Academic literature on the topic 'SHARED ACCESS LAYER – SERVICE'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SHARED ACCESS LAYER – SERVICE.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SHARED ACCESS LAYER – SERVICE"

1

Scott, Rachel E., and Gail Barton. "Promoting Interlibrary Loan in the Traditional Catalog and Discovery Layer: Two Pilot Projects." Library Resources & Technical Services 62, no. 2 (April 4, 2018): 74. http://dx.doi.org/10.5860/lrts.62n2.74.

Full text
Abstract:
This paper describes two projects that promote interlibrary loan (ILL) in both traditional online public access catalogs and discovery settings to address user frustrations with gaps in the collection. By creating and inserting OpenURL links into bibliographic records for titles held exclusively by external institutions, the authors leveraged the discovery capabilities of their shared catalog and promoted ILL as an alternative means of access. The second project targeted the overwhelming amount of content indexed in the library’s discovery layer that was not locally available. To more directly translate discovery into access, the authors worked with EBSCO to create and enable ILL CustomLinks for this content indexed by EBSCO Discovery Service and not available to their users. This paper presents ILL data to investigate whether these projects are changing the ways our users find and access content not held locally.
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Min, and Junshu Wang. "Using the Internet of Things E-Government Platform to Optimize the Administrative Management Mode." Wireless Communications and Mobile Computing 2021 (July 26, 2021): 1–11. http://dx.doi.org/10.1155/2021/2224957.

Full text
Abstract:
This paper builds an intelligent E-Government platform based on the Internet of Things. It adopts a three-layer architecture model, including the government collection layer, the government network layer, and the government application layer. By making full use of data technology and information technology, government services can be realized in real-time perception, efficient operation, scientific decision-making, active service, and intelligent supervision and can be open and collaborative, so as to provide the public with better quality and more efficient and more responsive government services. In addition, this paper has realized optimization in the aspects of government service mode, Internet of Things application mode, and database structure. Through the use of big data technology, the government service information will be digitized and integrated, and through the data sharing and exchange platform, the government information resources will be intercommunicated and shared across departments, levels, and regions. The application mode has been upgraded. Compared with the traditional E-Government, the government has made a qualitative leap in the degree of automation of control, the intelligence of service and decision, the remote support ability, and the space-time scope that government can control. The distributed management mode of the SQL Server is adopted to realize the exchange of requested data and process the data content, which can greatly improve the working efficiency of the system. Finally, through testing, the government affairs management system has good stability; there is no congestion and delay when multiple users access the system, so the response speed and efficiency of the system basically meet the requirements.
APA, Harvard, Vancouver, ISO, and other styles
3

Oh, Se-Ra, and Young-Gab Kim. "AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090638. http://dx.doi.org/10.1177/1550147720906388.

Full text
Abstract:
Internet of Things has become a fundamental paradigm in our everyday lives. However, standards and technologies are often designed without considering interoperability, which is a critical issue for Internet of Things. Internet of Things environment requires interoperability to share resources (e.g. data and services) between heterogeneous Internet of Things domains. The open authorization (OAuth) 2.0 framework that is actively used in Internet of Things (as well as in conventional web environments) also did not focus on interoperability. In other words, the systems that implement the same OAuth 2.0 standard cannot interoperate without additional support. For this reason, we propose an authorization framework as a service. Authorization framework as a service provides an additional authorization layer to support standard authorization capabilities as an interoperable secure wrapper between different domains. Besides, authorization framework as a service supports the four extended authorization grant flow types to issue an interoperable access token, which has a global access scope across multiple heterogeneous domains. With the authorization framework as a service, interoperability can be supported for heterogeneous domains, and token management can also be simple because an interoperable access token can represent several existing access tokens that have local access scopes. Furthermore, this article presents a feasible interoperability scenario, implementation, and security considerations for authorization framework as a service, focusing on Internet of Things platforms.
APA, Harvard, Vancouver, ISO, and other styles
4

Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. "An Introduction of a Modular Framework for Securing 5G Networks and Beyond." Network 2, no. 3 (July 22, 2022): 419–39. http://dx.doi.org/10.3390/network2030026.

Full text
Abstract:
Fifth Generation Mobile Network (5G) is a heterogeneous network in nature, made up of multiple systems and supported by different technologies. It will be supported by network services such as device-to-device (D2D) communications. This will enable the new use cases to provide access to other services within the network and from third-party service providers (SPs). End-users with their user equipment (UE) will be able to access services ubiquitously from multiple SPs that might share infrastructure and security management, whereby implementing security from one domain to another will be a challenge. This highlights a need for a new and effective security approach to address the security of such a complex system. This article proposes a network service security (NSS) modular framework for 5G and beyond that consists of different security levels of the network. It reviews the security issues of D2D communications in 5G, and it is used to address security issues that affect the users and SPs in an integrated and heterogeneous network such as the 5G enabled D2D communications network. The conceptual framework consists of a physical layer, network access, service and D2D security levels. Finally, it recommends security mechanisms to address the security issues at each level of the 5G-enabled D2D communications network.
APA, Harvard, Vancouver, ISO, and other styles
5

Dugmore, Lois, and Saskia Bauweraerts. "When policy fails try something different integrated practice improve outcomes for dual diagnosis co-occurring service users accessing mental health services." Drugs and Alcohol Today 21, no. 2 (February 22, 2021): 157–70. http://dx.doi.org/10.1108/dat-06-2020-0036.

Full text
Abstract:
Purpose This paper aims to discuss an initiative developed between, Leicestershire Partnership National Health Service Trust and Turning Point, which is the locally commissioned drug and alcohol service in Leicester, Leicestershire and Rutland. The aim was to improve outcomes for clients with dual diagnosis (co-occurring mental health and substance misuse) issues. The purpose of the change in working practice was to engage with local substance misuse agencies more effectively to improve clinical outcomes within this service user group. This was achieved through four interrelated approaches. This comprising providing an integrated service. It included building relationships with substance misuse services, providing specialist dual diagnosis clinics and the introduction of substance misuse workers onto mental health wards and group work specific to substance misuse. The outcomes included easier access to services for service users and greater uptake of service users who were moving onto substance misuse services. This led to a reduction in risk related to prescribing and fewer incidents related to prescribing changes and greater engagement in services. When service users were moving between services better communication led to prescriptions being transferred with no delay and to reduced dropout rates in service. There was improved access to substance misuse services, more referrals and take up of service taking place. There was a greater understanding by staff of co-occurring substance misuse and how to work with this client group. Closer working relationship with substance misuse services and shared skills led to greater confidence in managing this service user group. This demonstrates a cost effective service that can be replicated within similar settings. Design/methodology/approach In clinical practice, shared treatment has proved challenging in light of different service models (Laker, 2006). Substance misuse works on the premise of change comes from the individual, where recovery models in mental health offer a formalised approach. One of the challenges faced by services has been the inability for mental health services to recruit and services become overstretched (Rimmer, 2018); this gave an opportunity for a new method of working to be considered. This led to the development of a new service model. These changes were: • Improving the interface with substance misuse services to improve access to community substance misuse services for mental health clients. • To provide specialist staff within the dual diagnosis field to provide a clinic jointly with local drug and alcohol services. • Introduction of substance misuse workers as team members on acute mental health and rehab wards. • Group Substance Misuse programmes. Findings Working within an integrated model, yet maintaining separate organisations, by offering joint training and clinics has led to a greater understanding of each organisation’s work and increased engagement within the service user group.The introduction of substance misuse workers to acute and rehab mental health inpatient services encouraged service users to engage at the point of admission and to be referred into locally commissioned substance misuse services prior to the point of discharge. Engagement with staff has demonstrated better engagement with substance service by service users following discharge.For clients able to take leave assessment could take place prior to discharge. This led to an increased uptake in services. Due to no opiate substitution given on discharge decreased risk of prescribed medication overdose at point of discharge and led to increase in returning straight to substance misuse services. This meant that service users received medication quicker and the right dose and on discharge ensured reduced risk. The prescribing of Naloxone at discharge is yet to be assessed, but the risk of an overdose within seven days is well-documented and Naloxone is key in reversing this trend. This change in practice can be replicated in any mental health setting and has increased access to services for those using substances. Originality/value Is original no other services have substance workers or joint clinics across the UK. First inpatient unit to welcome patients back post-discharge to attend groups.
APA, Harvard, Vancouver, ISO, and other styles
6

El Bouchti, Abdelali, Abdelkrim Haqiq, and Said El Kafhali. "Quality of Service Analysis and Queuing Performance Modeling of Orthogonal Frequency Division Multiple Access Based IEEE 802.16/WiMAX System." International Journal of Mobile Computing and Multimedia Communications 4, no. 3 (July 2012): 54–70. http://dx.doi.org/10.4018/jmcmc.2012070104.

Full text
Abstract:
The authors present a problem of queuing theoretic performance modeling and analysis of Orthogonal Frequency Division Multiple Access (OFDMA) under broadband wireless networks. They consider a single-cell WiMAX environment in which the base station allocates sub channels to the subscriber stations in its coverage area. The sub channels allocated to a subscriber station are shared by multiple connections at that subscriber station. To ensure the Quality of Service (QoS) performances, a Connection Admission Control (CAC) mechanism is considered at a subscriber station. A queuing analytical framework for these admission control mechanisms is presented considering OFDMA-based transmission at the physical layer and based on the queuing model; both the connection-level and packet-level performances are studied and compared with their analogues in the case without CAC. The connection arrival is modeled by a Poisson process and the packet arrival for a connection by a Markov Modulated Poisson Process (MMPP). Several performance measures, namely connection blocking probability, average number of ongoing connections, average queue length, packet dropping probability, queue throughput and average packet delay, are then derived and quantified.
APA, Harvard, Vancouver, ISO, and other styles
7

Berkani, Lamia, and Azeddine Chikh. "A Semantic Based Approach for Knowledge Capitalization in Communities of Practice of E-Learning." International Journal of Knowledge Society Research 3, no. 4 (October 2012): 1–11. http://dx.doi.org/10.4018/jksr.2012100101.

Full text
Abstract:
Communities of Practice of E-learning (CoPEs) are considered as a virtual framework for exchanging and sharing techno-pedagogic knowledge and know-how between actors of e-learning. However, after analyzing of knowledge management modalities in some CoPEs, the authors noticed that knowledge is often represented in a way that does not facilitate its access and reuse. Accordingly, this paper focuses on knowledge capitalization in CoPEs and proposes an ontology-based framework aiming to facilitate knowledge sharing and reuse. This framework is structured into three layers: (1) the ontology layer, (2) the semantic annotation layer, and (3) the asset layer. It provides respectively, a common vocabulary within a CoPE aiming to enable a shared understanding between its members, a semantic support to annotate its knowledge assets facilitating their retrieval and reuse, and a means of storage and indexing its different assets. The paper is illustrated with a case study related to a semantic adaptive wiki, a service proposed for a CoPE made up of a teaching staff in computer science at the USTHB University in Algeria.
APA, Harvard, Vancouver, ISO, and other styles
8

Boiron, Pierre, and Valère Dussaux. "Software Services Delivered from the Cloud." International Journal of Information Systems in the Service Sector 7, no. 1 (January 2015): 22–37. http://dx.doi.org/10.4018/ijisss.2015010102.

Full text
Abstract:
Picture Archiving and Communication Systems (PACS), alongside Radiological Information Systems (RIS) are nowadays widely disseminated, proven useful, hospital information systems components. The “Région Sans Film” (“Filmless Region”) program was launched in 2009 by the French ministry of health in order to help the generalization to all healthcare structures such as hospitals or general physician practices, of PACS, RIS, and archiving of medical images. It is done by means of a mutualized service platform whom building and running has been entrusted to an industrial consortium. This platform implements the latest technologies of medical image processing and of cloud computing. It is built in order to support service-oriented enterprise architecture composed of one main layer of software services. This natively scalable platform is innovative because it is the first one which contains all the materials for the implementation of all services in the cloud. The corresponding SLA are defined in order to be adaptable to the needs of further health structures which could later join the platform by participating in its mutualized purchasing. The goal is not only to share the costs but also to deliver new images sharing services. New business processes/services around sharing of images such as teleradiology or access to the images produced in hospitals to the general practitioners are defined towards the exercise of real filmless radiology.
APA, Harvard, Vancouver, ISO, and other styles
9

He, Chun Lin. "The Design and Implementation of the Information Remote Monitoring and Security Management System Based on Internet." Advanced Materials Research 846-847 (November 2013): 1414–17. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1414.

Full text
Abstract:
With the development of economy, the existence and application of the inflammable, explosive, toxic and harmful gases irresistible but dangerous at the same time in the industrial production application. for the sake of minimizing potential dangers, the remote security monitoring is of great significance. With the rapid development of network technology, the Internet network technology to implement the remote monitoring can effectively avoid some potential hazards in the industrial production and other dangerous things. We can draw a conclusion from the feedback that the effect of user experience is not ideal in the actual application. So based on the analysis of the traditional structure of remote monitoring system, a new remote monitoring system is created which can avoid these shortcomings through further research. This new system consists of three parts: 1. The client: using Flex rich client technology is more convenient and suitable for communication interface and let the customer feel familiar and easy to use. 2. data management layer: it contains three parts : the Web server layer, application server and database server layer . Application server promotes system real-time performance through Web Service technology, Shared memory and streaming Socket technology, which enables clients to have direct access to the site. 3. Data acquisition layer: data will be collected in a timely manner to send to data management with GPRS technology.
APA, Harvard, Vancouver, ISO, and other styles
10

Ding, Fei, Aiguo Song, En Tong, and Jianqing Li. "A Smart Gateway Architecture for Improving Efficiency of Home Network Applications." Journal of Sensors 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/2197237.

Full text
Abstract:
A smart home gateway plays an important role in the Internet of Things (IoT) system that takes responsibility for the connection between the network layer and the ubiquitous sensor network (USN) layer. Even though the home network application is developing rapidly, researches on the home gateway based open development architecture are less. This makes it difficult to extend the home network to support new applications, share service, and interoperate with other home network systems. An integrated access gateway (IAGW) is proposed in this paper which upward connects with the operator machine-to-machine platform (M2M P/F). In this home network scheme, the gateway provides standard interfaces for supporting various applications in home environments, ranging from on-site configuration to node and service access. In addition, communication management ability is also provided by M2M P/F. A testbed of a simple home network application system that includes the IAGW prototype is created to test its user interaction capabilities. Experimental results show that the proposed gateway provides significant flexibility for users to configure and deploy a home automation network; it can be applied to other monitoring areas and simultaneously supports a multi-ubiquitous sensor network.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SHARED ACCESS LAYER – SERVICE"

1

Metin, Mehmet Ozer. "Creating Application Security Layer Based On Resource Access Decision Service." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/12608827/index.pdf.

Full text
Abstract:
Different solutions have been used for each security aspects (access control, application security) to secure enterprise web applications. However combining "
enterprise-level"
and "
application-level"
security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring together access controlling with application-level security. Removing discrimination between enterprise-level and application-level security policies improves manageability, reusability and scalability of whole system. Resource Access Decision (RAD) specification has been implemented and used as authentication mechanism for this layer. RAD service not only provides encapsulating domain specific factors to give access decisions but also can form a solid base to apply positive and negative security model to secure enterprise web applications. Proposed solution has been used in a real life system and test results have been presented.
APA, Harvard, Vancouver, ISO, and other styles
2

Zhong, Zhenzhe. "Cross-layer congestion control and quality of services in mobile networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT022.

Full text
Abstract:
Le réseau mobile est un réseau hybride avec une partie d’accès radio et le réseau central de liaison fixe. Les algorithmes de contrôle de congestion (CCA) conçus pour un type de système spécifique peuvent ne pas fonctionner aussi bien dans l’autre type de réseau, en particulier le réseau avec un dispositif de fonctionnalité hybride comme le réseau de périphérie mobile. Généralement, le goulot d’étranglement dans un réseau mobile est la partie accès radio. Cependant, ce n’est pas toujours le cas puisque plusieurs stations de base radio ou passerelle de réseau de livraison de paquets peuvent partager le même goulot d’étranglement dans le backhaul de livraison de paquets. Dans cette thèse, nous partons d’une méthode cross-layer et abordons le problème avec une solution omniprésente. Le premier algorithme que nous avons analysé est appelé CQIC, qui implique la couche PHY de l’UE dans la conception du contrôle de la congestion. Une amélioration du scénario 3G CQIC au scénario LTE est proposée sous le nom de DCIC. Cet algorithme utilise l’indicateur de commande de liaison descendante (DCI) au lieu de l’indicateur de qualité de canal (CQI) pour économiser la puissance de calcul sur l’UE et prendre en compte le résultat de la planification d’eNB. En outre, nous avons évalué l’algorithme BBR actuel, qui se concentre sur le réseau du centre de données, dans le scénario mobile. La plupart des CCA conventionnels ne prennent pas en compte la dégradation du BW de liaison montante et les autres caractéristiques du système cellulaire dans sa méthode d’estimation de la largeur de bande. Sur la base de cet examen, nous avons proposé les cinq objectifs de compromis pour guider la conception de l’ACC dans un type de réseau hybride mobile: utilisation de la bande passante, délai (où la perte est l’expression extrême du retard), équité, simplicité et généricité. Sur la base des compromis et des objectifs, nous avons proposé le CDBE, une estimation de la bande passante pilotée par le client TCP (CDBE) et une boucle de rétroaction de rapport. La méthode d’estimation BW côté client ne prend que peu de capacité de calcul dans la deuxième version, par rapport à la première version ou CQIC et DCIC. Coopérer avec la transition d’état côté serveur améliorée CDBE peut atteindre une part équitable de BW dans le réseau central `a paquets fixes ou le réseau mobile avec un coût de RTT inférieur à celui des CCA conventionnels. Aucune unité / application de boîtier de médiation ou de périphérie n’est requise dans l’architecture CDBE
The mobile network is a hybrid network with Radio Access part and the fixed backhaul core network. The congestion control algorithms(CCA) designed for a specific type of system may not work as well in the other kind of network, especially the network with hybrid feature device like the mobile edge network. Generally, the bottleneck in a mobile network is the Radio access part. However, this is not always the case since multiple radio base stations or packet delivery network gateway can be sharing the same bottleneck in the packet delivery backhaul. In this thesis, we start from a cross-layer method and address the issue with a ubiquitous solution. The first algorithm we analysed is called CQIC, which get the PHY layer of UE involved in the congestion control design. An improvement from 3G CQIC to LTE scenario is proposed named DCIC. This algorithm uses the Downlink Control Indicator(DCI) instead of Channel Quality Indicator(CQI) to save the computation power on UE and take the scheduling result of eNB into consideration. Further, we evaluated current BBR algorithm, which focuses on the data centre network, in the mobile scenario. Most conventional CCA does not take the uplink BW degradation and other features in the cellular system into consideration in its bandwidth estimation method. Based on the review, we proposed the five tradeoff objectives to guide the CCA design in a mobile hybrid type of network: Bandwidth Utilisation, Delay (where loss is the extreme expression of delay), Fairness, Simplicity and Genericity. Based on the tradeoffs and goals, we proposed CDBE, a TCP clientside driven bandwidth estimation(CDBE) and report feedback loop. The client-side BW estimation method takes only little computation capability in the second version, compared to its first version and the DCIC. Cooperate with the enhanced server-side state transition CDBE can achieve a fair share of BW in both fixed packet core network or mobile network with a lower cost of RTT compared to conventional CCAs. No extra middlebox or edge computing unit/applications is required in CDBE architecture
APA, Harvard, Vancouver, ISO, and other styles
3

Yrjölä, S. (Seppo). "Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks." Doctoral thesis, Oulun yliopisto, 2017. http://urn.fi/urn:isbn:9789526214993.

Full text
Abstract:
Abstract Sharing is emerging as one of the megatrends influencing future business opportunities, and wireless communications is no exception to this development. Future mobile broadband networks will operate on different types of spectrum bands including shared spectrum, which calls for changes in the operation and management of the networks. The creation and capture of value by the different players in the mobile broadband ecosystem is expected to change due to regulation, technology, and business landscape related drivers that concern not only spectrum sharing, but also sharing of other resources such as infrastructure, technologies, or data. This thesis examines the key business and technology enablers needed to exploit spectrum sharing in mobile broadband networks, and presents the business model characteristics and strategic choices that spectrum sharing concepts support. Action research and integral scenarios methodologies were applied for strategic and business analysis utilizing the capacity and expertise of the policy, business and technology research communities. The thesis introduces a new approach to analyze the scalability of the spectrum sharing concepts and their business model elements utilizing sharing economy antecedent factors. The results indicate that all analyzed sharing concepts meet basic requirements to scale. The Licensed Shared Access (LSA) leverages existing assets and capabilities of the mobile network operator domain, the Citizens Broadband Radio Service (CBRS) extends the business model dynamics from connectivity to content, context and commerce, and the hybrid usage of Ultra High Frequency (UHF) band by Digital Terrestrial TV (DTT) and downlink Long Term Evolution (LTE) (HUHF) enables new collaborative opportunities between converging communication, Internet and media domains. The thesis validates the feasibility of spectrum sharing between mobile broadband networks and other types of incumbent spectrum users utilizing Finnish cognitive radio field trial environment (CORE), and expands the notion of spectrum sharing beyond the mobile broadband domain to be applied to other wireless systems including the media and broadcasting. The presented results can be used in developing the future mobile broadband systems enhanced with innovative spectrum sharing enabled business models to cope with the growing demand for capacity and new services by humans and machines
Tiivistelmä Jakamistalous on yksi suurista tulevaisuuden liiketoimintamahdollisuuksiin vaikuttavista trendeistä, eikä langaton tietoliikenne ole tässä poikkeus. Tulevaisuuden laajakaistaiset matkapuhelinverkot tulevat hyödyntämään erityyppisiä radiotaajuuksia, kuten jaettuja taajuuskaistoja, mikä vaatii muutoksia verkkojen toimintoihin ja hallintaan. Eri toimijoiden arvonluonti- ja ansaintamahdollisuuksien odotetaan muuttuvan näissä liikkuvan laajakaistan ekosysteemeissä regulaation, teknologian ja liiketoimintaympäristön kehittyessä, ei vain taajuuksien jakamisessa, vaan myös kun kyseessä on muiden resurssien kuten infrastruktuurin, teknologioiden tai tiedon jakaminen. Väitöskirja tutkii teknologia- ja liiketoimintaedellytyksiä taajuusjakomenetelmille matkapuhelinverkoissa, sekä esittelee ja analysoi menetelmien mahdollistamia liiketoimintamalleja ja strategisia valintoja. Strategia- ja liiketoiminta-analyyseissä käytettiin toimintatutkimus- ja skenaariomenetelmiä poikkitieteellisissä tutkimusprojekteissa yhteistyössä reguloinnin, liiketoiminnan ja tekniikan tutkimusyhteisöjen kanssa. Tutkimus esittelee uuden lähestymistavan taajuusjakotekniikoiden liiketoimintamallien skaalautuvuuden analysointiin jakamistalouden määritelmiä hyödyntäen. Tulokset osoittavat, että kaikki tutkitut tekniikat täyttävät perusedellytykset skaalautuvuudelle; Licensed Shared Access (LSA) hyödyntäen matkapuhelinoperaattorin olemassa olevia resursseja ja kyvykkyyksiä, Citizens Broadband Radio Service (CBRS) laajentaen liiketoimintamalleja tietoliikenteestä sisältöön, kontekstiin ja kaupankäyntialustoihin, sekä digitaalitelevision ja langattoman LTE-tekniikan hybridikäyttö UHF-taajuuskaistalla (HUHF) mahdollistaen uusia liiketoimintamahdollisuuksia lähentyvien tietoliikenne-, Internet- ja mediaekosysteemien välillä. Väitöskirja tulokset vahvistivat taajuuden jakamisen soveltuvuuden liikkuvan laajakaistaverkon ja saman taajuusalueen eri teollisuudenalan haltijan välillä suomalaisessa CORE kenttätestausympäristössä, ja laajensivat taajuusjakotekniikan sovellettavuutta myös muihin langattomiin järjestelmiin sisältö- ja mediajakelussa. Esitettyjä tuloksia voidaan hyödyntää tulevaisuuden langattomien laajakaistaverkkojen kehitystyössä vastaamaan ihmisten ja koneiden kasvaviin tietoliikennepalveluiden ja -kapasiteetin tarpeisiin hyödyntäen tehokkaita taajuusjakotekniikoita ja niiden mahdollistamia innovatiivisia liiketoimintamalleja
APA, Harvard, Vancouver, ISO, and other styles
4

Gineste, Mathieu. "Spécification d'un cadre générique pour l'expression et le déploiement de la Qualité de Service dans les architectures de communication : application à une architecture de communication par satellite." Paris 6, 2006. http://www.theses.fr/2006PA066267.

Full text
Abstract:
L’évolution des applications vers le multimédia et des réseaux vers une hétérogénéité d’architectures protocolaires, a placé la notion de Qualité de Service au cœur des architectures de communication émergentes ; Ceci soulève la question de l’expression de la QdS et de l’adaptation aux besoins applicatifs de la diversité des services disponibles. Cette thèse propose un cadre sémantique et syntaxique pour décrire les contraintes applicatives et les services sous-jacents, et sélectionner et composer les services de communication, répondant aux besoins applicatifs. Les systèmes satellitaires intègrent une propriété naturelle de diffusion de l’information, ce qui en fait un composant de l’Internet de nouvelle génération. Nous montrons comment, grâce au cadre générique, les services orientés gestion de QdS spécifiques d’une architecture de communication satellitaire peuvent être composés, afin de délivrer une adaptation efficace entre les ressources satellitaires et les besoins applicatifs.
APA, Harvard, Vancouver, ISO, and other styles
5

Boviz, Dora. "Communications multi-utilisateurs dans les réseaux d’accès radio centralisés : architecture, coordination et optimisation." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLC035/document.

Full text
Abstract:
Dans les réseaux mobiles du future, un déploiement plus dense des points d’accés radio est prévu pour satisfaire la demande accrue de débit, mais les terminaux utilisateurs peuvent être affectés par une interférence inter-cellulaire plus forte. Par chance, la centralisation des traitements de signal en bande de base dans l’achitecture Cloud RAN (C-RAN) offre la possibilité de la coordination et du traitement conjoint de plusieurs cellules. Pour réellement permettre de déployer ces techniques, une étude bout-à-bout du CRAN est nécessaire selon plusieurs aspects, notamment l’architecture fonctionnelle, la stratégie de coordination, l’implémentation du traitement de signal multiutilisateur et les optimisations possibles pour un fonctionnement plus efficace.Dans cette thèse, nous proposons en premier une architecture qui définit le placement des fonctions du traitement en bande de base entre les unités distribuées et le serveur central. Le but de ce design est de permettre la réalisation des fonctions multi-utilisateurs en transmettant avec la moins de débit possible sur les liens de fronthaul reliant les différentes entités. Dans un second temps, nous présentons comment il est possible de coordiner les différentes cellules servies par le C-RAN en utilisant le concept de réseaux définis par logiciels adapté pour les réseaux d’accès radio. Nous avons mis en place un prototype démontrant la faisabilité de la méthode de contrôle proposée. Finalement, nous étudions l’allocation adaptative du débit sur les liens de fronthaul transportant les symboles numériques quantifiés des utilisateurs en besoin de traitement multi-cellulaire sur la voie montante pour exploiter l’interférence entre eux. Nous proposons un modèle d’optimisation qui inclut le coût des transmissions fronthaul pour maximiser ainsi le gain obtenu par l’opérateur du réseau où la communication multiutilisateur a lieu. Nous réalisons l’optimisation pour différents modèles de coût et en utilisants deux types de données: d’abord les estimations de canal supposées parfaites et disponibles en temps réel, puis seulement les statistiques du canal. Nous montrons que la méthode d’optimisation proposée permet d’exploiter plus efficacement les liens de fronthaul dans l’architecture précedemment définie
In future mobile networks denser deployment of radio access points is planned to satisfy demand of higher throughput, but an increased number of mobile users can suffer from inter-cell interference. Fortunately, the centralization of base-band processing offered by Cloud Radio Access Network (C-RAN) architecture enables coordination and joint physical layer processing between cells. To make practical deployment of these techniques possible, we have to study C-RAN in an end-to-end view regarding several aspects: the functional architecture of a deployment, the multi-cell coordination strategy, the implementation of multi-user signal processing and possibilities for optimization to increase operational efficiency.In this thesis, first, we propose an architecture defining the placement of base-band processing functions between the distributed remote units and the central processing unit. The aim of this design is to enable multi-cell processing both on the uplink and the downlink while requiring low data rate between the involved entities. Secondly, we study how low latency coordination can be realized inside the central unit using software defined networking adapted to radio access networks. Our demonstration through a real-time prototype deployment shows the feasibility of the proposed control framework. Finally, we investigate adaptive allocation of fronthaul rate that is used for transferring quantized base-band symbols for users participating in uplink multi-cell reception in order to exploit interference between them. We propose an optimization model that includes the cost of fronthaul tranmissions and aims to maximize the gain of network operators from multi-user transmissions in C-RAN. We solve the optimization problem for different fronthaul pricing models, in a scenario where real-time and accurate channel estimates are available and in another where only channel statistics are exploited. Using our method - fitting in the architecture that we have defined - cost efficiency of fronthaul usage can be significantly improved
APA, Harvard, Vancouver, ISO, and other styles
6

Zigo, Peter. "Polyfunkční dům Arthur." Master's thesis, Vysoké učení technické v Brně. Fakulta stavební, 2015. http://www.nusl.cz/ntk/nusl-227263.

Full text
Abstract:
The diploma thesis deals with a project design documentation of a multifunctional house in Považská Bystrica. The object is designed as a detached four-storey building. Its ground plan is rectangle-shaped. The building´s first floor is split into an administrative section and housing section with shared premises. The other floors are fully designed and meant for housing consisting of housing units with shared premises. A construction system is designed as a transversal wall system with reinforced concrete continuous slabs roofed with a warm flat duo roof.
APA, Harvard, Vancouver, ISO, and other styles
7

Ben, Ameur Chiheb. "TCP Protocol Optimization for HTTP Adaptive Streaming." Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S127/document.

Full text
Abstract:
Le streaming adaptatif sur HTTP, désigné par HAS, est une technique de streaming vidéo largement déployée sur Internet. Elle utilise TCP comme protocole de transport. Elle consiste à segmenter la vidéo stockée sur un serveur web en petits segments indépendants de même durée de lecture et transcodés à plusieurs niveaux de qualité, désignés par "chunks". Le player, du côté du client HAS, demande périodiquement un nouveau chunk. Il sélectionne le niveau de qualité en se basant sur l’estimation de la bande passante du/des chunk(s) précédent(s). Étant donné que chaque client HAS est situé au sein d’un réseau d’accès, notre étude traite un cas fréquent dans l’usage quotidien: lorsque plusieurs clients partagent le même lien présentant un goulot d’étrangement et se trouvent en compétition sur la bande passante. Dans ce cas, on signale une dégradation de la qualité d’expérience (QoE) des utilisateurs de HAS et de la qualité de service (QoS) du réseau d’accès. Ainsi, l’objectif de cette thèse est d’optimiser le protocole TCP pour résoudre ces dégradations de QoE et QoS. Notre première contribution propose une méthode de bridage du débit HAS au niveau de la passerelle. Cette méthode est désignée par "Receive Window Tuning Method" (RWTM): elle utilise le principe de contrôle de flux de TCP et l’estimation passive du RTT au niveau de la passerelle. Nous avons comparé les performances de RWTM avec une méthode récente implémentée à la passerelle qui utilise une discipline particulière de gestion de la file d’attente, qui est désignée par "Hierarchical Token Bucket shaping Method" (HTBM). Les résultats d’évaluations indiquent que RWTM offre une meilleure QoE et une meilleure QoS de réseau d’accès que HTBM. Notre deuxième contribution consiste à mener une étude comparative combinant deux méthodes de bridages, RWTM et HTBM, avec quatre variantes TCP largement déployées, NewReno, Vegas, Illinois et Cubic. Les résultats d'évaluations montrent une discordance importante entre les performances des différentes combinaisons. De plus, la combinaison qui améliore les performances dans la majorité des scénarios étudiés est celle de RWTM avec Illinois. En outre, une mise à jour efficace de la valeur du paramètre "Slow Start Threshold", sthresh, peut accélérer la vitesse de convergence du player vers la qualité optimale. Notre troisième contribution propose une nouvelle variante de TCP adaptée aux flux HAS, qu’on désigne par TcpHas; c’est un algorithme de contrôle de congestion de TCP adapté aux spécifications de HAS. TcpHas estime le niveau de la qualité optimale du flux HAS en se basant sur l’estimation de la bande passante de bout en bout. Ensuite, TcpHas applique un bridage au trafic HAS en fonction du débit d’encodage du niveau de qualité estimé. TcpHas met à jour ssthresh pour accélérer la vitesse de convergence. Une étude comparative a été réalisée avec la variante Westwood+. Les résultats d’évaluations montrent que TcpHas est plus performant que Westwood+
HTTP adaptive streaming (HAS) is a streaming video technique widely used over the Internet. It employs Transmission Control Protocol (TCP) as transport protocol and it splits the original video inside the server into segments of same duration, called "chunks", that are transcoded into multiple quality levels. The HAS player, on the client side, requests for one chunk each chunk duration and it commonly selects the quality level based on the estimated bandwidth of the previous chunk(s). Given that the HAS clients are located inside access networks, our investigation involves several HAS clients sharing the same bottleneck link and competing for bandwidth. Here, a degradation of both Quality of Experience (QoE) of HAS users and Quality of Service (QoS) of the access network are often recorded. The objective of this thesis is to optimize the TCP protocol in order to solve both QoE and QoS degradations. Our first contribution consists of proposing a gateway-based shaping method, that we called Receive Window Tuning Method (RWTM); it employs the TCP flow control and passive round trip time estimation on the gateway side. We compared the performances of RWTM with another gateway-based shaping method that is based on queuing discipline, called Hierarchical Token Bucket shaping Method (HTBM). The results of evaluation indicate that RWTM outperforms HTBM not only in terms of QoE of HAS but also in terms of QoS of access network by reducing the queuing delay and significantly reducing packet drop rate at the bottleneck.Our second contribution consists of a comparative evaluation when combining two shaping methods, RWTM and HTBM, and four very common TCP variants, NewReno, Vegas, Illinois and Cubic. The results show that there is a significant discordance in performance between combinations. Furthermore, the best combination that improves performances in the majority of scenarios is when combining Illinois variant with RWTM. In addition, the results reveal the importance of an efficient updating of the slow start threshold value, ssthresh, to accelerate the convergence toward the best feasible quality level. Our third contribution consists of proposing a novel HAS-based TCP variant, that we called TcpHas; it is a TCP congestion control algorithm that takes into consideration the specifications of HAS flow. Besides, it estimates the optimal quality level of its corresponding HAS flow based on end-to-end bandwidth estimation. Then, it permanently performs HAS traffic shaping based on the encoding rate of the estimated level. It also updates ssthresh to accelerate convergence speed. A comparative performance evaluation of TcpHas with a recent and well-known TCP variant that employs adaptive decrease mechanism, called Westwood+, was performed. Results indicated that TcpHas largely outperforms Westwood+; it offers better quality level stability on the optimal quality level, it dramatically reduces the packet drop rate and it generates lower queuing delay
APA, Harvard, Vancouver, ISO, and other styles
8

Sabir, Essaïd. "MAC protocols design and a cross-layered QoS framework for next generation wireless networks." Phd thesis, Université d'Avignon, 2010. http://tel.archives-ouvertes.fr/tel-00544071.

Full text
Abstract:
Ce manuscrit est centré sur la conception, l'amélioration et l'évaluation des protocoles des couches RESEAU, MAC et PHY. En particulier, nous nous focalisons sur la conception de nouveaux protocoles distribués pour une utilisation optimale/améliorée des ressources radio disponibles. Par ailleurs, nous caractérisons les performances des réseaux ad hoc à accès aléatoire au canal en utilisant des paramètres de plusieurs couches avec aptitude de transfert d'information (data forwarding). La majeure partie de nos analyses se base sur le concept d'interaction entre les couches OSI (cross-layer). En effet, cette nouvelle et attractive approche est devenue en peu de temps omniprésente dans le domaine de recherche et développement et dans le domaine industriel. Les métriques de performances qui nous intéressent sont la stabilité des files d'attentes de transfert, le débit, le délai et la consommation d'énergie. Principalement, la compréhension de l'interaction entre les couches MAC/PHY et routage du standard IEEE 802.11e DCF/EDCF, d'une part, et l'interaction entre noeuds en terme d'interférences, d'autre part, constituent le coeur central de notre travail
APA, Harvard, Vancouver, ISO, and other styles
9

Prudík, Jiří. "Model metropolitní optické sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217666.

Full text
Abstract:
The purpose of this master’s thesis is foremost to provide a simple guide how to build elements of optical metropolitan area network. The basic model consists to sequence of construction, network topology, passive and active parts. The collection contains examples of alternative technology such as Wireless LAN with different frequency. The optical network construction based on optical cable, fibres, splices, trays, adapters, connectors and active parts for example a lot of media convertor models. After that there are demonstrating type of wavelength division multiplexer used in metropolitan area network – passive planar PCL splitter. One of the passive planar splitter are used to increase optical fibre channel. At the end of the collection a simplified examples of used measurements – optical time domain reflectometry and optical fibre transmission. Contains standard protocols or reflectogram. The conclusion of this thesis summarizes costs of FTTb (Fibre To The Building) model of optical metropolitan area network in Czech republic and future contribution for society.
APA, Harvard, Vancouver, ISO, and other styles
10

JAIN, SANDEEP. "SHARED ACCESS LAYER – SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15097.

Full text
Abstract:
The e-Governance is basically an electronic channel through which CITIZENS and GOVERNMENT can interact with one each other. There will be no constrained of the locations and limitation of time. This all improves in the delivery of the Government Services in a effective manner. The vision is strictly depending on the ability of diverse computing systems which are owned and managed by various government departments. These systems are able to interact with each other across all departmental boundaries. This ability of the systems is known as e-government interoperability. During the last few years, e-government interoperability is continuously an important research area for each. SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE approach had provided an acceptable solution in this direction. Various models based upon SOA had been proposed. Here we are proposing a new model known as SHARED ACCESS LAYER – SERVICE ORIENTED ARCHITECTURE FOR E-GOVERNANCE . This model will provide efficient services to the citizens as well as to the departments by providing the shared access layer, i.e. every citizen or any other user will access the required information through this layer, this layer will provide the authentication, redirection to the concerned service and access to the commonly shareable data without actually accessing the departmental server.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SHARED ACCESS LAYER – SERVICE"

1

Institute Of Electrical and Electronics Engineers. IEEE standards for local and metropolitan area networks: Supplements to distributed queue dual bus (DQDB) access method and physical layer specifications : physical layer convergence procedure (PLCP) for DS1-based systems (Clause 12) and isochronous service on a distributed queue dual bus (DQDB) subnetwork of a metropolitan area network (MAN). New York: Institute of Electrical and Electronics Engineers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

IEEE Computer Society. Technical Committee on Computer Communications., IEEE Standards Board, and Institute of Electrical and Electronics Engineers., eds. IEEE standards for local and metropolitan area networks: Supplement to distributed queue dual bus (DQDB) access method and physical layer specifications : connection-oriented service on a distributed queue dual bus (DQDB subnetwork of a metropolitan area network (MAN). New York: Institute of Electrical and Electronics Engineers, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bicycle-sharing Systems across the United States of America. Organización Panamericana de la Salud, 2020. http://dx.doi.org/10.37774/9789275122143.

Full text
Abstract:
A bicycle-sharing system, or “bike share,” is a program that distributes and organizes fleets of publicly shared bikes throughout a city or region for users to rent for transportation or recreation. Through single-use fees or membership plans, users are able to access bikes across each system’s designated service area. Bicycle-sharing programs have been delivering benefits of increased urban mobility, accessible recreation, and more sustainable transportation in more than 2,000 cities around the world. In the United States of America, bicycle-sharing systems are present within all 50 states and the District of Columbia. Spreading rapidly in a positive trend, expansions of existing bicycle sharing systems and implementation of new systems occur in the United States on a near-monthly basis. The first public bike-sharing system to be developed and implemented within the United States was SmartBike DC in 2008, which was later replaced by the Capital Bikeshare system in 2010. During 2010, four additional systems launched in the cities of Denver, Colorado; Des Moines, Iowa; and Minneapolis, Minnesota and on the campus of Washington State University in Pullman, Washington. By the end of 2018 there were nearly 250 municipalities (either cities or counties) with active bike-sharing systems that had been implemented within their jurisdictions. This publication summarizes the current landscape of bicycle-sharing systems across various municipalities and jurisdictions in the United States of America. The document is a comprehensive accounting of all presently-implemented systems with at least five stations and/or 20 bikes across the country. PAHO hopes this publication serves as a source of information for policymakers, community leaders, NGOs, and others who may be interested in implementing new bike shares or further developing existing systems. Resources in this document can help identify other cities or municipalities with similar objectives and/or comparable contexts in order to learn from each other’s actions, experiences, and challenges.
APA, Harvard, Vancouver, ISO, and other styles
4

Institute Of Electrical and Electronics Engineers. IEEE Standards for Local and Metropolitan Area Networks: Supplement to Distributed Queue Dual Bus (Dqdb) Access Method and Physical Layer Specifications ... Service on a Distributed Queue d. Institute of Electrical & Electronics Enginee, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Burns, Tom, and Mike Firn. Service planning. Edited by Tom Burns and Mike Firn. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780198754237.003.0028.

Full text
Abstract:
This chapter aims to guide practitioners and managers in setting up and reviewing community outreach services for people with severe mental illness from a non-technical service planning perspective. Examples of different service configurations within a comprehensive local system are given, with some observations on their relative merits and drawbacks from evaluations. Service models and structures are important for providing a framework for delivering quality care, yet from the perspective of the service user, many of these service details—integrated care, specialization, caseload size, staffing mix, ownership of beds, and degree of shared caseload—are invisible. For people with severe mental health problems, patients and carers value the principles of good community-based care, such as access, responsiveness, consistency, and continuity.
APA, Harvard, Vancouver, ISO, and other styles
6

Beech, Roger. Health and social care services for older people: achievements, challenges, and future directions. Oxford University Press, 2015. http://dx.doi.org/10.1093/med/9780199689644.003.0003.

Full text
Abstract:
Key points• The ageing of the population will increase patient demands for acute hospital beds, a scarce and expensive resource.• Health and social care service options delivered ‘closer to home’ can improve patient care and reduce older people’s demands for acute hospital beds by preventing acute events and providing an alternative.• The growth of such service options has created a more complex health and social care landscape.• Therefore, to improve the patient experience and to ensure their timely access to appropriate care, innovations for improving the integration of services for health and social care need to be developed and evaluated.• Further increasing the evidence base about care closer-to-home service options and ways of improving their integration represents a shared agenda for service commissioners, providers, and academics.
APA, Harvard, Vancouver, ISO, and other styles
7

Gandrud, Christopher. The Reproducibility of Governance Indicators. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198817062.003.0009.

Full text
Abstract:
Reproducibility is a core tenant of scientific enquiry, including the study of governance and government outputs. Having full access to the data and procedures that researchers used to study a phenomenon is vital for being able to understand and trust their findings. This chapter sets out best practices for the reproducibility of governance indicators. For a governance indicator project to be ‘really reproducible’, the full data as well as data gathering and analysis procedures should be easily and persistently accessible. Indicator development should be fully documented, especially via a version control system. The chapter surveys the status quo level of reproducibility among prominent governance indicator projects. While most had some reproduction material available, none were really reproducible. The chapter concludes with recommendations, including calling for a shared governance indicator hosting service that focuses on encouraging reproducibility.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SHARED ACCESS LAYER – SERVICE"

1

Lee, Chee Kiam, Norfadzlia Mohd Yusof, Nor Ezam Selan, and Dickson Lukose. "Service Oriented Architecture for Semantic Data Access Layer." In Communications in Computer and Information Science, 93–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32826-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Korger, Ulrike, Christian Hartmann, Katsutoshi Kusume, and Joerg Widmer. "Quality of Service Oriented Analysis of Cross-Layer Design in Wireless Ad Hoc Networks." In Multiple Access Communications, 275–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15428-7_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Venieris, I. S., K. E. Mourelatou, N. D. Kalogeropoulos, M. E. Theologou, and E. N. Protonotarios. "Service Management and Connection Identification in Shared Medium Access Networks." In Network Management and Control, 165–74. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-1298-5_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ivanova, Daria, Ekaterina Karnauhova, Ekaterina Markova, and Irina Gudkova. "Analyzing of Licensed Shared Access Scheme Model with Service Bit Rate Degradation in 3GPP Network." In Information Technologies and Mathematical Modelling. Queueing Theory and Applications, 231–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68069-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ziadie, Haritz Ghozi, Meilita Tryana Sembiring, and Beby Karina Fauzeea Sembiring. "Marketing Mix Strategy Using SWOT Analysis to Increase Market Share in PT Smartfren Telecom Tbk North Sumatera Area." In Proceedings of the 19th International Symposium on Management (INSYMA 2022), 930–36. Dordrecht: Atlantis Press International BV, 2022. http://dx.doi.org/10.2991/978-94-6463-008-4_116.

Full text
Abstract:
AbstractThe need for communication technology, especially internet data services, cannot be separated from people’s lives. Almost all people now have internet data services to meet their internet access needs. However, the public is faced with many choices of internet data services offered by cellular network operators, one of which is Smartfren. PT Smartfren Telecom, Tbk, provides a wide selection of attractive data services and adapts to the needs of the community in order to increase the number of new customers and retain old customers. PT Smartfren Telecom, Tbk uses a 4P marketing mix strategy (Product, Price, People, Promotion) to increase and retain its customers. However, Smartfren is still inferior to other provider competitors, where Telkomsel has a market share value of 49.47%, XL 29.79%, Tri 16.49%, Indosat 10.64%, and Smartfren 5.85%. This shows that although there is a growth in customers every year, the market share (users) is still lagging behind other competitors. This study aims to increase market share using SWOT analysis. This study applied the 4P marketing mix theory and SWOT analysis to examine the issues raised. Data were collected by conducting interviews and direct observation. The results of this research will later show a marketing strategy to increase and retain the number of Smartfren customers.
APA, Harvard, Vancouver, ISO, and other styles
6

Roos, Vera, Puleng Segalo, and Ngenisiwe Ntombela. "Situationally and Relationally Guided Ethical Conduct for Researchers: A Community-Based Research Project to Design and Develop an ICT Intervention." In Age-Inclusive ICT Innovation for Service Delivery in South Africa, 85–107. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94606-7_4.

Full text
Abstract:
AbstractGrowing discomfort with uncritical applications of generic universal ethics to community-based research, prompted us to (1) problematize a decontextualized application of ethics; (2) apply two heuristic constructs—situatedness and relationality—to a community-based project; and (3) propose revised guidelines for researchers in this field. The we-DELIVER project illustrates our processes for obtaining data from older (60+) South Africans to inform the development of a technology-based ecosystem, Yabelana, which gives them access to service information. In three phases (planning, implementation, and dissemination), we present the situatedness of researchers (including student fieldworkers) and communities. Drawing on relationality, we first expanded older participants’ capacity to engage by offering choices and by involving student fieldworkers who shared the same background as the participants to facilitate the use of the technology; and, second, we facilitated optimal interactions by being clear about the nature of the data being collected and by applying social engagement strategies to relate and interact optimally. An optimal interpersonal context preceded technology introduction. The chapter concludes with a plea for reconsideration of current universalized and decontextualized ethical protocols that too often perpetuate situational and relational ignorance. We propose, instead, ethical guidelines for community-based research that engages relationally with participants and best suits their contexts.
APA, Harvard, Vancouver, ISO, and other styles
7

Sari, Arif. "Security Issues in Mobile Wireless Ad Hoc Networks." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, 66–94. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8345-7.ch005.

Full text
Abstract:
The purpose of this chapter is to investigate and expose methods and techniques developed to provide security in wireless ad hoc networks. Researchers have proposed variety of solutions for security problems of Wireless Mobile Ad-Hoc Networks (MANET) against Distributed Denial of Service (DDoS) attacks. Due to the wireless nature of the channels and specific characteristics of MANETs, the attacks cannot be defeated through conventional security mechanisms. An adversary can easily override its medium access control protocol (MAC) and continually transfer packages on the network channel and the access point node(s) cannot assign authorization access to shared medium. These attacks cause a significant decrease on overall network throughput, packet transmission rates and delay in the MAC layer since other nodes back-off from the communication. In this chapter the proposed methods are applied for preventing and mitigating different wireless ad hoc network attacks are investigated and effectiveness and efficiency of these mechanisms are exposed.
APA, Harvard, Vancouver, ISO, and other styles
8

Alsobeh, Anas M. R., Aws Abed Al Raheem Magableh, and Emad M. AlSukhni. "Runtime Reusable Weaving Model for Cloud Services Using Aspect-Oriented Programming." In Cloud Security, 574–91. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch029.

Full text
Abstract:
Cloud computing technology has opened an avenue to meet the critical need to securely share distributed resources and web services, and especially those that belong to clients who have sensitive data and applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from the nature of distributed Web-based technology architecture and infrastructure. One of the key concerns is security logic, which is scattered and tangled across all the cloud service layers. In addition, maintenance and modification of the security aspect is a difficult task. Therefore, cloud services need to be extended by enriching them with features to support adaptation so that these services can become better structured and less complex. Aspect-oriented programming is the right technical solution for this problem as it enables the required separation when implementing security features without the need to change the core code of the server or client in the cloud. Therefore, this article proposes a Runtime Reusable Weaving Model for weaving security-related crosscutting concerns through layers of cloud computing architecture. The proposed model does not require access to the source code of a cloud service and this can make it easier for the client to reuse the needed security-related crosscutting concerns. The proposed model is implemented using aspect orientation techniques to integrate cloud security solutions at the software-as-a-service layer.
APA, Harvard, Vancouver, ISO, and other styles
9

Grimes, Neil, Genevieve R. Innes, and Linda M. Salvesen. "How Libraries Support the Mental Health and Wellness Needs of Communities and Library Workers." In Advances in Psychology, Mental Health, and Behavioral Studies, 78–109. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-5049-9.ch004.

Full text
Abstract:
The COVID-19 pandemic has underscored the urgent need for mental health and wellness resources for individuals and communities. Public libraries play a central role in democratic societies in that they provide unrestricted access to library collections and services free of charge. Libraries play a vital role in the promotion of community well-being. For over one hundred years public, and later other types of libraries, have employed bibliotherapy to support individuals facing mental health challenges. Recently, the whole person librarianship service model was developed to meet an increased need for community mental health support and services. In this model, public librarians partner with social workers to provide mental health services and interventions to library patrons in need. Additionally, case studies from academic libraries and school libraries will be shared. As librarians and library workers serve on the front lines to support individuals experiencing mental health issues, including trauma, strategies to support their mental health and wellness will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Sang, Aimin, Guosen Yue, Xiaodong Wang, and Mohammad Madihian. "Cross-Layer Performance of Scheduling and Power Control Schemes in Space-Time Block Coded Downlink Packet Systems." In Handbook on Advancements in Smart Antenna Technologies for Wireless Networks, 374–97. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-988-5.ch018.

Full text
Abstract:
In this chapter, we consider a cellular downlink packet data system employing the space-time block coded (STBC) multiple- input-multiple-output (MIMO) scheme. Taking the CDMA high data rate (HDR) system for example, we evaluate the cross-layer performance of typical scheduling algorithms and a point-to-point power control scheme over a time division multiplexing (TDM)-based shared MIMO channel. Our evaluation focuses on the role of those schemes in multi-user diversity gain, and their impacts on medium access control (MAC) and physical layer performance metrics for delay-tolerant data services, such as throughput, fairness, and bit or frame error rate. The cross-layer evaluation shows that the multi-user diversity gain, which comes from opportunistic scheduling schemes exploiting independent channel oscillations among multiple users, can increase the aggregate throughput and reduce the transmission error rate. It also shows that STBC/MIMO and one-bit and multi-bit power control can indeed help the physical and MAC layer performance but only at a risk of limiting the multiuser diversity gain or the potential throughput of schedulers for delay-tolerant bursty data services.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SHARED ACCESS LAYER – SERVICE"

1

McLain, Rachelle M., and Hannah McKelvey. "The Time Has Come... To Move Many Things: Inventorying and Preparing a Collection for Offsite Storage." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317169.

Full text
Abstract:
In the spring of 2019, the Montana State University (MSU) Library embarked on a large-scale inventory project that involved weeding and moving portions of their collection to an offsite storage facility within six months in order to create more student study space in the Library. The department primarily responsible for leading the project, Collections Access & Technical Services, the result of two departments merging, was also simultaneously navigating their new structure and a remodel of their workspace thus adding further challenges to the project. This poster session demonstrated how MSU Library approached and completed this project by advocating to their Library Administration for additional resources, including hiring a project manager and third-party companies to assist with the inventory and moving of the collection. It also discussed the types of work groups formed to identify new workflows (i.e., retrieval of offsite items) and modify existing ones, involving student employees in the project, and internal and external collaborations that took place. Additionally, presenters shared strategies used to communicate to their campus community, and the impact this project has had on our patrons. They also included statistics that were gathered during the project including deselection figures, the number of materials that did not have barcodes and were not accounted for in the Library’s catalog and discovery layer (Ex Libris’ Alma and Primo), and what subject areas currently remain in the main library building.
APA, Harvard, Vancouver, ISO, and other styles
2

Atanasov, I. I., D. A. Marinska, and E. N. Pencheva. "Open service access in cross layer design." In 2011 Third International Workshop on Cross Layer Design (IWCLD 2011). IEEE, 2011. http://dx.doi.org/10.1109/iwcld.2011.6123088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kim. "Toward fully-shared access: hybrid isp traffic control architecture and service plans exploiting excess bandwidth in shared access networks." In 2016 International Workshop on Fiber Optics in Access Network (FOAN). IEEE, 2016. http://dx.doi.org/10.1109/foan.2016.7764540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Kyeong Soo. "Toward fully-shared access: Designing ISP service plans leveraging excess bandwidth allocation." In 2014 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2014. http://dx.doi.org/10.1109/ictc.2014.6983327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gudkova, Irina, Konstantin Samouylov, Darya Ostrikova, Evgeniy Mokrov, Aleksei Ponomarenko-Timofeev, Sergey Andreev, and Yevgeni Koucheryavy. "Service failure and interruption probability analysis for Licensed Shared Access regulatory framework." In 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, 2015. http://dx.doi.org/10.1109/icumt.2015.7382416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Qu, Hua, Jingmin Xin, Li Wang, and Jihong Zhao. "Service-oriented resource multi-backupable method for multi-layer networks." In 2011 1st International Symposium on Access Spaces (ISAS). IEEE, 2011. http://dx.doi.org/10.1109/isas.2011.5960959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lu, J. X. "New QoS metrics and application layer proxy for GPRS/UMTS Internet access." In Telecommunications Quality of Service: The Business of Success (QoS 2004). IEE, 2004. http://dx.doi.org/10.1049/ic:20040039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Das, M. Swami, A. Govardhan, and D. Vijaya lakshmi. "QoS web service Security Access Control case study using HTTP Secured Socket Layer Approach." In the The International Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2832987.2833072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Robinson-Oses, Lilliam N., and Miguel Vargas-Lombardo. "Service Layer and Axioms for User Access to the Cloud by Means of Ontologies." In 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2012. http://dx.doi.org/10.1109/cyberc.2012.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Kyeong Soo. "On guaranteeing the quality of service of conformant traffic in excess bandwidth allocation for shared access networks." In 2015 36th IEEE Sarnoff Symposium. IEEE, 2015. http://dx.doi.org/10.1109/sarnof.2015.7324653.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SHARED ACCESS LAYER – SERVICE"

1

Mohammadian, Abolfazl, Ehsan Rahimi, Mohammadjavad Javadinasr, Ali Shamshiripour, Amir Davatgari, Afshin Allahyari, and Talon Brown. Analyzing the Impacts of a Successful Diffusion of Shared E-Scooters and Other Micromobility Devices and Efficient Management Strategies for Successful Operations in Illinois. Illinois Center for Transportation, May 2022. http://dx.doi.org/10.36501/0197-9191/22-006.

Full text
Abstract:
Active transportation can play an important role in promoting more physically active and positive public health outcomes. While walking and biking provide significant physical health benefits, their modal share remains low. As a new form of micromobility service, shared e-scooters can enhance the suite of options available in cities to promote active transportation and fill in the gaps when walking or biking are not preferred. Although e-scooters show potential as a mode of transportation, it is unclear whether people will adopt the technology for everyday use. Furthermore, shared micromobility (e.g., electric scooters) is gaining attention as a complementary mode to public transit and is expected to offer a solution to access/egress for public transit. However, few studies have analyzed integrated usage of shared e-scooters and public transit systems while using panel data to measure spatial and temporal characteristics. This study aims to examine the adoption and frequency of shared e-scooter usage and provide policy implementation. To do so, the researchers launched a survey in the Chicago region in late 2020 and collected a rich data set that includes residents’ sociodemographic details and frequency of shared e-scooter use. To characterize the frequency, the researchers used an ordered probit structure. The findings show that respondents who are male, low income, Millennials and Generation Z, or do not have a vehicle are associated with a higher frequency of shared e-scooter use. Furthermore, this study utilizes shared e-scooter trips for a 35-day measurement period from 10 shared e-scooter operators in Chicago, where the researchers used a random-parameter negative binomial modeling approach to analyze panel effects. The findings highlight the critical role of spatial and temporal characteristics in the integration of shared e-scooters with transit.
APA, Harvard, Vancouver, ISO, and other styles
2

Stakes, Keith, Keith Stakes, Julie Bryant, Nick Dow, Jack Regan, and Craig Weinschenk. Analysis of the Coordination of Suppression and Ventilation in Multi-Family Dwellings. UL Firefighter Safety Research Institute, June 2020. http://dx.doi.org/10.54206/102376/ympj4047.

Full text
Abstract:
The majority of the existing full-scale fire service research studied the impact of tactics on the residential fireground, specifically in single-family structures. This study builds upon prior research by conducting thirteen experiments in three-story, multi-family dwellings to quantify the impact of coordination between ventilation and suppression actions. Experiments were conducted in four, garden-style apartment buildings; each of which had two lower-level units, four first-floor units, and four second-floor units. The apartments shared a common stairwell that was enclosed for all of the experiments in this study. To examine the effectiveness of tactics in the fire apartment, common stairwell and applicable exposure apartments, four experiments were conducted in lower-level apartments, seven were conducted in first-floor apartments, and two were conducted in second-floor apartments including both bedroom and kitchen/living room fires. The fire size varied based on the amount of initial ventilation provided. The main control variables included the location of initial water application, the ventilation method, and the timing of ventilation relative to water application. The suppression tactics included interior water application, exterior water application followed by interior water application, and a combined interior and exterior water application. The ventilation tactics examined in these experiments included horizontal, vertical, positive pressure, and hydraulic ventilation. Similar to previous experiments in acquired single-family structures, there was no meaningful increase in temperature outside of fire rooms when ventilation tactics were executed in close coordination with (shortly after or shortly before) the onset of suppression. In contrast, for experiments where ventilation occurred with delayed suppression, temperature exposures increased throughout the fire apartment, and in experiments where the apartment door was left open, temperatures and carbon monoxide exposures increased throughout the common stairwell. Suppression actions, whether interior or exterior, resulted in a decrease in temperatures and gas concentrations at locations where occupants may potentially be located. The enclosed common stairwell, a unique feature of this experimental series, acted as capture of combustion products. Opening the apartment door to gain access should be thought of as an important ventilation action, both in terms of its potential to cause fire growth and its potential for smoke movement into the stairwell, limiting the egress for potentially trapped occupants in exposure units. Tactics such as door control, positive pressure ventilation, and hydraulic ventilation which were used both simultaneous with and sequentially post-suppression were shown to limit gas flows into the stairwell. After effective suppression, structure ventilation operations should similarly be cognizant of gas flows, with the aim of establishing flow throughout all areas where occupants may be located.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography