11,219 research outputs found

    An Overview of Broadband communication over Power Lines

    Get PDF
    Broadband over power lines are Systems for carrying data on conductors used for electric power transmission. Power line communication technologies can be used for different applications ranging from home automation to internet access. With the spread of broadband technologies in the last few years, there are yet significant areas in the world that do not have access to high speed internet, as compared with the few internet service providers in existence, the additive expenditures of laying cables and building necessary infrastructure to provide DSL in many areas most especially rural areas is too great. But if broadband is served through power lines considering the fact that it exist all over the country, there will be no need to build new infrastructure. Therefore, anywhere there is electricity, there could also be broadband. Broadband over Power line is designed to offer an alternative means to provide high speed internet access, voice over Internet protocol (VOIP) and other broadband services, using medium and low voltage lines to reach customers and businesses by combining the principle of wireless networking, modems and Radio. Researchers and developers have created ways to transmit data over power lines into homes at speeds between 500kilobits and 3 megabits per second which is equivalent to the cable DSL (Digital Subscriber Line) and this is achieved by modifying the present power grids with specialized equipments. With this knowledge, the broadband power line developers could partner with power companies and Internet service providers to bring broadband to everyone with access to electricity

    The Wiltshire Wills Feasibility Study

    Get PDF
    The Wiltshire and Swindon Record Office has nearly ninety thousand wills in its care. These records are neither adequately catalogued nor secured against loss by facsimile microfilm copies. With support from the Heritage Lottery Fund the Record Office has begun to produce suitable finding aids for the material. Beginning with this feasibility study the Record Office is developing a strategy to ensure the that facsimiles to protect the collection against risk of loss or damage and to improve public access are created.<p></p> This feasibility study explores the different methodologies that can be used to assist the preservation and conservation of the collection and improve public access to it. The study aims to produce a strategy that will enable the Record Office to create digital facsimiles of the Wills in its care for access purposes and to also create preservation quality microfilms. The strategy aims to seek the most cost effective and time efficient approach to the problem and identifies ways to optimise the processes by drawing on the experience of other similar projects. This report provides a set of guidelines and recommendations to ensure the best use of the resources available for to provide the most robust preservation strategy and to ensure that future access to the Wills as an information resource can be flexible, both local and remote, and sustainable

    The Validation of Speech Corpora

    Get PDF
    1.2 Intended audience........................

    Motorcycle safety research project: Interim summary report 3: training and licensing interventions for risk taking and hazard perception for motorcyclists

    Get PDF
    Motorcycle trauma is a serious road safety issue in Queensland and throughout Australia. In 2009, Queensland Transport (later Transport and Main Roads or TMR) appointed CARRS-Q to provide a three-year program of Road Safety Research Services for Motorcycle Rider Safety. Funding for this research originated from the Motor Accident Insurance Commission. This program of research was undertaken to produce knowledge to assist TMR to improve motorcycle safety by further strengthening the licensing and training system to make learner riders safer by developing a pre-learner package (Deliverable 1), and by evaluating the QRide CAP program to ensure that it is maximally effective and contributes to the best possible training for new riders (Deliverable 2). The focus of this report is Deliverable 3 of the overall program of research. It identifies potential new licensing components that will reduce the incidence of risky riding and improve higher-order cognitive skills in new riders

    Standard Selection Modes in Dynamic, Complex Industries: Creating Hybrids between Market Selection and Negotiated Selection of Standards

    Get PDF
    Several sectors within Information and Communication Technology demonstrate a shift from purely market-based selection of standards or purely negotiated selection of standards to hybrid selection processes, where both market competition and negotiation play a role. Negotiated standard setting processes (such as those organised by the ITU) assure interoperability of technical components and services. Private firms, however, increasingly tend to undercut these collective actions. Their innovations jump-start new developments, but also create incompatibilities, lock-in effects, and pockets of market power. Internet telephony is an example, where firms, standard setting alliances, and political institutions create a hybrid market-based / negotiated standard setting environment. The paper explores the development of this hybrid networking environment. It posits propositions which are illustrated by means of case studies of the DVD and Internet telephony.industrial organization ;

    On the Design of Perceptual MPEG-Video Encryption Algorithms

    Get PDF
    In this paper, some existing perceptual encryption algorithms of MPEG videos are reviewed and some problems, especially security defects of two recently proposed MPEG-video perceptual encryption schemes, are pointed out. Then, a simpler and more effective design is suggested, which selectively encrypts fixed-length codewords (FLC) in MPEG-video bitstreams under the control of three perceptibility factors. The proposed design is actually an encryption configuration that can work with any stream cipher or block cipher. Compared with the previously-proposed schemes, the new design provides more useful features, such as strict size-preservation, on-the-fly encryption and multiple perceptibility, which make it possible to support more applications with different requirements. In addition, four different measures are suggested to provide better security against known/chosen-plaintext attacks.Comment: 10 pages, 5 figures, IEEEtran.cl
    corecore