Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

ITU Kaleidoscope: Building Sustainable Communities (K-2013), 2013 Proceedings of

Date 22-24 April 2013

Filter Results

Displaying Results 1 - 25 of 43
  • Index of authors

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (534 KB)  
    Freely Available from IEEE
  • Chair's message

    Publication Year: 2013 , Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (677 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Steering committee

    Publication Year: 2013 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | PDF file iconPDF (538 KB)  
    Freely Available from IEEE
  • Building sustainable communities [conference program]

    Publication Year: 2013 , Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (917 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2013 , Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (486 KB)  
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (828 KB)  
    Freely Available from IEEE
  • Foreword

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (624 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Digital library for creative and sustainable society

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (515 KB)  

    Broadband networks are becoming common worldwide, and people can communicate with each other overcoming the language barrier using machine translation and other tools. Libraries are becoming digital libraries where information can be obtained searching the contents of books and journals stored all over the world. Digital library technology contributes to improving the sustainability of society by reducing the amount of paper consumed and, most importantly, by preserving cultural assets in digital archives. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deeply programmable network; emerging technologies for network virtualization and software defined network (SDN)

    Publication Year: 2013 , Page(s): 1
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (513 KB) |  | HTML iconHTML  

    This presentation introduces the recent trends in network virtualization and software defined network (SDN). We expect these trends to help establish sustainable communities to meet challenges of today's and tomorrow's communication infrastructures. These infrastructures, in turn, will support various human activities and thus contribute to the creation of human-oriented technologies. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of a new packet scheduling algorithm and its evaluation

    Publication Year: 2013 , Page(s): 1 - 5
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1030 KB) |  | HTML iconHTML  

    ITU and other SDOs have launched oneM2M initiative recently and the standardization of M2M is now accelerating. The current access and core networks built for today's network services will be used as a common network infrastructure for M2M network with some modifications. When the current access and core networks are used for both the current network services and M2M services, communications equipments at the network edge need to handle a large number of communication flows which are a mix of large volume data communication such as web access and M2M data communication at the same time. To satisfy the QoS requirements of many applications including M2M applications, communications equipments at the network edge will need to support both minimum guaranteed rate service and low delay forwarding service for small sized packets. In this paper, we propose a packet scheduling algorithm which can provide minimum guaranteed rate service and which can reduce the scheduling delay of small packets. It can be used in access network communications equipment such as edge router and OLT. We also evaluate the proposed algorithm by simulation. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICT innovation in South Africa: Lessons learnt from Mxit

    Publication Year: 2013 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1003 KB) |  | HTML iconHTML  

    In the last decade South African innovators have produced two game changing innovations: Thawte and Mxit, the former for Internet security and the latter for mobile messaging. It is of interest to understand what it is in the local system of innovation that has enabled such innovations to emerge. Mxit is one of the first instant messaging systems to be freely available for almost all mobile phones. From a simple text service it has now evolved into a multimedia platform that offers gaming, education, community support services, and that is poised to enter the money transfer and payment market. The paper locates this development in the context of the telemetry sectoral system of innovation of South Africa, and the innovation ecology of the city of Stellenbosch that is designated as `Silicon Vineyard.' Mxit has particular importance as a means of bridging the various divides that continue to characterize post-Apartheid South Africa. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Review of challenges in national ICT policy process for African countries

    Publication Year: 2013 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1107 KB) |  | HTML iconHTML  

    National Information and Communication Technology (ICT) policies are vital in supporting socioeconomic development agendas. However, the formulation and implementation of national ICT policies is often beset with myriad of challenges which lender the policies ineffective in most developing countries. While there is substantial body of knowledge on the challenges for national ICT policies, no study has not yet dealt with the challenges holistically. This paper reports on the results of review of literature on the challenges for national ICT policy process in African countries using Grounded Theory method. The review categorised the challenges related to agenda setting, policy formulation, legal frameworks, implementation and evaluation. To mitigate some of the challenges, it is suggested that stakeholders' participation should be encouraged; monitoring and evaluation with mechanisms for learning should be integrated in all the phases of the policy process. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The role of intelligent transportation systems in developing countries and importance of standardization

    Publication Year: 2013 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1344 KB) |  | HTML iconHTML  

    The traffic accidents and congestions are getting a serious problem all over the world. The problem is growing fastest in developing countries where urbanization and the use of motorized vehicles is increasing most rapidly. One alternative solution is a concept of Intelligent Transportation Systems (ITS). It provides the ability to gather, organize, analyze, use, and share information about transportation systems. In this paper such issues as concept of sustainable communities with transportation and ITS is discussed and scheme of ITS deployment in developing countries and its benefits are presented. Moreover, the analysis of ITS current situation in some developed and developing countries and the role of standardization are presented. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital space transmission of an interference fringe-type computer-generated hologram using IrSimple

    Publication Year: 2013 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2319 KB) |  | HTML iconHTML  

    In this paper, we present a method to perform a digitalspace transmission of an interference fringe-type computergenerated hologram using IrSimple. IrSimple was defined by IrDA technical standard, and it was developed for the purpose of sending image data at high speed using an infrared-rays. We performed infrared digital transmission using IrSimple, and we minimized the size of the transmitted file by using a suitable compression method. The size of the compressed file was very small compared with that of the bitmap file. The transmission preserved the quality of the representation while requiring a short transmission time. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated telecommunication technology for the next generation networks

    Publication Year: 2013 , Page(s): 1 - 7
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1432 KB) |  | HTML iconHTML  

    The paper focuses researches on next generation network (NGN) convergence. A set of comprehensive data-transfer axioms premise holistic approach to benefit diverse packet-to-circuit switching techniques. A novel dynamic flow switching (DFS) method introduced to facilitate digital telecommunication channels along with appropriate multipurpose network meta-protocol (MNP). The tenets of integrated telecommunication technology (ITT) platform developed for the transport stratum in ITU-T model of NGN. Two-dimensional quality of service (QoS) palette and related cost-to-quality ratio (CQR) function proposed for multimedia traffic control. An elastic ITT-address system originated for ITT-platform to meet the challenge of Internet-scope expansion. The paper intends to contribute future network engineering. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on ICT service energy impact assessment method: How much energy tomanufacture a chip

    Publication Year: 2013 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (716 KB) |  | HTML iconHTML  

    Telecommunications are expected to reduce the energetic impact of human society through dematerialization. But in addition to their utilization consumption, the ICT equipments are responsible of energy consumption for their fabrication. To assess as precisely as possible their consumption and the gain compared to physical services, we use a new modular and open method intended to reduce errors and highlight possible improvements. The lithography phase of chips manufactured from extrapure silicon wafers is responsible for about 70% of the consumption of chips fabrication. The main elements of this phase are the tools, which make the operations, and the air circuit, which cleans the air and control its levels of temperature and humidity 24h/24. This element is deeply analyzed in this paper, as a key module of the method which can be reused for other studies. Many parameters take part in the air circuit consumption, particularly the climate of the place where the factory is built, the class of the clean room and the amount of particles emitted. We try to put them ahead to understand this consumption and to know how to improve the energy efficiency. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust audio watermarking based on dynamic DWT with error correction

    Publication Year: 2013 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1565 KB) |  | HTML iconHTML  

    Audio watermarking was introduced as a solution for the arising challenges facing audio ownership verification. These challenges are a result of easiness and high speed of copying and distribution digital audio. This paper presents enhancements in the performance of an audio ownership verification system that has been reported previously. The proposed system is based on the Discrete Wavelet Transform (DWT). A new approach for audio signal framing, dynamic DWT leveling, error correction code and new embedding methods are suggested to improve the watermark bit rate, minimum audio-cover period, quality of the watermarked audio and watermark robustness against audio attacks. The evaluation of the suggested system showed the following improvements: the watermark bit rate increased 23.4 times, 92% reduction in the minimum required audio-cover period, 54% increase in the Signal-to-Noise Ratio (SNR) of watermarked audio, and it demonstrated better robustness against watermarking benchmark attacks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-verified DNS reverse resolution

    Publication Year: 2013 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3274 KB) |  | HTML iconHTML  

    Domain Name System (DNS) reverse resolution is commonly relied on by anti-spam techniques to verify the email origins and by measurements or applications to uncover the host information. But the current practice is not able to clarify the IP addresses with no reverse resolution response and the source verification process is not optimized in terms of network bandwidth and response latency. This paper proposes an explicit scheme to bind A/AAAA resource records (RRs) with their matching PTR RRs by introducing APTR/AAAAPTR RR types. The DNS cache server can automatically switch from forward resolution to reverse resolution when handling the APTR/AAAAPTR RR types. This scheme enables the negative verification if no reverse records are returned for APTR/AAAAPTR records. Furthermore, the analytical and numerical results show that the number of queries and response delay are significantly cut by the proposed scheme. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A periodic combined-content distribution mechanism in peer-assisted content delivery networks

    Publication Year: 2013 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1194 KB) |  | HTML iconHTML  

    The concept of peer-assisted content delivery networks (CDNs) lets other nearby altruistic clients forward requested content files instead of the source servers, which works to localize overall traffic. Our prior work proposed a traffic engineering scheme to localize traffic in peer-assisted CDNs. To induce altruistic clients to download content files that are most likely to contribute to localizing network traffic, this scheme combines the content files and allows them to obtain the combined content file while keeping the price unchanged from the single-content price. Although we have discussed how much traffic only a set of combined content files can theoretically reduce, we can expect further traffic localization by distributing combined content files to multiple altruistic clients. This paper proposes a periodic combined-content distribution mechanism based on our scheme. This mechanism determines when combined content files should be provided by considering the network cache state. Computer simulations confirmed that our new mechanism could double performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Medication error protection system with a body area communication tag

    Publication Year: 2013 , Page(s): 1 - 7
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1362 KB) |  | HTML iconHTML  

    Errors in administering medication are serious problems. Most errors are due to some confusion between the patient and the medication. The bar-code has been used to deal with this problem. However, since a nurse has to put a reader over a bar-code tag, there is still room for improvement when, say, a nurse is affected by stress due to too heavy a workload. As a safer alternative to bar-codes and RFIDs, we propose Touch-tag, a body area communication tag. The concept is that the patient wears a tag and the nurse has a Touch-tag reader that reads the ID on the tag by a nurse just by touching the patient. Since a nurse usually touches a patient during administration of medication, the medical error protection system using the Touch tag does not involve any additional work. We describe the medical error protection system with the Touch-tag and experiments to confirm whether the Touch tag works well or not. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intra-city digital divide measurements through clustering

    Publication Year: 2013 , Page(s): 1 - 6
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1571 KB) |  | HTML iconHTML  

    With latest development of telecommunication technologies and end user's increased bandwidth and mobility demand reachability of information and communication technologies (ICT) became more critical. In this paper, we approach to end user behaviors and the reachability to ICT by tackling digital divide concept along with clustering analysis. To the best of our knowledge, this research is a unique case study that attempts to analyze digital divide at intra-city level by neighborhoods. While governments and institutions, such as ITU, are in question of whether the global divide is widening or narrowing, there are no studies, neither in the literature nor in practice to understand the gap between ICT users in a city. With this goal, Istanbul habitants were asked to fill a questionnaire, in order to be classified in terms of their technology reachability and reasons of using ICT. Then, clustering analysis was performed to questionnaire results. Respondents have been clustered into sub groups from digital divide perspective. The required steps and suitable clustering techniques during this process are discussed with determination of questions at the end which are commonly answered by respondents with different ICT knowledge, which may lead us determine precise reasons of digital gap later on. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sustaining life during the early stages of disaster relief with a frugal information system: Learning from the great east Japan earthquake

    Publication Year: 2013 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1495 KB) |  | HTML iconHTML  

    Important lessons for responding to a large-scale disaster can be gleaned from the March 11, 2011 Great East Japan earthquake and tsunami. The failure of the electrical power system and the resultant loss of information communication and processing capability severely constrained the recovery work of many municipalities. It was difficult for supporting organizations to collect and share information. A frugal Information System (IS) designed around the four U-constructs is suggested as a solution to handle the early stages of disaster relief. This paper focuses on the most frequently available device, the cellular phone, as the foundation for a frugal IS for disaster relief. Familiar and available tools place minimal stress on an already stressed system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A model for creating and sustaining information services platform communities: Lessons learnt from open source software

    Publication Year: 2013 , Page(s): 1 - 8
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2039 KB) |  | HTML iconHTML  

    Many research institutions are building cloud-based information services platforms (ISPs) that enable their researchers, scientists, and the general public use information assets, share knowledge and experience, and create sustainable communities. However, there is no guarantee that when you build an ISP this will happen. Part of the problem is because ISP providers lack the model to help them facilitate the building of sustainable communities. In this paper, we present a model for creating and sustaining communities on the ISP being developed by the National Institute of Information and Communications Technology (NICT) of Japan. Inspired by the way Open Source software communities operate, we describe the model concept, its settings, and the tools ISP communities may need to support their contribution towards the development of products and services. Our experience in the design and implementation of the model provides useful insights into emerging ICT trends and the means for ISP providers to identify, at an early stage, the requirements for creating successful products and services ecosystem. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security technologies for the protection of critical infrastructures — Ethical risks and solutions offered by standardization

    Publication Year: 2013 , Page(s): 1 - 8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1421 KB) |  | HTML iconHTML  

    The added value of standards is shown in numerous research articles. Several recent studies also highlight the need for security standards. Security products and services may bear ethical and privacy-related risks which can impede acceptance of new security solutions. Specific privacy standards may help to overcome such problems, but privacy issues of security technologies are not covered by standardization research so far. This paper deals with the topic from mainly German and European perspectives. Based on a survey in the German security research program, it gives an overview of security technologies, the specific risks they bear and their importance. Three technology-related categories were identified: surveillance solutions for detection from distance, solutions for obtrusive detection and data processing. Relevant risks were described and discussed. Solutions based on standardization were shown. The paper finishes by giving recommendations for new privacy standards. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Visible light communication using sustainable LED lights

    Publication Year: 2013 , Page(s): 1 - 6
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2027 KB) |  | HTML iconHTML  

    LED lights are becoming widely used for homes and offices for their luminous efficacy improvement. Visible light communication (VLC) is a new way of wireless communication using visible light. Typical transmitters used for visible light communication are visible light LEDs and receivers are photodiodes and image sensors. We present new applications which will be made possible by visible light communication technology. Location-based services are considered to be especially suitable for visible light communication applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.