Bibliography on Videotelephony and Disability 1993-2002
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Fax, Modem, and Text Support Over IP Configuration Guide, Cisco IOS Release 15M&T
Fax, Modem, and Text Support over IP Configuration Guide, Cisco IOS Release 15M&T Last Modified: 2015-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -
The History of the Telephone
STUDENT VERSION THE HISTORY OF THE TELEPHONE Activity Items There are no separate items for this activity. Student Learning Objectives • I will be able to name who invented the telephone and say why that invention is important. • I will be able to explain how phones have changed over time. THE HISTORY OF THE TELEPHONE STUDENT VERSION NAME: DATE: The telephone is one of the most important inventions. It lets people talk to each other at the same time across long distances, changing the way we communicate today. Alexander Graham Bell, the inventor of the telephone CENSUS.GOV/SCHOOLS HISTORY | PAGE 1 THE HISTORY OF THE TELEPHONE STUDENT VERSION 1. Like many inventions, the telephone was likely thought of many years before it was invented, and by many people. But it wasn’t until 1876 when a man named Alexander Graham Bell, pictured on the previous page, patented the telephone and was allowed to start selling it. Can you guess what “patented” means? CENSUS.GOV/SCHOOLS HISTORY | PAGE 2 THE HISTORY OF THE TELEPHONE STUDENT VERSION 2. The picture below, from over 100 years ago, shows Alexander Graham Bell using one of his first telephones to make a call from New York to Chicago. Alexander Graham Bell making a telephone call from New York to Chicago in 1892 Why do you think it was important that someone in New York could use the telephone to talk to someone in Chicago? CENSUS.GOV/SCHOOLS HISTORY | PAGE 3 THE HISTORY OF THE TELEPHONE STUDENT VERSION 3. Today, millions of people make phone calls each day, and many people have a cellphone. -
Fast Detection of Forgery Image Using Discrete Cosine Transform Four Step Search Algorithm
Journal of Korea Multimedia Society Vol. 22, No. 5, May 2019(pp. 527-534) https://doi.org/10.9717/kmms.2019.22.5.527 Fast Detection of Forgery Image using Discrete Cosine Transform Four Step Search Algorithm Yong-Dal Shin†, Yong-Suk Cho†† ABSTRACT Recently, Photo editing softwares such as digital cameras, Paintshop Pro, and Photoshop digital can create counterfeit images easily. Various techniques for detection of tamper images or forgery images have been proposed in the literature. A form of digital forgery is copy-move image forgery. Copy-move is one of the forgeries and is used wherever you need to cover a part of the image to add or remove information. Copy-move image forgery refers to copying a specific area of an image itself and pasting it into another area of the same image. The purpose of copy-move image forgery detection is to detect the same or very similar region image within the original image. In this paper, we proposed fast detection of forgery image using four step search based on discrete cosine transform and a four step search algorithm using discrete cosine transform (FSSDCT). The computational complexity of our algorithm reduced 34.23 % than conventional DCT three step search algorithm (DCTTSS). Key words: Duplicated Forgery Image, Discrete Cosine Transform, Four Step Search Algorithm 1. INTRODUCTION and Fig. 1(b) shows an original image and a copy- moved forged image respectively. Digital cameras and smart phones, and digital J. Fridrich [1] proposed an exacting match image processing software such as Photoshop, method for the forged image detection of a copy- Paintshop Pro, you can duplicate digital counterfeit move forged image. -
TR 102 199 V1.1.1 (2003-10) Technical Report
ETSI TR 102 199 V1.1.1 (2003-10) Technical Report Services and Protocols for Advanced Networks (SPAN); Preliminary analysis of Broadband multimedia services 2 ETSI TR 102 199 V1.1.1 (2003-10) Reference DTR/SPAN-130320 Keywords broadband, multimedia, service ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2003. All rights reserved. -
Offshore Wind Submarine Cabling Overview Fisheries Technical Working Group
OFFSHOREoverview WIND SUBMARINE CABLING Fisheries Technical Working Group Final Report | Report Number 21-14 | April 2021 NYSERDA’s Promise to New Yorkers: NYSERDA provides resources, expertise, and objective information so New Yorkers can make confident, informed energy decisions. Our Vision: New York is a global climate leader building a healthier future with thriving communities; homes and businesses powered by clean energy; and economic opportunities accessible to all New Yorkers. Our Mission: Advance clean energy innovation and investments to combat climate change, improving the health, resiliency, and prosperity of New Yorkers and delivering benefits equitably to all. Courtesy, Equinor, Dudgeon Offshore Wind Farm Offshore Wind Submarine Cabling Overview Fisheries Technical Working Group Final Report Prepared for: New York State Energy Research and Development Authority Albany, NY Morgan Brunbauer Offshore Wind Marine Fisheries Manager Prepared by: Tetra Tech, Inc. Boston, MA Brian Dresser Director of Fisheries Programs NYSERDA Report 21-14 NYSERDA Contract 111608A April 2021 Notice This report was prepared by Tetra Tech, Inc. in the course of performing work contracted for and sponsored by the New York State Energy Research and Development Authority (hereafter “NYSERDA”). The opinions expressed in this report do not necessarily reflect those of NYSERDA or the State of New York, and reference to any specific product, service, process, or method does not constitute an implied or expressed recommendation or endorsement of it. Further, NYSERDA, the State of New York, and the contractor make no warranties or representations, expressed or implied, as to the fitness for particular purpose or merchantability of any product, apparatus, or service, or the usefulness, completeness, or accuracy of any processes, methods, or other information contained, described, disclosed, or referred to in this report. -
TELEPHONE TRAINING GUIDE] Fall 2010
[TELEPHONE TRAINING GUIDE] Fall 2010 Telephone Training Guide Multi Button and Single Line Telephones Office of Information Technology, - UC Irvine 1 | Page [TELEPHONE TRAINING GUIDE] Fall 2010 Personal Profile (optional) ........................................... 10 Group Pickup (optional) ............................................... 10 Table of Contents Abbreviated Dialing (optional) ..................................... 10 Multi-Button Telephone General Description Automatic Call-Back ..................................................... 10 ....................................................................................... 3 Call Waiting .................................................................. 10 Keys and Buttons ............................................................ 3 Campus Dialing Instructions ............................ 11 Standard Preset Function Buttons .................................. 3 Emergency 911 ............................................................. 11 Sending Tones (TONE) .................................................... 4 Multi-Button Telephone Operations ................ 4 Answering Calls ............................................................... 4 Placing Calls .................................................................... 4 Transferring Calls ............................................................ 4 Inquiry Calls .................................................................... 4 Exclusive Hold ................................................................. 4 -
GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms
GLOSSARY of Telecommunications Terms List of Abbreviations for Telecommunications Terms AAL – ATM Adaptation Layer ADPCM – Adaptive Differential Pulse Code Modulation ADSL – Asymmetric Digital Subscriber Line AIN – Advanced Intelligent Network ALI – Automatic Location Information AMA - Automatic Message Accounting ANI – Automatic Number Identification ANSI –American National Standards Institute API – Applications Programming Interface ATM – Asychronous Transfer Mode BHCA – Busy Hour Call Attempts BHCC – Busy Hour Call Completions B-ISDN – Broadband Integrated Services Digital Network B-ISUP – Broadband ISDN User’s Part BLV – Busy Line Verification BNS – Billed Number Screening BRI – Basic Rate Interface CAC – Carrier Access Code CCS – Centi Call Seconds CCV – Calling Card Validation CDR – Call Detail Record CIC – Circuit Identification Code CLASS – Custom Local Area Signaling CLEC – Competitive Local Exchange Carrier CO – Central Office CPE – Customer Provided/Premise Equipment CPN – Called Party Number CTI – Computer Telephony Intergration DLC – Digital Loop Carrier System DN – Directory Number DSL – Digital Subscriber Line DSLAM – Digital Subscriber Line Access Multiplexer DSP – Digital Signal Processor DTMF – Dual Tone Multi-Frequency ESS – Electronic Switching System ETSI - European Telecommunications Standards Institute GAP – Generic Address Parameter GT – Global Title GTT – Global Title Translations HFC – Hybrid Fiber Coax IAD – Integrated Access Device IAM – Initial Address Message ICP – Integrated Communications Provider ILEC -
Fast Cosine Transform to Increase Speed-Up and Efficiency of Karhunen-Loève Transform for Lossy Image Compression
Fast Cosine Transform to increase speed-up and efficiency of Karhunen-Loève Transform for lossy image compression Mario Mastriani, and Juliana Gambini Several authors have tried to combine the DCT with the Abstract —In this work, we present a comparison between two KLT but with questionable success [1], with particular interest techniques of image compression. In the first case, the image is to multispectral imagery [30, 32, 34]. divided in blocks which are collected according to zig-zag scan. In In all cases, the KLT is used to decorrelate in the spectral the second one, we apply the Fast Cosine Transform to the image, domain. All images are first decomposed into blocks, and each and then the transformed image is divided in blocks which are collected according to zig-zag scan too. Later, in both cases, the block uses its own KLT instead of one single matrix for the Karhunen-Loève transform is applied to mentioned blocks. On the whole image. In this paper, we use the KLT for a decorrelation other hand, we present three new metrics based on eigenvalues for a between sub-blocks resulting of the applications of a DCT better comparative evaluation of the techniques. Simulations show with zig-zag scan, that is to say, in the spectral domain. that the combined version is the best, with minor Mean Absolute We introduce in this paper an appropriate sequence, Error (MAE) and Mean Squared Error (MSE), higher Peak Signal to decorrelating first the data in the spatial domain using the DCT Noise Ratio (PSNR) and better image quality. -
Guidelines on Mobile Device Forensics
NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Sam Brothers Wayne Jansen http://dx.doi.org/10.6028/NIST.SP.800-101r1 NIST Special Publication 800-101 Revision 1 Guidelines on Mobile Device Forensics Rick Ayers Software and Systems Division Information Technology Laboratory Sam Brothers U.S. Customs and Border Protection Department of Homeland Security Springfield, VA Wayne Jansen Booz-Allen-Hamilton McLean, VA http://dx.doi.org/10.6028/NIST.SP. 800-101r1 May 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A- 130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A- 130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority. -
FCC Approves Eighth Set of COVID-19 Telehealth Program
-- Media Contact: Katie Gorscak, (202) 418-2156 [email protected] For Immediate Release FCC APPROVES EIGHTH SET OF COVID-19 TELEHEALTH PROGRAM APPLICATIONS Commission Continues Approving Telehealth Funding During Coronavirus Pandemic -- WASHINGTON, May 28, 2020—The Federal Communications Commission’s Wireline Competition Bureau today approved an additional 53 funding applications for the COVID-19 Telehealth Program. Health care providers in both urban and rural areas of the country will use this $18.22 million in funding to provide telehealth services during the coronavirus pandemic. To date, the FCC’s COVID-19 Telehealth Program, which was authorized by the CARES Act, has approved funding for 185 health care providers in 38 states plus Washington, DC for a total of $68.22 million in funding. Below is a list of health care providers that were approved for funding: AccessHealth, in Richmond, Texas, was awarded $439,286 for telehealth carts and network upgrades to increase clinical capacity and prevent further community spread of COVID-19 by treating primary care patients remotely for COVID-19, diabetes, hypertension, asthma, and other diseases and illnesses. The Arc Madison Cortland, in Oneida, New York, was awarded $49,455 for laptop computers and headsets to provide remote consultations and treatment during the COVID-19 pandemic for psychological services, counseling, and occupational and physical therapy for people with developmental and other disabilities. Bridge Counseling Associates, in Las Vegas, Nevada, was awarded $91,460 for laptops, cameras, telehealth equipment, internet service, and software licenses to significantly expand telehealth capabilities during the COVID-19 emergency and continue to provide mental health and substance abuse treatment, psychiatric care, and medical wellness services, including for persons who currently have, or are recovering from, COVID-19. -
Get the Facts About Telehealth
Get the Facts About Telehealth The COVID-19 pandemic has demonstrated that telehealth is a viable option for providing convenient, accessible and seamless care for patients. Myth #1: FACT: Data shows older patients are very comfortable with telehealth. Telehealth is In a survey conducted by Sutter Health, disease. More than 20% of Tera patients less feasible 52% of people aged 65 and older are aged 65 and above, allowing us reported having used telehealth during to quickly learn that telemedicine is for senior the pandemic and 93% of these patients welcome across any age range, disease citizens. reported having a positive experience. state and socioeconomic group. The key In addition, Sutter’s Tera Practice, factor for acceptance came down to a virtual-first medical practice that individuals experiencing firsthand Tera’s offers a whole ecosystem of healthcare convenience and responsiveness, and the support, has purposefully enrolled rapport they were able to build with their seniors who have at least one chronic personal care team virtually. OF SENIORS WHO USED TELEHEALTH 93% REPORTED A POSITIVE EXPERIENCE FACT: While more work needs to be done, Myth #2: telehealth is already improving critical access to care in rural and underserved communities. Telehealth Additional investments in technology, broadband and access are will amplify necessary to prevent the deepening of inequities and ensuring health widespread availability. Providers and policymakers must continue to work together to ensure the benefits of virtual care extend to our inequities. most vulnerable patients and that no community is left behind. Sutter serves millions of Medi-Cal patients in Northern California so this is a priority for our system. -
Telehealth Transformation: COVID-19 and the Rise of Virtual Care
Journal of the American Medical Informatics Association, 0(0), 2020, 1–6 doi: 10.1093/jamia/ocaa067 Perspective Perspective Downloaded from https://academic.oup.com/jamia/advance-article-abstract/doi/10.1093/jamia/ocaa067/5822868 by guest on 01 June 2020 Telehealth transformation: COVID-19 and the rise of virtual care Jedrek Wosik,1 Marat Fudim,1 Blake Cameron,2 Ziad F. Gellad,3,4 Alex Cho,5 Donna Phinney,6 Simon Curtis,7 Matthew Roman,6,8 Eric G. Poon ,5,6 Jeffrey Ferranti,6,8,9 Jason N. Katz,1 and James Tcheng1 1Division of Cardiology, Department of Medicine, Duke University School of Medicine, Durham, North Carolina, USA, 2Division of Nephrology, Department of Medicine, Duke University School of Medicine, Durham, North Carolina, USA, 3Division of Gastroen- terology, Department of Medicine, Duke University School of Medicine, Durham, North Carolina, USA, 4Center for Health Services Research in Primary Care, Durham VA Medical Center, Durham, North Carolina, USA, 5Division of General Internal Medicine, De- partment of Medicine, Duke University School of Medicine, Durham, North Carolina, USA, 6Duke Network Services, Duke Univer- sity Health System, Durham, North Carolina, USA, 7Private Diagnostic Clinic, Duke Health Access Center, Durham, North Carolina, USA, 8Duke Health Technology Solutions, Durham, North Carolina, USA and 9Department of Pediatrics, Duke University School of Medicine, Durham, North Carolina, USA Corresponding Author: Jedrek Wosik, MD, Division of Cardiology, Department of Medicine and Division of Cardiology, Duke University School of Medicine, 2301 Erwin Road, Durham, NC, USA; [email protected] Received 14 April 2020; Editorial Decision 15 April 2020; Accepted 17 April 2020 ABSTRACT The novel coronavirus disease-19 (COVID-19) pandemic has altered our economy, society, and healthcare system.