network access
Recently Published Documents


TOTAL DOCUMENTS

924
(FIVE YEARS 253)

H-INDEX

24
(FIVE YEARS 6)

2022 ◽  
Vol 34 (2) ◽  
pp. 1-18
Author(s):  
Lele Qin ◽  
Guojuan Zhang ◽  
Li You

Video command and dispatch systems have become essential communication safeguard measures in circumstances of emergency rescue, epidemic prevention, and control command as, data security has become especially important. After meeting the requirements of voice and video dispatch, this paper proposes an end-to-end encryption method of multimedia information that introduces a multiple protection mechanism including selective encryption and selective integrity protection. The method has a network access authentication and service encryption workflow, which implants startup authentication and key distribution into the information control signaling procedure. This method constitutes a key pool with the three-dimensional Lorenz System, the four-dimensional Cellular Neural Network (CNN) System and the four-dimensional Chen System where the key source system and initial conditions are decided by the plaintext video frame itself. Then, this method optimizes the chaotic sequences to further enhance system security.


Author(s):  
Taiwo Samuel Aina

Abstract: The goal of this project is to design and analyse a radio over fibre system for a four-story hospital with 20 rooms on each floor. The number of ONUs per floor is 20, and it was assumed that each room had an ONU capable of providing network access to voice, data, video, and biometrics. We build an 80-channel WDM optical transmitter using the WDM method. The proposed system includes a transmitter with 20 input channels, a multiplexer, a DE multiplexer, a 45-kilometer optical fibre, and an amplifier. The proposed model was simulated, and the results were evaluated in WDM systems using an optical amplifier. The receiver performance analysis of the Optical Communication System is shown by the BER simulation run and the eye diagram graphic, with the threshold set at 0.00120739. Furthermore, the eye height is 0.00141402, and the minimum BER is 5.59009e-006. When the simulated and calculated values of received power and total power loss are compared, the system is efficient. Keywords: Radio over fibre, Optical Amplifier, WDM system, DE multiplexer, Multiplexer, BER, Optical transmitter


2022 ◽  
Vol 17 (1) ◽  
pp. 138-164
Author(s):  
Hani Brdesee ◽  
Wafaa Alsaggaf

Universities worldwide strive to provide the best student services possible, particularly those that support student achievements and career goals. Therefore, academic advising continues to be a significant part of the student experience, one which universities need to fully understand in terms of its objectives, application processes, and required skill. As a result of significant technological improvements since the turn of the millennium, including expanding internet applications and digital transformations, universities have established computer information systems that support academic advising and course registration services. This study examined the effects of modifications to the electronic academic advising and course registration systems at King Abdulaziz University in 2018, and then again in 2020, following a university-wide system failure in 2018 resulting from a demand overload. In 2018, a preliminary statistical analysis and student feedback survey were conducted by the authors to measure student satisfaction with the online portal On-Demand University Services (ODUS Plus). In addition to recommendations suggested by the 2018 analysis such as balancing the load distribution of the university’s network, organizational (i.e., non-technical) solutions, rules, and regulations were adjusted such as progressive course registration that prioritized those expected to graduate first. The survey and analysis were repeated by the authors in 2020 to assess improvements in student satisfaction. As a result of the changes, the investigation revealed improved student satisfaction with the performance of ODUS Plus and network access. Overall, students were significantly more satisfied in 2020 than in 2018. This research shows that some technical challenges can be resolved using re-engineered processes and organizational solutions.


2022 ◽  
Vol 2022 ◽  
pp. 1-17
Author(s):  
Yonglan Li ◽  
Wen Shu

The research is aimed at verifying the application effect of the online automatic evaluation system in English translation teaching and at understanding the satisfaction of students with different feedback methods. The research uses three classes of human resource management majors in Xi’an Technological University as the research object and uses questionnaire survey and comparative experiment methods to compare and analyse the three feedback methods: teacher feedback, online automatic feedback, and teacher feedback combined with online automatic feedback. The research answers the following three questions: (1) will the three feedback methods affect students’ English translation performance? (2) Which of the three feedback methods will improve students’ English performance better? (3) What about students’ satisfaction with current feedback methods? The research results show that the significance value between the control group (CG) and the experimental group 1 (EG1) is 0.029, that between CG and the experimental group 2 (EG2) is 0.432, and that between EG1 and EG2 is 0.001. There are obvious differences in the posttest scores of the three groups of students. EG2 has the largest average posttest score, which is 9.8182; there is no obvious difference in posttest translation scores between CG and EG2. It indicates that “teacher feedback + online automatic feedback” and teacher feedback have the equivalent effect on improving students’ translation. The results of the questionnaire survey show that students have the highest degree of recognition of “teacher feedback + online automatic feedback.” The research is helpful for teachers to better understand the shortcomings in the translation teaching process, so that they can take effective measures against these problems in the follow-up teaching process to improve their teaching effect.


2022 ◽  
Vol 22 (1) ◽  
Author(s):  
Julia Koschinsky ◽  
Nicole P. Marwell ◽  
Raed Mansour

Abstract Background Much of spatial access research measures the proximity to health service locations. We advance this research by focusing on whether health service funding is within walkable reach of neighborhoods with high hardship. This is made possible by a new administrative data source: financial contracts data for those human services that are delivered by nonprofits under contract with the government. Methods In a prototypical spatial access study we apply a classic 2-step floating area catchment model for walkable network access to analyze 2018 data about contracted nonprofit health services funded by the Chicago Department of Public Health (CDPH). CDPH collected the data for the purpose of this study. Results We find that the common container approach of aggregating contract amounts by provider headquarter locations in a given area (ignoring satellite service sites) underestimates the share of funding that goes to Chicago neighborhoods with higher hardship. Once service sites and spatial access are taken into account, a larger share of CDPH funds was found to be within walkable reach of Chicago’s high hardship areas. This was followed by low hardship areas (which could be driven by more headquarter locations there that do serve areas throughout the city). Medium hardship areas trail both, perhaps warranting closer attention. We explore these results by program type and neighborhood with a spatial decision support system developed for the health department. Conclusions The typical approach for analyzing human service contracts based on headquarters is misleading -- in fact, we find that results are reversed when service sites and walkable access are taken into account. This prototype provides an alternative framework for avoiding these misleading results.


Author(s):  
Dr. M. Sudha ◽  
S. Usha ◽  
Naveena M ◽  
Nisha P ◽  
Prabha R

Nowadays, Transportation is one of the primary and major needs of almost every human being that cannot be avoided. The road congested or road traffic are due to The increases in vehicles, which in turn results in road safety and increase accidents. In current society, there are many modern cars with tremendous features in it like, Mercedes, BMW, Audi, and Tesla and so on. Those cars are highly technical and even higher in price. Many people are not economical on buying those vehicles because the middle range vehicles are not capable of much attributes like, visualizing performance, driver safety and so on.., Anyway , the action of using something that is of highly mobile and energy limitation UVs for wireless communications also introduces many new provocation. Hence, we use Vehicle to Vehicle communication and vehicle to infrastructure communication are to reduce crashes. In addition to this, for an Electric unmanned vehicle we use Wireless charging to charge the vehicle with the help of the Tesla coil. In this system we use a (Dedicated short range communication) DSRC and Zigbee. Both DSRC and Zigbee are used for the communication between the vehicles within a certain range. Dedicated short range communication (DSRC) protocol is used for the network access since it reduces the delay in transmission time. Resentencing, there are research shows that using DSRC has a performance issue in a dense area or increased network load hence Zigbee is used along with DSRC since Zigbee perform well in dense area.


Author(s):  
Shailaja Dilip Pawar

Abstract: Cloud computing is actually a model for enabling convenient, limitless, on demand network access to a shared pool of computing resource. This paper describes introductory part explain the concept of cloud computing, different components of cloud, types of cloud service development. At last paper elaborates the classification of cloud computing which will clear the ovelall idea of cloud computing to the learners who are new to this field. Keywords: cloud computing, SaaS, PaaS, IaaS


Author(s):  
Muhammad Agung Wibisono ◽  
Hartono Hartono

This research aims to analyze online learning policies and the problems of obstacles of teachers, learners, and parents in learning Indonesian in the covid-19 pandemic. This type of research is a case study at Muhammadiyah 4 Yogyakarta Junior High School and literature study using secondary data collected through books, journals, websites, and other sources related to research problems. Data collection uses interview techniques and document analysis. Data analysis uses qualitative descriptive techniques, consisting of data collection and subtraction, data presentation, and conclusion withdrawal. The results showed that the distance learning policy implemented at Muhammadiyah Junior High School 4 Yogyakarya was in accordance with the Circular Letter (SE) of the Ministry of Education No. 4 of 2020 on the Implementation of Education Policy in the Emergency Period of The Spread of Coronavirus Disease (COVID-19). The policies implemented include policies to provide student learning experiences, provide life skills education, learning in accordance with student conditions, the process of awarding assessments, and the process of Admission of New Learners (PPDB) and School Operational Assistance (BOS). On the other hand, there are also learning obstacles for teachers, learners, and parents in Indonesian learning experienced during the diverse covid-19 pandemic. Teacher constraints are on aspects of the use of learning applications, weak internet network access, unpreparedness with online learning media, learning materials that cannot be applied optimally, and research to learners. Student constraints are on aspects of inadequate learning facilities, weak internet access, inactivity in following learning, psychological conditions of stress and boredom, many tasks, and difficulties in operating learning applications. Parental constraints are on socio-economic aspects and supervision or mentoring of children in online learning at home.


Author(s):  
Dr. J. Suguna ◽  
◽  
G. Keerthana ◽  

Cloud computing is a network access concept that provides simple, on-demand network access to a shared pool of customizable computing resources (such as networks, servers, storage, applications, and services) that can be quickly provided and released with minimal administrative effort or service provider involvement. The idea of having a communication node on-board a vehicle that may make wireless connections with other adjacent communication nodes visible in the radio range is referred to as a Vehicular Adhoc Network (VANET). The main focus of this paper is to design lightweight Vehicular Adhoc Network architecture for efficient secure data transmission. An improved Ciphertext Policy Attribute Based Encryption scheme and Identity Based offline/online Signature scheme are proposed to reduce the computational cost, storage overhead and communication overhead in vehicular ad-hoc network. Finally, concluded that the proposed work yields high performance than the existing work.


2021 ◽  
pp. 133-149
Author(s):  
Piti Eiamchamroonlarp

This paper finds that the current electricity regulatory regime, established by the Energy Industry Act B.E. 2550 (2007), together with the current electricity industry structure—the enhanced single buyer model—serves as a favorable legal basis for a state electricity enterprise, especially the Electricity Generating Authority of Thailand (EGAT), to own and operate a hydro-floating solar project in Thailand. However, it argues that, despite their ability to obtain the relevant licenses under the Energy Industry Act B.E. 2550 (2007) as well as enter into power purchase agreements with state electricity enterprises or private customers, the rights of private hydro-floating solar project operators to own and operate a hydro-floating solar project on the surface of public water resources are undermined by uncertainty pertaining to the possessory right over the water surface of public water resources, as well as unfair or discriminatory practices concerning electricity network access.


Sign in / Sign up

Export Citation Format

Share Document