scholarly journals POSITION INFORMATION FOR VOIP EMERGENCY CALLS - Originating from a Wireless Metropolitan Access Network

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
José Santa ◽  
Pedro J. Fernández ◽  
Ramon Sanchez-Iborra ◽  
Jordi Ortiz ◽  
Antonio F. Skarmeta

While satellite or cellular positioning implies dedicated hardware or network infrastructure functions, indoor navigation or novel IoT positioning techniques include flexible storage and computation requirements that can be fulfilled by both end-devices or cloud back-ends. Hybrid positioning systems support the integration of several algorithms and technologies; however, the common trend of delegating position calculation and storage of local geoinformation to mobile devices or centralized servers causes performance degradation in terms of delay, battery usage, and waste of network resources. The strategy followed in this work is offloading this computation effort onto the network edge, following a Mobile Edge Computing (MEC) approach. MEC nodes in the access network of the mobile device are in charge of receiving navigation data coming from both the smart infrastructure and mobile devices, in order to compute the final position following a hybrid approach. With the aim of supporting mobility and the access to multiple networks, an Information Centric Networking (ICN) solution is used to access generic position information resources. The presented system currently supports WiFi, Bluetooth LE, GPS, cellular and NFC technologies, involving both indoor and outdoor positioning, using fingerprinting and proximity for indoor navigation, and the integration of smart infrastructure data sources such as the door opening system within real smart campus deployment. Evaluations carried out reveal latency improvements of 50%, as compared with a regular configuration where position fixes are computed by mobile devices; at the same time the MEC solution offers extra flexibility features to manage positioning databases and algorithms and move extensive computation from constrained devices to the edge.


2017 ◽  
Vol 4 (1) ◽  
pp. 117-126
Author(s):  
Tine Sopaheluwakan ◽  
Mohammad A. Amin Soetomo

Information Technology as a new Technology has been used in businesses from small company until multinational company in almost all industries. IT role as an enabler and differentiation factor separating success company from average company. IT need people to build, operate, maintain and support the systems, hence expect the new hire to immediately contribute from the first day they join the company. The industry define the needs for Information Technology competence and expect Education Institution as one of IT resource work hard to design their program study to fulfill the needs for Information Technology graduates, yet the industry still struggle to succeed in hiring fresh graduate to fill the IT position. Information Technology Training Institution can be an alternative to improve the education result. Also certification on Information Technology competence from third party or independent body might be used as a standard for both Industry and Education. This paper will report literature review several previous paper about all of the above.


2019 ◽  
Vol 34 (Spring 2019) ◽  
pp. 43-55
Author(s):  
Syed Kamal Abid ◽  
Mujahid Hussain ◽  
Muhammad Raza ◽  
Rizwan-ul Haq ◽  
Rizwan Naseer ◽  
...  

The study was conducted to know whether bulk inflow of Non Emergency Calls (NECs) acts as an independent predictor for depression in call handlers of Rescue 1122, Punjab, Pakistan. Forty five (45) call handlers were recruited from evening shift of 9 districts. Similarly, same-sized control group was made out of field rescuers. The groups were compared for rate and severity level of depression using Beck’s Depression Inventory-II (BDI-II; Beck, Steer, & Brown, 1996). Probable predictors (except workplace stress) for depression in call handlers were evaluated through risk estimates. For workplace stress, a purposefully developed close- ended Workplace Stress Questionnaire including two subscales i.e. Non Emergency call and Control Room Environment of 30 items each was administrated. Twenty nine (64.4%) subjects of study group reported depression on BDI. Consequently, the same group had significantly higher mean depression score than control (18.2 vs. 12.6; p = .00). The scores also showed insignificant association with any of the probable predictors (demographic variables) of the call attendees. The respondents perceived more occupational stress against NECs. The findings attract the attention of authorities towards the severity of the concern.


2012 ◽  
Vol E95-B (3) ◽  
pp. 730-739 ◽  
Author(s):  
Kunitaka ASHIZAWA ◽  
Takehiro SATO ◽  
Kazumasa TOKUHASHI ◽  
Daisuke ISHII ◽  
Satoru OKAMOTO ◽  
...  

2010 ◽  
Vol E93-C (7) ◽  
pp. 1139-1145
Author(s):  
Shin KANEKO ◽  
Noriki MIKI ◽  
Hideaki KIMURA ◽  
Hisaya HADAMA

2020 ◽  
Vol 17 (5) ◽  
pp. 243-265 ◽  
Author(s):  
Jiandong Xie ◽  
Sa Xiao ◽  
Ying-Chang Liang ◽  
Li Wang ◽  
Jun Fang

2016 ◽  
Vol 2 (2) ◽  
Author(s):  
Amit Singh ◽  
Nitin Mishra ◽  
Angad Singh

 A Wireless Mobile Ad-hoc Network consists of variety of mobile nodes that temporally kind a dynamic infrastructure less network. To modify communication between nodes that don’t have direct radio contact, every node should operate as a wireless router and potential forward knowledge traffic of behalf of the opposite node. In MANET Localization is a fundamental problem. Current localization algorithm mainly focuses on checking the localizability of a network and/or how to localize as many nodes as possible. It could provide accurate position information foe kind of expanding application. Localization provide information about coverage, deployment, routing, location, services, target tracking and rescue If high mobility among the mobile nodes occurs path failure breaks. Hence the location information cannot be predicted. Here we have proposed a localization based algorithm which will help to provide information about the localized and non-localized nodes in a network. In the proposed approach DREAM protocol and AODV protocol are used to find the localizability of a node in a network. DREAM protocol is a location protocol which helps to find the location of a node in a network whereas AODV is a routing protocol it discover route as and when necessary it does not maintain route from every node to every other. To locate the mobile nodes in a n/w an node identification algorithm is used. With the help of this algorithm localized and non-localized node can be easily detected in respect of radio range. This method helps to improve the performance of a module and minimize the location error and achieves improved performance in the form of UDP packet loss, received packet and transmitted packets, throughput, routing overhead, packet delivery fraction. All the simulation done through the NS-2 module and tested the mobile ad-hoc network.


2015 ◽  
Vol 8 (08) ◽  
pp. 103-125
Author(s):  
Erick Monroy Cuevas

La tecnología informática brinda numerosas ventajas para la creación, almacenamiento y distribución de información. Sin embargo, aún no ofrece opciones efi caces para preservar la integridad, la autenticidad o la fi abilidad de documentos en el largo plazo. El presente artículo muestra la importancia de las políticas de preservación para enfrentar la obsolescencia tecnológica. Para ello se ubican las políticas de preservación como una rama del campo más general denominado políticas de información. Asimismo, se muestran ejemplos concretos sobre la metodología para el diseño de un marco de políticas de preservación digital con base en los hallazgos de los Archivos Nacionales de Australia, los Archivos Nacionales de Inglaterra y del proyecto Electronic Resource Preservation and Access Network de la Comisión Europea.


Sign in / Sign up

Export Citation Format

Share Document