133 resultados para Internet technologies
em Helda - Digital Repository of University of Helsinki
Resumo:
The range of consumer health and medicines information sources has diversified along with the increased use of the Internet. This has led to a drive to develop medicines information services and to better incorporate the Internet and e-mail into routine practice in health care and in community pharmacies. To support the development of such services more information is needed about the use of online information by consumers, particularly of those who may be the most likely to use and to benefit from the new sources and modes of medicines communication. This study explored the role and utilization of the Internet-based medicines information and information services in the context of a wider network of information sources accessible to the public in Finland. The overall aim was to gather information to develop better and more accessible sources of information for consumers and services to better meet the needs of consumers. Special focus was on the needs and information behavior among people with depression and using antidepressant medicines. This study applied both qualitative and quantitative methods. Consumer medicines information needs and sources were identified by analyzing the utilization of the University Pharmacy operated national drug information call center (Study I) and surveying Finnish adults (n=2348) use of the different medicines information sources (Study II). The utilization of the Internet as a source of antidepressant information among people with depression was explored by focus group discussions among people with depression and with current or past use of the antidepressant(s) (n=29, Studies III & IV). Pharmacy response to the needs of consumers in term of providing e-mail counseling was assessed by conducting a virtual pseudo customer study among the Finnish community pharmacies (n=161, Study V). Physicians and pharmacists were the primary sources of medicines information. People with mental disorders were more frequent users of telephone- and Internet-based medicines information sources and patient information leaflets than people without mental disorders. These sources were used to complement rather than replace information provided face-to-face by health professionals. People with depression used the Internet to seek facts about antidepressants, to share experiences with peers, and for the curiosity. They described that the access to online drug information was empowering. Some people reported lacking the skills necessary to assess the quality of online information. E-mail medication counseling services provided by community pharmacies were rare and varied in quality. Study results suggest that rather than discouraging the use of the Internet, health professionals should direct patients to use accurate and reliable sources of online medicines information. Health care providers, including community pharmacies should also seek to develop new ways of communicating information about medicines with consumers. This study determined that people with depression and using antidepressants need services enabling interactive communication not only with health care professionals, but also with peers. Further research should be focused on developing medicines information service facilitating communication among different patient and consumer groups.
Resumo:
Tarkastelen kuntien esittelyteksteissä esiintyviä, adjektiiveihin ja adjektiiviryhmiin liittyviä kollokaatioita ja kolligaatioita, eli myötäilmauksia. Adjektiiveja käsittelen adjektiiviryhmittäin, joita on kuusi. Laskevassa kokojärjestyksessä aineistossani esiintyvät adjektiiviryhmät ovat seuraavat: suhteelliset, absoluuttiset, yksilöivät, taipumattomat, suhteutusadjektiivit sekä proadjektiivit. Kiinnitän huomiota erityisesti siihen, millaisia kollokaatiosuhteita (nousevat ja laskevat kollokaatiot) eri adjektiiveihin ja eri adjektiiviryhmiin liittyy. Käyttämäni tekstiaineisto on pienehkö sähköinen tekstikorpus, joka koostuu suomalaisten kuntien Internet-sivuilta kerätyistä esittelyteksteistä. Korpuksessa on yhteensä 119 tekstiä, ja niissä on kyse kunnan esittelystä Internet-sivustojen lukijoille, eli tavallisesti erilaisesta oman kunnan markkinoinnista. Aineistooni kuuluvien kuntien väkiluku on vähemmän kuin 3000 asukasta, eli tutkimuskunnissa kyse on kaikkein pienimmistä Suomen kunnista. Tutkimusaineistooni, eli sähköiseen korpukseen, kuuluvat tekstit on käsitelty Fintwol-ohjelmalla, jolloin niihin on tehty koneavusteinen morfologinen analyysi. Jokaiseen saneeseen on siis lisätty sille kuuluva morfologinen tulkinta. Tarkoitukseni onkin havainnoida myös tietokoneen mahdollistamia sähköisiä tutkimusmenetelmiä kvalitatiivisen kielentutkimuksen välineenä. Kollokaatioiden tutkimuksessa tekstikorpuksia on käytetty pitkään, mutta aiemmin morfologinen analyysi on tavallisesti tehty käsin ja analyysit perustuneet esimerkiksi tiettyjen lekseemien tarkasteluun. Tutkimuksessani selvitän, millaisia mahdollisuuksia tietokoneavusteinen analyysi tuo kvalitatiiviseen kielentutkimukseen sekä millaisia rajoituksia sillä on. Adjektiivi-kollokaatti-esiintymien avulla kuvaillaan esittelyteksteissä usein kuntaa joko suoraan tai välillisesti. Tietokoneavusteisesta analyysista saadut tulokset ovat lähinnä kvantitatiivisia, mutta käytän tarkastelun apuna konkordanssilistaa, eli niin kutsuttua KWIC-listaa (Key Word In Context), jonka tarkasteluvälin pituudeksi olen rajannut viisi sanaa. Tämä pituus sisältää tarkasteltavan lekseemin (adjektiivi) sekä kaksi sanaa sen edellä ja jäljessä. Havainnoin sähköisestä korpuksesta saamieni tilastollisten tulosten avulla myös sitä, millainen aineisto ja tekstilaji esittelytekstit ovat. Vertailen saamiani tuloksia muista korpuksista saatuihin tilastollisiin tuloksiin. Adjektiiviryhmiin liittyvät nousevat kollokaatiosuhteet, joissa kollokaatti on adjektiivia yleisempi, toistuvat läpi aineiston samanlaisina: Näissä kollokaatiosuhteissa adjektiivit kollokoivat useimmiten sellaisen sanaston kanssa, joka on varsin yleistä koko aineistossani. Esimerkiksi substantiivit kunta ja palvelu, jotka ovat koko aineiston yleisimpiä sanoja, esiintyvät kaikkien adjektiiviryhmien adjektiivien kollokaatteina toistuvasti. Ne myös ilmaisevat sellaisia esittelyteksteissä toistuvia aiheita, jotka ovat kunnille tärkeitä ja joita käsitellään monessa esittelytekstissä. Laskevat kollokaatiosuhteet taas ilmaisevat lähinnä esittelyteksteissä yleisiä, adjektiivien merkitystä määrittäviä leksikaalisia suhteita, kuten adjektiivi-kollokaatti-parit hyvät liikenneyhteydet tai kaunis maisema. Esittelytekstiaineistoni käsittelyyn tietokoneavusteinen analyysi soveltui vain osittain. Suurin ongelma aiheutui paikannimistä (esim.
Resumo:
Tutkimus käsittelee verkko-opetusinnovaation leviämistä perusasteen ja lukion maantieteeseen vuosina 1998–2004. Työssä sovellettiin opetusinnovaation leviämismallia ja innovaatioiden diffuusioteoriaa. Aineisto hankittiin seitsemänä vuotena kyselylomakkeilla maantieteen verkko-opetuksen edelläkävijäopettajilta, jotka palauttivat 326 lomaketta. Tutkimuksen pääongelmat olivat 1) Millaisia edellytyksiä edelläkävijäopettajilla on käyttää verkko-opetusta koulun maantieteessä? 2) Mitä sovelluksia ja millä tavoin edelläkävijäopettajat käyttävät maantieteen verkko-opetuksessa? 3) Millaisia käyttökokemuksia edelläkävijäopettajat ovat saaneet maantieteen verkko-opetuksesta? Tutkimuksessa havaittiin, että tietokoneiden riittämätön määrä ja puuttuminen aineluokasta vaikeuttivat maantieteen verkko-opetusta. Työssä kehitettiin opettajien digitaalisten mediataitojen kuutiomalli, johon kuuluvat tekniset taidot, informaation prosessointitaidot ja viestintätaidot. Opettajissa erotettiin kolme verkko-opetuksen käyttäjätyyppiä: informaatiohakuiset kevytkäyttäjät, viestintähakuiset peruskäyttäjät ja yhteistyöhakuiset tehokäyttäjät. Verkko-opetukseen liittyi intensiivisiä myönteisiä ja kielteisiä kokemuksia. Se toi iloa ja motivaatiota opiskeluun. Sitä pidettiin rikastuttavana lisänä, joka haluttiin integroida opetukseen hallitusti. Edelläkävijäopettajat ottivat käyttöön tietoverkoissa olevaa informaatiota ja sovelsivat työvälineohjelmia. He pääsivät alkuun todellisuutta jäljittelevien virtuaalimaailmojen: satelliittikuvien toistaman maapallon, digitaalikarttojen ja simulaatioiden käytössä. Opettajat kokeilivat verkon sosiaalisia tiloja reaaliaikaisen viestinnän, keskusteluryhmien ja ryhmätyöohjelmien avulla. Mielikuvitukseen perustuvat virtuaalimaailmat jäivät vähälle sillä opettajat eivät juuri pelanneet viihdepelejä. He omaksuivat virtuaalimaailmoista satunnaisia palasia käytettävissä olevan laite- ja ohjelmavarustuksen mukaan. Virtuaalimaailmojen valtaus eteni tutkimuksen aikana digitaalisen informaation hyödyntämisestä viestintäsovelluksiin ja aloittelevaan yhteistyöhön. Näin opettajat laajensivat virtuaalireviiriään tietoverkkojen dynaamisiksi toimijoiksi ja pääsivät uusin keinoin tyydyttämään ihmisen universaalia tarvetta yhteyteen muiden kanssa. Samalla opettajat valtautuivat informaation kuluttajista sen tuottajiksi, objekteista subjekteiksi. Verkko-opetus avaa koulun maantieteelle huomattavia mahdollisuuksia. Mobiililaitteiden avulla informaatiota voidaan kerätä ja tallentaa maasto-olosuhteissa, ohjelmilla sitä voidaan muuntaa muodosta toiseen. Internetin autenttiset ja ajantasaiset materiaalit tuovat opiskeluun konkretiaa ja kiinnostavuutta, mallit, simulaatiot ja paikkatieto havainnollistavat ilmiöitä. Viestintä- ja yhteistyövälineet sekä sosiaaliset informaatiotilat vahvistavat yhteistyötä. Avainsanat: verkko-opetus, internet, virtuaalimaailmat, maantiede, innovaatiot
Resumo:
The ever expanding growth of the wireless access to the Internet in recent years has led to the proliferation of wireless and mobile devices to connect to the Internet. This has created the possibility of mobile devices equipped with multiple radio interfaces to connect to the Internet using any of several wireless access network technologies such as GPRS, WLAN and WiMAX in order to get the connectivity best suited for the application. These access networks are highly heterogeneous and they vary widely in their characteristics such as bandwidth, propagation delay and geographical coverage. The mechanism by which a mobile device switches between these access networks during an ongoing connection is referred to as vertical handoff and it often results in an abrupt and significant change in the access link characteristics. The most common Internet applications such as Web browsing and e-mail make use of the Transmission Control Protocol (TCP) as their transport protocol and the behaviour of TCP depends on the end-to-end path characteristics such as bandwidth and round-trip time (RTT). As the wireless access link is most likely the bottleneck of a TCP end-to-end path, the abrupt changes in the link characteristics due to a vertical handoff may affect TCP behaviour adversely degrading the performance of the application. The focus of this thesis is to study the effect of a vertical handoff on TCP behaviour and to propose algorithms that improve the handoff behaviour of TCP using cross-layer information about the changes in the access link characteristics. We begin this study by identifying the various problems of TCP due to a vertical handoff based on extensive simulation experiments. We use this study as a basis to develop cross-layer assisted TCP algorithms in handoff scenarios involving GPRS and WLAN access networks. We then extend the scope of the study by developing cross-layer assisted TCP algorithms in a broader context applicable to a wide range of bandwidth and delay changes during a handoff. And finally, the algorithms developed here are shown to be easily extendable to the multiple-TCP flow scenario. We evaluate the proposed algorithms by comparison with standard TCP (TCP SACK) and show that the proposed algorithms are effective in improving TCP behavior in vertical handoff involving a wide range of bandwidth and delay of the access networks. Our algorithms are easy to implement in real systems and they involve modifications to the TCP sender algorithm only. The proposed algorithms are conservative in nature and they do not adversely affect the performance of TCP in the absence of cross-layer information.
Resumo:
In recent years, XML has been widely adopted as a universal format for structured data. A variety of XML-based systems have emerged, most prominently SOAP for Web services, XMPP for instant messaging, and RSS and Atom for content syndication. This popularity is helped by the excellent support for XML processing in many programming languages and by the variety of XML-based technologies for more complex needs of applications. Concurrently with this rise of XML, there has also been a qualitative expansion of the Internet's scope. Namely, mobile devices are becoming capable enough to be full-fledged members of various distributed systems. Such devices are battery-powered, their network connections are based on wireless technologies, and their processing capabilities are typically much lower than those of stationary computers. This dissertation presents work performed to try to reconcile these two developments. XML as a highly redundant text-based format is not obviously suitable for mobile devices that need to avoid extraneous processing and communication. Furthermore, the protocols and systems commonly used in XML messaging are often designed for fixed networks and may make assumptions that do not hold in wireless environments. This work identifies four areas of improvement in XML messaging systems: the programming interfaces to the system itself and to XML processing, the serialization format used for the messages, and the protocol used to transmit the messages. We show a complete system that improves the overall performance of XML messaging through consideration of these areas. The work is centered on actually implementing the proposals in a form usable on real mobile devices. The experimentation is performed on actual devices and real networks using the messaging system implemented as a part of this work. The experimentation is extensive and, due to using several different devices, also provides a glimpse of what the performance of these systems may look like in the future.
Resumo:
In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.
Resumo:
Wireless network access is gaining increased heterogeneity in terms of the types of IP capable access technologies. The access network heterogeneity is an outcome of incremental and evolutionary approach of building new infrastructure. The recent success of multi-radio terminals drives both building a new infrastructure and implicit deployment of heterogeneous access networks. Typically there is no economical reason to replace the existing infrastructure when building a new one. The gradual migration phase usually takes several years. IP-based mobility across different access networks may involve both horizontal and vertical handovers. Depending on the networking environment, the mobile terminal may be attached to the network through multiple access technologies. Consequently, the terminal may send and receive packets through multiple networks simultaneously. This dissertation addresses the introduction of IP Mobility paradigm into the existing mobile operator network infrastructure that have not originally been designed for multi-access and IP Mobility. We propose a model for the future wireless networking and roaming architecture that does not require revolutionary technology changes and can be deployed without unnecessary complexity. The model proposes a clear separation of operator roles: (i) access operator, (ii) service operator, and (iii) inter-connection and roaming provider. The separation allows each type of an operator to have their own development path and business models without artificial bindings with each other. We also propose minimum requirements for the new model. We present the state of the art of IP Mobility. We also present results of standardization efforts in IP-based wireless architectures. Finally, we present experimentation results of IP-level mobility in various wireless operator deployments.
Resumo:
Wireless technologies are continuously evolving. Second generation cellular networks have gained worldwide acceptance. Wireless LANs are commonly deployed in corporations or university campuses, and their diffusion in public hotspots is growing. Third generation cellular systems are yet to affirm everywhere; still, there is an impressive amount of research ongoing for deploying beyond 3G systems. These new wireless technologies combine the characteristics of WLAN based and cellular networks to provide increased bandwidth. The common direction where all the efforts in wireless technologies are headed is towards an IP-based communication. Telephony services have been the killer application for cellular systems; their evolution to packet-switched networks is a natural path. Effective IP telephony signaling protocols, such as the Session Initiation Protocol (SIP) and the H 323 protocol are needed to establish IP-based telephony sessions. However, IP telephony is just one service example of IP-based communication. IP-based multimedia sessions are expected to become popular and offer a wider range of communication capabilities than pure telephony. In order to conjoin the advances of the future wireless technologies with the potential of IP-based multimedia communication, the next step would be to obtain ubiquitous communication capabilities. According to this vision, people must be able to communicate also when no support from an infrastructured network is available, needed or desired. In order to achieve ubiquitous communication, end devices must integrate all the capabilities necessary for IP-based distributed and decentralized communication. Such capabilities are currently missing. For example, it is not possible to utilize native IP telephony signaling protocols in a totally decentralized way. This dissertation presents a solution for deploying the SIP protocol in a decentralized fashion without support of infrastructure servers. The proposed solution is mainly designed to fit the needs of decentralized mobile environments, and can be applied to small scale ad-hoc networks or also bigger networks with hundreds of nodes. A framework allowing discovery of SIP users in ad-hoc networks and the establishment of SIP sessions among them, in a fully distributed and secure way, is described and evaluated. Security support allows ad-hoc users to authenticate the sender of a message, and to verify the integrity of a received message. The distributed session management framework has been extended in order to achieve interoperability with the Internet, and the native Internet applications. With limited extensions to the SIP protocol, we have designed and experimentally validated a SIP gateway allowing SIP signaling between ad-hoc networks with private addressing space and native SIP applications in the Internet. The design is completed by an application level relay that permits instant messaging sessions to be established in heterogeneous environments. The resulting framework constitutes a flexible and effective approach for the pervasive deployment of real time applications.
Resumo:
The TCP protocol is used by most Internet applications today, including the recent mobile wireless terminals that use TCP for their World-Wide Web, E-mail and other traffic. The recent wireless network technologies, such as GPRS, are known to cause delay spikes in packet transfer. This causes unnecessary TCP retransmission timeouts. This dissertation proposes a mechanism, Forward RTO-Recovery (F-RTO) for detecting the unnecessary TCP retransmission timeouts and thus allow TCP to take appropriate follow-up actions. We analyze a Linux F-RTO implementation in various network scenarios and investigate different alternatives to the basic algorithm. The second part of this dissertation is focused on quickly adapting the TCP's transmission rate when the underlying link characteristics change suddenly. This can happen, for example, due to vertical hand-offs between GPRS and WLAN wireless technologies. We investigate the Quick-Start algorithm that, in collaboration with the network routers, aims to quickly probe the available bandwidth on a network path, and allow TCP's congestion control algorithms to use that information. By extensive simulations we study the different router algorithms and parameters for Quick-Start, and discuss the challenges Quick-Start faces in the current Internet. We also study the performance of Quick-Start when applied to vertical hand-offs between different wireless link technologies.
Resumo:
Mobile RFID services for the Internet of Things can be created by using RFID as an enabling technology in mobile devices. Humans, devices, and things are the content providers and users of these services. Mobile RFID services can be either provided on mobile devices as stand-alone services or combined with end-to-end systems. When different service solution scenarios are considered, there are more than one possible architectural solution in the network, mobile, and back-end server areas. Combining the solutions wisely by applying the software architecture and engineering principles, a combined solution can be formulated for certain application specific use cases. This thesis illustrates these ideas. It also shows how generally the solutions can be used in real world use case scenarios. A case study is used to add further evidence.
Resumo:
With the proliferation of wireless and mobile devices equipped with multiple radio interfaces to connect to the Internet, vertical handoff involving different wireless access technologies will enable users to get the best of connectivity and service quality during the lifetime of a TCP connection. A vertical handoff may introduce an abrupt, significant change in the access link characteristics and as a result the end-to-end path characteristics such as the bandwidth and the round-trip time (RTT) of a TCP connection may change considerably. TCP may take several RTTs to adapt to these changes in path characteristics and during this interval there may be packet losses and / or inefficient utilization of the available bandwidth. In this thesis we study the behaviour and performance of TCP in the presence of a vertical handoff. We identify the different handoff scenarios that adversely affect TCP performance. We propose several enhancements to the TCP sender algorithm that are specific to the different handoff scenarios to adapt TCP better to a vertical handoff. Our algorithms are conservative in nature and make use of cross-layer information obtained from the lower layers regarding the characteristics of the access links involved in a handoff. We evaluate the proposed algorithms by extensive simulation of the various handoff scenarios involving access links with a wide range of bandwidth and delay. We show that the proposed algorithms are effective in improving the TCP behaviour in various handoff scenarios and do not adversely affect the performance of TCP in the absence of cross-layer information.
Resumo:
This work combines the cognitive theory of folk-theoretical thought with the classical Aristotelian theory of artistic proof in rhetoric. The first half of the work discusses the common ground shared by the elements of artistic proof (logos, pathos, ethos) and the elements of folk-theoretical thought (naïve physics, folk biology, folk psychology, naïve sociology). Combining rhetoric with the cognitive theory of folk-theoretical thought creates a new point of view for argumentation analysis. The logos of an argument can be understood as the inferential relations established between the different parts of an argument. Consequently, within this study the analysis of logos is to be viewed as the analysis of the inferential folk-theoretical elements that make the suggested factual states-of-things appear plausible within given argumentative structures. The pathos of an argumentative structure can be understood as determining the quality of the argumentation in question in the sense that emotive elements play a great part in what can be called a distinction between good and deceptive rhetoric. In the context of this study the analysis of pathos is to be viewed as the analysis of the emotive content of argumentative structures and of whether they aim at facilitating surface- or deep cognitive elaboration of the suggested matters. The ethos of an argumentative structure means both the speaker-presentation and audience-construct that can be discerned within a body of argumentation. In the context of this study, the analysis of ethos is to be understood as the analysis of mutually manifest cognitive environments in the context of argumentation. The theory is used to analyse Catholic Internet discussion concerning cloning. The discussion is divided into six themes: Human Dignity, Sacred Family, Exploitation / Dehumanisation, Playing God, Monsters and Horror Scenarios and Ensoulment. Each theme is analysed for both the rhetorical and the cognitive elements that can be seen creating persuasive force within the argumentative structures presented. It is apparent that the Catholic voices on the Internet extensively oppose cloning. The voices utilise rhetoric that is aggressive and pejorative more often than not. Furthermore, deceptive rhetoric (in the sense presented above) plays a great part in argumentative structures of the Catholic voices. The theory of folk-theoretical thought can be seen as a useful tool for analysing the possible reasons why the Catholic speakers think about cloning and choose to present cloning in their argumentation as they do. The logos utilized in the argumentative structures presented can usually be viewed as based on folk-theoretical inference concerning biology and psychology. The structures of pathos utilized generally appear to aim at generating fear appeal in the assumed audiences, often incorporating counter-intuitive elements. The ethos utilised in the arguments generally revolves around Christian mythology and issues of social responsibility. These structures can also be viewed from the point of view of folk psychology and naïve sociological assumptions.