Academic literature on the topic 'SHARED ACCESS LAYER'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SHARED ACCESS LAYER.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SHARED ACCESS LAYER"

1

Guleria, Pratiyush. "Data Access Layer: A Programming Paradigm on Cloud." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 3 (October 15, 2013): 2341–45. http://dx.doi.org/10.24297/ijct.v11i3.1164.

Full text
Abstract:
Database is important for any application and critical part of private and public cloud platforms. For compatibility with cloud computing we can follow architectures like three tier architecture in .Net Technologies such that database layer should be separate from user and business logic layers. There are some other issues like following ACID properties in databases, providing dynamic scalability by using Shared-disk Architecture and efficient multi-tenancy, elastic scalability, and database privacy.
APA, Harvard, Vancouver, ISO, and other styles
2

Chandnani, Manali, Mukesh Kumar Khandelwal, and Meeta Sharma. "A Survey on Synchronization Approach in MAC Layer Protocols." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 9–27. http://dx.doi.org/10.4018/ijbdcn.2017010102.

Full text
Abstract:
The Open Systems Interconnection (OSI) model describes the layered approach for communication between two networked systems. The Data link layer of OSI model consists of a sub layer known as MAC layer for achieving coordination among the communicating nodes to access the shared channel. This channel is shared between multiple nodes in a communication network and the packets transmitted at same time by different nodes collide with each other. This situation leads to loss of data and bandwidth gets wasted. To avoid this situation, MAC layer supports various protocols: TDMA, ALOHA, CSMA/CD, CSMA/CA and many hybrid techniques which employ their own criteria of synchronization for minimizing the collisions. In this paper the authors discuss about the MAC layer and the multiple access protocols which it supports for achieving synchronization among the nodes in the channel.
APA, Harvard, Vancouver, ISO, and other styles
3

Hudák, Marián, Štefan Korečko, and Branislav Sobota. "LIRKIS Global Collaborative Virtual Environments: Current State and Utilization Perspective." Open Computer Science 11, no. 1 (December 17, 2020): 99–106. http://dx.doi.org/10.1515/comp-2020-0124.

Full text
Abstract:
AbstractRecent advances in the field of web technologies, including the increasing support of virtual reality hardware, have allowed for shared virtual environments, reachable by just entering a URL in a browser. One contemporary solution that provides such a shared virtual reality is LIRKIS Global Collaborative Virtual Environments (LIRKIS G-CVE). It is a web-based software system, built on top of the A-Frame and Networked-Aframe frameworks. This paper describes LIRKIS G-CVE and introduces its two original components. The first one is the Smart-Client Interface, which turns smart devices, such as smartphones and tablets, into input devices. The advantage of this component over the standard way of user input is demonstrated by a series of experiments. The second component is the Enhanced Client Access layer, which provides access to positions and orientations of clients that share a virtual environment. The layer also stores a history of connected clients and provides limited control over the clients. The paper also outlines an ongoing experiment aimed at an evaluation of LIRKIS G-CVE in the area of virtual prototype testing.
APA, Harvard, Vancouver, ISO, and other styles
4

Scott, Rachel E., and Gail Barton. "Promoting Interlibrary Loan in the Traditional Catalog and Discovery Layer: Two Pilot Projects." Library Resources & Technical Services 62, no. 2 (April 4, 2018): 74. http://dx.doi.org/10.5860/lrts.62n2.74.

Full text
Abstract:
This paper describes two projects that promote interlibrary loan (ILL) in both traditional online public access catalogs and discovery settings to address user frustrations with gaps in the collection. By creating and inserting OpenURL links into bibliographic records for titles held exclusively by external institutions, the authors leveraged the discovery capabilities of their shared catalog and promoted ILL as an alternative means of access. The second project targeted the overwhelming amount of content indexed in the library’s discovery layer that was not locally available. To more directly translate discovery into access, the authors worked with EBSCO to create and enable ILL CustomLinks for this content indexed by EBSCO Discovery Service and not available to their users. This paper presents ILL data to investigate whether these projects are changing the ways our users find and access content not held locally.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Xiu Juan, Xiao Bing Li, Yu Tang Chen, Meng Cheng, Zhong Xin Zhang, and Xiu Yun Cai. "Design and Implementation of Real-Time Database in Embedded Configuration Software." Applied Mechanics and Materials 411-414 (September 2013): 370–76. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.370.

Full text
Abstract:
This paper mainly introduces the design idea of real-time database in embedded configuration software. According to the characteristics of real-time database, this paper using three layer storage structures which consist of shared memory, file system and general database. It improves the access efficiency of real-time database and data reliability in a timely manner.
APA, Harvard, Vancouver, ISO, and other styles
6

Qi, Xin, Kun Wang, AnPeng Huang, Haifeng Hu, and Guangjie Han. "MAC Protocol in Wireless Body Area Network for Mobile Health: A Survey and an Architecture Design." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/289404.

Full text
Abstract:
Wireless body area networks (WBANs) have become a leading solution in mobile health (mHealth). Typically, a WBAN consists of in-body or around-body sensor nodes for collecting data of physiological feature. For a WBAN to provide high throughput and low delay in an energy-efficient way, designing an efficient medium access control (MAC) protocol is of paramount importance because the MAC layer coordinates nodes’ access to the shared wireless medium. To show the difference of MAC protocols between Energy-Harvesting wireless body area networks (EH-WBANs) and battery powered WBANs (BT-WBANs), this paper surveys the latest progresses in energy harvesting techniques and WBAN MAC protocol designs. Furthermore, a novel energy utility architecture is designed to enable sensor node lifetime operation in an EH-WBAN.
APA, Harvard, Vancouver, ISO, and other styles
7

Bhavadharini, R. M., S. Karthik, N. Karthikeyan, and Anand Paul. "Wireless Networking Performance in IoT Using Adaptive Contention Window." Wireless Communications and Mobile Computing 2018 (July 3, 2018): 1–9. http://dx.doi.org/10.1155/2018/7248040.

Full text
Abstract:
Internet of Things (IoT) network contains heterogeneous resource-constrained computing devices which has its unique reputation in IoT environments. In spite of its distinctiveness, the network performance deteriorates by the distributed contention of the nodes for the shared wireless medium in IoT. In IoT network, the Medium Access Control (MAC) layer contention impacts the level of congestion at the transport layer. Further, the increasing node contention at the MAC layer increases link layer frame drops resulting in timeouts at the transport layer segments and the performance of TCP degrades. In addition to that, the expiration of maximum retransmission attempts and the high contentions drive the MAC retransmissions and the associated overheads to reduce the link level throughput and the packet delivery ratio. In order to deal with aforementioned problems, the Adaptive Contention Window (ACW) is proposed, which aims to reduce the MAC overhead and retransmissions by determining active queue size at the contending nodes and the energy level of the nodes to improve TCP performance. Further, the MAC contention window is adjusted according to the node’s active queue size and the residual energy and TCP congestion window is dynamically adjusted based on the MAC contention window. Hence, by adjusting the MAC Adaptive Contention Window, the proposed model effectively distributes the access to medium and assures improved network throughput. Finally, the simulation study implemented through ns-2 is compared with an existing methodology such as Cross-Layer Congestion Control and dynamic window adaptation (CC-BADWA); the proposed model enhances the network throughput with the minimal collisions.
APA, Harvard, Vancouver, ISO, and other styles
8

Athanasiou, George. "Dynamic Resource Management in 802.11 Wireless Mesh Networks." Journal of Computer Networks and Communications 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/815374.

Full text
Abstract:
The association/handoff procedures are important components in a balanced operation of 802.11-based wireless mesh networks. In this paper, we introduce the concept of cooperative association where the stations (STA) can share useful information in order to improve the performance of the association/reassociation procedures. Furthermore, in this work we introduce a load balancing mechanism that can be applied in mesh networks. This mechanism operates in a cross-layer manner taking into account uplink and downlink channel information, routing information, and congestion-based information. Our load balancing mechanism is based on a fairness index that is measured at each access point (AP) neighborhood. This index reflects the way the communication load is shared in the neighboring APs. The iterative heuristic algorithms that we propose controls the communication load of each mesh AP in a distributed manner. We evaluate the performance of our mechanisms through OPNET simulations.
APA, Harvard, Vancouver, ISO, and other styles
9

OBELOVSKA, Kvitoslava, Khrystyna PELEKH, Yury PELEKH, and Yaromir SNAICHUK. "ANALYSIS OF THE CSMA/CA SCHEME FOR WIRELESS LOCAL AREA NETWORKS." Herald of Khmelnytskyi National University. Technical sciences 315, no. 6(1) (December 29, 2022): 148–52. http://dx.doi.org/10.31891/2307-5732-2022-315-6-148-152.

Full text
Abstract:
The current stage of telecommunication technologies development is characterized by the rapid growth use of wireless technologies in access networks and the growth requirements for its quality. The bottleneck that significantly reduces the bandwidth of each subscriber connection is that the total bandwidth of the wireless local network is shared among its active members by the shared technology used. The access management sub-layer to the shared physical environment is responsible for this in the network architecture. The main method used at this sub-layer is the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme. This work is devoted to the analysis of CSMA/CA scheme and the development of an analytical model for its further study and use for the improvement of wireless local networks. The input data is a transition state diagram of a local area wireless network station in data transmission mode. According to the CSMA/CA scheme, stations cannot change their state after starting frame transmission until a confirmation frame of successful reception arrives from the addressee or until the time to wait for it expires. Considering this, it is proposed to use a simplified transition state diagram for the analysis. The operation of the station by the simplified transition state diagram is described using a system of differential equations. As a result of the solution of this system, expressions representing the probability of the station being in each of its states as a function of the intensities of the station’s transitions from each state to another are derived. The values of these intensities depend on both the outgoing traffic of the station and the traffic in the network. The resulting expressions can be used in further work on the analysis of the CSMA/CA scheme, as they make it possible to estimate the operation of the station at different ratios of the station’s output traffic and external traffic generated by other stations of the network. This can be used to develop an enhanced algorithm station operation of wireless local area networks by adapting the parameters of the CSMA/CA scheme to specific current loads of both the station and the network.
APA, Harvard, Vancouver, ISO, and other styles
10

Seppä, Tiina. "Discussions on the Past: Shared Experience in the Collection of Finnish Folk Poetry." Journal of Finnish Studies 16, no. 2 (May 1, 2013): 47–65. http://dx.doi.org/10.5406/28315081.16.2.05.

Full text
Abstract:
Abstract The article examines dialogues and encounters between rune collectors and rune singers, mainly by scrutinizing one case of collaboration. How did the physical, emotional ties and commitments of the collectors themselves influence the material they collected? What does it mean if we render commitments such as family ties visible? The singer, Anni Lehtonen, interprets the material learned from older relatives and shapes it for her own needs. Then the collector, Samuli Paulaharju, interprets this information from his own perspective—a perspective that already has informed the questions posed to the interviewee. Most importantly, this perspective (pre)determines the material. This means that the material we are now able to access in the archives was already shaped by at least two interpretative processes, separate from the selection process of the Archives of the Finnish Literature Society itself. The third layer of interpretation is the lens of the interpretative, reflective researcher—and after that, the readers.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SHARED ACCESS LAYER"

1

JAIN, SANDEEP. "SHARED ACCESS LAYER – SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15097.

Full text
Abstract:
The e-Governance is basically an electronic channel through which CITIZENS and GOVERNMENT can interact with one each other. There will be no constrained of the locations and limitation of time. This all improves in the delivery of the Government Services in a effective manner. The vision is strictly depending on the ability of diverse computing systems which are owned and managed by various government departments. These systems are able to interact with each other across all departmental boundaries. This ability of the systems is known as e-government interoperability. During the last few years, e-government interoperability is continuously an important research area for each. SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE approach had provided an acceptable solution in this direction. Various models based upon SOA had been proposed. Here we are proposing a new model known as SHARED ACCESS LAYER – SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE . This model will provide efficient services to the citizens as well as to the departments by providing the shared access layer, i.e. every citizen or any other user will access the required information through this layer, this layer will provide the authentication, redirection to the concerned service and access to the commonly shareable data without actually accessing the departmental server.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SHARED ACCESS LAYER"

1

Menz, Georg. The Political Economy of Debt. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199579983.003.0006.

Full text
Abstract:
The explosive rise in not just public, but also private debt has recently attracted more scholarly attention. This is a novel development and might expose politico-economic models of governance to instability from an angle previously underappreciated. The liberalization of credit access in the Anglo-American countries, and, somewhat later, beyond those, might be seen as liberating for some, but they also create the potential for entrapment in debt. The term ‘privatized Keynesianism’ has been proposed to suggest a systematic agenda behind the facilitated access to lending. In this chapter, the broader access to investment vehicles is also being scrutinized, although upon closer inspection any claims of mass ownership of shares turn out not to be tenable.
APA, Harvard, Vancouver, ISO, and other styles
2

Monaville, Pedro. Students of the World. Duke University Press, 2022. http://dx.doi.org/10.1215/9781478022985.

Full text
Abstract:
On June 30, 1960—the day of the Congo’s independence—Prime Minister Patrice Lumumba gave a fiery speech in which he conjured a definitive shift away from a past of colonial oppression toward a future of sovereignty, dignity, and justice. His assassination a few months later showed how much neocolonial forces and the Cold War jeopardized African movements for liberation. In Students of the World, Pedro Monaville traces a generation of Congolese student activists who refused to accept the foreclosure of the future Lumumba envisioned. These students sought to decolonize university campuses, but the projects of emancipation they articulated went well beyond transforming higher education. Monaville explores the modes of being and thinking that shaped their politics. He outlines a trajectory of radicalization in which gender constructions, cosmopolitan dispositions, and the influence of a dissident popular culture mattered as much as access to various networks of activism and revolutionary thinking. By illuminating the many worlds inhabited by Congolese students at the time of decolonization, Monaville charts new ways of writing histories of the global 1960s from Africa.
APA, Harvard, Vancouver, ISO, and other styles
3

Bicycle-sharing Systems across the United States of America. Organización Panamericana de la Salud, 2020. http://dx.doi.org/10.37774/9789275122143.

Full text
Abstract:
A bicycle-sharing system, or “bike share,” is a program that distributes and organizes fleets of publicly shared bikes throughout a city or region for users to rent for transportation or recreation. Through single-use fees or membership plans, users are able to access bikes across each system’s designated service area. Bicycle-sharing programs have been delivering benefits of increased urban mobility, accessible recreation, and more sustainable transportation in more than 2,000 cities around the world. In the United States of America, bicycle-sharing systems are present within all 50 states and the District of Columbia. Spreading rapidly in a positive trend, expansions of existing bicycle sharing systems and implementation of new systems occur in the United States on a near-monthly basis. The first public bike-sharing system to be developed and implemented within the United States was SmartBike DC in 2008, which was later replaced by the Capital Bikeshare system in 2010. During 2010, four additional systems launched in the cities of Denver, Colorado; Des Moines, Iowa; and Minneapolis, Minnesota and on the campus of Washington State University in Pullman, Washington. By the end of 2018 there were nearly 250 municipalities (either cities or counties) with active bike-sharing systems that had been implemented within their jurisdictions. This publication summarizes the current landscape of bicycle-sharing systems across various municipalities and jurisdictions in the United States of America. The document is a comprehensive accounting of all presently-implemented systems with at least five stations and/or 20 bikes across the country. PAHO hopes this publication serves as a source of information for policymakers, community leaders, NGOs, and others who may be interested in implementing new bike shares or further developing existing systems. Resources in this document can help identify other cities or municipalities with similar objectives and/or comparable contexts in order to learn from each other’s actions, experiences, and challenges.
APA, Harvard, Vancouver, ISO, and other styles
4

McCarthy, Erin A. Doubtful Readers. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198836476.001.0001.

Full text
Abstract:
Doubtful Readers: Print, Poetry, and the Reading Public in Early Modern England focuses on early modern publishers’ efforts to identify and accommodate new readers of verse that had previously been restricted to particular social networks in manuscript. Focusing on the period between the maturing of the market for printed English literature in the 1590s and the emergence of the professional poet following the Restoration, this study shows that poetry was shaped by—and itself shaped—strong print publication traditions. By reading printed editions of poems by William Shakespeare, Aemilia Lanyer, John Donne, and others, this book shows how publishers negotiated genre, gender, social access, reputation, literary knowledge, and the value of English literature itself. It uses literary, historical, bibliographical, and quantitative evidence to show how publishers’ strategies changed over time. Ultimately, Doubtful Readers argues that although—or perhaps because—publishers’ interpretive and editorial efforts are often elided in studies of early modern poetry, their interventions have had an enduring impact on our canons, texts, and literary histories.
APA, Harvard, Vancouver, ISO, and other styles
5

Bjork, Stephanie R. Clan and Cultural Intimacy. University of Illinois Press, 2018. http://dx.doi.org/10.5406/illinois/9780252040931.003.0001.

Full text
Abstract:
This chapter provides an overview of Somali kinship studies and discusses why such studies have become marginalized within Somali studies. It is argued that cultural intimacy explains the intricacies that shape Somalis’ contestation of clan and the cultural intimacy of clan inhibits scholarship. A practice theory approach to clan is outlined and Bourdieu’s formulation of social capital serves as a foundation for understanding how clan is experienced and employed. The chapter discusses Somalis’ initial movement to Finland as accidental and later movement as a strategy to access benefits of the Finnish welfare state. The Finnish context is discussed, including xenophobia and racism, as well as strategies and challenges of conducting research including views of researchers.
APA, Harvard, Vancouver, ISO, and other styles
6

James, Carolyn. A Renaissance Marriage. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780199681211.001.0001.

Full text
Abstract:
Drawing extensively on unpublished archival sources, this book analyses the marriage of Isabella d’Este, one of the most famous figures of the Italian Renaissance, and her less well-known husband, Francesco Gonzaga, ruler of the small northern Italian principality of Mantua (r. 1484–1519). It offers fresh insights into the nature of political marriages during the early modern period by investigating the forces which shaped the lives of an aristocratic couple who, within several years of their wedding, had to deal with the political challenges posed by the first conflicts of the Italian Wars (1494–1559) and, later, the scourge of the Great Pox. The study humanizes a relationship that was organized for entirely strategic reasons, but had to be inhabited emotionally if it was to produce the political and dynastic advantages that had inspired the match. The letter exchanges of Isabella and Francesco over twenty-nine years, as well as their correspondence with relatives and courtiers, show how their personal rapport evolved and how they cooperated in the governance of a princely state. Hitherto examined mainly from literary and religious perspectives and on the basis of legal evidence and prescriptive literature, early modern marriage emerges here in vivid detail, offering the reader access to aspects of the lived experience of an elite Renaissance spousal relationship. The book also contributes to our understanding of the history of emotions, of politics and military conflict, of childbirth, childhood, and family life, and of the history of disease and medicine.
APA, Harvard, Vancouver, ISO, and other styles
7

Baker, Paula, and Donald T. Critchlow, eds. The Oxford Handbook of American Political History. Oxford University Press, 2020. http://dx.doi.org/10.1093/oxfordhb/9780199341788.001.0001.

Full text
Abstract:
This handbook captures the revival of the study of the American political past that has taken shape over the past few decades. Because this renewal has been the result of an interdisciplinary effort, this volume features the work of historians, political scientists, sociologists, and scholars in such fields as law and communications. Its contributors cover traditional chronological periods along with topics in public policy. Some of traditional topics, such as transportation, tax, and economic policy, have been revitalized through interdisciplinary work. Others, such as the histories of conservatism and religion in politics, reflect political history’s fruitful connections with intellectual, social, and cultural history. Throughout the essays reflect political history’s classic focus on government, institutions, and public life, often now informed by work on gender, region, ideas, race, and culture. Two themes, political participation and statebuilding, recur through these essays. Neither had a straightforward history. The right to vote was not a story of ever-expanding access. If we broaden the category to include all manner of public and even seemingly private actions, the range of political actors and events widens and diversifies considerably. While the rediscovery of “the state” owes much to political sociology and American Political Development, the impact on historical scholarship has been wide and deep. Most essays on policy areas show some of the influence of the careful study of institutions and the tangled process of policy development. Even more, work on the early nineteenth century has reminded historians of an active state: nineteenth-century state and local governments regulated all manner of things, from slave codes to voting rights to alcohol consumption and sale to medical practices, some of which would become federalized and a matter of rights in the late twentieth century. The study of “the state” added new layers of complexity and opened new debates in the histories of sexuality, labor, women, and race. Like political participation, the study of the state promises to spark new debate.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SHARED ACCESS LAYER"

1

Ziadie, Haritz Ghozi, Meilita Tryana Sembiring, and Beby Karina Fauzeea Sembiring. "Marketing Mix Strategy Using SWOT Analysis to Increase Market Share in PT Smartfren Telecom Tbk North Sumatera Area." In Proceedings of the 19th International Symposium on Management (INSYMA 2022), 930–36. Dordrecht: Atlantis Press International BV, 2022. http://dx.doi.org/10.2991/978-94-6463-008-4_116.

Full text
Abstract:
AbstractThe need for communication technology, especially internet data services, cannot be separated from people’s lives. Almost all people now have internet data services to meet their internet access needs. However, the public is faced with many choices of internet data services offered by cellular network operators, one of which is Smartfren. PT Smartfren Telecom, Tbk, provides a wide selection of attractive data services and adapts to the needs of the community in order to increase the number of new customers and retain old customers. PT Smartfren Telecom, Tbk uses a 4P marketing mix strategy (Product, Price, People, Promotion) to increase and retain its customers. However, Smartfren is still inferior to other provider competitors, where Telkomsel has a market share value of 49.47%, XL 29.79%, Tri 16.49%, Indosat 10.64%, and Smartfren 5.85%. This shows that although there is a growth in customers every year, the market share (users) is still lagging behind other competitors. This study aims to increase market share using SWOT analysis. This study applied the 4P marketing mix theory and SWOT analysis to examine the issues raised. Data were collected by conducting interviews and direct observation. The results of this research will later show a marketing strategy to increase and retain the number of Smartfren customers.
APA, Harvard, Vancouver, ISO, and other styles
2

Ogg, Jim. "The Role of Pension Policies in Preventing Old-Age Exclusion." In International Perspectives on Aging, 373–83. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-51406-8_29.

Full text
Abstract:
AbstractAccess to an adequate pension is fundamental to preventing exclusion. As populations age, modern economies have put into place pension reforms to safeguard financial stability. In Europe, raising the age of eligibility for pensions and increasing the length of time necessary in a working career to access a pension are among the main policy measures that are being adopted. In addition, pensions and life expectancy are increasingly linked mainly in the form of the replacement of defined benefit pensions, where financial risks were shared collectively and produced stable pension benefits, by defined contribution pensions which depend on the capacity of individuals to save and individualise the risk of investments in diverse pension schemes. This chapter presents the main mechanisms of reforms to pension systems and addresses the opportunities and constraints for reducing exclusion in later life. It focuses on policies that aim to safeguard adequate levels of pension income for individuals who are unable to extend their working life; policies that aim to reduce gender pay gaps and, in turn, gender pension gaps; reforms to survivor pensions; and the provision of pension safety nets for individuals who have not built up enough contributions to ensure an adequate income. These policies are examined in the context of new social risks which result from shifting political systems, rapid technological change, and economic uncertainties.
APA, Harvard, Vancouver, ISO, and other styles
3

Suwal, Madan Krishna, and Falk Huettmann. "A Rather Short Story of Shared GIS Data Layers in the Hindu Kush-Himalayas: State of the Art, Justifications and Urgent Suggestions for a Sustainable Global Data Governance with Open Access and Open Source Coming to the Rescue." In Hindu Kush-Himalaya Watersheds Downhill: Landscape Ecology and Conservation Perspectives, 521–63. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36275-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gyasi-Agyei, A. "Cross-Layer RRM in Wireless Data Networks." In Encyclopedia of Mobile Computing and Commerce, 165–71. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch029.

Full text
Abstract:
Scheduling is the dynamic process of allocating a shared resource to multiple parallel users in order to optimize some desirable performance metrics. Metrics of interest include: maximization of system throughput, minimization of packet delay and jitter, and the provision of fairness. Scheduling is a key mechanism in RRM and operates in the medium access control (MAC) layer. Only three things can happen to the transmission medium of a multiuser network: resource hogging, resource clogging, or equitable resource sharing. Without a MAC protocol, the desirable third option can hardly occur. In the following we discuss some general aspects of OS, propose a generalized OS design framework, discuss future trends of OS, and list some open issues in OS design.
APA, Harvard, Vancouver, ISO, and other styles
5

Sari, Arif. "Security Issues in Mobile Wireless Ad Hoc Networks." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 66–94. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch005.

Full text
Abstract:
The purpose of this chapter is to investigate and expose methods and techniques developed to provide security in wireless ad hoc networks. Researchers have proposed variety of solutions for security problems of Wireless Mobile Ad-Hoc Networks (MANET) against Distributed Denial of Service (DDoS) attacks. Due to the wireless nature of the channels and specific characteristics of MANETs, the attacks cannot be defeated through conventional security mechanisms. An adversary can easily override its medium access control protocol (MAC) and continually transfer packages on the network channel and the access point node(s) cannot assign authorization access to shared medium. These attacks cause a significant decrease on overall network throughput, packet transmission rates and delay in the MAC layer since other nodes back-off from the communication. In this chapter the proposed methods are applied for preventing and mitigating different wireless ad hoc network attacks are investigated and effectiveness and efficiency of these mechanisms are exposed.
APA, Harvard, Vancouver, ISO, and other styles
6

Sang, Aimin, Guosen Yue, Xiaodong Wang, and Mohammad Madihian. "Cross-Layer Performance of Scheduling and Power Control Schemes in Space-Time Block Coded Downlink Packet Systems." In Handbook on Advancements in Smart Antenna Technologies for Wireless Networks, 374–97. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-988-5.ch018.

Full text
Abstract:
In this chapter, we consider a cellular downlink packet data system employing the space-time block coded (STBC) multiple- input-multiple-output (MIMO) scheme. Taking the CDMA high data rate (HDR) system for example, we evaluate the cross-layer performance of typical scheduling algorithms and a point-to-point power control scheme over a time division multiplexing (TDM)-based shared MIMO channel. Our evaluation focuses on the role of those schemes in multi-user diversity gain, and their impacts on medium access control (MAC) and physical layer performance metrics for delay-tolerant data services, such as throughput, fairness, and bit or frame error rate. The cross-layer evaluation shows that the multi-user diversity gain, which comes from opportunistic scheduling schemes exploiting independent channel oscillations among multiple users, can increase the aggregate throughput and reduce the transmission error rate. It also shows that STBC/MIMO and one-bit and multi-bit power control can indeed help the physical and MAC layer performance but only at a risk of limiting the multiuser diversity gain or the potential throughput of schedulers for delay-tolerant bursty data services.
APA, Harvard, Vancouver, ISO, and other styles
7

Louvros, S. "Next Generation Cellular Network Planning." In End-User Computing, 2308–28. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-945-8.ch134.

Full text
Abstract:
In this chapter, a multi-layer ATM architecture is proposed for the interconnection of current and future mobile communications nodes. Consisting of different ATM node types with respect to switching capability, the proposed architecture is adapted to current 2G and evolving 3G systems as well as future 4G wireless systems, as a common and shared backbone transmission network interconnecting core and access nodes between each other and Internet or PLMN/PSTN. Moreover, facing the huge expansion of transmission interconnection network that will support current and future generation mobile communications, a modification of the standard ATM cell structure is introduced in order to efficiently support user mobility functional procedures. The proposed ATM architecture is integrated over a suitable, with respect to region and capacity, physical interface, consisting of SDH or SONET for wide area topologies, wireless links for outdoor areas and LED-POF combination for indoor areas. Being an interesting alternative over copper or traditional fiber, POF characteristics and performance issues are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
8

Ukil, Arijit. "Advanced Scheduling Schemes in 4G Systems." In Wireless Technologies, 2108–57. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-101-6.ch809.

Full text
Abstract:
The deterministic factor for 4G wireless technologies is to successfully deliver high value services such as voice, video, real-time data with well defined Quality of Service (QoS), which has strict prerequisite of throughput, delay, latency and jitter. This requirement should be achieved with minimum use of limited shared resources. This constraint leads to the development and implementation of scheduling policy which along with adaptive physical layer design completely exploit the frequency, temporal and spatial dimensions of the resource space of multi-user system to achieve the best system-level performance. The basic goal for scheduling is to allocate the users with the network resources in a channel aware way primarily as a function of time and frequency to satisfy individual user’s service request delivery (QoS guarantee) and overall system performance optimization. Advanced scheduling schemes consider cross-layer optimization principle, where to fully optimize wireless broadband networks; both the challenges from the physical medium and the QoS-demands from the applications are to be taken into account. Cross-layer optimization needs to be accomplished by the design philosophy of jointly optimizing the physical, media access control, and link layer, while leveraging the standard IP network architecture. Cross-layer design approaches are critical for efficient utilization of the scarce radio resources with QoS provisioning in 4G wireless networks and beyond. The scheduler, in a sense, becomes the focal point for achieving any cross-layer optimization, given that the system design allows for this. The scheduler uses information from the physical layer up to the application layer to make decisions and perform optimization. This is a fundamental advantage over a system where the intelligence is distributed throughout the all entities of the network. In this chapter, the authors present an overview of the basic scheduling schemes as well as investigate advanced scheduling schemes particularly in OFDMA and packet scheduling schemes in all-IP based 4G systems. Game theoretic approach of distributed scheduling, which is of particular importance in wireless ad hoc networks, will also be discussed. 4G wireless networks are mostly MIMO based which introduces another degree of freedom for optimization, i.e. spatial dimension, for which scheduling in MIMO systems is very much complicated and computation intensive. MIMO resource allocation and scheduling is also covered in this chapter. The key research challenges in 4G wireless networks like LTE, WiMAX and the future research direction for scheduling problems in 4G networks are also presented in this chapter.
APA, Harvard, Vancouver, ISO, and other styles
9

Abdullah, M. K. A., S. A. Aljunid, M. D. A. Samad, S. B. A. Anas, and R. K. Z. Sahbudin. "Unified KS-Code." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1473–79. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch198.

Full text
Abstract:
Many codes have been proposed for optical CDMA system as discussed in Svetislav, Mari, Zoran, Kosti, and Titlebaum (1993), Salehi (1989), Liu and Tsao (2002), Maric, Moreno, and Corrada (1996), Wei and Ghafouri-Shiraz (2002), and Prucnal, Santoro, and Ting (1986). Optical code division multiple access (OCDMA) has been recognized as one of the most important technologies for supporting many users in shared media simultaneous, and in some cases can increase the transmission capacity of an optical fiber. OCDMA is an exciting developments in short haul optical networking because it can support both wide and narrow bandwidth applications on the same network, it connects large number of asynchronous users with low latency and jitter, and permits quality of service guarantees to be managed at the physical layer, offers robust signal security and has simplified network topologies. However, for improperly designed codes, the maximum number of simultaneous users and the performance of the system can be seriously limited by the multiple access interference (MAI) or crosstalk from other users. Another issue in OCDMA is how the coding is implemented. The beginning idea of OCDMA was restricted in time domain, in which the encoding/decoding could not been fully utilized in optical domain. Therefore a new coding in OCDMA has been introduced based on spectral encoding (Kavehrad & Zaccarin, 1995; Pearce & Aazhang, 1994; Smith, Blaikie, & Taylor, 1998; Wei & Ghafouri-Shiraz, 2002). The system, called Optical Spectrum CDMA, or OS-CDMA, has the advantage of using inexpensive optical sources, and simple direct detection receivers. In this article with an emphasis on the Spectral Amplitude Coding scheme, a new code known as Khazani-Syed (KS) code is introduced.
APA, Harvard, Vancouver, ISO, and other styles
10

Dore, Poornima, and K. Narayanan. "Economic Structure and Access." In Regional Economic Diversity, 34–50. Oxford University PressDelhi, 2022. http://dx.doi.org/10.1093/oso/9780190130596.003.0003.

Full text
Abstract:
Abstract In this Chapter the definition and rationale of the ‘region’ as a unit of analysis is discussed, and among other things, the detailed methodology of calculating regional value added, calculating sectoral shares and also the diversity index etc. is explained. A deep discussion on data sources at the regional level as well as the analytical techniques that they lend themselves to which we use in later chapters, are explained here.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SHARED ACCESS LAYER"

1

Kim, Guehee, Yoshio Suzuki, and Naoya Teshima. "Network Computing Infrastructure to Share Tools and Data in GNEP." In 17th International Conference on Nuclear Engineering. ASMEDC, 2009. http://dx.doi.org/10.1115/icone17-75304.

Full text
Abstract:
Network computing infrastructure for sharing tools and data was implemented to support international collaboration. In designing the system, we focused on three issues: accessibility, security, and usability. In the implementation, we integrated existing network and web technologies into the infrastructure by introducing the authentication gateway. For the first issue, SSL-VPN (Security Socket Layer – Virtual Private Network) technology was adopted to access computing resources beyond firewalls. For the second issue, PKI (Public Key Infrastructure)-based authentication mechanism was used for access control. Shared key based file encryption was also used to protect against information leakage. The introduction of the authentication gateway enables to strengthen the security. To provide high usability, WebDAV (Web-based Distributed Authoring and Versioning) was used to provide users with a function to manipulate distributed files through a windows-like GUI (Graphical User Interface). These functions were integrated into a Grid infrastructure called AEGIS (Atomic Energy Grid InfraStructure). Web applications were developed on the infrastructure for dynamic community creation and information sharing. In this paper, we discuss design issues of the system and report the implementation of a prototype applied to share information for the international project GNEP (Global Nuclear Energy Partnership).
APA, Harvard, Vancouver, ISO, and other styles
2

Banane, Mouad, and Abdessalam Belangour. "Shared Models and Open Infrastructures for the smart City Internet of Things based on the Semantic Web." In International Conference on the 4th Game Set and Match (GSM4Q-2019). Qatar University Press, 2019. http://dx.doi.org/10.29117/gsm4q.2019.0033.

Full text
Abstract:
Contemporary cities face many challenges: energy, ecological, demographic or economic. To answer this, technological means are implemented in cities through the use of sensors and actuators. These cities are said to be smart. Currently, smart cities are operated by actors who share neither their sensor data nor access to their actuators. This situation is called vertical: each operator deploys its own sensors and actuators and has its own IT infrastructure hosting its applications. This leads to infrastructure redundancy and ad-hoc applications to oversee and control an area of the city. A trend is to move towards a so-called horizontal situation via the use of an open and shared mediation platform. Sensor data and access to the actuators are shared within this type of platform, allowing their sharing between the different actors. The costs of infrastructure and development are then reduced. This work is part of such a context of horizontalization, within an open and shared platform, in which we propose: 1) a layer of abstraction for control and supervision of the city, 2) a competition control mechanism handling conflict cases based on the RDF (Resource Description Framework) semantic Web standard, 3) a coordination mechanism promoting the reuse of actuators using ontology, 4) an implementation of our work by a proof of concept. The abstraction we propose is based on models from reactive systems. They aim to be generic and represent the invariant of the smart city: the physical elements. They allow applications to control and supervise the city. To facilitate the development of applications we standardize the interface of our models. Since these applications may have real-time constraints, especially those that have control objectives, we propose to take advantage of the distributed architecture of this type of platform. Given the sharing of the actuators, we have identified that conflicts can arise between applications. We propose a mechanism of competition control to deal with these cases of conflicts. We have also identified that a coordination mechanism must be offered to applications wishing to perform atomic control operations. Such a mechanism promotes the reuse of the actuators present in the city. Finally, we implemented our proposals around a proof of concept, including several use cases, to demonstrate our work.
APA, Harvard, Vancouver, ISO, and other styles
3

Scheuer, Jacob. "Secure long-range and high bit-rate distribution of shared key using dark states ultra-long fiber laser (UFL)." In Broadband Access Communication Technologies XII, edited by Benjamin B. Dingel, Katsutoshi Tsukamoto, and Spiros Mikroulis. SPIE, 2018. http://dx.doi.org/10.1117/12.2295753.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McLain, Rachelle M., and Hannah McKelvey. "The Time Has Come... To Move Many Things: Inventorying and Preparing a Collection for Offsite Storage." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317169.

Full text
Abstract:
In the spring of 2019, the Montana State University (MSU) Library embarked on a large-scale inventory project that involved weeding and moving portions of their collection to an offsite storage facility within six months in order to create more student study space in the Library. The department primarily responsible for leading the project, Collections Access & Technical Services, the result of two departments merging, was also simultaneously navigating their new structure and a remodel of their workspace thus adding further challenges to the project. This poster session demonstrated how MSU Library approached and completed this project by advocating to their Library Administration for additional resources, including hiring a project manager and third-party companies to assist with the inventory and moving of the collection. It also discussed the types of work groups formed to identify new workflows (i.e., retrieval of offsite items) and modify existing ones, involving student employees in the project, and internal and external collaborations that took place. Additionally, presenters shared strategies used to communicate to their campus community, and the impact this project has had on our patrons. They also included statistics that were gathered during the project including deselection figures, the number of materials that did not have barcodes and were not accounted for in the Library’s catalog and discovery layer (Ex Libris’ Alma and Primo), and what subject areas currently remain in the main library building.
APA, Harvard, Vancouver, ISO, and other styles
5

Leung, T. M., Irina Kukina, and Anna Yuryevna-Lipovka. "On the formulation of green open space planning parameters: A parametric tool." In 24th ISUF 2017 - City and Territory in the Globalization Age. Valencia: Universitat Politècnica València, 2017. http://dx.doi.org/10.4995/isuf2017.2017.6056.

Full text
Abstract:
Greenery can affect spatial characteristics such as relationship between hard and soft surfaces and activities inside open spaces. Among different types of greenery, trees have influences on summer shading and winter solar access, and hence usage patterns in open spaces. However, the relationship between tree planting and open space characteristics such as typology, proportion and height-to-width ratio in terms of shading and solar access was rarely investigated. On the other hand, there has been an increasing number of studies on using parametric tools to design urban environment recently. Despite the success in urban fabric planning by parametric tools, the utilization of these tools to design open spaces with a relatively smaller scale has not been revealed. Even worse, parameters that should be included in a parametric design tool for open space planning are still unknown. Accordingly, the primary objective of this study is to, by investigating the design characteristics and concepts of different open spaces, identify parameters for a parametric tool to design green open spaces. Specifically, the possibility of using shaded areas projected by trees and surrounding buildings as one of the parameters will be revealed. The study also aims at examining how the height-to-width ratios, proportions and typologies of open spaces will affect tree planting positions when optimizing shading or solar access of the spaces in different climate zones. Results from this study will provide designers with an additional layer of information when designing open spaces.
APA, Harvard, Vancouver, ISO, and other styles
6

Kaur, Harminder, and Sharvan Kumar Pahuja. "MAC Protocols for Wireless Body Sensor Network." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.33.

Full text
Abstract:
Wireless Body Area Networks, also known as the Wireless Body Sensor Networks, provides the monitoring of the health parameters in remote areas and where the medical facility is not available. Wireless Body Sensor Networks contains the body or placement of the sensors on body for measuring the medical and non-medical parameters. These networks share the wireless medium for the transmission of the data from one place to another. So the design of Medium Access Control is a challenging task for the WBSNs due to wireless media for less energy consumption and mobility. Various MAC protocols are designed to provide less energy consumption and improve the network lifetime. This paper presents the study of these existing MAC layer protocols based on different QoS parameters that define the network quality.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Susan X. "Performing Circuit Modification and Debugging Using Focused-Ion-Beam on Multi-Layered C4 Flip-Chip Devices." In ISTFA 1998. ASM International, 1998. http://dx.doi.org/10.31399/asm.cp.istfa1998p0067.

Full text
Abstract:
Abstract The task of circuit repairing and debugging using a Focused-Ion-Beam system on multi-layered IC devices is often difficult and tedious, especially when desired or target metal nodes or layers are buried under other higher level or nontarget metal nodes or layers. As a result, not only are target nodes difficult to access, but also, undesired shorts are difficult to prevent. To further complicate the situation, as the number of metal layers increases, the lower level metal nodes become increasingly thinner, and the node population becomes increasingly denser. These conditions result in a decreased success rate utilizing the FIB and an increased turn-around time for design debugging. Besides significant improvement of the FIB equipment and tools, new techniques that can be used to overcome the difficulties encountered during FIB operations on multi-layered IC devices need to be utilized. In this paper, we will focus on discussion of some new techniques that can be used for FIB device modification work and device debugging on multi-layered IC devices, including C4 (controlled-collapse chip connection) flip-chip devices. Some recommendations and tips for using these techniques on complicated fib modification work will also be shared based on the author’s experience.
APA, Harvard, Vancouver, ISO, and other styles
8

Agarwal, Shubham, Laurent Gicquel, Florent Duchaine, Nicolas Odier, and Jérôme Dombard. "Analysis of the Unsteady Flow Field Inside a Fan-Shaped Cooling Hole Predicted by Large-Eddy Simulation." In ASME Turbo Expo 2020: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/gt2020-14201.

Full text
Abstract:
Abstract Film cooling is a common technique to manage turbine vane and blade thermal environment. Optimizing its cooling efficiency is furthermore an active research topic which goes in hand with a strong knowledge of the flow associated with a cooling hole. The following paper aims at developing deeper understanding of the flow physics associated with a standard cooling hole and helping guide future cooling optimization strategies. For this purpose, Large Eddy Simulations (LES) of the 7-7-7 fan-shaped cooling hole [1] is performed and the flow inside the cooling hole is studied and discussed. Use of mathematical techniques such as the Fast Fourier Transforms (FFT) and Dynamic Mode Decomposition (DMD) is done to quantitatively access the flow modal structure inside the hole based on the LES unsteady predictions. Using these techniques, distinct vortex features inside the cooling hole are captured. These features mainly coincide with the roll-up of the internal shear layer formed at the interface of the separation region at the hole inlet. The topology of these vortex features is discussed in detail and it is also shown how the expansion of the cross-section in case of shaped holes aids in breaking down these vortices. Indeed upon escaping, these large scale features are known to not be always beneficial to film cooling effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
9

Savoie, Charles, and Darryl Rivest. "Advanced Radiographic Scanning, Enhancement and Electronic Data Storage." In 2002 4th International Pipeline Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/ipc2002-27174.

Full text
Abstract:
It is a well-known fact that radiographs deteriorate with time. Substantial cost is attributed to cataloguing and storage. To eliminate deterioration issues and save time retrieving radiographs, laser scanning techniques were developed in conjunction with viewing and enhancement software. This will allow radiographs to be successfully scanned and stored electronically for future reference. Today’s radiographic laser scanners are capable of capturing images with an optical density of up to 4.1 at 256 grey levels and resolutions up to 4096 pixels per line. An industrial software interface was developed for the non-destructive testing industry so that certain parameters such as scan resolution, number of scans, file format and location to be saved could be adjusted as needed. Once the radiographs have been scanned, the tiff images are stored, or retrieved into Radiance software (developed by Rivest Technologies Inc.), which will help to properly interpret the radiographs. Radiance was developed to allow the user to quickly view the radiograph’s correctness or enhance its defects for comparison and future evaluation. Radiance also allows the user to zoom, measure and annotate areas of interest. Physical cost associated with cataloguing, storing and retrieving radiographs can be eliminated. You can now successfully retrieve and view your radiographs from CD media or dedicated hard drive at will. For continuous searches and/or field access, dedicated hard drives controlled by a server would be the media of choice. All scanned radiographs will be archived to CD media (CD-R). Laser scanning with a proper acquisition interface and easy to use viewing software will permit a qualified user to identify areas of interest and share this information with his/her colleagues via e-mail or web data access.
APA, Harvard, Vancouver, ISO, and other styles
10

Hassa, Christoph, Chris Willert, Michael Fischer, Guido Stockhausen, Ingo Ro¨hle, Wolfgang Meier, Lorin Wehr, and Peter Kutne. "Nonintrusive Flowfield, Temperature and Species Measurements on a Generic Aeroengine Combustor at Elevated Pressures." In ASME Turbo Expo 2006: Power for Land, Sea, and Air. ASMEDC, 2006. http://dx.doi.org/10.1115/gt2006-90213.

Full text
Abstract:
A generic combustor was built, that gives wide optical access at higher pressure and shares typical features with aero engine combustors. A comprehensive data set for validation of RANS and LES codes was generated at isothermal as well as combusting conditions at 2 and 10 bars with 650 K preheat using natural gas as fuel. The velocity field was measured using LDA (Laser Doppler Anemometry) and DGV (Doppler Global Velocimetry) as well as PIV (Particle Image Velocimetry). Temperature data were acquired using CARS (Coherent Anti stokes Raman Scattering) and SRS (Spontaneous Raman Scattering). Major species concentrations as well as the mixture fraction in the primary zone of the combustor were also measured using SRS. Mean and RMS values of the temperature measured by CARS in the secondary zone illustrate the influence of the jet impingement on the unsteady mixing of the jets with the swirling primary air.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SHARED ACCESS LAYER"

1

Habyarimana, James, Ken Ochieng' Opalo, and Youdi Schipper. The Cyclical Electoral Impacts of Programmatic Policies: Evidence from Education Reforms in Tanzania. Research on Improving Systems of Education (RISE), September 2020. http://dx.doi.org/10.35489/bsg-rise-wp_2020/051.

Full text
Abstract:
A large literature documents the electoral benefits of clientelistic and programmatic policies in low-income states. We extend this literature by showing the cyclical electoral responses to a large programmatic intervention to expand access to secondary education in Tanzania over multiple electoral periods. Using a difference-indifference approach, we find that the incumbent party's vote share increased by 2 percentage points in the election following the policy's announcement as a campaign promise (2005), but decreased by -1.4 percentage points in the election following implementation (2010). We find no discernible electoral impact of the policy in 2015, two electoral cycles later. We attribute the electoral penalty in 2010 to how the secondary school expansion policy was implemented. Our findings shed light on the temporally-contingent electoral impacts of programmatic policies, and highlight the need for more research on how policy implementation structures public opinion and vote choice in low-income states.
APA, Harvard, Vancouver, ISO, and other styles
2

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies, January 2022. http://dx.doi.org/10.55271/5jchdy.

Full text
Abstract:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of the planet. Moreover, it has latched on to religion, which, as history reminds us, has an unparalleled power to mobilize crowds. This report explores the unique nexus between faith and populism in our era and offers an insight into how cyberspace and offline politics have become highly intertwined to create a hyper-reality in which socio-political events are taking place. The report focuses, in particular, on the role of religious populism in digital space as a catalyst for undemocratic politics in the five Asian countries we have selected as our case studies. The focus on the West Asian and South Asian cases is an opportunity to examine authoritarian religious populists in power, whereas the East Asian countries showcase powerful authoritarian religious populist forces outside parliament. This report compares internet governance in each of these countries under three categories: obstacles to access, limits on content, and violations of user rights. These are the digital toolkits that authorities use to govern digital space. Our case selection and research focus have allowed us to undertake a comparative analysis of different types of online restrictions in these countries that constrain space foropposition and democratic voices while simultaneously making room for authoritarian religious populist narratives to arise and flourish. The report finds that surveillance, censorship, disinformation campaigns, internet shutdowns, and cyber-attacks—along with targeted arrests and violence spreading from digital space—are common features of digital authoritarianism. In each case, it is also found that religious populist forces co-opt political actors in their control of cyberspace. The situational analysis from five countries indicates that religion’s role in digital authoritarianism is quite evident, adding to the layer of nationalism. Most of the leaders in power use religious justifications for curbs on the internet. Religious leaders support these laws as a means to restrict “moral ills” such as blasphemy, pornography, and the like. This evident “religious populism” seems to be a major driver of policy changes that are limiting civil liberties in the name of “the people.” In the end, the reasons for restricting digital space are not purely religious but draw on religious themes with populist language in a mixed and hybrid fashion. Some common themes found in all the case studies shed light on the role of digital space in shaping politics and society offline and vice versa. The key findings of our survey are as follows: The future of (especially) fragile democracies is highly intertwined with digital space. There is an undeniable nexus between faith and populism which offers an insight into how cyberspace and politics offline have become highly intertwined. Religion and politics have merged in these five countries to shape cyber governance. The cyber governance policies of populist rulers mirror their undemocratic, repressive, populist, and authoritarian policies offline. As a result, populist authoritarianism in the non-digital world has increasingly come to colonize cyberspace, and events online are more and more playing a role in shaping politics offline. “Morality” is a common theme used to justify the need for increasingly draconian digital laws and the active monopolization of cyberspace by government actors. Islamist and Hindutva trolls feel an unprecedented sense of cyber empowerment, hurling abuse without physically seeing the consequences or experiencing the emotional and psychological damage inflicted on their victims.
APA, Harvard, Vancouver, ISO, and other styles
3

Yilmaz, Ihsan, Raja M. Ali Saleem, Mahmoud Pargoo, Syaza Shukri, Idznursham Ismail, and Kainat Shakil. Religious Populism, Cyberspace and Digital Authoritarianism in Asia: India, Indonesia, Malaysia, Pakistan, and Turkey. European Center for Populism Studies (ECPS), January 2022. http://dx.doi.org/10.55271/rp0001.

Full text
Abstract:
Turkey, Pakistan, India, Malaysia, and Indonesia span one of the longest continuously inhabited regions of the world. Centuries of cultural infusion have ensured these societies are highly heterogeneous. As plural polities, they are ripe for the kind of freedoms that liberal democracy can guarantee. However, despite having multi-party electoral systems, these countries have recently moved toward populist authoritarianism. Populism —once considered a distinctively Latin American problem that only seldom reared its head in other parts of the world— has now found a home in almost every corner of the planet. Moreover, it has latched on to religion, which, as history reminds us, has an unparalleled power to mobilize crowds. This report explores the unique nexus between faith and populism in our era and offers an insight into how cyberspace and offline politics have become highly intertwined to create a hyper-reality in which socio-political events are taking place. The report focuses, in particular, on the role of religious populism in digital space as a catalyst for undemocratic politics in the five Asian countries we have selected as our case studies. The focus on the West Asian and South Asian cases is an opportunity to examine authoritarian religious populists in power, whereas the East Asian countries showcase powerful authoritarian religious populist forces outside parliament. This report compares internet governance in each of these countries under three categories: obstacles to access, limits on content, and violations of user rights. These are the digital toolkits that authorities use to govern digital space. Our case selection and research focus have allowed us to undertake a comparative analysis of different types of online restrictions in these countries that constrain space foropposition and democratic voices while simultaneously making room for authoritarian religious populist narratives to arise and flourish. The report finds that surveillance, censorship, disinformation campaigns, internet shutdowns, and cyber-attacks—along with targeted arrests and violence spreading from digital space—are common features of digital authoritarianism. In each case, it is also found that religious populist forces co-opt political actors in their control of cyberspace. The situational analysis from five countries indicates that religion’s role in digital authoritarianism is quite evident, adding to the layer of nationalism. Most of the leaders in power use religious justifications for curbs on the internet. Religious leaders support these laws as a means to restrict “moral ills” such as blasphemy, pornography, and the like. This evident “religious populism” seems to be a major driver of policy changes that are limiting civil liberties in the name of “the people.” In the end, the reasons for restricting digital space are not purely religious but draw on religious themes with populist language in a mixed and hybrid fashion. Some common themes found in all the case studies shed light on the role of digital space in shaping politics and society offline and vice versa. The key findings of our survey are as follows: The future of (especially) fragile democracies is highly intertwined with digital space. There is an undeniable nexus between faith and populism which offers an insight into how cyberspace and politics offline have become highly intertwined. Religion and politics have merged in these five countries to shape cyber governance. The cyber governance policies of populist rulers mirror their undemocratic, repressive, populist, and authoritarian policies offline. As a result, populist authoritarianism in the non-digital world has increasingly come to colonize cyberspace, and events online are more and more playing a role in shaping politics offline. “Morality” is a common theme used to justify the need for increasingly draconian digital laws and the active monopolization of cyberspace by government actors. Islamist and Hindutva trolls feel an unprecedented sense of cyber empowerment, hurling abuse without physically seeing the consequences or experiencing the emotional and psychological damage inflicted on their victims.
APA, Harvard, Vancouver, ISO, and other styles
4

Adolescent Data Hub User Guide. Population Council, 2018. http://dx.doi.org/10.31899/sbsr2018.1016.

Full text
Abstract:
The Adolescent Data Hub is a resource for researchers, organizations, and other stakeholders to share and access data on adolescents and young people living in low- and middle-income countries. This unique global portal includes information on datasets that meet the following criteria: 1) Individual level interviews of females and/or males ages 10–24 years; 2) One or more rounds of data collected in year 2000 or later; 3) Data are publicly available; and 4) Data are collected in low- and middle-income countries.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography