By Topic

ITU Kaleidoscope: Building Sustainable Communities (K-2013), 2013 Proceedings of

Date 22-24 April 2013

Filter Results

Displaying Results 1 - 25 of 43
  • Index of authors

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (534 KB)
    Freely Available from IEEE
  • Chair's message

    Publication Year: 2013, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (677 KB) | HTML iconHTML
    Freely Available from IEEE
  • Steering committee

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (538 KB)
    Freely Available from IEEE
  • Building sustainable communities [conference program]

    Publication Year: 2013, Page(s):1 - 4
    Request permission for commercial reuse | PDF file iconPDF (917 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (486 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (828 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (624 KB) | HTML iconHTML
    Freely Available from IEEE
  • Digital library for creative and sustainable society

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    Broadband networks are becoming common worldwide, and people can communicate with each other overcoming the language barrier using machine translation and other tools. Libraries are becoming digital libraries where information can be obtained searching the contents of books and journals stored all over the world. Digital library technology contributes to improving the sustainability of society by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deeply programmable network; emerging technologies for network virtualization and software defined network (SDN)

    Publication Year: 2013, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (513 KB) | HTML iconHTML

    This presentation introduces the recent trends in network virtualization and software defined network (SDN). We expect these trends to help establish sustainable communities to meet challenges of today's and tomorrow's communication infrastructures. These infrastructures, in turn, will support various human activities and thus contribute to the creation of human-oriented technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of a new packet scheduling algorithm and its evaluation

    Publication Year: 2013, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1030 KB) | HTML iconHTML

    ITU and other SDOs have launched oneM2M initiative recently and the standardization of M2M is now accelerating. The current access and core networks built for today's network services will be used as a common network infrastructure for M2M network with some modifications. When the current access and core networks are used for both the current network services and M2M services, communications equip... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT innovation in South Africa: Lessons learnt from Mxit

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1003 KB) | HTML iconHTML

    In the last decade South African innovators have produced two game changing innovations: Thawte and Mxit, the former for Internet security and the latter for mobile messaging. It is of interest to understand what it is in the local system of innovation that has enabled such innovations to emerge. Mxit is one of the first instant messaging systems to be freely available for almost all mobile phones... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review of challenges in national ICT policy process for African countries

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1107 KB) | HTML iconHTML

    National Information and Communication Technology (ICT) policies are vital in supporting socioeconomic development agendas. However, the formulation and implementation of national ICT policies is often beset with myriad of challenges which lender the policies ineffective in most developing countries. While there is substantial body of knowledge on the challenges for national ICT policies, no study... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of intelligent transportation systems in developing countries and importance of standardization

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1344 KB) | HTML iconHTML

    The traffic accidents and congestions are getting a serious problem all over the world. The problem is growing fastest in developing countries where urbanization and the use of motorized vehicles is increasing most rapidly. One alternative solution is a concept of Intelligent Transportation Systems (ITS). It provides the ability to gather, organize, analyze, use, and share information about transp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital space transmission of an interference fringe-type computer-generated hologram using IrSimple

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2319 KB) | HTML iconHTML

    In this paper, we present a method to perform a digitalspace transmission of an interference fringe-type computergenerated hologram using IrSimple. IrSimple was defined by IrDA technical standard, and it was developed for the purpose of sending image data at high speed using an infrared-rays. We performed infrared digital transmission using IrSimple, and we minimized the size of the transmitted fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated telecommunication technology for the next generation networks

    Publication Year: 2013, Page(s):1 - 7
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1432 KB) | HTML iconHTML

    The paper focuses researches on next generation network (NGN) convergence. A set of comprehensive data-transfer axioms premise holistic approach to benefit diverse packet-to-circuit switching techniques. A novel dynamic flow switching (DFS) method introduced to facilitate digital telecommunication channels along with appropriate multipurpose network meta-protocol (MNP). The tenets of integrated te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on ICT service energy impact assessment method: How much energy tomanufacture a chip

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (716 KB) | HTML iconHTML

    Telecommunications are expected to reduce the energetic impact of human society through dematerialization. But in addition to their utilization consumption, the ICT equipments are responsible of energy consumption for their fabrication. To assess as precisely as possible their consumption and the gain compared to physical services, we use a new modular and open method intended to reduce errors and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust audio watermarking based on dynamic DWT with error correction

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1565 KB) | HTML iconHTML

    Audio watermarking was introduced as a solution for the arising challenges facing audio ownership verification. These challenges are a result of easiness and high speed of copying and distribution digital audio. This paper presents enhancements in the performance of an audio ownership verification system that has been reported previously. The proposed system is based on the Discrete Wavelet Transf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-verified DNS reverse resolution

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3274 KB) | HTML iconHTML

    Domain Name System (DNS) reverse resolution is commonly relied on by anti-spam techniques to verify the email origins and by measurements or applications to uncover the host information. But the current practice is not able to clarify the IP addresses with no reverse resolution response and the source verification process is not optimized in terms of network bandwidth and response latency. This pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A periodic combined-content distribution mechanism in peer-assisted content delivery networks

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1194 KB) | HTML iconHTML

    The concept of peer-assisted content delivery networks (CDNs) lets other nearby altruistic clients forward requested content files instead of the source servers, which works to localize overall traffic. Our prior work proposed a traffic engineering scheme to localize traffic in peer-assisted CDNs. To induce altruistic clients to download content files that are most likely to contribute to localizi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medication error protection system with a body area communication tag

    Publication Year: 2013, Page(s):1 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1362 KB) | HTML iconHTML

    Errors in administering medication are serious problems. Most errors are due to some confusion between the patient and the medication. The bar-code has been used to deal with this problem. However, since a nurse has to put a reader over a bar-code tag, there is still room for improvement when, say, a nurse is affected by stress due to too heavy a workload. As a safer alternative to bar-codes and R... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-city digital divide measurements through clustering

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1571 KB) | HTML iconHTML

    With latest development of telecommunication technologies and end user's increased bandwidth and mobility demand reachability of information and communication technologies (ICT) became more critical. In this paper, we approach to end user behaviors and the reachability to ICT by tackling digital divide concept along with clustering analysis. To the best of our knowledge, this research is a unique ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustaining life during the early stages of disaster relief with a frugal information system: Learning from the great east Japan earthquake

    Publication Year: 2013, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1495 KB) | HTML iconHTML

    Important lessons for responding to a large-scale disaster can be gleaned from the March 11, 2011 Great East Japan earthquake and tsunami. The failure of the electrical power system and the resultant loss of information communication and processing capability severely constrained the recovery work of many municipalities. It was difficult for supporting organizations to collect and share informatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for creating and sustaining information services platform communities: Lessons learnt from open source software

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2039 KB) | HTML iconHTML

    Many research institutions are building cloud-based information services platforms (ISPs) that enable their researchers, scientists, and the general public use information assets, share knowledge and experience, and create sustainable communities. However, there is no guarantee that when you build an ISP this will happen. Part of the problem is because ISP providers lack the model to help them fac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security technologies for the protection of critical infrastructures — Ethical risks and solutions offered by standardization

    Publication Year: 2013, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1421 KB) | HTML iconHTML

    The added value of standards is shown in numerous research articles. Several recent studies also highlight the need for security standards. Security products and services may bear ethical and privacy-related risks which can impede acceptance of new security solutions. Specific privacy standards may help to overcome such problems, but privacy issues of security technologies are not covered by stand... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visible light communication using sustainable LED lights

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2027 KB) | HTML iconHTML

    LED lights are becoming widely used for homes and offices for their luminous efficacy improvement. Visible light communication (VLC) is a new way of wireless communication using visible light. Typical transmitters used for visible light communication are visible light LEDs and receivers are photodiodes and image sensors. We present new applications which will be made possible by visible light comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.