Academic literature on the topic 'End-to-end services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'End-to-end services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "End-to-end services"

1

Immaneni, Jayaram. "End-to-End MLOps in Financial Services: Resilient Machine Learning with Kubernetes." International Journal of Science and Research (IJSR) 11, no. 10 (October 27, 2022): 1459–67. https://doi.org/10.21275/sr221013093711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Aldington, D. J., H. J. McQuay, and R. A. Moore. "End-to-end military pain management." Philosophical Transactions of the Royal Society B: Biological Sciences 366, no. 1562 (January 27, 2011): 268–75. http://dx.doi.org/10.1098/rstb.2010.0214.

Full text
Abstract:
The last three years have seen significant changes in the Defence Medical Services approach to trauma pain management. This article seeks to outline these changes that have occurred at every level of the casualty's journey along the chain of evacuation, from the point of injury to rehabilitation and either continued employment in the Services or to medical discharge. Particular attention is paid to the evidence for the interventions used for both acute pain and chronic pain management. Also highlighted are possible differences in pain management techniques between civilian and military casualties.
APA, Harvard, Vancouver, ISO, and other styles
3

GUPTA, APARNA, and LINGYI ZHANG. "PRICING FOR END-TO-END ASSURED BANDWIDTH SERVICES." International Journal of Information Technology & Decision Making 07, no. 02 (June 2008): 361–89. http://dx.doi.org/10.1142/s021962200800296x.

Full text
Abstract:
The Internet today mostly offers a simple best-effort mode of service. The capabilities of the Internet will be significantly enhanced if it supports better QoS modes, especially when QoS is provided for end-to-end services. This enhancement requires both technological development and economic mechanisms to support better QoS service modes. In this article, we study a Multi-ISP Overlay Provider's (MOP's) pricing problem for delivering end-to-end services with expected bandwidth assurance. A categorization based pricing scheme is developed, where end-to-end bandwidth services are classified based on the provider's efforts in delivering the services. A nonlinear pricing based model is constructed that interacts with network management infrastructure, responds to customer demand and captures the MOP's contractual relationships with Internet Service Provider (ISP) networks used for creating the MOP's services.
APA, Harvard, Vancouver, ISO, and other styles
4

Gaikwad, Ms Sayali, and Dr R. R. Dube. "Enhancing Email Security - End to End Encryption." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1026–28. http://dx.doi.org/10.22214/ijraset.2024.59921.

Full text
Abstract:
Abstract: Nowadays, most of people and organizations use the e-mail for different needs to exchange information between users. E-mail application is an important network application. It is significant when business1, health and educational communities use it for exchange of critical information such as business information, health patient record and so on. over the Internet or internal networks, It allows data and messages to be transferred easily between senders and receivers allowing messages to be received, responded to, stored, forwarded and broadcast among recipients. These extensive capabilities have caused the email to be widely adopted as the official communications method for many organizations. Also common for personal use, electronic mail is available through a diverse number of compatible software clients, and also via web-browser. An existing enterprise email implementation second service model adds security processing. The service provider is responsible for monitoring all threats using email as a channel , and for providing an email user interface (UI) In the enterprise augmentation model, an existing on-premise email deployment is augmented by additional cloud-based services and functionalist. This paper explores identity federation and data loss prevention and describing best practices for evaluating, developing, installing and using cloud-based email security services.1.1Intended Audience Email security services are viewed from two perspectives: the providers of these services and the consumers or purchasers of email security services. key service features is needed for both sides to be aware of and plan for and how these features are used to tackle threats to email security.
APA, Harvard, Vancouver, ISO, and other styles
5

Calvert, Kenneth L., James Griffioen, and Su Wen. "Lightweight network support for scalable end-to-end services." ACM SIGCOMM Computer Communication Review 32, no. 4 (October 2002): 265–78. http://dx.doi.org/10.1145/964725.633051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Asthana, Abhaya, Eric J. Bauer, Meenakshi Sharma, and Xuemei Zhang. "End-to-end availability considerations for services over IMS." Bell Labs Technical Journal 11, no. 3 (November 8, 2006): 199–210. http://dx.doi.org/10.1002/bltj.20189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cancela, Héctor, Pablo Rodríguez-Bocca, and Bruno Tuffin. "End-to-end availability-dependent pricing of network services." Annals of Operations Research 157, no. 1 (September 13, 2007): 61–71. http://dx.doi.org/10.1007/s10479-007-0254-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdullah, Wisam Dawood, Ali Abdullah Ali, and Layth Rafea Hazim. "Analysis of End to End Internet Traffic in Education's Networks: A New Study." Webology 19, no. 1 (January 20, 2022): 3392–409. http://dx.doi.org/10.14704/web/v19i1/web19223.

Full text
Abstract:
Network Traffic Monitoring and Analysis (NTMA) is the main element to network management, especially to correctly operate large-scale networks such as the Internet on which modern academic organizations heavily depend. Their traffic use increases significantly because students, staff members, and research labs use them to search information. It is necessary to analyze, measure, and classify this Internet traffic according to the need of different stakeholders such as Internet Service Providers and network administrators. Moreover, bandwidth congestions frequently occur, causing user dissatisfaction. This study tries to find different characterizations such as data over hosts, countries, cities, companies, top-level domains, and servers. In addition, this is a new study to find out different patterns and levels of analysis from the device to its international requests. Our findings show that the highest traffic use is on Mondays and Wednesdays. Web server and DNS server drop in response to fault tolerance. Social networks consume most of the bandwidth, such as 42% Facebook followed by 22% WhatsApp in peak hours. The second most accessed sites are search engines. Google is the most used one. About 59% of the host cities are outside Iraq, in particular USA and the UK. In Amara and Baghdad cities, the requested sites are 51% and 49% overseas. About 40% of the traffic is provided by EarthLink Ltd. Communication Internet services (Iraq), 14% EdgeCast. 12% level3, 9% Facebook, 7% Google, Akamai-as and Microsoft-corp-msn-as-block. This study gives guidelines for network administrators to improve their performance and bandwidth at the educational networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Chengzhi Li and E. W. Knightly. "Coordinated multihop scheduling: a framework for end-to-end services." IEEE/ACM Transactions on Networking 10, no. 6 (December 2002): 776–89. http://dx.doi.org/10.1109/tnet.2002.805024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fortuna, C., and M. Mohorcic. "Dynamic composition of services for end-to-end information transport." IEEE Wireless Communications 16, no. 4 (August 2009): 56–62. http://dx.doi.org/10.1109/mwc.2009.5281256.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "End-to-end services"

1

Holmström, Maria. "End-to-end monitoring of mobile services." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1671.

Full text
Abstract:

The growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests.

This thesis presents a solution to how the part of an end-to-end monitoring system for mobile services that runs on a mobile phone can be designed and implemented. The phone is made to interpret commands from a control process on a remote server and turn them into mobile service requests in a proper format (e.g. SMS or MMS). When it receives the reply from a mobile service provider, it forwards the relevant result information to the control process.

The monitoring system is based on Symbian OS, an operating system developed to suit handheld devices like mobile phones. The current implementation supports tests for SMS and MMS services.

The system is to be used by mobile operators or other providers of mobile services, which want to test and monitor their services.

APA, Harvard, Vancouver, ISO, and other styles
2

Soudais, Guillaume. "End-to-End Service Guarantee for High-Speed Optical Networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT027.

Full text
Abstract:
Poussée par un besoin croissant de bande passante et de performance, le réseau informatique s’est développé de telle sorte que les réseaux OT et de télécommunications cherchent à exploiter cette infrastructure pour leur expansion. Ces trois secteurs ont historiquement été séparés en raison de différentes exigences entre autres en matière de latence, de sa variation et de fiabilité. Pour répondre aux besoins des applications temps critiques, le groupe de travail Time Sensitive Network a développé de nouveaux ensembles de protocoles qui commencent à être mis en œuvre dans des produits commerciaux. D’autres groupes ont proposé des architectures novatrices avec contrôle du temps pour permettre des performances garanties, entre et à l’intérieur des centres de données périphériques. Dans ma thèse, je propose une solution pour transporter les applications temps critiques dans les réseaux existants, car elle ne nécessite pas de changer toute l’architecture. Je montre les avantages de sa mise en œuvre dans les réseaux TSN pour une solution pérenne avec une utilisation améliorée des ressources. Pour transporter le trafic temps critique dans les réseaux existants, je propose de créer un chemin en isolant et en planifiant le trafic temps critique sur un canal avec une latence garantie. Avec cette construction, je développe un algorithme pour effectuer une compensation de la variation de latence, permettant une transmission à la latence constante pour le trafic temps critique. Dans un second temps, je propose une méthode de synchronisation et mets en œuvre un réseau de mesure principalement utilise ici pour la mesure de la latence, m’aidant à obtenir des informations sur la distribution de la latence que mon protocole créé. Enfin, avec un algorithme de compensation de variation de latence amélioré, je démontre de meilleures performances en matière de gigue et étudie le temps de mise en service de notre protocole, permettant l’utilisation des ressources uniquement lorsque le trafic temps critique est présent. Dans ma thèse, je démontre, avec une implémentation FPGA, la réduction de la variation de latence, permettant aux applications des réseaux OT et de télécommunications de fonctionner sur les réseaux existants et augmentés par des normes TSN
Driven by an ever-growing bandwidth and performance need, the IT network has grown such that OT and telecommunications networks are looking to exploit this infrastructure for their expansion. These three sectors have historically been separated due to different requirements, on latency, its variation and on reliability. To answer to time critical application needs, the Time Sensitive Network taskforce has developed new sets of protocols that are starting to be implemented in commercial products. Other groups have proposed novel architecture with time control to enable guaranteed performances between and inside edge datacenters. In my PhD I propose a solution to carry time critical application in legacy networks as it does not require to change the whole architecture. I show the benefits of its implementation in TSN networks for a future-proof solution with improved resource usage. To carry time critical traffic in legacy I propose to create a path by isolating and scheduling time critical traffic on a channel with guaranteed latency. With this construction, I build an algorithm to perform latency variation compensation enabling a constant latency transmission for time critical traffic. In a second time, propose a synchronization scheme and implemented a monitoring network primarily used here for latency monitoring, helping me gain insights on the distribution of latency that my protocol creates. Lastly, with an improved latency compensation algorithm, I demonstrate better jitter performances and study the turn-up time for our protocol enabling resource usage only when time-critical traffic is present. In my PhD I demonstrate, with an FPGA implementation and commercial product, latency variation reduction enabling OT and telecommunications network applications to run on legacy and TSN augmented network
APA, Harvard, Vancouver, ISO, and other styles
3

Kyusakov, Rumen. "Efficient Web Services for End-To-End Interoperability of Embedded Systems." Doctoral thesis, Luleå tekniska universitet, EISLAB, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-18129.

Full text
Abstract:
As the number of Internet-connected devices rapidly grows, it has become ever more challenging to develop and maintain purpose-made tightly integrated distributed embedded systems. Instead, the Internet of Things (IoT) approach, based on standardized interfaces and open communication protocols, enables support for various applications with the possibility of extension to provide additional services that were not necessarily available at the initial deployment.This thesis presents methods and tools for the development of standard-based Web services for the Internet of Things. Some of the key challenges in using Web services on resource-constrained devices are due to the overhead of the communication protocols, which leads to the need for greater network bandwidth, processing power, and memory usage. A common solution to these problems is to use gateways that translate between the protocols used on one end of the connection (i.e. low-capability devices) and those on the other end (i.e. powerful Web servers). However, this increases the overall complexity of the system. The work presented herein answers the following research questions: 1) Is it feasible to deploy standard Web services on IoT systems without using application layer gateways? 2) What are the trade-offs in using Web services for end-to-end interoperability of resource-constrained embedded systems? 3) What levels of efficiency and functionality can be achieved using binary coding schemes for XML data exchange?The research questions are tested by building and evaluating several prototype IoT systems. These evaluations show that the use of Web services requires more powerful hardware (i.e. CPU and RAM) and a larger form factor in exchange for better interoperability compared to the use of ad hoc application protocols. The main challenge in employing embedded Web services is the large size of the messages, which is due to the use of verbose data formats such as XML. Although it is shown that it is possible to deploy XML-based Web services on low-capability devices without application layer gateways, this approach has severe performance limitations. Using the Efficient XML Interchange (EXI) binary coding scheme overcomes some of these limitations by substantially reducing the size of the XML messages. The main outcome of this thesis is the design and implementation of a software toolkit, called EXIP, for building EXI-based embedded Web services.The trade-offs in the use of embedded Web services are likely to change in the near future as the importance of application layer interoperability increases and IoT devices become faster, more energy efficient, and equipped with more memory. The dominating importance of interoperability can be seen in highly heterogeneous systems such as energy management systems (i.e. smart grids), where embedded Web services are already in use today. With this in mind, future research directions and extensions of this work include the development of performance optimization strategies for the EXIP toolkit to foster the expansion of embedded Web services to an even wider range of IoT applications.
Godkänd; 2014; 20140909 (rumkyu); Nedanstående person kommer att disputera för avläggande av teknologie doktorsexamen. Namn: Rumen Kyusakov Ämne: Industriell elektronik/Industrial Electronics Avhandling: Efficient Web Services for End-To-End Interoperability of Embedded Systems Opponent: Dr Frank Golatowski, Institute of Applied Microelements and CE, University of Rostock, Rostock-Warnemüende, Germany Ordförande: Biträdande professor Jens Eliasson, EISLAB, Institutionen för system- och rymdteknik, Luleå tekniska universitetet, Luleå Tid: Tisdag den 4 november 2014, kl. 13:00 Plats: A109, Luleå tekniska universitet
Embeddable EXI implementation in C, Architecture for Service-Oriented Process – Monitoring and Control, Arrowhead
APA, Harvard, Vancouver, ISO, and other styles
4

Papageorgiou, Pavlos. "The measurement manager modular and efficient end-to-end measurement services /." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8900.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
5

VIZZARRI, ALESSANDRO. "End to end quality of service quality of experience evaluation for HTTP based services over LTE." Doctoral thesis, Università degli Studi di Roma "Tor Vergata", 2014. http://hdl.handle.net/2108/203507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Salz, Jonathan Michael 1979. "TESLA : a transparent, extensible session-layer framework for end-to-end network services." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87292.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 69-73).
by Jonathan Michael Salz.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Moyo, Thamsanqa. "An investigation into interoperable end-to-end mobile web service security." Thesis, Rhodes University, 2008. http://eprints.ru.ac.za/1137/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yoro, Wilfried. "Modeling the correlation between the energy consumption and the end-to-end traffic of services in large telecommunication networks." Thesis, Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0005/document.

Full text
Abstract:
D’après Cisco, le trafic mobile de données augmentera d’un facteur 7 entre 2016 et 2021. Pour faire face à l’augmentation du trafic, les opérateurs mobile dimensionnent le réseau, ce qui s’accompagne d’une augmentation de sa consommation d’énergie et de son empreinte Carbonne. En outre, les marges financières des opérateurs baissent. Ainsi, le revenu global généré par le secteur des télécommunications a connu une baisse de 4% entre 2014 et 2015 d’après l’union internationale des télécommunications (UIT). Ces préoccupations ont suscité l’intérêt de la communauté scientifique pour la réduction de la consommation électrique des réseaux. Des études dans la littérature estiment l’énergie consommée par les services sur les équipements réseaux en se focalisant sur la consommation variable. La consommation énergétique d’un équipement réseau est composée d’une composante fixe et d’une composante variable. Dans cette thèse, nous partageons la responsabilité des catégories de service dans la consommation fixe du réseau en utilisant la valeur de Shapley. Dans un premier temps, nous considérons un réseau d’accès mobile et partageons la responsabilité des catégories de service qu’il fournit dans la consommation fixe. Nous définissons 5 catégories de service, à savoir, le «Streaming», le Web, le téléchargement, la voix et les autres services de données. En outre, nous traitons le cas de figure où certaines catégories de service sont obligatoires. Etant donné la complexité algorithmique de la valeur de Shapley, nous en proposons une forme approchée qui permet d’en réduire considérablement le temps de calcul. Ensuite, nous considérons le réseau de bout-en-bout, c’est-à-dire, l’accès mobile, l’accès fixe, la collecte, le coeur IP, le coeur mobile, les registres et les plateformes de service. Pour chaque segment, nous partageons la responsabilité des catégories de service dans la consommation fixe en appliquant notre modèle de partage basé sur la valeur de Shapley. L’analyse des résultats montre que le service «Streaming» consomme le plus d’énergie quel que soit le segment de réseau considéré, à l’exception des registres. Pour finir, nous traitons de la modélisation de l’efficacité énergétique des catégories de service. Dans un premier temps, nous calculons l’efficacité énergétique des catégories de service étant donné une station de base avec et sans «sleep mode». Ensuite, nous calculons l’efficacité énergétique des catégories de service étant donné un réseau d’accès mobile et considérant les cas avec et sans catégories de service obligatoires. Aussi étudions-nous les conditions pour ne pas détériorer l’efficacité énergétique du réseau au cours du temps en fonction des scénarios de dimensionnement
Internet traffic is growing exponentially. According to Cisco, mobile data traffic will increase sevenfold between 2016 and 2021, growing at a compound annual growth rate (CAGR) of 47%. In order to improve or keep up with users quality of experience (QoE), mobile carriers upgrade the network with additional equipment. As a consequence, the network carbon footprint increases over time, alongside with its energy consumption. In addition, mobile carriers margins are decreasing. Global telecommunication revenues declined by 4% between 2014 and 2015 based on the international telecommunication union (ITU) figures. These concerns fostered a great interest in the research community for reducing networks energy consumption. In this regard, many works in the literature investigate the energy consumed by services on network equipment for optimization purposes notably, focusing on the variable component of energy consumption. Energy consumption of a network equipment is composed of a variable and a fixed components. The variable component is consumed to serve traffic. The fixed component is consumed irrespective of traffic. In this thesis, our objective is to share the responsibility of service categories in the fixed energy consumption. To do so, we use the Shapley value. First, we consider a radio access network and share the responsibility of the service categories it delivers in the fixed energy consumption. The services are classified into five categories, namely, Streaming, Web, Download, Voice and other data services. In addition, we consider the case when some service categories are mandatory to be provided, such as Voice due to legal constraints for instance. Because the Shapley value has a huge computational complexity, we introduce closed-form expressions in order to significantly reduce it. Next, we consider the end-to-end network and all its segments, that is, the mobile access, the fixed access, the collect, the mobile core, the registers, the IP core and the service platforms. For each segment, we share the responsibility of the service categories in the fixed energy consumption with the Shapley-based model introduced in the preceding chapter. We find that Streaming is the service that consumes the most whatever the network segment, except for registers, as it represents the vast majority of Internet traffic. Eventually, we focus on the service categories energy efficiency. First, we consider a base station and compute the services energy efficiency for the cases with and without sleep mode. Then, we consider a radio access network and compute the services energy efficiency with and without a mandatory player. Moreover, we discuss the conditions to not deteriorate the network energy efficiency over time following different upgrade scenarios
APA, Harvard, Vancouver, ISO, and other styles
9

Yoro, Wilfried. "Modeling the correlation between the energy consumption and the end-to-end traffic of services in large telecommunication networks." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2018. http://www.theses.fr/2018TELE0005.

Full text
Abstract:
D’après Cisco, le trafic mobile de données augmentera d’un facteur 7 entre 2016 et 2021. Pour faire face à l’augmentation du trafic, les opérateurs mobile dimensionnent le réseau, ce qui s’accompagne d’une augmentation de sa consommation d’énergie et de son empreinte Carbonne. En outre, les marges financières des opérateurs baissent. Ainsi, le revenu global généré par le secteur des télécommunications a connu une baisse de 4% entre 2014 et 2015 d’après l’union internationale des télécommunications (UIT). Ces préoccupations ont suscité l’intérêt de la communauté scientifique pour la réduction de la consommation électrique des réseaux. Des études dans la littérature estiment l’énergie consommée par les services sur les équipements réseaux en se focalisant sur la consommation variable. La consommation énergétique d’un équipement réseau est composée d’une composante fixe et d’une composante variable. Dans cette thèse, nous partageons la responsabilité des catégories de service dans la consommation fixe du réseau en utilisant la valeur de Shapley. Dans un premier temps, nous considérons un réseau d’accès mobile et partageons la responsabilité des catégories de service qu’il fournit dans la consommation fixe. Nous définissons 5 catégories de service, à savoir, le «Streaming», le Web, le téléchargement, la voix et les autres services de données. En outre, nous traitons le cas de figure où certaines catégories de service sont obligatoires. Etant donné la complexité algorithmique de la valeur de Shapley, nous en proposons une forme approchée qui permet d’en réduire considérablement le temps de calcul. Ensuite, nous considérons le réseau de bout-en-bout, c’est-à-dire, l’accès mobile, l’accès fixe, la collecte, le coeur IP, le coeur mobile, les registres et les plateformes de service. Pour chaque segment, nous partageons la responsabilité des catégories de service dans la consommation fixe en appliquant notre modèle de partage basé sur la valeur de Shapley. L’analyse des résultats montre que le service «Streaming» consomme le plus d’énergie quel que soit le segment de réseau considéré, à l’exception des registres. Pour finir, nous traitons de la modélisation de l’efficacité énergétique des catégories de service. Dans un premier temps, nous calculons l’efficacité énergétique des catégories de service étant donné une station de base avec et sans «sleep mode». Ensuite, nous calculons l’efficacité énergétique des catégories de service étant donné un réseau d’accès mobile et considérant les cas avec et sans catégories de service obligatoires. Aussi étudions-nous les conditions pour ne pas détériorer l’efficacité énergétique du réseau au cours du temps en fonction des scénarios de dimensionnement
Internet traffic is growing exponentially. According to Cisco, mobile data traffic will increase sevenfold between 2016 and 2021, growing at a compound annual growth rate (CAGR) of 47%. In order to improve or keep up with users quality of experience (QoE), mobile carriers upgrade the network with additional equipment. As a consequence, the network carbon footprint increases over time, alongside with its energy consumption. In addition, mobile carriers margins are decreasing. Global telecommunication revenues declined by 4% between 2014 and 2015 based on the international telecommunication union (ITU) figures. These concerns fostered a great interest in the research community for reducing networks energy consumption. In this regard, many works in the literature investigate the energy consumed by services on network equipment for optimization purposes notably, focusing on the variable component of energy consumption. Energy consumption of a network equipment is composed of a variable and a fixed components. The variable component is consumed to serve traffic. The fixed component is consumed irrespective of traffic. In this thesis, our objective is to share the responsibility of service categories in the fixed energy consumption. To do so, we use the Shapley value. First, we consider a radio access network and share the responsibility of the service categories it delivers in the fixed energy consumption. The services are classified into five categories, namely, Streaming, Web, Download, Voice and other data services. In addition, we consider the case when some service categories are mandatory to be provided, such as Voice due to legal constraints for instance. Because the Shapley value has a huge computational complexity, we introduce closed-form expressions in order to significantly reduce it. Next, we consider the end-to-end network and all its segments, that is, the mobile access, the fixed access, the collect, the mobile core, the registers, the IP core and the service platforms. For each segment, we share the responsibility of the service categories in the fixed energy consumption with the Shapley-based model introduced in the preceding chapter. We find that Streaming is the service that consumes the most whatever the network segment, except for registers, as it represents the vast majority of Internet traffic. Eventually, we focus on the service categories energy efficiency. First, we consider a base station and compute the services energy efficiency for the cases with and without sleep mode. Then, we consider a radio access network and compute the services energy efficiency with and without a mandatory player. Moreover, we discuss the conditions to not deteriorate the network energy efficiency over time following different upgrade scenarios
APA, Harvard, Vancouver, ISO, and other styles
10

Bou, Diab Wafaa. "End-to-security of real-time services over beyond third generation networks." Versailles-St Quentin en Yvelines, 2010. http://www.theses.fr/2010VERS0011.

Full text
Abstract:
La sécurité représente un grand défi pour la transmission du trafic temps-réel sur les réseaux IP, l'objectif est d'acquérir le même niveau de sécurité offert par la téléphonie standard sans affecter la performance et la qualité de service. Sécuriser les services multimédia temps-réel sur un réseau IP est un processus complexe; les solutions de sécurité doivent prendre en compte les contraintes temps-réel des services voix et multimédia et leurs mécanismes doivent traiter les attaques possibles et l’overhead associé. La nécessité d’offrir un certain niveau de qualité de service (QoS) résulte souvent de l’utilisation des faibles mécanismes de sécurité. Le problème d’appliquer les mécanismes de sécurité pour les applications sensibles en temps-réel est que la sécurité et l'efficacité sont des exigences contradictoires ; les mécanismes de sécurité dégradent la performance et la QoS de telles applications, c’est principalement car ces mécanismes peuvent être responsables de l'augmentation de la latence et de la perte de paquets ; si la latence est trop élevée elle peut être la contrainte la plus dégénérant de la qualité des communications multimédia temps-réel. D'autre part, l'un des défis majeurs pour les applications temps-réel sur des réseaux mobiles de prochaine génération ou les réseaux au-delà de troisième génération (B3G) est le handover vertical sans-couture (seamless vertical handover). Ces applications sensibles aux latences et à la perte de paquets nécessitent un contrôle de handover rapide et efficace sur les diverses technologies sans fil pour réaliser la continuité de service et la mobilité sans coupure tout en préservant la sécurité et la qualité de service. L'objectif de cette thèse est de fournir une solution de sécurité robuste sans compromis sur la qualité de service et la performance des applications multimédia temps réel. À cause de la nature temps-critique des applications multimédia et leur faible tolérance au délai et à la perte de paquet, de nombreux mécanismes de sécurité mis en oeuvre dans les réseaux de données ne sont pas applicables aux services temps réel. D'abord, nous étudions les mécanismes de sécurité utilisés actuellement pour la protection des applications IP et examinons les différentes solutions de sécurité VPN en présentant leurs avantages et inconvénients. Ensuite, nous analysons les mécanismes de sécurité supportant les services temps réel et permettant de protéger les signalisations et les trafics médias et comparons les différentes solutions afin de trouver une solution de sécurité robuste supportant des applications multimédia sur des réseaux d’accès hétérogènes. Ensuite, nous présentons une nouvelle solution VPN basé sur IPSec permettant d’offrir une sécurité de bout-en-bout pour les applications temps-réel tout en préservant la performance et la Qualité de Service. La solution est basée sur le protocole de sécurité IPSec et travaille indépendamment du réseau sous-jacent, elle offre de chiffrement de bout-en-bout et donc évite les bouchons (bottlenecks) des files d'attente au niveau des routeurs et protège les utilisateurs et les communications multimédia des attaquants de l'intérieur. La méthode de signalisation permet d’établir le tunnel VPN de bout-en-bout sans délai. Nous proposons une nouvelle méthode de routage du trafic média sécurisé sur les réseaux IP, cette méthode réduit l’overhead de traitement à chaque routeur dans le chemin et minimise la latence et la perte de paquet multimédia. Après cela, nous décrivons le défi de la sécurité et les exigences des applications temps réel durant le handover vertical. Les applications temps réel ont besoin d'une solution de gestion de la mobilité qui réalise le handover aussi rapide que possible et offre un handover sans couture sécurisé sans perception du point de vue d’utilisateur. Ensuite, nous présentons la nouvelle solution de gestion de mobilité offrant un handover sans-couture, rapide et sécurisé pour les applications temps réel durant la mobilité entre les réseaux d’accès hétérogènes. Cette solution effectue l’authentification et la protection de l'intégrité durant le processus de handover anticipé, ce qui minimise l’overhead de signalisation et entraîne une réduction significative de la latence de handover et la perte de paquet. La solution permet aussi de résoudre le problème de désynchronisation entre les utilisateurs dû au mécanisme de compression. Un nouveau module entre les domaines E-IDM (Enhanced Inter-Domain Module) est introduit pour assurer la qualité de service et la sécurité de bout-en-bout des applications multimédia temps réel, tout en offrant de handover sécurisé entre les réseaux d'accès hétérogènes
Security presents a big challenge for transmitting real-time traffic over IP networks; the goal is to acquire the same security level offered by the standard telephony without affecting the performance and the quality of service. Securing real-time multimedia services over IP networks is a complex process; the security solutions must take into account the real-time constraints of voice and multimedia services and their mechanisms should address possible attacks and overhead associated with it. The need to provide certain level of Quality of Service (QoS) often results with weak security mechanisms. The problem of applying security mechanism for real-time sensitive applications is that security and efficiency are conflicting requirements and the security mechanisms may degrade the performance and the QoS of such applications. This is mainly because security mechanisms can be responsible for the increased latency and the packet loss; if latency is too high, it can be the most deteriorating constrain for the quality of the real-time multimedia communications. On the other hand, one of the major challenges for real-time applications over extgeneration mobile networks or the Beyond Third Generation Networks (B3G) is the seamless vertical handoff. Such latency and loss sensitive applications require fast and efficient handover control over various wireless technologies to realize service continuity and seamless mobility while preserving the security and the QoS. The aim of this thesis is to provide a robust security solution without compromising the QoS and the performance of the real-time multimedia applications. Because of the timecritical nature of multimedia applications and their low tolerance for disruption and packet loss, many security mechanisms implemented in data networks are not applicable to real-time services. We first investigate the different security mechanisms applying nowadays for protecting IP applications, and examine the various VPN security solutions presenting their advantages and drawbacks. Then, we analyze the mechanisms supporting real-time services and enabling to protect both the signaling and the media traffic, and compare the different
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "End-to-end services"

1

Mohammed, Atiquzzaman, Ivancic William D, and NASA Glenn Research Center, eds. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohammed, Atiquzzaman, Ivancic William D, and NASA Glenn Research Center, eds. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bai, Haowei. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohammed, Atiquzzaman, Ivancic William D, and NASA Glenn Research Center, eds. Achieving end-to-end QoS in the next generation Internet: Integrated services over differentiated service networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Glenn Research Center, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Worth, Jennifer. Farewell to the East End. London: Phoenix, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

B, Bhasin K., and Lewis Research Center, eds. Enhancing end-to-end performance of information services over Ka-band global satellite networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Lewis Research Center, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

B, Bhasin K., and Lewis Research Center, eds. Enhancing end-to-end performance of information services over Ka-band global satellite networks. [Cleveland, Ohio]: National Aeronautics and Space Administration, Lewis Research Center, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

R, Sánchez, ed. End-to-end quality of service over cellular networks: Data services performance and optimization in 2G/3G. Chichester: Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gómez, G. End-to-end quality of service over cellular networks: Data services performance and optimization in 2G/3G. Chichester: John Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burnett, Margaret. FAR: An end-user language to support cottage e-services. [Corvallis, OR: Oregon State University, Dept. of Computer Science, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "End-to-end services"

1

Cole, Robert. "End-to-end Services." In Computer Communications, 141–60. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18271-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Xiaohui, Yu Lin, Wendong Wang, and Shiduan Cheng. "QoSJava: An End-to-End QoS Solution." In Management of Multimedia Networks and Services, 302–13. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572831_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cremonesi, Paolo, and Giuseppe Serazzi. "End-to-End Performance of Web Services." In Performance Evaluation of Complex Systems: Techniques and Tools, 158–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45798-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dash, Alokika. "End-to-End Data Architecture Considerations for IoT." In Services and Business Process Reengineering, 17–25. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8621-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bissel, Torsten, Manfred Bogen, Christian Bonkowski, and Dieter Strecker. "QoS Assessment and Measurement for End-to-End Services." In Quality of Future Internet Services, 194–207. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-39939-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Oberle, Karsten, Davide Cherubini, and Tommaso Cucinotta. "End-to-End Service Quality for Cloud Applications." In Economics of Grids, Clouds, Systems, and Services, 228–43. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02414-1_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hierrezuelo, Salvador, Alejandro Gil, Juan Guerrero, Raquel Rodríguez, Juan Torreblanca, Mattias Wahlqvist, and Gerardo Gómez. "Data Services Architecture and Standardization." In End-to-End Quality of Service over Cellular Networks, 50–102. Chichester, UK: John Wiley & Sons, Ltd, 2006. http://dx.doi.org/10.1002/047001587x.ch3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Christodorescu, Mihai, Matthew Fredrikson, Somesh Jha, and Jonathon Giffin. "End-to-End Software Diversification of Internet Services." In Advances in Information Security, 117–30. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0977-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Song, Wang-Cheol, and Deok-Jae Choi. "Experiences in End-to-End Performance Monitoring on KOREN." In Management of Convergence Networks and Services, 383–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11876601_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ravindran, K. "End-to-End ‘Data Connectivity’ Management for Multimedia Networking." In Management of Multimedia Networks and Services, 190–203. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11572831_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "End-to-end services"

1

Zhang, Jian, and Andrew Moore. "Traffic Trace Artifacts due to Monitoring Via Port Mirroring." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"3rd IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services (IEEE Cat. No. 05EX1107)." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Copyright page." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Workshop co-chairs." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Reviewers." In Workshop on End-to-End Monitoring Techniques and Services, 2005. IEEE, 2005. http://dx.doi.org/10.1109/e2emon.2005.1564463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ito, Yoshihiro, and Shuji Tasaka. "End-to-End Monitoring of Multidimensional User-Level QoS in Audio-Video IP Transmission." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Augustin, Brice, Timur Friedman, and Renata Teixeira. "Multipath tracing with Paris traceroute." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tsugawa, Tomoaki, Cao Le Thanh Man, Go Hasegawa, and Masayuki Murata. "Inline bandwidth measurements: Implementation difficulties and their solutions." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Guang, Jian Gong, and Yongning Tang. "A Hybrid Sampling Approach for Network Flow Monitoring." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Staff or Society listings." In 2007 Workshop on End-to-End Monitoring Techniques and Services. IEEE, 2007. http://dx.doi.org/10.1109/e2emon.2007.375320.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "End-to-end services"

1

Rajkumar, Raj, K. Juvva, A. Molano, S. Oikawa, and C. Lee. End-to-End Reservation Services in Real-Time Mach. Fort Belvoir, VA: Defense Technical Information Center, September 2001. http://dx.doi.org/10.21236/ada397967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Jenny. Inclusive Planning to Evaluate Improved Non-Emergency Medical Transportation Services for Patients With End Stage Renal Disease. Portland State University Library, December 2014. http://dx.doi.org/10.15760/trec.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Svynarenko, Radion, Theresa L. Profant, and Lisa C. Lindley. Effectiveness of concurrent care to improve pediatric and family outcomes at the end of life: An analytic codebook. Pediatric End-of-Life (PedEOL) Care Research Group, College of Nursing, University of Tennessee, Knoxville, 2022. http://dx.doi.org/10.7290/m5fbbq.

Full text
Abstract:
Implementation of the section 2302 of the 2010 Patient Protection and Affordable Care Act (ACA) enabled children enrolled in Medicaid/Children's Health Insurance Program with a prognosis of 6 months to live to use hospice care while continuing treatment for their terminal illness. Although concurrent hospice care became available more than a decade ago, little is known about the socio-demographic and health characteristics of children who received concurrent care; health care services they received while enrolled in concurrent care, their continuity, management, intensity, fragmentation; and the costs of care. The purpose of this study was to answer these questions using national data from the Centers of Medicare and Medicaid Services (CMS), which covered the first three years of ACA – from January 1, 2011, to December 31, 2013.The database included records of 18,152 children younger than the age of 20, who were enrolled in Medicaid hospice care in the sampling time frame. Children in the database also had a total number of 42,764 hospice episodes. Observations were excluded if the date of birth or death was missing or participants were older than 21 years. To create this database CMS data were merged with three other complementary databases: the National Death Index (NDI) that provided information on death certificates of children; the U.S. Census Bureau American Community Survey that provided information on characteristics of communities where children resided; CMS Hospice Provider of Services files and CMS Hospice Utilization and Payment files were used for data on hospice providers, and with a database of rural areas created by the Health Resources and Services Administration (HRSA). In total, 130 variables were created, measuring demographics and health characteristics of children, characteristics of health providers, community characteristics, clinical characteristics, costs of care, and other variables.
APA, Harvard, Vancouver, ISO, and other styles
4

Svynarenko, Radion, Guoping Huang, Theresa L. Profant, and Lisa C. Lindley. Effectiveness of End-of-Life Strategies to Improve Health Outcomes and Reduce Disparities in Rural Appalachia: An Analytic Codebook. Pediatric End-of-Life (PedEOL) Care Research Group, College of Nursing, University of Tennessee, Knoxville, 2023. http://dx.doi.org/10.7290/n89xhm.

Full text
Abstract:
Appalachia is one of the most medically underserved areas in the nation. The region has provider shortages and limited healthcare infrastructure. Children and adolescents in this area are in poor health and do not receive the needed quality care. Implementation of section 2302 of the 2010 Patient Protection and Affordable Care Act (ACA) enabled children enrolled in Medicaid/Children's Health Insurance Program with a terminal illness to use hospice care while continuing treatment for their terminal illness. In addition to being more comprehensive than standard hospice care, this relatively new type of care is more culturally congruent with the end-of-life values of rural Appalachian families, who often view standard hospice as hastening death. The overall goal of this project was to investigate access to pediatric concurrent hospice care in Appalachia. Our central hypothesis was that concurrent care reduces rural/urban disparities in access to hospice care. Data from the Centers for Medicare and Medicaid Services (CMS) used in this project was used and included 1,788 children who resided in the Appalachian region– from January 1, 2011, to December 31, 2013. Observations with missing birth dates, death dates, and participants older than 21 years were removed from the final sample. Geographic Information Systems (GIS) databases were created to map the boundaries of the Appalachian region, hospice locations, and driving times to them.
APA, Harvard, Vancouver, ISO, and other styles
5

Jimenez Mori, Raul Alberto, Tomás Serebrisky, and Jorge Enrique Mercado Díaz. What does better mean? Perceptions of Electricity and Water Services in Santo Domingo. Inter-American Development Bank, November 2015. http://dx.doi.org/10.18235/0007006.

Full text
Abstract:
Santo Domingo faces one of the poorest electricity and water services among Latin American cities, a situation which has prevailed for decades despite the significant welfare losses associated with such infrastructure deficiencies. In this context, how do households define these services? What areas of improvement would mean the most to them? This paper takes a consumer's centric-approach to address these questions, identifying specific dimensions of quality and reliability by which households perceptually define what better means. Further, preliminary evidence suggests that, regardless the prices of the services, end-user's satisfaction and disposition to pay would significantly increase with quality improvements.
APA, Harvard, Vancouver, ISO, and other styles
6

Köstner, Nicole, and Toste Tanhua. Action Progress Report #3. EuroSea, 2023. http://dx.doi.org/10.3289/eurosea_d9.4.

Full text
Abstract:
The EuroSea project has been running for 4 years by the writing of this report, and this report covers months 33-48 of the action at a time when most tasks are completed and deliverables submitted. However, a few items still need to be finalized as we have experienced delays for a few items, mostly due to COVID, or Brexit, but we expect all of those to be solved before the end of the project by the end of 2023. The progress of the WPs is summarized below, and is described in more detail in the main part of this report. As an innovation action, EuroSea is keeping a close eye on creating impact and on creating services and products that will last past the lifetime of the project. Therefore, we would like to emphasis the registry of impacts that is published on the EuroSea website1. These about 100 areas illustrate the impact that EuroSea has had on improving the European ocean observing and forecasting system. EuroSea has produced a number of targeted services and products for ocean health, operational services and climate, that are tested and used by the stakeholders. (EuroSea Deliverable, D9.4)
APA, Harvard, Vancouver, ISO, and other styles
7

Abdelkafi, Rami. What can Sukuk learn from Social Impact Bonds in the context of COVID crisis? Islamic Development Bank Institute, November 2021. http://dx.doi.org/10.55780/re24019.

Full text
Abstract:
Beyond the lack of financial resources, delivery failures are among the main causes of poor public services in developing countries. The incapacity of states in developing countries to perform and to complete tasks entrusted to them is what Andrews et al. (2016) termed as “capability trap”. Their study shows that most developing countries suffer from weak capability states, and out of a sample of 102 developing countries, only 3 would be able to build strong delivery capacity for basic services by the end of the 21st century (Gungadurdoss, 2021).
APA, Harvard, Vancouver, ISO, and other styles
8

Hendrick, Stephen, Hilary Carter, and Jason Perlow. 2021 Data and Storage Trends. The Linux Foundation, October 2021. https://doi.org/10.70828/gqyx2842.

Full text
Abstract:
Enterprise storage trends are all about core IT functions and day-to-day business challenges. 2020, however, was not your typical business year. In the wake of the COVID-19 pandemic, it was clear that the demand for secure and affordable data and storage services was exacerbated, but more insight into the current landscape was needed, especially the role of open source in this equation. The SODA Foundation is an open source project under the Linux Foundation that fosters an ecosystem of open source data management and storage software for data autonomy. SODA offers a neutral forum for cross-project collaboration and integration and provides end-users quality end-to-end solutions. In April of 2021, the SODA Foundation, in partnership with the Linux Foundation, launched a survey to understand evolving data and storage trends that was conducted in English, Chinese, and Japanese-speaking markets — in particular, to identify the current challenges, gaps, and trends for data and storage in the era of Cloud Native, edge, AI, and 5G. The intention is to use this survey data to help guide the SODA Foundation and its surrounding ecosystem on important issues and help its members be better equipped to make decisions, improve their products, and the SODA Foundation to establish new technical directions.
APA, Harvard, Vancouver, ISO, and other styles
9

Day, St John, Tim Forster, and Ryan Schweitzer. Water Supply in Protracted Humanitarian Crises: Reflections on the sustainability of service delivery models. Oxfam, UNHCR, September 2020. http://dx.doi.org/10.21201/2020.6362.

Full text
Abstract:
UNHCR estimates that the average time spent by a refugee in a camp is 10 years, while the average refugee camp remains for 26 years. WASH (water, sanitation and hygiene) is a crucial component of humanitarian response and longer-term recovery. Humanitarian agencies and host governments face many challenges in protracted situations and complex long-term humanitarian crises. One key issue is how water supplies should be managed in the long term. Who is best placed to operate and manage WASH services and which delivery model is the most viable? At the end of 2019, there were 15.7 million refugees in protracted situations, representing 77% of all refugees. This report takes stock of the various alternative service delivery models, to enable humanitarian and development agencies to work together to smooth the transition from emergency relief to sustainable services.
APA, Harvard, Vancouver, ISO, and other styles
10

P., BASTIAENSEN. Triage in the trenches, for the love of animals : a tribute to veterinarians in the First World War. O.I.E (World Organisation for Animal Health), October 2018. http://dx.doi.org/10.20506/bull.2018.nf.2883.

Full text
Abstract:
On the occasion of the centenary of the First World War, remembered across the world from 2014 until the end of 2018, many aspects and experiences of this global conflict have been re-examined or brought to light for the first time, as we honour the memory of those estimated 16 million soldiers and civilians who perished in what was then known as the ‘Great War’, or the ‘War to End All Wars’. So many of these died on the infamous fields of Flanders, where Allied and Central Forces dug themselves into trenches for the better part of four years. Over the past few years, new research has brought to light many insights into the plight of animals in this War, which – for the younger readers amongst you – was fought at the dawn of motorised warfare, using anything powered by two or four feet or paws, from the homing pigeons delivering secret messages across enemy lines, to the traction provided by oxen and mules to pull cannons and other heavy artillery, to the horses of the cavalry. Not least among these roles was the supply of animal protein to the troops, whether this came through the specific designation of animals for this purpose or as the result of a failed attempt at delivering any of the above services. Several leading publications today have documented the role (and suffering) of animals in ‘La Grande Guerre’. Less so the role of veterinarians in the ‘War to End All Wars’. Who were they? How many? How were they organised? What did they do, on either side of the enemy lines? The present article is a humble attempt to shed some light on these veterinary colleagues, based on available, mostly grey, literature…
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography