scholarly journals "Last mile" challenges to in situ volcanic data transmission

2013 ◽  
Vol 13 (12) ◽  
pp. 3419-3428 ◽  
Author(s):  
J. F. B. D. Fonseca ◽  
B. V. E. Faria ◽  
J. Trindade ◽  
G. Cruz ◽  
A. Chambel ◽  
...  

Abstract. Scientists play a key role in volcanic risk management, but rely heavily on fast access to data acquired in the vicinity of an active volcano. Hazardous volcanoes are often located in remote areas were telecommunications infrastructure is fragile. Besides being exposed directly to the volcanic hazard, the infrastructure in such remote areas can also suffer from "last mile" limitations derived from lack of market demand for data transmission services. In this paper, we report on the findings of the FP7 MIAVITA project in the topic of volcanic data transmission. We draw on the contribution of partners from emergent or developing countries to identify the main bottlenecks and fragilities. We also present the results of an experiment conducted on Fogo Island, Cape Verde, to test the availability of VSAT services adequate for volcanic monitoring. We warn against the false sense of security resulting from increasingly ubiquitous connectivity, and point out the lack of reliability of many consumer-type services, particularly during emergencies when such services are likely to crash due to excess of demand from the public. Finally, we propose guidelines and recommend best practices for the design of volcanic monitoring networks in what concerns data transmission. In particular, we advise that the data transmission equipment close to the exposed area should be owned, operated and maintained by the volcanic monitoring institution. We exemplify with the set-up of the Fogo telemetric interface, which uses low-power licence-free radio modems to reach a robust point of entry into the public network at a suitable distance from the volcano.

2013 ◽  
Vol 1 (4) ◽  
pp. 4037-4062
Author(s):  
J. F. B. D. Fonseca ◽  
B. V. E. Faria ◽  
J. Trindade ◽  
G. Cruz ◽  
A. Chambel ◽  
...  

Abstract. Scientists play a key role in volcanic risk mitigation, but rely heavily on fast access to data acquired in the vicinity of an active volcano. Hazardous volcanoes are often located in remote areas were telecommunications infrastructure is fragile. Besides being exposed directly to the volcanic hazard, the infrastructure in such remote areas can suffer also from "last mile" limitations derived from lack of market demand for data transmission services. In this paper, we report on the findings of FP7 MIAVITA project in the topic of volcanic data transmission. We draw on the contribution of partners from emergent or developing countries to identify the main bottlenecks and fragilities. We present also the results of an experiment conducted in Fogo island, Cape Verde, to test the availability of VSAT services adequate for volcanic monitoring. We warn against the false sense of security resulting from increasingly ubiquitous connectivity, and point out the lack of reliability of many consumer-type services, particularly during emergencies when such services are likely to crash due to excess of demand from the public. Finally, we propose guidelines and recommend best practices for the design of volcanic monitoring networks in what concerns data transmission. In particular, we advise that the data transmission equipment close to the exposed area should be owned, operated and maintained by the volcanic monitoring institution. We exemplify with the setup of the Fogo telemetric interface, which uses low-power licence-free radio modems to reach a robust point of entry into the public network at a suitable distance from the volcano.


Urban Science ◽  
2018 ◽  
Vol 2 (3) ◽  
pp. 68 ◽  
Author(s):  
Yiyun Sun

Over the last three years, the dockless bike sharing scheme has become prevalent in the context of the boom in the sharing economy, the wide use of mobile online payment, the increasing environmental awareness and the inherent market demand. This research takes Beijing as a case study, investigates the users’ characteristics, their behaviour change, and perceptions of dockless bike sharing scheme by the quantitative survey, and then analyzes the reasons behind it and how it has changed the residents’ life in Beijing. This new kind of dockless shared bikes, with great advantages of accessibility, flexibility, efficiency and affordability, helps to solve the ‘last mile’ problem, reduce the travel time, and seems to be very environmentally-friendly and sustainable. However, with the help of interview and document analysis, this research finds that the shared bikes are not the effective alternative for the frequent car-users. Nevertheless, it also has numerous negative consequences such as ‘zombie’ bikes blocking the sidewalks and vandalism to the bikes. The public is also worried about their quality and safety, especially the issues of ‘right of way’. How to coordinate and solve these problems is not only related to the future direction of the dockless bike sharing scheme but also to the vital interests of the general public. Therefore, it is important to emphasize that governments, enterprises, and the public participate in multi-party cooperation and build synergic governance networks to carry forward the advantages and avoid the negative effects of the new bike sharing system.


Author(s):  
Divya J Nair

Abstract: Cryptography is a tool that guards a network and data transmission over a network. Data Security is the core aspect of secure data transmission over untrustworthy network. Network security encompasses the authorization of access to data in a network, which is organized by the network administrator. Users select or are assigned an ID and password or other authenticating information that permits them access to information and programs within their control. Network security covers a wide range of computer networks, both public and private, that are used in ordinary jobs performing transactions and communications among businesses, government agencies and individuals. Networks may be private, such as within a company, or private which allow access to the public. Network security is involved in every type of institutions. In this article we concisely outlined Network security and cryptography along with its basic principles. Keywords: Network, Network Security, Cryptography, Asymmetric Cryptosystems, Symmetric Cryptosystems


2013 ◽  
Vol 380-384 ◽  
pp. 3934-3937
Author(s):  
Jian Long Huang ◽  
Zhong Feng Wang ◽  
Li Gang Li ◽  
Ying Nan Wang ◽  
Wei Chun Ge

Based on the rapid development of communication technology and a large area of the base station of the public network being laid, which prompting the data transmission device development that base on the GPRS wireless network. This paper describes the hardware design of a data transmission device which based on GPRS mobile communication technology. Extended remote data transmission via GPRS mobile communication technology applications, and has broad application prospects.


2017 ◽  
Vol 5 (4RACSIT) ◽  
pp. 86-90
Author(s):  
Meghana K M ◽  
Manjunath C R

Blood Pressure Monitoring using sensor and cloud technology, Personal biological readings such as blood pressure are collected by sensor networks device from patients at homes and will be transmitted to cloud and get treated accordingly. It is very important that privacy of patient’s medical condition is protected while data are being transmitted over the public network as well as when they are stored in servers. In this paper, a unique Cryptography technique has been used, Cryptography allows privacy of data that is transmitted. This will ensure that it is implemented for small foot print using IOT for secure data transmission. While data is transmitting to cloud Doctor will get email/message notification and Doctor can also view the Patient Blood Pressure Record stored in cloud.


Telecom IT ◽  
2020 ◽  
Vol 8 (3) ◽  
pp. 39-54
Author(s):  
S. Vladimirov ◽  
D. Kabytova

Research subject. The paper considers the model of the operator's system for monitoring the quality of IP services in accordance with the requirements of ITU-T Y.1540, Y.1541, Y.1543. Method. Implementation of a generalized monitoring model as a software application based on a two server control system. Core results. A variant of the model and a scheme of the monitoring system elements interaction are proposed. Recommendations on the structure of the system have been developed and formulas for calculating indicators have been proposed. A trial assessment of the public network segment at UNI points was carried out. Practical relevance. The considered model and approaches to its implementation will allow to monitor operator networks in accordance with ITU-T requirements and promote the development of networks and new data transmission services.


Volcanica ◽  
2021 ◽  
Vol 4 (S1) ◽  
pp. 49-71
Author(s):  
Roger Machacca Puma ◽  
José Alberto Del Carpio Calienes ◽  
Marco Antonio Rivera Porras ◽  
Hernando Jhonny Tavera Huarache ◽  
Luisa Diomira Macedo Franco ◽  
...  

Volcano monitoring in Peru is carried out by the Instituto Geofísico del Perú (IGP), through its Centro Vulcanológico Nacional (CENVUL). CENVUL monitors 12 out of 16 volcanoes considered as historically active and potentially active in southern Peru and issues periodic bulletins about the volcanic activity and, depending on the alert-level of each volcano, also issues alerts and warnings of volcanic unrest, ash dispersion, and the occurrence of lahars. The information generated by CENVUL is disseminated to the civil authorities and the public through different information media (newsletters, e-mail, website, social media, mobile app, etc.). The IGP volcanology team was formed after the eruption of Sabancaya volcano in 1988. Since then, geophysical and geological studies, volcanic hazards assessments, and multidisciplinary monitoring realized by the IGP, have provided a comprehensive understanding of volcanic activity in Peru and forecast future eruptive scenarios. Currently, 80% of the historically active and potentially active volcanoes in Peru are equipped with networks of multiparameter instruments, with the seismic monitoring being the most widely implemented. In this report, we present the situation of volcanic monitoring in Peru, the monitoring networks, the techniques employed, as well as efforts to educate and inform the public and officials responsible for disaster risk management.


2014 ◽  
Vol 687-691 ◽  
pp. 2722-2727
Author(s):  
Cheng Yong Yang ◽  
Zhen Yu Li ◽  
Yue Dong Gu ◽  
Hua Fan

With the enlargement of the test scale, the examination system has become the direction of large-scale. Large-scale examination system has advantage over the calculation in a cloud environment. But more candidates and examinations lead to network congestion. On the solutions of network congestion, there has been a lot of wan processing methods. But they are not suitable for application to run in the LAN's examination system according to actual condition. Therefore, this paper will introduce an improved method of multi-source multipath to alleviate the burden to the public network channel in the process of network data transmission. In order to improve the stability of the system by optimizing software to reduce the dependence on hardware. In the end, this paper will discuss the performance of this strategy.


2021 ◽  
Author(s):  
Tim Henderson ◽  
Vincent Santucci ◽  
Tim Connors ◽  
Justin Tweet

A fundamental responsibility of the National Park Service (NPS) is to ensure that park resources are preserved, protected, and managed in consideration of the resources themselves and for the benefit and enjoyment by the public. Through the inventory, monitoring, and study of park resources, we gain a greater understanding of the scope, significance, distribution, and management issues associated with these resources and their use. This baseline of natural resource information is available to inform park managers, scientists, stakeholders, and the public about the conditions of these resources and the factors or activities that may threaten or influence their stability and preservation. There are several different categories of geologic or stratigraphic units (supergroup, group, formation, member, bed) that represent a hierarchical system of classification. The mapping of stratigraphic units involves the evaluation of lithologies, bedding properties, thickness, geographic distribution, and other factors. Mappable geologic units may be described and named through a rigorously defined process that is standardized and codified by the professional geologic community (North American Commission on Stratigraphic Nomenclature 2005). In most instances when a new geologic unit such as a formation is described and named in the scientific literature, a specific and well-exposed section or exposure area of the unit is designated as the type section or other category of stratotype (see “Definitions” below). The type section is an important reference exposure for a named geologic unit which presents a relatively complete and representative example for this unit. Geologic stratotypes are important both historically and scientifically, and should be available for other researchers to evaluate in the future.. The inventory of all geologic stratotypes throughout the 423 units of the NPS is an important effort in documenting these locations in order that NPS staff recognize and protect these areas for future studies. The focus adopted for completing the baseline inventories throughout the NPS was centered on the 32 inventory and monitoring networks (I&M) established during the late 1990s. The I&M networks are clusters of parks within a defined geographic area based on the ecoregions of North America (Fenneman 1946; Bailey 1976; Omernik 1987). These networks share similar physical resources (e.g., geology, hydrology, climate), biological resources (e.g., flora, fauna), and ecological characteristics. Specialists familiar with the resources and ecological parameters of the network, and associated parks, work with park staff to support network-level activities such as inventory, monitoring, research, and data management. Adopting a network-based approach to inventories worked well when the NPS undertook paleontological resource inventories for the 32 I&M networks. The planning team from the NPS Geologic Resources Division who proposed and designed this inventory selected the Greater Yellowstone Inventory & Monitoring Network (GRYN) as the pilot network for initiating this project. Through the research undertaken to identify the geologic stratotypes within the parks of the GRYN methodologies for data mining and reporting on these resources were established. Methodologies and reporting adopted for the GRYN have been used in the development of this report for the Mojave Desert Inventory & Monitoring Network (MOJN). The goal of this project is to consolidate information pertaining to geologic type sections that occur within NPS-administered areas, in order that this information is available throughout the NPS to inform park managers and to promote the preservation and protection of these important geologic landmarks and geologic heritage resources. The review of stratotype occurrences for the MOJN shows there are currently no designated stratotypes for Joshua Tree National Park (JOTR) or Manzanar National Historic Site (MANZ); Death Valley...


2018 ◽  
Vol 7 (2) ◽  
pp. 30-33
Author(s):  
Yusera Farooq Khan

Now-a-days the significance of security has been greater than before because of the fact that data has been accessed and transferred through public network. The data which has been transferred could be sniffed which may be a loss for us. When data is transferred in to public network we need confidentiality, integration and authentication. In this review paper we will discuss all these factors that keep our data safe enough. In order to provide this factor a site-to-site virtual private network has been designed which provide more security to data and made the public network into private network. The virtual private network hides the source and destination address as well as it also hides the internal network so that our network would be safe enough.


Sign in / Sign up

Export Citation Format

Share Document