. Phase II will be a two-arm randomised trial to compare the efficacy of the web-based cessation programme alone and in conjunction with the optimised text messaging intervention on 30-day point prevalence abstinence at 9 months. Phase II participants will be N=600 adult smokers who register to use an established Internet cessation programme and enrol in text messaging. Secondary analyses will explore whether adherence mediates the effect of treatment condition on outcome. Ethics and dissemination This protocol was approved by Chesapeake IRB. We will disseminate study results through peer-reviewed manuscripts and conference presentations related to the methods and design, outcomes and exploratory analyses. Trial registration number NCT02585206. PMID:27029775

  17. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    ERIC Educational Resources Information Center

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  18. Asserting National Sovereignty in Cyberspace: The Case for Internet Border Inspection

    DTIC Science & Technology

    2003-06-01

    Influencing Foreign Policy. in Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop. 1999...investigative Agencies that investigate violations of federal law IO Information Operations, military operations in information realm IP Internet ...Protocol, a specific format for Internet packet headers IW Information Warfare, part of information operations NCP Network Control Protocol NSA

  19. Intelligent Mobile Technologies

    NASA Technical Reports Server (NTRS)

    Alena, Rick; Gilbaugh, Bruce; Glass, Brian; Swanson, Keith (Technical Monitor)

    2000-01-01

    Testing involves commercial radio equipment approved for export and use in Canada. Testing was conducted in the Canadian High Arctic, where hilly terrain provided the worst-case testing. SFU and Canadian governmental agencies made significant technical contributions. The only technical data related to radio testing was exchanged with SFU. Test protocols are standard radio tests performed by communication technicians worldwide. The Joint Fields Operations objectives included the following: (1) to provide Internet communications services for field science work and mobile exploration systems; (2) to evaluate the range and throughput of three different medium-range radio link technologies for providing coverage of the crater area; and (3) to demonstrate collaborative software such as NetMeeting with multi-point video for exchange of scientific information between remote node and base-base camp and science centers as part of communications testing.

  20. Understanding the mobile internet to develop the next generation of online medical teaching tools

    PubMed Central

    Christiano, Cynthia; Ferris, Maria

    2011-01-01

    Healthcare providers (HCPs) use online medical information for self-directed learning and patient care. Recently, the mobile internet has emerged as a new platform for accessing medical information as it allows mobile devices to access online information in a manner compatible with their restricted storage. We investigated mobile internet usage parameters to direct the future development of mobile internet teaching websites. Nephrology On-Demand Mobile (NODM) (http://www.nephrologyondemand.org) was made accessible to all mobile devices. From February 1 to December 31, 2010, HCP use of NODM was tracked using code inserted into the root files. Nephrology On-Demand received 15 258 visits, of which approximately 10% were made to NODM, with the majority coming from the USA. Most access to NODM was through the Apple iOS family of devices and cellular connections were the most frequently used. These findings provide a basis for the future development of mobile nephrology and medical teaching tools. PMID:21659443

  1. Understanding the mobile internet to develop the next generation of online medical teaching tools.

    PubMed

    Desai, Tejas; Christiano, Cynthia; Ferris, Maria

    2011-01-01

    Healthcare providers (HCPs) use online medical information for self-directed learning and patient care. Recently, the mobile internet has emerged as a new platform for accessing medical information as it allows mobile devices to access online information in a manner compatible with their restricted storage. We investigated mobile internet usage parameters to direct the future development of mobile internet teaching websites. Nephrology On-Demand Mobile (NOD(M)) (http://www.nephrologyondemand.org) was made accessible to all mobile devices. From February 1 to December 31, 2010, HCP use of NOD(M) was tracked using code inserted into the root files. Nephrology On-Demand received 15,258 visits, of which approximately 10% were made to NOD(M), with the majority coming from the USA. Most access to NOD(M) was through the Apple iOS family of devices and cellular connections were the most frequently used. These findings provide a basis for the future development of mobile nephrology and medical teaching tools.

  2. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  3. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  4. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  5. A Multi-Technology Communication Platform for Urban Mobile Sensing.

    PubMed

    Almeida, Rodrigo; Oliveira, Rui; Luís, Miguel; Senna, Carlos; Sargento, Susana

    2018-04-12

    A common concern in smart cities is the focus on sensing procedures to provide city-wide information to city managers and citizens. To meet the growing demands of smart cities, the network must provide the ability to handle a large number of mobile sensors/devices, with high heterogeneity and unpredictable mobility, by collecting and delivering the sensed information for future treatment. This work proposes a multi-wireless technology communication platform for opportunistic data gathering and data exchange with respect to smart cities. Through the implementation of a proprietary long-range (LoRa) network and an urban sensor network, our platform addresses the heterogeneity of Internet of Things (IoT) devices while conferring communications in an opportunistic manner, increasing the interoperability of our platform. It implements and evaluates a medium access communication (MAC) protocol for LoRa networks with multiple gateways. It also implements mobile Opportunistic VEhicular (mOVE), a delay-tolerant network (DTN)-based architecture to address the mobility dimension. The platform provides vehicle-to-everything (V2X) communication with support for highly reliable and actionable information flows. Moreover, taking into account the high mobility pattern that a smart city scenario presents, we propose and evaluate two forwarding strategies for the opportunistic sensor network.

  6. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks.

    PubMed

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-29

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.

  7. 77 FR 63757 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final... Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband...

  8. Science and Technology Undergraduate Students' Use of the Internet, Cell Phones and Social Networking Sites to Access Library Information

    ERIC Educational Resources Information Center

    Salisbury, Lutishoor; Laincz, Jozef; Smith, Jeremy J.

    2012-01-01

    Many academic libraries and publishers have developed mobile-optimized versions of their web sites and catalogs. Almost all database vendors and major journal publishers have provided a way to connect to their resources via the Internet and the mobile web. In light of this pervasive use of the Internet, mobile devices and social networking, this…

  9. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  10. 78 FR 14359 - Verizon Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And Medium Business, Tampa, Florida; Verizon Business Networks Services, Inc., Senior Coordinator-Order... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...

  11. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  12. Internet Protocol Handbook. Volume 4. The Domain Name System (DNS) handbook

    DTIC Science & Technology

    1989-08-01

    Mockapetris [Page 1] 4-11 INTERNET PROTOCOL HA TDBOOK - Voue Four 1989 RFC 1034 Domain Concepts and Facilities November 1987 bandwidth consumed in distributing...Domain Names- Concepts and Facilities KFC 1034 RFC 1034 Domain Concepts and Facilities November 1’)87 - Queries contain a bit called recursion desired...during periodic sweeps to reclaim the memory consumed by old RRS. Mockapetris [Page 33] 4-43 INTERNET PROTOCOL HANDBOOK - Volume Four 1989 RFC 1034

  13. Mobile telephones: a comparison of radiated power between 3G VoIP calls and 3G VoCS calls.

    PubMed

    Jovanovic, Dragan; Bragard, Guillaume; Picard, Dominique; Chauvin, Sébastien

    2015-01-01

    The purpose of this study is to assess the mean RF power radiated by mobile telephones during voice calls in 3G VoIP (Voice over Internet Protocol) using an application well known to mobile Internet users, and to compare it with the mean power radiated during voice calls in 3G VoCS (Voice over Circuit Switch) on a traditional network. Knowing that the specific absorption rate (SAR) is proportional to the mean radiated power, the user's exposure could be clearly identified at the same time. Three 3G (High Speed Packet Access) smartphones from three different manufacturers, all dual-band for GSM (900 MHz, 1800 MHz) and dual-band for UMTS (900 MHz, 1950 MHz), were used between 28 July and 04 August 2011 in Paris (France) to make 220 two-minute calls on a mobile telephone network with national coverage. The places where the calls were made were selected in such a way as to describe the whole range of usage situations of the mobile telephone. The measuring equipment, called "SYRPOM", recorded the radiation power levels and the frequency bands used during the calls with a sampling rate of 20,000 per second. In the framework of this study, the mean normalised power radiated by a telephone in 3G VoIP calls was evaluated at 0.75% maximum power of the smartphone, compared with 0.22% in 3G VoCS calls. The very low average power levels associated with use of 3G devices with VoIP or VoCS support the view that RF exposure resulting from their use is far from exceeding the basic restrictions of current exposure limits in terms of SAR.

  14. Space Internet-Embedded Web Technologies Demonstration

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2001-01-01

    The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.

  15. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  16. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  17. Internet Telephony

    DTIC Science & Technology

    1999-12-01

    compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- 󈨞s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not

  18. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care.

    PubMed

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp, John M; Nicholson, Wanda K

    2015-03-30

    The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. We describe pregnant women's access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher's exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms compared to women 30 years of age or older. Of the participants, 82.0% (82/100) were fairly willing or very willing to participate in postpartum lifestyle intervention. Of the participants, 83.0% (83/100) were fairly willing or very willing to participate in an Internet intervention delivered via computer, while only 49.0% (49/100) were fairly willing or very willing to do so via mobile phone technology. Older women and women with children tended to be less likely to desire a mobile phone-based program. There is broad access and use of computer and mobile phone technology among southern US pregnant women with varied demographic characteristics. Pregnant women are willing to participate in Internet-supported perinatal interventions. Our findings can inform the development of computer- and mobile phone-based approaches for the delivery of clinical and educational interventions.

  19. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care

    PubMed Central

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp Jr, John M

    2015-01-01

    Background The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. Objective We describe pregnant women’s access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. Methods We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher’s exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. Results The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms compared to women 30 years of age or older. Of the participants, 82.0% (82/100) were fairly willing or very willing to participate in postpartum lifestyle intervention. Of the participants, 83.0% (83/100) were fairly willing or very willing to participate in an Internet intervention delivered via computer, while only 49.0% (49/100) were fairly willing or very willing to do so via mobile phone technology. Older women and women with children tended to be less likely to desire a mobile phone-based program. Conclusions There is broad access and use of computer and mobile phone technology among southern US pregnant women with varied demographic characteristics. Pregnant women are willing to participate in Internet-supported perinatal interventions. Our findings can inform the development of computer- and mobile phone-based approaches for the delivery of clinical and educational interventions. PMID:25835744

  20. Learning Potentials of the Ubiquitous Internet: Using Mobile Devices to Support the Individual, Social and Physical Context of the Learner

    ERIC Educational Resources Information Center

    Dalsgaard, Christian; Pedersen, Nicholai Friis; Aaen, Janus Holst

    2013-01-01

    The aim of this paper is to identify the key learning potentials of the ubiquitous internet. Rather than focusing on mobile technology or the mobility of the learner, the paper emphasises the ubiquity of internet access as a paramount catalyst for new learning in the digital age. From a sociocultural perspective the paper discusses different ways…

  1. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  2. Effects of mobile Internet use on college student pedestrian injury risk.

    PubMed

    Byington, Katherine W; Schwebel, David C

    2013-03-01

    College-age individuals have the highest incidence of pedestrian injuries of any age cohort. One factor that might contribute to elevated pedestrian injuries among this age group is injuries incurred while crossing streets distracted by mobile devices. Examine whether young adult pedestrian safety is compromised while crossing a virtual pedestrian street while distracted using the Internet on a mobile "smartphone." A within-subjects design was implemented with 92 young adults. Participants crossed a virtual pedestrian street 20 times, half the time while undistracted and half while completing an email-driven "scavenger hunt" to answer mundane questions using mobile Internet on their cell phones. Six measures of pedestrian behavior were assessed during crossings. Participants also reported typical patterns of street crossing and mobile Internet use. Participants reported using mobile Internet with great frequency in daily life, including while walking across streets. In the virtual street environment, pedestrian behavior was greatly altered and generally more risky when participants were distracted by Internet use. While distracted, participants waited longer to cross the street (F=42.37), missed more safe opportunities to cross (F=42.63), took longer to initiate crossing when a safe gap was available (F=53.03), looked left and right less often (F=124.68), spent more time looking away from the road (F=1959.78), and were more likely to be hit or almost hit by an oncoming vehicle (F=29.54; all ps<0.01). Results were retained after controlling for randomized order; participant gender, age, and ethnicity; and both pedestrian habits and mobile Internet experience. Pedestrian behavior was influenced, and generally considerably riskier, when participants were simultaneously using mobile Internet and crossing the street than when crossing the street with no distraction. This finding reinforces the need for increased awareness concerning the risks of distracted pedestrian behavior. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Effects of Mobile Internet Use On College Student Pedestrian Injury Risk

    PubMed Central

    Byington, Katherine W.; Schwebel, David C.

    2012-01-01

    Background College-age individuals have the highest incidence of pedestrian injuries of any age cohort. One factor that might contribute to elevated pedestrian injuries among this age group is injuries incurred while crossing streets distracted by mobile devices. Objectives Examine whether young adult pedestrian safety is compromised while crossing a virtual pedestrian street while distracted using the internet on a mobile “smartphone.” Method A within-subjects design was implemented with 92 young adults. Participants crossed a virtual pedestrian street 20 times, half the time while undistracted and half while completing an email-driven “scavenger hunt” to answer mundane questions using mobile internet on their cell phones. Six measures of pedestrian behavior were assessed during crossings. Participants also reported typical patterns of street crossing and mobile internet use. Results Participants reported using mobile internet with great frequency in daily life, including while walking across streets. In the virtual street environment, pedestrian behavior was greatly altered and generally more risky when participants were distracted by internet use. While distracted, participants waited longer to cross the street (F = 42.37), missed more safe opportunities to cross (F = 42.63), took longer to initiate crossing when a safe gap was available (F = 53.03), looked left and right less often (F = 124.68), spent more time looking away from the road (F = 1959.78), and were more likely to be hit or almost hit by an oncoming vehicle (F = 29.54; all ps< 0.01). Results were retained after controlling for randomized order; participant gender, age, and ethnicity; and both pedestrian habits and mobile internet experience. Conclusion Pedestrian behavior was influenced, and generally considerably riskier, when participants were simultaneously using mobile internet and crossing the street than when crossing the street with no distraction. This finding reinforces the need for increased awareness concerning the risks of distracted pedestrian behavior. PMID:23201755

  4. Pathological Internet use, cyberbullying and mobile phone use in adolescence: a school-based study in Greece.

    PubMed

    Tsimtsiou, Zoi; Haidich, Anna-Bettina; Drontsos, Anastasios; Dantsi, Fotini; Sekeri, Zafiria; Drosos, Evangelos; Trikilis, Nikolaos; Dardavesis, Theodoros; Nanos, Panagiotis; Arvanitidou, Malamatenia

    2017-04-22

    Purpose This study investigated the prevalence of Internet addiction (IA) and cyberbullying and examined profiles of adolescents with increased risk to develop pathological behaviors. Methods In this cross-sectional, school-based study, 8053 students of 30 middle and 21 high schools (12-18 years old) were invited to participate, based on a multistage stratified random sampling technique. The Internet aiddiction test (IAT) was used along with information on socio-demographics, Internet activities and cyberbullying experience. Results Five thousand five hundred and ninety students participated (response rate 69.4%). Pathological Internet use (IAT ≥50) was found in 526 (10.1%), while 403 (7.3%) experienced cyberbullying as victims and 367 (6.6%) as perpetrators during the last year. In multivariable models, the odds of IA increased with online hours on mobile phones and Internet use during weekends, Internet café visits, chatrooms usage and engagement in cyberbullying. Cyberbullying victims were more likely to be older, female, Facebook and chatrooms users, while perpetrators were more likely to be male, older Internet users and fans of pornographic sites. A perpetrator was significantly more likely to have also been a victim [odds ratio (OR) = 5.51, confidence interval (CI): 3.92-7.74]. Hours of daily Internet use on a mobile phone was independently associated with IA and cyberbullying (OR) 1.41, 95% CI 1.30, 1.53 and OR 1.11, 95% CI 1.01, 1.21, respectively. Conclusions Cyberbullying is associated with IA and the hours spent online on a mobile phone affected both conditions. The increasing Internet access through mobile phones or other devices should be accompanied by the appropriate education of both parents and adolescents on safe Internet use.

  5. DDN (Defense Data Network) Protocol Handbook. Volume 2. DARPA Internet Protocols

    DTIC Science & Technology

    1985-12-01

    header padding is used to ensure that the internet header ends on a 32 bit boundary. The padding is zero . 3.2. Discussion The implementation of a... zeros . The first of these would be interpreted as the end-of-options option, and the remainder as internet header padding , Every internet module must...several octets in length. The internet header Padding field is used to ensure that the data begins on 32 bit word boundary. The padding is zero

  6. Self-reported use of internet by cervical cancer clients in two National Referral Hospitals in Kenya.

    PubMed

    Kivuti-Bitok, Lucy W; McDonnell, Geoff; Pokhariyal, Ganesh P; Roudsari, Abdul V

    2012-10-09

    Cervical cancer remains a devastating disease in Kenya accounting for more than 2000 deaths each year. Lack of information on cervical cancer prevention and management has been attributed to the apathy among women in seeking health interventions. Use of internet-based and mobile e-health tools could increase information access among cervical cancer patients. The objective of the study was; to establish the extent of use of mobile phones and internet by cervical cancer patients in accessing information related to cancer treatment and management.; find out the characteristics of patients associated with internet use and identify barriers faced by the patients in internet use. A cross sectional descriptive survey of 199 cervical patients visiting the two main referral hospitals in Kenya was done. A structured questionnaire was used to collect data. The average length of illness was 2.43 years (SD ± 3.0). Only 7.5 %( n=15) reported to having used the internet as a source of information. 92.5 %( n=184) did not use internet. With Multiple options, 70.9% did not know how to use a computer, 29.2% did not have access to a computer, 14.6% lacked the money to use computers at the local cyber cafe while other barriers identified accounted for 11.1%. Patients reported that the internet had an important role in the management of cancer of the cervix in health education (17.6%), online consultation (14.6%), booking of patients (13.6%), referrals (8.5%) and collecting data (7%). The 96.5% of the respondents who had access to a mobile phone, recommended mobile phones for health education messages (31.7%), reminder alerts for medication (29.7%) and booking appointments (21.6%). There was a statistically significant association between income of the patients and internet use (p = 0.026) in this study. There is low level use of the internet by cervical cancer clients attended in Public referral facilities in Kenya. This was attributed to; lack of knowledge on how to use computers and lack of access to a computer. High level of access to mobile phones was reported. This is an indicator of great potential for use of mobile phones in the management of cervical cancer through short messaging services (sms), without internet connectivity. There is even greater potential to internet use through web access via mobile phones.

  7. Disparities in internet use among orthopedic outpatients.

    PubMed

    Walsh, Kenneth P; Rehman, Saqib; Goldhirsh, Jessie

    2014-02-01

    Internet access has lagged behind for patients with lower incomes and from certain ethnic groups. This study investigated the possible improvement of access to health-related information on the Internet for all patients in an urban outpatient setting, regardless of socioeconomic background. A 28-question survey was completed by 100 orthopedic outpatients evaluating associations between their age, ethnicity, income, or education level and their access to the Internet. The survey also examined how patients used the Internet to obtain information about their medical condition, their privacy concerns when conducting online research, and their use of mobile phones as a primary means of Internet access. The Internet was used by 57% of orthopedic outpatients in this urban setting. Internet access decreased with advancing age but increased with increasing income and education, findings consistent with similar studies. Despite the inability to identify an association between ethnicity and Internet access in this patient population, fewer Latinos (33%) than whites (67%) or African Americans (77%) sought information about their medical condition. Among patients who used a mobile phone as the primary method for online access, 74% were African American or Latino and 26% were white. This difference in mobile phone use for online access suggests that mobile phones have provided ethnic minorities with greater Internet access and thus may have narrowed the digital divide among the races. Copyright 2014, SLACK Incorporated.

  8. Uptake and Acceptability of Information and Communication Technology in a Community-Based Cohort of People Who Inject Drugs: Implications for Mobile Health Interventions

    PubMed Central

    Genz, Andrew; Kirk, Gregory; Piggott, Damani; Mehta, Shruti H; Linas, Beth S

    2015-01-01

    Background Mobile phone and Internet-based technologies are increasingly used to disseminate health information and facilitate delivery of medical care. While these strategies hold promise for reducing barriers to care for medically-underserved populations, their acceptability among marginalized populations such as people who inject drugs is not well-understood. Objective To understand patterns of mobile phone ownership, Internet use and willingness to receive health information via mobile devices among people who inject drugs. Methods We surveyed current and former drug injectors participating in a longitudinal cohort study in Baltimore, Maryland, USA. Respondents completed a 12-item, interviewer-administered questionnaire during a regular semi-annual study visit that assessed their use of mobile technology and preferred modalities of receiving health information. Using data from the parent study, we used logistic regression to evaluate associations among participants’ demographic and clinical characteristics and their mobile phone and Internet use. Results The survey was completed by 845 individuals, who had a median age of 51 years. The sample was 89% African-American, 65% male, and 33% HIV-positive. Participants were generally of low education and income levels. Fewer than half of respondents (40%) indicated they had ever used the Internet. Mobile phones were used by 86% of respondents. Among mobile phone owners, 46% had used their phone for text messaging and 25% had accessed the Internet on their phone. A minority of respondents (42%) indicated they would be interested in receiving health information via phone or Internet. Of those receptive to receiving health information, a mobile phone call was the most favored modality (66%) followed by text messaging (58%) and Internet (51%). Conclusions Utilization of information and communication technology among this cohort of people who inject drugs was reported at a lower level than what has been estimated for the general U.S. population. Our findings identify a potential barrier to successful implementation of mobile health and Internet-based interventions for people who inject drugs, particularly those who are older and have lower levels of income and educational attainment. As mobile communication technology continues to expand, future studies should re-examine whether mHealth applications become more accessible and accepted by socioeconomically disadvantaged groups. PMID:26111915

  9. Uptake and Acceptability of Information and Communication Technology in a Community-Based Cohort of People Who Inject Drugs: Implications for Mobile Health Interventions.

    PubMed

    Genz, Andrew; Kirk, Gregory; Piggott, Damani; Mehta, Shruti H; Linas, Beth S; Westergaard, Ryan P

    2015-06-25

    Mobile phone and Internet-based technologies are increasingly used to disseminate health information and facilitate delivery of medical care. While these strategies hold promise for reducing barriers to care for medically-underserved populations, their acceptability among marginalized populations such as people who inject drugs is not well-understood. To understand patterns of mobile phone ownership, Internet use and willingness to receive health information via mobile devices among people who inject drugs. We surveyed current and former drug injectors participating in a longitudinal cohort study in Baltimore, Maryland, USA. Respondents completed a 12-item, interviewer-administered questionnaire during a regular semi-annual study visit that assessed their use of mobile technology and preferred modalities of receiving health information. Using data from the parent study, we used logistic regression to evaluate associations among participants' demographic and clinical characteristics and their mobile phone and Internet use. The survey was completed by 845 individuals, who had a median age of 51 years. The sample was 89% African-American, 65% male, and 33% HIV-positive. Participants were generally of low education and income levels. Fewer than half of respondents (40%) indicated they had ever used the Internet. Mobile phones were used by 86% of respondents. Among mobile phone owners, 46% had used their phone for text messaging and 25% had accessed the Internet on their phone. A minority of respondents (42%) indicated they would be interested in receiving health information via phone or Internet. Of those receptive to receiving health information, a mobile phone call was the most favored modality (66%) followed by text messaging (58%) and Internet (51%). Utilization of information and communication technology among this cohort of people who inject drugs was reported at a lower level than what has been estimated for the general U.S. Our findings identify a potential barrier to successful implementation of mobile health and Internet-based interventions for people who inject drugs, particularly those who are older and have lower levels of income and educational attainment. As mobile communication technology continues to expand, future studies should re-examine whether mHealth applications become more accessible and accepted by socioeconomically disadvantaged groups.

  10. TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones

    NASA Astrophysics Data System (ADS)

    Nauman, Mohammad; Ali, Tamleek

    Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.

  11. On Ramps: Options and Issues in Accessing the Internet.

    ERIC Educational Resources Information Center

    Bocher, Bob

    1995-01-01

    Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…

  12. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION... Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the following...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  13. Mobile access to the Internet: from personal bubble to satellites

    NASA Astrophysics Data System (ADS)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  14. Seeking Medical Information Using Mobile Apps and the Internet: Are Family Caregivers Different from the General Public?

    PubMed

    Kim, Hyunmin; Paige Powell, M; Bhuyan, Soumitra S; Bhuyan, Soumitra Sudip

    2017-03-01

    Family caregivers play an important role to care cancer patients since they exchange medical information with health care providers. However, relatively little is known about how family caregivers seek medical information using mobile apps and the Internet. We examined factors associated with medical information seeking by using mobile apps and the Internet among family caregivers and the general public using data from the 2014 Health Information National Trends Survey 4 Cycle 1. The study sample consisted of 2425 family caregivers and 1252 non-family caregivers (the general public). Guided by Comprehensive Model of Information Seeking (CMIS), we examined related factors' impact on two outcome variables for medical information seeking: mobile apps use and Internet use with multivariate logistic regression analyses. We found that online medical information seeking is different between family caregivers and the general public. Overall, the use of the Internet for medical information seeking is more common among family caregivers, while the use of mobile apps is less common among family caregivers compared with the general public. Married family caregivers were less likely to use mobile apps, while family caregivers who would trust cancer information were more likely to use the Internet for medical information seeking as compared to the general public. Medical information seeking behavior among family caregivers can be an important predictor of both their health and the health of their cancer patients. Future research should explore the low usage of mobile health applications among family caregiver population.

  15. Security of Mobile Agents on the Internet.

    ERIC Educational Resources Information Center

    Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare

    2001-01-01

    Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)

  16. Continued Development of Internet Protocols under the IBM OS/MVS Operating System

    DTIC Science & Technology

    1985-01-25

    developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP

  17. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  18. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  19. Mobility-Enhanced Reliable Geographical Forwarding in Cognitive Radio Sensor Networks

    PubMed Central

    Zubair, Suleiman; Syed Yusoff, Sharifah Kamilah; Fisal, Norsheila

    2016-01-01

    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works. PMID:26840312

  20. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.

    PubMed

    Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo

    2017-09-18

    Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.

  1. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    PubMed

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  2. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network

    PubMed Central

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160

  3. A Multi-Technology Communication Platform for Urban Mobile Sensing

    PubMed Central

    Almeida, Rodrigo; Oliveira, Rui

    2018-01-01

    A common concern in smart cities is the focus on sensing procedures to provide city-wide information to city managers and citizens. To meet the growing demands of smart cities, the network must provide the ability to handle a large number of mobile sensors/devices, with high heterogeneity and unpredictable mobility, by collecting and delivering the sensed information for future treatment. This work proposes a multi-wireless technology communication platform for opportunistic data gathering and data exchange with respect to smart cities. Through the implementation of a proprietary long-range (LoRa) network and an urban sensor network, our platform addresses the heterogeneity of Internet of Things (IoT) devices while conferring communications in an opportunistic manner, increasing the interoperability of our platform. It implements and evaluates a medium access communication (MAC) protocol for LoRa networks with multiple gateways. It also implements mobile Opportunistic VEhicular (mOVE), a delay-tolerant network (DTN)-based architecture to address the mobility dimension. The platform provides vehicle-to-everything (V2X) communication with support for highly reliable and actionable information flows. Moreover, taking into account the high mobility pattern that a smart city scenario presents, we propose and evaluate two forwarding strategies for the opportunistic sensor network. PMID:29649175

  4. A Mobile IPv6 based Distributed Mobility Management Mechanism of Mobile Internet

    NASA Astrophysics Data System (ADS)

    Yan, Shi; Jiayin, Cheng; Shanzhi, Chen

    A flatter architecture is one of the trends of mobile Internet. Traditional centralized mobility management mechanism faces the challenges such as scalability and UE reachability. A MIPv6 based distributed mobility management mechanism is proposed in this paper. Some important network entities and signaling procedures are defined. UE reachability is also considered in this paper through extension to DNS servers. Simulation results show that the proposed approach can overcome the scalability problem of the centralized scheme.

  5. Hierarchical Medical System Based on Big Data and Mobile Internet: A New Strategic Choice in Health Care

    PubMed Central

    2017-01-01

    China is setting up a hierarchical medical system to solve the problems of biased resource allocation and high patient flows to large hospitals. The development of big data and mobile Internet technology provides a new perspective for the establishment of hierarchical medical system. This viewpoint discusses the challenges with the hierarchical medical system in China and how big data and mobile Internet can be used to mitigate these challenges. PMID:28790024

  6. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in governmentmore » network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.« less

  7. Mobile communication using a mobile phone with a glucometer for glucose control in Type 2 patients with diabetes: as effective as an Internet-based glucose monitoring system.

    PubMed

    Cho, Jae-Hyoung; Lee, Hye-Chung; Lim, Dong-Jun; Kwon, Hyuk-Sang; Yoon, Kun-Ho

    2009-01-01

    A mobile phone with a glucometer integrated into the battery pack (the 'Diabetes Phone') was launched in Korea in 2003. We compared its effect on management of type 2 diabetes to the Internet-based glucose monitoring system (IBGMS), which had been studied previously. We conducted a randomized trial involving 69 patients for three months. Participants were assigned to an Internet group or a phone group. The phone group communicated with medical staff through the mobile phone only. Their glucose-monitoring data were automatically transferred to individual, web-based charts and they received medical recommendations by short message service. The Internet group used the IBGMS. There were no significant differences between the groups at baseline. After three months' intervention, HbA(1c) levels of both groups had decreased significantly, from 7.6% to 6.9% for the Internet group and from 8.3% to 7.1% for the phone group (P < 0.01). Levels of patient satisfaction and adherence to medical advice were similar. Mobile, bidirectional communication between doctors and patients using the diabetes phone was as effective for glucose control as the previously-studied Internet-based monitoring system and it was good for patient satisfaction and adherence.

  8. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... utilizing system packets that are formatted in accordance with commercial standards of Internet protocol (IP... of IPv4 products. (b) Specifically, any new IP product or system developed, acquired, or produced...

  9. A Mobility-Aware QoS Signaling Protocol for Ambient Networks

    NASA Astrophysics Data System (ADS)

    Jeong, Seong-Ho; Lee, Sung-Hyuck; Bang, Jongho

    Mobility-aware quality of service (QoS) signaling is crucial to provide seamless multimedia services in the ambient environment where mobile nodes may move frequently between different wireless access networks. The mobility of an IP-based node in ambient networks affects routing paths, and as a result, can have a significant impact on the operation and state management of QoS signaling protocols. In this paper, we first analyze the impact of mobility on QoS signaling protocols and how the protocols operate in mobility scenarios. We then propose an efficient mobility-aware QoS signaling protocol which can operate adaptively in ambient networks. The key features of the protocol include the fast discovery of a crossover node where the old and new paths converge or diverge due to handover and the localized state management for seamless services. Our analytical and simulation/experimental results show that the proposed/implemented protocol works better than existing protocols in the IP-based mobile environment.

  10. Self-reported use of internet by cervical cancer clients in two National Referral Hospitals in Kenya

    PubMed Central

    2012-01-01

    Background Cervical cancer remains a devastating disease in Kenya accounting for more than 2000 deaths each year. Lack of information on cervical cancer prevention and management has been attributed to the apathy among women in seeking health interventions. Use of internet-based and mobile e-health tools could increase information access among cervical cancer patients. The objective of the study was; to establish the extent of use of mobile phones and internet by cervical cancer patients in accessing information related to cancer treatment and management.; find out the characteristics of patients associated with internet use and identify barriers faced by the patients in internet use. A cross sectional descriptive survey of 199 cervical patients visiting the two main referral hospitals in Kenya was done. A structured questionnaire was used to collect data. Findings The average length of illness was 2.43 years (SD ± 3.0). Only 7.5 %( n=15) reported to having used the internet as a source of information. 92.5 %( n=184) did not use internet. With Multiple options, 70.9% did not know how to use a computer, 29.2% did not have access to a computer, 14.6% lacked the money to use computers at the local cyber cafe while other barriers identified accounted for 11.1%. Patients reported that the internet had an important role in the management of cancer of the cervix in health education (17.6%), online consultation (14.6%), booking of patients (13.6%), referrals (8.5%) and collecting data (7%). The 96.5% of the respondents who had access to a mobile phone, recommended mobile phones for health education messages (31.7%), reminder alerts for medication (29.7%) and booking appointments (21.6%). There was a statistically significant association between income of the patients and internet use (p = 0.026) in this study. Conclusions There is low level use of the internet by cervical cancer clients attended in Public referral facilities in Kenya. This was attributed to; lack of knowledge on how to use computers and lack of access to a computer. High level of access to mobile phones was reported. This is an indicator of great potential for use of mobile phones in the management of cervical cancer through short messaging services (sms), without internet connectivity. There is even greater potential to internet use through web access via mobile phones. PMID:23046538

  11. Optimising text messaging to improve adherence to web-based smoking cessation treatment: a randomised control trial protocol.

    PubMed

    Graham, Amanda L; Jacobs, Megan A; Cohn, Amy M; Cha, Sarah; Abroms, Lorien C; Papandonatos, George D; Whittaker, Robyn

    2016-03-30

    Millions of smokers use the Internet for smoking cessation assistance each year; however, most smokers engage minimally with even the best designed websites. The ubiquity of mobile devices and their effectiveness in promoting adherence in other areas of health behaviour change make them a promising tool to address adherence in Internet smoking cessation interventions. Text messaging is used by most adults, and messages can proactively encourage use of a web-based intervention. Text messaging can also be integrated with an Internet intervention to facilitate the use of core Internet intervention components. We identified four aspects of a text message intervention that may enhance its effectiveness in promoting adherence to a web-based smoking cessation programme: personalisation, integration, dynamic tailoring and message intensity. Phase I will use a two-level full factorial design to test the impact of these four experimental features on adherence to a web-based intervention. The primary outcome is a composite metric of adherence that incorporates general utilisation metrics (eg, logins, page views) and specific feature utilisation shown to predict abstinence. Participants will be N=860 adult smokers who register on an established Internet cessation programme and enrol in its text message programme. Phase II will be a two-arm randomised trial to compare the efficacy of the web-based cessation programme alone and in conjunction with the optimised text messaging intervention on 30-day point prevalence abstinence at 9 months. Phase II participants will be N=600 adult smokers who register to use an established Internet cessation programme and enrol in text messaging. Secondary analyses will explore whether adherence mediates the effect of treatment condition on outcome. This protocol was approved by Chesapeake IRB. We will disseminate study results through peer-reviewed manuscripts and conference presentations related to the methods and design, outcomes and exploratory analyses. NCT02585206. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  12. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    DTIC Science & Technology

    2014-06-01

    thanks to Tunisia’s modern communications infrastructure , pervasive Internet, and mobile phone network.”151 Although the use of information and...and physical space. Tunisia had a well-developed mobile phone and Internet infrastructure with nearly nine out of 10 Tunisians owning a mobile phone...OF TABLES Table 1. Top 20 countries of mobile phones per 100 people .........................................60 Table 2. Top 20 countries by number

  13. Using OpenSSH to secure mobile LAN network traffic

    NASA Astrophysics Data System (ADS)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  14. Progress on Broadband Access to the Internet and Use of Mobile Devices in the United States.

    PubMed

    Serrano, Katrina J; Thai, Chan L; Greenberg, Alexandra J; Blake, Kelly D; Moser, Richard P; Hesse, Bradford W

    Healthy People 2020 (HP2020) aims to improve population health outcomes through several objectives, including health communication and health information technology. We used 7 administrations of the Health Information National Trends Survey to examine HP2020 goals toward access to the Internet through broadband and mobile devices (N = 34 080). We conducted descriptive analyses and obtained predicted marginals, also known as model-adjusted risks, to estimate the association between demographic characteristics and use of mobile devices. The HP2020 target (7.7% of the US population) for accessing the Internet through a cellular network was surpassed in 2014 (59.7%), but the HP2020 target (83.2%) for broadband access fell short (63.8%). Sex and age were associated with accessing the Internet through a cellular network throughout the years (Wald F test, P <.05). The increase in the percentage of people accessing the Internet through mobile devices presents an opportunity for technology-based health interventions that should be explored.

  15. Progress on Broadband Access to the Internet and Use of Mobile Devices in the United States

    PubMed Central

    Thai, Chan L.; Greenberg, Alexandra J.; Blake, Kelly D.; Moser, Richard P.; Hesse, Bradford W.

    2016-01-01

    Healthy People 2020 (HP2020) aims to improve population health outcomes through several objectives, including health communication and health information technology. We used 7 administrations of the Health Information National Trends Survey to examine HP2020 goals toward access to the Internet through broadband and mobile devices (N = 34 080). We conducted descriptive analyses and obtained predicted marginals, also known as model-adjusted risks, to estimate the association between demographic characteristics and use of mobile devices. The HP2020 target (7.7% of the US population) for accessing the Internet through a cellular network was surpassed in 2014 (59.7%), but the HP2020 target (83.2%) for broadband access fell short (63.8%). Sex and age were associated with accessing the Internet through a cellular network throughout the years (Wald F test, P <.05). The increase in the percentage of people accessing the Internet through mobile devices presents an opportunity for technology-based health interventions that should be explored. PMID:28005473

  16. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-17

    ...The National Telecommunications and Information Administration (NTIA), on behalf of the U.S. Department of Commerce (Department), will hold a workshop on September 28, 2010, on the importance of the adoption and deployment of Internet Protocol version six (IPv6) addresses for industry, the U.S. Government, and the Internet economy.

  17. Harnessing context sensing to develop a mobile intervention for depression.

    PubMed

    Burns, Michelle Nicole; Begale, Mark; Duffecy, Jennifer; Gergle, Darren; Karr, Chris J; Giangrande, Emily; Mohr, David C

    2011-08-12

    Mobile phone sensors can be used to develop context-aware systems that automatically detect when patients require assistance. Mobile phones can also provide ecological momentary interventions that deliver tailored assistance during problematic situations. However, such approaches have not yet been used to treat major depressive disorder. The purpose of this study was to investigate the technical feasibility, functional reliability, and patient satisfaction with Mobilyze!, a mobile phone- and Internet-based intervention including ecological momentary intervention and context sensing. We developed a mobile phone application and supporting architecture, in which machine learning models (ie, learners) predicted patients' mood, emotions, cognitive/motivational states, activities, environmental context, and social context based on at least 38 concurrent phone sensor values (eg, global positioning system, ambient light, recent calls). The website included feedback graphs illustrating correlations between patients' self-reported states, as well as didactics and tools teaching patients behavioral activation concepts. Brief telephone calls and emails with a clinician were used to promote adherence. We enrolled 8 adults with major depressive disorder in a single-arm pilot study to receive Mobilyze! and complete clinical assessments for 8 weeks. Promising accuracy rates (60% to 91%) were achieved by learners predicting categorical contextual states (eg, location). For states rated on scales (eg, mood), predictive capability was poor. Participants were satisfied with the phone application and improved significantly on self-reported depressive symptoms (beta(week) = -.82, P < .001, per-protocol Cohen d = 3.43) and interview measures of depressive symptoms (beta(week) = -.81, P < .001, per-protocol Cohen d = 3.55). Participants also became less likely to meet criteria for major depressive disorder diagnosis (b(week) = -.65, P = .03, per-protocol remission rate = 85.71%). Comorbid anxiety symptoms also decreased (beta(week) = -.71, P < .001, per-protocol Cohen d = 2.58). Mobilyze! is a scalable, feasible intervention with preliminary evidence of efficacy. To our knowledge, it is the first ecological momentary intervention for unipolar depression, as well as one of the first attempts to use context sensing to identify mental health-related states. Several lessons learned regarding technical functionality, data mining, and software development process are discussed. Clinicaltrials.gov NCT01107041; http://clinicaltrials.gov/ct2/show/NCT01107041 (Archived by WebCite at http://www.webcitation.org/60CVjPH0n).

  18. Harnessing Context Sensing to Develop a Mobile Intervention for Depression

    PubMed Central

    Burns, Michelle Nicole; Begale, Mark; Duffecy, Jennifer; Gergle, Darren; Karr, Chris J; Giangrande, Emily

    2011-01-01

    Background Mobile phone sensors can be used to develop context-aware systems that automatically detect when patients require assistance. Mobile phones can also provide ecological momentary interventions that deliver tailored assistance during problematic situations. However, such approaches have not yet been used to treat major depressive disorder. Objective The purpose of this study was to investigate the technical feasibility, functional reliability, and patient satisfaction with Mobilyze!, a mobile phone- and Internet-based intervention including ecological momentary intervention and context sensing. Methods We developed a mobile phone application and supporting architecture, in which machine learning models (ie, learners) predicted patients’ mood, emotions, cognitive/motivational states, activities, environmental context, and social context based on at least 38 concurrent phone sensor values (eg, global positioning system, ambient light, recent calls). The website included feedback graphs illustrating correlations between patients’ self-reported states, as well as didactics and tools teaching patients behavioral activation concepts. Brief telephone calls and emails with a clinician were used to promote adherence. We enrolled 8 adults with major depressive disorder in a single-arm pilot study to receive Mobilyze! and complete clinical assessments for 8 weeks. Results Promising accuracy rates (60% to 91%) were achieved by learners predicting categorical contextual states (eg, location). For states rated on scales (eg, mood), predictive capability was poor. Participants were satisfied with the phone application and improved significantly on self-reported depressive symptoms (betaweek = –.82, P < .001, per-protocol Cohen d = 3.43) and interview measures of depressive symptoms (betaweek = –.81, P < .001, per-protocol Cohen d = 3.55). Participants also became less likely to meet criteria for major depressive disorder diagnosis (bweek = –.65, P = .03, per-protocol remission rate = 85.71%). Comorbid anxiety symptoms also decreased (betaweek = –.71, P < .001, per-protocol Cohen d = 2.58). Conclusions Mobilyze! is a scalable, feasible intervention with preliminary evidence of efficacy. To our knowledge, it is the first ecological momentary intervention for unipolar depression, as well as one of the first attempts to use context sensing to identify mental health-related states. Several lessons learned regarding technical functionality, data mining, and software development process are discussed. Trial Registration Clinicaltrials.gov NCT01107041; http://clinicaltrials.gov/ct2/show/NCT01107041 (Archived by WebCite at http://www.webcitation.org/60CVjPH0n) PMID:21840837

  19. Internet Tomography in Support of Internet and Network Simulation and Emulation Modelling

    NASA Astrophysics Data System (ADS)

    Moloisane, A.; Ganchev, I.; O'Droma, M.

    Internet performance measurement data extracted through Internet Tomography techniques and metrics and how it may be used to enhance the capacity of network simulation and emulation modelling is addressed in this paper. The advantages of network simulation and emulation as a means to aid design and develop the component networks, which make up the Internet and are fundamental to its ongoing evolution, are highlighted. The Internet's rapid growth has spurred development of new protocols and algorithms to meet changing operational requirements such as security, multicast delivery, mobile networking, policy management, and quality of service (QoS) support. Both the development and evaluation of these operational tools requires the answering of many design and operational questions. Creating the technical support required by network engineers and managers in their efforts to seek answers to these questions is in itself a major challenge. Within the Internet the number and range of services supported continues to grow exponentially, from legacy and client/server applications to VoIP, multimedia streaming services and interactive multimedia services. Services have their own distinctive requirements and idiosyncrasies. They respond differently to bandwidth limitations, latency and jitter problems. They generate different types of “conversations” between end-user terminals, back-end resources and middle-tier servers. To add to the complexity, each new or enhanced service introduced onto the network contends for available bandwidth with every other service. In an effort to ensure networking products and resources being designed and developed handling diverse conditions encountered in real Internet environments, network simulation and emulation modelling is a valuable tool, and becoming a critical element, in networking product and application design and development. The better these laboratory tools reflect real-world environment and conditions the more helpful to designers they will be.

  20. Innovative Leaders Take the Phone and Run: Profiles of Four Trailblazing Programs

    ERIC Educational Resources Information Center

    Norris, Cathleen; Soloway, Elliot; Menchhofer, Kyle; Bauman, Billie Diane; Dickerson, Mindy; Schad, Lenny; Tomko, Sue

    2010-01-01

    While the Internet changed everything, mobile will change everything squared. The Internet is just a roadway, and computers--the equivalent of cars for the Internet--have been expensive. The keepers of the information roadway--the telecommunication companies--will give one a "computer," such as cell phone, mobile learning device, or MLD,…

  1. 47 CFR 14.60 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... BY PEOPLE WITH DISABILITIES Internet Browsers Built Into Telephones Used With Public Mobile Services... mobile services (as such term is defined in 47 U.S.C. 710(b)(4)(B)) that includes an Internet browser in...

  2. 47 CFR 14.60 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... BY PEOPLE WITH DISABILITIES Internet Browsers Built Into Telephones Used With Public Mobile Services... mobile services (as such term is defined in 47 U.S.C. 710(b)(4)(B)) that includes an Internet browser in...

  3. Study of intelligent building system based on the internet of things

    NASA Astrophysics Data System (ADS)

    Wan, Liyong; Xu, Renbo

    2017-03-01

    In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.

  4. Malaysian University Students' Use of Mobile Phones for Study

    ERIC Educational Resources Information Center

    Pullen, Darren; J-F; Swabey, Karen; Abadooz, M.; Sing, Termit Kaur Ranjit

    2015-01-01

    Mobile technology coupled with Internet accessibility has increased not only how we communicate but also how we might engage in learning. The ubiquity of mobile technology, such as smart phones and tablet devices, makes it a valuable tool for accessing learning resources on the Internet. The unified theory of acceptance and use of technology…

  5. Distance Learning for Mobile Internet Users

    ERIC Educational Resources Information Center

    Necat, Beran

    2007-01-01

    This paper provides an overview on the current state of art in the field of Distance learning for mobile users. It mentions a large range of technologies, services and approaches that may be used to bring distance learning to mobile internet users. These technologies are supposed to considerably increase innovative e-learning solutions for the…

  6. Entanglement percolation on a quantum internet with scale-free and clustering characters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu Liang; Zhu Shiqun

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  7. Entanglement percolation on a quantum internet with scale-free and clustering characters

    NASA Astrophysics Data System (ADS)

    Wu, Liang; Zhu, Shiqun

    2011-11-01

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  8. An Analysis on the Correlation and Gender Difference between College Students' Internet Addiction and Mobile Phone Addiction in Taiwan

    PubMed Central

    Chiu, Su-Lin

    2013-01-01

    This study is aimed at constructing a correlative model between Internet addiction and mobile phone addiction; the aim is to analyse the correlation (if any) between the two traits and to discuss the influence confirming that the gender has difference on this fascinating topic; taking gender into account opens a new world of scientific study to us. The study collected 448 college students on an island as study subjects, with 61.2% males and 38.8% females. Moreover, this study issued Mobile Phone Addiction Scale and Internet Addiction Scale to conduct surveys on the participants and adopts the structural equation model (SEM) to process the collected data. According to the study result, (1) mobile phone addiction and Internet addiction are positively related; (2) female college students score higher than male ones in the aspect of mobile addiction. Lastly, this study proposes relevant suggestions to serve as a reference for schools, college students, and future studies based on the study results. PMID:25938115

  9. Optimization Techniques for 3D Graphics Deployment on Mobile Devices

    NASA Astrophysics Data System (ADS)

    Koskela, Timo; Vatjus-Anttila, Jarkko

    2015-03-01

    3D Internet technologies are becoming essential enablers in many application areas including games, education, collaboration, navigation and social networking. The use of 3D Internet applications with mobile devices provides location-independent access and richer use context, but also performance issues. Therefore, one of the important challenges facing 3D Internet applications is the deployment of 3D graphics on mobile devices. In this article, we present an extensive survey on optimization techniques for 3D graphics deployment on mobile devices and qualitatively analyze the applicability of each technique from the standpoints of visual quality, performance and energy consumption. The analysis focuses on optimization techniques related to data-driven 3D graphics deployment, because it supports off-line use, multi-user interaction, user-created 3D graphics and creation of arbitrary 3D graphics. The outcome of the analysis facilitates the development and deployment of 3D Internet applications on mobile devices and provides guidelines for future research.

  10. An Analysis on the Correlation and Gender Difference between College Students' Internet Addiction and Mobile Phone Addiction in Taiwan.

    PubMed

    Chiu, Shao-I; Hong, Fu-Yuan; Chiu, Su-Lin

    2013-01-01

    This study is aimed at constructing a correlative model between Internet addiction and mobile phone addiction; the aim is to analyse the correlation (if any) between the two traits and to discuss the influence confirming that the gender has difference on this fascinating topic; taking gender into account opens a new world of scientific study to us. The study collected 448 college students on an island as study subjects, with 61.2% males and 38.8% females. Moreover, this study issued Mobile Phone Addiction Scale and Internet Addiction Scale to conduct surveys on the participants and adopts the structural equation model (SEM) to process the collected data. According to the study result, (1) mobile phone addiction and Internet addiction are positively related; (2) female college students score higher than male ones in the aspect of mobile addiction. Lastly, this study proposes relevant suggestions to serve as a reference for schools, college students, and future studies based on the study results.

  11. OSI-compatible protocols for mobile-satellite communications: The AMSS experience

    NASA Technical Reports Server (NTRS)

    Moher, Michael

    1990-01-01

    The protocol structure of the international aeronautical mobile satellite service (AMSS) is reviewed with emphasis on those aspects of protocol performance, validation, and conformance which are peculiar to mobile services. This is in part an analysis of what can be learned from the AMSS experience with protocols which is relevant to the design of other mobile satellite data networks, e.g., land mobile.

  12. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    NASA Astrophysics Data System (ADS)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  13. Experience with Delay-Tolerant Networking from Orbit

    NASA Technical Reports Server (NTRS)

    Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.

    2010-01-01

    We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol

  14. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 6. 3439.701 Section 3439.701 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  15. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  16. Internet Cruising with the Internet Hunt.

    ERIC Educational Resources Information Center

    Gates, Rick

    1993-01-01

    Describes the Internet Hunt, a game designed to challenge and inform librarians about information sources available on the Internet. The use of telnet, and FTP (File Transfer Protocol) are described, and the results of the first Internet Hunt are provided. (EA)

  17. Citizen Scientist Contributions to Observations Benefiting the Earth through the GLOBE Program

    NASA Astrophysics Data System (ADS)

    Chambers, L. H.; Riebeek Kohl, H.; Murphy, A.; Butler, D. M.

    2017-12-01

    Citizen science has proliferated recently due to widespread use of the internet and mobile devices, but it has a long history (i.e., the Christmas Bird Count). Since the mid-1990s, the GLOBE Program has engaged participants at a global scale. Though initially focused on teachers and students in formal education settings, it quickly attracted interest from the public as well. In 2016, GLOBE formally launched an initiative to widely engage citizen scientists in its 117 countries through release of a mobile app called GLOBE Observer (GO). GO seeks to increase the number and distribution of participants by providing a simple, engaging - and fun - interface to collect and report data. Observations featured in the app are a carefully selected subset of 50+ GLOBE measurement protocols. They must leverage app features, require little to no equipment besides the mobile device, and have scientists or other stakeholders ready to use the data. The app is designed to minimize barriers to participation, but for those who want to do or know more GLOBE also offers on-line training to turn observers into community members with recognized certification in a protocol area. First released was a cloud observation protocol, supporting validation of a variety of Earth imaging sensors. Second was a mosquito habitat mapping protocol, poised to greatly increase the amount and distribution of local data to validate disease forecast models based on remotely sensed conditions, with additional focus on eliminating disease-carrying mosquito breeding sites. Next in development is a land cover protocol to obtain ground truth imagery for the Landsat science team. The app is also being leveraged for quick development of a short-term eclipse mini-app, to be used on August 21st only during the North American eclipse. This app is designed to make it easy for large numbers of people observing the eclipse, throughout North America, to take and record high time resolution observations of cloud cover and air temperature through the phases of the eclipse. This presentation will review GLOBE's history in citizen science and highlight recent contributions to understanding our planet.

  18. Internet and Mobile Phone Text Messaging Intervention for College Smokers

    ERIC Educational Resources Information Center

    Riley, William; Obermayer, Jami; Jean-Mary, Jersino

    2008-01-01

    Objective: The authors developed a smoking cessation program using mobile phone text messaging to provide tailored and stage-specific messages to college smokers. Participants and Methods: The authors recruited 31 daily smokers who desired to quit from a college campus and asked them to use an Internet and mobile phone text messaging program to…

  19. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  20. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  1. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  2. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  3. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  4. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  5. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  6. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.

    PubMed

    Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan

    2015-09-22

    Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.

  7. The digital divide: Trends in global mobile and broadband Internet access from 2000–2010

    PubMed Central

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services. PMID:24199118

  8. High mobile phone ownership, but low internet and email usage among pregnant, HIV-infected women attending antenatal care in Johannesburg

    PubMed Central

    Clouse, Kate; Schwartz, Sheree R.; Van Rie, Annelies; Bassett, Jean; Vermund, Sten H.; Pettifor, Audrey E.

    2016-01-01

    Summary We investigated mobile phone usage amongst HIV-positive pregnant women attending antenatal services in a primary care clinic in Johannesburg (n=50). We conducted a semi-structured interview and asked them about their mobile phone, Internet and email use. The median age of the women was 28 years, 36% had moved one or more times in the past year, and most were employed or recently employed, albeit earning low wages. Nearly all women (94%) reported that they did not share their phone and 76% of the SIM cards were registered to the woman herself. The median time with the current phone was one year (range 1 month–6 years) and the median time with the current phone number was three years (range 1 month–13 years). Even though 42% of the participants were from outside South Africa, they all had mobile phone numbers local to South Africa. About one-third of respondents reported Internet use (30%) and about one-fifth reported using email (18%). Overall, 20% accessed the Internet and 10% accessed email on their mobile phone. Mobile phone interventions are feasible amongst HIV-positive pregnant women and may be useful in prevention of mother-to-child transmission of HIV (PMTCT). Email and Internet-based interventions may not yet be appropriate. PMID:25586808

  9. High mobile phone ownership, but low Internet and email usage among pregnant, HIV-infected women attending antenatal care in Johannesburg.

    PubMed

    Clouse, Kate; Schwartz, Sheree R; Van Rie, Annelies; Bassett, Jean; Vermund, Sten H; Pettifor, Audrey E

    2015-03-01

    We investigated mobile phone usage amongst HIV-positive pregnant women attending antenatal services in a primary care clinic in Johannesburg (n = 50). We conducted a semi-structured interview and asked them about their mobile phone, Internet and email use. The median age of the women was 28 years, 36% had moved one or more times in the past year, and most were employed or recently employed, albeit earning low wages. Nearly all women (94%) reported that they did not share their phone and 76% of the SIM cards were registered to the woman herself. The median time with the current phone was one year (range 1 month-6 years) and the median time with the current phone number was three years (range 1 month-13 years). Even though 42% of the participants were from outside South Africa, they all had mobile phone numbers local to South Africa. About one-third of respondents reported Internet use (30%) and about one-fifth reported using email (18%). Overall, 20% accessed the Internet and 10% accessed email on their mobile phone. Mobile phone interventions are feasible amongst HIV-positive pregnant women and may be useful in prevention of mother-to-child transmission of HIV (PMTCT). Email and Internet-based interventions may not yet be appropriate. © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  10. Design and development of an IoT-based web application for an intelligent remote SCADA system

    NASA Astrophysics Data System (ADS)

    Kao, Kuang-Chi; Chieng, Wei-Hua; Jeng, Shyr-Long

    2018-03-01

    This paper presents a design of an intelligent remote electrical power supervisory control and data acquisition (SCADA) system based on the Internet of Things (IoT), with Internet Information Services (IIS) for setting up web servers, an ASP.NET model-view- controller (MVC) for establishing a remote electrical power monitoring and control system by using responsive web design (RWD), and a Microsoft SQL Server as the database. With the web browser connected to the Internet, the sensing data is sent to the client by using the TCP/IP protocol, which supports mobile devices with different screen sizes. The users can provide instructions immediately without being present to check the conditions, which considerably reduces labor and time costs. The developed system incorporates a remote measuring function by using a wireless sensor network and utilizes a visual interface to make the human-machine interface (HMI) more instinctive. Moreover, it contains an analog input/output and a basic digital input/output that can be applied to a motor driver and an inverter for integration with a remote SCADA system based on IoT, and thus achieve efficient power management.

  11. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    PubMed

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  12. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    PubMed Central

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-01-01

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched. PMID:27455265

  13. vMon-mobile provides wireless connection to the electronic patient record

    NASA Astrophysics Data System (ADS)

    Oliveira, Pedro P., Jr.; Rebelo, Marina; Pilon, Paulo E.; Gutierrez, Marco A.; Tachinardi, Umberto

    2002-05-01

    This work presents the development of a set of tools to help doctors to continuously monitor critical patients. Real-time monitoring signals are displayed via a Web Based Electronic Patient Record (Web-EPR) developed at the Heart Institute. Any computer on the Hospital's Intranet can access the Web-EPR that will open a browser plug-in called vMon. Recently vMon was adapted to wireless mobile devices providing the same real-time visualization of vital signals of its desktop counterpart. The monitoring network communicates with the hospital network through a gateway using HL7 messages and has the ability to export waveforms in real time using the multicast protocol through an API library. A dedicated ActiveX component was built that establishes the streaming of the biomedical signals under monitoring and displays them on an Internet Explorer 5.x browser. The mobile version - called vMon-mobile - will parse the browser window and deliver it to a PDA device connected to a local area network. The result is a virtual monitor presenting real-time data on a mobile device. All parameters and signals acquired from the moment the patient is connected to the monitors are stored for a few days. The most clinically relevant information is added to patient's EPR.

  14. Treatment Considerations in Internet and Video Game Addiction: A Qualitative Discussion.

    PubMed

    Greenfield, David N

    2018-04-01

    Internet and video game addiction has been a steadily developing consequence of modern living. Behavioral and process addictions and particularly Internet and video game addiction require specialized treatment protocols and techniques. Recent advances in addiction medicine have improved our understanding of the neurobiology of substance and behavioral addictions. Novel research has expanded the ways we understand and apply well-established addiction treatments as well as newer therapies specific to Internet and video game addiction. This article reviews the etiology, psychology, and neurobiology of Internet and video game addiction and presents treatment strategies and protocols for addressing this growing problem. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  16. A mobile telephone-based SMS and internet survey system for self-assessment in Australian anaesthesia: experience of a single practitioner.

    PubMed

    Belavy, D

    2014-11-01

    Self-assessment and audit in anaesthesia require a systematic approach to postoperative data collection. The increasing prevalence of mobile internet technology offers a new data collection method for anaesthetists. In this paper, a system for mobile internet data collection is described and the preliminary experience with its use is presented. The system was developed by the author and combined an open source survey application and a short message service (SMS) gateway to send SMS messages to patients after their anaesthesia and surgery. The messages requested patients to complete an online Quality of Recovery survey questionnaire if they had a smartphone. The results were immediately available. A preliminary survey of consenting patients with available mobile telephone numbers in a private practice was undertaken by the author. A total of 123 procedures were eligible for follow-up and survey requests were sent to 94 patients. Sixty-five surveys were completed. This represents 69% of surveys requested, demonstrating that mobile phone technology can be used to provide significant amounts of data for quality assurance. However, the implementation of a mobile internet data collection system requires consideration of privacy principles, security and ethical handling of data.

  17. A study on agent-based secure scheme for electronic medical record system.

    PubMed

    Chen, Tzer-Long; Chung, Yu-Fang; Lin, Frank Y S

    2012-06-01

    Patient records, including doctors' diagnoses of diseases, trace of treatments and patients' conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient's conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since electronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients' complete information through the Internet access to electronic patient records as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and automatically disperse arithmetic processes, and moves from one host to another in heterogeneous network systems with the characteristics of autonomy and mobility, decreasing network traffic, reducing transfer lag, encapsulating protocol, availability on heterogeneous platforms, fault-tolerance, high flexibility, and personalization. However, since a Mobile Agent contacts and exchanges information with other hosts or agents on the Internet for rapid exchange and access to medical information, the security is threatened. In order to solve the problem, this study proposes a key management scheme based on Lagrange interpolation formulas and hierarchical management structure to make Mobile Agents a more secure and efficient access control scheme for electronic patient record systems when applied to the access of patients' personal electronic patient records cross hospitals. Meanwhile, with the comparison of security and efficacy analyses being the feasibility of validation scheme and the basis of better efficiency, the security of Mobile Agents in the process of operation can be guaranteed, key management efficacy can be advanced, and the security of the Mobile Agent system can be protected.

  18. Intranets: Just Another Bandwagon?

    ERIC Educational Resources Information Center

    Lynch, Gary

    1997-01-01

    Discusses intranets--the deployment and use of Internet technologies such as the World Wide Web, electronic mail, and Transmission Control Protocol/Internet Protocol (TCP/IP) on a closed network. Considers the "hype," benefits, standards, implementation, and problems of intranets, and concludes that while intranets can be beneficial,…

  19. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deploymentmore » begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.« less

  20. Realtime Gas Emission Monitoring at Hazardous Sites Using a Distributed Point-Source Sensing Infrastructure.

    PubMed

    Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco

    2016-01-20

    This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant's critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events.

  1. Research and application of mobile teaching platform

    NASA Astrophysics Data System (ADS)

    Yang, Ping; Xue, Hongjiao

    2017-08-01

    The application of mobile technology in university digital campus is ripe. This article mainly introduced the necessity of teaching platform based on mobile Internet in the teaching of higher vocational education, and the key to the construction of the feasibility of mobile learning platform, which is a feasible and effective teaching model under the new situation, worthy of promotion. The design and application of teaching platform based on mobile Internet is the change of educational ideas and working methods, and is the new starting point of Higher Vocational education.

  2. The Interplanetary Internet: A Communications Infrastructure for Mars Exploration

    NASA Astrophysics Data System (ADS)

    Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.

    2002-01-01

    A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the current set of standard CCSDS data communications protocols can be incrementally evolved so that true InterPlaNetary Internet operations are feasible by the end of the decade. The strategy - which is already in progress via the deployment of Mars relay links - needs individual missions to each contribute increments of capability so that a standard communications infrastructure can rapidly accrete. This paper will describe the IPN architectural concepts, discuss the current set of standard data communications capabilities that exist to support Mars exploration and review the proposed new developments. We will also postulate that the concept is scalable and can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog among planets is routine. 1 2 3 4 5

  3. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Nichols, Kelvin; Bradford, Robert

    2003-01-01

    This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.

  4. Seeking sex partners through the internet and mobile phone applications among men who have sex with men in Taiwan.

    PubMed

    Ko, Nai-Ying; Tseng, Po-Chia; Huang, Yu-Chao; Chen, Yen-Chin; Hsu, Su-Ting

    2016-07-01

    It has become popular for men who have sex with men (MSM) to use mobile-phone geosocial networking applications (mobile apps) to find sex partners. A cross-sectional online survey was conducted in Taiwan to compare the sexual and substance-use behaviors of MSM seeking sex partners through the internet and mobile apps. Of the 1060 participants, 65.8% used the internet via computer and 37.7% used a mobile app to find sexual partners, while 30.3% used recreational drugs or alcohol in the previous 6 months. MSM who exclusively used mobile apps to seek sex partners were significantly more likely than MSM seeking sex via computer to be older, to have used recreational drugs or alcohol, and to have sex with HIV-positive partners. Additionally, using mobile apps to seek sex partners was significantly associated with having sex with online partners through either mobile apps or computer-based internet use (adjusted odds ratio (AOR), 7.12 [3.87-13.11]), self-reporting as HIV-positive (AOR, 2.24 [1.12-4.12]), using recreational drugs (AOR, 1.67 [1.21-2.32]), having disclosed HIV status to sexual partners (AOR, 1.44 [1.03-2.02]), and having sex with HIV-positive partners (AOR, 1.81 [1.06-3.10]). In conclusion, the mobile apps may serve as a feasible platform for HIV-positive MSM to find other HIV-positive partners.

  5. Components of Effective Cognitive-Behavioral Therapy for Pediatric Headache: A Mixed Methods Approach

    PubMed Central

    Law, Emily F.; Beals-Erickson, Sarah E.; Fisher, Emma; Lang, Emily A.; Palermo, Tonya M.

    2017-01-01

    Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache. PMID:29503787

  6. Components of Effective Cognitive-Behavioral Therapy for Pediatric Headache: A Mixed Methods Approach.

    PubMed

    Law, Emily F; Beals-Erickson, Sarah E; Fisher, Emma; Lang, Emily A; Palermo, Tonya M

    2017-01-01

    Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache.

  7. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  8. An Educators' Guide to Information Access across the Internet.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1994-01-01

    A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…

  9. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...

  10. Internet for Library Media Specialists.

    ERIC Educational Resources Information Center

    Simpson, Carol Mann

    This guide introduces the library media specialist to the Internet, its history and features, and provides information on specific uses of the Internet in school libraries and specific areas. Section 1, "What is the Internet?" introduces the reader to the Internet; electronic mail; telnet; file transfer protocol (FTP); wide area…

  11. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things

    PubMed Central

    Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan

    2015-01-01

    Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683

  12. Telemedicine using free voice over internet protocol (VoIP) technology.

    PubMed

    Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H

    2011-01-01

    Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.

  13. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... voice over Internet Protocol (VoIP) service provider and each provider of non- interconnected VoIP... directs that within one year after the date of enactment of the CVAA, such VoIP providers shall... Fund (TRS Fund) by non-interconnected Voice over Internet Protocol (VoIP) service providers with...

  14. The Historian and Electronic Research: File Transfer Protocol (FTP).

    ERIC Educational Resources Information Center

    McCarthy, Michael J.

    1993-01-01

    Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)

  15. 78 FR 76097 - Request for Comment on Petition Filed by Sprint Corporation for Reconsideration of Certain Rules...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-16

    ... for Internet Protocol Captioned Telephone Service AGENCY: Federal Communications Commission. ACTION... Internet Protocol Captioned Telephone Service (IP CTS) in the IP CTS Reform Order. The Commission seeks... from the Interstate Telecommunications Relay Service Fund (TRS Fund) for minutes of use generated by...

  16. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...

  17. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...

  18. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...

  19. 77 FR 46632 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-06

    ... video programming and apparatus closed captioning requirements. This notice is consistent with the Order... Delivered Using Internet Protocol, and Apparatus Closed Caption Requirements. Form Number: N/A. Respondents... rules governing the closed captioning capabilities of certain apparatus on which consumers view video...

  20. Internet Resources on Aging: Parts of the Internet.

    ERIC Educational Resources Information Center

    Post, Joyce A.

    1996-01-01

    Provides a brief history of the Internet and a listing of various resources on aging that can be obtained through the Internet. Components of the Internet discussed are electronic-mail applications (listservs, USENET Newsgroups, Bulletin Board Systems, Freenets, and Commercial Services); File Transfer Protocol; Telnet/Remote Login; Gophers; Wide…

  1. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  2. Truth in Reform: Reversing Fifty Years of Information Suppression in Burma

    DTIC Science & Technology

    2014-10-30

    suit with a broader offering that includes next generation 3G services and legacy 2G services that are more affordable to most Burmese citizens. 46...with the same effect during the 2007 Saffron Revolution, when citizen journalists used grainy mobile phone video, Burmese Internet cafes, and web...Internet controls were not technically sophisticated, the government quickly resorted to a complete block on mobile and Internet access during the 2007

  3. DARPA DTN Phase 3 Core Engineering Support

    NASA Technical Reports Server (NTRS)

    Torgerson, J. Leigh; Richard Borgen, Richard; McKelvey, James; Segui, John; Tsao, Phil

    2010-01-01

    This report covers the initial DARPA DTN Phase 3 activities as JPL provided Core Engineering Support to the DARPA DTN Program, and then further details the culmination of the Phase 3 Program with a systematic development, integration and test of a disruption-tolerant C2 Situation Awareness (SA) system that may be transitioned to the USMC and deployed in the near future. The system developed and tested was a SPAWAR/JPL-Developed Common Operating Picture Fusion Tool called the Software Interoperability Environment (SIE), running over Disruption Tolerant Networking (DTN) protocols provided by BBN and MITRE, which effectively extends the operational range of SIE from normal fully-connected internet environments to the mobile tactical edges of the battlefield network.

  4. An Intelligent Remote Monitoring System for Total Knee Arthroplasty Patients.

    PubMed

    Msayib, Yunus; Gaydecki, Patrick; Callaghan, Michael; Dale, Nicola; Ismail, Sheheera

    2017-06-01

    For the first six weeks following total knee arthroplasty (TKA), a patient will attend an outpatient clinic typically seen twice weekly. Here, an exercise regime is performed and improvement assessed using a hand held goniometer that measures the maximum angle of knee flexion, an important metric of progress. Additionally a series of daily exercises is performed at home, recorded in a diary. This protocol has problems. Patients must attend the hospital with assistance since they are not permitted to drive for six weeks following the procedure; appointments are sometimes missed; there are occasionally not enough physiotherapy appointment available; furthermore, it is difficult to be sure that patients are compliant with their exercises at home. The economic and social costs are therefore significant both to the patient and the health service. We describe here an automatic system that performs the monitoring of knee flexion within a domestic environment rather than in a hospital setting. It comprises a master and slave sensor unit that attach using Velcro straps to the thigh and shin above and below the operation wound. The patient performs the prescribed knee exercises whilst wearing the device, during which time it measures and records the angles of knee flexion. The device utilises the Global System for Mobile Communications (GSM) infrastructure to transmit data through the Internet to a secure hospital-based server using an on-board GSM modem. The clinician is then able to view and interpret the information from any computer with internet access and the software. The system does not require the patient to possess a mobile telephone, a computer, or have internet access; the necessary communications technology is completely integrated into the device.

  5. Technology Use and Sleep Quality in Preadolescence and Adolescence.

    PubMed

    Bruni, Oliviero; Sette, Stefania; Fontanesi, Lilybeth; Baiocco, Roberto; Laghi, Fiorenzo; Baumgartner, Emma

    2015-12-15

    The purpose of this study was to analyze differences between preadolescents and adolescents on the use of technology and to test the contribution of using Internet and mobile phone, and circadian preference on sleep quality. We recruited a sample of 850 (364 males) preadolescents and adolescents. Self-report questionnaires about sleep schedule, sleep wake behavior problems, circadian preferences, and the use of technology (e.g., Internet and mobile phone) were administered. Students were asked to fill out the School Sleep Habits Survey, a self-report questionnaire on the use of technology, the Mobile Phone Involvement Questionnaire (MPIQ), and the Shorter Promis Questionnaire (SPQ). Adolescents reported more sleep problems, a tendency toward eveningness, and an increase of Internet and phone activities, as well as social network activities, while preadolescents were more involved in gaming console and television viewing. The regression analysis performed separately in the two age groups showed that sleep quality was affected by the circadian preference (eveningness) in both groups. Adolescents' bad sleep quality was consistently associated with the mobile phone use and number of devices in the bedroom, while in preadolescents, with Internet use and turning-off time. The evening circadian preference, mobile phone and Internet use, numbers of other activities after 21:00, late turning off time, and number of devices in the bedroom have different negative influence on sleep quality in preadolescents and adolescents. © 2015 American Academy of Sleep Medicine.

  6. An Internet Primer for Community College Administrators.

    ERIC Educational Resources Information Center

    Brumbaugh, Kenneth E.; McRae, Mary S.

    1995-01-01

    Provides information designed to assist administrators in utilizing the advanced information technologies available on the Internet. Describes the uses of such elements of the Internet as "e-mail,""ftp (file transfer protocol),""gopher," and "telnet." Indicates that administrators can use the internet to…

  7. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  8. High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications

    NASA Technical Reports Server (NTRS)

    Callahan, John; Montgomery, Todd; Whetten, Brian

    1997-01-01

    Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.

  9. Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.

    ERIC Educational Resources Information Center

    McCulley, P. Michael

    1995-01-01

    Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…

  10. Why You Should Establish a Connection to the Internet.

    ERIC Educational Resources Information Center

    Hill, Judy A.; Misic, Mark M.

    1996-01-01

    Provides the rationale for establishing a connection to the Internet. Describes Internet services, including e-mail, telnet, file transfer protocol (FTP), USENET, gopher, Archie, and World Wide Web. Identifies reasons why the Internet is a valuable tool. Outlines steps for establishing a connection and discusses the future of the Internet. A…

  11. On the Effective Evaluation of TCP

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Falk, Aaron

    2000-01-01

    Understanding the performance of the Internet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the Internet today. Various testing methods exist to evaluate TCP performance, however all have pitfalls an that need to be understood prior to obtaining useful results. Simulating TCP is difficult because of the wide range of variables, environments, and implementations available. Testing TCP modifications in the global Internet may not be the answer either: testing new protocols on real networks endangers other people's traffic and, if not done correctly, may also yield inaccurate or misleading results. In order for TCP research to be independently evaluated in the Internet research community there is a set of questions that researchers should try to answer. This paper attempts to list some of those questions and make recommendations as to how TCP testing can be structured to be provide useful answers.

  12. Corps Operations

    DTIC Science & Technology

    2010-11-26

    accomplishes these actions by developing, recommending, and briefing the scheme of fires, including both lethal fires and nonlethal actions (electronic...Install and operate the corps information technology help desk. Provide voice, video teleconference, e-mail—Non-Secure Internet Protocol Router...Network (NIPRNET), SECRET Internet Protocol Router Network (SIPRNET), and other communication networks—assistance, and other help desk functions

  13. Deployment of the Space Internet on a Spacecraft: Hosting CFDP and/or DTN Protocol Engines and the Resulting Resource Utilization

    NASA Astrophysics Data System (ADS)

    Foswell, Stuart D.; McLaren, David; Paramanatham, Daran; Taylor, Chris; Stanton, Dai; Farrell, Stephen

    2012-08-01

    This paper describes the outcome of analysis and simulation of how to deploy CFDP and DTN protocol engines onboard a spacecraft, so as to support the Space Internet, and the resulting spacecraft resource utilisation, under an ESA TRP contract [1].

  14. 47 CFR 12.3 - 911 and E911 analyses and reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... wireless 911 rules set forth in § 20.18 of this chapter; and interconnected Voice over Internet Protocol... Public Safety and Homeland Security Bureau (PSHSB) has the delegated authority to implement and activate... generation Internet Protocol-based E911 platform. (b) These reports are due 120 days from the date that the...

  15. 78 FR 55696 - Request for Comment on Petition Filed by Purple Communications, Inc. Regarding the Provision of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Commission's VRS Reform Order regarding the use of Internet Protocol Captioned Telephone Service (IP CTS... requested clarification would force Purple and other IP CTS providers to cease the provision of IP CTS using... of Internet Protocol Captioned Telephone Service (IP CTS) through Web or wireless technologies...

  16. Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6

    ERIC Educational Resources Information Center

    Pazdrowski, Tomasz

    2013-01-01

    Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…

  17. 78 FR 39619 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... covered apparatus may convey from the source device to the consumer equipment the information necessary to... using Internet protocol (``IP'') and apparatus used by consumers to view video programming. The action...-delivered video programming and rules governing the closed captioning capabilities of certain apparatus on...

  18. Very High-Speed Report File System

    DTIC Science & Technology

    1992-12-15

    1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol

  19. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    PubMed Central

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-01-01

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead. PMID:27213384

  20. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    PubMed

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  1. Finding orthopedic patients lost to follow-up for long-term outcomes research using the Internet: an update for 2012.

    PubMed

    Louie, Dexter L; Earp, Brandon E; Blazar, Philip E

    2012-07-01

    The Internet is available to researchers as a tool for studying long-term outcomes, but no recent research exists on how to best use it. The authors hypothesize that using the Internet can be at least 75% effective in locating patients lost to follow-up. With Institutional Review Board approval, the authors searched for 66 patients lost to follow-up after a period of 10 years or more with no contact. They tested an Internet searching protocol developed in 2004 and developed an alternate protocol. In all, 74% (49/66) of patients were located. Copyright 2012, SLACK Incorporated.

  2. [PROtocol-based MObilizaTION on intensive care units : Design of a cluster randomized pilot study].

    PubMed

    Nydahl, P; Diers, A; Günther, U; Haastert, B; Hesse, S; Kerschensteiner, C; Klarmann, S; Köpke, S

    2017-10-12

    Despite convincing evidence for early mobilization of patients on intensive care units (ICU), implementation in practice is limited. Protocols for early mobilization, including in- and exclusion criteria, assessments, safety criteria, and step schemes may increase the rate of implementation and mobilization. Patients (population) on ICUs with a protocol for early mobilization (intervention), compared to patients on ICUs without protocol (control), will be more frequently mobilized (outcome). A multicenter, stepped-wedge, cluster-randomized pilot study is presented. Five ICUs will receive an adapted, interprofessional protocol for early mobilization in randomized order. Before and after implementation, mobilization of ICU patients will be evaluated by randomized monthly one-day point prevalence surveys. Primary outcome is the percentage of patients mobilized out of bed, operationalized as a score of ≥3 on the ICU Mobility Scale. Secondary outcome parameters will be presence and/or length of mechanical ventilation, delirium, stay on ICU and in hospital, barriers to early mobilization, adverse events, and process parameters as identified barriers, used strategies, and adaptions to local conditions. Exploratory evaluation of study feasibility and estimation of effect sizes as the basis for a future explanatory study.

  3. The Potential of Using a Mobile Phone to Access the Internet for Learning EFL Listening Skills within a Korean Context

    ERIC Educational Resources Information Center

    Nah, Ki Chune; White, Peter; Sussex, Roland

    2008-01-01

    Interest in the use of a mobile phone to access the Internet for learning English in general, and listening skills in particular, has been increasing in Korea over the last few years. However, there has been only a small number of studies on this topic in Korea. The present paper investigates the potential of using a mobile phone to browse…

  4. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    PubMed

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  5. Real-Time Multimedia on the Internet: What Will It Take?

    ERIC Educational Resources Information Center

    Sodergren, Mike

    1998-01-01

    Considers the requirements for real-time, interactive multimedia over the Internet. Topics include demand for interactivity; new pricing models for Internet service; knowledgeable suppliers; consumer education on standards; enhanced infrastructure, including bandwidth; and new technology, including RSVP, and end-to-end Internet-working protocol.…

  6. How To: Be VoIP-Savvy

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2005-01-01

    Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…

  7. Incentive Mechanisms for Mobile Music Distribution

    NASA Astrophysics Data System (ADS)

    Furini, Marco; Montangero, Manuela

    The mobile digital world is seen as an important business opportunity for two main reasons: the widespread usage of cellphones (more than two billions [30], most of them with sound features) and the pervasiveness of mobile technologies. As a result, music industry and telecoms are bringing the successful Internet-based music market strategy into the mobile scenario: record labels are setting up agreements with cellphone network providers (Sprint, Verizon, Vodafone, Orange just to name a few) to offer a download music service also in the mobile scenario. The strategy is to use wireless channels to distribute music contents in the attempt of replicating the success of the Internet-based download scenario.

  8. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ... facilities as broadband Internet access service (commonly called ``managed'' or ``specialized'' services). The second is the application of open Internet rules to mobile wireless Internet access services... Framework for Broadband Access to the Internet Over Wireline Facilities et al., CC Docket Nos. 02-33, 01-337...

  9. Truck Drivers' Use of the Internet: A Mobile Health Lifeline.

    PubMed

    Heaton, Karen; Combs, Bryan; Griffin, Russell

    2017-06-01

    Because of their social isolation, irregular and unpredictable schedules, limited access to health care, and long periods of travel, long-haul truckers may benefit from the use of mobile health applications on Internet-capable devices. The purpose of this study was to determine Internet access and usage among a sample of long-haul truck drivers. In this cross-sectional study, truck drivers completed a pencil and paper survey with questions on demographics, work and health histories, and Internet access and usage for both personal and job reasons. A total of 106 truck drivers were recruited from trucking industry trade shows, by word of mouth, and directly from trucking companies. Overall, the truck drivers' use of the Internet was limited. Their usage for personal and job-related reasons differed. Social connectivity and access to health and wellness information were important during personal usage time. Job-related Internet use was highly practical, and applied to seeking information for directions and maps, fuel stops and pricing, and communicating with employers or transmitting documents. Age and experience were associated with Internet use. Younger, less-experienced drivers used the Internet more than older, experienced drivers. Targeted mobile health messaging may be a useful tool to inform truck drivers of health conditions and plans, and may provide links to primary care providers needing to monitor or notify drivers of diagnostic results or treatment plans.

  10. Problematic Use of the Internet and Smartphones in University Students: 2006-2017.

    PubMed

    Carbonell, Xavier; Chamarro, Andrés; Oberst, Ursula; Rodrigo, Beatriz; Prades, Mariona

    2018-03-08

    It has been more than a decade since a concern about the addictive use of the Internet and mobile phones was first expressed, and its possible inclusion into the lists of mental disorders has recently become a popular topic of scientific discussion. Thus, it seems to be a fitting moment to investigate the prevalence of this issue over time. The aim of the present study was to analyze the prevalence of the perception of problematic Internet and smartphone use in young people over the period 2006-2017. To this end, a questionnaire on Internet use habits and two questionnaires on the negative consequences of Internet and smartphone use were administered to a sample of 792 university students. The scores were then compared with the results of former studies that had used these questionnaires. The perception of problematic Internet and mobile phone use has increased over the last decade, social networks are considered responsible for this increase, and females are perceived to be more affected than males. The current study shows how strong smartphone and Internet addiction and social media overlap. Participants from 2017 report higher negative consequences of both Internet and mobile phone use than those from 2006, but long-term observations show a decrease in problematic use after a sharp increase in 2013. We conclude that the diagnosis of technological addictions is influenced by both time and social and culture changes.

  11. Use of Mobile Phones, Computers and Internet Among Clients of an Inner-City Community Psychiatric Clinic

    PubMed Central

    COLDER CARRAS, MICHELLE; MOJTABAI, RAMIN; FURR-HOLDEN, C. DEBRA; EATON, WILLIAM; CULLEN, BERNADETTE A.M.

    2017-01-01

    Objective Recent years have witnessed an expansion of Internet- and mobile-phone-based interventions for health promotion, yet few studies have focused on the use of technology by individuals with mental illness. This study examined the extent to which patients at an inner-city community psychiatry clinic had access to information and communications technology (ICT) and how they used those resources. Methods Patients of an outpatient, inner-city community psychiatry program (N = 189) completed a survey that included questions about demographics and ICT use which were adapted from an existing local population-based health survey (community sample, N = 968). Frequencies of ICT use were assessed for the clinic sample and questions common to both the surveys completed by the clinic and community samples were compared using logistic regression. Results Among clinic cases, 105 (55.6%) reported owning or using a computer, 162 (85.7%) reported owning or using a mobile phone, and 112 (59.3%) reported using the Internet. Among those who used mobile phones, the majority reported using them daily; 42% of those who used the Internet reported using it several times per day. Differences in frequency of Internet use between samples were not significant, but clinic participants used the Internet more intensively to email, instant message, access health information, and use social media sites. Conclusions A majority of patients in this community psychiatry clinic sample use ICT. Greater access to and use of the Internet by those with mental illness has important implications for the feasibility and impact of technology-based interventions. PMID:24638044

  12. Use of mobile phones, computers and internet among clients of an inner-city community psychiatric clinic.

    PubMed

    Colder Carras, Michelle; Mojtabai, Ramin; Furr-Holden, C Debra; Eaton, William; Cullen, Bernadette A M

    2014-03-01

    Recent years have witnessed an expansion of Internet- and mobile-phone-based interventions for health promotion, yet few studies have focused on the use of technology by individuals with mental illness. This study examined the extent to which patients at an inner-city community psychiatry clinic had access to information and communications technology (ICT) and how they used those resources. Patients of an outpatient, inner-city community psychiatry program (N=189) completed a survey that included questions about demographics and ICT use which were adapted from an existing local population-based health survey (community sample, N=968). Frequencies of ICT use were assessed for the clinic sample and questions common to both the surveys completed by the clinic and community samples were compared using logistic regression. Among clinic cases, 105 (55.6%) reported owning or using a computer, 162 (85.7%) reported owning or using a mobile phone, and 112 (59.3%) reportedf using the Internet. Among those who used mobile phones, the majority reported using them daily; 42% of those who used the Internet reported using it several times per day. Differences in frequency of Internet use between samples were not significant, but clinic participants used the Internet more intensively to email, instant message, access health information, and use social media sites. A majority of patients in this community psychiatry clinic sample use ICT. Greater access to and use of the Internet by those with mental illness has important implications for the feasibility and impact of technology-based interventions.

  13. Teaching and Learning Foreign Languages via System of "Voice over Internet Protocol" and Language Interactions Case Study: Skype

    ERIC Educational Resources Information Center

    Wahid, Wazira Ali Abdul; Ahmed, Eqbal Sulaiman; Wahid, Muntaha Ali Abdul

    2015-01-01

    This issue expresses a research study based on the online interactions of English teaching specially conversation through utilizing VOIP (Voice over Internet Protocol) and cosmopolitan online theme. Data has been achieved by interviews. Simplifiers indicate how oral tasks require to be planned upon to facilitate engagement models propitious to…

  14. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  15. Predicting hospital visits from geo-tagged Internet search logs.

    PubMed

    Agarwal, Vibhu; Han, Lichy; Madan, Isaac; Saluja, Shaurya; Shidham, Aaditya; Shah, Nigam H

    2016-01-01

    The steady rise in healthcare costs has deprived over 45 million Americans of healthcare services (1, 2) and has encouraged healthcare providers to look for opportunities to improve their operational efficiency. Prior studies have shown that evidence of healthcare seeking intent in Internet searches correlates well with healthcare resource utilization. Given the ubiquitous nature of mobile Internet search, we hypothesized that analyzing geo-tagged mobile search logs could enable us to machine-learn predictors of future patient visits. Using a de-identified dataset of geo-tagged mobile Internet search logs, we mined text and location patterns that are predictors of healthcare resource utilization and built statistical models that predict the probability of a user's future visit to a medical facility. Our efforts will enable the development of innovative methods for modeling and optimizing the use of healthcare resources-a crucial prerequisite for securing healthcare access for everyone in the days to come.

  16. Understanding Co-Development of Conceptual and Epistemic Understanding through Modeling Practices with Mobile Internet

    ERIC Educational Resources Information Center

    Ryu, Suna; Han, Yuhwha; Paik, Seoung-Hey

    2015-01-01

    The present study explores how engaging in modeling practice, along with argumentation, leverages students' epistemic and conceptual understanding in an afterschool science/math class of 16 tenth graders. The study also explores how students used mobile Internet phones (smart phones) productively to support modeling practices. As the modeling…

  17. Mobile and Web 2.0 interventions for weight management: an overview of review evidence and its methodological quality

    PubMed Central

    Smith, Jane R.; Samaha, Laya; Abraham, Charles

    2016-01-01

    Abstract Background : The use of Internet and related technologies for promoting weight management (WM), physical activity (PA), or dietary-related behaviours has been examined in many articles and systematic reviews. This overview aims to summarize and assess the quality of the review evidence specifically focusing on mobile and Web 2.0 technologies, which are the most utilized, currently available technologies. Methods: Following a registered protocol (CRD42014010323), we searched 16 databases for articles published in English until 31 December 2014 discussing the use of either mobile or Web 2.0 technologies to promote WM or related behaviors, i.e. diet and physical activity (PA). Two reviewers independently selected reviews and assessed their methodological quality using the AMSTAR checklist. Citation matrices were used to determine the overlap among reviews. Results: Forty-four eligible reviews were identified, 39 of which evaluated the effects of interventions using mobile or Web 2.0 technologies. Methodological quality was generally low with only 7 reviews (16%) meeting the highest standards. Suggestive evidence exists for positive effects of mobile technologies on weight-related outcomes and, to a lesser extent, PA. Evidence is inconclusive regarding Web 2.0 technologies. Conclusions : Reviews on mobile and Web 2.0 interventions for WM and related behaviors suggest that these technologies can, under certain circumstances, be effective, but conclusions are limited by poor review quality based on a heterogeneous evidence base. PMID:27335330

  18. A Guide for Using the Internet.

    ERIC Educational Resources Information Center

    Brown, Herb

    This manual provides an instructional overview of Internet resources with student exercises. The work consists of nine chapters: (1) Introduction to the Internet; (2) How to Access the Internet; (3) Electronic Mail; (4) Gopher; (5) File Transfer Protocol-FTP; (6) Newsgroups & Newsreaders; (7) Telnet & TN3270; (8) World Wide Web; and (9)…

  19. Fundamental rate-loss trade-off for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-01

    The quantum internet holds promise for achieving quantum communication--such as quantum teleportation and quantum key distribution (QKD)--freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result--putting a practical but general limitation on the quantum internet--enables us to grasp the potential of the future quantum internet.

  20. Fundamental rate-loss trade-off for the quantum internet.

    PubMed

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-25

    The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.

  1. Self-reported wrist and finger symptoms associated with other physical/mental symptoms and use of computers/mobile phones.

    PubMed

    Korpinen, Leena; Pääkkönen, Rauno; Gobba, Fabriziomaria

    2018-03-01

    Recently, computer, mobile phone and Internet use has increased. This study aimed to determine the possible relation between self-reported wrist and finger symptoms (aches, pain or numbness) and using computers/mobile phones, and to analyze how the symptoms are specifically associated with utilizing desktop computers, portable computers or mini-computers and mobile phones. A questionnaire was sent to 15,000 working-age Finns (age 18-65). Via a questionnaire, 723 persons reported wrist and finger symptoms often or more with use. Over 80% use mobile phones daily and less than 30% use desktop computers or the Internet daily at leisure, e.g., over 89.8% quite often or often experienced pain, numbness or aches in the neck, and 61.3% had aches in the hips and the lower back. Only 33.7% connected their symptoms to computer use. In the future, the development of new devices and Internet services should incorporate the ergonomics of the hands and wrists.

  2. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    NASA Astrophysics Data System (ADS)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  3. Internet and mobile technologies: addressing the mental health of trauma survivors in less resourced communities.

    PubMed

    Ruzek, J I; Yeager, C M

    2017-01-01

    Internet and mobile technologies offer potentially critical ways of delivering mental health support in low-resource settings. Much evidence indicates an enormous negative impact of mental health problems in low- and middle-income countries (LMICs), and many of these problems are caused, or worsened, by exposure to wars, conflicts, natural and human-caused disasters, and other traumatic events. Though specific mental health treatments have been found to be efficacious and cost-effective for low-resource settings, most individuals living in these areas do not have access to them. Low-intensity task-sharing interventions will help, but there is a limit to the scalability and sustainability of human resources in these settings. To address the needs of trauma survivors, it will be important to develop and implement Internet and mobile technology resources to help reduce the scarcity, inequity, and inefficiency of current mental health services in LMICs. Mobile and Internet resources are experiencing a rapid growth in LMICs and can help address time, stigma, and cost barriers and connect those who have been socially isolated by traumatic events. This review discusses current research in technological interventions in low-resource settings and outlines key issues and future challenges and opportunities. Though formidable challenges exist for large-scale deployment of mobile and Internet mental health technologies, work to date indicates that these technologies are indeed feasible to develop, evaluate, and deliver to those in need of mental health services, and that they can be effective.

  4. Technology Addiction Survey: An Emerging Concern for Raising Awareness and Promotion of Healthy Use of Technology

    PubMed Central

    Sharma, Manoj Kumar; Rao, Girish N.; Benegal, Vivek; Thennarasu, K.; Thomas, Divya

    2017-01-01

    Background: Technology use has shown an impact of users’ lifestyle. The use has been attributed to psychosocial reasons. This usage manifests as excessive to addictive use of technology. There is a need to explore its addictive potential on large sample study as well as its association with psychosocial variables. It is one of its kind study on wider age group. The present work assessed the magnitude, burden, and sociodemographic correlates of technology addiction in an urban community. Materials and Methods: A total of 2755 individuals (1392 males and 1363 females) in the age group of 18–65 years were approached for screening internet addiction and mobile overuse, using house-to-house survey methodology. Results: The survey indicated the presence of addiction for 1.3% for internet (2% males and 0.6% females) and mobile phone overuse (4.1%–2.5% males and 1.5% females). It was more common among males. Significant differences were observed in relation to family status for internet and mobile phone use more commonly among single/nuclear families. Technology addictions were found to be more common among single families and lesser in nuclear and joint families. Mobile phone users had psychiatric distress in comparison to users with internet addiction. The study showed negative correlation of age, years of marriage, and numbers of family members with internet addiction and mobile overuse. Conclusions: It has implication for raising awareness about addictive potential of technology and its impact on one's lifestyle. PMID:28852246

  5. Information Technology and Lifestyle: A Systematic Evaluation of Internet and Mobile Interventions for Improving Diet, Physical Activity, Obesity, Tobacco, and Alcohol Use.

    PubMed

    Afshin, Ashkan; Babalola, Damilola; Mclean, Mireille; Yu, Zhi; Ma, Wenjie; Chen, Cheng-Yu; Arabi, Mandana; Mozaffarian, Dariush

    2016-08-31

    Novel interventions are needed to improve lifestyle and prevent noncommunicable diseases, the leading cause of death and disability globally. This study aimed to systematically review, synthesize, and grade scientific evidence on effectiveness of novel information and communication technology to reduce noncommunicable disease risk. We systematically searched PubMed for studies evaluating the effect of Internet, mobile phone, personal sensors, or stand-alone computer software on diet, physical activity, adiposity, tobacco, or alcohol use. We included all interventional and prospective observational studies conducted among generally healthy adults published between January 1990 and November 2013. American Heart Association criteria were used to evaluate and grade the strength of evidence. From 8654 abstracts, 224 relevant reports were identified. Internet and mobile interventions were most common. Internet interventions improved diet (N=20 studies) (Class IIa A), physical activity (N=33), adiposity (N=35), tobacco (N=22), and excess alcohol (N=47) (Class I A each). Mobile interventions improved physical activity (N=6) and adiposity (N=3) (Class I A each). Evidence limitations included relatively brief durations (generally <6 months, nearly always <1 year), heterogeneity in intervention content and intensity, and limited representation from middle/low-income countries. Internet and mobile interventions improve important lifestyle behaviors up to 1 year. This systematic review supports the need for long-term interventions to evaluate sustainability. © 2016 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley Blackwell.

  6. Technology Addiction Survey: An Emerging Concern for Raising Awareness and Promotion of Healthy Use of Technology.

    PubMed

    Sharma, Manoj Kumar; Rao, Girish N; Benegal, Vivek; Thennarasu, K; Thomas, Divya

    2017-01-01

    Technology use has shown an impact of users' lifestyle. The use has been attributed to psychosocial reasons. This usage manifests as excessive to addictive use of technology. There is a need to explore its addictive potential on large sample study as well as its association with psychosocial variables. It is one of its kind study on wider age group. The present work assessed the magnitude, burden, and sociodemographic correlates of technology addiction in an urban community. A total of 2755 individuals (1392 males and 1363 females) in the age group of 18-65 years were approached for screening internet addiction and mobile overuse, using house-to-house survey methodology. The survey indicated the presence of addiction for 1.3% for internet (2% males and 0.6% females) and mobile phone overuse (4.1%-2.5% males and 1.5% females). It was more common among males. Significant differences were observed in relation to family status for internet and mobile phone use more commonly among single/nuclear families. Technology addictions were found to be more common among single families and lesser in nuclear and joint families. Mobile phone users had psychiatric distress in comparison to users with internet addiction. The study showed negative correlation of age, years of marriage, and numbers of family members with internet addiction and mobile overuse. It has implication for raising awareness about addictive potential of technology and its impact on one's lifestyle.

  7. Use of the Delay-Tolerant Networking Bundle Protocol from Space

    NASA Technical Reports Server (NTRS)

    Wood, Lloyd; Ivancic, William D.; Eddy, Wesley M.; Stewart, Dave; Northam, James; Jackson, Chris; daSilvaCuriel, Alex

    2009-01-01

    The Disaster Monitoring Constellation (DMC), constructed by Survey Satellite Technology Ltd (SSTL), is a multisatellite Earth-imaging low-Earth-orbit sensor network where captured image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a Delay/Disruption Tolerant Network (DTN). Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is currently unique in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation's UK-DMC satellite. Earth images are downloaded from the satellites using a custom IPbased high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with use of DTNRG bundle concepts onboard the UKDMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. This is the first successful use of the DTNRG Bundle Protocol in a space environment. We use our practical experience to examine the strengths and weaknesses of the Bundle Protocol for DTN use, paying attention to fragmentation, custody transfer, and reliability issues.

  8. Designing of routing algorithms in autonomous distributed data transmission system for mobile computing devices with ‘WiFi-Direct’ technology

    NASA Astrophysics Data System (ADS)

    Nikitin, I. A.; Sherstnev, V. S.; Sherstneva, A. I.; Botygin, I. A.

    2017-02-01

    The results of the research of existent routing protocols in wireless networks and their main features are discussed in the paper. Basing on the protocol data, the routing protocols in wireless networks, including search routing algorithms and phone directory exchange algorithms, are designed with the ‘WiFi-Direct’ technology. Algorithms without IP-protocol were designed, and that enabled one to increase the efficiency of the algorithms while working only with the MAC-addresses of the devices. The developed algorithms are expected to be used in the mobile software engineering with the Android platform taken as base. Easier algorithms and formats of the well-known route protocols, rejection of the IP-protocols enables to use the developed protocols on more primitive mobile devices. Implementation of the protocols to the engineering industry enables to create data transmission networks among working places and mobile robots without any access points.

  9. Mobile Phone and Internet Use Mostly for Sex-Seeking and Associations with Sexually Transmitted Infections and Sample Characteristics among Black/African American and Hispanic/Latino Men who have Sex with Men in Three U.S. Cities

    PubMed Central

    Allen, Jacob E.; Mansergh, Gordon; Mimiaga, Matthew J.; Holman, Jeremy; Herbst, Jeffrey H.

    2017-01-01

    Background Men who have sex with men (MSM) have a relatively high prevalence of sexually transmitted infections (STIs). This study examines the association of self-reported STIs and use of mobile phones and/or computer-based Internet to meet sexual partners among black and Hispanic/Latino MSM in the U.S. Methods Black and Hispanic/Latino MSM (N=853) were recruited from three U.S. cities (Chicago, IL, Kansas City, MO, and Fort Lauderdale, FL) via online and community outreach. Men completed a computer-assisted, self-interview assessment on demographics, use of mobile phones and computer-based Internet for sex-seeking, sexual risk behavior, and self-reported bacterial STIs in the past year. Multivariable logistic regression was used to model independent associations of STIs and use of these technologies to meet sexual partners. Results 23% of the sample reported having an STI in the past year; 29% reported using a mobile phone and 28% a computer-based Internet mostly for sex-seeking; and 22% reported using both. Number of male sexual partners (past year) was associated with any STI (AOR=1.03, 95% CI =1.01–1.06). Adjusting for HIV status, number of male sexual partners (past year), and demographic variables, men who reported use of both mobile phones and computer-based Internet for sex-seeking had increased odds of reporting an STI (AOR=2.59, 95% CI=1.75–3.83), as well as with separate reports of chlamydia, gonorrhea, and syphilis (p’s<.05). Conclusions Enhanced community education regarding STI prevention, testing and treatment options are necessary among this subpopulation of MSM, who may benefit from messaging via Internet and mobile phone application sites. PMID:28407644

  10. Mobile Phone and Internet Use Mostly for Sex-Seeking and Associations With Sexually Transmitted Infections and Sample Characteristics Among Black/African American and Hispanic/Latino Men Who Have Sex With Men in 3 US Cities.

    PubMed

    Allen, Jacob E; Mansergh, Gordon; Mimiaga, Matthew J; Holman, Jeremy; Herbst, Jeffrey H

    2017-05-01

    Men who have sex with men (MSM) have a relatively high prevalence of sexually transmitted infections (STIs). This study examines the association of self-reported STIs and use of mobile phones and/or computer-based Internet to meet sexual partners among black and Hispanic/Latino MSM in the United States. Black and Hispanic/Latino MSM (N = 853) were recruited from 3 US cities (Chicago, IL; Kansas City, MO; and Fort Lauderdale, FL) via online and community outreach. Men completed a computer-assisted, self-interview assessment on demographics, use of mobile phones and computer-based Internet for sex-seeking, sexual risk behavior, and self-reported bacterial STIs in the past year. Multivariable logistic regression was used to model independent associations of STIs and use of these technologies to meet sexual partners. Twenty-three percent of the sample reported having an STI in the past year; 29% reported using a mobile phone and 28% a computer-based Internet mostly for sex-seeking; and 22% reported using both. Number of male sexual partners (past year) was associated with any STI (adjusted odds ratio, 1.03; 95% confidence interval, 1.01-1.06). Adjusting for human immunodeficiency virus status, number of male sexual partners (past year), and demographic variables, men who reported use of both mobile phones and computer-based Internet for sex-seeking had increased odds of reporting an STI (adjusted odds ratio, 2.59; 95% confidence interval, 1.75-3.83), as well as with separate reports of chlamydia, gonorrhea, and syphilis (P's < 0.05). Enhanced community education regarding STI prevention, testing, and treatment options are necessary among this subpopulation of MSM who may benefit from messaging via Internet and mobile phone application sites.

  11. Use of a wireless local area network in an orthodontic clinic.

    PubMed

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  12. Internet Architecture: Lessons Learned and Looking Forward

    DTIC Science & Technology

    2006-12-01

    Internet Architecture: Lessons Learned and Looking Forward Geoffrey G. Xie Department of Computer Science Naval Postgraduate School April 2006... Internet architecture. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...readers are referred there for more information about a specific protocol or concept. 2. Origin of Internet Architecture The Internet is easily

  13. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    ERIC Educational Resources Information Center

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  14. Bandwidth Management in Resource Constrained Networks

    DTIC Science & Technology

    2012-03-01

    Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching

  15. Towards efficient mobile M2M communications: survey and open challenges.

    PubMed

    Pereira, Carlos; Aguiar, Ana

    2014-10-20

    Machine-to-Machine (M2M) communications enable networked devices and services to exchange information and perform actions seamlessly without the need for human intervention. They are viewed as a key enabler of the Internet of Things (IoT) and ubiquitous applications, like mobile healthcare, telemetry, or intelligent transport systems. We survey existing work on mobile M2M communications, we identify open challenges that have a direct impact on performance and resource usage efficiency, especially the impact on energy efficiency, and we review techniques to improve communications. We review the ETSI standard and application protocols, and draw considerations on the impact of their use in constrained mobile devices. Nowadays, smartphones are equipped with a wide range of embedded sensors, with varied local and wide area connectivity capabilities, and thus they offer a unique opportunity to serve as mobile gateways for other more constrained devices with local connectivity. At the same time, they can gather context data about users and environment from the embedded sensors. These capabilities may be crucial for mobile M2M applications. Finally, in this paper, we consider a scenario where smartphones are used as gateways that collect and aggregate data from sensors in a cellular network. We conclude that, in order for their use to the feasible in terms of a normal depletion time of a smartphone's battery, it is a good advice to maximize the collection of data necessary to be transmitted from nearby sensors, and maximize the intervals between transmissions. More research is required to devise energy efficient transmission methods that enable the use of smartphones as mobile gateways.

  16. Towards Efficient Mobile M2M Communications: Survey and Open Challenges

    PubMed Central

    Pereira, Carlos; Aguiar, Ana

    2014-01-01

    Machine-to-Machine (M2M) communications enable networked devices and services to exchange information and perform actions seamlessly without the need for human intervention. They are viewed as a key enabler of the Internet of Things (IoT) and ubiquitous applications, like mobile healthcare, telemetry, or intelligent transport systems. We survey existing work on mobile M2M communications, we identify open challenges that have a direct impact on performance and resource usage efficiency, especially the impact on energy efficiency, and we review techniques to improve communications. We review the ETSI standard and application protocols, and draw considerations on the impact of their use in constrained mobile devices. Nowadays, smartphones are equipped with a wide range of embedded sensors, with varied local and wide area connectivity capabilities, and thus they offer a unique opportunity to serve as mobile gateways for other more constrained devices with local connectivity. At the same time, they can gather context data about users and environment from the embedded sensors. These capabilities may be crucial for mobile M2M applications. Finally, in this paper, we consider a scenario where smartphones are used as gateways that collect and aggregate data from sensors in a cellular network. We conclude that, in order for their use to the feasible in terms of a normal depletion time of a smartphone's battery, it is a good advice to maximize the collection of data necessary to be transmitted from nearby sensors, and maximize the intervals between transmissions. More research is required to devise energy efficient transmission methods that enable the use of smartphones as mobile gateways. PMID:25333291

  17. Develop a Prototype Personal Health Record Application (PHR-A) that Captures Information About Daily Living Important for Diabetes and Provides Decision Support with Actionable Advice for Diabetes Self Care

    DTIC Science & Technology

    2014-10-01

    designed an Internet-based and mobile application (software) to assist with the following domains pertinent to diabetes self-management: 1...management that provides education, reminders, and support. The new tool is an internet-based and mobile application (software), now called Tracking...is mobile , provides decision support with actionable options, and is based on user input, will enhance diabetes self-care, improve glycemic control

  18. Research of ad hoc network based on SINCGARS network

    NASA Astrophysics Data System (ADS)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  19. Internet of things for an age-friendly healthcare.

    PubMed

    Konstantinidis, Evdokimos I; Bamparopoulos, Giorgos; Billis, Antonis; Bamidis, Panagiotis D

    2015-01-01

    In healthcare applications a large cohort of recent implementations utilises IoT-oriented infrastructures (XMPP) as well as smart mobile devices as communication gateways. IoT characteristi Communication/Connectivity, Pervasive Computing and Ambient Intelligence, are all highly related to Active and Healthy Aging environments. This paper presents a new idea, that of IoT enabled devices which are directly connected to the IoT (a glucose meter is used as an example herein), complying with the XMPP messaging protocol and the incorporation of a recently released Controller Application Communication (CAC) framework for distributed, cross-platform communication. A web based exergaming platform and a disease management tool, provide the vehicles for the demonstration of the feasibility and the successful implementation and integration of the aforementioned infrastructure.

  20. Business Model Evaluation for an Advanced Multimedia Service Portfolio

    NASA Astrophysics Data System (ADS)

    Pisciella, Paolo; Zoric, Josip; Gaivoronski, Alexei A.

    In this paper we analyze quantitatively a business model for the collaborative provision of an advanced mobile data service portfolio composed of three multimedia services: Video on Demand, Internet Protocol Television and User Generated Content. We provide a description of the provision system considering the relation occurring between tecnical aspects and business aspects for each agent providing the basic multimedia service. Such a techno-business analysis is then projected into a mathematical model dealing with the problem of the definition of incentives between the different agents involved in a collaborative service provision. Through the implementation of this model we aim at shaping the behaviour of each of the contributing agents modifying the level of profitability that the Service Portfolio yields to each of them.

  1. Mobile: Letting Go of the Device and Building for Innovation

    ERIC Educational Resources Information Center

    Davis, Jim; Rocchio, Rosemary A.

    2011-01-01

    Mobile use of the Internet is on target to surpass fixed use by 2014. Three-fourths of all college/university students have purchased or intend to purchase an Internet-enabled handheld device within the next year. The smartphone market is changing almost monthly. Attempting to manage even just one or a few "devices" is becoming a lost…

  2. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    ERIC Educational Resources Information Center

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  3. Internet Addiction in Adolescents

    ERIC Educational Resources Information Center

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  4. Design and implementation of a VoIP broadcasting service over embedded systems in a heterogeneous network environment.

    PubMed

    Leu, Jenq-Shiou; Lin, Wei-Hsiang; Hsieh, Wen-Bin; Lo, Chien-Chih

    2014-01-01

    As the digitization is integrated into daily life, media including video and audio are heavily transferred over the Internet nowadays. Voice-over-Internet Protocol (VoIP), the most popular and mature technology, becomes the focus attracting many researches and investments. However, most of the existing studies focused on a one-to-one communication model in a homogeneous network, instead of one-to-many broadcasting model among diverse embedded devices in a heterogeneous network. In this paper, we present the implementation of a VoIP broadcasting service on the open source-Linphone-in a heterogeneous network environment, including WiFi, 3G, and LAN networks. The proposed system featuring VoIP broadcasting over heterogeneous networks can be integrated with heterogeneous agile devices, such as embedded devices or mobile phones. VoIP broadcasting over heterogeneous networks can be integrated into modern smartphones or other embedded devices; thus when users run in a traditional AM/FM signal unreachable area, they still can receive the broadcast voice through the IP network. Also, comprehensive evaluations are conducted to verify the effectiveness of the proposed implementation.

  5. Realtime Gas Emission Monitoring at Hazardous Sites Using a Distributed Point-Source Sensing Infrastructure

    PubMed Central

    Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco

    2016-01-01

    This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant’s critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events. PMID:26805832

  6. Design and Implementation of a VoIP Broadcasting Service over Embedded Systems in a Heterogeneous Network Environment

    PubMed Central

    Lin, Wei-Hsiang; Hsieh, Wen-Bin; Lo, Chien-Chih

    2014-01-01

    As the digitization is integrated into daily life, media including video and audio are heavily transferred over the Internet nowadays. Voice-over-Internet Protocol (VoIP), the most popular and mature technology, becomes the focus attracting many researches and investments. However, most of the existing studies focused on a one-to-one communication model in a homogeneous network, instead of one-to-many broadcasting model among diverse embedded devices in a heterogeneous network. In this paper, we present the implementation of a VoIP broadcasting service on the open source—Linphone—in a heterogeneous network environment, including WiFi, 3G, and LAN networks. The proposed system featuring VoIP broadcasting over heterogeneous networks can be integrated with heterogeneous agile devices, such as embedded devices or mobile phones. VoIP broadcasting over heterogeneous networks can be integrated into modern smartphones or other embedded devices; thus when users run in a traditional AM/FM signal unreachable area, they still can receive the broadcast voice through the IP network. Also, comprehensive evaluations are conducted to verify the effectiveness of the proposed implementation. PMID:25300280

  7. Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.

  8. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  9. The Internet for Educators: A User's Guide.

    ERIC Educational Resources Information Center

    Monahan, Brian D.; Dharm, Matthew

    1995-01-01

    Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)

  10. Factors associated with patterns of mobile technology use among persons who inject drugs.

    PubMed

    Collins, Kelly M; Armenta, Richard F; Cuevas-Mota, Jazmine; Liu, Lin; Strathdee, Steffanie A; Garfein, Richard S

    2016-01-01

    New and innovative methods of delivering interventions are needed to further reduce risky behaviors and increase overall health among persons who inject drugs (PWID). Mobile health (mHealth) interventions have potential for reaching PWID; however, little is known about mobile technology use (MTU) in this population. In this study, the authors identify patterns of MTU and identified factors associated with MTU among a cohort of PWID. Data were collected through a longitudinal cohort study examining drug use, risk behaviors, and health status among PWID in San Diego, California. Latent class analysis (LCA) was used to define patterns of MTU (i.e., making voice calls, text messaging, and mobile Internet access). Multinomial logistic regression was then used to identify demographic characteristics, risk behaviors, and health indicators associated with mobile technology use class. In LCA, a 4-class solution fit the data best. Class 1 was defined by low MTU (22%, n = 100); class 2, by PWID who accessed the Internet using a mobile device but did not use voice or text messaging (20%, n = 95); class 3, by primarily voice, text, and connected Internet use (17%, n = 91); and class 4, by high MTU (41%, n = 175). Compared with low MTU, high MTU class members were more likely to be younger, have higher socioeconomic status, sell drugs, and inject methamphetamine daily. The majority of PWID in San Diego use mobile technology for voice, text, and/or Internet access, indicating that rapid uptake of mHealth interventions may be possible in this population. However, low ownership and use of mobile technology among older and/or homeless individuals will need to be considered when implementing mHealth interventions among PWID.

  11. An operational open-end file transfer protocol for mobile satellite communications

    NASA Technical Reports Server (NTRS)

    Wang, Charles; Cheng, Unjeng; Yan, Tsun-Yee

    1988-01-01

    This paper describes an operational open-end file transfer protocol which includes the connecting procedure, data transfer, and relinquishment procedure for mobile satellite communications. The protocol makes use of the frame level and packet level formats of the X.25 standard for the data link layer and network layer, respectively. The structure of a testbed for experimental simulation of this protocol over a mobile fading channel is also introduced.

  12. Problematic Use of the Internet and Smartphones in University Students: 2006–2017

    PubMed Central

    Rodrigo, Beatriz; Prades, Mariona

    2018-01-01

    It has been more than a decade since a concern about the addictive use of the Internet and mobile phones was first expressed, and its possible inclusion into the lists of mental disorders has recently become a popular topic of scientific discussion. Thus, it seems to be a fitting moment to investigate the prevalence of this issue over time. The aim of the present study was to analyze the prevalence of the perception of problematic Internet and smartphone use in young people over the period 2006–2017. To this end, a questionnaire on Internet use habits and two questionnaires on the negative consequences of Internet and smartphone use were administered to a sample of 792 university students. The scores were then compared with the results of former studies that had used these questionnaires. The perception of problematic Internet and mobile phone use has increased over the last decade, social networks are considered responsible for this increase, and females are perceived to be more affected than males. The current study shows how strong smartphone and Internet addiction and social media overlap. Participants from 2017 report higher negative consequences of both Internet and mobile phone use than those from 2006, but long-term observations show a decrease in problematic use after a sharp increase in 2013. We conclude that the diagnosis of technological addictions is influenced by both time and social and culture changes. PMID:29518050

  13. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M

  14. FD/DAMA Scheme For Mobile/Satellite Communications

    NASA Technical Reports Server (NTRS)

    Yan, Tsun-Yee; Wang, Charles C.; Cheng, Unjeng; Rafferty, William; Dessouky, Khaled I.

    1992-01-01

    Integrated-Adaptive Mobile Access Protocol (I-AMAP) proposed to allocate communication channels to subscribers in first-generation MSAT-X mobile/satellite communication network. Based on concept of frequency-division/demand-assigned multiple access (FD/DAMA) where partition of available spectrum adapted to subscribers' demands for service. Requests processed, and competing requests resolved according to channel-access protocol, or free-access tree algorithm described in "Connection Protocol for Mobile/Satellite Communications" (NPO-17735). Assigned spectrum utilized efficiently.

  15. Internet for Educators[TM]: A Step-by-Step Guide To Help Educators Understand and Use the Internet. [Videotape].

    ERIC Educational Resources Information Center

    1996

    This 66-minute videotape is part of an ongoing Internet education series, exploring the fascinating resources of the Internet. It is a step-by-step guide demonstrating effective techniques for using the World Wide Web, e-mail, file transfer protocol and other technologies. The program examines the Internet phenomenon from the educator's point of…

  16. HEART: heart exercise and remote technologies: a randomized controlled trial study protocol.

    PubMed

    Maddison, Ralph; Whittaker, Robyn; Stewart, Ralph; Kerr, Andrew; Jiang, Yannan; Kira, Geoffrey; Carter, Karen H; Pfaeffli, Leila

    2011-05-31

    Cardiovascular disease (CVD) is the leading cause of death worldwide. Cardiac rehabilitation (CR) is aimed at improving health behaviors to slow or reverse the progression of CVD disease. Exercise is a central element of CR. Technologies such as mobile phones and the Internet (mHealth) offer potential to overcome many of the psychological, physical, and geographical barriers that have been associated with lack of participation in exercise-based CR. We aim to trial the effectiveness of a mobile phone delivered exercise-based CR program to increase exercise capacity and functional outcomes compared with usual CR care in adults with CVD. This paper outlines the rationale and methods of the trial. A single-blinded parallel two-arm randomized controlled trial is being conducted. A total of 170 people will be randomized at 1:1 ratio either to receive a mHealth CR program or usual care. Participants are identified by CR nurses from two metropolitan hospitals in Auckland, New Zealand through outpatient clinics and existing databases. Consenting participants are contacted to attend a baseline assessment. The intervention consists of a theory-based, personalized, automated package of text and video message components via participants' mobile phones and the Internet to increase exercise behavior, delivered over six months. The control group will continue with usual CR. Data collection occurs at baseline and 24 weeks (post-intervention). The primary outcome is change in maximal oxygen uptake from baseline to 24 weeks. Secondary outcomes include post-intervention measures on self-reported physical activity (IPAQ), cardiovascular risk factors (systolic blood pressure, weight, and waist to hip ratio), health related quality of life (SF-36), and cost-effectiveness. This manuscript presents the protocol for a randomized controlled trial of a mHealth exercise-based CR program. Results of this trial will provide much needed information about physical and psychological well-being, and cost-effectiveness of an automated telecommunication intervention. If effective, this intervention has enormous potential to improve the delivery of CR and could easily be scaled up to be delivered nationally (and internationally) in a very short time, enhancing the translational aspect of this research. It also has potential to extend to comprehensive CR (nutrition advice, smoking cessation, medication adherence). ACTRN12611000117910.

  17. The NULevel trial of a scalable, technology-assisted weight loss maintenance intervention for obese adults after clinically significant weight loss: study protocol for a randomised controlled trial.

    PubMed

    Evans, Elizabeth H; Araújo-Soares, Vera; Adamson, Ashley; Batterham, Alan M; Brown, Heather; Campbell, Miglena; Dombrowski, Stephan U; Guest, Alison; Jackson, Daniel; Kwasnicka, Dominika; Ladha, Karim; McColl, Elaine; Olivier, Patrick; Rothman, Alexander J; Sainsbury, Kirby; Steel, Alison J; Steen, Ian Nicholas; Vale, Luke; White, Martin; Wright, Peter; Sniehotta, Falko F

    2015-09-22

    Effective weight loss interventions are widely available but, after weight loss, most individuals regain weight. This article describes the protocol for the NULevel trial evaluating the effectiveness and cost-effectiveness of a systematically developed, inexpensive, scalable, technology-assisted, behavioural intervention for weight loss maintenance (WLM) in obese adults after initial weight loss. A 12-month single-centre, two-armed parallel group, participant randomised controlled superiority trial is underway, recruiting a total of 288 previously obese adults after weight loss of ≥5 % within the previous 12 months. Participants are randomly assigned to intervention or control arms, with a 1:1 allocation, stratified by sex and percentage of body weight lost (<10 % vs ≥10 %). Change in weight (kg) from baseline to 12 months is the primary outcome. Weight, other anthropometric variables and 7-day physical activity (assessed via accelerometer) measures are taken at 0 and 12 months. Questionnaires at 0, 6 and 12 months assess psychological process variables, health service use and participant costs. Participants in the intervention arm initially attend an individual face-to-face WLM consultation with an intervention facilitator and then use a mobile internet platform to self-monitor and report their diet, daily activity (via pedometer) and weight through daily weighing on wirelessly connected scales. Automated feedback via mobile phone, tailored to participants' weight regain and goal progress is provided. Participants in the control arm receive quarterly newsletters (via links embedded in text messages) and wirelessly connected scales. Qualitative process evaluation interviews are conducted with a subsample of up to 40 randomly chosen participants. Acceptability and feasibility of procedures, cost-effectiveness, and relationships among socioeconomic variables and WLM will also be assessed. It is hypothesised that participants allocated to the intervention arm will show significantly lower levels of weight regain from baseline than those in the control arm. To date, this is the first WLM trial using remote real-time weight monitoring and mobile internet platforms to deliver a flexible, efficient and scalable intervention, tailored to the individual. This trial addresses a key research need and has the potential to make a vital contribution to the evidence base to inform future WLM policy and provision. http://www.isrctn.com/ISRCTN14657176 (registration date 20 March 2014).

  18. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    PubMed Central

    Jebaseeli Samuelraj, Ananthi; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point. PMID:26366431

  19. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6.

    PubMed

    Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan

    2015-01-01

    Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  20. Technology Use and Sleep Quality in Preadolescence and Adolescence

    PubMed Central

    Bruni, Oliviero; Sette, Stefania; Fontanesi, Lilybeth; Baiocco, Roberto; Laghi, Fiorenzo; Baumgartner, Emma

    2015-01-01

    Study Objectives: The purpose of this study was to analyze differences between preadolescents and adolescents on the use of technology and to test the contribution of using Internet and mobile phone, and circadian preference on sleep quality. Methods: We recruited a sample of 850 (364 males) preadolescents and adolescents. Self-report questionnaires about sleep schedule, sleep wake behavior problems, circadian preferences, and the use of technology (e.g., Internet and mobile phone) were administered. Students were asked to fill out the School Sleep Habits Survey, a self-report questionnaire on the use of technology, the Mobile Phone Involvement Questionnaire (MPIQ), and the Shorter Promis Questionnaire (SPQ). Results: Adolescents reported more sleep problems, a tendency toward eveningness, and an increase of Internet and phone activities, as well as social network activities, while preadolescents were more involved in gaming console and television viewing. The regression analysis performed separately in the two age groups showed that sleep quality was affected by the circadian preference (eveningness) in both groups. Adolescents' bad sleep quality was consistently associated with the mobile phone use and number of devices in the bedroom, while in preadolescents, with Internet use and turning-off time. Conclusions: The evening circadian preference, mobile phone and Internet use, numbers of other activities after 21:00, late turning off time, and number of devices in the bedroom have different negative influence on sleep quality in preadolescents and adolescents. Citation: Bruni O, Sette S, Fontanesi L, Baiocco R, Laghi F, Baumgartner E. Technology use and sleep quality in preadolescence and adolescence. J Clin Sleep Med 2015;11(12):1433–1441. PMID:26235161

  1. What explains usage of mobile physician-rating apps? Results from a web-based questionnaire.

    PubMed

    Bidmon, Sonja; Terlutter, Ralf; Röttl, Johanna

    2014-06-11

    Consumers are increasingly accessing health-related information via mobile devices. Recently, several apps to rate and locate physicians have been released in the United States and Germany. However, knowledge about what kinds of variables explain usage of mobile physician-rating apps is still lacking. This study analyzes factors influencing the adoption of and willingness to pay for mobile physician-rating apps. A structural equation model was developed based on the Technology Acceptance Model and the literature on health-related information searches and usage of mobile apps. Relationships in the model were analyzed for moderating effects of physician-rating website (PRW) usage. A total of 1006 randomly selected German patients who had visited a general practitioner at least once in the 3 months before the beginning of the survey were randomly selected and surveyed. A total of 958 usable questionnaires were analyzed by partial least squares path modeling and moderator analyses. The suggested model yielded a high model fit. We found that perceived ease of use (PEOU) of the Internet to gain health-related information, the sociodemographic variables age and gender, and the psychographic variables digital literacy, feelings about the Internet and other Web-based applications in general, patients' value of health-related knowledgeability, as well as the information-seeking behavior variables regarding the amount of daily private Internet use for health-related information, frequency of using apps for health-related information in the past, and attitude toward PRWs significantly affected the adoption of mobile physician-rating apps. The sociodemographic variable age, but not gender, and the psychographic variables feelings about the Internet and other Web-based applications in general and patients' value of health-related knowledgeability, but not digital literacy, were significant predictors of willingness to pay. Frequency of using apps for health-related information in the past and attitude toward PRWs, but not the amount of daily Internet use for health-related information, were significant predictors of willingness to pay. The perceived usefulness of the Internet to gain health-related information and the amount of daily Internet use in general did not have any significant effect on both of the endogenous variables. The moderation analysis with the group comparisons for users and nonusers of PRWs revealed that the attitude toward PRWs had significantly more impact on the adoption and willingness to pay for mobile physician-rating apps in the nonuser group. Important variables that contribute to the adoption of a mobile physician-rating app and the willingness to pay for it were identified. The results of this study are important for researchers because they can provide important insights about the variables that influence the acceptance of apps that allow for ratings of physicians. They are also useful for creators of mobile physician-rating apps because they can help tailor mobile physician-rating apps to the consumers' characteristics and needs.

  2. What Explains Usage of Mobile Physician-Rating Apps? Results From a Web-Based Questionnaire

    PubMed Central

    Terlutter, Ralf; Röttl, Johanna

    2014-01-01

    Background Consumers are increasingly accessing health-related information via mobile devices. Recently, several apps to rate and locate physicians have been released in the United States and Germany. However, knowledge about what kinds of variables explain usage of mobile physician-rating apps is still lacking. Objective This study analyzes factors influencing the adoption of and willingness to pay for mobile physician-rating apps. A structural equation model was developed based on the Technology Acceptance Model and the literature on health-related information searches and usage of mobile apps. Relationships in the model were analyzed for moderating effects of physician-rating website (PRW) usage. Methods A total of 1006 randomly selected German patients who had visited a general practitioner at least once in the 3 months before the beginning of the survey were randomly selected and surveyed. A total of 958 usable questionnaires were analyzed by partial least squares path modeling and moderator analyses. Results The suggested model yielded a high model fit. We found that perceived ease of use (PEOU) of the Internet to gain health-related information, the sociodemographic variables age and gender, and the psychographic variables digital literacy, feelings about the Internet and other Web-based applications in general, patients’ value of health-related knowledgeability, as well as the information-seeking behavior variables regarding the amount of daily private Internet use for health-related information, frequency of using apps for health-related information in the past, and attitude toward PRWs significantly affected the adoption of mobile physician-rating apps. The sociodemographic variable age, but not gender, and the psychographic variables feelings about the Internet and other Web-based applications in general and patients’ value of health-related knowledgeability, but not digital literacy, were significant predictors of willingness to pay. Frequency of using apps for health-related information in the past and attitude toward PRWs, but not the amount of daily Internet use for health-related information, were significant predictors of willingness to pay. The perceived usefulness of the Internet to gain health-related information and the amount of daily Internet use in general did not have any significant effect on both of the endogenous variables. The moderation analysis with the group comparisons for users and nonusers of PRWs revealed that the attitude toward PRWs had significantly more impact on the adoption and willingness to pay for mobile physician-rating apps in the nonuser group. Conclusions Important variables that contribute to the adoption of a mobile physician-rating app and the willingness to pay for it were identified. The results of this study are important for researchers because they can provide important insights about the variables that influence the acceptance of apps that allow for ratings of physicians. They are also useful for creators of mobile physician-rating apps because they can help tailor mobile physician-rating apps to the consumers’ characteristics and needs. PMID:24918859

  3. A Beginner's Guide to the Internet.

    ERIC Educational Resources Information Center

    McAdams, Charles A.; Nelson, Mark A.

    1995-01-01

    Maintains that the Internet offers services and opportunities for music teachers and students. Provides an overview of topics such as electronic mail, File Transfer Protocol (FTP), Gopher, and the World Wide Web (WWW). Includes two lists of music resources available on the Internet. (CFR)

  4. Lessons Learned from the Afghan Mission Network: Developing a Coalition Contingency Network

    DTIC Science & Technology

    2014-01-01

    SIPRNet Secret Internet Protocol Router Network SOP Standard Operating Procedure SVTC Secure Video Teleconference (or –Conferencing) TTP Tactics...Voice over internet protocol (VOIP) telephone connectivity • Email • Web browsing • Secure video teleconferencing (SVTC...10, 2012. As of January 15, 2013: http://www.guardian.co.uk/world/2012/oct/10/us-troops-jordan-syria-crisis Baldor, Lolita C., and Pauline Jelinek

  5. Using a Simple, Free Voice-over-Internet Protocol Service to Add Interest to Lectures and Enhance Student Engagement

    ERIC Educational Resources Information Center

    Beaton, Susan J.; Forster, Peter M.

    2013-01-01

    A large proportion of students in higher education report feeling bored during lectures, for example, Mann and Robinson (2009) put this figure at 60 per cent. This short article reviews our experiences of using a simple, free Voice-over-Internet Protocol (VoIP) service, Skype, to enhance the interest and engagement of students by holding a…

  6. Aggregating quantum repeaters for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Kato, Go

    2017-09-01

    The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.

  7. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  8. The Digital Divide and Health Disparities in China: Evidence From a National Survey and Policy Implications.

    PubMed

    Hong, Y Alicia; Zhou, Zi; Fang, Ya; Shi, Leiyu

    2017-09-11

    The digital divide persists despite broad accessibility of mobile tools. The relationship between the digital divide and health disparities reflects social status in terms of access to resources and health outcomes; however, data on this relationship are limited from developing countries such as China. The aim of this study was to examine the current rates of access to mobile tools (Internet use and mobile phone ownership) among older Chinese individuals (aged ≥45 years), the predictors of access at individual and community levels, and the relationship between access to mobile tools and health outcomes. We drew cross-sectional data from a national representative survey, the China Health and Retirement Longitudinal Study (CHARLS), which focused on the older population (aged ≥45 years). We used two-level mixed logistic regression models, controlling for unobserved heterogeneity at the community and individual levels for data analysis. In addition to individual-level socioeconomic status (SES), we included community-level resources such as neighborhood amenities, health care facilities, and community organizations. Health outcomes were measured by self-reported health and absence of disability based on validated scales. Among the 18,215 participants, 6.51% had used the Internet in the past month, and 83% owned a mobile phone. In the multivariate models, Internet use was strongly associated with SES, rural or urban residence, neighborhood amenities, community resources, and geographic region. Mobile phone ownership was strongly associated with SES and rural/urban residence but not so much with neighborhood amenities and community resources. Internet use was a significant predictor of self-reported health status, and mobile phone ownership was significantly associated with having disability even after controlling for potential confounders at the individual and community levels. This study is one of the first to examine digital divide and its relationship with health disparities in China. The data showed a significant digital divide in China, especially in the older population. Internet access is still limited to people with higher SES; however, the mobile phone has been adopted by the general population. The digital divide is associated with not only individual SES but also community resources. Future electronic health (eHealth) programs need to consider the accessibility of mobile tools and develop culturally appropriate programs for various social groups. ©Y Alicia Hong, Zi Zhou, Ya Fang, Leiyu Shi. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.09.2017.

  9. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    PubMed

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been investigated in previous studies, the number of published transdiagnostic Internet-based programs is still quite low. To our knowledge, this is the first randomized controlled trial studying the effectiveness of a transdiagnostic Internet-based treatment for several emotional disorders in public specialized care. Combining both a transdiagnostic approach with an Internet-based therapy format may help to decrease the burden of mental disorders, reducing the difficulties associated with disorder-specific treatments and facilitating access to people in need of treatment. Strengths and limitations are discussed. ClinicalTrials.gov NCT02345668 . Registered 27 July 2015.

  10. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  11. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  12. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Casasanta, Ralph; Hogie, Keith; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and as the need increases for more network-oriented mission operations. Another element of increasing significance will be the increased cost effectiveness of designing, building, integrating, and operating instruments and spacecraft that will come to the fore as more missions take up the approach of using commodity-level standard communications technologies. This paper describes how an IP (Internet Protocol)-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  13. Keeping Up with the Internet.

    ERIC Educational Resources Information Center

    Dealy, Jacqueline

    1994-01-01

    Offers instructions and resources for Internet novices wanting to access Internet services. Instructions are offered for connecting to 13 education listservs, 9 electronic journals and newsletters, 3 education databases, 7 Telnet gopher sites, Veronica and Archie search tools, and File Transfer Protocol (FTP). (Contains 16 references.) (SLW)

  14. Internet-based videoconferencing and data collaboration for the imaging community.

    PubMed

    Poon, David P; Langkals, John W; Giesel, Frederik L; Knopp, Michael V; von Tengg-Kobligk, Hendrik

    2011-01-01

    Internet protocol-based digital data collaboration with videoconferencing is not yet well utilized in the imaging community. Videoconferencing, combined with proven low-cost solutions, can provide reliable functionality and speed, which will improve rapid, time-saving, and cost-effective communications, within large multifacility institutions or globally with the unlimited reach of the Internet. The aim of this project was to demonstrate the implementation of a low-cost hardware and software setup that facilitates global data collaboration using WebEx and GoToMeeting Internet protocol-based videoconferencing software. Both products' features were tested and evaluated for feasibility across 2 different Internet networks, including a video quality and recording assessment. Cross-compatibility with an Apple OS is also noted in the evaluations. Departmental experiences with WebEx pertaining to clinical trials are also described. Real-time remote presentation of dynamic data was generally consistent across platforms. A reliable and inexpensive hardware and software setup for complete Internet-based data collaboration/videoconferencing can be achieved.

  15. Design and Implement AN Interoperable Internet of Things Application Based on AN Extended Ogc Sensorthings Api Standard

    NASA Astrophysics Data System (ADS)

    Huang, C. Y.; Wu, C. H.

    2016-06-01

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.

  16. Fundamental rate-loss trade-off for the quantum internet

    PubMed Central

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-01-01

    The quantum internet holds promise for achieving quantum communication—such as quantum teleportation and quantum key distribution (QKD)—freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka–Guha–Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result—putting a practical but general limitation on the quantum internet—enables us to grasp the potential of the future quantum internet. PMID:27886172

  17. An M-Learning Content Recommendation Service by Exploiting Mobile Social Interactions

    ERIC Educational Resources Information Center

    Chao, Han-Chieh; Lai, Chin-Feng; Chen, Shih-Yeh; Huang, Yueh-Min

    2014-01-01

    With the rapid development of the Internet and the popularization of mobile devices, participating in a mobile community becomes a part of daily life. This study aims the influence impact of social interactions on mobile learning communities. With m-learning content recommendation services developed from mobile devices and mobile network…

  18. Design and implementation of embedded un-interruptible power supply system (EUPSS) for web-based mobile application

    NASA Astrophysics Data System (ADS)

    Zhang, De-gan; Zhang, Xiao-dan

    2012-11-01

    With the growth of the amount of information manipulated by embedded application systems, which are embedded into devices and offer access to the devices on the internet, the requirements of saving the information systemically is necessary so as to fulfil access from the client and the local processing more efficiently. For supporting mobile applications, a design and implementation solution of embedded un-interruptible power supply (UPS) system (in brief, EUPSS) is brought forward for long-distance monitoring and controlling of UPS based on Web. The implementation of system is based on ATmega161, RTL8019AS and Arm chips with TCP/IP protocol suite for communication. In the embedded UPS system, an embedded file system is designed and implemented which saves the data and index information on a serial EEPROM chip in a structured way and communicates with a microcontroller unit through I2C bus. By embedding the file system into UPS system or other information appliances, users can access and manipulate local data on the web client side. Embedded file system on chips will play a major role in the growth of IP networking. Based on our experiment tests, the mobile users can easily monitor and control UPS in different places of long-distance. The performance of EUPSS has satisfied the requirements of all kinds of Web-based mobile applications.

  19. Interactive browsing of 3D environment over the Internet

    NASA Astrophysics Data System (ADS)

    Zhang, Cha; Li, Jin

    2000-12-01

    In this paper, we describe a system for wandering in a realistic environment over the Internet. The environment is captured by the concentric mosaic, compressed via the reference block coder (RBC), and accessed and delivered over the Internet through the virtual media (Vmedia) access protocol. Capturing the environment through the concentric mosaic is easy. We mount a camera at the end of a level beam, and shoot images as the beam rotates. The huge dataset of the concentric mosaic is then compressed through the RBC, which is specifically designed for both high compression efficiency and just-in-time (JIT) rendering. Through the JIT rendering function, only a portion of the RBC bitstream is accessed, decoded and rendered for each virtual view. A multimedia communication protocol -- the Vmedia protocol, is then proposed to deliver the compressed concentric mosaic data over the Internet. Only the bitstream segments corresponding to the current view are streamed over the Internet. Moreover, the delivered bitstream segments are managed by a local Vmedia cache so that frequently used bitstream segments need not be streamed over the Internet repeatedly, and the Vmedia is able to handle a RBC bitstream larger than its memory capacity. A Vmedia concentric mosaic interactive browser is developed where the user can freely wander in a realistic environment, e.g., rotate around, walk forward/backward and sidestep, even under a tight bandwidth of 33.6 kbps.

  20. The Effects of Pushing the Digital Divide to the Fighting Hole

    DTIC Science & Technology

    2006-02-03

    information technologies (IT), and new ways of horizontally fusing information across the battlespace...The opportunity to exploit this new “digital...brought technology , such as the Internet Protocol (IP), to the forefront. It is incumbent upon the leaders of the communications community to ensure...in a recent interview with SIGNAL magazine: In terms of potential, I see the fundamental technologies associated with Internet Protocol (IP

  1. Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows

    DTIC Science & Technology

    2013-09-01

    bayes classifier,” in Cloud Computing Security , ser. CCSW ’09. New York City, NY: ACM, 2009, pp. 31–42. [30] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz...FSM Finite State Machine HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control...This hidden traffic concept supports network access control, security protection through obfuscation, and performance boosts at the Internet facing

  2. From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans

    DTIC Science & Technology

    2014-06-01

    Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any

  3. Investigation of Service Quality of Measurement Reference Points for the Internet Services on Mobile Networks

    NASA Astrophysics Data System (ADS)

    Lipenbergs, E.; Bobrovs, Vj.; Ivanovs, G.

    2016-10-01

    To ensure that end-users and consumers have access to comprehensive, comparable and user-friendly information regarding the Internet access service quality, it is necessary to implement and regularly renew a set of legislative regulatory acts and to provide monitoring of the quality of Internet access services regarding the current European Regulatory Framework. The actual situation regarding the quality of service monitoring solutions in different European countries depends on national regulatory initiatives and public awareness. The service monitoring solutions are implemented using different measurement methodologies and tools. The paper investigates the practical implementations for developing a harmonising approach to quality monitoring in order to obtain objective information on the quality of Internet access services on mobile networks.

  4. Acceptable Use Policies in a Web 2.0 & Mobile Era: A Guide for School Districts

    ERIC Educational Resources Information Center

    Consortium for School Networking (NJ1), 2011

    2011-01-01

    Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…

  5. Augmenting Instruction in Business Communication Courses with the Internet.

    ERIC Educational Resources Information Center

    Cohen, Lance

    1994-01-01

    Outlines ways in which instructors of business communication can use the Internet more effectively while teaching. Argues that by augmenting business communication courses with e-mail and Internet protocols, instructors can reach larger segments of their classes, stimulate discussions, create simulations, and strengthen their relationships with…

  6. Energy Consumption Research of Mobile Data Collection Protocol for Underwater Nodes Using an USV.

    PubMed

    Lv, Zhichao; Zhang, Jie; Jin, Jiucai; Li, Qi; Gao, Baoru

    2018-04-16

    The Unmanned Surface Vehicle (USV) integrated with an acoustic modem is a novel mobile vehicle for data collection, which has an advantage in terms of mobility, efficiency, and collection cost. In the scenario of data collection, the USV is controlled autonomously along the planning trajectory and the data of underwater nodes are dynamically collected. In order to improve the efficiency of data collection and extend the life of the underwater nodes, a mobile data collection protocol for underwater nodes using the USV was proposed. In the protocol, the stop-and-wait ARQ transmission mechanism is adopted, where the duty cycle is designed considering the ratio between the sleep mode and the detection mode, and the transmission ratio is defined by the duty cycle, wake-up signal cycles, and USV’s speed. According to protocol, the evaluation index for energy consumption is constructed based on the duty cycle and the transmission ratio. The energy consumption of the protocol is simulated and analyzed using the mobile communication experiment data of USV, taking into consideration USV’s speed, data sequence length, and duty cycle. Optimized protocol parameters are identified, which in turn denotes the proposed protocol’s feasibility and effectiveness.

  7. Demonstrating a Realistic IP Mission Prototype

    NASA Technical Reports Server (NTRS)

    Rash, James; Ferrer, Arturo B.; Goodman, Nancy; Ghazi-Tehrani, Samira; Polk, Joe; Johnson, Lorin; Menke, Greg; Miller, Bill; Criscuolo, Ed; Hogie, Keith

    2003-01-01

    Flight software and hardware and realistic space communications environments were elements of recent demonstrations of the Internet Protocol (IP) mission concept in the lab. The Operating Missions as Nodes on the Internet (OMNI) Project and the Flight Software Branch at NASA/GSFC collaborated to build the prototype of a representative space mission that employed unmodified off-the-shelf Internet protocols and technologies for end-to-end communications between the spacecraft/instruments and the ground system/users. The realistic elements used in the prototype included an RF communications link simulator and components of the TRIANA mission flight software and ground support system. A web-enabled camera connected to the spacecraft computer via an Ethernet LAN represented an on-board instrument creating image data. In addition to the protocols at the link layer (HDLC), transport layer (UDP, TCP), and network (IP) layer, a reliable file delivery protocol (MDP) at the application layer enabled reliable data delivery both to and from the spacecraft. The standard Network Time Protocol (NTP) performed on-board clock synchronization with a ground time standard. The demonstrations of the prototype mission illustrated some of the advantages of using Internet standards and technologies for space missions, but also helped identify issues that must be addressed. These issues include applicability to embedded real-time systems on flight-qualified hardware, range of applicability of TCP, and liability for and maintenance of commercial off-the-shelf (COTS) products. The NASA Earth Science Technology Office (ESTO) funded the collaboration to build and demonstrate the prototype IP mission.

  8. 47 CFR 54.503 - Other supported special services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...

  9. Internet and mobile technology use among urban African American parents: survey study of a clinical population.

    PubMed

    Mitchell, Stephanie J; Godoy, Leandra; Shabazz, Kanya; Horn, Ivor B

    2014-01-13

    There is considerable potential for mobile technologies to empower pediatric patients and families by improving their communication with health professionals. National surveys suggest minority parents frequently communicate via mobile technology, but it is uncertain how amenable they are to receiving health care information in this format. Although the low cost and far reach characteristics of mobile health (mHealth) technology makes it advantageous for communication with minority parents, data on acceptance are needed. The objective of the study was to determine utilization of mobile and Internet technology by African American parents in an urban, underserved population, and to assess their interest in receiving health information via text messaging or other technologies (eg, social media and the Internet). A survey was administered to parents of children aged 1-12 years covered by public insurance receiving care at 3 pediatric primary care centers in Washington, DC. The African American sample (N=302) was composed of primarily single (75.8%, 229/302) mothers. Almost half had more than a high school education (47.7%, 144/302) and incomes above US $25,000 per year (43.0%, 130/302). Most (97.0%, 293/302) reported owning a cell phone, of which 91.1% (275/302) used it to text and 78.5% (237/302) used it to access the Internet. Most had service plans with unlimited text and data, but 26.5% (80/302) experienced service interruptions in the previous year. Home Internet access was more prevalent among those with higher income (86.2%, 112/130), but it was still relatively pervasive among lower income families (66.9%, 83/124). In adjusted logistic regression models, African American mothers with income greater than US $25,000 annually were 4 times as likely to own a tablet computer than their lower income counterparts. Of the participants, 80.8% (244/302) used social networking, primarily Facebook, and 74.2% (224/302) were interested in joining a social networking group about a health topic concerning their child. Although relatively few African American mothers (17.9%, 54/302) shared health information via texting, there was strong interest in receiving health information via mobile phones (87.4%, 264/302). There was no significant difference in Internet/mobile device use or interest in using these outlets to send/receive information about their children's health between parents of healthy children and parents of children with chronic health conditions. Urban African American parents are active users of the Internet and mobile technology for social interactions, but they are less likely to use it for accessing or communicating health information. However, most parents expressed an interest in receiving health information or utilizing social networking to learn more about health topics. Mobile technology and social networks may be an underutilized method of providing health information to underserved minority populations.

  10. Internet and Mobile Technology Use Among Urban African American Parents: Survey Study of a Clinical Population

    PubMed Central

    Godoy, Leandra; Shabazz, Kanya

    2014-01-01

    Background There is considerable potential for mobile technologies to empower pediatric patients and families by improving their communication with health professionals. National surveys suggest minority parents frequently communicate via mobile technology, but it is uncertain how amenable they are to receiving health care information in this format. Although the low cost and far reach characteristics of mobile health (mHealth) technology makes it advantageous for communication with minority parents, data on acceptance are needed. Objective The objective of the study was to determine utilization of mobile and Internet technology by African American parents in an urban, underserved population, and to assess their interest in receiving health information via text messaging or other technologies (eg, social media and the Internet). Methods A survey was administered to parents of children aged 1-12 years covered by public insurance receiving care at 3 pediatric primary care centers in Washington, DC. Results The African American sample (N=302) was composed of primarily single (75.8%, 229/302) mothers. Almost half had more than a high school education (47.7%, 144/302) and incomes above US $25,000 per year (43.0%, 130/302). Most (97.0%, 293/302) reported owning a cell phone, of which 91.1% (275/302) used it to text and 78.5% (237/302) used it to access the Internet. Most had service plans with unlimited text and data, but 26.5% (80/302) experienced service interruptions in the previous year. Home Internet access was more prevalent among those with higher income (86.2%, 112/130), but it was still relatively pervasive among lower income families (66.9%, 83/124). In adjusted logistic regression models, African American mothers with income greater than US $25,000 annually were 4 times as likely to own a tablet computer than their lower income counterparts. Of the participants, 80.8% (244/302) used social networking, primarily Facebook, and 74.2% (224/302) were interested in joining a social networking group about a health topic concerning their child. Although relatively few African American mothers (17.9%, 54/302) shared health information via texting, there was strong interest in receiving health information via mobile phones (87.4%, 264/302). There was no significant difference in Internet/mobile device use or interest in using these outlets to send/receive information about their children’s health between parents of healthy children and parents of children with chronic health conditions. Conclusions Urban African American parents are active users of the Internet and mobile technology for social interactions, but they are less likely to use it for accessing or communicating health information. However, most parents expressed an interest in receiving health information or utilizing social networking to learn more about health topics. Mobile technology and social networks may be an underutilized method of providing health information to underserved minority populations. PMID:24418967

  11. The Digital Divide and Health Disparities in China: Evidence From a National Survey and Policy Implications

    PubMed Central

    Fang, Ya; Shi, Leiyu

    2017-01-01

    Background The digital divide persists despite broad accessibility of mobile tools. The relationship between the digital divide and health disparities reflects social status in terms of access to resources and health outcomes; however, data on this relationship are limited from developing countries such as China. Objective The aim of this study was to examine the current rates of access to mobile tools (Internet use and mobile phone ownership) among older Chinese individuals (aged ≥45 years), the predictors of access at individual and community levels, and the relationship between access to mobile tools and health outcomes. Methods We drew cross-sectional data from a national representative survey, the China Health and Retirement Longitudinal Study (CHARLS), which focused on the older population (aged ≥45 years). We used two-level mixed logistic regression models, controlling for unobserved heterogeneity at the community and individual levels for data analysis. In addition to individual-level socioeconomic status (SES), we included community-level resources such as neighborhood amenities, health care facilities, and community organizations. Health outcomes were measured by self-reported health and absence of disability based on validated scales. Results Among the 18,215 participants, 6.51% had used the Internet in the past month, and 83% owned a mobile phone. In the multivariate models, Internet use was strongly associated with SES, rural or urban residence, neighborhood amenities, community resources, and geographic region. Mobile phone ownership was strongly associated with SES and rural/urban residence but not so much with neighborhood amenities and community resources. Internet use was a significant predictor of self-reported health status, and mobile phone ownership was significantly associated with having disability even after controlling for potential confounders at the individual and community levels. Conclusions This study is one of the first to examine digital divide and its relationship with health disparities in China. The data showed a significant digital divide in China, especially in the older population. Internet access is still limited to people with higher SES; however, the mobile phone has been adopted by the general population. The digital divide is associated with not only individual SES but also community resources. Future electronic health (eHealth) programs need to consider the accessibility of mobile tools and develop culturally appropriate programs for various social groups. PMID:28893724

  12. The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.

    PubMed

    Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young

    2016-03-01

    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

  13. Trade-Off Analysis Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASAs Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASAs four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. CNS previously developed a report which applied the methodology, to three space Internet-based communications scenarios for future missions. CNS conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. GRC selected for further analysis the scenario that involved unicast communications between a Low-Earth-Orbit (LEO) International Space Station (ISS) and a ground terminal Internet node via a Tracking and Data Relay Satellite (TDRS) transfer. This report contains a tradeoff analysis on the selected scenario. The analysis examines the performance characteristics of the various protocols and architectures. The tradeoff analysis incorporates the results of a CNS developed analytical model that examined performance parameters.

  14. Network Quality of Service Monitoring for IP Telephony.

    ERIC Educational Resources Information Center

    Ghita, B. V.; Furnell, S. M.; Lines, B. M.; Le-Foll, D.; Ifeachor, E. C.

    2001-01-01

    Discusses the development of real-time applications on the Internet for telecommunications and presents a non-intrusive way of determining network performance parameters for voice packet flows within a voice over IP (Internet Protocol), or Internet telephony call. Considers measurement of quality of service and describes results of a preliminary…

  15. GINSU: Guaranteed Internet Stack Utilization

    DTIC Science & Technology

    2005-11-01

    Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC

  16. How I Found Out about the Internet.

    ERIC Educational Resources Information Center

    Pawloski, Bob

    1994-01-01

    A Nebraska consultant/former teacher explains his role in developing Internet accounts for teachers while working on a wetlands distance-learning project and an arts-education consortium. He explains ARTnet and other Internet services, including Telnet, FTP (file transfer protocol), the Gopher retrieval system, NetNews, and Listservs. Sidebars…

  17. A Scholar's Journey: Using the Internet for Adult and Distance Education Research.

    ERIC Educational Resources Information Center

    Ellsworth, Jill H.

    1993-01-01

    Discusses use of the Internet for research on adult and distance education. Highlights include a description of the Internet; scholarly discussion lists; Telnet; FTP (File Transfer Protocol); scholarship and research, including access to university library catalogs and electronic journals; and online information about networks, including user…

  18. The interplanetary Internet

    NASA Technical Reports Server (NTRS)

    Hooke, A. J.

    2000-01-01

    Architectural design of the interplanetary internet is now underway and prototype flight testing of some of the candidate protocols is anticipated within a year. This talk will describe the current status of the project.

  19. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    DTIC Science & Technology

    2008-03-01

    Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote

  20. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.

  1. The Department of Defense’s Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    DTIC Science & Technology

    2006-12-01

    Robert N. Beck, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY...THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT...Warfighter Information Network – Tactical 1 I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT APPLIED PROJECT PLAN A. TENTATIVE PROJECT TITLE

  2. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  3. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space experiment. A second Internet connection at the demonstration area was implemented to provide Internet connectivity to a group of workstations to serve as platforms for controlling the simulated space experiment. Installation of this Internet connection was coordinated with an Internet service provider (ISP) and local NASA Johnson Space Center personnel. Not only did this TCP/IP-based architecture prove that a principal investigator on the Internet can securely command and control on-orbit assets, it also demonstrated that valuable virtual testing of planned on-orbit activities can be conducted over the Internet prior to actual deployment in space.

  4. 47 CFR 8.5 - No blocking.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.5 No blocking. (a) A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged... network management. (b) A person engaged in the provision of mobile broadband Internet access service...

  5. 47 CFR 8.5 - No blocking.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.5 No blocking. (a) A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged... network management. (b) A person engaged in the provision of mobile broadband Internet access service...

  6. 47 CFR 8.5 - No blocking.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.5 No blocking. (a) A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged... network management. (b) A person engaged in the provision of mobile broadband Internet access service...

  7. 47 CFR 8.5 - No Blocking.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL PRESERVING THE OPEN INTERNET § 8.5 No Blocking. (a) A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged... network management. (b) A person engaged in the provision of mobile broadband Internet access service...

  8. Social Network Innovation in the Internet's Global Coffee Houses: Designing a Mobile Help Seeking Tool in Learning Layers

    ERIC Educational Resources Information Center

    Cook, John; Santos, Patricia

    2014-01-01

    In this paper, we argue that there is much that we can learn from the past as we explore the issues raised when designing innovative social media and mobile technologies for learning. Like the social networking that took place in coffee houses in the 1600s, the Internet-enabled social networks of today stand accused of being the so-called…

  9. Switched on or switched off? A survey of mobile, computer and Internet use in a community mental health rehabilitation sample.

    PubMed

    Tobitt, Simon; Percival, Robert

    2017-07-04

    UK society is undergoing a technological revolution, including meeting health needs through technology. Government policy is shifting towards a "digital by default" position. Studies have trialled health technology interventions for those experiencing psychosis and shown them to be useful. To gauge levels of engagement with mobile phones (Internet-enabled or cell phone), computers and the Internet in the specific population of community mental health rehabilitation. Two surveys were conducted: with service-users on use/non-use of technologies, and interest in technology interventions and support; and with placements on facilities and support available to service-users. Levels of engagement in this population were substantially less than those recorded in the general UK and other clinical populations: 40.2% regularly use mobiles, 17.5% computers, and 14.4% the Internet. Users of all three technologies were significantly younger than non-users. Users of mobiles and computers were significantly more likely to live in lower support/higher independence placements. Of surveyed placements, 35.5% provide a communal computer and 38.7% IT skills sessions. Community mental health rehabilitation service-users risk finding themselves excluded by a "digital divide". Action is needed to ensure equal access to online opportunities, including healthcare innovations. Clinical and policy implications are discussed.

  10. Information and communication technology and community-based health sciences training in Uganda: perceptions and experiences of educators and students.

    PubMed

    Chang, Larry W; Mwanika, Andrew; Kaye, Dan; Muhwezi, Wilson W; Nabirye, Rose C; Mbalinda, Scovia; Okullo, Isaac; Kennedy, Caitlin E; Groves, Sara; Sisson, Stephen D; Burnham, Gilbert; Bollinger, Robert C

    2012-01-01

    Information and communication technology (ICT) has been advocated as a powerful tool for improving health education in low-resource settings. However, few evaluations have been performed of ICT perceptions and user experiences in low-resource settings. During late 2009, an internet-based survey on ICT was administered to students, tutors, and faculty members associated with a Community-Based Education and Service (COBES) program in Uganda. 255 surveys were completed. Response rates varied (students, 188/684, 27.5%; tutors, 14/27, 51.9%; faculty, 53/335, 15.8%). Most respondents owned mobile phones (98%). Students were less likely (p < 0.001) to own laptops (25%) compared to tutors (71%) and faculty (85%). Internet access at rural sites was uncommon; mobile phone coverage was almost universally present. Laptop ownership and internet and mobile phone access was not associated with high valuation of students' COBES experiences. Free text responses found that respondents valued ICT access for research, learning, and communication purposes. In summary, ICT penetration in this population is primarily manifest by extensive mobile phone ownership. Internet access in rural educational sites is still lacking, but students and educators appear eager to utilize this resource if availability improves. ICT may offer a unique opportunity to improve the quality of teaching and learning for COBES participants.

  11. Mobile Health Technology (mDiab) for the Prevention of Type 2 Diabetes: Protocol for a Randomized Controlled Trial.

    PubMed

    Muralidharan, Shruti; Mohan, Viswanathan; Anjana, Ranjit Mohan; Jena, Sidhant; Tandon, Nikhil; Allender, Steven; Ranjani, Harish

    2017-12-12

    The prevalence of type 2 diabetes is increasing in epidemic proportions in low- and middle-income countries. There is an urgent need for novel methods to tackle the increasing incidence of diabetes. The ubiquity of mobile phone use and access to Internet makes mobile health (mHealth) technology a viable tool to prevent and manage diabetes. The objective of this randomized controlled trial is to implement and evaluate the feasibility, cost-effectiveness, and sustainability of a reality television-based lifestyle intervention program. This intervention program is delivered via a mobile phone app (mDiab) to approximately 1500 Android smartphone users who are adults at a high risk for type 2 diabetes from three cities in India, namely, Chennai, Bengaluru, and New Delhi. The mDiab intervention would be delivered via a mobile phone app along with weekly coach calls for 12 weeks. Each participant will go through a maintenance phase of 6 to 8 months post intervention. Overall, there would be 3 testing time points in the study: baseline, post intervention, and the end of follow-up. The app will enable individuals to track their weight, physical activity, and diet alongside weekly video lessons on type 2 diabetes prevention. The study outcomes are weight loss (primary measure of effectiveness); improvement in cardiometabolic risk factors (ie, waist circumference, blood pressure, glucose, insulin, and lipids); and improvement in physical activity, quality of life, and dietary habits. Sustainability will be assessed through focus group discussions. If successful, mDiab can be used as a model for translational and implementation research in the use of mHealth technology for diabetes prevention and may be further expanded for the prevention of other noncommunicable diseases such as hypertension and cardiovascular diseases. Clinical Trials Registry of India CTRI/2015/07/006011 http://ctri.nic.in/Clinicaltrials/pdf_generate.php? trialid=11841 (Archived by WebCite at http://www.webcitation.org/6urCS5kMB). ©Shruti Muralidharan, Viswanathan Mohan, Ranjit Mohan Anjana, Sidhant Jena, Nikhil Tandon, Steven Allender, Harish Ranjani. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 12.12.2017.

  12. Interactive real-time media streaming with reliable communication

    NASA Astrophysics Data System (ADS)

    Pan, Xunyu; Free, Kevin M.

    2014-02-01

    Streaming media is a recent technique for delivering multimedia information from a source provider to an end- user over the Internet. The major advantage of this technique is that the media player can start playing a multimedia file even before the entire file is transmitted. Most streaming media applications are currently implemented based on the client-server architecture, where a server system hosts the media file and a client system connects to this server system to download the file. Although the client-server architecture is successful in many situations, it may not be ideal to rely on such a system to provide the streaming service as users may be required to register an account using personal information in order to use the service. This is troublesome if a user wishes to watch a movie simultaneously while interacting with a friend in another part of the world over the Internet. In this paper, we describe a new real-time media streaming application implemented on a peer-to-peer (P2P) architecture in order to overcome these challenges within a mobile environment. When using the peer-to-peer architecture, streaming media is shared directly between end-users, called peers, with minimal or no reliance on a dedicated server. Based on the proposed software pɛvμa (pronounced [revma]), named for the Greek word meaning stream, we can host a media file on any computer and directly stream it to a connected partner. To accomplish this, pɛvμa utilizes the Microsoft .NET Framework and Windows Presentation Framework, which are widely available on various types of windows-compatible personal computers and mobile devices. With specially designed multi-threaded algorithms, the application can stream HD video at speeds upwards of 20 Mbps using the User Datagram Protocol (UDP). Streaming and playback are handled using synchronized threads that communicate with one another once a connection is established. Alteration of playback, such as pausing playback or tracking to a different spot in the media file, will be reflected in all media streams. These techniques are designed to allow users at different locations to simultaneously view a full length HD video and interactively control the media streaming session. To create a sustainable media stream with high quality, our system supports UDP packet loss recovery at high transmission speed using custom File- Buffers. Traditional real-time streaming protocols such as Real-time Transport Protocol/RTP Control Protocol (RTP/RTCP) provide no such error recovery mechanism. Finally, the system also features an Instant Messenger that allows users to perform social interactions with one another while they enjoy a media file. The ultimate goal of the application is to offer users a hassle free way to watch a media file over long distances without having to upload any personal information into a third party database. Moreover, the users can communicate with each other and stream media directly from one mobile device to another while maintaining an independence from traditional sign up required by most streaming services.

  13. An Integrated Testbed for Cooperative Perception with Heterogeneous Mobile and Static Sensors

    PubMed Central

    Jiménez-González, Adrián; Martínez-De Dios, José Ramiro; Ollero, Aníbal

    2011-01-01

    Cooperation among devices with different sensing, computing and communication capabilities provides interesting possibilities in a growing number of problems and applications including domotics (domestic robotics), environmental monitoring or intelligent cities, among others. Despite the increasing interest in academic and industrial communities, experimental tools for evaluation and comparison of cooperative algorithms for such heterogeneous technologies are still very scarce. This paper presents a remote testbed with mobile robots and Wireless Sensor Networks (WSN) equipped with a set of low-cost off-the-shelf sensors, commonly used in cooperative perception research and applications, that present high degree of heterogeneity in their technology, sensed magnitudes, features, output bandwidth, interfaces and power consumption, among others. Its open and modular architecture allows tight integration and interoperability between mobile robots and WSN through a bidirectional protocol that enables full interaction. Moreover, the integration of standard tools and interfaces increases usability, allowing an easy extension to new hardware and software components and the reuse of code. Different levels of decentralization are considered, supporting from totally distributed to centralized approaches. Developed for the EU-funded Cooperating Objects Network of Excellence (CONET) and currently available at the School of Engineering of Seville (Spain), the testbed provides full remote control through the Internet. Numerous experiments have been performed, some of which are described in the paper. PMID:22247679

  14. An integrated testbed for cooperative perception with heterogeneous mobile and static sensors.

    PubMed

    Jiménez-González, Adrián; Martínez-De Dios, José Ramiro; Ollero, Aníbal

    2011-01-01

    Cooperation among devices with different sensing, computing and communication capabilities provides interesting possibilities in a growing number of problems and applications including domotics (domestic robotics), environmental monitoring or intelligent cities, among others. Despite the increasing interest in academic and industrial communities, experimental tools for evaluation and comparison of cooperative algorithms for such heterogeneous technologies are still very scarce. This paper presents a remote testbed with mobile robots and Wireless Sensor Networks (WSN) equipped with a set of low-cost off-the-shelf sensors, commonly used in cooperative perception research and applications, that present high degree of heterogeneity in their technology, sensed magnitudes, features, output bandwidth, interfaces and power consumption, among others. Its open and modular architecture allows tight integration and interoperability between mobile robots and WSN through a bidirectional protocol that enables full interaction. Moreover, the integration of standard tools and interfaces increases usability, allowing an easy extension to new hardware and software components and the reuse of code. Different levels of decentralization are considered, supporting from totally distributed to centralized approaches. Developed for the EU-funded Cooperating Objects Network of Excellence (CONET) and currently available at the School of Engineering of Seville (Spain), the testbed provides full remote control through the Internet. Numerous experiments have been performed, some of which are described in the paper.

  15. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  16. [Design and Implementation of Intelligent Mobile ECG].

    PubMed

    Cao, Shaoping; Liu, Jian

    2016-05-01

    This paper introduces the development of intelligent mobile ECG, and internet big data sharing resources to further improve the remote diagnosis of medical service platform , to enhance the level of mobile medical standard and control medical risks.

  17. What kinds of website and mobile phone-delivered physical activity and nutrition interventions do middle-aged men want?

    PubMed

    Vandelanotte, Corneel; Caperchione, Cristina M; Ellison, Marcus; George, Emma S; Maeder, Anthony; Kolt, Gregory S; Duncan, Mitch J; Karunanithi, Mohanraj; Noakes, Manny; Hooker, Cindy; Viljoen, Pierre; Mummery, W Kerry

    2013-01-01

    Within a health context, men in Western societies are a hard-to-reach population who experience higher rates of chronic disease compared with women. Innovative technology-based interventions that specifically target men are needed; however, little is known about how these should be developed for this group. This study aimed to examine opinions and perceptions regarding the use of Internet and mobile phones to improve physical activity and nutrition behaviors for middle-aged men. The authors conducted 6 focus groups (n = 30) in Queensland, Australia. Their analyses identified 6 themes: (a) Internet experience, (b) website characteristics, (c) Web 2.0 applications, (d) website features, (e) self-monitoring, and (f) mobile phones as delivery method. The outcomes indicate that men support the use of the Internet to improve and self-monitor physical activity and dietary behaviors on the condition that the website-delivered interventions are quick and easy to use, because commitment levels to engage in online tasks are low. Participants also indicated that they were reluctant to use normal mobile phones to change health behaviors, although smartphones were perceived to be more acceptable. This pilot study suggests that there are viable avenues to engage middle-aged men in Internet- or in mobile-delivered health interventions. This study also suggests that to be successful, these interventions need to be tailor-made especially for men, with an emphasis on usability and convenience. A wider quantitative study would bring further support to these findings.

  18. Autonomous telemetry system by using mobile networks for a long-term seismic observation

    NASA Astrophysics Data System (ADS)

    Hirahara, S.; Uchida, N.; Nakajima, J.

    2012-04-01

    When a large earthquake occurs, it is important to know the detailed distribution of aftershocks immediately after the main shock for the estimation of the fault plane. The large amount of seismic data is also required to determine the three-dimensional seismic velocity structure around the focal area. We have developed an autonomous telemetry system using mobile networks, which is specialized for aftershock observations. Because the newly developed system enables a quick installation and real-time data transmission by using mobile networks, we can construct a dense online seismic network even in mountain areas where conventional wired networks are not available. This system is equipped with solar panels that charge lead-acid battery, and enables a long-term seismic observation without maintenance. Furthermore, this system enables a continuous observation at low costs with flat-rate or prepaid Internet access. We have tried to expand coverage areas of mobile communication and back up Internet access by configuring plural mobile carriers. A micro server embedded with Linux consists of automatic control programs of the Internet connection and data transmission. A status monitoring and remote maintenance are available via the Internet. In case of a communication failure, an internal storage can back up data for two years. The power consumption of communication device ranges from 2.5 to 4.0 W. With a 50 Ah lead-acid battery, this system continues to record data for four days if the battery charging by solar panels is temporarily unavailable.

  19. M-health: can chronic obstructive pulmonary disease patients use mobile phones and associated software to self-manage their disease?

    PubMed

    Borycki, Elizabeth

    2012-01-01

    Chronic obstructive pulmonary disease (COPD) is the fourth leading cause of death in Canada. The Internet and mobile phones have revolutionized the ways in which those affected by chronic illnesses obtain health information. Increasingly individuals affected by chronic illnesses are using social media (e.g., blogs, YouTube®, Facebook®, Twitter®) to obtain information about and social support for their conditions. This rate is expected to grow with the increased use of the Internet, mobile phones, and mobile phone/social media software applications. The future of COPD self-management is changing and will likely include the use of a blend of these three technologies. A literature review was undertaken to determine the current state of the research at the intersection of COPD and the use of mobile devices and mobile social media applications in health care.

  20. NWS Mobile Weather

    Science.gov Websites

    Astronomical Data Tsunami Full Site FAQ Site Info Feedback Click map for forecast jQuery Mobile Framework = Requested Location Satellite Visible (Vis) Infrared (IR) Regional Vis Regional IR Legal Mobile site Product : NWS Internet Team Privacy Policy Mobile Page Feedback Full Survey Tweet feedback (#nwsmobileweb

  1. Mobile Technology in Educational Services

    ERIC Educational Resources Information Center

    Chen, Jueming; Kinshuk

    2005-01-01

    The use of computers and the Internet has successfully enabled educational institutions to provide their students and staff members with various online educational services. With the recent developments in mobile technology, further possibilities are emerging to provide such services through mobile devices such as mobile phones and PDAs. By…

  2. 47 CFR 64.3100 - Restrictions on mobile service commercial messages.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... advertise or promote a product, service, or Internet website of the person or entity forwarding the message... subscriber; (2) Include a functioning return electronic mail address or other Internet-based mechanism that... communications made to the electronic mail address, other Internet-based mechanism or, if applicable, other...

  3. Can the Internet Be Saved?

    ERIC Educational Resources Information Center

    Fischman, Josh

    2007-01-01

    The Internet has great difficulty coping with the sharp increase in mobile devices like cellphones and laptops, and handling bandwidth-hungry traffic such as video, now demanded by an increasing number of users. According to Ellen W. Zegura, chairwoman of computer sciences at the Georgia Institute of Technology, the Internet is like a big…

  4. Using the Internet in Rural Special Education: Accessing Resources.

    ERIC Educational Resources Information Center

    Bull, Kay S.; Kimball, Sarah L.

    This paper provides basic information on searching the Internet and describes sites of interest in the area of rural special education. The first section traces the evolution of the Internet through various phases--ARPANET, NSFNET, CERNET, and the beginnings of the World Wide Web--and describes various protocols (methods and tools) developed to…

  5. Assessing Information on the Internet: Toward Providing Library Services for Computer-Mediated Communication.

    ERIC Educational Resources Information Center

    Dillon, Martin; And Others

    1992-01-01

    Describes a project that examined textual information available on the Internet and potential means of providing access to this information. Highlights include an overview of Internet resources, a profile of a document sample, description of FTP (File Transfer Protocol) sites, and an automated method of categorizing files. (MES)

  6. Tools to Ease Your Internet Adventures: Part I.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1993-01-01

    This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)

  7. Citing Internet Addresses: A How-To Guide for Referencing Online Sources in Student Bibliographies. Revised.

    ERIC Educational Resources Information Center

    McClain, Tim

    This paper provides easy-to-understand guidelines for citing online information in student bibliographies. Citation structure and examples are provided for each type of Internet source. Guidelines are included for the following Internet sources: electronic mail; Gopher; File Transfer Protocol (FTP); Telnet; World Wide Web; Usenet Newsgroups;…

  8. A Teacher's Project Guide to the Internet.

    ERIC Educational Resources Information Center

    Crotchett, Kevin R.

    This book is a step-by-step guide to the Internet, suggesting creative K-12 classroom projects ranging from one of the most basic Internet functions, e-mail, to one of the more difficult, writing World Wide Web homepages. Intervening chapters describe projects using Usenet Newsgroups, File Transfer Protocols (FTP), Gopher, Veronica, the World Wide…

  9. Privacy/Security Policy

    Science.gov Websites

    automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system

  10. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    PubMed

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  11. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    PubMed Central

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  12. Measurement issues related to data collection on the World Wide Web.

    PubMed

    Strickland, Ora L; Moloney, Margaret F; Dietrich, Alexa S; Myerburg, Stuart; Cotsonis, George A; Johnson, Robert V

    2003-01-01

    As the World Wide Web has become more prominent as a mode of communication, it has opened up new possibilities for research data collection. This article identifies measurement issues that occur with Internet data collection that are relevant to qualitative and quantitative research approaches as they occurred in a triangulated Internet study of perimenopausal women with migraine headaches. Issues associated with quantitative data collection over the Internet include (a) selecting and designing Internet data collection protocols that adequately address study aims while also taking advantage of the Internet, (b) ensuring the reliability and validity of Internet data collected, (c) adapting quantitative paper-and-pencil data collection protocols for the Internet, (d) making Internet data collection practical for respondents and researchers, and (e) ensuring the quality of quantitative data collected. Qualitative data collection over the Internet needs to remain true to the philosophical stance of the qualitative approach selected. Researcher expertise in qualitative data collection must be combined with expertise in computer technology and information services if data are to be of ultimate quality The advantages and limitations of collecting qualitative data in real time or at a later time are explored, as well as approaches to enhance qualitative data collection over the Internet. It was concluded that like any research approach or method, Internet data collection requires considerable creativity, expertise, and planning to take advantage of the technology for the collection of reliable and valid research data.

  13. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Hogie, Keith; Casasanta, Ralph; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC (Goddard Space Flight Center) on applying standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols (IP) can provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, and constellations of spacecraft. A primary component of this work is to design and demonstrate automated end-to-end transport of files in a dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. These functions and capabilities will become increasingly significant in the years to come as both Earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively expensive. This paper describes how an IP-based communication architecture can support existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end file transfers all the way from instruments to control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with data rates and downlink capabilities from 300 Kbps to 4 Mbps. Many examples are based on designs currently being investigated for the Global Precipitation Measurement (GPM) mission.

  14. Architecture and Concept of Operations for a Warfighter’s Internet. Volume 2: Appendices

    DTIC Science & Technology

    1998-01-28

    National Technical Information Service , where it will be available to the general public, including foreign nationals. This technical report has been...SUPPORT INTEGRATED SERVICES IN A MOBILE CELLULAR SYSTEM ARCHITECTURE (FOR ARCHITECTURE OPT. 2) B-1 1. Introduction B-l 2. Warfighter’s...Internet Architecture and Concept of Operation B-2 3. Subnet Provider Interface (SNPI) B-5 4. Integrated Services Cell Multiplexing (ISCM) B-9 5. Mobile

  15. "MXing It up": How African Adolescents May Affect Social Change through Mobile Phone Use

    ERIC Educational Resources Information Center

    Napolitano, Christopher M.

    2010-01-01

    This chapter outlines mobile phone use among African (particularly South African) adolescents. With an estimated 350 million active mobile phone subscriptions, improving network infrastructure, low-cost Internet-ready handsets, innovative programs and applications, mobiles in Africa, and their increasingly younger, increasingly poorer, and…

  16. An Efficient Two-Tier Causal Protocol for Mobile Distributed Systems

    PubMed Central

    Dominguez, Eduardo Lopez; Pomares Hernandez, Saul E.; Gomez, Gustavo Rodriguez; Medina, Maria Auxilio

    2013-01-01

    Causal ordering is a useful tool for mobile distributed systems (MDS) to reduce the non-determinism induced by three main aspects: host mobility, asynchronous execution, and unpredictable communication delays. Several causal protocols for MDS exist. Most of them, in order to reduce the overhead and the computational cost over wireless channels and mobile hosts (MH), ensure causal ordering at and according to the causal view of the Base Stations. Nevertheless, these protocols introduce certain disadvantage, such as unnecessary inhibition at the delivery of messages. In this paper, we present an efficient causal protocol for groupware that satisfies the MDS's constraints, avoiding unnecessary inhibitions and ensuring the causal delivery based on the view of the MHs. One interesting aspect of our protocol is that it dynamically adapts the causal information attached to each message based on the number of messages with immediate dependency relation, and this is not directly proportional to the number of MHs. PMID:23585828

  17. Treatment of Internet Addiction with Anxiety Disorders: Treatment Protocol and Preliminary Before-After Results Involving Pharmacotherapy and Modified Cognitive Behavioral Therapy.

    PubMed

    Santos, Veruska Andrea; Freire, Rafael; Zugliani, Morená; Cirillo, Patricia; Santos, Hugo Henrique; Nardi, Antonio Egidio; King, Anna Lucia

    2016-03-22

    The growth of the Internet has led to significant change and has become an integral part of modern life. It has made life easier and provided innumerous benefits; however, excessive use has brought about the potential for addiction, leading to severe impairments in social, academic, financial, psychological, and work domains. Individuals addicted to the Internet usually have comorbid psychiatric disorders. Panic disorder (PD) and generalized anxiety disorder (GAD) are prevalent mental disorders, involving a great deal of damage in the patient's life. This open trial study describes a treatment protocol among 39 patients with anxiety disorders and Internet addiction (IA) involving pharmacotherapy and modified cognitive behavioral therapy (CBT). Of the 39 patients, 25 were diagnosed with PD and 14 with GAD, in addition to Internet addiction. At screening, patients responded to the MINI 5.0, Hamilton Anxiety Rating Scale, Hamilton Depression Rating Scale, Clinical Global Impressions Scale, and the Young Internet Addiction Scale. At that time, IA was observed taking into consideration the IAT scale (cutoff score above 50), while anxiety disorders were diagnosed by a psychiatrist. Patients were forwarded for pharmacotherapy and a modified CBT protocol. Psychotherapy was conducted individually, once a week, over a period of 10 weeks, and results suggest that the treatment was effective for anxiety and Internet addiction. Before treatment, anxiety levels suggested severe anxiety, with an average score of 34.26 (SD 6.13); however, after treatment the mean score was 15.03 (SD 3.88) (P<.001). A significant improvement in mean Internet addiction scores was observed, from 67.67 (SD 7.69) before treatment, showing problematic internet use, to 37.56 (SD 9.32) after treatment (P<.001), indicating medium Internet use. With respect to the relationship between IA and anxiety, the correlation between scores was .724. This study is the first research into IA treatment of a Brazilian population. The improvement was remarkable due to the complete engagement of patients in therapy, which contributed to the success of the treatment from a behavioral perspective, and gave patients the confidence to continue to manage Internet use in their lives.

  18. Mobile Router Technology Development

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent

    2002-01-01

    Cisco Systems and NASA have been performing joint research on mobile routing technology under a NASA Space Act Agreement. Cisco developed mobile router technology and provided that technology to NASA for applications to aeronautic and space-based missions. NASA has performed stringent performance testing of the mobile router, including the interaction of routing and transport-level protocols. This paper describes mobile routing, the mobile router, and some key configuration parameters. In addition, the paper describes the mobile routing test network and test results documenting the performance of transport protocols in dynamic routing environments.

  19. Libraries and the Mobile Web

    ERIC Educational Resources Information Center

    Hanson, Cody

    2011-01-01

    In 2011, cell phones and mobile devices are ubiquitous. The vast majority of Americans now own cell phones, and over half of them have mobile access to the Internet through a phone or other mobile device. For libraries to stay relevant, they must be able to offer content and services through the mobile web. In this issue of "Library Technology…

  20. [Willingness to accept an Internet-based mobility platform in different age cohorts. Empiric results of the project S-Mobil 100].

    PubMed

    Beil, J; Cihlar, V; Kruse, A

    2015-02-01

    The aim of the project S-Mobil 100 is to develop and implement a prototype of an internet-based, generation-appropriate mobility platform in the model region Siegen-Wittgenstein. In the context of an empirical preliminary study, use of technology, experience with technology, general attitudes towards technology, general technology commitment, and the willingness to accept the mobility platform were investigated in different age cohorts. The investigation was carried out using a written survey based on a standardized questionnaire. The sample of 358 persons aged 40-90 years was divided in four age cohorts (40-54, 55-64, 65-74, and 75 + years). Our results show a high willingness to accept the mobility platform in the overall sample. Age, residence, income, and general technology commitment were significant predictors for the judgment of the platform. Although there were group differences in accepting the mobility platform, the older cohorts are also open-minded towards this new technology.

  1. Use of Flowchart for Automation of Clinical Protocols in mHealth.

    PubMed

    Dias, Karine Nóra; Welfer, Daniel; Cordeiro d'Ornellas, Marcos; Pereira Haygert, Carlos Jesus; Dotto, Gustavo Nogara

    2017-01-01

    For healthcare professionals to use mobile applications we need someone who knows software development, provide them. In healthcare institutions, health professionals use clinical protocols to govern care, and sometimes these documents are computerized through mobile applications to assist them. This work aims to present a proposal of an application of flow as a way of describing clinical protocols for automatic generation of mobile applications to assist health professionals. The purpose of this research is to enable health professionals to develop applications from the description of their own clinical protocols. As a result, we developed a web system that automates clinical protocols for an Android platform, and we validated with two clinical protocols used in a Brazilian hospital. Preliminary results of the developed architecture demonstrate the feasibility of this study.

  2. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  3. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  4. An agenda-based routing protocol in delay tolerant mobile sensor networks.

    PubMed

    Wang, Xiao-Min; Zhu, Jin-Qi; Liu, Ming; Gong, Hai-Gang

    2010-01-01

    Routing in delay tolerant mobile sensor networks (DTMSNs) is challenging due to the networks' intermittent connectivity. Most existing routing protocols for DTMSNs use simplistic random mobility models for algorithm design and performance evaluation. In the real world, however, due to the unique characteristics of human mobility, currently existing random mobility models may not work well in environments where mobile sensor units are carried (such as DTMSNs). Taking a person's social activities into consideration, in this paper, we seek to improve DTMSN routing in terms of social structure and propose an agenda based routing protocol (ARP). In ARP, humans are classified based on their agendas and data transmission is made according to sensor nodes' transmission rankings. The effectiveness of ARP is demonstrated through comprehensive simulation studies.

  5. mHealth 2.0: Experiences, Possibilities, and Perspectives

    PubMed Central

    Diamantidis, Clarissa

    2014-01-01

    With more than 1 billion users having access to mobile broadband Internet and a rapidly growing mobile app market, all stakeholders involved have high hopes that this technology may improve health care. Expectations range from overcoming structural barriers to access in low-income countries to more effective, interactive treatment of chronic conditions. Before medical health practice supported by mobile devices ("mHealth") can scale up, a number of challenges need to be adequately addressed. From a psychological perspective, high attrition rates, digital divide of society, and intellectual capabilities of the users are key issues when implementing such technologies. Furthermore, apps addressing behavior change often lack a comprehensive concept, which is essential for an ongoing impact. From a clinical point of view, there is insufficient evidence to allow scaling up of mHealth interventions. In addition, new concepts are required to assess the efficacy and efficiency of interventions. Regarding technology interoperability, open standards and low-energy wireless protocols appear to be vital for successful implementation. There is an ongoing discussion in how far health care-related apps require a conformity assessment and how to best communicate quality standards to consumers. "Apps Peer-Review" and standard reporting via an "App synopsis" appear to be promising approaches to increase transparency for end users. With respect to development, more emphasis must be placed on context analysis to identify what generic functions of mobile information technology best meet the needs of stakeholders involved. Hence, interdisciplinary alliances and collaborative strategies are vital to achieve sustainable growth for "mHealth 2.0," the next generation mobile technology to support patient care. PMID:25099752

  6. Internet Addiction Risk in the Academic Environment

    ERIC Educational Resources Information Center

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  7. Symposium on Applications and the Internet (SAINT 2003) Proceedings (Orlando, Florida, January 27-31, 2003).

    ERIC Educational Resources Information Center

    Helal, Sumi, Ed.; Oie, Yuji, Ed.; Chang, Carl, Ed.; Murai, Jun, Ed.

    This proceedings from the 2003 Symposium on Applications and the Internet (SAINT) contains papers from sessions on: (1) mobile Internet, including a target-driven cache replacement policy, context-awareness for service discovery, and XML transformation; (2) collaboration technology I, including human-network-based filtering, virtual collaboration…

  8. MANEMO Routing in Practice: Protocol Selection, Expected Performance, and Experimental Evaluation

    NASA Astrophysics Data System (ADS)

    Tazaki, Hajime; van Meter, Rodney; Wakikawa, Ryuji; Wongsaardsakul, Thirapon; Kanchanasut, Kanchana; Dias de Amorim, Marcelo; Murai, Jun

    Motivated by the deployment of post-disaster MANEMO (MANET for NEMO) composed of mobile routers and stations, we evaluate two candidate routing protocols through network simulation, theoretical performance analysis, and field experiments. The first protocol is the widely adopted Optimized Link State Routing protocol (OLSR) and the second is the combination of the Tree Discovery Protocol (TDP) with Network In Node Advertisement (NINA). To the best of our knowledge, this is the first time that these two protocols are compared in both theoretical and practical terms. We focus on the control overhead generated when mobile routers perform a handover. Our results confirm the correctness and operational robustness of both protocols. More interestingly, although in the general case OLSR leads to better results, TDP/NINA outperforms OLSR both in the case of sparse networks and in highly mobile networks, which correspond to the operation point of a large set of post-disaster scenarios.

  9. Impact of mobile phone-based technology to improve health, population and nutrition services in Rural Bangladesh: a study protocol.

    PubMed

    Uddin, Jasim; Biswas, Tuhin; Adhikary, Gourab; Ali, Wazed; Alam, Nurul; Palit, Rajesh; Uddin, Nizam; Uddin, Aftab; Khatun, Fatema; Bhuiya, Abbas

    2017-07-06

    Mobile phone-based technology has been used in improving the delivery of healthcare services in many countries. However, data on the effects of this technology on improving primary healthcare services in resource-poor settings are limited. The aim of this study is to develop and test a mobile phone-based system to improve health, population and nutrition services in rural Bangladesh and evaluate its impact on service delivery. The study will use a quasi-experimental pre-post design, with intervention and comparison areas. Outcome indicators will include: antenatal care (ANC), delivery care, postnatal care (PNC), neonatal care, expanded programme on immunization (EPI) coverage, and contraceptive prevalence rate (CPR). The study will be conducted over a period of 30 months, using the existing health systems of Bangladesh. The intervention will be implemented through the existing service-delivery personnel at various primary-care levels, such as community clinic, union health and family welfare centre, and upazila health complex. These healthcare providers will be given mobile phones equipped with Apps for sending text and voice messages, along with the use of Internet and device for data-capturing. Training on handling of the Smartphones, data-capturing and monitoring will be given to selected service providers. They will also be trained on inputs, editing, verifying, and monitoring the outcome variables. Mobile phone-based technology has the potential to improve primary healthcare services in low-income countries, like Bangladesh. It is expected that our study will contribute to testing and developing a mobile phone-based intervention to improve the coverage and quality of services. The learning can be used in other similar settings in the low-and middle-income countries.

  10. Designing a Virtual Classroom for Distance Learning Students through the Internet.

    ERIC Educational Resources Information Center

    Bradshaw, Allen

    Advantages to using the Internet to deliver instruction include the fact that Hypertext Markup Language (HTML) can be accessed on any computer, broadening the student base to anyone with an Internet browser and a PPP (Point-to-Point Protocol) account. In addition, instructions, lectures, and examples can be linked together for use as students need…

  11. Searching Internet Archive Sites with Archie: Why, What, Where, and How.

    ERIC Educational Resources Information Center

    Simmonds, Curtis

    1993-01-01

    Describes Archie, an online catalog of electronic holdings of anonymous FTP (File Transfer Protocol) archive sites on the Internet. Accessing Archie through e-mail and using it in a telnet session are discussed. The Internet Gopher and Whatis, which can be used with Archie, are also explained, and search examples are included. (four references)…

  12. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  13. SEnviro: a sensorized platform proposal using open hardware and open standards.

    PubMed

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-03-06

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and theWeb of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented.

  14. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  15. SEnviro: A Sensorized Platform Proposal Using Open Hardware and Open Standards

    PubMed Central

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-01-01

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and the Web of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented. PMID:25756864

  16. The design of the m-health service application using a Nintendo DS game console.

    PubMed

    Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho

    2011-03-01

    In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.

  17. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  18. Do digital innovations for HIV and sexually transmitted infections work? Results from a systematic review (1996-2017)

    PubMed Central

    Daher, Jana; Vijh, Rohit; Linthwaite, Blake; Dave, Sailly; Kim, John; Dheda, Keertan; Peter, Trevor; Pai, Nitika Pant

    2017-01-01

    Objective Digital innovations with internet/mobile phones offer a potential cost-saving solution for overburdened health systems with high service delivery costs to improve efficiency of HIV/STI (sexually transmitted infections) control initiatives. However, their overall evidence has not yet been appraised. We evaluated the feasibility and impact of all digital innovations for all HIV/STIs. Design Systematic review. Setting/participants All settings/all participants. Intervention We classified digital innovations into (1) mobile health-based (mHealth: SMS (short message service)/phone calls), (2) internet-based mobile and/or electronic health (mHealth/eHealth: social media, avatar-guided computer programs, websites, mobile applications, streamed soap opera videos) and (3) combined innovations (included both SMS/phone calls and internet-based mHealth/eHealth). Primary and secondary outcome measures Feasibility, acceptability, impact. Methods We searched databases MEDLINE via PubMed, Embase, Cochrane CENTRAL and Web of Science, abstracted data, explored heterogeneity, performed a random effects subgroup analysis. Results We reviewed 99 studies, 63 (64%) were from America/Europe, 36 (36%) from Africa/Asia; 79% (79/99) were clinical trials; 84% (83/99) evaluated impact. Of innovations, mHealth based: 70% (69/99); internet based: 21% (21/99); combined: 9% (9/99). All digital innovations were highly accepted (26/31; 84%), and feasible (20/31; 65%). Regarding impacted measures, mHealth-based innovations (SMS) significantly improved antiretroviral therapy (ART) adherence (pooled OR=2.15(95%CI: 1.18 to 3.91)) and clinic attendance rates (pooled OR=1.76(95%CI: 1.28, 2.42)); internet-based innovations improved clinic attendance (6/6), ART adherence (4/4), self-care (1/1), while reducing risk (5/5); combined innovations increased clinic attendance, ART adherence, partner notifications and self-care. Confounding (68%) and selection bias (66%) were observed in observational studies and attrition bias in 31% of clinical trials. Conclusion Digital innovations were acceptable, feasible and generated impact. A trend towards the use of internet-based and combined (internet and mobile) innovations was noted. Large scale-up studies of high quality, with new integrated impact metrics, and cost-effectiveness are needed. Findings will appeal to all stakeholders in the HIV/STI global initiatives space. PMID:29101138

  19. Do digital innovations for HIV and sexually transmitted infections work? Results from a systematic review (1996-2017).

    PubMed

    Daher, Jana; Vijh, Rohit; Linthwaite, Blake; Dave, Sailly; Kim, John; Dheda, Keertan; Peter, Trevor; Pai, Nitika Pant

    2017-11-03

    Digital innovations with internet/mobile phones offer a potential cost-saving solution for overburdened health systems with high service delivery costs to improve efficiency of HIV/STI (sexually transmitted infections) control initiatives. However, their overall evidence has not yet been appraised. We evaluated the feasibility and impact of all digital innovations for all HIV/STIs. Systematic review. All settings/all participants. We classified digital innovations into (1) mobile health-based (mHealth: SMS (short message service)/phone calls), (2) internet-based mobile and/or electronic health (mHealth/eHealth: social media, avatar-guided computer programs, websites, mobile applications, streamed soap opera videos) and (3) combined innovations (included both SMS/phone calls and internet-based mHealth/eHealth). Feasibility, acceptability, impact. We searched databases MEDLINE via PubMed, Embase, Cochrane CENTRAL and Web of Science, abstracted data, explored heterogeneity, performed a random effects subgroup analysis. We reviewed 99 studies, 63 (64%) were from America/Europe, 36 (36%) from Africa/Asia; 79% (79/99) were clinical trials; 84% (83/99) evaluated impact. Of innovations, mHealth based: 70% (69/99); internet based: 21% (21/99); combined: 9% (9/99).All digital innovations were highly accepted (26/31; 84%), and feasible (20/31; 65%). Regarding impacted measures, mHealth-based innovations (SMS) significantly improved antiretroviral therapy (ART) adherence (pooled OR=2.15(95%CI: 1.18 to 3.91)) and clinic attendance rates (pooled OR=1.76(95%CI: 1.28, 2.42)); internet-based innovations improved clinic attendance (6/6), ART adherence (4/4), self-care (1/1), while reducing risk (5/5); combined innovations increased clinic attendance, ART adherence, partner notifications and self-care. Confounding (68%) and selection bias (66%) were observed in observational studies and attrition bias in 31% of clinical trials. Digital innovations were acceptable, feasible and generated impact. A trend towards the use of internet-based and combined (internet and mobile) innovations was noted. Large scale-up studies of high quality, with new integrated impact metrics, and cost-effectiveness are needed. Findings will appeal to all stakeholders in the HIV/STI global initiatives space. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. Monitoring Heart Disease and Diabetes with Mobile Internet Communications

    PubMed Central

    Mulvaney, David; Woodward, Bryan; Datta, Sekharjit; Harvey, Paul; Vyas, Anoop; Thakker, Bhaskar; Farooq, Omar; Istepanian, Robert

    2012-01-01

    A telemedicine system is described for monitoring vital signs and general health indicators of patients with cardiac and diabetic conditions. Telemetry from wireless sensors and readings from other instruments are combined into a comprehensive set of measured patient parameters. Using a combination of mobile device applications and web browser, the data can be stored, accessed, and displayed using mobile internet communications to the central server. As an extra layer of security in the data transmission, information embedded in the data is used in its verification. The paper highlights features that could be enhanced from previous systems by using alternative components or methods. PMID:23213330

  1. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices.

    PubMed

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-10-13

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things.

  2. Control over social interactions: an important reason for young people's use of the Internet and mobile phones for communication?

    PubMed

    Madell, Dominic E; Muncer, Steven J

    2007-02-01

    This paper reports some research that was undertaken to determine why young people choose to use certain communication media, especially the Internet and mobile phones for social purposes. Focus group methodology was employed in achieving this aim. Specifically, two focus groups containing young people aged 18-20 years were asked to discuss the question "why do you use different communication media, such as the Internet and mobile phones, in your social lives?" Discussions from the sessions were recorded on audiotapes, and then transcribed, and analyzed according to the principles of Grounded Theory. A number of categories emerged from the data. The most significant category indicated that young people often liked to use communication media such as the Internet and mobile phones to communicate because these afforded them control over their interactions. In particular, the data seemed to suggest that participants felt that because some communication media such as email, text messaging and instant messaging can be used asynchronously as well as synchronously, they allow one time to stop and think before giving a response if this is desired, or, alternatively, allowed one to retain the conversational nature of interactions if this is preferred. This gave participants greater control over interactions than they would have if, say, communicating via voice calls using the telephone or face-to-face, which are necessarily synchronous.

  3. The Effect of the Presence of an Internet-Connected Mobile Tablet Computer on Physical Activity Behavior in Children.

    PubMed

    Kobak, Mallory S; Lepp, Andrew; Rebold, Michael J; Faulkner, Hannah; Martin, Shannon; Barkley, Jacob E

    2018-02-01

    Mobile Internet-connected electronic devices provide access to activities that have traditionally been associated with sedentary behavior. Because they are portable, these devices can be utilized in any environment. Therefore, providing children with access to these devices in environments that typically promote physical activity may result in a reduction in physical activity behavior. To assess children's physical and sedentary (ie, sitting) activity with and without the presence of a mobile Internet-connected tablet computer. A total of 20 children [6.7 (1.9) y old] participated in 2 simulated recess conditions in a gymnasium on separate days. During each condition, children had free-choice access physical activity options and a table of sedentary activities for 40 minutes. During 1 session, the iPad was present, and in the other session, it was not. Physical activity was monitored via an accelerometer, and sedentary time was monitored via a stopwatch. Children significantly (P ≤ .03) reduced average physical activity intensity and increased their sedentary behavior with the iPad present [4.4 (4.0) metabolic equivalents/min and 20.9 (12.4) min sitting] versus the condition without the iPad present [5.3 (4.0) metabolic equivalents/min and 13.6 (13.2) min sitting]. Introducing an mobile Internet-connected tablet computer into a gymnasium reduced children's physical activity intensity by 17% and increased sedentary behavior by 54%.

  4. The 10 Hottest Technologies in Telecom.

    ERIC Educational Resources Information Center

    Flanagan, Patrick

    1997-01-01

    Presents the fourth annual listing of the 10 "hottest" telecommunications technologies. Describes Web broadcasting, remote-access servers, extranets, Internet telephony, enterprise network directory services, Web site management tools, IP (Internet Protocols) switching, wavelength division multiplexing, digital subscriber lines, and…

  5. Using internet and mobile phone technology to deliver an automated physical activity program: randomized controlled trial.

    PubMed

    Hurling, Robert; Catt, Michael; Boni, Marco De; Fairley, Bruce William; Hurst, Tina; Murray, Peter; Richardson, Alannah; Sodhi, Jaspreet Singh

    2007-04-27

    The Internet has potential as a medium for health behavior change programs, but no controlled studies have yet evaluated the impact of a fully automated physical activity intervention over several months with real-time objective feedback from a monitor. The aim was to evaluate the impact of a physical activity program based on the Internet and mobile phone technology provided to individuals for 9 weeks. A single-center, randomized, stratified controlled trial was conducted from September to December 2005 in Bedfordshire, United Kingdom, with 77 healthy adults whose mean age was 40.4 years (SD = 7.6) and mean body mass index was 26.3 (SD = 3.4). Participants were randomized to a test group that had access to an Internet and mobile phone-based physical activity program (n = 47) or to a control group (n = 30) that received no support. The test group received tailored solutions for perceived barriers, a schedule to plan weekly exercise sessions with mobile phone and email reminders, a message board to share their experiences with others, and feedback on their level of physical activity. Both groups were issued a wrist-worn accelerometer to monitor their level of physical activity; only the test group received real-time feedback via the Internet. The main outcome measures were accelerometer data and self-report of physical activity. At the end of the study period, the test group reported a significantly greater increase over baseline than did the control group for perceived control (P < .001) and intention/expectation to exercise (P < .001). Intent-to-treat analyses of both the accelerometer data (P = .02) and leisure time self-report data (P = .03) found a higher level of moderate physical activity in the test group. The average increase (over the control group) in accelerometer-measured moderate physical activity was 2 h 18 min per week. The test group also lost more percent body fat than the control group (test group: -2.18, SD = 0.59; control group: -0.17, SD = 0.81; P = .04). A fully automated Internet and mobile phone-based motivation and action support system can significantly increase and maintain the level of physical activity in healthy adults.

  6. The Relationship between Mobile Phone Use, Metacognitive Awareness and Academic Achievement

    ERIC Educational Resources Information Center

    Dos, Bulent

    2014-01-01

    Mobile phones are getting smarter and the usage through university students becoming more popular. University students using mobile phones for talking, for texting message, for Internet search, for listening music, watching videos, playing games, using social media etc. Mobile phones are not accessory any more, they are integrated like our…

  7. Development and Assessment of Mobile Device Support for Certification Exam Preparation

    ERIC Educational Resources Information Center

    Moh, Chiou

    2013-01-01

    Technological innovation in mobile devices has upgraded the potential uses of the devices for living and learning. Mobile learning provides opportunities for mobile users to learn at any time in any location. A certification that confirms computing and Internet technology skills and knowledge provides more opportunities to students in higher…

  8. Interactive telemedicine solution based on a secure mHealth application.

    PubMed

    Eldeib, Ayman M

    2014-01-01

    In dynamic healthcare environments, caregivers and patients are constantly moving. To increase the healthcare quality when it is necessary, caregivers need the ability to reach each other and securely access medical information and services from wherever they happened to be. This paper presents an Interactive Telemedicine Solution (ITS) to facilitate and automate the communication within a healthcare facility via Voice over Internet Protocol (VOIP), regular mobile phones, and Wi-Fi connectivity. Our system has the capability to exchange/provide securely healthcare information/services across geographic barriers through 3G/4G wireless communication network. Our system assumes the availability of an Electronic Health Record (EHR) system locally in the healthcare organization and/or on the cloud network such as a nation-wide EHR system. This paper demonstrate the potential of our system to provide effectively and securely remote healthcare solution.

  9. Adopting Internet Standards for Orbital Use

    NASA Technical Reports Server (NTRS)

    Wood, Lloyd; Ivancic, William; da Silva Curiel, Alex; Jackson, Chris; Stewart, Dave; Shell, Dave; Hodgson, Dave

    2005-01-01

    After a year of testing and demonstrating a Cisco mobile access router intended for terrestrial use onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we reflect on and discuss the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use, as well as reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies we have adopted and also some significant differences in operational models and assumptions that must be considered.

  10. History, structure, and function of the Internet.

    PubMed

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  11. A Lightweight Continuous Authentication Protocol for the Internet of Things

    PubMed Central

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  12. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  13. DWTP: a basis for networked VR on the Internet

    NASA Astrophysics Data System (ADS)

    Broll, Wolfgang; Schick, Daniel

    1998-04-01

    Shared virtual worlds are one of today's major research topics. While limited to particular application areas and high speed networks in the past, they become more and more available to a large number of users. One reason for this development was the introduction of VRML (the Virtual Reality Modeling Language), which has been established as a standard of the exchange of 3D worlds on the Internet. Although a number of prototype systems have been developed to realize shared multi-user worlds based on VRML, no suitable network protocol to support the demands of such environments has yet been established. In this paper we will introduce our approach of a network protocol for shared virtual environments: DWTP--the Distributed Worlds Transfer and communication Protocol. We will show how DWTP meets the demands of shared virtual environments on the Internet. We will further present SmallView, our prototype of a distributed multi-user VR system, to show how DWTP can be used to realize shared worlds.

  14. The problematic use of Information and Communication Technologies (ICT) in adolescents by the cross sectional JOITIC study.

    PubMed

    Muñoz-Miralles, Raquel; Ortega-González, Raquel; López-Morón, M Rosa; Batalla-Martínez, Carme; Manresa, Josep María; Montellà-Jordana, Núria; Chamarro, Andrés; Carbonell, Xavier; Torán-Monserrat, Pere

    2016-08-22

    The emerging field of Information and Communications Technology (ICT) has brought about new interaction styles. Its excessive use may lead to addictive behaviours. The objective is to determine the prevalence of the problematic use of ICT such as Internet, mobile phones and video games, among adolescents enrolled in mandatory Secondary Education (ESO in Spanish) and to examine associated factors. Cross sectional, multi-centric descriptive study. 5538 students enrolled in years one to four of ESO at 28 schools in the Vallès Occidental region (Barcelona, Spain). self-administered socio-demographic and ICT access questionnaire, and validated questionnaires on experiences related to the use of the Internet, mobile phones and video games (CERI, CERM, CERV). Questionnaires were collected from 5,538 adolescents between the ages of 12 and 20 (77.3 % of the total response), 48.6 % were females. Problematic use of the Internet was observed in 13.6 % of the surveyed individuals; problematic use of mobile phones in 2.4 % and problematic use in video games in 6.2 %. Problematic Internet use was associated with female students, tobacco consumption, a background of binge drinking, the use of cannabis or other drugs, poor academic performance, poor family relationships and an intensive use of the computer. Factors associated with the problematic use of mobile phones were the consumption of other drugs and an intensive use of these devices. Frequent problems with video game use have been associated with male students, the consumption of other drugs, poor academic performance, poor family relationships and an intensive use of these games. This study offers information on the prevalence of addictive behaviours of the Internet, mobile phones and video game use. The problematic use of these ICT devices has been related to the consumption of drugs, poor academic performance and poor family relationships. This intensive use may constitute a risk marker for ICT addiction.

  15. Prevalence and co-occurrence of compulsive buying, problematic Internet and mobile phone use in college students in Yantai, China: relevance of self-traits.

    PubMed

    Jiang, Zhaocai; Shi, Mingyan

    2016-12-01

    Until now, most research in the prevalence of compulsive buying (CB) has been developed from samples in western developed countries, this study aimed to estimate the prevalence and co-morbidities of CB, problematic Internet use (PIU) and problematic mobile phone use (PMPU) in college students in Yantai, China. Moreover, based on the lack of research focusing on differences between CB and addiction, we will explore whether CB and PIU/PMPU individuals are characterized by the same self-traits (i. e., self-control, self-esteem and self-efficacy) related profile. A total of 601 college students were involved in this cross-sectional study. Compulsive buying, problematic Internet and mobile phone use and self-traits were assessed by self-reported questionnaires. The demographic information and use characteristics were included in the questionnaires. The incidence of CB, PIU and PMPU were 5.99, 27.8 and 8.99% respectively. In addition, compared with rural students, students from cities are more likely to get involved in CB. Students using mobile phone to surf the Internet displayed higher risk of PIU than counterparts using computer. Students using Internet or mobile phone longer are more prone to problematic use. Furthermore, we found the strong correlations and high co-morbidities of CB, PIU and PMPU and self-control was the most significant predictor for all three disorders. However, self-esteem and self-efficacy were significant predictors only for CB. Our findings indicated that with the prevalence of CB and PMPU roughly equivalent to that demonstrated in previous studies, PIU in Chinese college students is serious and deserves more attention. Furthermore, besides the impulsive aspect common with addiction, CB is also driven by painful self-awareness derived from low self-regard which implies the obsessive-compulsive aspect.

  16. EHealth Acceptance and New Media Preferences for Therapy Assistance Among Breast Cancer Patients

    PubMed Central

    Drewes, Caroline; Kirkovits, Thomas; Schiltz, Daniel; Schinkoethe, Timo; Haidinger, Renate; Harbeck, Nadia

    2016-01-01

    Background Electronic health (eHealth) and mobile communication-based health care (mHealth) applications have been increasingly utilized in medicine over the last decade, and have facilitated improved adherence to therapy regimens in patients with chronic conditions. Due to the long duration of breast cancer therapy, and the long course of disease in metastatic breast cancer, a need for more intensified physician-patient communication has emerged. Various support mechanisms, including new media such as mHealth and eHealth, have been proposed for this purpose. Objective The aim of this study was to analyze the correlation between sociodemographic factors, as well as health status of breast cancer patients, and their current utilization of new media, or their willingness to use Internet and mobile phone apps for improvement of therapy management. Methods The survey for this study was conducted anonymously during the 2012 Mamazone Projekt Diplompatient meeting (Augsburg, Germany), which hosted approximately 375 participants per day. A total of 168 questionnaires were completed. The questionnaire aimed to assess sociodemographic status, disease patterns, and current use of new media (ie, Internet, mobile phone, and mobile phone apps) in breast cancer patients. Habits and frequency of use for these new technologies, as well as patients’ affinity towards eHealth and mHealth tools for therapy management improvement, were investigated. Results Almost all participants used the Internet (95.8%, 161/168), with 91.5% (151/165) also utilizing this technology for health-related issues. Approximately 23% (38/168) of respondents owned a mobile phone. When asked about their preferences for therapy assistance, 67.3% (113/168) of respondents were interested in assistance via the Internet, 25.0% (42/168) via mobile phone, and 73.2% (123/168) via call center. Patients diagnosed with breast cancer <5 years before the survey were significantly more interested in a call center than patients diagnosed >5 years before survey participation. Conclusions The vast majority of breast cancer patients accept the Internet for therapy assistance, which indicates that eHealth is a promising medium to improve patient-physician communication. Such technologies may improve individual disease management and ultimately lead to an enhanced adherence to therapy regimens. PMID:28410189

  17. [Internet and cell phone addiction: passing fad or disorder?].

    PubMed

    Sanchez-Carbonell, Xavier; Beranuy, Marta; Castellana, Montserrat; Chamarro, Ander; Oberst, Ursula

    2008-01-01

    The Information and Communication Technologies (ICT) generate new styles of meeting people or connecting with friends or strangers. In this context, the internet and the mobile phone deserve special attention. This article deals with the maladaptive use of these technologies. By reviewing the literature published between 1991 and 2005 and indexed in the databases of PsycINFO, Medline, Psicodoc, IME, and ISOC, we aim to determine whether maladaptive use of these technologies can be considered a mental disorder, and if so, of which type. We describe the psychological phenomena of maladaptive use of the internet and mobile phones, we review research on prevalence and possible risk groups, and finally we discuss some of the criticisms made with regard to the existence and classification of this disorder. It is concluded that excessive use of the internet can lead to a mental disorder of the addictive type, which can particularly affect individuals with special emotional needs, as well as adolescents and young adults. Among specific applications of the internet, a major risk is found for the use of communicative and synchronic applications, such as chats and online role games, since they permit hyperpersonal communication, playing with different identities, and projections and dissociation without consequences in real life. Furthermore, the internet can play an important role in the development and maintenance of other addictions, such as pathological gambling and sex addiction. In contrast to the case of the internet, maladaptive use of mobile phones may be considered abuse, but not addiction, since their use does not lead to the rapid emotional changes or the playing with identities that can take place in chats and online role games.

  18. Research Networks and Technology Migration (RESNETSII)

    DTIC Science & Technology

    2004-07-01

    Laboratory (LBNL), The International Computer Science Institute (ICSI) Center for Internet Research (ICIR) DARWIN Developing protocols and...degradation in network loss, delay and throughput AT&T Center for Internet Research at ICSI (ACIRI), AT&T Labs-Research, University Of Massachusetts

  19. Operating CFDP in the Interplanetary Internet

    NASA Technical Reports Server (NTRS)

    Burleigh, S.

    2002-01-01

    This paper examines the design elements of CCSDS File Delivery Protocol and Interplanetary Internet technologies that will simplify their integration and discusses the resulting new capabilities, such as efficient transmission of large files via multiple relay satellites operating in parallel.

  20. Using an Existential Psychotherapy Framework to Assist Students in Mindful Internet Use

    ERIC Educational Resources Information Center

    Eells, Gregory T.

    2016-01-01

    The use of the mobile Internet continues to play an increasing role in all of our lives and particularly in the lives of college and university students. Questions have been raised about the impact of the Internet on adolescents' and college students' fulfillment of traditional developmental tasks and more broadly their mental health. The present…

  1. Adding tools to the open source toolbox: The Internet

    NASA Technical Reports Server (NTRS)

    Porth, Tricia

    1994-01-01

    The Internet offers researchers additional sources of information not easily available from traditional sources such as print volumes or commercial data bases. Internet tools such as e-mail and file transfer protocol (ftp) speed up the way researchers communicate and transmit data. Mosaic, one of the newest additions to the Internet toolbox, allows users to combine tools such as ftp, gopher, wide area information server, and the world wide web with multimedia capabilities. Mosaic has quickly become a popular means of making information available on the Internet because it is versatile and easily customizable.

  2. M/A-COM linkabit eastern operations

    NASA Astrophysics Data System (ADS)

    Mills, D. L.; Avramovic, Z.

    1983-03-01

    This first Quarterly Project Report on LINKABIT's contribution to the Defense Advanced Research Projects Agency (DARPA) Internet Program covers the period from 22 December 1982 through 21 March 1983. LINKABIT's support of the Internet Program is concentrated in the areas of protocol design, implementation, testing, and evaluation. In addition, LINKABIT staff are providing integration and support services for certain computer systems to be installed at DARPA sites in Washington, D.C., and Stuttgart, West Germany. During the period covered by this report, LINKABIT organized the project activities and established staff responsibilities. Several computers and peripheral devices were made available from Government sources for use in protocol development and network testing. Considerable time was devoted to installing this equipment, integrating the software, and testing it with the Internet system.

  3. Older Adult Self-Efficacy Study of Mobile Phone Diabetes Management.

    PubMed

    Quinn, Charlene C; Khokhar, Bilal; Weed, Kelly; Barr, Erik; Gruber-Baldini, Ann L

    2015-07-01

    The purpose of this study was to evaluate participant self-efficacy and use of a mobile phone diabetes health intervention for older adults during a 4-week period. Participants included seven adults (mean age, 70.3 years) with type 2 diabetes cared for by community-based primary care physicians. Participants entered blood glucose data into a mobile phone and personalized patient Internet Web portal. Based on blood glucose values, participants received automatic messages and educational information to self-manage their diabetes. Study measures included prior mobile phone/Internet use, the Stanford Self-Efficacy for Diabetes Scale, the Stanford Energy/Fatigue Scale, the Short Form-36, the Patient Health Questionnaire-9 (depression), the Patient Reported Diabetes Symptom Scale, the Diabetes Stages of Change measure, and a summary of mobile system use. Participants had high self-efficacy and high readiness and confidence in their ability to monitor changes to control their diabetes. Participants demonstrated ability to use the mobile intervention and communicate with diabetes educators.

  4. Older Adult Self-Efficacy Study of Mobile Phone Diabetes Management

    PubMed Central

    Khokhar, Bilal; Weed, Kelly; Barr, Erik; Gruber-Baldini, Ann L.

    2015-01-01

    Abstract The purpose of this study was to evaluate participant self-efficacy and use of a mobile phone diabetes health intervention for older adults during a 4-week period. Participants included seven adults (mean age, 70.3 years) with type 2 diabetes cared for by community-based primary care physicians. Participants entered blood glucose data into a mobile phone and personalized patient Internet Web portal. Based on blood glucose values, participants received automatic messages and educational information to self-manage their diabetes. Study measures included prior mobile phone/Internet use, the Stanford Self-Efficacy for Diabetes Scale, the Stanford Energy/Fatigue Scale, the Short Form-36, the Patient Health Questionnaire-9 (depression), the Patient Reported Diabetes Symptom Scale, the Diabetes Stages of Change measure, and a summary of mobile system use. Participants had high self-efficacy and high readiness and confidence in their ability to monitor changes to control their diabetes. Participants demonstrated ability to use the mobile intervention and communicate with diabetes educators. PMID:25692373

  5. Internet Technology for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Hennessy, Joseph F. (Technical Monitor); Rash, James; Casasanta, Ralph; Hogie, Keith

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively. This paper describes how an IP-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  6. HotJava: Sun's Animated Interactive World Wide Web Browser for the Internet.

    ERIC Educational Resources Information Center

    Machovec, George S., Ed.

    1995-01-01

    Examines HotJava and Java, World Wide Web technology for use on the Internet. HotJava, an interactive, animated Web browser, based on the object-oriented Java programming language, is different from HTML-based browsers such as Netscape. Its client/server design does not understand Internet protocols but can dynamically find what it needs to know.…

  7. Privacy & Security Notice | Argonne National Laboratory

    Science.gov Websites

    server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The

  8. Continued Development of Internet Protocols under the IBM OS/MVS operating System

    DTIC Science & Technology

    1986-03-10

    this contract, the UCLA Office of Academic Computing (OAC) continued its participation in the Internet research effort of * DARPA. OAC’s effort has...is adapted and condensed from TR51. 1.2 NAME RESOLVER The Internet research community is installing a system of name resolvers and name servers...several attributes favoring their use within the ACP. • The "C" language is heavily used within the DARPA Internet research community, giving it an

  9. An Agent Based Collaborative Simplification of 3D Mesh Model

    NASA Astrophysics Data System (ADS)

    Wang, Li-Rong; Yu, Bo; Hagiwara, Ichiro

    Large-volume mesh model faces the challenge in fast rendering and transmission by Internet. The current mesh models obtained by using three-dimensional (3D) scanning technology are usually very large in data volume. This paper develops a mobile agent based collaborative environment on the development platform of mobile-C. Communication among distributed agents includes grasping image of visualized mesh model, annotation to grasped image and instant message. Remote and collaborative simplification can be efficiently conducted by Internet.

  10. Securing the Internet frontier.

    PubMed

    Morrissey, J

    1996-10-21

    Just as in the Wild West, security strategies are being mobilized for the untamed Internet frontier. Technology developed by settlers from the banking and merchandising industries is being retooled for healthcare, where security-conscious industries see a big market opportunity.

  11. 76 FR 50231 - Mobile Medical Applications Draft Guidance; Public Workshop

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ... p.m. on September 9, 2011. For those without Internet access, please call the contact person to... will be posted, as it becomes available, on the Internet at http://www.fda.gov/MedicalDevices/News...

  12. Literacy disparities in patient access and health-related use of Internet and mobile technologies.

    PubMed

    Bailey, Stacy C; O'Conor, Rachel; Bojarski, Elizabeth A; Mullen, Rebecca; Patzer, Rachel E; Vicencio, Daniel; Jacobson, Kara L; Parker, Ruth M; Wolf, Michael S

    2015-12-01

    Age and race-related disparities in technology use have been well documented, but less is known about how health literacy influences technology access and use. To assess the association between patients' literacy skills and mobile phone ownership, use of text messaging, Internet access, and use of the Internet for health-related purposes. A secondary analysis utilizing data from 1077 primary care patients enrolled in two, multisite studies from 2011-2013. Patients were administered an in-person, structured interview. Patients with adequate health literacy were more likely to own a mobile phone or smartphone in comparison with patients having marginal or low literacy (mobile phone ownership: 96.8 vs. 95.2 vs. 90.1%, respectively, P < 0.001; smartphone ownership: 70.6 vs. 62.5 vs. 40.1%, P < 0.001) and to report text messaging (78.6 vs. 75.2 vs. 53.1%, P < 0.001). They were also more likely to have access to the Internet from their home (92.1 vs. 74.7 vs. 44.9%, P < 0.001) and to report using the Internet for email (93.0 vs. 75.7 vs. 38.5%, P < 0.001), browsing the web (93.9 vs. 80.2 vs. 44.5%, P < 0.001), accessing health information (86.3 vs. 75.5 vs. 40.8%, P < 0.001), and communicating with providers (54.2 vs. 29.8 vs. 13.0%, P < 0.001). Relationships remained significant in multivariable analyses controlling for relevant covariates. Results reveal that literacy-related disparities in technology access and use are widespread, with lower literate patients being less likely to own smartphones or to access and use the Internet, particularly for health reasons. Future interventions should consider these disparities and ensure that health promotion activities do not further exacerbate disparities. © 2014 John Wiley & Sons Ltd.

  13. The Effect of Mobile Portfolio (M-Portfolio) Supported Mastery Learning Model on Students' Achievement and Their Attitudes towards Using Internet

    ERIC Educational Resources Information Center

    Ozdemir, Oguzhan; Erdemci, Husamettin

    2017-01-01

    The term mobile portfolio refers to creating, evaluating and sharing portfolios in mobile environments. Many of the states that pose an obstacle for portfolio usage are now extinguished through mobile portfolios. The aim in this research is to determine the effect of mobile portfolio supported mastery learning model on students' success and…

  14. Investigating the Determinants and Age and Gender Differences in the Acceptance of Mobile Learning

    ERIC Educational Resources Information Center

    Wang, Yi-Shun; Wu, Ming-Cheng; Wang, Hsiu-Yuan

    2009-01-01

    With the proliferation of mobile computing technology, mobile learning (m-learning) will play a vital role in the rapidly growing electronic learning market. M-learning is the delivery of learning to students anytime and anywhere through the use of wireless Internet and mobile devices. However, acceptance of m-learning by individuals is critical…

  15. Investigating Students' Behavioural Intention to Adopt and Use Mobile Learning in Higher Education in East Africa

    ERIC Educational Resources Information Center

    Mtebe, Joel S.; Raisamo, Roope

    2014-01-01

    Recent penetration of mobile technologies and its services in East Africa has provided a new platform for institutions to widen access to education through mobile learning. Mobile technologies provide learners with flexibility and ubiquity to learn anytime and anywhere via wireless Internet. However, far too little research has been conducted to…

  16. The Need to Address Mobile Device Security in the Higher Education IT Curriculum

    ERIC Educational Resources Information Center

    Patten, Karen P.; Harris, Mark A.

    2013-01-01

    Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…

  17. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  18. Architectural and engineering issues for building an optical Internet

    NASA Astrophysics Data System (ADS)

    St. Arnaud, Bill

    1998-10-01

    Recent developments in high density Wave Division Multiplexing fiber systems allows for the deployment of a dedicated optical Internet network for large volume backbone pipes that does not require an underlying multi-service SONET/SDH and ATM transport protocol. Some intrinsic characteristics of Internet traffic such as its self similar nature, server bound congestion, routing and data asymmetry allow for highly optimized traffic engineered networks using individual wavelengths. By transmitting GigaBit Ethernet or SONET/SDH frames natively over WDM wavelengths that directly interconnect high performance routers the original concept of the Internet as an intrinsically survivable datagram network is possible. Traffic engineering, restoral, protection and bandwidth management of the network must now be carried out at the IP layer and so new routing or switching protocols such as MPLS that allow for uni- directional paths with fast restoral and protection at the IP layer become essential for a reliable production network. The deployment of high density WDM municipal and campus networks also gives carriers and ISPs the flexibility to offer customers as integrated and seamless set of optical Internet services.

  19. One-Time URL: A Proximity Security Mechanism between Internet of Things and Mobile Devices

    PubMed Central

    Solano, Antonio; Dormido, Raquel; Duro, Natividad; González, Víctor

    2016-01-01

    The aim of this paper is to determine the physical proximity of connected things when they are accessed from a smartphone. Links between connected things and mobile communication devices are temporarily created by means of dynamic URLs (uniform resource locators) which may be easily discovered with pervasive short-range radio frequency technologies available on smartphones. In addition, a multi cross domain silent logging mechanism to allow people to interact with their surrounding connected things from their mobile communication devices is presented. The proposed mechanisms are based in web standards technologies, evolving our social network of Internet of Things towards the so-called Web of Things. PMID:27754378

  20. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    PubMed

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  1. Generic Module for Collecting Data in Smart Cities

    NASA Astrophysics Data System (ADS)

    Martinez, A.; Ramirez, F.; Estrada, H.; Torres, L. A.

    2017-09-01

    The Future Internet brings new technologies to the common life of people, such as Internet of Things, Cloud Computing or Big Data. All this technologies have change the way people communicate and also the way the devices interact with the context, giving rise to new paradigms, as the case of smart cities. Currently, the mobile devices represent one of main sources of information for new applications that take into account the user context, such as apps for mobility, health, of security. Several platforms have been proposed that consider the development of Future Internet applications, however, no generic modules can be found that implement the collection of context data from smartphones. In this research work we present a generic module to collect data from different sensors of the mobile devices and also to send, in a standard manner, this data to the Open FIWARE Cloud to be stored or analyzed by software tools. The proposed module enables the human-as-a-sensor approach for FIWARE Platform.

  2. What is harmful for male fertility: cell phone or the wireless Internet?

    PubMed

    Yildirim, Mehmet Erol; Kaynar, Mehmet; Badem, Huseyin; Cavis, Mucahıt; Karatas, Omer Faruk; Cimentepe, Ersın

    2015-09-01

    In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless Internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively). The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively). In line with the total motile sperm count, progressive motile sperm count also decreased with wireless Internet usage compared with the wired Internet connection usage (p = 0.009 and p = 0.018, respectively). There was a negative correlation between wireless Internet usage duration and the total sperm count (r = -0.089, p = 0.039). We have also explored the negative effect of wireless Internet use on sperm motility according to our preliminary results. Copyright © 2015. Published by Elsevier Taiwan.

  3. Utilization of communication technology by patients enrolled in substance abuse treatment

    PubMed Central

    McClure, Erin A.; Acquavita, Shauna; Harding, Emily; Stitzer, Maxine

    2012-01-01

    Background Technology-based applications represent a promising method for providing efficacious, widely available interventions to substance abuse treatment patients. However, limited access to communication technology (i.e., mobile phones, computers, internet, and e-mail) could significantly impact the feasibility of these efforts, and little is known regarding technology utilization in substance abusing populations. Methods A survey was conducted to characterize utilization of communication technology in 266 urban, substance abuse treatment patients enrolled at eight drug-free, psychosocial or opioid-replacement therapy clinics. Results Survey participants averaged 41 years of age and 57% had a yearly household income of less than $15,000. The vast majority reported access to a mobile phone (91%), and to SMS text messaging (79%). Keeping a consistent mobile phone number and yearly mobile contract was higher for White participants, and also for those with higher education, and enrolled in drug-free, psychosocial treatment. Internet, e-mail, and computer use was much lower (39–45%), with younger age, higher education and income predicting greater use. No such differences existed for the use of mobile phones however. Conclusions Concern regarding the digital divide for marginalized populations appears to be disappearing with respect to mobile phones, but still exists for computer, internet, and e-mail access and use. Results suggest that mobile phone and texting applications may be feasibly applied for use in program-client interactions in substance abuse treatment. Careful consideration should be given to frequent phone number changes, access to technology, and motivation to engage with communication technology for treatment purposes. PMID:23107600

  4. Utilization of communication technology by patients enrolled in substance abuse treatment.

    PubMed

    McClure, Erin A; Acquavita, Shauna P; Harding, Emily; Stitzer, Maxine L

    2013-04-01

    Technology-based applications represent a promising method for providing efficacious, widely available interventions to substance abuse treatment patients. However, limited access to communication technology (i.e., mobile phones, computers, internet, and e-mail) could significantly impact the feasibility of these efforts, and little is known regarding technology utilization in substance abusing populations. A survey was conducted to characterize utilization of communication technology in 266 urban, substance abuse treatment patients enrolled at eight drug-free, psychosocial or opioid-replacement therapy clinics. Survey participants averaged 41 years of age and 57% had a yearly household income of less than $15,000. The vast majority reported access to a mobile phone (91%), and to SMS text messaging (79%). Keeping a consistent mobile phone number and yearly mobile contract was higher for White participants, and also for those with higher education, and enrolled in drug-free, psychosocial treatment. Internet, e-mail, and computer use was much lower (39-45%), with younger age, higher education and income predicting greater use. No such differences existed for the use of mobile phones however. Concern regarding the digital divide for marginalized populations appears to be disappearing with respect to mobile phones, but still exists for computer, internet, and e-mail access and use. Results suggest that mobile phone and texting applications may be feasibly applied for use in program-client interactions in substance abuse treatment. Careful consideration should be given to frequent phone number changes, access to technology, and motivation to engage with communication technology for treatment purposes. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  5. Treatment of Internet Addiction with Anxiety Disorders: Treatment Protocol and Preliminary Before-After Results Involving Pharmacotherapy and Modified Cognitive Behavioral Therapy

    PubMed Central

    Santos, Hugo Henrique

    2016-01-01

    Background The growth of the Internet has led to significant change and has become an integral part of modern life. It has made life easier and provided innumerous benefits; however, excessive use has brought about the potential for addiction, leading to severe impairments in social, academic, financial, psychological, and work domains. Individuals addicted to the Internet usually have comorbid psychiatric disorders. Panic disorder (PD) and generalized anxiety disorder (GAD) are prevalent mental disorders, involving a great deal of damage in the patient’s life. Objective This open trial study describes a treatment protocol among 39 patients with anxiety disorders and Internet addiction (IA) involving pharmacotherapy and modified cognitive behavioral therapy (CBT). Methods Of the 39 patients, 25 were diagnosed with PD and 14 with GAD, in addition to Internet addiction. At screening, patients responded to the MINI 5.0, Hamilton Anxiety Rating Scale, Hamilton Depression Rating Scale, Clinical Global Impressions Scale, and the Young Internet Addiction Scale. At that time, IA was observed taking into consideration the IAT scale (cutoff score above 50), while anxiety disorders were diagnosed by a psychiatrist. Patients were forwarded for pharmacotherapy and a modified CBT protocol. Psychotherapy was conducted individually, once a week, over a period of 10 weeks, and results suggest that the treatment was effective for anxiety and Internet addiction. Results Before treatment, anxiety levels suggested severe anxiety, with an average score of 34.26 (SD 6.13); however, after treatment the mean score was 15.03 (SD 3.88) (P<.001). A significant improvement in mean Internet addiction scores was observed, from 67.67 (SD 7.69) before treatment, showing problematic internet use, to 37.56 (SD 9.32) after treatment (P<.001), indicating medium Internet use. With respect to the relationship between IA and anxiety, the correlation between scores was .724. Conclusions This study is the first research into IA treatment of a Brazilian population. The improvement was remarkable due to the complete engagement of patients in therapy, which contributed to the success of the treatment from a behavioral perspective, and gave patients the confidence to continue to manage Internet use in their lives. PMID:27005889

  6. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  7. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  8. The Relationship between Levels of Nomophobia Prevalence and Internet Addiction among High School Students: The Factors Influencing Nomophobia

    ERIC Educational Resources Information Center

    Gezgin, Deniz Mertkan; Cakir, Ozlem; Yildirim, Soner

    2018-01-01

    The purpose of this study is to investigate the relationship between nomophobia levels of high school students and their Internet Addiction. This study also investigates the factors including duration of smartphone and mobile Internet use that trigger and create this phenomenon. In order to explore the prevalence of nomophobia among high school…

  9. Internet Sites and Apps Available to Students Seeking Counselling, and What School Counsellors Should Know about Them

    ERIC Educational Resources Information Center

    Furlonger, Brett; Budisa, Sonja

    2016-01-01

    Consumers are increasingly turning to both the internet and apps for mental health assistance. Mobile technologies such as smart phones and tablets offer swift and anonymous access for students to internet sites and app environments. Availability, however, does not guarantee quality or credibility. This web-based pilot study was undertaken to…

  10. Use of the Internet for educational applications in prosthodontics.

    PubMed

    van Putten, M C

    1996-08-01

    Internet is the common term for the information superhighway. The Internet has become a major information resource for educational, governmental, and business institutions. This article reviews the current operation of the Internet as a background for discussing educational opportunities for instruction in prosthodontics. Electronic mail, news groups, file transfer protocol, Gopher, and network navigators are discussed. The use of the World Wide Web for educational purposes by The Ohio State University College of Dentistry Department of Restorative and Prosthetic Dentistry is described.

  11. Telehematology: a pilot experience of cytological diagnosis of acute myeloid leukemia via the Internet. A GOELAMS study.

    PubMed

    Leymarie, Vincent; Flandrin, Georges; Noguera, Maria Elena; Leymarie, Florence; Lioure, Bruno; Daliphard, Sylvie

    2006-09-01

    Although modern communication technology is well developed, telehematology does not readily lend itself to practical laboratory use. Multicenter therapeutic protocols may offer preferential opportunities. The cytologists of the AML-2001 protocol established an innovative organization to demonstrate the reliability of the diagnostic assessment of acute myeloid leukemia through a rapid and decentralized exchange of information via the internet and to define the conditions optimizing expert diagnosis. Telediagnosis appears to be a powerful tool for cytological review and other issues.

  12. DoD Needs to Reinitiate Migration to Internet Protocol Version 6 (REDACTED)

    DTIC Science & Technology

    2014-12-01

    whether DoD was effectively migrating to Internet Protocol Version 6 ( IPv6 ). Finding Although DoD satisfied the requirement to demonstrate IPv6 on the...enterprise network to IPv6 . This occurred because: • DoD Chief Information Officer (CIO) and U.S. Cyber Command (USCYBERCOM) did not make IPv6 a...resources to further DoD-wide transition toward IPv6 ; and • DoD CIO did not have a current plan of action and milestones to advance DoD IPv6 migration

  13. mPano: cloud-based mobile panorama view from single picture

    NASA Astrophysics Data System (ADS)

    Li, Hongzhi; Zhu, Wenwu

    2013-09-01

    Panorama view provides people an informative and natural user experience to represent the whole scene. The advances on mobile augmented reality, mobile-cloud computing, and mobile internet can enable panorama view on mobile phone with new functionalities, such as anytime anywhere query where a landmark picture is and what the whole scene looks like. To generate and explore panorama view on mobile devices faces significant challenges due to the limitations of computing capacity, battery life, and memory size of mobile phones, as well as the bandwidth of mobile Internet connection. To address the challenges, this paper presents a novel cloud-based mobile panorama view system that can generate and view panorama-view on mobile devices from a single picture, namely "Pano". In our system, first, we propose a novel iterative multi-modal image retrieval (IMIR) approach to get spatially adjacent images using both tag and content information from the single picture. Second, we propose a cloud-based parallel server synthing approach to generate panorama view in cloud, against today's local-client synthing approach that is almost impossible for mobile phones. Third, we propose predictive-cache solution to reduce latency of image delivery from cloud server to the mobile client. We have built a real mobile panorama view system and perform experiments. The experimental results demonstrated the effectiveness of our system and the proposed key component technologies, especially for landmark images.

  14. Assessment of the suitability of public mobile data networks for aircraft telemetry and control purposes

    NASA Astrophysics Data System (ADS)

    Gonzalez, F.; Walker, R.; Rutherford, N.; Turner, C.

    2011-04-01

    This paper provides a review of the state of the art of relevant work on the use of public mobile data networks for aircraft telemetry and control proposes. Moreover, it describes the characterisation for airborne uses of the public mobile data communication systems known broadly as 3G. The motivation for this study was to explore how this mature public communication systems could be used for aviation purposes. An experimental system was fitted to a light aircraft to record communication latency, line speed, RF level, packet loss and cell tower identifier. Communications was established using internet protocols and connection was made to a local server. The aircraft was flown in both remote and populous areas at altitudes up to 8500 ft in a region located in South East Queensland, Australia. Results show that the average airborne RF levels are better than those on the ground by 21% and in the order of -77 dbm. Latencies were in the order of 500 ms (1/2 the latency of Iridium), an average download speed of 0.48 Mb/s, average uplink speed of 0.85 Mb/s, a packet of information loss of 6.5%. The maximum communication range was also observed to be 70 km from a single cell station. The paper also describes possible limitations and utility of using such communications architecture for both manned and unmanned aircraft systems.

  15. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  16. Secure Data Aggregation Protocol for M2M Communications

    DTIC Science & Technology

    2015-03-24

    networking and collaboration among various devices has experienced tremendous growth. To adapt to the trend, the concept of Internet of Things ( IoT ... IoTs ): Models, Algorithms, and Implementations, accepted Title: “Privacy-Preserving Time-Series Data Aggregation for Internet of Things ” Date...public release; distribution is unlimited. (5) Privacy-Preserving Time-Series Data Aggregation for Internet of Things Abstract In recent years, the

  17. The relationships between behavioral addictions and the five-factor model of personality.

    PubMed

    Andreassen, Cecilie Schou; Griffiths, Mark D; Gjertsen, Siri Renate; Krossbakken, Elfrid; Kvam, Siri; Pallesen, Ståle

    2013-06-01

    Aims Although relationships between addiction and personality have previously been explored, no study has ever simultaneously investigated the interrelationships between several behavioral addictions, and related these to the main dimensions of the five-factor model of personality. Methods In this study, 218 university students completed questionnaires assessing seven different behavioral addictions (i.e., Facebook addiction, video game addiction, Internet addiction, exercise addiction, mobile phone addiction, compulsive buying, and study addiction) as well as an instrument assessing the main dimensions of the five-factor model of personality. Results Of the 21 bivariate intercorrelations between the seven behavioral addictions, all were positive (and nine significantly). The results also showed that (i) Neuroticism was positively associated with Internet addiction, exercise addiction, compulsive buying, and study addiction, (ii) Extroversion was positively associated with Facebook addiction, exercise addiction, mobile phone addiction, and compulsive buying, (iii) Openness to experience was negatively associated with Facebook addiction and mobile phone addiction, (iv) Agreeableness was negatively associated with Internet addiction, exercise addiction, mobile phone addiction, and compulsive buying, and (v) Conscientiousness was negatively associated with Facebook addiction, video game addiction, Internet addiction, and compulsive buying and positively associated with exercise addiction and study addiction. Conclusions The positive associations between the seven behavioral addictions suggest one or several underlying pathological factors. Hierarchical multiple regressions showed that personality traits explained between 6% and 17% of the variance in the seven behavioral addictions, suggesting that personality to a varying degree explains scores on measures of addictive behaviors.

  18. Language Learning Podcasts and Learners' Belief Change

    ERIC Educational Resources Information Center

    Basaran, Süleyman; Cabaroglu, Nese

    2014-01-01

    The ubiquitous use of Internet-based mobile devices in educational contexts means that mobile learning has become a plausible alternative to or a good complement for conventional classroom-based teaching. However, there is a lack of research that explores and defines the characteristics and effects of mobile language learning (LL) through language…

  19. NOAA Weather Wire Service

    Science.gov Websites

    & Imagery; includes NWS alerts and warnings No 6 Wireless Emergency Alerts (WEA) Mobile Phone Alerts & Warnings only No 7 Interactive NWS (iNWS) - NOTE 1 https://inws.ncep.noaa.gov/ Mobile Phone $$$$) Internet/ Mobile Phone Alerts and Warnings No 15 County or Local Emergency Management Telephone alert

  20. The Nokia Story of Using Action Learning

    ERIC Educational Resources Information Center

    Ropponen, Timo

    2008-01-01

    Nokia is the world leader in mobility, driving the transformation and growth of the converging Internet and communications industries. A truly global business, Nokia makes a wide range of mobile devices and provides people with experiences in music, navigation, video, television, imaging, games and business mobility through these devices. Nokia…

  1. Factors Affecting Mobile Banking Adoption in the United States

    ERIC Educational Resources Information Center

    Engwanda, Michel Ndongola

    2014-01-01

    Mobile banking (m-banking) allows consumers to conduct financial transactions without temporal and spatial constraints through Internet-enabled mobile devices such as smartphones. The adoption patterns are of particular research interest because m-banking penetration has been relatively low even though smartphones are the most dominant forms of…

  2. Assessing Teaching Skills with a Mobile Simulation

    ERIC Educational Resources Information Center

    Gibson, David

    2013-01-01

    Because mobile technologies are overtaking personal computers as the primary tools of Internet access, and cloud-based resources are fundamentally transforming the world's knowledge, new forms of teaching and assessment are required to foster 21st century literacies, including those needed by K-12 teachers. A key feature of mobile technology…

  3. Glossary of Internet Terms.

    ERIC Educational Resources Information Center

    Microcomputers for Information Management, 1995

    1995-01-01

    Provides definitions for 71 terms related to the Internet, including Archie, bulletin board system, cyberspace, e-mail (electronic mail), file transfer protocol, gopher, hypertext, integrated services digital network, local area network, listserv, modem, packet switching, server, telnet, UNIX, WAIS (wide area information servers), and World Wide…

  4. Potholes on the Infobahn: Hazardous Conditions Ahead?

    ERIC Educational Resources Information Center

    Laughon, Sally; Hanson, William R.

    1996-01-01

    Alerts educators to potentially objectionable Internet materials. Electronic mail, newsgroups, file transfer protocol sites, Internet Relay Chat (IRC), Multiuser Dungeons (MUDs), and Multiuser Object Oriented (MOOs) are services whose user anonymity can embolden discussions regarding sex, prejudice, religious dogma, and gambling. Teachers may wish…

  5. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  6. A Lane-Level LBS System for Vehicle Network with High-Precision BDS/GPS Positioning

    PubMed Central

    Guo, Chi; Guo, Wenfei; Cao, Guangyi; Dong, Hongbo

    2015-01-01

    In recent years, research on vehicle network location service has begun to focus on its intelligence and precision. The accuracy of space-time information has become a core factor for vehicle network systems in a mobile environment. However, difficulties persist in vehicle satellite positioning since deficiencies in the provision of high-quality space-time references greatly limit the development and application of vehicle networks. In this paper, we propose a high-precision-based vehicle network location service to solve this problem. The major components of this study include the following: (1) application of wide-area precise positioning technology to the vehicle network system. An adaptive correction message broadcast protocol is designed to satisfy the requirements for large-scale target precise positioning in the mobile Internet environment; (2) development of a concurrence service system with a flexible virtual expansion architecture to guarantee reliable data interaction between vehicles and the background; (3) verification of the positioning precision and service quality in the urban environment. Based on this high-precision positioning service platform, a lane-level location service is designed to solve a typical traffic safety problem. PMID:25755665

  7. Technology Directions for the 21st Century. Volume 3

    NASA Technical Reports Server (NTRS)

    Crimi, Giles F.; Botta, Robert; Ditanna, Thomas; Verheggen, Henry; Stancati, Michael; Feingold, Harvey; Jacobs, Mark

    1996-01-01

    New technologies will unleash the huge capacity of fiber-optic cable to meet growing demands for bandwidth. Companies will continue to replace private networks with public network bandwidth-on-demand. Although asynchronous transfer mode (ATM) is the transmission technology favored by many, its penetration will be slower than anticipated. Hybrid networks - e.g., a mix of ATM, frame relay, and fast Ethernet - may predominate, both as interim and long-term solutions, based on factors such as availability, interoperability, and cost. Telecommunications equipment and services prices will decrease further due to increased supply and more competition. Explosive Internet growth will continue, requiring additional backbone transmission capacity and enhanced protocols, but it is not clear who will fund the upgrade. Within ten years, space-based constellations of satellites in Low Earth orbit (LEO) will serve mobile users employing small, low-power terminals. 'Little LEO's' will provide packet transmission services and geo-position determination. 'Big LEO's' will function as global cellular telephone networks, with some planning to offer video and interactive multimedia services. Geosynchronous satellites also are proposed for mobile voice grade links and high-bandwidth services. NASA may benefit from resulting cost reductions in components, space hardware, launch services, and telecommunications services.

  8. Learning and Teaching with Mobile Devices: An Approach in Higher Secondary Education in Ghana

    ERIC Educational Resources Information Center

    Grimus, Margarete; Ebner, Martin

    2015-01-01

    While many developing nations find Internet-based e-learning unsuitable for their needs mobile learning methods--specifically those involving the use of mobile-phones for both formal and informal learning--hold great promise for them (Grimus et al, 2013b). In this paper chances and challenges introduced by mobile devices to support improvement and…

  9. Study and Simulation of Enhancements for TCP (Transmission Control Protocol) Performance Over Noisy, High-Latency Links

    NASA Technical Reports Server (NTRS)

    Shepard, Timothy J.; Partridge, Craig; Coulter, Robert

    1997-01-01

    The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.

  10. Secure voice-based authentication for mobile devices: vaulted voice verification

    NASA Astrophysics Data System (ADS)

    Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.

    2013-05-01

    As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.

  11. Moving beyond the current state of the internet

    NASA Astrophysics Data System (ADS)

    Chen, Edward S.; Davison, Daniel B.

    1997-06-01

    Whereas the Internet has been greatly publicized in the past few years, its effects on education are still largely unexplored. Here, we discuss the future of the Internet itself and the effect on education. Expanding educational and commercial requirements will result in improved bandwidth and connectivity. Larger address spaces will be required, and the next generation of Internet Protocols will provide the addressability required. The real question—how will all of these changes affect education—is explored here. We believe that Internet resources will be a superb supplement to education, but not replace either tutored learning or written texts.

  12. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol

    PubMed Central

    Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.

    2015-01-01

    Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. PMID:26023213

  13. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.

    PubMed

    Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S

    2015-10-01

    Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. © 2015 American Physical Therapy Association.

  14. Get+Connected: Development and Pilot Testing of an Intervention to Improve Computer and Internet Attitudes and Internet Use Among Women Living With HIV.

    PubMed

    Seplovich, Gabriela; Horvath, Keith J; Haughton, Lorlette J; Blackstock, Oni J

    2017-03-31

    For persons living with chronic medical conditions, the Internet can be a powerful tool for health promotion, and allow for immediate access to medical information and social support. However, women living with human immunodeficiency virus (HIV) in the United States face numerous barriers to computer and Internet use. Health behavior change models suggest that the first step towards adopting a new health behavior is to improve attitudes towards that behavior. To develop and pilot test Get+Connected, an intervention to improve computer and Internet attitudes and Internet use among women living with HIV. To develop Get+Connected, we reviewed the extant literature, adapted an existing curriculum, and conducted a focus group with HIV-positive women (n=20) at a community-based organization in the Bronx, New York. Get+Connected was comprised of five weekly sessions covering the following topics: basic computer knowledge and skills, identifying reliable health-related websites, setting up and using email and Facebook accounts, and a final review session. We recruited 12 women to participate in pilot testing. At baseline, we collected data about participants' sociodemographic information, clinical characteristics, and technology device ownership and use. At baseline, intervention completion, and three months postintervention, we collected data regarding attitudes towards computers and the Internet (Attitudes Towards Computers and the Internet Questionnaire [ATCIQ]; possible scores range from 5-50) as well as frequency of Internet use (composite measure). To examine changes in ATCIQ scores and Internet use over time, we used generalized estimating equations. We also collected qualitative data during intervention delivery. Among women in our sample, the median age was 56 years (interquartile range=52-63). All participants were black/African American and/or Latina. Seven participants (7/12, 58%) had a high school diploma (or equivalent) or higher degree. Ten participants (10/12, 83%) reported owning a mobile phone, while only one (1/12, 8%) reported owning a computer or tablet. Only one participant (1/12, 8%) reported having ever used the Internet or email. Internet nonusers cited lack of computer/Internet knowledge (6/11, 54%) and lack of access to a computer or similar device (4/11, 36%) as the main barriers to use. Over time, we observed an improvement in attitudes towards computers and the Internet (ATCIQ scores: 33.5 at baseline, 35 at intervention completion, and 36 at three months postintervention; P=.008). No significant increase in Internet use was observed (P=.61). Qualitative findings indicated excitement and enthusiasm for the intervention. In our sample of urban, technology-inexperienced HIV-positive women, participation in Get+Connected was associated with an improvement in attitudes towards computers and the Internet, but not Internet use. Changing attitudes is the first step in many health behavior change models, indicating that with improved access to computer and Internet resources, frequency of Internet use may also have increased. Future studies should consider addressing issues of access to technology in conjunction with Get+Connected. ©Gabriela Seplovich, Keith J Horvath, Lorlette J Haughton, Oni J Blackstock. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 31.03.2017.

  15. Finding and Evaluating Online Resources on Complementary Health Approaches

    MedlinePlus

    ... it selling something? Finding Health Information on the Internet: How To Start To find accurate health information, ... thousands of mobile apps (a software program you access using your phone or other mobile device) that ...

  16. Online Tracking

    MedlinePlus

    ... used to track you on all kinds of internet-connected devices that have browsers, such as smart phones, tablets, laptop and desktop computers. How does tracking in mobile apps occur? When you access mobile applications, companies don’t have access to ...

  17. Networking Foundations for Collaborative Computing at Internet Scope

    DTIC Science & Technology

    2006-01-01

    network-supported synchronous multime- dia groupwork at Internet scope and for large user groups. Contributions entail an novel classification for...multimedia resources in interactive groupwork , generalized to the domain of CSCW from the “right to speak” [26]. A floor control protocol mediates access to

  18. Collecting and Animating Online Satellite Images.

    ERIC Educational Resources Information Center

    Irons, Ralph

    1995-01-01

    Describes how to generate automated classroom resources from the Internet. Topics covered include viewing animated satellite weather images using file transfer protocol (FTP); sources of images on the Internet; shareware available for viewing images; software for automating image retrieval; procedures for animating satellite images; and storing…

  19. Internet-Based Acceptance and Commitment Therapy for Psychological Distress Experienced by People With Hearing Problems: Study Protocol for a Randomized Controlled Trial.

    PubMed

    Molander, Peter; Hesser, Hugo; Weineland, Sandra; Bergwall, Kajsa; Buck, Sonia; Hansson-Malmlöf, Johan; Lantz, Henning; Lunner, Thomas; Andersson, Gerhard

    2015-09-01

    Psychological distress and psychiatric symptoms are prevalent among people with hearing loss or other audiological conditions, but psychological interventions for these groups are rare. This article describes the study protocol for a randomized controlled trial for evaluating the effect of a psychological treatment delivered over the Internet for individuals with hearing problems and concurrent psychological distress. Participants who are significantly distressed will be randomized to either an 8-week Internet-delivered acceptance-based cognitive behavioral therapy (i.e., acceptance and commitment therapy [ACT]), or wa it-list control. We aim to include measures of distress associated with hearing difficulties, anxiety, and depression. In addition, we aim to measure acceptance associated with hearing difficulties as well as quality of life. The results of the trial may further our understanding of how to best treat people who present problems with both psychological distress and hearing in using the Internet.

  20. Improving Service Management in the Internet of Things

    PubMed Central

    Sammarco, Chiara; Iera, Antonio

    2012-01-01

    In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for research on IP-based constrained networks. Through a simplification of the whole TCP/IP stack, resource constrained nodes become direct interlocutors of application level entities in every point of the network. In this paper we analyze some side effects of this solution, when in the presence of large amounts of data to transmit. In particular, we conduct a performance analysis of the Constrained Application Protocol (CoAP), a widely accepted web transfer protocol for the Internet of Things, and propose a service management enhancement that improves the exploitation of the network and node resources. This is specifically thought for constrained nodes in the abovementioned conditions and proves to be able to significantly improve the node energetic performance when in the presence of large resource representations (hence, large data transmissions).

Top