11,219 research outputs found
An Overview of Broadband communication over Power Lines
Broadband over power lines are Systems for carrying
data on conductors used for electric power
transmission. Power line communication technologies
can be used for different applications ranging from
home automation to internet access.
With the spread of broadband technologies in the last
few years, there are yet significant areas in the world
that do not have access to high speed internet, as
compared with the few internet service providers in
existence, the additive expenditures of laying cables
and building necessary infrastructure to provide DSL
in many areas most especially rural areas is too great.
But if broadband is served through power lines
considering the fact that it exist all over the country,
there will be no need to build new infrastructure.
Therefore, anywhere there is electricity, there could
also be broadband.
Broadband over Power line is designed to offer an
alternative means to provide high speed internet
access, voice over Internet protocol (VOIP) and other
broadband services, using medium and low voltage
lines to reach customers and businesses by combining
the principle of wireless networking, modems and
Radio. Researchers and developers have created ways
to transmit data over power lines into homes at
speeds between 500kilobits and 3 megabits per
second which is equivalent to the cable DSL (Digital
Subscriber Line) and this is achieved by modifying
the present power grids with specialized equipments.
With this knowledge, the broadband power line
developers could partner with power companies and
Internet service providers to bring broadband to
everyone with access to electricity
The Wiltshire Wills Feasibility Study
The Wiltshire and Swindon Record Office has nearly ninety thousand wills in its care. These records are neither adequately catalogued nor secured against loss by facsimile microfilm copies. With support from the Heritage Lottery Fund the Record Office has begun to produce suitable finding aids for the material. Beginning with this feasibility study the Record Office is developing a strategy to ensure the that facsimiles to protect the collection against risk of loss or damage and to improve public access are created.<p></p>
This feasibility study explores the different methodologies that can be used to assist the preservation and conservation of the collection and improve public access to it. The study aims to produce a strategy that will enable the Record Office to create digital facsimiles of the Wills in its care for access purposes and to also create preservation quality microfilms. The strategy aims to seek the most cost effective and time efficient approach to the problem and identifies ways to optimise the processes by drawing on the experience of other similar projects. This report provides a set of guidelines and recommendations to ensure the best use of the resources available for to provide the most robust preservation strategy and to ensure that future access to the Wills as an information resource can be flexible, both local and remote, and sustainable
The Validation of Speech Corpora
1.2 Intended audience........................
Motorcycle safety research project: Interim summary report 3: training and licensing interventions for risk taking and hazard perception for motorcyclists
Motorcycle trauma is a serious road safety issue in Queensland and throughout Australia. In 2009, Queensland Transport (later Transport and Main Roads or TMR) appointed CARRS-Q to provide a three-year program of Road Safety Research Services for Motorcycle Rider Safety. Funding for this research originated from the Motor Accident Insurance Commission. This program of research was undertaken to produce knowledge to assist TMR to improve motorcycle safety by further strengthening the licensing and training system to make learner riders safer by developing a pre-learner package (Deliverable 1), and by evaluating the QRide CAP program to ensure that it is maximally effective and contributes to the best possible training for new riders (Deliverable 2). The focus of this report is Deliverable 3 of the overall program of research. It identifies potential new licensing components that will reduce the incidence of risky riding and improve higher-order cognitive skills in new riders
Standard Selection Modes in Dynamic, Complex Industries: Creating Hybrids between Market Selection and Negotiated Selection of Standards
Several sectors within Information and Communication Technology demonstrate a shift from purely market-based selection of standards or purely negotiated selection of standards to hybrid selection processes, where both market competition and negotiation play a role. Negotiated standard setting processes (such as those organised by the ITU) assure interoperability of technical components and services. Private firms, however, increasingly tend to undercut these collective actions. Their innovations jump-start new developments, but also create incompatibilities, lock-in effects, and pockets of market power. Internet telephony is an example, where firms, standard setting alliances, and political institutions create a hybrid market-based / negotiated standard setting environment. The paper explores the development of this hybrid networking environment. It posits propositions which are illustrated by means of case studies of the DVD and Internet telephony.industrial organization ;
On the Design of Perceptual MPEG-Video Encryption Algorithms
In this paper, some existing perceptual encryption algorithms of MPEG videos
are reviewed and some problems, especially security defects of two recently
proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a
simpler and more effective design is suggested, which selectively encrypts
fixed-length codewords (FLC) in MPEG-video bitstreams under the control of
three perceptibility factors. The proposed design is actually an encryption
configuration that can work with any stream cipher or block cipher. Compared
with the previously-proposed schemes, the new design provides more useful
features, such as strict size-preservation, on-the-fly encryption and multiple
perceptibility, which make it possible to support more applications with
different requirements. In addition, four different measures are suggested to
provide better security against known/chosen-plaintext attacks.Comment: 10 pages, 5 figures, IEEEtran.cl
- …