WorldWideScience

Sample records for active virtual network

  1. Game-Based Virtual Worlds as Decentralized Virtual Activity Systems

    Science.gov (United States)

    Scacchi, Walt

    There is widespread interest in the development and use of decentralized systems and virtual world environments as possible new places for engaging in collaborative work activities. Similarly, there is widespread interest in stimulating new technological innovations that enable people to come together through social networking, file/media sharing, and networked multi-player computer game play. A decentralized virtual activity system (DVAS) is a networked computer supported work/play system whose elements and social activities can be both virtual and decentralized (Scacchi et al. 2008b). Massively multi-player online games (MMOGs) such as World of Warcraft and online virtual worlds such as Second Life are each popular examples of a DVAS. Furthermore, these systems are beginning to be used for research, deve-lopment, and education activities in different science, technology, and engineering domains (Bainbridge 2007, Bohannon et al. 2009; Rieber 2005; Scacchi and Adams 2007; Shaffer 2006), which are also of interest here. This chapter explores two case studies of DVASs developed at the University of California at Irvine that employ game-based virtual worlds to support collaborative work/play activities in different settings. The settings include those that model and simulate practical or imaginative physical worlds in different domains of science, technology, or engineering through alternative virtual worlds where players/workers engage in different kinds of quests or quest-like workflows (Jakobsson 2006).

  2. Organization Virtual or Networked?

    Directory of Open Access Journals (Sweden)

    Rūta Tamošiūnaitė

    2013-08-01

    Full Text Available Purpose—to present distinction between “virtual organization” and “networked organization”; giving their definitions.Design/methodology/approach—review of previous researches, systemic analyses of their findings and synthesis of distinctive characteristics of ”virtual organization” and “networked organization.”Findings—the main result of the research is key diverse features separating ”virtual organization” and ”networked organization.” Definitions of “virtual organization” and “networked organization” are presented.Originality/Value—distinction between “virtual organization” and “networked organization” creates possibilities to use all advantages of those types of organizations and gives foundation for deeper researches in this field.Research type: general review.

  3. Setting up virtual private network

    International Nuclear Information System (INIS)

    Huang Hongmei; Zhang Chengjun

    2003-01-01

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise's network function and enlarges its private scope. The text introduces virtual private network's principal, privileges and protocols that use in virtual private network. At last, this paper introduces several setting up virtual private network's technologies which based on LAN

  4. Setting up virtual private network

    International Nuclear Information System (INIS)

    Huang Hongmei; Zhang Chengjun

    2003-01-01

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise network function and enlarges its private scope. This text introduces virtual private network principal, privileges and protocols applied in virtual private network. At last, this paper introduces several setting up virtual private network technologies which is based on LAN

  5. Virtual Networking Performance in OpenStack Platform for Network Function Virtualization

    Directory of Open Access Journals (Sweden)

    Franco Callegati

    2016-01-01

    Full Text Available The emerging Network Function Virtualization (NFV paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.

  6. Virtualized Networks and Virtualized Optical Line Terminal (vOLT)

    Science.gov (United States)

    Ma, Jonathan; Israel, Stephen

    2017-03-01

    The success of the Internet and the proliferation of the Internet of Things (IoT) devices is forcing telecommunications carriers to re-architecture a central office as a datacenter (CORD) so as to bring the datacenter economics and cloud agility to a central office (CO). The Open Network Operating System (ONOS) is the first open-source software-defined network (SDN) operating system which is capable of managing and controlling network, computing, and storage resources to support CORD infrastructure and network virtualization. The virtualized Optical Line Termination (vOLT) is one of the key components in such virtualized networks.

  7. Optimizing Virtual Network Functions Placement in Virtual Data Center Infrastructure Using Machine Learning

    Science.gov (United States)

    Bolodurina, I. P.; Parfenov, D. I.

    2018-01-01

    We have elaborated a neural network model of virtual network flow identification based on the statistical properties of flows circulating in the network of the data center and characteristics that describe the content of packets transmitted through network objects. This enabled us to establish the optimal set of attributes to identify virtual network functions. We have established an algorithm for optimizing the placement of virtual data functions using the data obtained in our research. Our approach uses a hybrid method of visualization using virtual machines and containers, which enables to reduce the infrastructure load and the response time in the network of the virtual data center. The algorithmic solution is based on neural networks, which enables to scale it at any number of the network function copies.

  8. Virtualized Network Control. Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-02-01

    This document is the final report for the Virtualized Network Control (VNC) project, which was funded by the United States Department of Energy (DOE) Office of Science. This project was also informally referred to as Advanced Resource Computation for Hybrid Service and TOpology NEtworks (ARCHSTONE). This report provides a summary of the project's activities, tasks, deliverable, and accomplishments. It also provides a summary of the documents, software, and presentations generated as part of this projects activities. Namely, the Appendix contains an archive of the deliverables, documents, and presentations generated a part of this project.

  9. Ecological network analysis for a virtual water network.

    Science.gov (United States)

    Fang, Delin; Chen, Bin

    2015-06-02

    The notions of virtual water flows provide important indicators to manifest the water consumption and allocation between different sectors via product transactions. However, the configuration of virtual water network (VWN) still needs further investigation to identify the water interdependency among different sectors as well as the network efficiency and stability in a socio-economic system. Ecological network analysis is chosen as a useful tool to examine the structure and function of VWN and the interactions among its sectors. A balance analysis of efficiency and redundancy is also conducted to describe the robustness (RVWN) of VWN. Then, network control analysis and network utility analysis are performed to investigate the dominant sectors and pathways for virtual water circulation and the mutual relationships between pairwise sectors. A case study of the Heihe River Basin in China shows that the balance between efficiency and redundancy is situated on the left side of the robustness curve with less efficiency and higher redundancy. The forestation, herding and fishing sectors and industrial sectors are found to be the main controllers. The network tends to be more mutualistic and synergic, though some competitive relationships that weaken the virtual water circulation still exist.

  10. Network function virtualization concepts and applicability in 5G networks

    CERN Document Server

    Zhang, Ying

    2018-01-01

    A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. Network Function Virtualization: Concepts and Applicability in 5G Networks reviews new technologies that enable NFV, such as Software Defined Networks (SDN), network virtualization, and cloud computing. It also provides an in-depth investigation of the most advanced open source initiatives in this area, including OPNFV, Openstack, and Opendaylight. Finally, this book goes beyond li...

  11. Energy-aware virtual network embedding in flexi-grid networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng

    2017-11-27

    Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.

  12. Energy-aware virtual network embedding in flexi-grid optical networks

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin

    2018-01-01

    Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.

  13. To trade or not to trade: Link prediction in the virtual water network

    Science.gov (United States)

    Tuninetti, Marta; Tamea, Stefania; Laio, Francesco; Ridolfi, Luca

    2017-12-01

    In the international trade network, links express the (temporary) presence of a commercial exchange of goods between any two countries. Given the dynamical behaviour of the trade network, where links are created and dismissed every year, predicting the link activation/deactivation is an open research question. Through the international trade network of agricultural goods, water resources are 'virtually' transferred from the country of production to the country of consumption. We propose a novel methodology for link prediction applied to the network of virtual water trade. Starting from the assumption of having links between any two countries, we estimate the associated virtual water flows by means of a gravity-law model using country and link characteristics as drivers. We consider the links with estimated flows higher than 1000 m3/year as active links, while the others as non-active links. Flows traded along estimated active links are then re-estimated using a similar but differently-calibrated gravity-law model. We were able to correctly model 84% of the existing links and 93% of the non-existing links in year 2011. It is worth to note that the predicted active links carry 99% of the global virtual water flow; hence, missed links are mainly those where a minimum volume of virtual water is exchanged. Results indicate that, over the period from 1986 to 2011, population, geographical distances between countries, and agricultural efficiency (through fertilizers use) are the major factors driving the link activation and deactivation. As opposed to other (network-based) models for link prediction, the proposed method is able to reconstruct the network architecture without any prior knowledge of the network topology, using only the nodes and links attributes; it thus represents a general method that can be applied to other networks such as food or value trade networks.

  14. Virtual network embedding in cross-domain network based on topology and resource attributes

    Science.gov (United States)

    Zhu, Lei; Zhang, Zhizhong; Feng, Linlin; Liu, Lilan

    2018-03-01

    Aiming at the network architecture ossification and the diversity of access technologies issues, this paper researches the cross-domain virtual network embedding algorithm. By analysing the topological attribute from the local and global perspective of nodes in the virtual network and the physical network, combined with the local network resource property, we rank the embedding priority of the nodes with PCA and TOPSIS methods. Besides, the link load distribution is considered. Above all, We proposed an cross-domain virtual network embedding algorithm based on topology and resource attributes. The simulation results depicts that our algorithm increases the acceptance rate of multi-domain virtual network requests, compared with the existing virtual network embedding algorithm.

  15. Modelling of virtual production networks

    Directory of Open Access Journals (Sweden)

    2011-03-01

    Full Text Available Nowadays many companies, especially small and medium-sized enterprises (SMEs, specialize in a limited field of production. It requires forming virtual production networks of cooperating enterprises to manufacture better, faster and cheaper. Apart from that, some production orders cannot be realized, because there is not a company of sufficient production potential. In this case the virtual production networks of cooperating companies can realize these production orders. These networks have larger production capacity and many different resources. Therefore it can realize many more production orders together than each of them separately. Such organization allows for executing high quality product. The maintenance costs of production capacity and used resources are not so high. In this paper a methodology of rapid prototyping of virtual production networks is proposed. It allows to execute production orders on time considered existing logistic constraints.

  16. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  17. Virtual Organizations: Beyond Network Organization

    Directory of Open Access Journals (Sweden)

    Liviu Gabriel CRETU

    2006-01-01

    Full Text Available One of the most used buzz-words in (e-business literature of the last decade is virtual organization. The term "virtual" can be identified in all sorts of combinations regarding the business world. From virtual products to virtual processes or virtual teams, everything that is “touched” by the computer’s processing power instantly becomes virtual. Moreover, most of the literature treats virtual and network organizations as being synonyms. This paper aims to draw a much more distinctive line between the two concepts. Providing a more coherent description of what virtual organization might be is also one of our intentions.

  18. Virtual Stationary Automata for Mobile Networks

    National Research Council Canada - National Science Library

    Dolev, Shlomi; Gilbert, Seth; Lahiani, Limor; Lynch, Nancy; Nolte, Tina

    2005-01-01

    We define a programming abstraction for mobile networks called the Virtual Stationary Automata programming layer, consisting of real mobile clients, virtual timed I/O automata called virtual stationary automata (VSAs...

  19. A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Barbara Martini

    2016-06-01

    Full Text Available Emerging technologies such as Software-Defined Networks (SDN and Network Function Virtualization (NFV promise to address cost reduction and flexibility in network operation while enabling innovative network service delivery models. However, operational network service delivery solutions still need to be developed that actually exploit these technologies, especially at the multi-provider level. Indeed, the implementation of network functions as software running over a virtualized infrastructure and provisioned on a service basis let one envisage an ecosystem of network services that are dynamically and flexibly assembled by orchestrating Virtual Network Functions even across different provider domains, thereby coping with changeable user and service requirements and context conditions. In this paper we propose an approach that adopts Service-Oriented Architecture (SOA technology-agnostic architectural guidelines in the design of a solution for orchestrating and dynamically chaining Virtual Network Functions. We discuss how SOA, NFV, and SDN may complement each other in realizing dynamic network function chaining through service composition specification, service selection, service delivery, and placement tasks. Then, we describe the architecture of a SOA-inspired NFV orchestrator, which leverages SDN-based network control capabilities to address an effective delivery of elastic chains of Virtual Network Functions. Preliminary results of prototype implementation and testing activities are also presented. The benefits for Network Service Providers are also described that derive from the adaptive network service provisioning in a multi-provider environment through the orchestration of computing and networking services to provide end users with an enhanced service experience.

  20. VNML: Virtualized Network Management Laboratory for Educational ...

    African Journals Online (AJOL)

    VNML: Virtualized Network Management Laboratory for Educational Purposes. ... Journal of Fundamental and Applied Sciences ... In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college ...

  1. Topological Embedding Feature Based Resource Allocation in Network Virtualization

    Directory of Open Access Journals (Sweden)

    Hongyan Cui

    2014-01-01

    Full Text Available Virtualization provides a powerful way to run multiple virtual networks on a shared substrate network, which needs accurate and efficient mathematical models. Virtual network embedding is a challenge in network virtualization. In this paper, considering the degree of convergence when mapping a virtual network onto substrate network, we propose a new embedding algorithm based on topology mapping convergence-degree. Convergence-degree means the adjacent degree of virtual network’s nodes when they are mapped onto a substrate network. The contributions of our method are as below. Firstly, we map virtual nodes onto the substrate nodes with the maximum convergence-degree. The simulation results show that our proposed algorithm largely enhances the network utilization efficiency and decreases the complexity of the embedding problem. Secondly, we define the load balance rate to reflect the load balance of substrate links. The simulation results show our proposed algorithm achieves better load balance. Finally, based on the feature of star topology, we further improve our embedding algorithm and make it suitable for application in the star topology. The test result shows it gets better performance than previous works.

  2. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  3. A virtual network computer's optical storage virtualization scheme

    Science.gov (United States)

    Wang, Jianzong; Hu, Huaixiang; Wan, Jiguang; Wang, Peng

    2008-12-01

    In this paper, we present the architecture and implementation of a virtual network computers' (VNC) optical storage virtualization scheme called VOSV. Its task is to manage the mapping of virtual optical storage to physical optical storage, a technique known as optical storage virtualization. The design of VOSV aims at the optical storage resources of different clients and servers that have high read-sharing patterns. VOSV uses several schemes such as a two-level Cache mechanism, a VNC server embedded module and the iSCSI protocols to improve the performance. The results measured on the prototype are encouraging, and indicating that VOSV provides the high I/O performance.

  4. A distributed framework for inter-domain virtual network embedding

    Science.gov (United States)

    Wang, Zihua; Han, Yanni; Lin, Tao; Tang, Hui

    2013-03-01

    Network virtualization has been a promising technology for overcoming the Internet impasse. A main challenge in network virtualization is the efficient assignment of virtual resources. Existing work focused on intra-domain solutions whereas inter-domain situation is more practical in realistic setting. In this paper, we present a distributed inter-domain framework for mapping virtual networks to physical networks which can ameliorate the performance of the virtual network embedding. The distributed framework is based on a Multi-agent approach. A set of messages for information exchange is defined. We design different operations and IPTV use scenarios to validate the advantages of our framework. Use cases shows that our framework can solve the inter-domain problem efficiently.

  5. Resource slicing in virtual wireless networks: a survey

    OpenAIRE

    Richart, Matias; Baliosian De Lazzari, Javier Ernesto; Serrat Fernández, Juan; Gorricho Moreno, Juan Luis

    2016-01-01

    New architectural and design approaches for radio access networks have appeared with the introduction of network virtualization in the wireless domain. One of these approaches splits the wireless network infrastructure into isolated virtual slices under their own management, requirements, and characteristics. Despite the advances in wireless virtualization, there are still many open issues regarding the resource allocation and isolation of wireless slices. Because of the dynamics and share...

  6. Designing communication and remote controlling of virtual instrument network system

    Science.gov (United States)

    Lei, Lin; Wang, Houjun; Zhou, Xue; Zhou, Wenjian

    2005-01-01

    In this paper, a virtual instrument network through the LAN and finally remote control of virtual instruments is realized based on virtual instrument and LabWindows/CVI software platform. The virtual instrument network system is made up of three subsystems. There are server subsystem, telnet client subsystem and local instrument control subsystem. This paper introduced virtual instrument network structure in detail based on LabWindows. Application procedure design of virtual instrument network communication, the Client/the programming mode of the server, remote PC and server communication far realizing, the control power of the workstation is transmitted, server program and so on essential technical were introduced. And virtual instruments network may connect to entire Internet on. Above-mentioned technology, through measuring the application in the electronic measurement virtual instrument network that is already built up, has verified the actual using value of the technology. Experiment and application validate that this design is resultful.

  7. Designing communication and remote controlling of virtual instrument network system

    International Nuclear Information System (INIS)

    Lei Lin; Wang Houjun; Zhou Xue; Zhou Wenjian

    2005-01-01

    In this paper, a virtual instrument network through the LAN and finally remote control of virtual instruments is realized based on virtual instrument and LabWindows/CVI software platform. The virtual instrument network system is made up of three subsystems. There are server subsystem, telnet client subsystem and local instrument control subsystem. This paper introduced virtual instrument network structure in detail based on LabWindows. Application procedure design of virtual instrument network communication, the Client/the programming mode of the server, remote PC and server communication far realizing, the control power of the workstation is transmitted, server program and so on essential technical were introduced. And virtual instruments network may connect to entire Internet on. Above-mentioned technology, through measuring the application in the electronic measurement virtual instrument network that is already built up, has verified the actual using value of the technology. Experiment and application validate that this design is resultful

  8. Performance verification of network function virtualization in software defined optical transport networks

    Science.gov (United States)

    Zhao, Yongli; Hu, Liyazhou; Wang, Wei; Li, Yajie; Zhang, Jie

    2017-01-01

    With the continuous opening of resource acquisition and application, there are a large variety of network hardware appliances deployed as the communication infrastructure. To lunch a new network application always implies to replace the obsolete devices and needs the related space and power to accommodate it, which will increase the energy and capital investment. Network function virtualization1 (NFV) aims to address these problems by consolidating many network equipment onto industry standard elements such as servers, switches and storage. Many types of IT resources have been deployed to run Virtual Network Functions (vNFs), such as virtual switches and routers. Then how to deploy NFV in optical transport networks is a of great importance problem. This paper focuses on this problem, and gives an implementation architecture of NFV-enabled optical transport networks based on Software Defined Optical Networking (SDON) with the procedure of vNFs call and return. Especially, an implementation solution of NFV-enabled optical transport node is designed, and a parallel processing method for NFV-enabled OTN nodes is proposed. To verify the performance of NFV-enabled SDON, the protocol interaction procedures of control function virtualization and node function virtualization are demonstrated on SDON testbed. Finally, the benefits and challenges of the parallel processing method for NFV-enabled OTN nodes are simulated and analyzed.

  9. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    International Nuclear Information System (INIS)

    Vollmer, Todd; Manic, Milos

    2014-01-01

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices

  10. A survey of middleware for sensor and network virtualization.

    Science.gov (United States)

    Khalid, Zubair; Fisal, Norsheila; Rozaini, Mohd

    2014-12-12

    Wireless Sensor Network (WSN) is leading to a new paradigm of Internet of Everything (IoE). WSNs have a wide range of applications but are usually deployed in a particular application. However, the future of WSNs lies in the aggregation and allocation of resources, serving diverse applications. WSN virtualization by the middleware is an emerging concept that enables aggregation of multiple independent heterogeneous devices, networks, radios and software platforms; and enhancing application development. WSN virtualization, middleware can further be categorized into sensor virtualization and network virtualization. Middleware for WSN virtualization poses several challenges like efficient decoupling of networks, devices and software. In this paper efforts have been put forward to bring an overview of the previous and current middleware designs for WSN virtualization, the design goals, software architectures, abstracted services, testbeds and programming techniques. Furthermore, the paper also presents the proposed model, challenges and future opportunities for further research in the middleware designs for WSN virtualization.

  11. A Survey of Middleware for Sensor and Network Virtualization

    Science.gov (United States)

    Khalid, Zubair; Fisal, Norsheila; Rozaini, Mohd.

    2014-01-01

    Wireless Sensor Network (WSN) is leading to a new paradigm of Internet of Everything (IoE). WSNs have a wide range of applications but are usually deployed in a particular application. However, the future of WSNs lies in the aggregation and allocation of resources, serving diverse applications. WSN virtualization by the middleware is an emerging concept that enables aggregation of multiple independent heterogeneous devices, networks, radios and software platforms; and enhancing application development. WSN virtualization, middleware can further be categorized into sensor virtualization and network virtualization. Middleware for WSN virtualization poses several challenges like efficient decoupling of networks, devices and software. In this paper efforts have been put forward to bring an overview of the previous and current middleware designs for WSN virtualization, the design goals, software architectures, abstracted services, testbeds and programming techniques. Furthermore, the paper also presents the proposed model, challenges and future opportunities for further research in the middleware designs for WSN virtualization. PMID:25615737

  12. Virtual Lab for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    PICOVICI, D.

    2008-06-01

    Full Text Available This article details an experimental system developed to enhance the education and research in the area of wireless networks technologies. The system referred, as Virtual Lab (VL is primarily targeting first time users or users with limited experience in programming and using wireless sensor networks. The VL enables a set of predefined sensor networks to be remotely accessible and controlled for constructive and time-efficient experimentation. In order to facilitate the user's wireless sensor applications, the VL is using three main components: a a Virtual Lab Motes (VLM, representing the wireless sensor, b a Virtual Lab Client (VLC, representing the user's tool to interact with the VLM and c a Virtual Lab Server (VLS representing the software link between the VLM and VLC. The concept has been proven using the moteiv produced Tmote Sky modules. Initial experimental use clearly demonstrates that the VL approach reduces dramatically the learning curve involved in programming and using the associated wireless sensor nodes. In addition the VL allows the user's focus to be directed towards the experiment and not towards the software programming challenges.

  13. A User-Customized Virtual Network Platform for NaaS Cloud

    Directory of Open Access Journals (Sweden)

    Lei Xiao

    2016-01-01

    Full Text Available Now all kinds of public cloud providers take computing and storage resources as the user’s main demand, making it difficult for users to deploy complex network in the public cloud. This paper proposes a virtual cloud platform with network as the core demand of the user, which can provide the user with the capacity of free network architecture as well as all kinds of virtual resources. The network is isolated by port groups of the virtual distributed switch and the data forwarding and access control between different network segments are implemented by virtual machines loading a soft-routing system. This paper also studies the management interface of network architecture and the uniform way to connect the remote desktop of virtual resources on the web, hoping to provide some new ideas for the Network as a Service model.

  14. Security for Virtual Private Networks

    OpenAIRE

    Magdalena Nicoleta Iacob

    2015-01-01

    Network security must be a permanent concern for every company, given the fact that threats are evolving today more rapidly than in the past. This paper contains a general classification of cryptographic algorithms used in today networks and presents an implementation of virtual private networks using one of the most secure methods - digital certificates authentication.

  15. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  16. Expanding Usability of Virtual Network Laboratory in IT Engineering Education

    Directory of Open Access Journals (Sweden)

    Dalibor M Dobrilovic

    2013-02-01

    Full Text Available This paper deals with importance of virtual network laboratories usage in IT engineering education. It presents the particular virtual network laboratory model developed for usage in Computer Networks course as well. This virtual network laboratory, called VNLab, is based on virtualization technology. It has been successfully tested in educational process of Computer Network course for IT undergraduate students. Its usability for network related courses is analyzed by comparison of recommended curricula’s of world organizations such as IEEE, ACM and AIS. This paper is focused on expanding the usability of this virtual network laboratory to other non-network related courses. The primary expansion field is in domain of IT System Administration, IT Systems and Data Security and Operating Systems as well. The possible learning scenarios, learning tools and concepts for making this system applicable in these three additional fields are presented by the analyses of compatibility with recommended learning topics and outcomes by IEEE, ACM and AIS.

  17. Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

    Directory of Open Access Journals (Sweden)

    Dongkyun Kim

    2017-12-01

    Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.

  18. PROVISIONING RESTORABLE VIRTUAL PRIVATE NETWORKS USING BARABASI AND WAXMAN TOPOLOGY GENERATION MODEL

    Directory of Open Access Journals (Sweden)

    R. Ravi

    2010-12-01

    Full Text Available As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called “Tunneling”, data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. Our proposed Provisioning Restorable Virtual Private Networks Algorithm (PRA is used to combine the provisioning and restoration algorithms to achieve better results than the ones obtained by independent restoration and provisioning. In order to ensure service quality and availability in Virtual Private Networks, seamless recovery from failures is essential. The quality of service of the Virtual Private Networks is also improved due to the combination of provisioning and restoration. The bandwidth sharing concept is also applied in link to improve the quality of service in the Virtual Private Network. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, the number of VPN nodes, delay, asymmetric ratio and delay with constraints with

  19. Propagation of crises in the virtual water trade network

    Science.gov (United States)

    Tamea, Stefania; Laio, Francesco; Ridolfi, Luca

    2015-04-01

    The international trade of agricultural goods is associated to the displacement of the water used to produce such goods and embedded in trade as a factor of production. Water virtually exchanged from producing to consuming countries, named virtual water, defines flows across an international network of 'virtual water trade' which enable the assessment of environmental forcings and implications of trade, such as global water savings or country dependencies on foreign water resources. Given the recent expansion of commodity (and virtual water) trade, in both displaced volumes and network structure, concerns have been raised about the exposure to crises of individuals and societies. In fact, if one country had to markedly decrease its export following a socio-economical or environmental crisis, such as a war or a drought, many -if not all- countries would be affected due to a cascade effect within the trade network. The present contribution proposes a mechanistic model describing the propagation of a local crisis into the virtual water trade network, accounting for the network structure and the virtual water balance of all countries. The model, built on data-based assumptions, is tested on the real case study of the Argentinean crisis in 2008-09, when the internal agricultural production (measured as virtual water volume) decreased by 26% and the virtual water export of Argentina dropped accordingly. Crisis propagation and effects on the virtual water trade are correctly captured, showing the way forward to investigations of crises impact and country vulnerability based on the results of the model proposed.

  20. Massivizing Networked Virtual Environments on Clouds

    NARCIS (Netherlands)

    Shen, S.

    2015-01-01

    Networked Virtual Environments (NVEs) are virtual environments where physically distributed, Internet-connected users can interact and socialize with others. The most popular NVEs are online games, which have hundreds of millions of users and a global market of tens of billions Euros per year.

  1. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  2. Teaching Network Security in a Virtual Learning Environment

    Science.gov (United States)

    Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik

    2004-01-01

    This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…

  3. Column generation algorithms for virtual network embedding in flexi-grid optical networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Zhou, Jingwei; Wang, Sheng; Chen, Bin; Zhang, Xiaoning; Cai, Anliang; Zhong, Wen-De; Zukerman, Moshe

    2018-04-16

    Network virtualization provides means for efficient management of network resources by embedding multiple virtual networks (VNs) to share efficiently the same substrate network. Such virtual network embedding (VNE) gives rise to a challenging problem of how to optimize resource allocation to VNs and to guarantee their performance requirements. In this paper, we provide VNE algorithms for efficient management of flexi-grid optical networks. We provide an exact algorithm aiming to minimize the total embedding cost in terms of spectrum cost and computation cost for a single VN request. Then, to achieve scalability, we also develop a heuristic algorithm for the same problem. We apply these two algorithms for a dynamic traffic scenario where many VN requests arrive one-by-one. We first demonstrate by simulations for the case of a six-node network that the heuristic algorithm obtains very close blocking probabilities to exact algorithm (about 0.2% higher). Then, for a network of realistic size (namely, USnet) we demonstrate that the blocking probability of our new heuristic algorithm is about one magnitude lower than a simpler heuristic algorithm, which was a component of an earlier published algorithm.

  4. Virtual private network (VPN)

    International Nuclear Information System (INIS)

    Caskey, Susan

    2006-01-01

    A virtual private network (VPN) is the essential security feature that allows remote monitoring systems to take advantage of the low communications cost of the internet. This paper introduces the VPN concept and summarizes the networking and security principles. The mechanics of security, for example, types of encryption and protocols for exchange of keys between partners, are explained. Important issues for partners in different countries include the interoperability and mutual accreditations of systems. (author)

  5. Tensor Network Quantum Virtual Machine (TNQVM)

    Energy Technology Data Exchange (ETDEWEB)

    2016-11-18

    There is a lack of state-of-the-art quantum computing simulation software that scales on heterogeneous systems like Titan. Tensor Network Quantum Virtual Machine (TNQVM) provides a quantum simulator that leverages a distributed network of GPUs to simulate quantum circuits in a manner that leverages recent results from tensor network theory.

  6. A Survey on Virtualization of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ga-Won Lee

    2012-02-01

    Full Text Available Wireless Sensor Networks (WSNs are gaining tremendous importance thanks to their broad range of commercial applications such as in smart home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the specific WSN domains, communication barriers, conflicting goals and the economic interests of different WSN sensor node vendors, it is difficult to introduce a large scale federated WSN. By allowing heterogeneous sensor nodes in WSNs to coexist on a shared physical sensor substrate, virtualization in sensor network may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the large scale federated WSN resources in a sensor virtualization environment. Our focus in this paper is to introduce a few design goals, the challenges and opportunities of research in the field of sensor network virtualization as well as to illustrate a current status of research in this field. This paper also presents a wide array of state-of-the art projects related to sensor network virtualization.

  7. A Survey on Virtualization of Wireless Sensor Networks

    Science.gov (United States)

    Islam, Md. Motaharul; Hassan, Mohammad Mehedi; Lee, Ga-Won; Huh, Eui-Nam

    2012-01-01

    Wireless Sensor Networks (WSNs) are gaining tremendous importance thanks to their broad range of commercial applications such as in smart home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the specific WSN domains, communication barriers, conflicting goals and the economic interests of different WSN sensor node vendors, it is difficult to introduce a large scale federated WSN. By allowing heterogeneous sensor nodes in WSNs to coexist on a shared physical sensor substrate, virtualization in sensor network may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the large scale federated WSN resources in a sensor virtualization environment. Our focus in this paper is to introduce a few design goals, the challenges and opportunities of research in the field of sensor network virtualization as well as to illustrate a current status of research in this field. This paper also presents a wide array of state-of-the art projects related to sensor network virtualization. PMID:22438759

  8. A survey on virtualization of Wireless Sensor Networks.

    Science.gov (United States)

    Islam, Md Motaharul; Hassan, Mohammad Mehedi; Lee, Ga-Won; Huh, Eui-Nam

    2012-01-01

    Wireless Sensor Networks (WSNs) are gaining tremendous importance thanks to their broad range of commercial applications such as in smart home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the specific WSN domains, communication barriers, conflicting goals and the economic interests of different WSN sensor node vendors, it is difficult to introduce a large scale federated WSN. By allowing heterogeneous sensor nodes in WSNs to coexist on a shared physical sensor substrate, virtualization in sensor network may provide flexibility, cost effective solutions, promote diversity, ensure security and increase manageability. This paper surveys the novel approach of using the large scale federated WSN resources in a sensor virtualization environment. Our focus in this paper is to introduce a few design goals, the challenges and opportunities of research in the field of sensor network virtualization as well as to illustrate a current status of research in this field. This paper also presents a wide array of state-of-the art projects related to sensor network virtualization.

  9. Virtual Network Embedding via Monte Carlo Tree Search.

    Science.gov (United States)

    Haeri, Soroush; Trajkovic, Ljiljana

    2018-02-01

    Network virtualization helps overcome shortcomings of the current Internet architecture. The virtualized network architecture enables coexistence of multiple virtual networks (VNs) on an existing physical infrastructure. VN embedding (VNE) problem, which deals with the embedding of VN components onto a physical network, is known to be -hard. In this paper, we propose two VNE algorithms: MaVEn-M and MaVEn-S. MaVEn-M employs the multicommodity flow algorithm for virtual link mapping while MaVEn-S uses the shortest-path algorithm. They formalize the virtual node mapping problem by using the Markov decision process (MDP) framework and devise action policies (node mappings) for the proposed MDP using the Monte Carlo tree search algorithm. Service providers may adjust the execution time of the MaVEn algorithms based on the traffic load of VN requests. The objective of the algorithms is to maximize the profit of infrastructure providers. We develop a discrete event VNE simulator to implement and evaluate performance of MaVEn-M, MaVEn-S, and several recently proposed VNE algorithms. We introduce profitability as a new performance metric that captures both acceptance and revenue to cost ratios. Simulation results show that the proposed algorithms find more profitable solutions than the existing algorithms. Given additional computation time, they further improve embedding solutions.

  10. Cloudified Mobility and Bandwidth Prediction in Virtualized LTE Networks

    NARCIS (Netherlands)

    Zhao, Zongliang; Karimzadeh Motallebi Azar, Morteza; Braun, Torsten; Pras, Aiko; van den Berg, Hans Leo

    Network Function Virtualization involves implementing network functions (e.g., virtualized LTE component) in software that can run on a range of industry standard server hardware, and can be migrated or instantiated on demand. A prediction service hosted on cloud infrastructures enables consumers to

  11. Virtual networks pluralistic approach for the next generation of Internet

    CERN Document Server

    Duarte, Otto Carlos M B

    2013-01-01

    The first chapter of this title concerns virtualization techniques that allow sharing computational resources basically, slicing a real computational environment into virtual computational environments that are isolated from one another.The Xen and OpenFlow virtualization platforms are then presented in Chapter 2 and a performance analysis of both is provided. This chapter also defines the primitives that the network virtualization infrastructure must provide for allowing the piloting plane to manage virtual network elements.Following this, interfaces for system management of the two platform

  12. Server virtualization management of corporate network with hyper-v

    OpenAIRE

    Kovalenko, Taras

    2012-01-01

    On a paper main tasks and problems of server virtualization are considerate. Practical value of virtualization in a corporate network, advantages and disadvantages of application of server virtualization are also considerate.

  13. Virtual terrain: a security-based representation of a computer network

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh; Argauer, Brian

    2008-03-01

    Much research has been put forth towards detection, correlating, and prediction of cyber attacks in recent years. As this set of research progresses, there is an increasing need for contextual information of a computer network to provide an accurate situational assessment. Typical approaches adopt contextual information as needed; yet such ad hoc effort may lead to unnecessary or even conflicting features. The concept of virtual terrain is, therefore, developed and investigated in this work. Virtual terrain is a common representation of crucial information about network vulnerabilities, accessibilities, and criticalities. A virtual terrain model encompasses operating systems, firewall rules, running services, missions, user accounts, and network connectivity. It is defined as connected graphs with arc attributes defining dynamic relationships among vertices modeling network entities, such as services, users, and machines. The virtual terrain representation is designed to allow feasible development and maintenance of the model, as well as efficacy in terms of the use of the model. This paper will describe the considerations in developing the virtual terrain schema, exemplary virtual terrain models, and algorithms utilizing the virtual terrain model for situation and threat assessment.

  14. Modeling virtualized downlink cellular networks with ultra-dense small cells

    KAUST Repository

    Ibrahim, Hazem

    2015-09-11

    The unrelenting increase in the mobile users\\' populations and traffic demand drive cellular network operators to densify their infrastructure. Network densification increases the spatial frequency reuse efficiency while maintaining the signal-to-interference-plus-noise-ratio (SINR) performance, hence, increases the spatial spectral efficiency and improves the overall network performance. However, control signaling in such dense networks consumes considerable bandwidth and limits the densification gain. Radio access network (RAN) virtualization via control plane (C-plane) and user plane (U-plane) splitting has been recently proposed to lighten the control signaling burden and improve the network throughput. In this paper, we present a tractable analytical model for virtualized downlink cellular networks, using tools from stochastic geometry. We then apply the developed modeling framework to obtain design insights for virtualized RANs and quantify associated performance improvement. © 2015 IEEE.

  15. Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation

    Science.gov (United States)

    2015-06-01

    virtualized environment. First, we automatically build topological ground truth according to various network generation models and create emulated Cisco ...to various network generation models and create emulated Cisco router networks by leveraging and modifying existing emulation software. We then au... markets , to verifying compliance with policy, as in recent “network neutrality” rules established in the United States. The Internet is a network of

  16. Developing a Virtual Network of Research Observatories

    Science.gov (United States)

    Hooper, R. P.; Kirschtl, D.

    2008-12-01

    The hydrologic community has been discussing the concept of a network of observatories for the advancement of hydrologic science in areas of scaling processes, in testing generality of hypotheses, and in examining non-linear couplings between hydrologic, biotic, and human systems. The Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) is exploring the formation of a virtual network of observatories, formed from existing field studies without regard to funding source. Such a network would encourage sharing of data, metadata, field methods, and data analysis techniques to enable multidisciplinary synthesis, meta-analysis, and scientific collaboration in hydrologic and environmental science and engineering. The virtual network would strive to provide both the data and the environmental context of the data through advanced cyberinfrastructure support. The foundation for this virtual network is Water Data Services that enable the publication of time-series data collected at fixed points using a services-oriented architecture. These publication services, developed in the CUAHSI Hydrologic Information Systems project, permit the discovery of data from both academic and government sources through a single portal. Additional services under consideration are publication of geospatial data sets, immersive environments based upon site digital elevation models, and a common web portal to member sites populated with structured data about the site (such as land use history and geologic setting) to permit understanding the environmental context of the data being shared.

  17. Evolution of the global virtual water trade network.

    Science.gov (United States)

    Dalin, Carole; Konar, Megan; Hanasaki, Naota; Rinaldo, Andrea; Rodriguez-Iturbe, Ignacio

    2012-04-17

    Global freshwater resources are under increasing pressure from economic development, population growth, and climate change. The international trade of water-intensive products (e.g., agricultural commodities) or virtual water trade has been suggested as a way to save water globally. We focus on the virtual water trade network associated with international food trade built with annual trade data and annual modeled virtual water content. The evolution of this network from 1986 to 2007 is analyzed and linked to trade policies, socioeconomic circumstances, and agricultural efficiency. We find that the number of trade connections and the volume of water associated with global food trade more than doubled in 22 years. Despite this growth, constant organizational features were observed in the network. However, both regional and national virtual water trade patterns significantly changed. Indeed, Asia increased its virtual water imports by more than 170%, switching from North America to South America as its main partner, whereas North America oriented to a growing intraregional trade. A dramatic rise in China's virtual water imports is associated with its increased soy imports after a domestic policy shift in 2000. Significantly, this shift has led the global soy market to save water on a global scale, but it also relies on expanding soy production in Brazil, which contributes to deforestation in the Amazon. We find that the international food trade has led to enhanced savings in global water resources over time, indicating its growing efficiency in terms of global water use.

  18. Crosstalk-aware virtual network embedding over inter-datacenter optical networks with few-mode fibers

    Science.gov (United States)

    Huang, Haibin; Guo, Bingli; Li, Xin; Yin, Shan; Zhou, Yu; Huang, Shanguo

    2017-12-01

    Virtualization of datacenter (DC) infrastructures enables infrastructure providers (InPs) to provide novel services like virtual networks (VNs). Furthermore, optical networks have been employed to connect the metro-scale geographically distributed DCs. The synergistic virtualization of the DC infrastructures and optical networks enables the efficient VN service over inter-DC optical networks (inter-DCONs). While the capacity of the used standard single-mode fiber (SSMF) is limited by their nonlinear characteristics. Thus, mode-division multiplexing (MDM) technology based on few-mode fibers (FMFs) could be employed to increase the capacity of optical networks. Whereas, modal crosstalk (XT) introduced by optical fibers and components deployed in the MDM optical networks impacts the performance of VN embedding (VNE) over inter-DCONs with FMFs. In this paper, we propose a XT-aware VNE mechanism over inter-DCONs with FMFs. The impact of XT is considered throughout the VNE procedures. The simulation results show that the proposed XT-aware VNE can achieves better performances of blocking probability and spectrum utilization compared to conventional VNE mechanisms.

  19. Multi-agent: a technique to implement geo-visualization of networked virtual reality

    Science.gov (United States)

    Lin, Zhiyong; Li, Wenjing; Meng, Lingkui

    2007-06-01

    Networked Virtual Reality (NVR) is a system based on net connected and spatial information shared, whose demands cannot be fully meet by the existing architectures and application patterns of VR to some extent. In this paper, we propose a new architecture of NVR based on Multi-Agent framework. which includes the detailed definition of various agents and their functions and full description of the collaboration mechanism, Through the prototype system test with DEM Data and 3D Models Data, the advantages of Multi-Agent based Networked Virtual Reality System in terms of the data loading time, user response time and scene construction time etc. are verified. First, we introduce the characters of Networked Virtual Realty and the characters of Multi-Agent technique in Section 1. Then we give the architecture design of Networked Virtual Realty based on Multi-Agent in Section 2.The Section 2 content includes the rule of task division, the multi-agent architecture design to implement Networked Virtual Realty and the function of agents. Section 3 shows the prototype implementation according to the design. Finally, Section 4 discusses the benefits of using Multi-Agent to implement geovisualization of Networked Virtual Realty.

  20. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks.

    Science.gov (United States)

    Murakami, Masaya; Kominami, Daichi; Leibnitz, Kenji; Murata, Masayuki

    2018-04-08

    Virtualization of wireless sensor networks (WSN) is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT) networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN) topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions) and nodes (i.e., neurons). We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR) model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  1. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks

    Directory of Open Access Journals (Sweden)

    Masaya Murakami

    2018-04-01

    Full Text Available Virtualization of wireless sensor networks (WSN is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions and nodes (i.e., neurons. We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  2. A Standard-Compliant Virtual Meeting System with Active Video Object Tracking

    Directory of Open Access Journals (Sweden)

    Chang Yao-Jen

    2002-01-01

    Full Text Available This paper presents an H.323 standard compliant virtual video conferencing system. The proposed system not only serves as a multipoint control unit (MCU for multipoint connection but also provides a gateway function between the H.323 LAN (local-area network and the H.324 WAN (wide-area network users. The proposed virtual video conferencing system provides user-friendly object compositing and manipulation features including 2D video object scaling, repositioning, rotation, and dynamic bit-allocation in a 3D virtual environment. A reliable, and accurate scheme based on background image mosaics is proposed for real-time extracting and tracking foreground video objects from the video captured with an active camera. Chroma-key insertion is used to facilitate video objects extraction and manipulation. We have implemented a prototype of the virtual conference system with an integrated graphical user interface to demonstrate the feasibility of the proposed methods.

  3. A Standard-Compliant Virtual Meeting System with Active Video Object Tracking

    Science.gov (United States)

    Lin, Chia-Wen; Chang, Yao-Jen; Wang, Chih-Ming; Chen, Yung-Chang; Sun, Ming-Ting

    2002-12-01

    This paper presents an H.323 standard compliant virtual video conferencing system. The proposed system not only serves as a multipoint control unit (MCU) for multipoint connection but also provides a gateway function between the H.323 LAN (local-area network) and the H.324 WAN (wide-area network) users. The proposed virtual video conferencing system provides user-friendly object compositing and manipulation features including 2D video object scaling, repositioning, rotation, and dynamic bit-allocation in a 3D virtual environment. A reliable, and accurate scheme based on background image mosaics is proposed for real-time extracting and tracking foreground video objects from the video captured with an active camera. Chroma-key insertion is used to facilitate video objects extraction and manipulation. We have implemented a prototype of the virtual conference system with an integrated graphical user interface to demonstrate the feasibility of the proposed methods.

  4. Converged Optical Network and Data Center Virtual Infrastructure Planning

    DEFF Research Database (Denmark)

    Georgakilas, Konstantinos; Tzanakaki, Anna; Anastasopoulos, Markos

    2012-01-01

    This paper presents a detailed study of planning virtual infrastructures (VIs) over a physical infrastructure comprising integrated optical network and data center resources with the aim of enabling sharing of physical resources among several virtual operators and services. Through the planning...... process, the VI topology and virtual resources are identified and mapped to the physical resources. Our study assumes a practical VI demand model without any in advance global knowledge of the VI requests that are handled sequentially. Through detailed integer linear program modeling, two objective...... functions—one that minimizes the overall power consumption of the infrastructure and one that minimizes the wavelength utilization—are compared. Both are evaluated for the virtual wavelength path and wavelength path optical network architectures. The first objective results in power consumption savings...

  5. Cognitive virtual network operator games

    CERN Document Server

    Duan, Lingjie; Shou, Biying

    2014-01-01

    This SpringerBrief provides an overview of cognitive mobile virtual network operator's (C-MVNO) decisions under investment flexibility, supply uncertainty, and market competition in cognitive radio networks. This is a new research area at the nexus of cognitive radio engineering and microeconomics. The authors focus on an operator's joint spectrum investment and service pricing decisions. The readers will learn how to tradeoff the two flexible investment choices (dynamic spectrum leasing and spectrum sensing) under supply uncertainty. Furthermore, if there is more than one operator, we present

  6. Synchronized Pair Configuration in Virtualization-Based Lab for Learning Computer Networks

    Science.gov (United States)

    Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita

    2017-01-01

    More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…

  7. Clustered Data Management in Virtual Docker Networks Spanning Geo-Redundant Data Centers : A Performance Evaluation Study of Docker Networking

    OpenAIRE

    Alansari, Hayder

    2017-01-01

    Software containers in general and Docker in particular is becoming more popular both in software development and deployment. Software containers are intended to be a lightweight virtualization that provides the isolation of virtual machines with a performance that is close to native. Docker does not only provide virtual isolation but also virtual networking to connect the isolated containers in the desired way. Many alternatives exist when it comes to the virtual networking provided by Docke...

  8. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  9. Networking support for collaborative virtual reality projects in national, european and international context

    OpenAIRE

    Hommes, F.; Pless, E.

    2004-01-01

    The report describes experiences from networking support for two three years virtual reality projects. Networking requirements depending on the virtual reality environment and the planned distributed scenarios are specified and verified in the real network. Networking problems especially due to the collaborative, distributed character of interaction via the Internet are presented.

  10. Joint Orchestration of Cloud-Based Microservices and Virtual Network Functions

    OpenAIRE

    Kouchaksaraei, Hadi Razzaghi; Karl, Holger

    2018-01-01

    Recent studies show the increasing popularity of distributed cloud applications, which are composed of multiple microservices. Besides their known benefits, microservice architecture also enables to mix and match cloud applications and Network Function Virtualization (NFV) services (service chains), which are composed of Virtual Network Functions (VNFs). Provisioning complex services containing VNFs and microservices in a combined NFV/cloud platform can enhance service quality and optimise co...

  11. Energy-efficient virtual optical network mapping approaches over converged flexible bandwidth optical networks and data centers.

    Science.gov (United States)

    Chen, Bowen; Zhao, Yongli; Zhang, Jie

    2015-09-21

    In this paper, we develop a virtual link priority mapping (LPM) approach and a virtual node priority mapping (NPM) approach to improve the energy efficiency and to reduce the spectrum usage over the converged flexible bandwidth optical networks and data centers. For comparison, the lower bound of the virtual optical network mapping is used for the benchmark solutions. Simulation results show that the LPM approach achieves the better performance in terms of power consumption, energy efficiency, spectrum usage, and the number of regenerators compared to the NPM approach.

  12. A Game for Energy-Aware Allocation of Virtualized Network Functions

    Directory of Open Access Journals (Sweden)

    Roberto Bruschi

    2016-01-01

    Full Text Available Network Functions Virtualization (NFV is a network architecture concept where network functionality is virtualized and separated into multiple building blocks that may connect or be chained together to implement the required services. The main advantages consist of an increase in network flexibility and scalability. Indeed, each part of the service chain can be allocated and reallocated at runtime depending on demand. In this paper, we present and evaluate an energy-aware Game-Theory-based solution for resource allocation of Virtualized Network Functions (VNFs within NFV environments. We consider each VNF as a player of the problem that competes for the physical network node capacity pool, seeking the minimization of individual cost functions. The physical network nodes dynamically adjust their processing capacity according to the incoming workload, by means of an Adaptive Rate (AR strategy that aims at minimizing the product of energy consumption and processing delay. On the basis of the result of the nodes’ AR strategy, the VNFs’ resource sharing costs assume a polynomial form in the workflows, which admits a unique Nash Equilibrium (NE. We examine the effect of different (unconstrained and constrained forms of the nodes’ optimization problem on the equilibrium and compare the power consumption and delay achieved with energy-aware and non-energy-aware strategy profiles.

  13. The emergence of internet-based virtual private networks in international safeguards

    International Nuclear Information System (INIS)

    Smartt, Heidi Anne

    2001-01-01

    Full text: The costs associated with secure data transmission can be an obstacle to International Safeguards. Typical communication methods are priced by distance and may include telephone lines, frame relay, and ISDN. It is therefore costly to communicate globally. The growth of the Internet has provided an extensive backbone for global communications; however, the Internet does not provide intrinsic security measures. Combining the Internet with Virtual Private Network technology, which encrypts and authenticates data, creates a secure and potentially cost-effective data transmission path, as well as achieving other benefits such as reliability and scalability. Access to the Internet can be achieved by connecting to a local Internet Service Provider, which can be preferable to installing a static link between two distant points. The cost-effectiveness of the Internet-based Virtual Private Network is dependent on such factors as data amount, current operational costs, and the specifics of the Internet connection, such as user proximity to an Internet Service Provider or existing access to the Internet. This paper will introduce Virtual Private Network technology, the benefits of Internet communication, and the emergence of Internet-based Virtual Private Networks throughout the International Safeguards community. Specific projects to be discussed include: The completed demonstration of secure remote monitoring data transfer via the Internet between STUK in Helsinki, Finland, and the IAEA in Vienna, Austria; The demonstration of secure remote access to IAEA resources by traveling inspectors with Virtual Private Network software loaded on laptops; The proposed Action Sheets between ABACC/DOE and ARN/DOE, which will provide a link between Rio de Janeiro and Buenos Aires; The proposed use at the HIFAR research reactor, located in Australia, to provide remote monitoring data to the IAEA; The use of Virtual Private Networks by JRC, Ispra, Italy. (author)

  14. Virtual View Image over Wireless Visual Sensor Network

    Directory of Open Access Journals (Sweden)

    Gamantyo Hendrantoro

    2011-12-01

    Full Text Available In general, visual sensors are applied to build virtual view images. When number of visual sensors increases then quantity and quality of the information improves. However, the view images generation is a challenging task in Wireless Visual Sensor Network environment due to energy restriction, computation complexity, and bandwidth limitation. Hence this paper presents a new method of virtual view images generation from selected cameras on Wireless Visual Sensor Network. The aim of the paper is to meet bandwidth and energy limitations without reducing information quality. The experiment results showed that this method could minimize number of transmitted imageries with sufficient information.

  15. An OpenFlow based network virtualization framework for the Cloud

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Sanchez, D.; Demchenko, Y.

    2011-01-01

    The Cloud computing paradigm entails a challenging networking scenario. Due to the economy of scale, the Cloud is mainly supported by Data Center infrastructures. Therefore, virtualized environment manageability, seamless migration of virtual machines, inter-domain communication issues and

  16. Enabling Research Network Connectivity to Clouds with Virtual Router Technology

    Science.gov (United States)

    Seuster, R.; Casteels, K.; Leavett-Brown, CR; Paterson, M.; Sobie, RJ

    2017-10-01

    The use of opportunistic cloud resources by HEP experiments has significantly increased over the past few years. Clouds that are owned or managed by the HEP community are connected to the LHCONE network or the research network with global access to HEP computing resources. Private clouds, such as those supported by non-HEP research funds are generally connected to the international research network; however, commercial clouds are either not connected to the research network or only connect to research sites within their national boundaries. Since research network connectivity is a requirement for HEP applications, we need to find a solution that provides a high-speed connection. We are studying a solution with a virtual router that will address the use case when a commercial cloud has research network connectivity in a limited region. In this situation, we host a virtual router in our HEP site and require that all traffic from the commercial site transit through the virtual router. Although this may increase the network path and also the load on the HEP site, it is a workable solution that would enable the use of the remote cloud for low I/O applications. We are exploring some simple open-source solutions. In this paper, we present the results of our studies and how it will benefit our use of private and public clouds for HEP computing.

  17. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    OpenAIRE

    Blanco, Bego; Taboada, Ianire; Fajardo, Jose Oscar; Liberal, Fidel

    2017-01-01

    In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-awa...

  18. Assuring virtual network function image integrity and host sealing in telco cloud

    NARCIS (Netherlands)

    Lal, S.; Ravidas, S.; Oliver, I.; Taleb, T.

    In Telco cloud environment, virtual network func- tions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are

  19. Getting a handle on virtual tools: An examination of the neuronal activity associated with virtual tool use.

    Science.gov (United States)

    Rallis, Austin; Fercho, Kelene A; Bosch, Taylor J; Baugh, Lee A

    2018-01-31

    Tool use is associated with three visual streams-dorso-dorsal, ventro-dorsal, and ventral visual streams. These streams are involved in processing online motor planning, action semantics, and tool semantics features, respectively. Little is known about the way in which the brain represents virtual tools. To directly assess this question, a virtual tool paradigm was created that provided the ability to manipulate tool components in isolation of one another. During functional magnetic resonance imaging (fMRI), adult participants performed a series of virtual tool manipulation tasks in which vision and movement kinematics of the tool were manipulated. Reaction time and hand movement direction were monitored while the tasks were performed. Functional imaging revealed that activity within all three visual streams was present, in a similar pattern to what would be expected with physical tool use. However, a previously unreported network of right-hemisphere activity was found including right inferior parietal lobule, middle and superior temporal gyri and supramarginal gyrus - regions well known to be associated with tool processing within the left hemisphere. These results provide evidence that both virtual and physical tools are processed within the same brain regions, though virtual tools recruit bilateral tool processing regions to a greater extent than physical tools. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Libraries' Place in Virtual Social Networks

    Science.gov (United States)

    Mathews, Brian S.

    2007-01-01

    Do libraries belong in the virtual world of social networking? With more than 100 million users, this environment is impossible to ignore. A rising philosophy for libraries, particularly in blog-land, involves the concept of being where the users are. Simply using new media to deliver an old message is not progress. Instead, librarians should…

  1. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  2. Virtual Vision

    Science.gov (United States)

    Terzopoulos, Demetri; Qureshi, Faisal Z.

    Computer vision and sensor networks researchers are increasingly motivated to investigate complex multi-camera sensing and control issues that arise in the automatic visual surveillance of extensive, highly populated public spaces such as airports and train stations. However, they often encounter serious impediments to deploying and experimenting with large-scale physical camera networks in such real-world environments. We propose an alternative approach called "Virtual Vision", which facilitates this type of research through the virtual reality simulation of populated urban spaces, camera sensor networks, and computer vision on commodity computers. We demonstrate the usefulness of our approach by developing two highly automated surveillance systems comprising passive and active pan/tilt/zoom cameras that are deployed in a virtual train station environment populated by autonomous, lifelike virtual pedestrians. The easily reconfigurable virtual cameras distributed in this environment generate synthetic video feeds that emulate those acquired by real surveillance cameras monitoring public spaces. The novel multi-camera control strategies that we describe enable the cameras to collaborate in persistently observing pedestrians of interest and in acquiring close-up videos of pedestrians in designated areas.

  3. Ecological network analysis on global virtual water trade.

    Science.gov (United States)

    Yang, Zhifeng; Mao, Xufeng; Zhao, Xu; Chen, Bin

    2012-02-07

    Global water interdependencies are likely to increase with growing virtual water trade. To address the issues of the indirect effects of water trade through the global economic circulation, we use ecological network analysis (ENA) to shed insight into the complicated system interactions. A global model of virtual water flow among agriculture and livestock production trade in 1995-1999 is also built as the basis for network analysis. Control analysis is used to identify the quantitative control or dependency relations. The utility analysis provides more indicators for describing the mutual relationship between two regions/countries by imitating the interactions in the ecosystem and distinguishes the beneficiary and the contributor of virtual water trade system. Results show control and utility relations can well depict the mutual relation in trade system, and direct observable relations differ from integral ones with indirect interactions considered. This paper offers a new way to depict the interrelations between trade components and can serve as a meaningful start as we continue to use ENA in providing more valuable implications for freshwater study on a global scale.

  4. A First Step Towards Network Security Virtualization: From Concept to Prototype

    Science.gov (United States)

    2015-10-01

    software - defined networking ( SDN ) technology to virtualize network security functions. At its core... network device. Some recent technologies suggest a method to control network flows dynamically at a network device, e.g., Software - Defined Networking ( SDN ... Software - Defined Networking ( SDN ) technology and its most popular realization, OpenFlow [17], [24]. More specifically, we will use SDN

  5. Architecture and design of optical path networks utilizing waveband virtual links

    Science.gov (United States)

    Ito, Yusaku; Mori, Yojiro; Hasegawa, Hiroshi; Sato, Ken-ichi

    2016-02-01

    We propose a novel optical network architecture that uses waveband virtual links, each of which can carry several optical paths, to directly bridge distant node pairs. Future photonic networks should not only transparently cover extended areas but also expand fiber capacity. However, the traversal of many ROADM nodes impairs the optical signal due to spectrum narrowing. To suppress the degradation, the bandwidth of guard bands needs to be increased, which degrades fiber frequency utilization. Waveband granular switching allows us to apply broader pass-band filtering at ROADMs and to insert sufficient guard bands between wavebands with minimum frequency utilization offset. The scheme resolves the severe spectrum narrowing effect. Moreover, the guard band between optical channels in a waveband can be minimized, which increases the number of paths that can be accommodated per fiber. In the network, wavelength path granular routing is done without utilizing waveband virtual links, and it still suffers from spectrum narrowing. A novel network design algorithm that can bound the spectrum narrowing effect by limiting the number of hops (traversed nodes that need wavelength path level routing) is proposed in this paper. This algorithm dynamically changes the waveband virtual link configuration according to the traffic distribution variation, where optical paths that need many node hops are effectively carried by virtual links. Numerical experiments demonstrate that the number of necessary fibers is reduced by 23% compared with conventional optical path networks.

  6. How the human brain goes virtual: distinct cortical regions of the person-processing network are involved in self-identification with virtual agents.

    Science.gov (United States)

    Ganesh, Shanti; van Schie, Hein T; de Lange, Floris P; Thompson, Evan; Wigboldus, Daniël H J

    2012-07-01

    Millions of people worldwide engage in online role-playing with their avatar, a virtual agent that represents the self. Previous behavioral studies have indicated that many gamers identify more strongly with their avatar than with their biological self. Through their avatar, gamers develop social networks and learn new social-cognitive skills. The cognitive neurosciences have yet to identify the neural processes that underlie self-identification with these virtual agents. We applied functional neuroimaging to 22 long-term online gamers and 21 nongaming controls, while they rated personality traits of self, avatar, and familiar others. Strikingly, neuroimaging data revealed greater avatar-referential cortical activity in the left inferior parietal lobe, a region associated with self-identification from a third-person perspective. The magnitude of this brain activity correlated positively with the propensity to incorporate external body enhancements into one's bodily identity. Avatar-referencing furthermore recruited greater activity in the rostral anterior cingulate gyrus, suggesting relatively greater emotional self-involvement with one's avatar. Post-scanning behavioral data revealed superior recognition memory for avatar relative to others. Interestingly, memory for avatar positively covaried with play duration. These findings significantly advance our knowledge about the brain's plasticity to self-identify with virtual agents and the human cognitive-affective potential to live and learn in virtual worlds.

  7. To Enhance Collaborative Learning and Practice Network Knowledge with a Virtualization Laboratory and Online Synchronous Discussion

    Directory of Open Access Journals (Sweden)

    Wu-Yuin Hwang

    2014-09-01

    Full Text Available Recently, various computer networking courses have included additional laboratory classes in order to enhance students’ learning achievement. However, these classes need to establish a suitable laboratory where each student can connect network devices to configure and test functions within different network topologies. In this case, the Linux operating system can be used to operate network devices and the virtualization technique can include multiple OSs for supporting a significant number of students. In previous research, the virtualization application was successfully applied in a laboratory, but focused only on individual assignments. The present study extends previous research by designing the Networking Virtualization-Based Laboratory (NVBLab, which requires collaborative learning among the experimental students. The students were divided into an experimental group and a control group for the experiment. The experimental group performed their laboratory assignments using NVBLab, whereas the control group completed them on virtual machines (VMs that were installed on their personal computers. Moreover, students using NVBLab were provided with an online synchronous discussion (OSD feature that enabled them to communicate with others. The laboratory assignments were divided into two parts: Basic Labs and Advanced Labs. The results show that the experimental group significantly outperformed the control group in two Advanced Labs and the post-test after Advanced Labs. Furthermore, the experimental group’s activities were better than those of the control group based on the total average of the command count per laboratory. Finally, the findings of the interviews and questionnaires with the experimental group reveal that NVBLab was helpful during and after laboratory class.

  8. Virtual private network design: a proof of the tree routing conjecture on ring networks

    NARCIS (Netherlands)

    C.A.J. Hurkens (Cor); J.C.M. Keijsper; L. Stougie (Leen)

    2005-01-01

    htmlabstractA basic question in Virtual Private Network (VPN) design is if the symmetric version of the problem always has an optimal solution which is a tree network. An affirmative answer would imply that the symmetric VPN problem is solvable in polynomial time. We give an affirmative answer in

  9. Traffic routing for multicomputer networks with virtual cut-through capability

    Science.gov (United States)

    Kandlur, Dilip D.; Shin, Kang G.

    1992-01-01

    Consideration is given to the problem of selecting routes for interprocess communication in a network with virtual cut-through capability, while balancing the network load and minimizing the number of times that a message gets buffered. An approach is proposed that formulates the route selection problem as a minimization problem with a link cost function that depends upon the traffic through the link. The form of this cost function is derived using the probability of establishing a virtual cut-through route. The route selection problem is shown to be NP-hard, and an algorithm is developed to incrementally reduce the cost by rerouting the traffic. The performance of this algorithm is exemplified by two network topologies: the hypercube and the C-wrapped hexagonal mesh.

  10. Teaching Advanced Concepts in Computer Networks: VNUML-UM Virtualization Tool

    Science.gov (United States)

    Ruiz-Martinez, A.; Pereniguez-Garcia, F.; Marin-Lopez, R.; Ruiz-Martinez, P. M.; Skarmeta-Gomez, A. F.

    2013-01-01

    In the teaching of computer networks the main problem that arises is the high price and limited number of network devices the students can work with in the laboratories. Nowadays, with virtualization we can overcome this limitation. In this paper, we present a methodology that allows students to learn advanced computer network concepts through…

  11. Virtual private network design : a proof of the tree routing conjecture on ring networks

    NARCIS (Netherlands)

    Hurkens, C.A.J.; Keijsper, J.C.M.; Stougie, L.

    2007-01-01

    A basic question in virtual private network (VPN) design is if the symmetric version of the problem always has an optimal solution which is a tree network. An affirmative answer would imply that the symmetric VPN problem is solvable in polynomial time. We give an affirmative answer in case the

  12. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    OpenAIRE

    Bush, Stephen F.

    1999-01-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dyna...

  13. Name-Based Address Mapping for Virtual Private Networks

    Science.gov (United States)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  14. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    Directory of Open Access Journals (Sweden)

    Bego Blanco

    2017-01-01

    Full Text Available In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-aware placement solution using a robust optimization approach based on service demand uncertainty in order to minimize the power consumption in the system constrained by network service latency requirements and infrastructure terms. Then, we discuss the results of the proposed placement mechanism in 5G scenarios that combine several service flavours and robust protection values. Once the impact of the service flavour and robust protection on the global power consumption of the system is analyzed, numerical results indicate that our proposal succeeds in efficiently placing the virtual network functions that compose the network services in the available hardware infrastructure while fulfilling service constraints.

  15. Triadic motifs in the dependence networks of virtual societies

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-01

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  16. Triadic motifs in the dependence networks of virtual societies.

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-10

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  17. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Science.gov (United States)

    Valdivieso Caraguay, Ángel Leonardo; García Villalba, Luis Javier

    2017-01-01

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors. PMID:28362346

  18. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks.

    Science.gov (United States)

    Caraguay, Ángel Leonardo Valdivieso; Villalba, Luis Javier García

    2017-03-31

    This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics) related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  19. Exploring Virtual Enterprises Using Activity Theory

    Directory of Open Access Journals (Sweden)

    Ronald Beckett

    2004-11-01

    Full Text Available From joint Industry – University research into the key success factors that sustain Virtual Enterprises (VE’s, it has been observed that conditions for the establishment of a VE do not necessarily sustain it. Transactions that are valued by the participants, a balance between similarity and complementarity attributes of the participants and effective utilisation of time are seen as important sustaining factors. Different communication and ICT tools are utilised in different circumstances, and successful collaborations develop formal or informal “rules” underlying their operation. Considering such attributes helps us understand what happens within a successful VE, but not necessarily how. Two case studies describing long-standing collaborations – one relating to a manufacturing network, and the other to a professional virtual community are presented. A third case study relating to the development of ICT tools to be used in a VE is also presented. Activity Theory is used as a framework for discussion of the organisational attributes associated with these cases and how they operate. It is suggested that exploration of the nature of tools, communities etc is helpful in understanding VE operations, and applied at multiple levels, Activity Theory is also useful in understanding the evolution of those tools, communities etc.

  20. Directional virtual backbone based data aggregation scheme for Wireless Visual Sensor Networks.

    Science.gov (United States)

    Zhang, Jing; Liu, Shi-Jian; Tsai, Pei-Wei; Zou, Fu-Min; Ji, Xiao-Rong

    2018-01-01

    Data gathering is a fundamental task in Wireless Visual Sensor Networks (WVSNs). Features of directional antennas and the visual data make WVSNs more complex than the conventional Wireless Sensor Network (WSN). The virtual backbone is a technique, which is capable of constructing clusters. The version associating with the aggregation operation is also referred to as the virtual backbone tree. In most of the existing literature, the main focus is on the efficiency brought by the construction of clusters that the existing methods neglect local-balance problems in general. To fill up this gap, Directional Virtual Backbone based Data Aggregation Scheme (DVBDAS) for the WVSNs is proposed in this paper. In addition, a measurement called the energy consumption density is proposed for evaluating the adequacy of results in the cluster-based construction problems. Moreover, the directional virtual backbone construction scheme is proposed by considering the local-balanced factor. Furthermore, the associated network coding mechanism is utilized to construct DVBDAS. Finally, both the theoretical analysis of the proposed DVBDAS and the simulations are given for evaluating the performance. The experimental results prove that the proposed DVBDAS achieves higher performance in terms of both the energy preservation and the network lifetime extension than the existing methods.

  1. Research on Web-Based Networked Virtual Instrument System

    International Nuclear Information System (INIS)

    Tang, B P; Xu, C; He, Q Y; Lu, D

    2006-01-01

    The web-based networked virtual instrument (NVI) system is designed by using the object oriented methodology (OOM). The architecture of the NVI system consists of two major parts: client-web server interaction and instrument server-virtual instrument (VI) communication. The web server communicates with the instrument server and the clients connected to it over the Internet, and it handles identifying the user's name, managing the connection between the user and the instrument server, adding, removing and configuring VI's information. The instrument server handles setting the parameters of VI, confirming the condition of VI and saving the VI's condition information into the database. The NVI system is required to be a general-purpose measurement system that is easy to maintain, adapt and extend. Virtual instruments are connected to the instrument server and clients can remotely configure and operate these virtual instruments. An application of The NVI system is given in the end of the paper

  2. Growing a professional network to over 3000 members in less than 4 years: evaluation of InspireNet, British Columbia's virtual nursing health services research network.

    Science.gov (United States)

    Frisch, Noreen; Atherton, Pat; Borycki, Elizabeth; Mickelson, Grace; Cordeiro, Jennifer; Novak Lauscher, Helen; Black, Agnes

    2014-02-21

    Use of Web 2.0 and social media technologies has become a new area of research among health professionals. Much of this work has focused on the use of technologies for health self-management and the ways technologies support communication between care providers and consumers. This paper addresses a new use of technology in providing a platform for health professionals to support professional development, increase knowledge utilization, and promote formal/informal professional communication. Specifically, we report on factors necessary to attract and sustain health professionals' use of a network designed to increase nurses' interest in and use of health services research and to support knowledge utilization activities in British Columbia, Canada. "InspireNet", a virtual professional network for health professionals, is a living laboratory permitting documentation of when and how professionals take up Web 2.0 and social media. Ongoing evaluation documents our experiences in establishing, operating, and evaluating this network. Overall evaluation methods included (1) tracking website use, (2) conducting two member surveys, and (3) soliciting member feedback through focus groups and interviews with those who participated in electronic communities of practice (eCoPs) and other stakeholders. These data have been used to learn about the types of support that seem relevant to network growth. Network growth exceeded all expectations. Members engaged with varying aspects of the network's virtual technologies, such as teams of professionals sharing a common interest, research teams conducting their work, and instructional webinars open to network members. Members used wikis, blogs, and discussion groups to support professional work, as well as a members' database with contact information and areas of interest. The database is accessed approximately 10 times per day. InspireNet public blog posts are accessed roughly 500 times each. At the time of writing, 21 research teams

  3. Analysis of the social network development of a virtual community for Australian intensive care professionals.

    Science.gov (United States)

    Rolls, Kaye Denise; Hansen, Margaret; Jackson, Debra; Elliott, Doug

    2014-11-01

    Social media platforms can create virtual communities, enabling healthcare professionals to network with a broad range of colleagues and facilitate knowledge exchange. In 2003, an Australian state health department established an intensive care mailing list to address the professional isolation experienced by senior intensive care nurses. This article describes the social network created within this virtual community by examining how the membership profile evolved from 2003 to 2009. A retrospective descriptive design was used. The data source was a deidentified member database. Since 2003, 1340 healthcare professionals subscribed to the virtual community with 78% of these (n = 1042) still members at the end of 2009. The membership profile has evolved from a single-state nurse-specific network to an Australia-wide multidisciplinary and multiorganizational intensive care network. The uptake and retention of membership by intensive care clinicians indicated that they appeared to value involvement in this virtual community. For healthcare organizations, a virtual community may be a communications option for minimizing professional and organizational barriers and promoting knowledge flow. Further research is, however, required to demonstrate a link between these broader social networks, enabling the exchange of knowledge and improved patient outcomes.

  4. A Cluster- Based Secure Active Network Environment

    Institute of Scientific and Technical Information of China (English)

    CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai

    2005-01-01

    We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.

  5. Big data analytics for the virtual network topology reconfiguration use case

    OpenAIRE

    Gifre Renom, Lluís; Morales Alcaide, Fernando; Velasco Esteban, Luis Domingo; Ruiz Ramírez, Marc

    2016-01-01

    ABNO's OAM Handler is extended with big data analytics capabilities to anticipate traffic changes in volume and direction. Predicted traffic is used to trigger virtual network topology re-optimization. When the virtual topology needs to be reconfigured, predicted and current traffic matrices are used to find the optimal topology. A heuristic algorithm to adapt current virtual topology to meet both actual demands and expected traffic matrix is proposed. Experimental assessment is carried ou...

  6. Monitoring Malware Activity on the LAN Network

    Science.gov (United States)

    Skrzewski, Mirosław

    Many security related organizations periodically publish current network and systems security information, with the lists of top malware programs. These lists raises the question how these threats spreads out, if the worms (the only threat with own communication abilities) are low or missing on these lists. The paper discuss the research on malware network activity, aimed to deliver the answer to the question, what is the main infection channel of modern malware, done with the usage of virtual honeypot systems on dedicated, unprotected network. Systems setup, network and systems monitoring solutions, results of over three months of network traffic and malware monitoring are presented, along with the proposed answer to our research question.

  7. Monitoring and Discovery for Self-Organized Network Management in Virtualized and Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Ángel Leonardo Valdivieso Caraguay

    2017-03-01

    Full Text Available This paper presents the Monitoring and Discovery Framework of the Self-Organized Network Management in Virtualized and Software Defined Networks SELFNET project. This design takes into account the scalability and flexibility requirements needed by 5G infrastructures. In this context, the present framework focuses on gathering and storing the information (low-level metrics related to physical and virtual devices, cloud environments, flow metrics, SDN traffic and sensors. Similarly, it provides the monitoring data as a generic information source in order to allow the correlation and aggregation tasks. Our design enables the collection and storing of information provided by all the underlying SELFNET sublayers, including the dynamically onboarded and instantiated SDN/NFV Apps, also known as SELFNET sensors.

  8. Interpersonal Influence in Virtual Social Networks and Consumer Decisions

    Directory of Open Access Journals (Sweden)

    Eduardo Botti Abbade

    2014-04-01

    Full Text Available This study aimed to analyze the attitude of college students regarding to interpersonal influence in virtual social networks related to consume decisions. It was conducted a survey with 200 college students from an Institution of Higher Education located in Santa Maria/RS. The sample was obtained through voluntary adhesion and the data collection instrument was applied in a virtual environment. Scales were adapted to measure and evaluate the propensity of students to influence and be influenced by their virtual contacts. The results suggest that the scales adapted are satisfactory to measure what they intend to do. The study also found that men are more able to influence the opinions of their virtual social contacts. On the other hand, the time dedicated to access the Internet positively and significantly influences the propensity of users to be influenced by their virtual social contacts. The correlation between the ability to influence the propensity to be influenced is significant and positive.

  9. Dynamic virtual optical network embedding in spectral and spatial domains over elastic optical networks with multicore fibers

    Science.gov (United States)

    Zhu, Ruijie; Zhao, Yongli; Yang, Hui; Tan, Yuanlong; Chen, Haoran; Zhang, Jie; Jue, Jason P.

    2016-08-01

    Network virtualization can eradicate the ossification of the infrastructure and stimulate innovation of new network architectures and applications. Elastic optical networks (EONs) are ideal substrate networks for provisioning flexible virtual optical network (VON) services. However, as network traffic continues to increase exponentially, the capacity of EONs will reach the physical limitation soon. To further increase network flexibility and capacity, the concept of EONs is extended into the spatial domain. How to map the VON onto substrate networks by thoroughly using the spectral and spatial resources is extremely important. This process is called VON embedding (VONE).Considering the two kinds of resources at the same time during the embedding process, we propose two VONE algorithms, the adjacent link embedding algorithm (ALEA) and the remote link embedding algorithm (RLEA). First, we introduce a model to solve the VONE problem. Then we design the embedding ability measurement of network elements. Based on the network elements' embedding ability, two VONE algorithms were proposed. Simulation results show that the proposed VONE algorithms could achieve better performance than the baseline algorithm in terms of blocking probability and revenue-to-cost ratio.

  10. VEM: Virtual Enterprise Methodology

    DEFF Research Database (Denmark)

    Tølle, Martin; Vesterager, Johan

    2003-01-01

    This chapter presents a virtual enterprise methodology (VEM) that outlines activities to consider when setting up and managing virtual enterprises (VEs). As a methodology the VEM helps companies to ask the right questions when preparing for and setting up an enterprise network, which works...

  11. Cloud-Based Virtual Laboratory for Network Security Education

    Science.gov (United States)

    Xu, Le; Huang, Dijiang; Tsai, Wei-Tek

    2014-01-01

    Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…

  12. Investigating the effects of virtual social networks on entrepreneurial marketing

    Directory of Open Access Journals (Sweden)

    Kambeiz Talebi

    2014-10-01

    Full Text Available This paper presents an empirical investigation to study the effects of virtual social networks on entrepreneurial marketing. The study designs a questionnaire in Likert scale based on a model originally developed by Morris et al. (2002 [Morris, M. H., Schindehutte, M., & LaForge, R. W. (2002. Entrepreneurial marketing: a construct for integrating emerging entrepreneurship and marketing perspectives. Journal of Marketing Theory and Practice, 10(4, 1-19.]. The study considers the effects of three components of virtual social network (VSN; namely structural VSN, interaction VSN and functional VSN on entrepreneurial marketing. Using structural equation modeling, the study has determined positive and meaningful effects of all three VSN components on entrepreneurial marketing.

  13. Microwork and Virtual Production Networks in Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Microwork and Virtual Production Networks in Sub-Saharan Africa and Southeast Asia ... content posted to social media sites; -categorizing products in online shops; or, ... that have realized that entry-level workers can be efficient and effective.

  14. First field trial of Virtual Network Operator oriented network on demand (NoD) service provisioning over software defined multi-vendor OTN networks

    Science.gov (United States)

    Li, Yajie; Zhao, Yongli; Zhang, Jie; Yu, Xiaosong; Chen, Haoran; Zhu, Ruijie; Zhou, Quanwei; Yu, Chenbei; Cui, Rui

    2017-01-01

    A Virtual Network Operator (VNO) is a provider and reseller of network services from other telecommunications suppliers. These network providers are categorized as virtual because they do not own the underlying telecommunication infrastructure. In terms of business operation, VNO can provide customers with personalized services by leasing network infrastructure from traditional network providers. The unique business modes of VNO lead to the emergence of network on demand (NoD) services. The conventional network provisioning involves a series of manual operation and configuration, which leads to high cost in time. Considering the advantages of Software Defined Networking (SDN), this paper proposes a novel NoD service provisioning solution to satisfy the private network need of VNOs. The solution is first verified in the real software defined multi-domain optical networks with multi-vendor OTN equipment. With the proposed solution, NoD service can be deployed via online web portals in near-real time. It reinvents the customer experience and redefines how network services are delivered to customers via an online self-service portal. Ultimately, this means a customer will be able to simply go online, click a few buttons and have new services almost instantaneously.

  15. The Effect of Social Network Diagrams on a Virtual Network of Practice: A Korean Case

    Science.gov (United States)

    Jo, Il-Hyun

    2009-01-01

    This study investigates the effect of the presentation of social network diagrams on virtual team members' interaction behavior via e-mail. E-mail transaction data from 22 software developers in a Korean IT company was analyzed and depicted as diagrams by social network analysis (SNA), and presented to the members as an intervention. Results…

  16. Vulnerability of countries to food-production crises propagating in the virtual water trade network

    Science.gov (United States)

    Tamea, S.; Laio, F.; Ridolfi, L.

    2015-12-01

    In recent years, the international trade of food and agricultural commodities has undergone a marked increase of exchanged volumes and an expansion of the trade network. This globalization of trade has both positive and negative effects, but the interconnectedness and external dependency of countries generate complex dynamics which are often difficult to understand and model. In this study we consider the volume of water used for the production of agricultural commodities, virtually exchanged among countries through commodity trade, i.e. the virtual water trade. Then, we set up a parsimonious mechanistic model describing the propagation, into the global trade network, of food-production crises generated locally by a social, economic or environmental event (such as war, economic crisis, drought, pest). The model, accounting for the network structure and the virtual water balance of all countries, bases on rules derived from observed virtual water flows and on data-based and statistically verified assumption. It is also tested on real case studies that prove its capability to capture the main features of crises propagation. The model is then employed as the basis for the development of an index of country vulnerability, measuring the exposure of countries to crises propagating in the virtual water trade network. Results of the analysis are discussed within the context of socio-economic and environmental conditions of countries, showing that not only water-scarce, but also wealthy and globalized countries, are among the most vulnerable to external crises. The temporal analysis for the period 1986-2011 reveals that the global average vulnerability has strongly increased over time, confirming the increased exposure of countries to external crises which may occur in the virtual water trade network.

  17. ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL

    Directory of Open Access Journals (Sweden)

    R. Ravi

    2011-03-01

    Full Text Available As Internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called “Tunneling”, data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. The K-Cost Optimized Delay Satisfied Virtual Private Networks Tree Provisioning Algorithm connects VPN nodes using a tree structure and attempts to optimize the total bandwidth reserved on the edges of the VPN tree that satisfies the delay requirement. It also allows sharing the bandwidth on the links to improve the performance. The proposed KCDVT algorithm computes the optimal VPN Tree. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, and the number of VPN nodes, delay, asymmetric ratio and delay with constraints with Breadth First Search Algorithm. The KCDVT performs better than the Breadth First Search Algorithm.

  18. The production route selection algorithm in virtual manufacturing networks

    Science.gov (United States)

    Krenczyk, D.; Skolud, B.; Olender, M.

    2017-08-01

    The increasing requirements and competition in the global market are challenges for the companies profitability in production and supply chain management. This situation became the basis for construction of virtual organizations, which are created in response to temporary needs. The problem of the production flow planning in virtual manufacturing networks is considered. In the paper the algorithm of the production route selection from the set of admissible routes, which meets the technology and resource requirements and in the context of the criterion of minimum cost is proposed.

  19. Personal goals, group performance and ‘social’ networks: participants’ negotiation of virtual and embodied relationships in the ‘Workplace Challenge’ physical activity programme

    DEFF Research Database (Denmark)

    Evans, Adam Brian; Carter, Alice; Middleton, Geoff

    2016-01-01

    -structured interviews were conducted with a total of seventeen participants recruited from one public and one private sector workplace and from a sample of participants registered as individuals. Two programme planners employed by the CSP also took part. A figurational framework was utilised to investigate participants...... in professional I–We identities, whereas virtual networks sometimes highlighted participants’ isolation. Moreover, emphasis upon competition within and between teams caused some participants to question their performance. Often, competition motivated engagement. For less active participants, constant comparison...

  20. REDES SOCIALES VIRTUALES Y LA BIOÉTICA VIRTUAL SOCIAL NETWORKS AND BIOETHICS

    Directory of Open Access Journals (Sweden)

    Jorge Arturo Pérez Pérez

    2011-06-01

    Full Text Available RESUMEN:La investigación tiende a indagar por las condiciones psicológicas (obsesivas, socio – familiares, fisiológicas y emocionales de los estudiantes de la Universidad de San Buenaventura –Medellín de mes de agosto de 2010, que tienden a destinar parte de su tiempo a las Redes Sociales Virtuales y hacer una reflexión desde la Bioética frente al tema.Abstract:This piece of research tends to inquire into the (obsessive psychological, socio-family, physiological, and emotional conditions of the students at Saint Bonaventure University, Medellin Branch, back in the month of August 2010, who have the tendency to spend their free time in the Virtual Social Networks and then make an analysis of this issue, from the Bioethical viewpoint.

  1. vDNN: Virtualized Deep Neural Networks for Scalable, Memory-Efficient Neural Network Design

    OpenAIRE

    Rhu, Minsoo; Gimelshein, Natalia; Clemons, Jason; Zulfiqar, Arslan; Keckler, Stephen W.

    2016-01-01

    The most widely used machine learning frameworks require users to carefully tune their memory usage so that the deep neural network (DNN) fits into the DRAM capacity of a GPU. This restriction hampers a researcher's flexibility to study different machine learning algorithms, forcing them to either use a less desirable network architecture or parallelize the processing across multiple GPUs. We propose a runtime memory manager that virtualizes the memory usage of DNNs such that both GPU and CPU...

  2. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  3. Controls of the U.S. Virtual Water Transfer Network

    Science.gov (United States)

    Garcia, S.; Mejia, A.

    2017-12-01

    A complex interplay of human and natural factors shape the economic geography of the U.S., operating through socioeconomic forces that drive the consumption, production, and exchange of commodities. The virtual water content of a commodity represents the water embedded in its production. This work investigates the controls of national bilateral transfers of the virtual water transfer network (VWTN), through a gravity-type spatial interaction model. We use a probabilistic model to predict the binary network and investigate whether the gravity model can explain the topological properties of the empirical weighted network. In general, the gravity model relates transfer flows to the mass of the trading regions and their geographical distance. We hypothesize that properties of the nodes such as population, employment, and availability of land, together with the Euclidean distance between two trading regions, capture the main drivers of the national VWTN. The results from the model are then compared to the empirical weighted network to verify its ability to model the structure of this self-organized system. The proposed empirical model provides insight into the processes that underlie the formation of the VWTN. It can be a promising tool to study how flows are affected by changes in the generating conditions due to shocks and/or stresses.

  4. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-01-01

    Many researchers are devoting attention to the so-called “Internet of Things” (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology. PMID:27548177

  5. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  6. Addressing security issues related to virtual institute distributed activities

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  7. Developing Simulated Cyber Attack Scenarios Against Virtualized Adversary Networks

    Science.gov (United States)

    2017-03-01

    enclave, as shown in Figure 11, is a common design for many secure networks. Different variations of a cyber-attack scenario can be rehearsed based...achieved a greater degree of success against multiple variations of an enemy network. E. ATTACK TYPES A primary goal of this thesis is to define and...2013. [33] R. Goldberg , “Architectural principles for virtual computer systems,” Ph.D. dissertation, Dept. of Comp. Sci., Harvard Univ., Cambridge

  8. VIRTUAL NETWORK COMMUNICATION AND ITS IMPACT ON INTERPERSONAL RELATIONS

    Directory of Open Access Journals (Sweden)

    Сергей Николаевич Хуторной

    2013-08-01

    Full Text Available The Internet was playing an increasing role in human life. Increasingly popular sites, where visitors can interact with other visitors through this site. Becoming popular communication "online", partially displacing the real-мире. There arises a problem of Internet addiction, or dependence on the Internet, which includes not only the dependence on virtual communication in social networks, but also addiction to gambling, online games, electronic purchases, and so on. Virtual reality acts not only as an intermediary virtual communication, but also significantly affect the nature, means and methods of communication, which ultimately has a significant effect on identity, often negatively, transforming it. The article dedicated to the analysis  of intercourse in virtual reality. The specification of net communication in comparing of real social communication is researching. The concept of Internet addicion is examined.DOI: http://dx.doi.org/10.12731/2218-7405-2013-6-9

  9. NRS : a system for automated network virtualization in IaaS cloud infrastructures

    NARCIS (Netherlands)

    Theodorou, D.; Mak, R.H.; Keijser, J.J.; Suerink, T.

    2013-01-01

    Applications running in multi-tenant IaaS clouds increasingly require networked compute resources, which may belong to several clouds hosted in multiple data-centers. To accommodate these applications network virtualization is necessary, not only for isolation between tenants, but also for

  10. The Connect Effect Building Strong Personal, Professional, and Virtual Networks

    CERN Document Server

    Dulworth, Michael

    2008-01-01

    Entrepreneur and executive development expert Mike Dulworth's THE CONNECT EFFECT provides readers with a simple framework and practical tools for developing that crucial competitive advantage: a high-quality personal, professional/organizational and virtual network.

  11. WebVR——Web Virtual Reality Engine Based on P2P network

    OpenAIRE

    zhihan LV; Tengfei Yin; Yong Han; Yong Chen; Ge Chen

    2011-01-01

    WebVR, a multi-user online virtual reality engine, is introduced. The main contributions are mapping the geographical space and virtual space to the P2P overlay network space, and dividing the three spaces by quad-tree method. The geocoding is identified with Hash value, which is used to index the user list, terrain data, and the model object data. Sharing of data through improved Kademlia network model is designed and implemented. In this model, XOR algorithm is used to calculate the distanc...

  12. Cloud and virtual data storage networking

    CERN Document Server

    Schulz, Greg

    2011-01-01

    The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down or information recession. Instead, the need to process, move, and store data has only increased. Consequently, IT organizations are looking to do more with what they have while supporting growth along with new services without compromising on cost and service delivery. Cloud and Virtual Data Storage Networking, by savvy IT industry veteran Greg Schulz, looks at converging IT resources and management technologies for facilitating efficie

  13. Virtual File System Mounting amp Searching With Network JVM For LAN

    Directory of Open Access Journals (Sweden)

    Nikita Kamble

    2015-08-01

    Full Text Available Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and other mobile devices that share resources such as printer or network storage. A LAN is contrasted in principle to a wide area networkWANwhich covers a larger geographic distance and may involve leased telecom circuits while the media for LANs are locally managed. Ethernet are twisted pair cabling amp Wi-Fi are the two most common transmission technologies in use for LAN. The rise of virtualization has fueled the development of virtual LANWLANwhich allows network administrator to logically group network nodes amp partition their networks without the need for major infrastructure changes. In some situations a wireless LAN or Wi-Fi maybe preferable to a wired LAN because of its flexibility amp cost. Companies are asserting WLANs as a replacement for their wired infrastructure as the number of smart phones tablets amp other mobile devices proliferates.

  14. Constructing Social Networks from Unstructured Group Dialog in Virtual Worlds

    Science.gov (United States)

    Shah, Fahad; Sukthankar, Gita

    Virtual worlds and massively multi-player online games are rich sources of information about large-scale teams and groups, offering the tantalizing possibility of harvesting data about group formation, social networks, and network evolution. However these environments lack many of the cues that facilitate natural language processing in other conversational settings and different types of social media. Public chat data often features players who speak simultaneously, use jargon and emoticons, and only erratically adhere to conversational norms. In this paper, we present techniques for inferring the existence of social links from unstructured conversational data collected from groups of participants in the Second Life virtual world. We present an algorithm for addressing this problem, Shallow Semantic Temporal Overlap (SSTO), that combines temporal and language information to create directional links between participants, and a second approach that relies on temporal overlap alone to create undirected links between participants. Relying on temporal overlap is noisy, resulting in a low precision and networks with many extraneous links. In this paper, we demonstrate that we can ameliorate this problem by using network modularity optimization to perform community detection in the noisy networks and severing cross-community links. Although using the content of the communications still results in the best performance, community detection is effective as a noise reduction technique for eliminating the extra links created by temporal overlap alone.

  15. Neuronal correlates of a virtual-reality-based passive sensory P300 network.

    Science.gov (United States)

    Chen, Chun-Chuan; Syue, Kai-Syun; Li, Kai-Chiun; Yeh, Shih-Ching

    2014-01-01

    P300, a positive event-related potential (ERP) evoked at around 300 ms after stimulus, can be elicited using an active or passive oddball paradigm. Active P300 requires a person's intentional response, whereas passive P300 does not require an intentional response. Passive P300 has been used in incommunicative patients for consciousness detection and brain computer interface. Active and passive P300 differ in amplitude, but not in latency or scalp distribution. However, no study has addressed the mechanism underlying the production of passive P300. In particular, it remains unclear whether the passive P300 shares an identical active P300 generating network architecture when no response is required. This study aims to explore the hierarchical network of passive sensory P300 production using dynamic causal modelling (DCM) for ERP and a novel virtual reality (VR)-based passive oddball paradigm. Moreover, we investigated the causal relationship of this passive P300 network and the changes in connection strength to address the possible functional roles. A classical ERP analysis was performed to verify that the proposed VR-based game can reliably elicit passive P300. The DCM results suggested that the passive and active P300 share the same parietal-frontal neural network for attentional control and, underlying the passive network, the feed-forward modulation is stronger than the feed-back one. The functional role of this forward modulation may indicate the delivery of sensory information, automatic detection of differences, and stimulus-driven attentional processes involved in performing this passive task. To our best knowledge, this is the first study to address the passive P300 network. The results of this study may provide a reference for future clinical studies on addressing the network alternations under pathological states of incommunicative patients. However, caution is required when comparing patients' analytic results with this study. For example, the task

  16. Neuronal correlates of a virtual-reality-based passive sensory P300 network.

    Directory of Open Access Journals (Sweden)

    Chun-Chuan Chen

    Full Text Available P300, a positive event-related potential (ERP evoked at around 300 ms after stimulus, can be elicited using an active or passive oddball paradigm. Active P300 requires a person's intentional response, whereas passive P300 does not require an intentional response. Passive P300 has been used in incommunicative patients for consciousness detection and brain computer interface. Active and passive P300 differ in amplitude, but not in latency or scalp distribution. However, no study has addressed the mechanism underlying the production of passive P300. In particular, it remains unclear whether the passive P300 shares an identical active P300 generating network architecture when no response is required. This study aims to explore the hierarchical network of passive sensory P300 production using dynamic causal modelling (DCM for ERP and a novel virtual reality (VR-based passive oddball paradigm. Moreover, we investigated the causal relationship of this passive P300 network and the changes in connection strength to address the possible functional roles. A classical ERP analysis was performed to verify that the proposed VR-based game can reliably elicit passive P300. The DCM results suggested that the passive and active P300 share the same parietal-frontal neural network for attentional control and, underlying the passive network, the feed-forward modulation is stronger than the feed-back one. The functional role of this forward modulation may indicate the delivery of sensory information, automatic detection of differences, and stimulus-driven attentional processes involved in performing this passive task. To our best knowledge, this is the first study to address the passive P300 network. The results of this study may provide a reference for future clinical studies on addressing the network alternations under pathological states of incommunicative patients. However, caution is required when comparing patients' analytic results with this study. For example

  17. A Deployment Scheme Based Upon Virtual Force for Directional Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chiu-Kuo Liang

    2015-11-01

    Full Text Available A directional sensor network is composed of many directional sensor nodes. Unlike conventional omni-directional sensors that always have an omni-angle of sensing range; directional sensors may have a limited angle of sensing range due to technical constraints or cost considerations. Area coverage is still an essential issue in a directional sensor network. In this paper, we study the area coverage problem in directional sensor networks with mobile sensors, which can move to the correct places to get high coverage. We present distributed self-deployment schemes of mobile sensors. After sensors are randomly deployed, each sensor calculates its next new location to move in order to obtain a better coverage than previous one. The locations of sensors are adjusted round by round so that the coverage is gradually improved. Based on the virtual force of the directional sensors, we design a scheme, namely Virtual force scheme. Simulation results show the effectiveness of our scheme in term of the coverage improvement.

  18. Smart grids : combination of 'Virtual Power Plant'-concept and 'smart network'-design

    NARCIS (Netherlands)

    El Bakari, K.; Kling, W.L.

    2010-01-01

    The concept of virtual power plant (VPP) offers a solution to control and manage higher level of dispersed generation in nowadays passive distribution network. Under certain conditions the VPP is able to displace power and energy which implies more control on the energy flow in the networks. To

  19. Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services

    Science.gov (United States)

    Naruse, Fumisato; Yamada, Yoshiyuki; Hasegawa, Hiroshi; Sato, Ken-Ichi

    This paper presents a novel “virtual fiber” network service that exploits wavebands. This service provides virtual direct tunnels that directly convey wavelength paths to connect customer facilities. To improve the resource utilization efficiency of the service, a network design algorithm is developed that can allow intermediate path grooming at limited nodes and can determine the best node location. Numerical experiments demonstrate the effectiveness of the proposed service architecture.

  20. Creation of a virtual antidotes network between pharmacy departments of catalan hospitals

    Directory of Open Access Journals (Sweden)

    Raquel Aguilar-Salmerón

    2017-05-01

    Full Text Available Objetive: To design a virtual antidote network between hospitals that could help to locate on-line those hospitals that stocked those antidotes with the highest difficulty in terms of availability, and ensured that the medication was loaned in case of necessity.Methods: The application was developed by four hospital pharmacists and two clinical toxicologists with the support of a Healthcare Informatics Consultant Company.Results: The antidotes network in Catalonia, Spain, was launched in July 2015. It can be accessed through the platform: www.xarxaantidots.org. The application has an open area with overall information about the project and the option to ask toxicological questions of non-urgent nature. The private area is divided into four sections: 1 Antidotes: data of interest about the 15 antidotes included in the network and their recommended stock depending on the complexity of the hospital, 2 Antidote stock management: virtual formulary, 3 Loans: location of antidotes through the on-line map application Google Maps, and virtual loan request, and 4 Documentation: As of June, 2016, 40 public and private hospitals have joined the network, from all four provinces of Catalonia, which have accessed the private area 2 102 times, requested two loans of silibinin, one of hydroxocobalamin, three of antiophidic serum and three of botulism antitoxin. Thirteen toxicological consultations have been received.Conclusions: The implementation of this network improves the communication between centers that manage poisoned patients, adapts and standardizes the stock of antidotes in hospitals, speeds up loans if necessary, and improves the quality of care for poisoned patients.

  1. Simulasi Virtual Local Area Network (VLAN Berbasis Software Defined Network (SDN Menggunakan POX Controller

    Directory of Open Access Journals (Sweden)

    Rohmat Tulloh

    2015-11-01

    Full Text Available VLAN (Virtual LAN merupakan sebuah teknologi yang dapat mengkonfigurasi jaringan logis independen dari struktur jaringan fisik. Hasil dari penelitian sebelumnya sudah diprediksi bahwa dibutuhkan Virtual Network yang akhirnya terciptalah VLAN. Namun paradigma jaringan saat ini tidak flexible, ketergantungan terhadap vendor sangat besar karena fungsi data plane dan control plane berada dalam satu paket device. SDN (Software defined network yang merupakan salahsatu evolusi teknologi jaringan sesuai dengan tuntutan yang berkembang dimana memisahkan fungsi data plane dan control plane pada suatu perangkat. POX Controller digunakan untuk men-simulasikan dan menguji Platform SDN (Software defined network. Pada penelitian ini menggunakan Openflow versi 1.0 untuk memasang header VLAN sehingga penelitian ini difokuskan untuk mengevaluasi performa forwarding VLAN yang memanfaatkan Openflow sebagai control plane dapat berfungsi dengan baik. Hasil penelitian ini mengusulkan penerapan karakteristik teknologi VLAN pada SDN karena telah berjalan dengan benar sesuai hasil pengujian konektifitas, verifikasi dan keamanan. Kemudian hasil pengujian lanjutan untuk melihat pengaruh SDN dengan skenario penambahan jumlah VLAN ID didapatkan bahwa set-up time akan bertambah seiring meningkatnya jumlah host dan dengan menggunakan protokol OpenFlow, latency yang terjadi di jaringan dapat dipantau dengan parameter round trip time (RTT yang stabil direntang 0,2 sampai 6 second walaupun jumlah vlan_id dan background traffic bertambah.

  2. Mapping, Awareness, and Virtualization Network Administrator Training Tool (MAVNATT) Architecture and Framework

    Science.gov (United States)

    2015-06-01

    unit may setup and teardown the entire tactical infrastructure multiple times per day. This tactical network administrator training is a critical...language and runs on Linux and Unix based systems. All provisioning is based around the Nagios Core application, a powerful backend solution for network...start up a large number of virtual machines quickly. CORE supports the simulation of fixed and mobile networks. CORE is open-source, written in Python

  3. Temporal dynamics of blue and green virtual water trade networks

    Science.gov (United States)

    Konar, M.; Dalin, C.; Hanasaki, N.; Rinaldo, A.; Rodriguez-Iturbe, I.

    2012-12-01

    Global food security increasingly relies on the trade of food commodities. Freshwater resources are essential to agricultural production and are thus embodied in the trade of food commodities, referred to as "virtual water trade." Agricultural production predominantly relies on rainwater (i.e., "green water"), though irrigation (i.e., "blue water") does play an important role. These different sources of water have distinctly different opportunity costs, which may be reflected in the way these resources are traded. Thus, the temporal dynamics of the virtual water trade networks from these distinct water sources require characterization. We find that 42 × 109 m3 blue and 310 × 109 m3 green water was traded in 1986, growing to 78 × 109 m3 blue and 594 × 109 m3 green water traded in 2008. Three nations dominate the export of green water resources: the USA, Argentina, and Brazil. As a country increases its export trade partners it tends to export relatively more blue water. However, as a country increases its import trade partners it does not preferentially import water from a specific source. The amount of virtual water that a country imports by increasing its import trade partners has been decreasing over time, with the exception of the soy trade. Both blue and green virtual water networks are efficient: 119 × 109 m3 blue and 105 × 109 m3 green water were saved in 2008. Importantly, trade has been increasingly saving water over time, due to the intensification of crop trade on more water-efficient links.

  4. Multiscale virtual particle based elastic network model (MVP-ENM) for normal mode analysis of large-sized biomolecules.

    Science.gov (United States)

    Xia, Kelin

    2017-12-20

    In this paper, a multiscale virtual particle based elastic network model (MVP-ENM) is proposed for the normal mode analysis of large-sized biomolecules. The multiscale virtual particle (MVP) model is proposed for the discretization of biomolecular density data. With this model, large-sized biomolecular structures can be coarse-grained into virtual particles such that a balance between model accuracy and computational cost can be achieved. An elastic network is constructed by assuming "connections" between virtual particles. The connection is described by a special harmonic potential function, which considers the influence from both the mass distributions and distance relations of the virtual particles. Two independent models, i.e., the multiscale virtual particle based Gaussian network model (MVP-GNM) and the multiscale virtual particle based anisotropic network model (MVP-ANM), are proposed. It has been found that in the Debye-Waller factor (B-factor) prediction, the results from our MVP-GNM with a high resolution are as good as the ones from GNM. Even with low resolutions, our MVP-GNM can still capture the global behavior of the B-factor very well with mismatches predominantly from the regions with large B-factor values. Further, it has been demonstrated that the low-frequency eigenmodes from our MVP-ANM are highly consistent with the ones from ANM even with very low resolutions and a coarse grid. Finally, the great advantage of MVP-ANM model for large-sized biomolecules has been demonstrated by using two poliovirus virus structures. The paper ends with a conclusion.

  5. Managing Distributed Innovation Processes in Virtual Organizations by Applying the Collaborative Network Relationship Analysis

    Science.gov (United States)

    Eschenbächer, Jens; Seifert, Marcus; Thoben, Klaus-Dieter

    Distributed innovation processes are considered as a new option to handle both the complexity and the speed in which new products and services need to be prepared. Indeed most research on innovation processes was focused on multinational companies with an intra-organisational perspective. The phenomena of innovation processes in networks - with an inter-organisational perspective - have been almost neglected. Collaborative networks present a perfect playground for such distributed innovation processes whereas the authors highlight in specific Virtual Organisation because of their dynamic behaviour. Research activities supporting distributed innovation processes in VO are rather new so that little knowledge about the management of such research is available. With the presentation of the collaborative network relationship analysis this gap will be addressed. It will be shown that a qualitative planning of collaboration intensities can support real business cases by proving knowledge and planning data.

  6. Network worlds : from link analysis to virtual places.

    Energy Technology Data Exchange (ETDEWEB)

    Joslyn, C. (Cliff)

    2002-01-01

    Significant progress is being made in knowledge systems through recent advances in the science of very large networks. Attention is now turning in many quarters to the potential impact on counter-terrorism methods. After reviewing some of these advances, we will discuss the difference between such 'network analytic' approaches, which focus on large, homogeneous graph strucures, and what we are calling 'link analytic' approaches, which focus on somewhat smaller graphs with heterogeneous link types. We use this venue to begin the process of rigorously defining link analysis methods, especially the concept of chaining of views of multidimensional databases. We conclude with some speculation on potential connections to virtual world architectures.

  7. Optimized Virtual Machine Placement with Traffic-Aware Balancing in Data Center Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2016-01-01

    Full Text Available Virtualization has been an efficient method to fully utilize computing resources such as servers. The way of placing virtual machines (VMs among a large pool of servers greatly affects the performance of data center networks (DCNs. As network resources have become a main bottleneck of the performance of DCNs, we concentrate on VM placement with Traffic-Aware Balancing to evenly utilize the links in DCNs. In this paper, we first proposed a Virtual Machine Placement Problem with Traffic-Aware Balancing (VMPPTB and then proved it to be NP-hard and designed a Longest Processing Time Based Placement algorithm (LPTBP algorithm to solve it. To take advantage of the communication locality, we proposed Locality-Aware Virtual Machine Placement Problem with Traffic-Aware Balancing (LVMPPTB, which is a multiobjective optimization problem of simultaneously minimizing the maximum number of VM partitions of requests and minimizing the maximum bandwidth occupancy on uplinks of Top of Rack (ToR switches. We also proved it to be NP-hard and designed a heuristic algorithm (Least-Load First Based Placement algorithm, LLBP algorithm to solve it. Through extensive simulations, the proposed heuristic algorithm is proven to significantly balance the bandwidth occupancy on uplinks of ToR switches, while keeping the number of VM partitions of each request small enough.

  8. SDN-enabled OPS with QoS guarantee for reconfigurable virtual data center networks

    NARCIS (Netherlands)

    Miao, W.; Agraz, F.; Peng, S.; Spadaro, S.; Bernini, G.; Perelló, J.; Zervas, G.; Nejabati, R.; Ciulli, Nicola; Simeonidou, D.; Dorren, H.; Calabretta, N.

    2015-01-01

    Optical packet switching (OPS) can enhance the performance of data center networks (DCNs)by providing fast and large-capacity switching capability. Benefiting from the software-defined networking (SDN) control plane, which could update the look-up-table (LUT) of the OPS, virtual DCNs can be flexibly

  9. Abnormal neural activities of directional brain networks in patients with long-term bilateral hearing loss.

    Science.gov (United States)

    Xu, Long-Chun; Zhang, Gang; Zou, Yue; Zhang, Min-Feng; Zhang, Dong-Sheng; Ma, Hua; Zhao, Wen-Bo; Zhang, Guang-Yu

    2017-10-13

    The objective of the study is to provide some implications for rehabilitation of hearing impairment by investigating changes of neural activities of directional brain networks in patients with long-term bilateral hearing loss. Firstly, we implemented neuropsychological tests of 21 subjects (11 patients with long-term bilateral hearing loss, and 10 subjects with normal hearing), and these tests revealed significant differences between the deaf group and the controls. Then we constructed the individual specific virtual brain based on functional magnetic resonance data of participants by utilizing effective connectivity and multivariate regression methods. We exerted the stimulating signal to the primary auditory cortices of the virtual brain and observed the brain region activations. We found that patients with long-term bilateral hearing loss presented weaker brain region activations in the auditory and language networks, but enhanced neural activities in the default mode network as compared with normally hearing subjects. Especially, the right cerebral hemisphere presented more changes than the left. Additionally, weaker neural activities in the primary auditor cortices were also strongly associated with poorer cognitive performance. Finally, causal analysis revealed several interactional circuits among activated brain regions, and these interregional causal interactions implied that abnormal neural activities of the directional brain networks in the deaf patients impacted cognitive function.

  10. Doubly Fed Induction Generator System Resonance Active Damping through Stator Virtual Impedance

    DEFF Research Database (Denmark)

    Song, Yipeng; Wang, Xiongfei; Blaabjerg, Frede

    2017-01-01

    (positive capacitor or negative inductor) into the stator branch through stator current feedforward control. The effectiveness of the DFIG system active damping control is verified by a 7.5 kW experimental down-scaled DFIG system, and simulation results of a commercial 2 MW DFIG system is provided as well....... converters/loads. This paper analyzes and explains first the HFR phenomenon between the DFIG system and a parallel compensated weak network (series RL + shunt C). Then on the basis of the DFIG system impedance modeling, an active damping control strategy is introduced by inserting a virtual impedance...... Frequency Resonance (HFR) due to the impedance interaction between the DFIG system and the weak grid network whose impedance is comparative large. Thus, it is important to implement an active damping for the HFR in order to ensure a safe and reliable operation of both the DFIG system and the grid connected...

  11. ANCS: Achieving QoS through Dynamic Allocation of Network Resources in Virtualized Clouds

    Directory of Open Access Journals (Sweden)

    Cheol-Ho Hong

    2016-01-01

    Full Text Available To meet the various requirements of cloud computing users, research on guaranteeing Quality of Service (QoS is gaining widespread attention in the field of cloud computing. However, as cloud computing platforms adopt virtualization as an enabling technology, it becomes challenging to distribute system resources to each user according to the diverse requirements. Although ample research has been conducted in order to meet QoS requirements, the proposed solutions lack simultaneous support for multiple policies, degrade the aggregated throughput of network resources, and incur CPU overhead. In this paper, we propose a new mechanism, called ANCS (Advanced Network Credit Scheduler, to guarantee QoS through dynamic allocation of network resources in virtualization. To meet the various network demands of cloud users, ANCS aims to concurrently provide multiple performance policies; these include weight-based proportional sharing, minimum bandwidth reservation, and maximum bandwidth limitation. In addition, ANCS develops an efficient work-conserving scheduling method for maximizing network resource utilization. Finally, ANCS can achieve low CPU overhead via its lightweight design, which is important for practical deployment.

  12. Application of the dynamically allocated virtual clustering management system to emulated tactical network experimentation

    Science.gov (United States)

    Marcus, Kelvin

    2014-06-01

    The U.S Army Research Laboratory (ARL) has built a "Network Science Research Lab" to support research that aims to improve their ability to analyze, predict, design, and govern complex systems that interweave the social/cognitive, information, and communication network genres. Researchers at ARL and the Network Science Collaborative Technology Alliance (NS-CTA), a collaborative research alliance funded by ARL, conducted experimentation to determine if automated network monitoring tools and task-aware agents deployed within an emulated tactical wireless network could potentially increase the retrieval of relevant data from heterogeneous distributed information nodes. ARL and NS-CTA required the capability to perform this experimentation over clusters of heterogeneous nodes with emulated wireless tactical networks where each node could contain different operating systems, application sets, and physical hardware attributes. Researchers utilized the Dynamically Allocated Virtual Clustering Management System (DAVC) to address each of the infrastructure support requirements necessary in conducting their experimentation. The DAVC is an experimentation infrastructure that provides the means to dynamically create, deploy, and manage virtual clusters of heterogeneous nodes within a cloud computing environment based upon resource utilization such as CPU load, available RAM and hard disk space. The DAVC uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex private networks. Clusters created by the DAVC system can be utilized for software development, experimentation, and integration with existing hardware and software. The goal of this paper is to explore how ARL and the NS-CTA leveraged the DAVC to create, deploy and manage multiple experimentation clusters to support their experimentation goals.

  13. Use of the Remote Access Virtual Environment Network (RAVEN) for coordinated IVA-EVA astronaut training and evaluation.

    Science.gov (United States)

    Cater, J P; Huffman, S D

    1995-01-01

    This paper presents a unique virtual reality training and assessment tool developed under a NASA grant, "Research in Human Factors Aspects of Enhanced Virtual Environments for Extravehicular Activity (EVA) Training and Simulation." The Remote Access Virtual Environment Network (RAVEN) was created to train and evaluate the verbal, mental and physical coordination required between the intravehicular (IVA) astronaut operating the Remote Manipulator System (RMS) arm and the EVA astronaut standing in foot restraints on the end of the RMS. The RAVEN system currently allows the EVA astronaut to approach the Hubble Space Telescope (HST) under control of the IVA astronaut and grasp, remove, and replace the Wide Field Planetary Camera drawer from its location in the HST. Two viewpoints, one stereoscopic and one monoscopic, were created all linked by Ethernet, that provided the two trainees with the appropriate training environments.

  14. Relative Panoramic Camera Position Estimation for Image-Based Virtual Reality Networks in Indoor Environments

    Science.gov (United States)

    Nakagawa, M.; Akano, K.; Kobayashi, T.; Sekiguchi, Y.

    2017-09-01

    Image-based virtual reality (VR) is a virtual space generated with panoramic images projected onto a primitive model. In imagebased VR, realistic VR scenes can be generated with lower rendering cost, and network data can be described as relationships among VR scenes. The camera network data are generated manually or by an automated procedure using camera position and rotation data. When panoramic images are acquired in indoor environments, network data should be generated without Global Navigation Satellite Systems (GNSS) positioning data. Thus, we focused on image-based VR generation using a panoramic camera in indoor environments. We propose a methodology to automate network data generation using panoramic images for an image-based VR space. We verified and evaluated our methodology through five experiments in indoor environments, including a corridor, elevator hall, room, and stairs. We confirmed that our methodology can automatically reconstruct network data using panoramic images for image-based VR in indoor environments without GNSS position data.

  15. RELATIVE PANORAMIC CAMERA POSITION ESTIMATION FOR IMAGE-BASED VIRTUAL REALITY NETWORKS IN INDOOR ENVIRONMENTS

    Directory of Open Access Journals (Sweden)

    M. Nakagawa

    2017-09-01

    Full Text Available Image-based virtual reality (VR is a virtual space generated with panoramic images projected onto a primitive model. In imagebased VR, realistic VR scenes can be generated with lower rendering cost, and network data can be described as relationships among VR scenes. The camera network data are generated manually or by an automated procedure using camera position and rotation data. When panoramic images are acquired in indoor environments, network data should be generated without Global Navigation Satellite Systems (GNSS positioning data. Thus, we focused on image-based VR generation using a panoramic camera in indoor environments. We propose a methodology to automate network data generation using panoramic images for an image-based VR space. We verified and evaluated our methodology through five experiments in indoor environments, including a corridor, elevator hall, room, and stairs. We confirmed that our methodology can automatically reconstruct network data using panoramic images for image-based VR in indoor environments without GNSS position data.

  16. Simulation analysis of security performance of DPSKOCDMA network via virtual user scheme

    Directory of Open Access Journals (Sweden)

    Vishav Jyoti

    2012-07-01

    Full Text Available A novel technique to enhance the security of an optical code division multipleaccess (OCDMA system against eavesdropping is proposed. It has been observed that whena single user is active in the network, an eavesdropper can easily sift the data beingtransmitted without decoding. To increase the security, a virtual user scheme is proposed andsimulated on a differential phase shift keying (DPSK OCDMA system. By using the virtualuser scheme, the security of the DPSK-OCDMA system can be effectively improved and themultiple access interference, which is generally considered to be a limitation of the OCDMAsystem, is used to increase the confidentiality of the system.

  17. Virtual reality training improves balance function.

    Science.gov (United States)

    Mao, Yurong; Chen, Peiming; Li, Le; Huang, Dongfeng

    2014-09-01

    Virtual reality is a new technology that simulates a three-dimensional virtual world on a computer and enables the generation of visual, audio, and haptic feedback for the full immersion of users. Users can interact with and observe objects in three-dimensional visual space without limitation. At present, virtual reality training has been widely used in rehabilitation therapy for balance dysfunction. This paper summarizes related articles and other articles suggesting that virtual reality training can improve balance dysfunction in patients after neurological diseases. When patients perform virtual reality training, the prefrontal, parietal cortical areas and other motor cortical networks are activated. These activations may be involved in the reconstruction of neurons in the cerebral cortex. Growing evidence from clinical studies reveals that virtual reality training improves the neurological function of patients with spinal cord injury, cerebral palsy and other neurological impairments. These findings suggest that virtual reality training can activate the cerebral cortex and improve the spatial orientation capacity of patients, thus facilitating the cortex to control balance and increase motion function.

  18. Virtual reality training improves balance function

    Science.gov (United States)

    Mao, Yurong; Chen, Peiming; Li, Le; Huang, Dongfeng

    2014-01-01

    Virtual reality is a new technology that simulates a three-dimensional virtual world on a computer and enables the generation of visual, audio, and haptic feedback for the full immersion of users. Users can interact with and observe objects in three-dimensional visual space without limitation. At present, virtual reality training has been widely used in rehabilitation therapy for balance dysfunction. This paper summarizes related articles and other articles suggesting that virtual reality training can improve balance dysfunction in patients after neurological diseases. When patients perform virtual reality training, the prefrontal, parietal cortical areas and other motor cortical networks are activated. These activations may be involved in the reconstruction of neurons in the cerebral cortex. Growing evidence from clinical studies reveals that virtual reality training improves the neurological function of patients with spinal cord injury, cerebral palsy and other neurological impairments. These findings suggest that virtual reality training can activate the cerebral cortex and improve the spatial orientation capacity of patients, thus facilitating the cortex to control balance and increase motion function. PMID:25368651

  19. Links between real and virtual networks: a comparative study of online communities in Japan and Korea.

    Science.gov (United States)

    Ishii, Kenichi; Ogasahara, Morihiro

    2007-04-01

    The present study explores how online communities affect real-world personal relations based on a cross-cultural survey conducted in Japan and Korea. Findings indicate that the gratifications of online communities moderate the effects of online communities on social participation. Online communities are categorized into a real-group-based community and a virtual-network-based community. The membership of real-group-based online community is positively correlated with social bonding gratification and negatively correlated with information- seeking gratification. Japanese users prefer more virtual-network-based online communities, while their Korean counterparts prefer real-group-based online communities. Korean users are more active in online communities and seek a higher level of socializing gratifications, such as social bonding and making new friends, when compared with their Japanese counterparts. These results indicate that in Korea, personal relations via the online community are closely associated with the real-world personal relations, but this is not the case in Japan. This study suggests that the effects of the Internet are culture-specific and that the online community can serve a different function in different cultural environments.

  20. Secure transfer of surveillance data over Internet using Virtual Private Network technology. Field trial between STUK and IAEA

    International Nuclear Information System (INIS)

    Smartt, H.; Martinez, R.; Caskey, S.; Honkamaa, T.; Ilander, T.; Poellaenen, R.; Jeremica, N.; Ford, G.

    2000-01-01

    One of the primary concerns of employing remote monitoring technologies for IAEA safeguards applications is the high cost of data transmission. Transmitting data over the Internet has been shown often to be less expensive than other data transmission methods. However, data security of the Internet is often considered to be at a low level. Virtual Private Networks has emerged as a solution to this problem. A field demonstration was implemented to evaluate the use of Virtual Private Networks (via the Internet) as a means for data transmission. Evaluation points included security, reliability and cost. The existing Finnish Remote Environmental Monitoring System, located at the STUK facility in Helsinki, Finland, served as the field demonstration system. Sandia National Laboratories (SNL) established a Virtual Private Network between STUK (Radiation and Nuclear Safety Authority) Headquarters in Helsinki, Finland, and IAEA Headquarters in Vienna, Austria. Data from the existing STUK Remote Monitoring System was viewed at the IAEA via this network. The Virtual Private Network link was established in a proper manner, which guarantees the data security. Encryption was verified using a network sniffer. No problems were? encountered during the test. In the test system, fixed costs were higher than in the previous system, which utilized telephone lines. On the other hand transmission and operating costs are very low. Therefore, with low data amounts, the test system is not cost-effective, but if the data amount is tens of Megabytes per day the use of Virtual Private Networks and Internet will be economically justifiable. A cost-benefit analysis should be performed for each site due to significant variables. (orig.)

  1. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks

    Directory of Open Access Journals (Sweden)

    Wenquan Jin

    2018-05-01

    Full Text Available The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  2. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    Science.gov (United States)

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  3. On-demand virtual optical network access using 100 Gb/s Ethernet.

    Science.gov (United States)

    Ishida, Osamu; Takamichi, Toru; Arai, Sachine; Kawate, Ryusuke; Toyoda, Hidehiro; Morita, Itsuro; Araki, Soichiro; Ichikawa, Toshiyuki; Hoshida, Takeshi; Murai, Hitoshi

    2011-12-12

    Our Terabit LAN initiatives attempt to enhance the scalability and utilization of lambda resources. This paper describes bandwidth-on-demand virtualized 100GE access to WDM networks on a field fiber test-bed using multi-domain optical-path provisioning. © 2011 Optical Society of America

  4. TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration

    Directory of Open Access Journals (Sweden)

    Pierre St Juste

    2014-10-01

    Full Text Available Virtual private networking (VPN has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic is tunneled through a VPN gateway. Nonetheless, there are several use case scenarios that require a model where end-to-end VPN links are tunneled upon existing Internet infrastructure in a peer-to-peer (P2P fashion, removing the bottleneck of a centralized VPN gateway. We propose a novel virtual network — TinCan — based on peerto-peer private network tunnels. It reuses existing standards and implementations of services for discovery notification (XMPP, reflection (STUN and relaying (TURN, facilitating configuration. In this approach, trust relationships maintained by centralized (or federated services are automatically mapped to TinCan links. In one use scenario, TinCan allows unstructured P2P overlays connecting trusted end-user devices — while only requiring VPN software on user devices and leveraging online social network (OSN infrastructure already widely deployed. This paper describes the architecture and design of TinCan and presents an experimental evaluation of a prototype supporting Windows, Linux, and Android mobile devices. Results quantify the overhead introduced by the network virtualization layer, and the resource requirements imposed on services needed to bootstrap TinCan links.

  5. State-of-the-art on Virtualization and Software Defined Networking for Efficient Resource Allocation on Multi-tenant 5G Networks

    Directory of Open Access Journals (Sweden)

    Tsirakis Christos

    2017-01-01

    Full Text Available Global data traffic explosion is expected to set stringent requirements for next generation networks in the next decades. Besides, very low latencies will have to be guaranteed for enabling new delay critical services. However, current Software Defined Networking (SDN solutions have limitations in terms of separating both data and control planes among tenants/operators, and the capability to adapt to new or changing requirements. Moreover, some virtualization schemes do not ensure isolation of resources and do not guarantee bandwidth across the entities. While some others fail to provide flexibility to the slices to customize the resource allocation across the users. Therefore, novel SDN and virtualization techniques should be implemented to realize the upcoming 5G network that will facilitate at least efficient resource allocation and multi-tenancy among the plethora of different requirements.

  6. Constructing Battery-Aware Virtual Backbones in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yang Yuanyuan

    2007-01-01

    Full Text Available A critical issue in battery-powered sensor networks is to construct energy efficient virtual backbones for network routing. Recent study in battery technology reveals that batteries tend to discharge more power than needed and reimburse the over-discharged power if they are recovered. In this paper we first provide a mathematical battery model suitable for implementation in sensor networks. We then introduce the concept of battery-aware connected dominating set (BACDS and show that in general the minimum BACDS (MBACDS can achieve longer lifetime than the previous backbone structures. Then we show that finding a MBACDS is NP-hard and give a distributed approximation algorithm to construct the BACDS. The resulting BACDS constructed by our algorithm is at most opt size, where is the maximum node degree and opt is the size of an optimal BACDS. Simulation results show that the BACDS can save a significant amount of energy and achieve up to longer network lifetime than previous schemes.

  7. Multisensory Integration in the Virtual Hand Illusion with Active Movement.

    Science.gov (United States)

    Choi, Woong; Li, Liang; Satoh, Satoru; Hachimura, Kozaburo

    2016-01-01

    Improving the sense of immersion is one of the core issues in virtual reality. Perceptual illusions of ownership can be perceived over a virtual body in a multisensory virtual reality environment. Rubber Hand and Virtual Hand Illusions showed that body ownership can be manipulated by applying suitable visual and tactile stimulation. In this study, we investigate the effects of multisensory integration in the Virtual Hand Illusion with active movement. A virtual xylophone playing system which can interactively provide synchronous visual, tactile, and auditory stimulation was constructed. We conducted two experiments regarding different movement conditions and different sensory stimulations. Our results demonstrate that multisensory integration with free active movement can improve the sense of immersion in virtual reality.

  8. A network-based multi-target computational estimation scheme for anticoagulant activities of compounds.

    Directory of Open Access Journals (Sweden)

    Qian Li

    Full Text Available BACKGROUND: Traditional virtual screening method pays more attention on predicted binding affinity between drug molecule and target related to a certain disease instead of phenotypic data of drug molecule against disease system, as is often less effective on discovery of the drug which is used to treat many types of complex diseases. Virtual screening against a complex disease by general network estimation has become feasible with the development of network biology and system biology. More effective methods of computational estimation for the whole efficacy of a compound in a complex disease system are needed, given the distinct weightiness of the different target in a biological process and the standpoint that partial inhibition of several targets can be more efficient than the complete inhibition of a single target. METHODOLOGY: We developed a novel approach by integrating the affinity predictions from multi-target docking studies with biological network efficiency analysis to estimate the anticoagulant activities of compounds. From results of network efficiency calculation for human clotting cascade, factor Xa and thrombin were identified as the two most fragile enzymes, while the catalytic reaction mediated by complex IXa:VIIIa and the formation of the complex VIIIa:IXa were recognized as the two most fragile biological matter in the human clotting cascade system. Furthermore, the method which combined network efficiency with molecular docking scores was applied to estimate the anticoagulant activities of a serial of argatroban intermediates and eight natural products respectively. The better correlation (r = 0.671 between the experimental data and the decrease of the network deficiency suggests that the approach could be a promising computational systems biology tool to aid identification of anticoagulant activities of compounds in drug discovery. CONCLUSIONS: This article proposes a network-based multi-target computational estimation

  9. A network-based multi-target computational estimation scheme for anticoagulant activities of compounds.

    Science.gov (United States)

    Li, Qian; Li, Xudong; Li, Canghai; Chen, Lirong; Song, Jun; Tang, Yalin; Xu, Xiaojie

    2011-03-22

    Traditional virtual screening method pays more attention on predicted binding affinity between drug molecule and target related to a certain disease instead of phenotypic data of drug molecule against disease system, as is often less effective on discovery of the drug which is used to treat many types of complex diseases. Virtual screening against a complex disease by general network estimation has become feasible with the development of network biology and system biology. More effective methods of computational estimation for the whole efficacy of a compound in a complex disease system are needed, given the distinct weightiness of the different target in a biological process and the standpoint that partial inhibition of several targets can be more efficient than the complete inhibition of a single target. We developed a novel approach by integrating the affinity predictions from multi-target docking studies with biological network efficiency analysis to estimate the anticoagulant activities of compounds. From results of network efficiency calculation for human clotting cascade, factor Xa and thrombin were identified as the two most fragile enzymes, while the catalytic reaction mediated by complex IXa:VIIIa and the formation of the complex VIIIa:IXa were recognized as the two most fragile biological matter in the human clotting cascade system. Furthermore, the method which combined network efficiency with molecular docking scores was applied to estimate the anticoagulant activities of a serial of argatroban intermediates and eight natural products respectively. The better correlation (r = 0.671) between the experimental data and the decrease of the network deficiency suggests that the approach could be a promising computational systems biology tool to aid identification of anticoagulant activities of compounds in drug discovery. This article proposes a network-based multi-target computational estimation method for anticoagulant activities of compounds by

  10. Saving Money and Time with Virtual Server

    CERN Document Server

    Sanders, Chris

    2006-01-01

    Microsoft Virtual Server 2005 consistently proves to be worth its weight in gold, with new implementations thought up every day. With this product now a free download from Microsoft, scores of new users are able to experience what the power of virtualization can do for their networks. This guide is aimed at network administrators who are interested in ways that Virtual Server 2005 can be implemented in their organizations in order to save money and increase network productivity. It contains information on setting up a virtual network, virtual consolidation, virtual security, virtual honeypo

  11. Building a sense of virtual community: the role of the features of social networking sites.

    Science.gov (United States)

    Chen, Chi-Wen; Lin, Chiun-Sin

    2014-07-01

    In recent years, social networking sites have received increased attention because of the potential of this medium to transform business by building virtual communities. However, theoretical and empirical studies investigating how specific features of social networking sites contribute to building a sense of virtual community (SOVC)-an important dimension of a successful virtual community-are rare. Furthermore, SOVC scales have been developed, and research on this issue has been called for, but few studies have heeded this call. On the basis of prior literature, this study proposes that perceptions of the three most salient features of social networking sites-system quality (SQ), information quality (IQ), and social information exchange (SIE)-play a key role in fostering SOVC. In particular, SQ is proposed to increase IQ and SIE, and SIE is proposed to enhance IQ, both of which thereafter build SOVC. The research model was examined in the context of Facebook, one of the most popular social networking sites in the world. We adopted Blanchard's scales to measure SOVC. Data gathered using a Web-based questionnaire, and analyzed with partial least squares, were utilized to test the model. The results demonstrate that SIE, SQ, and IQ are the factors that form SOVC. The findings also suggest that SQ plays a fundamental role in supporting SIE and IQ in social networking sites. Implications for theory, practice, and future research directions are discussed.

  12. Multisensory Integration in the Virtual Hand Illusion with Active Movement

    Directory of Open Access Journals (Sweden)

    Woong Choi

    2016-01-01

    Full Text Available Improving the sense of immersion is one of the core issues in virtual reality. Perceptual illusions of ownership can be perceived over a virtual body in a multisensory virtual reality environment. Rubber Hand and Virtual Hand Illusions showed that body ownership can be manipulated by applying suitable visual and tactile stimulation. In this study, we investigate the effects of multisensory integration in the Virtual Hand Illusion with active movement. A virtual xylophone playing system which can interactively provide synchronous visual, tactile, and auditory stimulation was constructed. We conducted two experiments regarding different movement conditions and different sensory stimulations. Our results demonstrate that multisensory integration with free active movement can improve the sense of immersion in virtual reality.

  13. Network Analysis of a Virtual Community of Learning of Economics Educators

    Science.gov (United States)

    Fontainha, Elsa; Martins, Jorge Tiago; Vasconcelos, Ana Cristina

    2015-01-01

    Introduction: This paper aims at understanding virtual communities of learning in terms of dynamics, types of knowledge shared by participants, and network characteristics such as size, relationships, density, and centrality of participants. It looks at the relationships between these aspects and the evolution of communities of learning. It…

  14. SDN/NFV orchestration for dynamic deployment of virtual SDN controllers as VNF for multi-tenant optical networks

    OpenAIRE

    Muñoz, Raül; Vilalta, Ricard; Casellas, Ramon; Martínez, Ricardo; Szyrkowiec, T.; Autenrieth, A.; López, Víctor; López, D.

    2015-01-01

    We propose to virtualize the SDN control functions and move them to the cloud. We experimentally evaluate the first SDN/NFV orchestration architecture to dynamically deploy independent SDN controller instances for each deployed virtual optical network.

  15. Three Dimensional Virtual Environments as a Tool for Development of Personal Learning Networks

    Directory of Open Access Journals (Sweden)

    Aggeliki Nikolaou

    2013-01-01

    Full Text Available Technological advances have altered how, where, when, and what information is created, presented and diffused in working and social environments as well as how learners interact with that information. Virtual worlds constitute an emerging realm for collaborative play, learning and work. This paper describes how virtual worlds provide a mechanism to facilitate the creation and development of Personal Learning Networks. This qualitative investigation focuses on the role of three-dimensional virtual environments (3DVEs in the creation and development of Personal Learning Networks (PLNs. More specifically, this work investigates the reasons that drive members of Education Orientated Groups (hereafter “Groups” in Second Life (SL, to adopt a technological innovation as a milieu of learning, the ways they use it and the types of learning that are occurring in it. The authors also discuss the collaborative and social characteristics of these environments which, provide access to excellence of a specific area of interest and promote innovative ideas on a global scale, through sharing educational resources and developing good educational practices without spatial and temporal constraints.

  16. A Social Network Analysis of Teaching and Research Collaboration in a Teachers' Virtual Learning Community

    Science.gov (United States)

    Lin, Xiaofan; Hu, Xiaoyong; Hu, Qintai; Liu, Zhichun

    2016-01-01

    Analysing the structure of a social network can help us understand the key factors influencing interaction and collaboration in a virtual learning community (VLC). Here, we describe the mechanisms used in social network analysis (SNA) to analyse the social network structure of a VLC for teachers and discuss the relationship between face-to-face…

  17. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases

    Science.gov (United States)

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-01-01

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients’ brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies. PMID:25206907

  18. Virtual reality interface devices in the reorganization of neural networks in the brain of patients with neurological diseases.

    Science.gov (United States)

    Gatica-Rojas, Valeska; Méndez-Rebolledo, Guillermo

    2014-04-15

    Two key characteristics of all virtual reality applications are interaction and immersion. Systemic interaction is achieved through a variety of multisensory channels (hearing, sight, touch, and smell), permitting the user to interact with the virtual world in real time. Immersion is the degree to which a person can feel wrapped in the virtual world through a defined interface. Virtual reality interface devices such as the Nintendo® Wii and its peripheral nunchuks-balance board, head mounted displays and joystick allow interaction and immersion in unreal environments created from computer software. Virtual environments are highly interactive, generating great activation of visual, vestibular and proprioceptive systems during the execution of a video game. In addition, they are entertaining and safe for the user. Recently, incorporating therapeutic purposes in virtual reality interface devices has allowed them to be used for the rehabilitation of neurological patients, e.g., balance training in older adults and dynamic stability in healthy participants. The improvements observed in neurological diseases (chronic stroke and cerebral palsy) have been shown by changes in the reorganization of neural networks in patients' brain, along with better hand function and other skills, contributing to their quality of life. The data generated by such studies could substantially contribute to physical rehabilitation strategies.

  19. Virtual resistive network and conductivity reconstruction with Faraday's law

    International Nuclear Information System (INIS)

    Lee, Min Gi; Ko, Min-Su; Kim, Yong-Jung

    2014-01-01

    A network-based conductivity reconstruction method is introduced using the third Maxwell equation, or Faraday's law, for a static case. The usual choice in electrical impedance tomography is the divergence-free equation for the electrical current density. However, if the electrical current density is given, the curl-free equation for the electrical field gives a direct relation between the current and the conductivity and this relation is used in this paper. Mimetic discretization is applied to the equation, which gives the virtual resistive network system. Properties of the numerical schemes introduced are investigated and their advantages over other conductivity reconstruction methods are discussed. Numerically simulated results, with an analysis of noise propagation, are presented. (paper)

  20. Virtual optical network provisioning with unified service logic processing model for software-defined multidomain optical networks

    Science.gov (United States)

    Zhao, Yongli; Li, Shikun; Song, Yinan; Sun, Ji; Zhang, Jie

    2015-12-01

    Hierarchical control architecture is designed for software-defined multidomain optical networks (SD-MDONs), and a unified service logic processing model (USLPM) is first proposed for various applications. USLPM-based virtual optical network (VON) provisioning process is designed, and two VON mapping algorithms are proposed: random node selection and per controller computation (RNS&PCC) and balanced node selection and hierarchical controller computation (BNS&HCC). Then an SD-MDON testbed is built with OpenFlow extension in order to support optical transport equipment. Finally, VON provisioning service is experimentally demonstrated on the testbed along with performance verification.

  1. Virtual Seminar Room

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Fosgerau, Anders; Hansen, Peter Søren Kirk

    1999-01-01

    The initial design considerations and research goals for an ATM network based virtual seminar room with 5 sites are presented.......The initial design considerations and research goals for an ATM network based virtual seminar room with 5 sites are presented....

  2. Artificial neural networks and neuro-fuzzy inference systems as virtual sensors for hydrogen safety prediction

    Energy Technology Data Exchange (ETDEWEB)

    Karri, Vishy; Ho, Tien [School of Engineering, University of Tasmania, GPO Box 252-65, Hobart, Tasmania 7001 (Australia); Madsen, Ole [Department of Production, Aalborg University, Fibigerstraede 16, DK-9220 Aalborg (Denmark)

    2008-06-15

    Hydrogen is increasingly investigated as an alternative fuel to petroleum products in running internal combustion engines and as powering remote area power systems using generators. The safety issues related to hydrogen gas are further exasperated by expensive instrumentation required to measure the percentage of explosive limits, flow rates and production pressure. This paper investigates the use of model based virtual sensors (rather than expensive physical sensors) in connection with hydrogen production with a Hogen 20 electrolyzer system. The virtual sensors are used to predict relevant hydrogen safety parameters, such as the percentage of lower explosive limit, hydrogen pressure and hydrogen flow rate as a function of different input conditions of power supplied (voltage and current), the feed of de-ionized water and Hogen 20 electrolyzer system parameters. The virtual sensors are developed by means of the application of various Artificial Intelligent techniques. To train and appraise the neural network models as virtual sensors, the Hogen 20 electrolyzer is instrumented with necessary sensors to gather experimental data which together with MATLAB neural networks toolbox and tailor made adaptive neuro-fuzzy inference systems (ANFIS) were used as predictive tools to estimate hydrogen safety parameters. It was shown that using the neural networks hydrogen safety parameters were predicted to less than 3% of percentage average root mean square error. The most accurate prediction was achieved by using ANFIS. (author)

  3. Virtualization in network and servers infrastructure to support dynamic system reconfiguration in ALMA

    Science.gov (United States)

    Shen, Tzu-Chiang; Ovando, Nicolás.; Bartsch, Marcelo; Simmond, Max; Vélez, Gastón; Robles, Manuel; Soto, Rubén.; Ibsen, Jorge; Saldias, Christian

    2012-09-01

    ALMA is the first astronomical project being constructed and operated under industrial approach due to the huge amount of elements involved. In order to achieve the maximum through put during the engineering and scientific commissioning phase, several production lines have been established to work in parallel. This decision required modification in the original system architecture in which all the elements are controlled and operated within a unique Standard Test Environment (STE). The advance in the network industry and together with the maturity of virtualization paradigm allows us to provide a solution which can replicate the STE infrastructure without changing their network address definition. This is only possible with Virtual Routing and Forwarding (VRF) and Virtual LAN (VLAN) concepts. The solution allows dynamic reconfiguration of antennas and other hardware across the production lines with minimum time and zero human intervention in the cabling. We also push the virtualization even further, classical rack mount servers are being replaced and consolidated by blade servers. On top of them virtualized server are centrally administrated with VMWare ESX. Hardware costs and system administration effort will be reduced considerably. This mechanism has been established and operated successfully during the last two years. This experience gave us confident to propose a solution to divide the main operation array into subarrays using the same concept which will introduce huge flexibility and efficiency for ALMA operation and eventually may simplify the complexity of ALMA core observing software since there will be no need to deal with subarrays complexity at software level.

  4. Intra and Inter-PON ONU to ONU Virtual Private Networking using OFDMA in a Ring Topology

    DEFF Research Database (Denmark)

    Deng, Lei; Zhao, Ying; Pang, Xiaodan

    2011-01-01

    Abstract—In this paper, we propose a novel WDM-PON architecture to support efficient and bandwidth-scalable virtual private network (VPN) emulation over both inter-PON and intra- PON. The virtual ring link for the VPN communications among ONUs is realized by using additionally low-cost optical pa...

  5. Investigating Factors Related to Virtual Private Network Adoption in Small Businesses

    Science.gov (United States)

    Lederer, Karen

    2012-01-01

    The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…

  6. Constructing Battery-Aware Virtual Backbones in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chi Ma

    2007-05-01

    Full Text Available A critical issue in battery-powered sensor networks is to construct energy efficient virtual backbones for network routing. Recent study in battery technology reveals that batteries tend to discharge more power than needed and reimburse the over-discharged power if they are recovered. In this paper we first provide a mathematical battery model suitable for implementation in sensor networks. We then introduce the concept of battery-aware connected dominating set (BACDS and show that in general the minimum BACDS (MBACDS can achieve longer lifetime than the previous backbone structures. Then we show that finding a MBACDS is NP-hard and give a distributed approximation algorithm to construct the BACDS. The resulting BACDS constructed by our algorithm is at most (8+Δopt size, where Δ is the maximum node degree and opt is the size of an optimal BACDS. Simulation results show that the BACDS can save a significant amount of energy and achieve up to 30% longer network lifetime than previous schemes.

  7. Classification of EMG signals using artificial neural networks for virtual hand prosthesis control.

    Science.gov (United States)

    Mattioli, Fernando E R; Lamounier, Edgard A; Cardoso, Alexandre; Soares, Alcimar B; Andrade, Adriano O

    2011-01-01

    Computer-based training systems have been widely studied in the field of human rehabilitation. In health applications, Virtual Reality presents itself as an appropriate tool to simulate training environments without exposing the patients to risks. In particular, virtual prosthetic devices have been used to reduce the great mental effort needed by patients fitted with myoelectric prosthesis, during the training stage. In this paper, the application of Virtual Reality in a hand prosthesis training system is presented. To achieve this, the possibility of exploring Neural Networks in a real-time classification system is discussed. The classification technique used in this work resulted in a 95% success rate when discriminating 4 different hand movements.

  8. The Resource Mapping Algorithm of Wireless Virtualized Networks for Saving Energy in Ultradense Small Cells

    Directory of Open Access Journals (Sweden)

    Sai Zou

    2015-01-01

    Full Text Available As the current network is designed for peak loads, it results in insufficient resource utilization and energy waste. Virtualized technology makes it possible that intelligent energy perception network could be deployed and resource sharing could become an effective energy saving technology. How to make more small cells into sleeping state for energy saving in ultradense small cell system has become a research hot spot. Based on the mapping feature of virtualized network, a new wireless resource mapping algorithm for saving energy in ultradense small cells has been put forward when wireless resource amount is satisfied in every small cell. First of all, the method divides the virtual cells. Again through the alternate updating between small cell mapping and wireless resource allocation, least amount of small cells is used and other small cells turn into sleeping state on the premise of guaranteeing users’ QoS. Next, the energy consumption of the wireless access system, wireless resource utilization, and the convergence of the proposed algorithm are analyzed in theory. Finally, the simulation results demonstrate that the algorithm can effectively reduce the system energy consumption and required wireless resource amount under the condition of satisfying users’ QoS.

  9. Development of virtual private network for JT-60SA CAD integration

    International Nuclear Information System (INIS)

    Oshima, Takayuki; Fujita, Takaaki; Seki, Masami; Kawashima, Hisato; Hoshino, Katsumichi; Shibanuma, Kiyoshi; Verrecchia, M.; Teuchner, B.

    2010-01-01

    The CAD models will be exchanged and integrated at Naka for JT-60SA, a common computer network efficiently connected between Naka site and the Garching site is needed to be established. Virtual Private Network (VPN) was introduced with LAN on computer network physically-separated from JAEA intranet area and firewall. In July 2009, a new VPN connection between the Naka and Garching sites has been successfully demonstrated using IPSec-VPN technology with a commercial and cost-effective firewall/router for security. It was found that the introduction of the Wide Area File Service (WAFS) could solve the issue of the data transmission time and enhance the usability of the VPN for design integration in JT-60SA. (author)

  10. Virtual target tracking (VTT) as applied to mobile satellite communication networks

    Science.gov (United States)

    Amoozegar, Farid

    1999-08-01

    Traditionally, target tracking has been used for aerospace applications, such as, tracking highly maneuvering targets in a cluttered environment for missile-to-target intercept scenarios. Although the speed and maneuvering capability of current aerospace targets demand more efficient algorithms, many complex techniques have already been proposed in the literature, which primarily cover the defense applications of tracking methods. On the other hand, the rapid growth of Global Communication Systems, Global Information Systems (GIS), and Global Positioning Systems (GPS) is creating new and more diverse challenges for multi-target tracking applications. Mobile communication and computing can very well appreciate a huge market for Cellular Communication and Tracking Devices (CCTD), which will be tracking networked devices at the cellular level. The objective of this paper is to introduce a new concept, i.e., Virtual Target Tracking (VTT) for commercial applications of multi-target tracking algorithms and techniques as applied to mobile satellite communication networks. It would be discussed how Virtual Target Tracking would bring more diversity to target tracking research.

  11. Empathic Cyberactivism: The Potential of Hyperconnected Social Media Networks and Empathic Virtual Reality for Feminism

    Directory of Open Access Journals (Sweden)

    Penelope Kemekenidou

    2016-10-01

    Full Text Available The rise of misogyny on social networks feels both devastating and endless. Whether one believes that misogyny has risen to a new level, or that it has simply become more visible through the internet, one thing is clear: with the ubiquity and accessibility of ‘immortal’ online information, harassment and discrimination, shared via hyperconnected social media networks, can be taken to a new, much more visible level. Hyperconnectivity enables sexism to multiply on the web – but it can also be the solution to fight it. In the context of activism, hyperconnectivity can be a major force to combat inequality—given that this hyperconnectivity is linked to empathy and not aggression. If this is the case, I argue, new technologies, for example virtual reality, open up new spaces of empathetic interaction.

  12. Design and implementation of dynamic hybrid Honeypot network

    Science.gov (United States)

    Qiao, Peili; Hu, Shan-Shan; Zhai, Ji-Qiang

    2013-05-01

    The method of constructing a dynamic and self-adaptive virtual network is suggested to puzzle adversaries, delay and divert attacks, exhaust attacker resources and collect attacking information. The concepts of Honeypot and Honeyd, which is the frame of virtual Honeypot are introduced. The techniques of network scanning including active fingerprint recognition are analyzed. Dynamic virtual network system is designed and implemented. A virtual network similar to real network topology is built according to the collected messages from real environments in this system. By doing this, the system can perplex the attackers when Hackers attack and can further analyze and research the attacks. The tests to this system prove that this design can successfully simulate real network environment and can be used in network security analysis.

  13. Structure and relationships within global manufacturing virtual networks

    Directory of Open Access Journals (Sweden)

    José Ramón Vilana

    2009-04-01

    Full Text Available Global Manufacturing Virtual Networks (GMVNs are dynamically changing organizations formed by Original Equipment Manufacturers (OEMs, Contract Manufacturers (CMs, turn-key and component suppliers, R+D centres and distributors. These networks establish a new type of vertical and horizontal relations between independent companies or even competitors where it is not needed to maintain internal manufacturing resources but to manage and share the network resources. The fluid relations that exist within the GMVNs allow them a very permeable organization easy to connect and disconnect from one to each other as well as to choose a set of partners with specific attributes. The result is a highly flexible system characterized by low barriers to entry and exit, geographic flexibility, low costs, rapid technological diffusion, high diversification through contract manufacturers and exceptional economies of scale. Anyhow, there are three major drawbacks in the GMVNs that should be considered at the beginning of this type of collaborations: 1 the risk of contract manufacturers to develop their own end-products in competition with their customers; 2 the technology transfer between competitors OEMs through other members of the GMVN and 3 the lose of process expertise by the OEMs the more they outsource manufacturing processes to the network.

  14. Virtual Environments for Visualizing Structural Health Monitoring Sensor Networks, Data, and Metadata.

    Science.gov (United States)

    Napolitano, Rebecca; Blyth, Anna; Glisic, Branko

    2018-01-16

    Visualization of sensor networks, data, and metadata is becoming one of the most pivotal aspects of the structural health monitoring (SHM) process. Without the ability to communicate efficiently and effectively between disparate groups working on a project, an SHM system can be underused, misunderstood, or even abandoned. For this reason, this work seeks to evaluate visualization techniques in the field, identify flaws in current practices, and devise a new method for visualizing and accessing SHM data and metadata in 3D. More precisely, the work presented here reflects a method and digital workflow for integrating SHM sensor networks, data, and metadata into a virtual reality environment by combining spherical imaging and informational modeling. Both intuitive and interactive, this method fosters communication on a project enabling diverse practitioners of SHM to efficiently consult and use the sensor networks, data, and metadata. The method is presented through its implementation on a case study, Streicker Bridge at Princeton University campus. To illustrate the efficiency of the new method, the time and data file size were compared to other potential methods used for visualizing and accessing SHM sensor networks, data, and metadata in 3D. Additionally, feedback from civil engineering students familiar with SHM is used for validation. Recommendations on how different groups working together on an SHM project can create SHM virtual environment and convey data to proper audiences, are also included.

  15. From physical to virtual: interpersonal relations generating networks among students of a graduate course

    Directory of Open Access Journals (Sweden)

    Roberto Vilmar Satur

    2015-09-01

    Full Text Available Introduction: Nowadays, the social networks are more present in people’s daily lives, especially students, becoming a reality in the educational environment. More than entertainment, these networks have been a valuable interaction tools to passing information through. Objective: In this scenario, the aim of this research is to observe the interpersonal and intragroup interaction abilities in a group of undergraduate students in a public university in order to understand the formation and expansion of social networks initiated through personal contact and extended to the virtual universe. In that sense, it aims specifically at mapping the students interpersonal interactions in the creation of social networks and the expansion of their relations. It describes which are the most used forms of interaction and it gets a basic profile data of the actors. Methodology: To better understand the reality of these subjects it has been adopted as an instrument of data collection, a questionnaire consisting of closed questions directed to students of the course mentioned. A total of 95 student names were enrolled in the course in last May, who could be marked by the respondents. The survey was carried out throughout June 2014 and tallied 71 answered questionnaires. After the data collection, the data were tabulate and it was applied the Gephi software. Results: The results show a tendency to form an extensive network within the course, but it is more intense among certain students, forming small groups and the existence of actors-bridge. The article also showed that there was a clear transposition from the personal relationship contact to the virtual environment. Conclusion: Social networks can increasingly serve as a space for communication and interaction, although the use of these networks in education is related to the teaching and learning process, making advances in the ways of interaction and access to information and search among its users

  16. An efficient routing algorithm for event based monitoring in a plant using virtual sink nodes in a wireless sensor network

    International Nuclear Information System (INIS)

    Jain, Sanjay Kumar; Vietla, Srinivas; Roy, D.A.; Biswas, B.B.; Pithawa, C.K.

    2010-01-01

    A Wireless Sensor Network is a collection of wireless sensor nodes arranged in a self-forming network without aid of any infrastructure or administration. The individual nodes have limited resources and hence efficient communication mechanisms between the nodes have to be devised for continued operation of the network in a plant environment. In wireless sensor networks a sink node or base station at one end acts as the recipient of information gathered by all other sensor nodes in the network and the information arrives at the sink through multiple hops across the nodes of the network. A routing algorithm has been developed in which a virtual sink node is generated whenever hop count of an ordinary node crosses a certain specified value. The virtual sink node acts as a recipient node for data of all neighboring nodes. This virtual sink helps in reducing routing overhead, especially when the sensor network is scaled to a larger network. The advantages with this scheme are less energy consumption, reduced congestion in the network and longevity of the network. The above algorithm is suitable for event based or interval based monitoring systems in nuclear plants. This paper describes the working of the proposed algorithm and provides its implementation details. (author)

  17. Using Virtual Pets to Promote Physical Activity in Children: An Application of the Youth Physical Activity Promotion Model.

    Science.gov (United States)

    Ahn, Sun Joo Grace; Johnsen, Kyle; Robertson, Tom; Moore, James; Brown, Scott; Marable, Amanda; Basu, Aryabrata

    2015-01-01

    A virtual pet was developed based on the framework of the youth physical activity promotion model and tested as a vehicle for promoting physical activity in children. Children in the treatment group interacted with the virtual pet for three days, setting physical activity goals and teaching tricks to the virtual pet when their goals were met. The virtual pet became more fit and learned more sophisticated tricks as the children achieved activity goals. Children in the control group interacted with a computer system presenting equivalent features but without the virtual pet. Physical activity and goal attainment were evaluated using activity monitors. Results indicated that children in the treatment group engaged in 1.09 more hours of daily physical activity (156% more) than did those in the control group. Physical activity self-efficacy and beliefs served as mediators driving this increase in activity. Children that interacted with the virtual pet also expressed higher intentions than children in the control group to continue physical activity in the future. Theoretical and practical potentials of using a virtual pet to systematically promote physical activity in children are discussed.

  18. Virtual sensors for active noise control in acoustic-structural coupled enclosures using structural sensing: robust virtual sensor design.

    Science.gov (United States)

    Halim, Dunant; Cheng, Li; Su, Zhongqing

    2011-03-01

    The work was aimed to develop a robust virtual sensing design methodology for sensing and active control applications of vibro-acoustic systems. The proposed virtual sensor was designed to estimate a broadband acoustic interior sound pressure using structural sensors, with robustness against certain dynamic uncertainties occurring in an acoustic-structural coupled enclosure. A convex combination of Kalman sub-filters was used during the design, accommodating different sets of perturbed dynamic model of the vibro-acoustic enclosure. A minimax optimization problem was set up to determine an optimal convex combination of Kalman sub-filters, ensuring an optimal worst-case virtual sensing performance. The virtual sensing and active noise control performance was numerically investigated on a rectangular panel-cavity system. It was demonstrated that the proposed virtual sensor could accurately estimate the interior sound pressure, particularly the one dominated by cavity-controlled modes, by using a structural sensor. With such a virtual sensing technique, effective active noise control performance was also obtained even for the worst-case dynamics. © 2011 Acoustical Society of America

  19. A Data-Driven Response Virtual Sensor Technique with Partial Vibration Measurements Using Convolutional Neural Network

    Science.gov (United States)

    Sun, Shan-Bin; He, Yuan-Yuan; Zhou, Si-Da; Yue, Zhen-Jiang

    2017-01-01

    Measurement of dynamic responses plays an important role in structural health monitoring, damage detection and other fields of research. However, in aerospace engineering, the physical sensors are limited in the operational conditions of spacecraft, due to the severe environment in outer space. This paper proposes a virtual sensor model with partial vibration measurements using a convolutional neural network. The transmissibility function is employed as prior knowledge. A four-layer neural network with two convolutional layers, one fully connected layer, and an output layer is proposed as the predicting model. Numerical examples of two different structural dynamic systems demonstrate the performance of the proposed approach. The excellence of the novel technique is further indicated using a simply supported beam experiment comparing to a modal-model-based virtual sensor, which uses modal parameters, such as mode shapes, for estimating the responses of the faulty sensors. The results show that the presented data-driven response virtual sensor technique can predict structural response with high accuracy. PMID:29231868

  20. A Data-Driven Response Virtual Sensor Technique with Partial Vibration Measurements Using Convolutional Neural Network.

    Science.gov (United States)

    Sun, Shan-Bin; He, Yuan-Yuan; Zhou, Si-Da; Yue, Zhen-Jiang

    2017-12-12

    Measurement of dynamic responses plays an important role in structural health monitoring, damage detection and other fields of research. However, in aerospace engineering, the physical sensors are limited in the operational conditions of spacecraft, due to the severe environment in outer space. This paper proposes a virtual sensor model with partial vibration measurements using a convolutional neural network. The transmissibility function is employed as prior knowledge. A four-layer neural network with two convolutional layers, one fully connected layer, and an output layer is proposed as the predicting model. Numerical examples of two different structural dynamic systems demonstrate the performance of the proposed approach. The excellence of the novel technique is further indicated using a simply supported beam experiment comparing to a modal-model-based virtual sensor, which uses modal parameters, such as mode shapes, for estimating the responses of the faulty sensors. The results show that the presented data-driven response virtual sensor technique can predict structural response with high accuracy.

  1. Virtual Learning Environments as Sociomaterial Agents in the Network of Teaching Practice

    Science.gov (United States)

    Johannesen, Monica; Erstad, Ola; Habib, Laurence

    2012-01-01

    This article presents findings related to the sociomaterial agency of educators and their practice in Norwegian education. Using actor-network theory, we ask how Virtual Learning Environments (VLEs) negotiate the agency of educators and how they shape their teaching practice. Since the same kinds of VLE tools have been widely implemented…

  2. Design and Test of the Cross-Format Schema Protocol (XFSP) for Networked Virtual Environments

    National Research Council Canada - National Science Library

    Serin, Ekrem

    2003-01-01

    A Networked Virtual Environment (Net-VE) is a distributed software system in which multiple users interact with each other in real time even though these users may be located around the world Zyda 99...

  3. Poverty-Related Diseases College: a virtual African-European network to build research capacity

    NARCIS (Netherlands)

    Dorlo, Thomas P. C.; Fernández, Carmen; Troye-Blomberg, Marita; de Vries, Peter J.; Boraschi, Diana; Mbacham, Wilfred F.

    2016-01-01

    The Poverty-Related Diseases College was a virtual African-European college and network that connected young African and European biomedical scientists working on poverty-related diseases. The aim of the Poverty-Related Diseases College was to build sustainable scientific capacity and international

  4. Interpretations of virtual reality.

    Science.gov (United States)

    Voiskounsky, Alexander

    2011-01-01

    University students were surveyed to learn what they know about virtual realities. The two studies were administered with a half-year interval in which the students (N=90, specializing either in mathematics and science, or in social science and humanities) were asked to name particular examples of virtual realities. The second, but not the first study, was administered after the participants had the chance to see the movie "Avatar" (no investigation was held into whether they really saw it). While the students in both studies widely believed that activities such as social networking and online gaming represent virtual realities, some other examples provided by the students in the two studies differ: in the second study the participants expressed a better understanding of the items related to virtual realities. At the same time, not a single participant reported particular psychological states (either regular or altered) as examples of virtual realities. Profound popularization efforts need to be done to acquaint the public, including college students, with virtual realities and let the public adequately understand how such systems work.

  5. A framework using cluster-based hybrid network architecture for collaborative virtual surgery.

    Science.gov (United States)

    Qin, Jing; Choi, Kup-Sze; Poon, Wai-Sang; Heng, Pheng-Ann

    2009-12-01

    Research on collaborative virtual environments (CVEs) opens the opportunity for simulating the cooperative work in surgical operations. It is however a challenging task to implement a high performance collaborative surgical simulation system because of the difficulty in maintaining state consistency with minimum network latencies, especially when sophisticated deformable models and haptics are involved. In this paper, an integrated framework using cluster-based hybrid network architecture is proposed to support collaborative virtual surgery. Multicast transmission is employed to transmit updated information among participants in order to reduce network latencies, while system consistency is maintained by an administrative server. Reliable multicast is implemented using distributed message acknowledgment based on cluster cooperation and sliding window technique. The robustness of the framework is guaranteed by the failure detection chain which enables smooth transition when participants join and leave the collaboration, including normal and involuntary leaving. Communication overhead is further reduced by implementing a number of management approaches such as computational policies and collaborative mechanisms. The feasibility of the proposed framework is demonstrated by successfully extending an existing standalone orthopedic surgery trainer into a collaborative simulation system. A series of experiments have been conducted to evaluate the system performance. The results demonstrate that the proposed framework is capable of supporting collaborative surgical simulation.

  6. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network.

    Science.gov (United States)

    Frey, Lewis J; Sward, Katherine A; Newth, Christopher J L; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-11-01

    To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  7. Open source system OpenVPN in a function of Virtual Private Network

    Science.gov (United States)

    Skendzic, A.; Kovacic, B.

    2017-05-01

    Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.

  8. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Néstor Lucas Martínez

    2014-12-01

    Full Text Available Wireless Sensor Networks (WSNs are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  9. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Science.gov (United States)

    Martínez, Néstor Lucas; Martínez, José-Fernán; Díaz, Vicente Hernández

    2014-01-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model. PMID:25470489

  10. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  11. Mobile Virtual Network Operator Information Systems for Increased Sustainability in Utilities

    DEFF Research Database (Denmark)

    Joensen, Hallur Leivsgard; Tambo, Torben

    2011-01-01

    sales from efficiency of business processes, underlying information systems, and the ability to make the link from consumption to cost visual and transparent to consumers. The conclusion is that the energy sector should look into other sectors and learn from information systems which ease up business......, sales and buying processes are separated from physical networks and energy production. This study aims to characterise and evaluate information systems supporting the transformation of the free market-orientation of energy and provision of utilities in a cross-sectorial proposition known as Mobile...... Virtual Network Operator (MVNO). Emphasis is particularly on standardised information systems for automatically linking consumers, sellers and integration of network infrastructure actors. The method used is a feasibility study assessing business and information processes of a forthcoming utilities market...

  12. Procedure to Solve Network DEA Based on a Virtual Gap Measurement Model

    Directory of Open Access Journals (Sweden)

    Fuh-hwa Franklin Liu

    2017-01-01

    Full Text Available Network DEA models assess production systems that contain a set of network-structured subsystems. Each subsystem has input and output measures from and to the external network and has intermediate measures that link to other subsystems. Most published studies demonstrate how to employ DEA models to establish network DEA models. Neither static nor dynamic network DEA models adjust the links. This paper applies the virtual gap measurement (VGM model to construct a mixed integer program to solve dynamic network DEA problems. The mixed integer program sets the total numbers of “as-input” and “as-output” equal to the total number of links in the objective function. To obtain the best-practice efficiency, each DMU determines a set of weights for inputs, outputs, and links. The links are played either “as-input” or “as-output.” Input and as-input measures reduce slack, whereas output and as-output measures increase slacks to attain their target on the production frontier.

  13. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  14. Virtual shelves in a digital library: a framework for access to networked information sources.

    Science.gov (United States)

    Patrick, T B; Springer, G K; Mitchell, J A; Sievert, M E

    1995-01-01

    Develop a framework for collections-based access to networked information sources that addresses the problem of location-dependent access to information sources. This framework uses a metaphor of a virtual shelf. A virtual shelf is a general-purpose server that is dedicated to a particular information subject class. The identifier of one of these servers identifies its subject class. Location-independent call numbers are assigned to information sources. Call numbers are based on standard vocabulary codes. The call numbers are first mapped to the location-independent identifiers of virtual shelves. When access to an information resource is required, a location directory provides a second mapping of these location-independent server identifiers to actual network locations. The framework has been implemented in two different systems. One system is based on the Open System Foundation/Distributed Computing Environment and the other is based on the World Wide Web. This framework applies in new ways traditional methods of library classification and cataloging. It is compatible with two traditional styles of selecting information searching and browsing. Traditional methods may be combined with new paradigms of information searching that will be able to take advantage of the special properties of digital information. Cooperation between the library-informational science community and the informatics community can provide a means for a continuing application of the knowledge and techniques of library science to the new problems of networked information sources.

  15. Modeling and Visualization of Human Activities for Multicamera Networks

    Directory of Open Access Journals (Sweden)

    Aswin C. Sankaranarayanan

    2009-01-01

    Full Text Available Multicamera networks are becoming complex involving larger sensing areas in order to capture activities and behavior that evolve over long spatial and temporal windows. This necessitates novel methods to process the information sensed by the network and visualize it for an end user. In this paper, we describe a system for modeling and on-demand visualization of activities of groups of humans. Using the prior knowledge of the 3D structure of the scene as well as camera calibration, the system localizes humans as they navigate the scene. Activities of interest are detected by matching models of these activities learnt a priori against the multiview observations. The trajectories and the activity index for each individual summarize the dynamic content of the scene. These are used to render the scene with virtual 3D human models that mimic the observed activities of real humans. In particular, the rendering framework is designed to handle large displays with a cluster of GPUs as well as reduce the cognitive dissonance by rendering realistic weather effects and illumination. We envision use of this system for immersive visualization as well as summarization of videos that capture group behavior.

  16. VPN (Virtual Private Network) Performance Measurements

    Energy Technology Data Exchange (ETDEWEB)

    Calderon, Calixto; Goncalves, Joao G.M.; Sequeira, Vitor [Joint Research Centre, Ispra (Italy). Inst. for the Protection and Security of the Citizen; Vandaele, Roland; Meylemans, Paul [European Commission, DG-TREN (Luxembourg)

    2003-05-01

    Virtual Private Networks (VPN) is an important technology allowing for secure communications through insecure transmission media (i.e., Internet) by adding authentication and encryption to the existing protocols. This paper describes some VPN performance indicators measured over international communication links. An ISDN based VPN link was established between the Joint Research Centre, Ispra site, Italy, and EURATOM Safeguards in Luxembourg. This link connected two EURATOM Safeguards FAST surveillance stations, and used different vendor solutions hardware (Cisco router 1720 and Nokia CC-500 Gateway). To authenticate and secure this international link, we have used several methods at the different levels of the seven-layered ISO network protocol stack (i.e., Callback feature, CHAP - Challenge Handshake Protocol - authentication protocol). The tests made involved the use of different encryption algorithms and the way session secret keys are periodically renewed, considering these elements influence significantly the transmission throughput. Future tests will include the use of a wide variety of wireless media transmission and terminal equipment technologies, in particular PDAs (Personal Digital Assistants) and Notebook PCs. These tests aim at characterising the functionality of VPNs whenever field inspectors wish to contact headquarters to access information from a central archive database or transmit local measurements or documents. These technologies cover wireless transmission needs at different geographical scales: roombased level Bluetooth, floor or building level Wi-Fi and region or country level GPRS.

  17. Active Gaming: Is "Virtual" Reality Right for Your Physical Education Program?

    Science.gov (United States)

    Hansen, Lisa; Sanders, Stephen W.

    2012-01-01

    Active gaming is growing in popularity and the idea of increasing children's physical activity by using technology is largely accepted by physical educators. Teachers nationwide have been providing active gaming equipment such as virtual bikes, rhythmic dance machines, virtual sporting games, martial arts simulators, balance boards, and other…

  18. Constructivist Learning Environment During Virtual and Real Laboratory Activities

    Directory of Open Access Journals (Sweden)

    Ari Widodo

    2017-04-01

    Full Text Available Laboratory activities and constructivism are two notions that have been playing significant roles in science education. Despite common beliefs about the importance of laboratory activities, reviews reported inconsistent results about the effectiveness of laboratory activities. Since laboratory activities can be expensive and take more time, there is an effort to introduce virtual laboratory activities. This study aims at exploring the learning environment created by a virtual laboratory and a real laboratory. A quasi experimental study was conducted at two grade ten classes at a state high school in Bandung, Indonesia. Data were collected using a questionnaire called Constructivist Learning Environment Survey (CLES before and after the laboratory activities. The results show that both types of laboratories can create constructivist learning environments. Each type of laboratory activity, however, may be stronger in improving certain aspects compared to the other. While a virtual laboratory is stronger in improving critical voice and personal relevance, real laboratory activities promote aspects of personal relevance, uncertainty and student negotiation. This study suggests that instead of setting one type of laboratory against the other, lessons and follow up studies should focus on how to combine both types of laboratories to support better learning.

  19. Multi-Hop Link Capacity of Multi-Route Multi-Hop MRC Diversity for a Virtual Cellular Network

    Science.gov (United States)

    Daou, Imane; Kudoh, Eisuke; Adachi, Fumiyuki

    In virtual cellular network (VCN), proposed for high-speed mobile communications, the signal transmitted from a mobile terminal is received by some wireless ports distributed in each virtual cell and relayed to the central port that acts as a gateway to the core network. In this paper, we apply the multi-route MHMRC diversity in order to decrease the transmit power and increase the multi-hop link capacity. The transmit power, the interference power and the link capacity are evaluated for DS-CDMA multi-hop VCN by computer simulation. The multi-route MHMRC diversity can be applied to not only DS-CDMA but also other access schemes (i. e. MC-CDMA, OFDM, etc.).

  20. Virtual Worlds for Virtual Organizing

    Science.gov (United States)

    Rhoten, Diana; Lutters, Wayne

    The members and resources of a virtual organization are dispersed across time and space, yet they function as a coherent entity through the use of technologies, networks, and alliances. As virtual organizations proliferate and become increasingly important in society, many may exploit the technical architecture s of virtual worlds, which are the confluence of computer-mediated communication, telepresence, and virtual reality originally created for gaming. A brief socio-technical history describes their early origins and the waves of progress followed by stasis that brought us to the current period of renewed enthusiasm. Examination of contemporary examples demonstrates how three genres of virtual worlds have enabled new arenas for virtual organizing: developer-defined closed worlds, user-modifiable quasi-open worlds, and user-generated open worlds. Among expected future trends are an increase in collaboration born virtually rather than imported from existing organizations, a tension between high-fidelity recreations of the physical world and hyper-stylized imaginations of fantasy worlds, and the growth of specialized worlds optimized for particular sectors, companies, or cultures.

  1. Green Virtualization for Multiple Collaborative Cellular Operators

    KAUST Repository

    Farooq, Muhammad Junaid

    2017-06-05

    This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed framework, the virtual network formed by unifying radio access infrastructures of all operators is optimized for minimum energy consumption by deactivating base stations (BSs) with low traffic loads. The users initially associated to those BSs are off-loaded to neighboring active ones. A fairness criterion for collaboration based on roaming prices is introduced to cover the additional energy costs incurred by host operators. The framework also ensures that any collaborating operator is not negatively affected by its participation in the proposed virtualization. A multi-objective linear programming problem is formulated to achieve energy and cost efficiency of the networks\\' operation by identifying the set of inter-operator roaming prices. For the case when collaboration among all operators is infeasible due to profitability, capacity, or power constraints, an iterative algorithm is proposed to determine the groups of operators that can viably collaborate. Results show significant energy savings using the proposed virtualization as compared to the standalone case. Moreover, collaborative operators exploiting locally generated renewable energy are rewarded more than traditional ones.

  2. Quality of Service Control Based on Virtual Private Network Services in a Wide Area Gigabit Ethernet Optical Test Bed

    Science.gov (United States)

    Rea, Luca; Pompei, Sergio; Valenti, Alessandro; Matera, Francesco; Zema, Cristiano; Settembre, Marina

    We report an experimental investigation about the Virtual Private LAN Service technique to guarantee the quality of service in the metro/core network and also in the presence of access bandwidth bottleneck. We also show how the virtual private network can be set up for answering to a user request in a very fast way. The tests were performed in a GMPLS test bed with GbE core routers linked with long (tens of kilometers) GbE G.652 fiber links.

  3. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile ATM Network

    Science.gov (United States)

    Bush, Stephen F.

    1999-05-01

    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such as load, distance, capacity and topology are all constantly changing in a mobile environment. The VNC algorithm anticipates configuration changes and speeds the reconfiguration process by pre-computing and caching results. VNC propagates local prediction results throughout the VNC enhanced system. The Global Positioning System is an enabling technology for the use of VNC in mobile networks because it provides location information and accurate time for each node. This research has resulted in well defined structures for the encapsulation of physical processes within Logical Processes and a generic library for enhancing a system with VNC. Enhancing an existing system with VNC is straight forward assuming the existing physical processes do not have side effects. The benefit of prediction is gained at the cost of additional traffic and processing. This research includes an analysis of VNC and suggestions for optimization of the VNC algorithm and its parameters.

  4. Orthotropic conductivity reconstruction with virtual-resistive network and Faraday's law

    KAUST Repository

    Lee, Min-Gi

    2015-06-01

    We obtain the existence and the uniqueness at the same time in the reconstruction of orthotropic conductivity in two-space dimensions by using two sets of internal current densities and boundary conductivity. The curl-free equation of Faraday\\'s law is taken instead of the elliptic equation in a divergence form that is typically used in electrical impedance tomography. A reconstruction method based on layered bricks-type virtual-resistive network is developed to reconstruct orthotropic conductivity with up to 40% multiplicative noise.

  5. VIRTUAL WORLD MARKETING: THE IMPORTANCE OF BEING ON SOCIAL NETWORKS

    OpenAIRE

    EVERTON DAMIÃO TAVANO SANTOS; JOÃO PAULO DA SILVA GOMES; CARLOS EDUARDO CICCONE

    2012-01-01

    Increasingly present at peolpe´s daily life and seeking to satisfy their wishes, marketing is searching to adapt itself to consumer´s real necessities as well as to the environments currently used by them. With the growing use of technology and internet access, marketing ceases to act only on physical media such as magazines, newspapers and pamphlets to go further, searching for a new environment where customers go like social networking in virtual world where the dissemination of informa...

  6. Virtual water trade and country vulnerability: A network perspective

    Science.gov (United States)

    Sartori, Martina; Schiavo, Stefano

    2015-04-01

    This work investigates the relationship between countries' participation in virtual water trade and their vulnerability to external shocks from a network perspective. In particular, we investigate whether (i) possible sources of local national crises may interact with the system, propagating through the network and affecting the other countries involved; (ii) the topological characteristics of the international agricultural trade network, translated into virtual water-equivalent flows, may favor countries' vulnerability to external crises. Our work contributes to the debate on the potential merits and risks associated with openness to trade in agricultural and food products. On the one hand, trade helps to ensure that even countries with limited water (and other relevant) resources have access to sufficient food and contribute to the global saving of water. On the other hand, there are fears that openness may increase the vulnerability to external shocks and thus make countries worse off. Here we abstract from political considerations about food sovereignty and independence from imports and focus instead on investigating whether the increased participation in global trade that the world has witnessed in the last 30 years has made the system more susceptible to large shocks. Our analysis reveals that: (i) the probability of larger supply shocks has not increased over time; (ii) the topological characteristics of the VW network are not such as to favor the systemic risk associated with shock propagation; and (iii) higher-order interconnections may reveal further important information about the structure of a network. Regarding the first result, fluctuations in output volumes, among the sources of shock analyzed here, are more likely to generate some instability. The first implication is that, on one side, past national or regional economic crises were not necessarily brought about or strengthened by global trade. The second, more remarkable, implication is that, on

  7. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories; TOPICAL

    International Nuclear Information System (INIS)

    MILLER, MARC M.; YONEK JR., GEORGE A.

    2001-01-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access

  8. Emulación de elementos de networking interactuando con máquinas virtuales

    OpenAIRE

    Binker, Carlos; Pére, Alejandro; Buranits, Guillermo; Zurdo, Eliseo

    2016-01-01

    En este trabajo se pretende mostrar la emulación de elementos de networking tales como switches y routers interactuando con máquinas virtuales que emplean sistemas operativos diversos como ser Windows, Mac OS X, Linux en diferentes distribuciones, etc. A tal efecto se emplea una plataforma de software libre denominada GNS3 (Graphical Simulator Network 3). Después de hacer un análisis más pormenorizado de dicha plataforma con sus programas asociados se mostrará un ejemplo de laboratorio en don...

  9. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  10. U-Net/SLE: A Java-Based User-Customizable Virtual Network Interface

    Directory of Open Access Journals (Sweden)

    Matt Welsh

    1999-01-01

    Full Text Available We describe U‐Net/SLE (Safe Language Extensions, a user‐level network interface architecture which enables per‐application customization of communication semantics through downloading of user extension applets, implemented as Java classfiles, to the network interface. This architecture permits applications to safely specify code to be executed within the NI on message transmission and reception. By leveraging the existing U‐Net model, applications may implement protocol code at the user level, within the NI, or using some combination of the two. Our current implementation, using the Myricom Myrinet interface and a small Java Virtual Machine subset, allows host communication overhead to be reduced and improves the overlap of communication and computation during protocol processing.

  11. Virtual Reality Learning Activities for Multimedia Students to Enhance Spatial Ability

    Directory of Open Access Journals (Sweden)

    Rafael Molina-Carmona

    2018-04-01

    Full Text Available Virtual Reality is an incipient technology that is proving very useful for training different skills. Our hypothesis is that it is possible to design virtual reality learning activities that can help students to develop their spatial ability. To prove the hypothesis, we have conducted an experiment consisting of training the students using an on-purpose learning activity based on a virtual reality application and assessing the possible improvement of the students’ spatial ability through a widely accepted spatial visualization test. The learning activity consists of a virtual environment where some simple polyhedral shapes are shown and manipulated by moving, rotating and scaling them. The students participating in the experiment are divided into a control and an experimental group, carrying out the same learning activity with the only difference of the device used for the interaction: a traditional computer with screen, keyboard and mouse for the control group, and virtual reality goggles with a smartphone for the experimental group. To assess the experience, all the students have completed a spatial visualization test twice: just before performing the activities and four weeks later, once all the activities were performed. Specifically, we have used the well-known and widely used Purdue Spatial Visualization Test—Rotation (PSVT-R, designed to test rotational visualization ability. The results of the test show that there is an improvement in the test results for both groups, but the improvement is significantly higher in the case of the experimental group. The conclusion is that the virtual reality learning activities have shown to improve the spatial ability of the experimental group.

  12. Virtualization of business activities in the conditions of society’s information

    OpenAIRE

    Дяченко, Р. О.

    2015-01-01

    It was attempted of the philosophical analysis changing of business activity in the context of the informatization of society in this article. Stated that under the influence of informatization of processes business activities is virtualized. Stated that under the influence of informatization processes business activities virtualized. Indicated that positive changes of business activities connected with innovation and forecasting of the consequences of decisions. Destructive character associa...

  13. Virtual Global Accelerator Network (VGAN)(LCC-0083)

    International Nuclear Information System (INIS)

    Larsen, R

    2003-01-01

    The concept of a Global Accelerator Network (GAN) has been proposed by key members of ICFA as a cornerstone of a future International Linear Collider (LC). GAN would provide a tool for the participants of an international collaboration to participate in the actual running of the machine from different parts of the world. Some technical experts view the concept as technologically trivial, and instead point out the significant sociological, organizational and administrative problems that must be surmounted in creating a truly workable system. This note proposes that many real issues can be explored by building a simulator (VGAN) consisting of a virtual accelerator model, a global controls model, and a functioning human organizational model, a tool that would explore and resolve many real problems of GAN and the LC enterprise during the LC preliminary design and testing phase

  14. PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI

    Directory of Open Access Journals (Sweden)

    Siswa Trihadi

    2008-05-01

    Full Text Available Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business process andidentify problems which can be solved by using a network technology. Meanwhile, the design method wasdone by making a topology network diagram, and determining elements needed to design a VPN technology,then suggesting a configuration system, and testing to know whether the suggested system could run well ornot. The result is that network between the head and branch office, and the mobile user can be connectedsuccessfully using a VPN technology. In conclusion, with the connected network between the head andbranch office can create a centralization of company database, and a suggested VPN network has run well byencapsulating data packages had been sent.Keywords: network, Virtual Private Network (VPN, library study, analysis, design

  15. The Potential of Using Virtual Reality Technology in Physical Activity Settings

    Science.gov (United States)

    Pasco, Denis

    2013-01-01

    In recent years, virtual reality technology has been successfully used for learning purposes. The purposes of the article are to examine current research on the role of virtual reality in physical activity settings and discuss potential application of using virtual reality technology to enhance learning in physical education. The article starts…

  16. Virtualization in control system environment

    International Nuclear Information System (INIS)

    Shen, L.R.; Liu, D.K.; Wan, T.M.

    2012-01-01

    In large scale distributed control system, there are lots of common service composed an environment for the entire control system, such as the server system for the common software base library, application server, archive server and so on. This paper gives a description of a virtualization realization for control system environment including the virtualization for server, storage, network system and application for the control system. With a virtualization instance of the EPICS based control system environment that was built by the VMware vSphere v4, we tested the whole functionality of this virtualization environment in the SSRF control system, including the common server of the NFS, NIS, NTP, Boot and EPICS base and extension library tools, we also have applied virtualization to application servers such as the Archive, Alarm, EPICS gateway and all of the network based IOC. Specially, we test the high availability and VMotion for EPICS asynchronous IOC successful under the different VLAN configuration of the current SSRF control system network. (authors)

  17. The Relationship Between the Use of Virtual Social Networks with Academic Achievement and Students' Confidence in Interpersonal Relations at Birjand University of Medical Sciences

    Directory of Open Access Journals (Sweden)

    aliakbar ajam

    2017-06-01

    Full Text Available Background and Objective: This study aimed to investigate the relationship between the use of mobile based virtual social networks with academic achievement and trust in interpersonal relations of university students Of Medical Sciences was conducted. Materials and Methods: This study was descriptive correlational. The study population included college of Public Health students and students of medicine at Birjand University of Medical Sciences. Based on purposive sampling method, 150 students were selected. For data collection Scale of trust in interpersonal relations of Rempel & Holmes was used. The researchers made use of social networks and academic achievement. Data were analyzed by SPSS software version 20. Result: There was a significant negative relationship between the time allotted to the network and the number of virtual memberships in social groups and academic achievement of students(P <0.01. Academic achievement of students who used virtual social networks for scientific purposes was higher than those who used it for non-scientific purposes. There was a significant negative correlation between the time allocated to social networks and factors such as capability of trust, predictability and loyalty (P <0.05. Conclusion: It is recommended that workshops and training courses be held for practical learning of virtual networks.

  18. Spontane strategier i innovationsnetværk: materialitetens betydning for stabiliseringen af virtuelle verdner som professionelt kommunikationsmedie [Spontaneous strategies in innovation networks: The importance of materiality in stabilising virtual worlds

    Directory of Open Access Journals (Sweden)

    Emil Husted

    2012-09-01

    Full Text Available Much research has dealt with how social and organisational processes change when they take place in virtual spaces. This article considers innovation processes in which actors try to establish virtual worlds as platforms for professional communication. However, instead of focusing on internal communication processes in virtual worlds, the article seeks to question the dichotomy between physical and virtual worlds and to explore the importance of materiality in organising the virtual. Adopting a perspective inspired by actor-network theory, the article argues that physical places and objects do not only serve as context for innovation processes, but on the contrary are incorporated as strategic resources that actively help create the virtual worlds. The article is based on an empirical analysis of five Danish companies, and shows how companies make use of physical places and objects as strategic resources in the innovation process. Thus the article contributes to the literature on innovation in new media such as virtual worlds.

  19. Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks

    Directory of Open Access Journals (Sweden)

    Kang Xie

    2014-01-01

    Full Text Available In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM migration detection algorithm based on the cellular neural networks (CNNs, is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, in which improved particle swarm optimization algorithm based on bubble sort is used to solve the problem. Experimental results demonstrate that the proposed method can display the VM migration processing intuitively. Compared with the best fit heuristic algorithm, this approach reduces the processing time, and emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI implementation allowing the VM migration detection to be performed better.

  20. Global detection of live virtual machine migration based on cellular neural networks.

    Science.gov (United States)

    Xie, Kang; Yang, Yixian; Zhang, Ling; Jing, Maohua; Xin, Yang; Li, Zhongxian

    2014-01-01

    In order to meet the demands of operation monitoring of large scale, autoscaling, and heterogeneous virtual resources in the existing cloud computing, a new method of live virtual machine (VM) migration detection algorithm based on the cellular neural networks (CNNs), is presented. Through analyzing the detection process, the parameter relationship of CNN is mapped as an optimization problem, in which improved particle swarm optimization algorithm based on bubble sort is used to solve the problem. Experimental results demonstrate that the proposed method can display the VM migration processing intuitively. Compared with the best fit heuristic algorithm, this approach reduces the processing time, and emerging evidence has indicated that this new approach is affordable to parallelism and analog very large scale integration (VLSI) implementation allowing the VM migration detection to be performed better.

  1. Making Choices in the Virtual World: The New Model at United Technologies Information Network.

    Science.gov (United States)

    Gulliford, Bradley

    1998-01-01

    Describes changes in services of the United Technologies Corporation Information Network from a traditional library system to a virtual system of World Wide Web sites, a document-delivery unit, telephone and e-mail reference, and desktop technical support to provide remote access. Staff time, security, and licensing issues are addressed.…

  2. Holding-time-aware asymmetric spectrum allocation in virtual optical networks

    Science.gov (United States)

    Lyu, Chunjian; Li, Hui; Liu, Yuze; Ji, Yuefeng

    2017-10-01

    Virtual optical networks (VONs) have been considered as a promising solution to support current high-capacity dynamic traffic and achieve rapid applications deployment. Since most of the network services (e.g., high-definition video service, cloud computing, distributed storage) in VONs are provisioned by dedicated data centers, needing different amount of bandwidth resources in both directions, the network traffic is mostly asymmetric. The common strategy, symmetric provisioning of traffic in optical networks, leads to a waste of spectrum resources in such traffic patterns. In this paper, we design a holding-time-aware asymmetric spectrum allocation module based on SDON architecture and an asymmetric spectrum allocation algorithm based on the module is proposed. For the purpose of reducing spectrum resources' waste, the algorithm attempts to reallocate the idle unidirectional spectrum slots in VONs, which are generated due to the asymmetry of services' bidirectional bandwidth. This part of resources can be exploited by other requests, such as short-time non-VON requests. We also introduce a two-dimensional asymmetric resource model for maintaining idle spectrum resources information of VON in spectrum and time domains. Moreover, a simulation is designed to evaluate the performance of the proposed algorithm, and results show that our proposed asymmetric spectrum allocation algorithm can improve the resource waste and reduce blocking probability.

  3. Trauma and Self-Narrative in Virtual Reality: Toward Recreating a Healthier Mind

    OpenAIRE

    Iva Georgieva

    2017-01-01

    This study discusses the concept of virtual selves created in the virtual spaces [e.g. social network services or virtual reality (VR)]. It analyzes the activities in the different virtual spaces and claims that experience gained there can be transferred to real life. In respect to that, the effects of the VR treatment on the self as well as the concept of creating a life story are analyzed as interconnected. The research question which arises from these considerations is how to look at psych...

  4. Dynamically allocated virtual clustering management system

    Science.gov (United States)

    Marcus, Kelvin; Cannata, Jess

    2013-05-01

    The U.S Army Research Laboratory (ARL) has built a "Wireless Emulation Lab" to support research in wireless mobile networks. In our current experimentation environment, our researchers need the capability to run clusters of heterogeneous nodes to model emulated wireless tactical networks where each node could contain a different operating system, application set, and physical hardware. To complicate matters, most experiments require the researcher to have root privileges. Our previous solution of using a single shared cluster of statically deployed virtual machines did not sufficiently separate each user's experiment due to undesirable network crosstalk, thus only one experiment could be run at a time. In addition, the cluster did not make efficient use of our servers and physical networks. To address these concerns, we created the Dynamically Allocated Virtual Clustering management system (DAVC). This system leverages existing open-source software to create private clusters of nodes that are either virtual or physical machines. These clusters can be utilized for software development, experimentation, and integration with existing hardware and software. The system uses the Grid Engine job scheduler to efficiently allocate virtual machines to idle systems and networks. The system deploys stateless nodes via network booting. The system uses 802.1Q Virtual LANs (VLANs) to prevent experimentation crosstalk and to allow for complex, private networks eliminating the need to map each virtual machine to a specific switch port. The system monitors the health of the clusters and the underlying physical servers and it maintains cluster usage statistics for historical trends. Users can start private clusters of heterogeneous nodes with root privileges for the duration of the experiment. Users also control when to shutdown their clusters.

  5. Active Citizens, Good Citizens, and Insouciant Bystanders: The Educational Implications of Chinese University Students' Civic Participation via Social Networking

    Science.gov (United States)

    Ke, Lin; Starkey, Hugh

    2014-01-01

    This virtual ethnographic study explores how Chinese university students use social network sites (SNSs) to participate in civic activities. An ideal of "active" citizens is contrasted with good citizens (Crick) and insouciant bystanders. We find that students engage with the civic issues embedded in everyday life; their online civic…

  6. Consuming Social Networks: A Study on BeeTalk Network

    Directory of Open Access Journals (Sweden)

    Jamal Mohammadi

    Full Text Available BeeTalk is one of the most common social networks that have attracted many users during these years. As a whole, social networks are parts of everyday life nowadays and, especially among the new generation, have caused some basic alterations in the field of identity-formation, sense-making and the form and content of communication. This article is a research about BeeTalk users, their virtual interactions and experiences, and the feelings, pleasures, meanings and attitudes that they obtain through participating in the virtual world. This is a qualitative research. The sample is selected by way of theoretical sampling among the students of University of Kurdistan. Direct observation and semistructured interviews are used to gathering data, which are interpreted through grounded theory. The findings show that some contexts like “searching real interests in a non-real world” and “the representation of users’ voices in virtual space” have provided the space for participating in BeeTalk, and an intervening factor called “instant availability” has intensified this participation. Users’ participation in this social network has changed their social interaction in the real world and formed some new types of communication among them such as “representation of faked identities”, “experiencing ceremonial space” and “artificial literacy”. Moreover, this participation has some consequences like “virtual addiction” and “virtual collectivism” in users’ everyday life that effects their ways of providing meaning and identity in their social lives. It can be said that the result of user’s activity in this network is to begin a kind of simulated relation that has basic differences with relations in the real world. The experience of relation in this network lacks nobility, enrichment and animation, rather it is instant, artificial and without any potential to vitalization.

  7. Developing Activities for Teaching Cloud Computing and Virtualization

    Directory of Open Access Journals (Sweden)

    E. Erturk

    2014-10-01

    Full Text Available Cloud computing and virtualization are new but indispensable components of computer engineering and information systems curricula for universities and higher education institutions. Learning about these topics is important for students preparing to work in the IT industry. In many companies, information technology operates under tight financial constraints. Virtualization, (for example storage, desktop, and server virtualization, reduces overall IT costs through the consolidation of systems. It also results in reduced loads and energy savings in terms of the power and cooling infrastructure. Therefore it is important to investigate the practical aspects of this topic both for industry practice and for teaching purposes. This paper demonstrates some activities undertaken recently by students at the Eastern Institute of Technology New Zealand and concludes with general recommendations for IT educators, software developers, and other IT professionals

  8. Virtual Enterprises, Mobile Markets and Volatile Customers

    NARCIS (Netherlands)

    F.P.H. Jaspers (Ferdinand); W. Hulsink (Wim); J.J.M. Theeuwes (Myrte)

    2005-01-01

    textabstractRecently, several new mobile virtual network operators (MVNOs) have entered the European mobile telecommunications markets. These service providers do not own a mobile network, but instead they buy capacity from other companies. Because these virtual operators do not possess an

  9. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  10. Recent evolution of China's virtual water trade: analysis of selected crops and considerations for policy

    Science.gov (United States)

    Shi, J.; Liu, J.; Pinter, L.

    2014-04-01

    China has dramatically increased its virtual water import over recent years. Many studies have focused on the quantity of traded virtual water, but very few go into analysing geographic distribution and the properties of China's virtual water trade network. This paper provides a calculation and analysis of the crop-related virtual water trade network of China based on 27 major primary crops between 1986 and 2009. The results show that China is a net importer of virtual water from water-abundant areas of North America and South America, and a net virtual water exporter to water-stressed areas of Asia, Africa, and Europe. Virtual water import is far larger than virtual water export, and in both import and export a small number of trade partners control the supply chain. Grain crops are the major contributors to virtual water trade, and among grain crops, soybeans, mostly imported from the US, Brazil and Argentina, are the most significant. In order to mitigate water scarcity and secure the food supply, virtual water should actively be incorporated into national water management strategies. And the sources of virtual water import need to be further diversified to reduce supply chain risks and increase resilience.

  11. State Virtual Libraries

    Science.gov (United States)

    Pappas, Marjorie L.

    2003-01-01

    Virtual library? Electronic library? Digital library? Online information network? These all apply to the growing number of Web-based resource collections managed by consortiums of state library entities. Some, like "INFOhio" and "KYVL" ("Kentucky Virtual Library"), have been available for a few years, but others are just starting. Searching for…

  12. Celebrating international collaboration: reflections on the first Virtual International Practice Development Conference

    Directory of Open Access Journals (Sweden)

    Moira Stephens

    2016-11-01

    Full Text Available This article reports on the first Virtual International Practice Development Conference, held in May 2015 to celebrate International Nurses Day. The article describes key aspects of its planning, offers a flavour of the event itself and sets out an evaluation, including learning points and recommendations to assist with planning similar events in the future. Central to our learning are: The need for practice developers to grasp skills in technology associated with virtual space The need to embrace virtual space itself as another means by which creative and communicative spaces can be established for active learning and practice development activities The potential advantages that international virtual engagement has over face-to-face national or international engagement The delivery of this virtual event made a significant international contribution to global practice development activity within the International Practice Development Collaborative and to enabling practice developers to connect and celebrate on a more global basis. Implications for practice: Virtual space technology skills can assist with sharing and translating practice development research, innovations and critical commentary Virtual space can provide an adjunct to creative and communicative learning spaces Global networking opportunities can be developed and enhanced through the use of virtual space technology Practice developers need to role model the use of virtual technologies

  13. Poverty-Related Diseases College: a virtual African-European network to build research capacity.

    Science.gov (United States)

    Dorlo, Thomas P C; Fernández, Carmen; Troye-Blomberg, Marita; de Vries, Peter J; Boraschi, Diana; Mbacham, Wilfred F

    2016-01-01

    The Poverty-Related Diseases College was a virtual African-European college and network that connected young African and European biomedical scientists working on poverty-related diseases. The aim of the Poverty-Related Diseases College was to build sustainable scientific capacity and international networks in poverty-related biomedical research in the context of the development of Africa. The Poverty-Related Diseases College consisted of three elective and mandatory training modules followed by a reality check in Africa and a science exchange in either Europe or the USA. In this analysis paper, we present our experience and evaluation, discuss the strengths and encountered weaknesses of the programme, and provide recommendations to policymakers and funders.

  14. Foodsheds in Virtual Water Flow Networks: A Spectral Graph Theory Approach

    Directory of Open Access Journals (Sweden)

    Nina Kshetry

    2017-06-01

    Full Text Available A foodshed is a geographic area from which a population derives its food supply, but a method to determine boundaries of foodsheds has not been formalized. Drawing on the food–water–energy nexus, we propose a formal network science definition of foodsheds by using data from virtual water flows, i.e., water that is virtually embedded in food. In particular, we use spectral graph partitioning for directed graphs. If foodsheds turn out to be geographically compact, it suggests the food system is local and therefore reduces energy and externality costs of food transport. Using our proposed method we compute foodshed boundaries at the global-scale, and at the national-scale in the case of two of the largest agricultural countries: India and the United States. Based on our determination of foodshed boundaries, we are able to better understand commodity flows and whether foodsheds are contiguous and compact, and other factors that impact environmental sustainability. The formal method we propose may be used more broadly to study commodity flows and their impact on environmental sustainability.

  15. Effects of virtual reality-based bilateral upper-extremity training on brain activity in post-stroke patients.

    Science.gov (United States)

    Lee, Su-Hyun; Kim, Yu-Mi; Lee, Byoung-Hee

    2015-07-01

    [Purpose] This study investigated the therapeutic effects of virtual reality-based bilateral upper-extremity training on brain activity in patients with stroke. [Subjects and Methods] Eighteen chronic stroke patients were divided into two groups: the virtual reality-based bilateral upper-extremity training group (n = 10) and the bilateral upper-limb training group (n = 8). The virtual reality-based bilateral upper-extremity training group performed bilateral upper-extremity exercises in a virtual reality environment, while the bilateral upper-limb training group performed only bilateral upper-extremity exercise. All training was conducted 30 minutes per day, three times per week for six weeks, followed by brain activity evaluation. [Results] Electroencephalography showed significant increases in concentration in the frontopolar 2 and frontal 4 areas, and significant increases in brain activity in the frontopolar 1 and frontal 3 areas in the virtual reality-based bilateral upper-extremity training group. [Conclusion] Virtual reality-based bilateral upper-extremity training can improve the brain activity of stroke patients. Thus, virtual reality-based bilateral upper-extremity training is feasible and beneficial for improving brain activation in stroke patients.

  16. Cyber entertainment system using an immersive networked virtual environment

    Science.gov (United States)

    Ihara, Masayuki; Honda, Shinkuro; Kobayashi, Minoru; Ishibashi, Satoshi

    2002-05-01

    Authors are examining a cyber entertainment system that applies IPT (Immersive Projection Technology) displays to the entertainment field. This system enables users who are in remote locations to communicate with each other so that they feel as if they are together. Moreover, the system enables those users to experience a high degree of presence, this is due to provision of stereoscopic vision as well as a haptic interface and stereo sound. This paper introduces this system from the viewpoint of space sharing across the network and elucidates its operation using the theme of golf. The system is developed by integrating avatar control, an I/O device, communication links, virtual interaction, mixed reality, and physical simulations. Pairs of these environments are connected across the network. This allows the two players to experience competition. An avatar of each player is displayed by the other player's IPT display in the remote location and is driven by only two magnetic sensors. That is, in the proposed system, users don't need to wear any data suit with a lot of sensors and they are able to play golf without any encumbrance.

  17. Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education

    Science.gov (United States)

    2010-06-01

    25  2.7.2.  Virtual Distributed Ethernet ( VDE ) ...................................................... 26  2.7.3...ability to work with the network independent of the actual underlying physical topology. 26 2.7.2. Virtual Distributed Ethernet ( VDE ) 2.7.2.1...Virtual Distributed Ethernet ( VDE ) is an abstraction of the networking components involved in a typical Ethernet network [18]. It allows for virtual

  18. Recent History and Geography of Virtual Water Trade

    Science.gov (United States)

    Carr, Joel A.; D’Odorico, Paolo; Laio, Francesco; Ridolfi, Luca

    2013-01-01

    The global trade of goods is associated with a virtual transfer of the water required for their production. The way changes in trade affect the virtual redistribution of freshwater resources has been recently documented through the analysis of the virtual water network. It is, however, unclear how these changes are contributed by different types of products and regions of the world. Here we show how the global patterns of virtual water transport are contributed by the trade of different commodity types, including plant, animal, luxury (e.g., coffee, tea, and alcohol), and other products. Major contributors to the virtual water network exhibit different trade patterns with regard to these commodity types. The net importers rely on the supply of virtual water from a small percentage of the global population. However, discrepancies exist among the different commodity networks. While the total virtual water flux through the network has increased between 1986 and 2010, the proportions associated with the four commodity groups have remained relatively stable. However, some of the major players have shown significant changes in the virtual water imports and exports associated with those commodity groups. For instance, China has switched from being a net exporter of virtual water associated with other products (non-edible plant and animal products typically used for manufacturing) to being the largest importer, accounting for 31% of the total water virtually transported with these products. Conversely, in the case of The United states of America, the commodity proportions have remained overall unchanged throughout the study period: the virtual water exports from The United States of America are dominated by plant products, whereas the imports are comprised mainly of animal and luxury products. PMID:23457481

  19. Recent history and geography of virtual water trade.

    Science.gov (United States)

    Carr, Joel A; D'Odorico, Paolo; Laio, Francesco; Ridolfi, Luca

    2013-01-01

    The global trade of goods is associated with a virtual transfer of the water required for their production. The way changes in trade affect the virtual redistribution of freshwater resources has been recently documented through the analysis of the virtual water network. It is, however, unclear how these changes are contributed by different types of products and regions of the world. Here we show how the global patterns of virtual water transport are contributed by the trade of different commodity types, including plant, animal, luxury (e.g., coffee, tea, and alcohol), and other products. Major contributors to the virtual water network exhibit different trade patterns with regard to these commodity types. The net importers rely on the supply of virtual water from a small percentage of the global population. However, discrepancies exist among the different commodity networks. While the total virtual water flux through the network has increased between 1986 and 2010, the proportions associated with the four commodity groups have remained relatively stable. However, some of the major players have shown significant changes in the virtual water imports and exports associated with those commodity groups. For instance, China has switched from being a net exporter of virtual water associated with other products (non-edible plant and animal products typically used for manufacturing) to being the largest importer, accounting for 31% of the total water virtually transported with these products. Conversely, in the case of The United states of America, the commodity proportions have remained overall unchanged throughout the study period: the virtual water exports from The United States of America are dominated by plant products, whereas the imports are comprised mainly of animal and luxury products.

  20. Networking and virtuality in entrepreneurial organisations in the age of countries without borders

    OpenAIRE

    Duobienė, Jurga; Duoba, Kęstutis; Kumpikaitė, Vilmantė; Žičkutė, Ineta

    2015-01-01

    Entrepreneurial organisations continuously search for innovations and innovative ways of doing business that provide a competitive advantage in the market. In the age of countries without borders and free movement of people organisations in Eastern Europe deal with the lack of high quality labour force caused by migration that force to seek alternative ways of managing work and workplace. The paper analyses networking, virtual workplace and other characteristics of job design in entrepreneuri...

  1. A nested virtualization tool for information technology practical education.

    Science.gov (United States)

    Pérez, Carlos; Orduña, Juan M; Soriano, Francisco R

    2016-01-01

    A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that would otherwise be unfeasible. Also, its portability allows to reproduce classroom activities, as well as the students' autonomous work.

  2. Students' Personal Networks in Virtual and Personal Learning Environments: A Case Study in Higher Education Using Learning Analytics Approach

    Science.gov (United States)

    Casquero, Oskar; Ovelar, Ramón; Romo, Jesús; Benito, Manuel; Alberdi, Mikel

    2016-01-01

    The main objective of this paper is to analyse the effect of the affordances of a virtual learning environment and a personal learning environment (PLE) in the configuration of the students' personal networks in a higher education context. The results are discussed in light of the adaptation of the students to the learning network made up by two…

  3. A New Energy-Efficient Data Transmission Scheme Based on DSC and Virtual MIMO for Wireless Sensor Network

    OpenAIRE

    Li, Na; Zhang, Liwen; Li, Bing

    2015-01-01

    Energy efficiency in wireless sensor network (WSN) is one of the primary performance parameters. For improving the energy efficiency of WSN, we introduce distributed source coding (DSC) and virtual multiple-input multiple-output (MIMO) into wireless sensor network and then propose a new data transmission scheme called DSC-MIMO. DSC-MIMO compresses the source data using distributed source coding before transmitting, which is different from the existing communication schemes. Data compression c...

  4. Behavioral and network origins of wealth inequality: insights from a virtual world.

    Directory of Open Access Journals (Sweden)

    Benedikt Fuchs

    Full Text Available Almost universally, wealth is not distributed uniformly within societies or economies. Even though wealth data have been collected in various forms for centuries, the origins for the observed wealth-disparity and social inequality are not yet fully understood. Especially the impact and connections of human behavior on wealth could so far not be inferred from data. Here we study wealth data from the virtual economy of the massive multiplayer online game (MMOG Pardus. This data not only contains every player's wealth at every point in time, but also all actions over a timespan of almost a decade. We find that wealth distributions in the virtual world are very similar to those in Western countries. In particular we find an approximate exponential distribution for low wealth levels and a power-law tail for high levels. The Gini index is found to be g = 0.65, which is close to the indices of many Western countries. We find that wealth-increase rates depend on the time when players entered the game. Players that entered the game early on tend to have remarkably higher wealth-increase rates than those who joined later. Studying the players' positions within their social networks, we find that the local position in the trade network is most relevant for wealth. Wealthy people have high in- and out-degrees in the trade network, relatively low nearest-neighbor degrees, and low clustering coefficients. Wealthy players have many mutual friendships and are socially well respected by others, but spend more time on business than on socializing. Wealthy players have few personal enemies, but show animosity towards players that behave as public enemies. We find that players that are not organized within social groups are significantly poorer on average. We observe that "political" status and wealth go hand in hand.

  5. Behavioral and network origins of wealth inequality: insights from a virtual world.

    Science.gov (United States)

    Fuchs, Benedikt; Thurner, Stefan

    2014-01-01

    Almost universally, wealth is not distributed uniformly within societies or economies. Even though wealth data have been collected in various forms for centuries, the origins for the observed wealth-disparity and social inequality are not yet fully understood. Especially the impact and connections of human behavior on wealth could so far not be inferred from data. Here we study wealth data from the virtual economy of the massive multiplayer online game (MMOG) Pardus. This data not only contains every player's wealth at every point in time, but also all actions over a timespan of almost a decade. We find that wealth distributions in the virtual world are very similar to those in Western countries. In particular we find an approximate exponential distribution for low wealth levels and a power-law tail for high levels. The Gini index is found to be g = 0.65, which is close to the indices of many Western countries. We find that wealth-increase rates depend on the time when players entered the game. Players that entered the game early on tend to have remarkably higher wealth-increase rates than those who joined later. Studying the players' positions within their social networks, we find that the local position in the trade network is most relevant for wealth. Wealthy people have high in- and out-degrees in the trade network, relatively low nearest-neighbor degrees, and low clustering coefficients. Wealthy players have many mutual friendships and are socially well respected by others, but spend more time on business than on socializing. Wealthy players have few personal enemies, but show animosity towards players that behave as public enemies. We find that players that are not organized within social groups are significantly poorer on average. We observe that "political" status and wealth go hand in hand.

  6. The role of E-mentorship in a virtual world for youth transplant recipients.

    Science.gov (United States)

    Cantrell, Kathryn; Fischer, Amy; Bouzaher, Alisha; Bers, Marina

    2010-01-01

    Because of geographic distances, many youth transplant recipients do not have the opportunity to meet and form relationships with peers who have undergone similar experiences. This article explores the role of E-mentorship in virtual environments. Most specifically, by analyzing data from a study conducted with the Zora virtual world with pediatric transplant recipients, suggestions and recommendations are given for conceiving the role of virtual mentors and allocating the needed resources. Zora is a graphical virtual world designed to create a community that offers psychoeducational support and the possibility of participating in virtual activities following a curriculum explicitly designed to address issues of school transition and medical adherence. Activities are designed to foster relationships, teach technological skills, and facilitate the formation of a support network of peers and mentors.This article addresses the research question, "What makes a successful E-mentorship model in virtual worlds for children with serious illnesses?" by looking at E-mentoring patterns such as time spent online, chat analysis, initiation of conversation, initiation of activities, and out-of-world contact.

  7. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  8. Knowledge Networking for Family Planning: The Potential for Virtual Communities of Practice to Move Forward the Global Reproductive Health Agenda

    Directory of Open Access Journals (Sweden)

    Megan O’Brien

    2010-06-01

    Full Text Available This paper highlights experience from five years of using virtual communication tools developed by the World Health Organization Department of Reproductive Health and Research (WHO/RHR and its partners in the Implementing Best Practices (IBP in Reproductive Health Initiative to help bridge the knowledge-to-practice gap among family planning and reproductive health professionals. It explores how communities of practice and virtual networks offer a unique low-cost way to convene public health practitioners around the world to share experiences. It offers examples of how communities of practice can contribute to the development and dissemination of evidence-based health information products, and explores the potential for online networking and collaboration to enhance and inform program design and management. The paper is intended to inform the reproductive health community, as well as others working in health and development, of the potential for using virtual communities of practice to work towards achieving common goals and provide some examples of their successful use.

  9. Assessing offshore emergency evacuation behavior in a virtual environment using a Bayesian Network approach

    International Nuclear Information System (INIS)

    Musharraf, Mashrura; Smith, Jennifer; Khan, Faisal; Veitch, Brian; MacKinnon, Scott

    2016-01-01

    In the performance influencing factor (PIF) hierarchy, person-based influencing factors reside in the top level along with machine-based, team-based, organization-based and situation/stressor-based factors. Though person-based PIFs like morale, motivation, and attitude (MMA) play an important role in shaping performance, it is nearly impossible to assess such PIFs directly. However, it is possible to measure behavioral indicators (e.g. compliance, use of information) that can provide insight regarding the state of the unobservable person-based PIFs. One common approach to measuring these indicators is to carry out a self-reported questionnaire survey. Significant work has been done to make such questionnaires reliable, but the potential validity problem associated with any questionnaire is that the data are subjective and thus may bear a limited relationship to reality. This paper describes the use of a virtual environment to measure behavioral indicators, which in turn can be used as proxies to assess otherwise unobservable PIFs like MMA. A Bayesian Network (BN) model is first developed to define the relationship between person-based PIFs and measurable behavioral indicators. The paper then shows how these indicators can be measured using evidence collected from a virtual environment of an offshore petroleum installation. A study that focused on emergency evacuation scenarios was done with 36 participants. The participants were first assessed using a multiple choice test. They were then assessed based on their observed performance during simulated offshore emergency evacuation conditions. A comparison of the two assessments demonstrates the potential benefits and challenges of using virtual environments to assess behavioral indicators, and thus the person-based PIFs. - Highlights: • New approach to use virtual environment as measure of behavioral indicators. • New model to study morale, motivation, and attitude. • Bayesian Network model to define the

  10. Energy Balance Routing Algorithm Based on Virtual MIMO Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jianpo Li

    2014-01-01

    Full Text Available Wireless sensor networks are usually energy limited and therefore an energy-efficient routing algorithm is desired for prolonging the network lifetime. In this paper, we propose a new energy balance routing algorithm which has the following three improvements over the conventional LEACH algorithm. Firstly, we propose a new cluster head selection scheme by taking into consideration the remaining energy and the most recent energy consumption of the nodes and the entire network. In this way, the sensor nodes with smaller remaining energy or larger energy consumption will be much less likely to be chosen as cluster heads. Secondly, according to the ratio of remaining energy to distance, cooperative nodes are selected to form virtual MIMO structures. It mitigates the uneven distribution of clusters and the unbalanced energy consumption of the whole network. Thirdly, we construct a comprehensive energy consumption model, which can reflect more realistically the practical energy consumption. Numerical simulations analyze the influences of cooperative node numbers and cluster head node numbers on the network lifetime. It is shown that the energy consumption of the proposed routing algorithm is lower than the conventional LEACH algorithm and for the simulation example the network lifetime is prolonged about 25%.

  11. Recent history and geography of virtual water trade.

    Directory of Open Access Journals (Sweden)

    Joel A Carr

    Full Text Available The global trade of goods is associated with a virtual transfer of the water required for their production. The way changes in trade affect the virtual redistribution of freshwater resources has been recently documented through the analysis of the virtual water network. It is, however, unclear how these changes are contributed by different types of products and regions of the world. Here we show how the global patterns of virtual water transport are contributed by the trade of different commodity types, including plant, animal, luxury (e.g., coffee, tea, and alcohol, and other products. Major contributors to the virtual water network exhibit different trade patterns with regard to these commodity types. The net importers rely on the supply of virtual water from a small percentage of the global population. However, discrepancies exist among the different commodity networks. While the total virtual water flux through the network has increased between 1986 and 2010, the proportions associated with the four commodity groups have remained relatively stable. However, some of the major players have shown significant changes in the virtual water imports and exports associated with those commodity groups. For instance, China has switched from being a net exporter of virtual water associated with other products (non-edible plant and animal products typically used for manufacturing to being the largest importer, accounting for 31% of the total water virtually transported with these products. Conversely, in the case of The United states of America, the commodity proportions have remained overall unchanged throughout the study period: the virtual water exports from The United States of America are dominated by plant products, whereas the imports are comprised mainly of animal and luxury products.

  12. Assessing upper extremity motor function in practice of virtual activities of daily living.

    Science.gov (United States)

    Adams, Richard J; Lichter, Matthew D; Krepkovich, Eileen T; Ellington, Allison; White, Marga; Diamond, Paul T

    2015-03-01

    A study was conducted to investigate the criterion validity of measures of upper extremity (UE) motor function derived during practice of virtual activities of daily living (ADLs). Fourteen hemiparetic stroke patients employed a Virtual Occupational Therapy Assistant (VOTA), consisting of a high-fidelity virtual world and a Kinect™ sensor, in four sessions of approximately one hour in duration. An unscented Kalman Filter-based human motion tracking algorithm estimated UE joint kinematics in real-time during performance of virtual ADL activities, enabling both animation of the user's avatar and automated generation of metrics related to speed and smoothness of motion. These metrics, aggregated over discrete sub-task elements during performance of virtual ADLs, were compared to scores from an established assessment of UE motor performance, the Wolf Motor Function Test (WMFT). Spearman's rank correlation analysis indicates a moderate correlation between VOTA-derived metrics and the time-based WMFT assessments, supporting the criterion validity of VOTA measures as a means of tracking patient progress during an UE rehabilitation program that includes practice of virtual ADLs.

  13. Impact of the virtual reality on the neural representation of an environment.

    Science.gov (United States)

    Mellet, Emmanuel; Laou, Laetitia; Petit, Laurent; Zago, Laure; Mazoyer, Bernard; Tzourio-Mazoyer, Nathalie

    2010-07-01

    Despite the increasing use of virtual reality, the impact on cerebral representation of topographical knowledge of learning by virtual reality rather than by actual locomotion has never been investigated. To tackle this challenging issue, we conducted an experiment wherein participants learned an immersive virtual environment using a joystick. The following day, participants' brain activity was monitored by functional magnetic resonance imaging while they mentally estimated distances in this environment. Results were compared with that of participants performing the same task but having learned the real version of the environment by actual walking. We detected a large set of areas shared by both groups including the parieto-frontal areas and the parahippocampal gyrus. More importantly, although participants of both groups performed the same mental task and exhibited similar behavioral performances, they differed at the brain activity level. Unlike real learners, virtual learners activated a left-lateralized network associated with tool manipulation and action semantics. This demonstrated that a neural fingerprint distinguishing virtual from real learning persists when subjects use a mental representation of the learnt environment with equivalent performances. (c) 2009 Wiley-Liss, Inc.

  14. Virtual labs in Leonardo da Vinci

    Directory of Open Access Journals (Sweden)

    Stanislaw Nagy

    2006-10-01

    Full Text Available This paper discusses the problem of virtual lab capabilities in the e-learning. Using combination of web conferencing and "virtual labs" capabilities, a new quality distance learning teaching is now in preparation and will be included in the course teaching to produce interactive, online simulations for the natural gas engineering studies. The activities are designed to enhance the existing curriculum and to include online assessments. A special care is devoted to the security problem between a server and a client computer. Several examples of the virtual labs related to the PVT thermodynamics, fluid flow, the natural gas well-testing, and thev gas network flow are prepared and tested. A major challenge for the 'CELGAS' system is in managing the delicate balance between the student collaboration and the isolation. Students may be encouraged to collaborate and work with each other, simulating their exploration of the lab material.

  15. Dynamic routing and spectrum assignment based on multilayer virtual topology and ant colony optimization in elastic software-defined optical networks

    Science.gov (United States)

    Wang, Fu; Liu, Bo; Zhang, Lijia; Zhang, Qi; Tian, Qinghua; Tian, Feng; Rao, Lan; Xin, Xiangjun

    2017-07-01

    Elastic software-defined optical networks greatly improve the flexibility of the optical switching network while it has brought challenges to the routing and spectrum assignment (RSA). A multilayer virtual topology model is proposed to solve RSA problems. Two RSA algorithms based on the virtual topology are proposed, which are the ant colony optimization (ACO) algorithm of minimum consecutiveness loss and the ACO algorithm of maximum spectrum consecutiveness. Due to the computing power of the control layer in the software-defined network, the routing algorithm avoids the frequent link-state information between routers. Based on the effect of the spectrum consecutiveness loss on the pheromone in the ACO, the path and spectrum of the minimal impact on the network are selected for the service request. The proposed algorithms have been compared with other algorithms. The results show that the proposed algorithms can reduce the blocking rate by at least 5% and perform better in spectrum efficiency. Moreover, the proposed algorithms can effectively decrease spectrum fragmentation and enhance available spectrum consecutiveness.

  16. Virtual nature environment with nature sound exposure induce stress recovery by enhanced parasympathetic activity

    DEFF Research Database (Denmark)

    Annerstedt, Matilda; Jönsson, Peter; Wallergård, Mattias

    2013-01-01

    . The group that recovered in virtual nature without sound and the control group displayed no particular autonomic activation or deactivation. The results demonstrate a potential mechanistic link between nature, the sounds of nature, and stress recovery, and suggest the potential importance of virtual reality......Experimental research on stress recovery in natural environments is limited, as is study of the effect of sounds of nature. After inducing stress by means of a virtual stress test, we explored physiological recovery in two different virtual natural environments (with and without exposure to sounds...... of nature) and in one control condition. Cardiovascular data and saliva cortisol were collected. Repeated ANOVA measurements indicated parasympathetic activation in the group subjected to sounds of nature in a virtual natural environment, suggesting enhanced stress recovery may occur in such surroundings...

  17. Hashtag (# as Message Identity in Virtual Community

    Directory of Open Access Journals (Sweden)

    Urip Mulyadi

    2018-02-01

    Full Text Available Computer Mediated Communication or CMC is able to present a virtual community, where the people inside have the same interest to share information related to events, activities, competitions, entertainment, history, event and others in Semarang City for publication. This research attempted to describe that hashtags can be utilized as the identity of a message in a communications network on Facebook Group MIK Semar. The results of this study are hashtags have changed how we build a virtual community, as the use of hashtags in Facebook Group MIK SEMAR as message identity to build better relationship and support communication among its members.

  18. Understanding interactions in virtual HIV communities: a social network analysis approach.

    Science.gov (United States)

    Shi, Jingyuan; Wang, Xiaohui; Peng, Tai-Quan; Chen, Liang

    2017-02-01

    This study investigated the driving mechanism of building interaction ties among the people living with HIV/AIDS in one of the largest virtual HIV communities in China using social network analysis. Specifically, we explained the probability of forming interaction ties with homophily and popularity characteristics. The exponential random graph modeling results showed that members in this community tend to form homophilous ties in terms of shared location and interests. Moreover, we found a tendency away from popularity effect. This suggests that in this community, resources and information were not disproportionally received by a few of members, which could be beneficial to the overall community.

  19. Traffic Command Gesture Recognition for Virtual Urban Scenes Based on a Spatiotemporal Convolution Neural Network

    Directory of Open Access Journals (Sweden)

    Chunyong Ma

    2018-01-01

    Full Text Available Intelligent recognition of traffic police command gestures increases authenticity and interactivity in virtual urban scenes. To actualize real-time traffic gesture recognition, a novel spatiotemporal convolution neural network (ST-CNN model is presented. We utilized Kinect 2.0 to construct a traffic police command gesture skeleton (TPCGS dataset collected from 10 volunteers. Subsequently, convolution operations on the locational change of each skeletal point were performed to extract temporal features, analyze the relative positions of skeletal points, and extract spatial features. After temporal and spatial features based on the three-dimensional positional information of traffic police skeleton points were extracted, the ST-CNN model classified positional information into eight types of Chinese traffic police gestures. The test accuracy of the ST-CNN model was 96.67%. In addition, a virtual urban traffic scene in which real-time command tests were carried out was set up, and a real-time test accuracy rate of 93.0% was achieved. The proposed ST-CNN model ensured a high level of accuracy and robustness. The ST-CNN model recognized traffic command gestures, and such recognition was found to control vehicles in virtual traffic environments, which enriches the interactive mode of the virtual city scene. Traffic command gesture recognition contributes to smart city construction.

  20. VIRTUAL COMPETITIVENESS: YOUTHS’ VIEWS

    Directory of Open Access Journals (Sweden)

    M. Yu. Semenov

    2018-01-01

    Full Text Available Introduction. Nowadays, the use of information and communication technologies (ICT has become an integral part both of every individual’s life and of the society in general. It is no longer possible to deny the impact of virtual environment on socialisation and development of the identity of young people. In this regard, the investigation of young people’s view on virtual social networks, and the possibility of students’ own competitiveness realization through various web services. The aim of the research presented in the article is to study the factors of students’ assessment of virtual social networks as a tool of personal fulfillment. Methodology and research methods. Content analysis and synthesis of scientific publications studies were carried out at a theoretical stage of the research; secondary sampling analysis of sociologic data material sources was conducted. The empirical research stage involved the instrument of questionnaire surveys, statistical data processing and interpretation of the results. Results and scientific novelty. The social survey conducted in 2017 with the participation of 1087 high school students and 1196 college students of the Tyumen Region shown that the more competitive students consider themselves, the more competitive they perceive the people having great popularity on the Internet. At that, compared to girls, young people are more inclined to consider the people having great popularity on the Internet competitive. It is determined that having a popular virtual media account for the young person is less worthwhile than for female respondents. The author explains this fact: male representatives regard it as “social capital” which can contribute to growth of their competitiveness in society as well as to achieve some profit. The author concludes that youth views on competitiveness are not directly related to the activity in virtual social networks. Frequent use by respondents of the Internet and

  1. Performance evaluation of multi-stratum resources optimization with network functions virtualization for cloud-based radio over optical fiber networks.

    Science.gov (United States)

    Yang, Hui; He, Yongqi; Zhang, Jie; Ji, Yuefeng; Bai, Wei; Lee, Young

    2016-04-18

    Cloud radio access network (C-RAN) has become a promising scenario to accommodate high-performance services with ubiquitous user coverage and real-time cloud computing using cloud BBUs. In our previous work, we implemented cross stratum optimization of optical network and application stratums resources that allows to accommodate the services in optical networks. In view of this, this study extends to consider the multiple dimensional resources optimization of radio, optical and BBU processing in 5G age. We propose a novel multi-stratum resources optimization (MSRO) architecture with network functions virtualization for cloud-based radio over optical fiber networks (C-RoFN) using software defined control. A global evaluation scheme (GES) for MSRO in C-RoFN is introduced based on the proposed architecture. The MSRO can enhance the responsiveness to dynamic end-to-end user demands and globally optimize radio frequency, optical and BBU resources effectively to maximize radio coverage. The efficiency and feasibility of the proposed architecture are experimentally demonstrated on OpenFlow-based enhanced SDN testbed. The performance of GES under heavy traffic load scenario is also quantitatively evaluated based on MSRO architecture in terms of resource occupation rate and path provisioning latency, compared with other provisioning scheme.

  2. Modeling the future evolution of the virtual water trade network: A combination of network and gravity models

    Science.gov (United States)

    Sartori, Martina; Schiavo, Stefano; Fracasso, Andrea; Riccaboni, Massimo

    2017-12-01

    The paper investigates how the topological features of the virtual water (VW) network and the size of the associated VW flows are likely to change over time, under different socio-economic and climate scenarios. We combine two alternative models of network formation -a stochastic and a fitness model, used to describe the structure of VW flows- with a gravity model of trade to predict the intensity of each bilateral flow. This combined approach is superior to existing methodologies in its ability to replicate the observed features of VW trade. The insights from the models are used to forecast future VW flows in 2020 and 2050, under different climatic scenarios, and compare them with future water availability. Results suggest that the current trend of VW exports is not sustainable for all countries. Moreover, our approach highlights that some VW importers might be exposed to "imported water stress" as they rely heavily on imports from countries whose water use is unsustainable.

  3. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  4. The Elderly Perceived Meanings and Values of Virtual Reality Leisure Activities: A Means-End Chain Approach

    Directory of Open Access Journals (Sweden)

    Cheng-Shih Lin

    2018-04-01

    Full Text Available This study uses means-end chain (MEC techniques to examine the awareness, decision-making procedure, and personal values of the elderly with regard to virtual reality leisure activities. The results of the study show that elderly respondents value virtual reality leisure activities that are fun, safe, and easy. In terms of outcome benefits, elderly respondents value feeling physically and mentally healthy, firsthand experience, and satisfied curiosity. In value terms, elderly respondents hope that their chosen virtual reality leisure activities improve not only their relationships with others, but also their enjoyment, quality of life, and sense of belonging. The results show that, while consumers with different awarenesses of virtual reality leisure activities have different decision-making processes, they share creating “good memories” as the terminal value with the most significant effect. This presents a potential opportunity to promote virtual reality leisure activities. Relevant bodies or enterprises can seek to create good memories in consumers by developing activities that are safe and fun, promote good health, and provide good service, thereby attracting the interest of elderly consumers.

  5. The Elderly Perceived Meanings and Values of Virtual Reality Leisure Activities: A Means-End Chain Approach

    Science.gov (United States)

    Lin, Cheng-Shih; Jeng, Mei-Yuan

    2018-01-01

    This study uses means-end chain (MEC) techniques to examine the awareness, decision-making procedure, and personal values of the elderly with regard to virtual reality leisure activities. The results of the study show that elderly respondents value virtual reality leisure activities that are fun, safe, and easy. In terms of outcome benefits, elderly respondents value feeling physically and mentally healthy, firsthand experience, and satisfied curiosity. In value terms, elderly respondents hope that their chosen virtual reality leisure activities improve not only their relationships with others, but also their enjoyment, quality of life, and sense of belonging. The results show that, while consumers with different awarenesses of virtual reality leisure activities have different decision-making processes, they share creating “good memories” as the terminal value with the most significant effect. This presents a potential opportunity to promote virtual reality leisure activities. Relevant bodies or enterprises can seek to create good memories in consumers by developing activities that are safe and fun, promote good health, and provide good service, thereby attracting the interest of elderly consumers. PMID:29614012

  6. The Elderly Perceived Meanings and Values of Virtual Reality Leisure Activities: A Means-End Chain Approach.

    Science.gov (United States)

    Lin, Cheng-Shih; Jeng, Mei-Yuan; Yeh, Tsu-Ming

    2018-04-03

    This study uses means-end chain (MEC) techniques to examine the awareness, decision-making procedure, and personal values of the elderly with regard to virtual reality leisure activities. The results of the study show that elderly respondents value virtual reality leisure activities that are fun, safe, and easy. In terms of outcome benefits, elderly respondents value feeling physically and mentally healthy, firsthand experience, and satisfied curiosity. In value terms, elderly respondents hope that their chosen virtual reality leisure activities improve not only their relationships with others, but also their enjoyment, quality of life, and sense of belonging. The results show that, while consumers with different awarenesses of virtual reality leisure activities have different decision-making processes, they share creating "good memories" as the terminal value with the most significant effect. This presents a potential opportunity to promote virtual reality leisure activities. Relevant bodies or enterprises can seek to create good memories in consumers by developing activities that are safe and fun, promote good health, and provide good service, thereby attracting the interest of elderly consumers.

  7. Virtual Exploratories

    DEFF Research Database (Denmark)

    Jensen, Sisse Siggaard

    2006-01-01

    -systems, the paper introduces the designing strategy referred to as virtual exploratories. Some of the advanced virtual worlds may inspire the design of such provoking and challenging virtual exploratories, and especially the Massively Multi-User Online Role-Playing Games (MMORPGS). However, if we have to learn from...... the design and activity of the advanced virtual worlds and role-playing games, then the empirical research on the actors’ activity, while they are acting, is an important precondition to it. A step towards the conception of such a designing strategy for virtual exploratories is currently pursued....... [1] The research project: Actors and Avatars Communicating in Virtual Worlds – an Empirical Analysis of Actors’ Sense-making Strategies When Based on a Communication Theoretical Approach’ (2006-2007) is supported...

  8. Virtual machine performance benchmarking.

    Science.gov (United States)

    Langer, Steve G; French, Todd

    2011-10-01

    The attractions of virtual computing are many: reduced costs, reduced resources and simplified maintenance. Any one of these would be compelling for a medical imaging professional attempting to support a complex practice on limited resources in an era of ever tightened reimbursement. In particular, the ability to run multiple operating systems optimized for different tasks (computational image processing on Linux versus office tasks on Microsoft operating systems) on a single physical machine is compelling. However, there are also potential drawbacks. High performance requirements need to be carefully considered if they are to be executed in an environment where the running software has to execute through multiple layers of device drivers before reaching the real disk or network interface. Our lab has attempted to gain insight into the impact of virtualization on performance by benchmarking the following metrics on both physical and virtual platforms: local memory and disk bandwidth, network bandwidth, and integer and floating point performance. The virtual performance metrics are compared to baseline performance on "bare metal." The results are complex, and indeed somewhat surprising.

  9. Novel Data Mining Methods for Virtual Screening of Biological Active Chemical Compounds

    KAUST Repository

    Soufan, Othman M.

    2016-11-23

    Drug discovery is a process that takes many years and hundreds of millions of dollars to reveal a confident conclusion about a specific treatment. Part of this sophisticated process is based on preliminary investigations to suggest a set of chemical compounds as candidate drugs for the treatment. Computational resources have been playing a significant role in this part through a step known as virtual screening. From a data mining perspective, availability of rich data resources is key in training prediction models. Yet, the difficulties imposed by big expansion in data and its dimensionality are inevitable. In this thesis, I address the main challenges that come when data mining techniques are used for virtual screening. In order to achieve an efficient virtual screening using data mining, I start by addressing the problem of feature selection and provide analysis of best ways to describe a chemical compound for an enhanced screening performance. High-throughput screening (HTS) assays data used for virtual screening are characterized by a great class imbalance. To handle this problem of class imbalance, I suggest using a novel algorithm called DRAMOTE to narrow down promising candidate chemicals aimed at interaction with specific molecular targets before they are experimentally evaluated. Existing works are mostly proposed for small-scale virtual screening based on making use of few thousands of interactions. Thus, I propose enabling large-scale (or big) virtual screening through learning millions of interaction while exploiting any relevant dependency for a better accuracy. A novel solution called DRABAL that incorporates structure learning of a Bayesian Network as a step to model dependency between the HTS assays, is showed to achieve significant improvements over existing state-of-the-art approaches.

  10. Material Matters for Learning in Virtual Networks: A Case Study of a Professional Learning Programme Hosted in a Google+ Online Community

    Science.gov (United States)

    Ackland, Aileen; Swinney, Ann

    2015-01-01

    In this paper, we draw on Actor-Network Theories (ANT) to explore how material components functioned to create gateways and barriers to a virtual learning network in the context of a professional development module in higher education. Students were practitioners engaged in family learning in different professional roles and contexts. The data…

  11. Heat recovery networks synthesis of large-scale industrial sites: Heat load distribution problem with virtual process subsystems

    International Nuclear Information System (INIS)

    Pouransari, Nasibeh; Maréchal, Francois

    2015-01-01

    Highlights: • Synthesizing industrial size heat recovery network with match reduction approach. • Targeting TSI with minimum exchange between process subsystems. • Generating a feasible close-to-optimum network. • Reducing tremendously the HLD computational time and complexity. • Generating realistic network with respect to the plant layout. - Abstract: This paper presents a targeting strategy to design a heat recovery network for an industrial plant by dividing the system into subsystems while considering the heat transfer opportunities between them. The methodology is based on a sequential approach. The heat recovery opportunity between process units and the optimal flow rates of utilities are first identified using a Mixed Integer Linear Programming (MILP) model. The site is then divided into a number of subsystems where the overall interaction is resumed by a pair of virtual hot and cold stream per subsystem which is reconstructed by solving the heat cascade inside each subsystem. The Heat Load Distribution (HLD) problem is then solved between those packed subsystems in a sequential procedure where each time one of the subsystems is unpacked by switching from the virtual stream pair back into the original ones. The main advantages are to minimize the number of connections between process subsystems, to alleviate the computational complexity of the HLD problem and to generate a feasible network which is compatible with the minimum energy consumption objective. The application of the proposed methodology is illustrated through a number of case studies, discussed and compared with the relevant results from the literature

  12. The photoelectric effect and study of the diffraction of light: Two new experiments in UNILabs virtual and remote laboratories network

    International Nuclear Information System (INIS)

    Sánchez, Juan Pedro; Carreras, Carmen; Yuste, Manuel; Dormido, Sebastián; Sáenz, Jacobo; De la Torre, Luis; Rubén, Heradio

    2015-01-01

    This work describes two experiments: 'study of the diffraction of light: Fraunhofer approximation' and 'the photoelectric effect'. Both of them count with a virtual, simulated, version of the experiment as well as with a real one which can be operated remotely. The two previous virtual and remote labs (built using Easy Java(script) Simulations) are integrated in UNILabs, a network of online interactive laboratories based on the free Learning Management System Moodle. In this web environment, students can find not only the virtual and remote labs but also manuals with related theory, the user interface description for each application, and so on.

  13. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  14. Reliable Geographical Forwarding in Cognitive Radio Sensor Networks Using Virtual Clusters

    Science.gov (United States)

    Zubair, Suleiman; Fisal, Norsheila

    2014-01-01

    The need for implementing reliable data transfer in resource-constrained cognitive radio ad hoc networks is still an open issue in the research community. Although geographical forwarding schemes are characterized by their low overhead and efficiency in reliable data transfer in traditional wireless sensor network, this potential is still yet to be utilized for viable routing options in resource-constrained cognitive radio ad hoc networks in the presence of lossy links. In this paper, a novel geographical forwarding technique that does not restrict the choice of the next hop to the nodes in the selected route is presented. This is achieved by the creation of virtual clusters based on spectrum correlation from which the next hop choice is made based on link quality. The design maximizes the use of idle listening and receiver contention prioritization for energy efficiency, the avoidance of routing hot spots and stability. The validation result, which closely follows the simulation result, shows that the developed scheme can make more advancement to the sink as against the usual decisions of relevant ad hoc on-demand distance vector route select operations, while ensuring channel quality. Further simulation results have shown the enhanced reliability, lower latency and energy efficiency of the presented scheme. PMID:24854362

  15. Reliable Geographical Forwarding in Cognitive Radio Sensor Networks Using Virtual Clusters

    Directory of Open Access Journals (Sweden)

    Suleiman Zubair

    2014-05-01

    Full Text Available The need for implementing reliable data transfer in resource-constrained cognitive radio ad hoc networks is still an open issue in the research community. Although geographical forwarding schemes are characterized by their low overhead and efficiency in reliable data transfer in traditional wireless sensor network, this potential is still yet to be utilized for viable routing options in resource-constrained cognitive radio ad hoc networks in the presence of lossy links. In this paper, a novel geographical forwarding technique that does not restrict the choice of the next hop to the nodes in the selected route is presented. This is achieved by the creation of virtual clusters based on spectrum correlation from which the next hop choice is made based on link quality. The design maximizes the use of idle listening and receiver contention prioritization for energy efficiency, the avoidance of routing hot spots and stability. The validation result, which closely follows the simulation result, shows that the developed scheme can make more advancement to the sink as against the usual decisions of relevant ad hoc on-demand distance vector route select operations, while ensuring channel quality. Further simulation results have shown the enhanced reliability, lower latency and energy efficiency of the presented scheme.

  16. All-optical virtual private network and ONUs communication in optical OFDM-based PON system.

    Science.gov (United States)

    Zhang, Chongfu; Huang, Jian; Chen, Chen; Qiu, Kun

    2011-11-21

    We propose and demonstrate a novel scheme, which enables all-optical virtual private network (VPN) and all-optical optical network units (ONUs) inter-communications in optical orthogonal frequency-division multiplexing-based passive optical network (OFDM-PON) system using the subcarrier bands allocation for the first time (to our knowledge). We consider the intra-VPN and inter-VPN communications which correspond to two different cases: VPN communication among ONUs in one group and in different groups. The proposed scheme can provide the enhanced security and a more flexible configuration for VPN users compared to the VPN in WDM-PON or TDM-PON systems. The all-optical VPN and inter-ONU communications at 10-Gbit/s with 16 quadrature amplitude modulation (16 QAM) for the proposed optical OFDM-PON system are demonstrated. These results verify that the proposed scheme is feasible. © 2011 Optical Society of America

  17. Immersive virtual walk-through development for tokamak using active head mounted display

    International Nuclear Information System (INIS)

    Dutta, Pramit

    2015-01-01

    A fully immersive virtual walk-through of the SST-1 tokamak has been developed. The virtual walkthrough renders the virtual model of SST-1 tokamak through a active stereoscopic head mounted display to visualize the virtual environment. All locations inside and outside of the reactor can be accessed and reviewed. Such a virtual walkthrough provides a 1:1 scale visualization of all components of the tokamak. To achieve such a virtual model, the graphical details of the tokamak CAD model are enhanced. Such enhancements are provided to improve lighting conditions at various locations, texturing of components to have a realistic visual effect and 360° rendering for ease of access. The graphical enhancements also include the redefinition of the facets to optimize the surface triangles to remove lags in display during visual rendering. Two separate algorithms are developed to interact with the virtual model. A fly-by algorithm, developed using C#, uses inputs from a commercial joystick to navigate within the virtual environment. The second algorithm uses the IR and gyroscopic tracking system of the head mounted display to render view as per the current pose of the user within the virtual environment and the direction of view. Such a virtual walk-thorough can be used extensively for design review and integration, review of new components, operator training for remote handling, operations, upgrades of tokamak, etc. (author)

  18. Networking of Bibliographical Information: Lessons learned for the Virtual Observatory

    Science.gov (United States)

    Genova, Françoise; Egret, Daniel

    Networking of bibliographic information is particularly remarkable in astronomy. On-line journals, the ADS bibliographic database, SIMBAD and NED are everyday tools for research, and provide easy navigation from one resource to another. Tables are published on line, in close collaboration with data centers. Recent new developments include the links between observatory archives and the ADS, as well as the large scale prototyping of object links between Astronomy and Astrophysics and SIMBAD, following those implemented a few years ago with New Astronomy and the International Bulletin of Variable stars . This networking has been made possible by close collaboration between the ADS, data centers such as the CDS and NED, and the journals, and this partnership being now extended to observatory archives. Simple, de facto exchange standards, like the bibcode to refer to a published paper, have been the key for building links and exchanging data. This partnership, in which practitioners from different disciplines agree to link their resources and to work together to define useful and usable standards, has produced a revolution in scientists' practice. It is an excellent model for the Virtual Observatory projects.

  19. Material matters for learning in virtual networks: a case study of a professional learning programme hosted in a Google+ online community

    Directory of Open Access Journals (Sweden)

    Aileen Ackland

    2015-08-01

    Full Text Available In this paper, we draw on Actor–Network Theories (ANT to explore how material components functioned to create gateways and barriers to a virtual learning network in the context of a professional development module in higher education. Students were practitioners engaged in family learning in different professional roles and contexts. The data comprised postings in the Google+ community, email correspondence, meeting notes, feedback submitted at the final workshop and post-module evaluation forms. Our analysis revealed a complex set of interactions, and suggests multiple ways human actors story their encounters with non-human components and the effects these have on the learning experience. The aim of this paper is to contribute to a more holistic understanding of the components and dynamics of social learning networks in the virtual world and consider the implications for the design of online learning for continuous professional development (CPD.

  20. Framework for Virtual Cognitive Experiment in Virtual Geographic Environments

    Directory of Open Access Journals (Sweden)

    Fan Zhang

    2018-01-01

    Full Text Available Virtual Geographic Environment Cognition is the attempt to understand the human cognition of surface features, geographic processes, and human behaviour, as well as their relationships in the real world. From the perspective of human cognition behaviour analysis and simulation, previous work in Virtual Geographic Environments (VGEs has focused mostly on representing and simulating the real world to create an ‘interpretive’ virtual world and improve an individual’s active cognition. In terms of reactive cognition, building a user ‘evaluative’ environment in a complex virtual experiment is a necessary yet challenging task. This paper discusses the outlook of VGEs and proposes a framework for virtual cognitive experiments. The framework not only employs immersive virtual environment technology to create a realistic virtual world but also involves a responsive mechanism to record the user’s cognitive activities during the experiment. Based on the framework, this paper presents two potential implementation methods: first, training a deep learning model with several hundred thousand street view images scored by online volunteers, with further analysis of which visual factors produce a sense of safety for the individual, and second, creating an immersive virtual environment and Electroencephalogram (EEG-based experimental paradigm to both record and analyse the brain activity of a user and explore what type of virtual environment is more suitable and comfortable. Finally, we present some preliminary findings based on the first method.

  1. Virtual Factory Testbed

    Data.gov (United States)

    Federal Laboratory Consortium — The Virtual Factory Testbed (VFT) is comprised of three physical facilities linked by a standalone network (VFNet). The three facilities are the Smart and Wireless...

  2. All-optical virtual private network system in OFDM based long-reach PON using RSOA re-modulation technique

    Science.gov (United States)

    Kim, Chang-Hun; Jung, Sang-Min; Kang, Su-Min; Han, Sang-Kook

    2015-01-01

    We propose an all-optical virtual private network (VPN) system in an orthogonal frequency division multiplexing (OFDM) based long reach PON (LR-PON). In the optical access network field, technologies based on fundamental upstream (U/S) and downstream (D/S) have been actively researched to accommodate explosion of data capacity. However, data transmission among the end users which is arisen from cloud computing, file-sharing and interactive game takes a large weight inside of internet traffic. Moreover, this traffic is predicted to increase more if Internet of Things (IoT) services are activated. In a conventional PON, VPN data is transmitted through ONU-OLT-ONU via U/S and D/S carriers. It leads to waste of bandwidth and energy due to O-E-O conversion in the OLT and round-trip propagation between OLT and remote node (RN). Also, it causes inevitable load to the OLT for electrical buffer, scheduling and routing. The network inefficiency becomes more critical in a LR-PON which has been researched as an effort to reduce CAPEX and OPEX through metro-access consolidation. In the proposed system, the VPN data is separated from conventional U/S and re-modulated on the D/S carrier by using RSOA in the ONUs to avoid bandwidth consumption of U/S and D/S unlike in previously reported system. Moreover, the transmitted VPN data is re-directed to the ONUs by wavelength selective reflector device in the RN without passing through the OLT. Experimental demonstration for the VPN communication system in an OFDM based LR-PON has been verified.

  3. Active Versus Passive Academic Networking

    DEFF Research Database (Denmark)

    Goel, Rajeev K.; Grimpe, Christoph

    2013-01-01

    This paper examines determinants of networking by academics. Using information from a unique large survey of German researchers, the key contribution focuses on the active versus passive networking distinction. Is active networking by researchers a substitute or a complement to passive networking......? Other contributions include examining the role of geographic factors in networking and whether research bottlenecks affect a researcher's propensity to network. Are the determinants of European conference participation by German researchers different from conferences in rest of the world? Results show...... that some types of passive academic networking are complementary to active networking, while others are substitute. Further, we find differences in factors promoting participation in European conferences versus conferences in rest of the world. Finally, publishing bottlenecks as a group generally do...

  4. Leading a Virtual Intercultural Team. Implications for Virtual Team Leaders

    OpenAIRE

    Chutnik, Monika; Grzesik, Katarzyna

    2009-01-01

    Increasing number of companies operate in the setup of teams whose members are geographically scattered and have different cultural origins. They work through access to the same digital network and communicate by means of modern technology. Sometimes they are located in different time zones and have never met each other face to face. This is the age of a virtual team leader. Virtual leadership in intercultural groups requires special skills from leaders. Many of these reflect leadership s...

  5. Knowledge management through two virtual communities of practice (Endobloc and Pneumobloc).

    Science.gov (United States)

    Lara, Beatriz; Cañas, Francesca; Vidal, Antonieta; Nadal, Núria; Rius, Ferran; Paredes, Eugeni; Hernández, Marta; Maravall, Francisco J; Franch-Nadal, Josep; Barbé, Ferran; Mauricio, Dídac

    2017-09-01

    We developed two virtual communities of practice (Endobloc and Pneumobloc) to increase the interaction between general practitioners and nurses in primary care and hospital endocrinologists and pulmonologists. They were designed and developed using an existing web 2.0-based virtual network belonging to the local National Health System, and we quantitatively assessed the usefulness through the participation and use during the first 24 months after the launch in 2010. A total of 26,372 visits (47% Endobloc's visits) and 2351 contributions (Endobloc's contribution 38.9%) to both virtual communities of practice were registered during the first 24 months. The most popular sections were the e-Blog and the e-Consultations section in both virtual communities of practice, but some differences in the pattern of use in other sections were observed. Activity on the virtual communities of practice occurred throughout the day including weekends and holiday periods. We showed that virtual communities of practice are feasible under real-life clinical practice.

  6. A Virtual Private Local PCN Ring Network Based on ATM VP Cross—Connection

    Institute of Scientific and Technical Information of China (English)

    LinBin; MaYingjun; 等

    1995-01-01

    Avirtual private local PCNring network (VPLPR)is proposed .VPLPR is a virtual logic ring seuved for digital cordless telephone system and it works on ATM VP cross-connection mechanism.Full-distributed data bases are organized for visitor location registers(VLR)and home location register(HLR).The signaling protocols are compatible upward to B-ISDN. The architecture and some of the main characteristics of VPLPR are given.How to configure the ATM VP cross-connection ring is described.And then a protocol conversion between STM frames and ATMcells in base station controller(BSC)is presented.

  7. Virtual Community, social network and media environment of Canary Isands regional digital newspapers

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Manuel Mateos Rodríguez

    2008-01-01

    Full Text Available The impact of the new communication and information technologies has favoured the creation of multiple local newspaper websites in the Canary Islands, thus making the regional press emerge as an alternative on the rise. This tendency affects significantly both traditional and new editions of the different regional and local newspapers from the Canaries and motivates a different distribution, positioning and development within the local media environment in which these media share a novel dimension of communication with a specific virtual community and social network within the World Wide Web.

  8. Virtual Communities of Collaborative Learning for Higher Education

    Directory of Open Access Journals (Sweden)

    Gilda E. Sotomayor

    2014-11-01

    Full Text Available This article aims to outline and project three new learning scenarios for Higher Education that, after the emergence of ICT and communication through the Network-lnternet, have come under the generic name of virtual communities. To that end, we start from a previous conceptual analysis on collaborative learning, cooperative learning and related concepts taking place in these communities and serving as a basis for sorting them into three types in particular: communities of educational work of professional practice and scientific knowledge. Virtual communities where the activities undertaken and skills acquired are set as important parts of our personal learning development, wich are necessary to build the Knowledge Society.

  9. Virtual MIMO Beamforming and Device Pairing Enabled by Device-to-Device Communications for Multidevice Networks

    Directory of Open Access Journals (Sweden)

    Yeonjin Jeong

    2017-01-01

    Full Text Available We consider a multidevice network with asymmetric antenna configurations which supports not only communications between an access point and devices but also device-to-device (D2D communications for the Internet of things. For the network, we propose the transmit and receive beamforming with the channel state information (CSI for virtual multiple-input multiple-output (MIMO enabled by D2D receive cooperation. We analyze the sum rate achieved by a device pair in the proposed method and identify the strategies to improve the sum rate of the device pair. We next present a distributed algorithm and its equivalent algorithm for device pairing to maximize the throughput of the multidevice network. Simulation results confirm the advantages of the transmit CSI and D2D cooperation as well as the validity of the distributive algorithm.

  10. Grids, virtualization, and clouds at Fermilab

    International Nuclear Information System (INIS)

    Timm, S; Chadwick, K; Garzoglio, G; Noh, S

    2014-01-01

    Fermilab supports a scientific program that includes experiments and scientists located across the globe. To better serve this community, in 2004, the (then) Computing Division undertook the strategy of placing all of the High Throughput Computing (HTC) resources in a Campus Grid known as FermiGrid, supported by common shared services. In 2007, the FermiGrid Services group deployed a service infrastructure that utilized Xen virtualization, LVS network routing and MySQL circular replication to deliver highly available services that offered significant performance, reliability and serviceability improvements. This deployment was further enhanced through the deployment of a distributed redundant network core architecture and the physical distribution of the systems that host the virtual machines across multiple buildings on the Fermilab Campus. In 2010, building on the experience pioneered by FermiGrid in delivering production services in a virtual infrastructure, the Computing Sector commissioned the FermiCloud, General Physics Computing Facility and Virtual Services projects to serve as platforms for support of scientific computing (FermiCloud 6 GPCF) and core computing (Virtual Services). This work will present the evolution of the Fermilab Campus Grid, Virtualization and Cloud Computing infrastructure together with plans for the future.

  11. Grids, virtualization, and clouds at Fermilab

    Science.gov (United States)

    Timm, S.; Chadwick, K.; Garzoglio, G.; Noh, S.

    2014-06-01

    Fermilab supports a scientific program that includes experiments and scientists located across the globe. To better serve this community, in 2004, the (then) Computing Division undertook the strategy of placing all of the High Throughput Computing (HTC) resources in a Campus Grid known as FermiGrid, supported by common shared services. In 2007, the FermiGrid Services group deployed a service infrastructure that utilized Xen virtualization, LVS network routing and MySQL circular replication to deliver highly available services that offered significant performance, reliability and serviceability improvements. This deployment was further enhanced through the deployment of a distributed redundant network core architecture and the physical distribution of the systems that host the virtual machines across multiple buildings on the Fermilab Campus. In 2010, building on the experience pioneered by FermiGrid in delivering production services in a virtual infrastructure, the Computing Sector commissioned the FermiCloud, General Physics Computing Facility and Virtual Services projects to serve as platforms for support of scientific computing (FermiCloud 6 GPCF) and core computing (Virtual Services). This work will present the evolution of the Fermilab Campus Grid, Virtualization and Cloud Computing infrastructure together with plans for the future.

  12. Virtual and Augmented Reality on the 5G Highway

    OpenAIRE

    Orlosky, Jason; Kiyokawa, Kiyoshi; Takemura, Haruo

    2017-01-01

    In recent years, virtual and augmented reality have begun to take advantage of the high speed capabilities of data streaming technologies and wireless networks. However, limitations like bandwidth and latency still prevent us from achieving high fidelity telepresence and collaborative virtual and augmented reality applications. Fortunately, both researchers and engineers are aware of these problems and have set out to design 5G networks to help us to move to the next generation of virtual int...

  13. IMPLEMENTASI VIRTUAL PRIVATE NETWORK - WAN DALAM DUNIA BISNIS

    Directory of Open Access Journals (Sweden)

    Erma Suryani

    2007-01-01

    Full Text Available Dalam dunia bisnis, biasanya sebuah organisasi ingin membangun Wide Area Network (WAN untuk menghubungkan beberapa kantor cabangnya. Sebelum munculnya Virtual Private Network (VPN, mereka umumnya menggunakan ” leased line” yang mahal sehingga hanya perusahaan besar yang dapat memilikinya.VPN - WAN memberi solusi alternatif karena dapat mengurangi biaya pembuatan infrastruktur jaringan dan memotong biaya operasional dengan memanfaatkan failitas internet sebagai media komunikasinya. Perusahaan cukup menghubungi  Internet Service Provider (ISP terdekat untuk mendapatkan layanan ini.Setiap paket informasi yang dikirim dapat diakses, diawasi atau bahkan dimanipulasi oleh pengguna. Supaya komunikasi berjalan aman maka diperlukan protokol tambahan khusus yang dirancang untuk mengamankan data yang dikirim.  Dewasa ini sudah banyak perusahaan seperti : perusahaan manufaktur, distribusi dan retail; pertambangan minyak dan gas, telekomunikasi, finansial, pemerintahan serta industri transportasi yang menggunakan VPN karena fasilitas –fasilitas yang ditawarkan berupa remote access client, internetworking LAN to LAN serta akses yang terkontrol dengan biaya yang murah.  Uji coba yang dilakukan Miercom(LAB penyedia testing kinerja perangkat keras terhadap  Cisco 1841 membuktikan bahwa Cisco 1841 dapat  menopang suatu komunikasi dua arah, interkoneksi IP WAN kapasitas E1 dengan enkripsi 3DES yang dapat menunjang throughput sampai dengan 2 Mbps dalam koneksi E1 IP-WAN. Penggunaan  VPN akan meningkatkan efektivitas, efisiensi kerja serta skalabilitas perusahaan. Keuntungan lain yang didapat dari VPN adalah pada biaya pulsa yang jauh lebih murah dibandingkan dengan menggunakan” leased line”.Kata Kunci: VPN, WAN,  paket informasi, ISP,  remote access client, skalabilitas.

  14. Virtual goods recommendations in virtual worlds.

    Science.gov (United States)

    Chen, Kuan-Yu; Liao, Hsiu-Yu; Chen, Jyun-Hung; Liu, Duen-Ren

    2015-01-01

    Virtual worlds (VWs) are computer-simulated environments which allow users to create their own virtual character as an avatar. With the rapidly growing user volume in VWs, platform providers launch virtual goods in haste and stampede users to increase sales revenue. However, the rapidity of development incurs virtual unrelated items which will be difficult to remarket. It not only wastes virtual global companies' intelligence resources, but also makes it difficult for users to find suitable virtual goods fit for their virtual home in daily virtual life. In the VWs, users decorate their houses, visit others' homes, create families, host parties, and so forth. Users establish their social life circles through these activities. This research proposes a novel virtual goods recommendation method based on these social interactions. The contact strength and contact influence result from interactions with social neighbors and influence users' buying intention. Our research highlights the importance of social interactions in virtual goods recommendation. The experiment's data were retrieved from an online VW platform, and the results show that the proposed method, considering social interactions and social life circle, has better performance than existing recommendation methods.

  15. Reflections on Active Networking

    Science.gov (United States)

    2005-01-01

    with a Software Switch for Active Networks ”. We had initially called the project “ SoftSwitch ”, but after some concerns David Farber raised that this...Reflections on Active Networking Jonathan M. Smith CIS Department, University of Pennsylvania jms@cis.upenn.edu Abstract Interactions among...telecommunications networks , computers, and other peripheral devices have been of interest since the earliest distributed computing systems. A key

  16. Agreements in Virtual Organizations

    Science.gov (United States)

    Pankowska, Malgorzata

    This chapter is an attempt to explain the important impact that contract theory delivers with respect to the concept of virtual organization. The author believes that not enough research has been conducted in order to transfer theoretical foundations for networking to the phenomena of virtual organizations and open autonomic computing environment to ensure the controllability and management of them. The main research problem of this chapter is to explain the significance of agreements for virtual organizations governance. The first part of this chapter comprises explanations of differences among virtual machines and virtual organizations for further descriptions of the significance of the first ones to the development of the second. Next, the virtual organization development tendencies are presented and problems of IT governance in highly distributed organizational environment are discussed. The last part of this chapter covers analysis of contracts and agreements management for governance in open computing environments.

  17. Creating a virtual network of communication of information in view on the regime of information

    OpenAIRE

    Luiz Antonio Dias Leal; Isa Freire; Rosali Fernandez de Souza

    2013-01-01

    Presents the results of research that uses the concept of 'information system' Gonzalez Gomez to identify elements and actors within the domain of a virtual network of information communication. The research was conducted under the Program Good Agricultural Practices - Beef Cattle at the Brazilian Agricultural Research Corporation - EMBRAPA, which aims to make systems for beef cattle production more profitable and competitive, ensuring the supply of safe food, from of sustainable production s...

  18. Virtual corporations, enterprise and organisation

    Directory of Open Access Journals (Sweden)

    Carmen RÃDUT

    2009-06-01

    Full Text Available Virtual organisation is a strategic paradigm that is centred on the use of information and ICT to create value. Virtual organisation is presented as a metamanagement strategy that has application in all value oriented organisations. Within the concept of Virtual organisation, the business model is an ICT based construct that bridges and integrates enterprise strategic and operational concerns. Firms try to ameliorate the impacts of risk and product complexity by forming alliances and partnerships with others to spread the risk of new products and new ventures and to increase organisational competence. The result is a networked virtual organization.

  19. Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures

    Science.gov (United States)

    Bamiah, Mervat Adib; Brohi, Sarfraz Nawaz; Chuprat, Suriayati

    2012-01-01

    Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud infrastructures. Moving the application from a physical to a virtual platform increases the efficiency, flexibility and reduces management cost as well as effort. Cloud computing is adopting the paradigm of virtualization, using this technique, memory, CPU and computational power is provided to clients' VMs by utilizing the underlying physical hardware. Beside these advantages there are few challenges faced by adopting virtualization such as management of VMs and network traffic, unexpected additional cost and resource allocation. Virtual Machine Monitor (VMM) or hypervisor is the tool used by cloud providers to manage the VMs on cloud. There are several heterogeneous hypervisors provided by various vendors that include VMware, Hyper-V, Xen and Kernel Virtual Machine (KVM). Considering the challenge of VM management, this paper describes several techniques to monitor and manage virtualized cloud infrastructures.

  20. Virtual Trondheim: A Virtual Environment for Tourism and Education

    OpenAIRE

    Jose, Dawn Alphonse

    2015-01-01

    The purpose of this study is to investigate whether educational activities in tourism can be supported by virtual reality technologies, using virtual world frameworks. Settings of virtual world of SecondLife and a recent Virtual Reality technology known as Oculus Rift were used in the thesis work with the city of Trondheim as the main context. Theoretical studies on Virtual Reality systems were conducted and data for the research were obtained through empirical studies condu...

  1. Virtual private networks application in Nuclear Regulatory Authority of Argentina

    International Nuclear Information System (INIS)

    Glidewell, Donnie D.; Smartt, Heidi A.; Caskey, Susan A.; Bonino, Anibal D.; Perez, Adrian C.; Pardo, German R.; Vigile, Rodolfo S.; Krimer, Mario

    2004-01-01

    As the result of the existence of several regional delegations all over the country, a requirement was made to conform a secure data interchange structure. This would make possible the interconnection of these facilities and their communication with the Autoridad Regulatoria Nuclear (ARN) headquarters. The records these parts exchange are often of classified nature, including sensitive data by the local safeguards inspectors. On the other hand, the establishment of this network should simplify the access of authorized nuclear and radioactive materials users to the ARN databases, from remote sites and with significant trust levels. These requirements called for a network that should be not only private but also secure, providing data centralization and integrity assurance with a strict user control. The first proposal was to implement a point to point link between the installations. This proposal was deemed as economically not viable, and it had the disadvantage of not being easily reconfigurable. The availability of new technologies, and the accomplishment of the Action Sheet 11 under an agreement between Argentine Nuclear Regulatory Authority and the United States Department of Energy (DOE), opened a new path towards the resolution of this problem. By application of updated tunneling security protocols it was possible to project a manageable and secure network through the use of Virtual Private Networking (VPN) hardware. A first trial installation of this technology was implemented between ARN headquarters at Buenos Aires and the Southern Region Office at Bariloche, Argentina. This private net is at the moment under test, and it is planned to expand to more sites in this country, reaching for example to nuclear power plants. The Bariloche installation had some interesting peculiarities. The solutions proposed to them revealed to be very useful during the development of the network expansion plans, as they showed how to adapt the VPN technical requisites to the

  2. Virtual Victorians networks, connections, technologies

    CERN Document Server

    Alfano, Veronica

    2016-01-01

    Exploring how scholars use digital resources to reconstruct the 19th century, this volume probes key issues in the intersection of digital humanities and history. Part I examines the potential of online research tools for literary scholarship while Part II outlines a prehistory of digital virtuality by exploring specific Victorian cultural forms.

  3. Recent evolution of China's virtual water trade: analysis of selected crops and considerations for policy

    Science.gov (United States)

    Shi, J.; Liu, J.; Pinter, L.

    2013-09-01

    China has dramatically increased its virtual water import unconsciously for recent years. Many studies have focused on the quantity of traded virtual water but very few go into analysing geographic distribution and the properties of China's virtual water trade network. This paper provides a calculation and analysis of the crop-related virtual water trade network of China based on 27 major primary crops between 1986 and 2009. The results show that China is a net importer of virtual water from water-abundant areas of North and South America, and a net virtual water exporter to water-stressed areas of Asia, Africa, and Europe. Virtual water import is far larger than virtual water export and in both import and export a small number of trade partners control the supply chain. Grain crops are the major contributors to virtual water trade, and among grain crops soybeans, mostly imported from the US, Brazil and Argentina are the most significant. As crop yield and crop water productivity in North and South America are generally higher than those in Asia and Africa, the effect of China's crop-related virtual water trade positively contributes to optimizing crop water use efficiency at the global scale. In order to mitigate water scarcity and secure the food supply, virtual water should be actively incorporated into national water management strategies. From the national perspective, China should reduce the export and increase the import of water-intensive crops. But the sources of virtual water import need to be further diversified to reduce supply chain risks and increase resilience.

  4. An investigation into possibilities for implementation of a virtual community of practice delivered via a mobile social network for rural community media in the Eastern Cape, South Africa

    Directory of Open Access Journals (Sweden)

    Oliva Muwanga-Zake

    2017-03-01

    Full Text Available Background: The purpose of this article is to provide an overview of how a virtual community of practice can be delivered via a mobile social networking framework to support rural community media in the Eastern Cape Province of South Africa. Objectives: The article presents the results of a study conducted to ascertain the possibilities of utilising mobile social networking as a means to provide access to required information and knowledge to rural community media through creation of a virtual community of practice. Improving the operational effectiveness of rural community media as a component of the rural community communication process would serve to improve the entire rural community communication process as well, making them more effective tools for availing relevant news and information to rural communities and reflecting the realities of rural communities to their broader environment. Method: The study was conducted on rural community media small micro and medium enterprises (SMMEs in the Eastern Cape Province of South Africa. The study applied an interpretive research philosophy, qualitative research design and multiple–case study approach. Primary data were collected through semi-structured interviews supported by a questionnaire, with secondary data collected via literature review, observation and documentation analysis. Results: Findings were that rural community media do make use of social media and mobile devices in operating their business, require access to generic and domain specific support services and actively engage their peers and stakeholders in this respect, although no formalised structure existed. The authors’ recommendation is to create a formalised virtual community of practice through the establishment of a mobile social network. Conclusion: Because of the fact that rural community SMMEs already utilise mobile devices and social media to operate their businesses, development of a solution based on a mobile social

  5. Practical application of game theory based production flow planning method in virtual manufacturing networks

    Science.gov (United States)

    Olender, M.; Krenczyk, D.

    2016-08-01

    Modern enterprises have to react quickly to dynamic changes in the market, due to changing customer requirements and expectations. One of the key area of production management, that must continuously evolve by searching for new methods and tools for increasing the efficiency of manufacturing systems is the area of production flow planning and control. These aspects are closely connected with the ability to implement the concept of Virtual Enterprises (VE) and Virtual Manufacturing Network (VMN) in which integrated infrastructure of flexible resources are created. In the proposed approach, the players role perform the objects associated with the objective functions, allowing to solve the multiobjective production flow planning problems based on the game theory, which is based on the theory of the strategic situation. For defined production system and production order models ways of solving the problem of production route planning in VMN on computational examples for different variants of production flow is presented. Possible decision strategy to use together with an analysis of calculation results is shown.

  6. Network dynamics with BrainX(3): a large-scale simulation of the human brain network with real-time interaction.

    Science.gov (United States)

    Arsiwalla, Xerxes D; Zucca, Riccardo; Betella, Alberto; Martinez, Enrique; Dalmazzo, David; Omedas, Pedro; Deco, Gustavo; Verschure, Paul F M J

    2015-01-01

    BrainX(3) is a large-scale simulation of human brain activity with real-time interaction, rendered in 3D in a virtual reality environment, which combines computational power with human intuition for the exploration and analysis of complex dynamical networks. We ground this simulation on structural connectivity obtained from diffusion spectrum imaging data and model it on neuronal population dynamics. Users can interact with BrainX(3) in real-time by perturbing brain regions with transient stimulations to observe reverberating network activity, simulate lesion dynamics or implement network analysis functions from a library of graph theoretic measures. BrainX(3) can thus be used as a novel immersive platform for exploration and analysis of dynamical activity patterns in brain networks, both at rest or in a task-related state, for discovery of signaling pathways associated to brain function and/or dysfunction and as a tool for virtual neurosurgery. Our results demonstrate these functionalities and shed insight on the dynamics of the resting-state attractor. Specifically, we found that a noisy network seems to favor a low firing attractor state. We also found that the dynamics of a noisy network is less resilient to lesions. Our simulations on TMS perturbations show that even though TMS inhibits most of the network, it also sparsely excites a few regions. This is presumably due to anti-correlations in the dynamics and suggests that even a lesioned network can show sparsely distributed increased activity compared to healthy resting-state, over specific brain areas.

  7. Network dynamics with BrainX3: a large-scale simulation of the human brain network with real-time interaction

    Science.gov (United States)

    Arsiwalla, Xerxes D.; Zucca, Riccardo; Betella, Alberto; Martinez, Enrique; Dalmazzo, David; Omedas, Pedro; Deco, Gustavo; Verschure, Paul F. M. J.

    2015-01-01

    BrainX3 is a large-scale simulation of human brain activity with real-time interaction, rendered in 3D in a virtual reality environment, which combines computational power with human intuition for the exploration and analysis of complex dynamical networks. We ground this simulation on structural connectivity obtained from diffusion spectrum imaging data and model it on neuronal population dynamics. Users can interact with BrainX3 in real-time by perturbing brain regions with transient stimulations to observe reverberating network activity, simulate lesion dynamics or implement network analysis functions from a library of graph theoretic measures. BrainX3 can thus be used as a novel immersive platform for exploration and analysis of dynamical activity patterns in brain networks, both at rest or in a task-related state, for discovery of signaling pathways associated to brain function and/or dysfunction and as a tool for virtual neurosurgery. Our results demonstrate these functionalities and shed insight on the dynamics of the resting-state attractor. Specifically, we found that a noisy network seems to favor a low firing attractor state. We also found that the dynamics of a noisy network is less resilient to lesions. Our simulations on TMS perturbations show that even though TMS inhibits most of the network, it also sparsely excites a few regions. This is presumably due to anti-correlations in the dynamics and suggests that even a lesioned network can show sparsely distributed increased activity compared to healthy resting-state, over specific brain areas. PMID:25759649

  8. Network Dynamics with BrainX3: A Large-Scale Simulation of the Human Brain Network with Real-Time Interaction

    Directory of Open Access Journals (Sweden)

    Xerxes D. Arsiwalla

    2015-02-01

    Full Text Available BrainX3 is a large-scale simulation of human brain activity with real-time interaction, rendered in 3D in a virtual reality environment, which combines computational power with human intuition for the exploration and analysis of complex dynamical networks. We ground this simulation on structural connectivity obtained from diffusion spectrum imaging data and model it on neuronal population dynamics. Users can interact with BrainX3 in real-time by perturbing brain regions with transient stimulations to observe reverberating network activity, simulate lesion dynamics or implement network analysis functions from a library of graph theoretic measures. BrainX3 can thus be used as a novel immersive platform for real-time exploration and analysis of dynamical activity patterns in brain networks, both at rest or in a task-related state, for discovery of signaling pathways associated to brain function and/or dysfunction and as a tool for virtual neurosurgery. Our results demonstrate these functionalities and shed insight on the dynamics of the resting-state attractor. Specifically, we found that a noisy network seems to favor a low firing attractor state. We also found that the dynamics of a noisy network is less resilient to lesions. Our simulations on TMS perturbations show that even though TMS inhibits most of the network, it also sparsely excites a few regions. This is presumably, due to anti-correlations in the dynamics and suggests that even a lesioned network can show sparsely distributed increased activity compared to healthy resting-state, over specific brain areas.

  9. Virtual working systems to support R&D groups

    Science.gov (United States)

    Dew, Peter M.; Leigh, Christine; Drew, Richard S.; Morris, David; Curson, Jayne

    1995-03-01

    The paper reports on the progress at Leeds University to build a Virtual Science Park (VSP) to enhance the University's ability to interact with industry, grow its applied research and workplace learning activities. The VSP exploits the advances in real time collaborative computing and networking to provide an environment that meets the objectives of physically based science parks without the need for the organizations to relocate. It provides an integrated set of services (e.g. virtual consultancy, workbased learning) built around a structured person- centered information model. This model supports the integration of tools for: (a) navigating around the information space; (b) browsing information stored within the VSP database; (c) communicating through a variety of Person-to-Person collaborative tools; and (d) the ability to the information stored in the VSP including the relationships to other information that support the underlying model. The paper gives an overview of a generic virtual working system based on X.500 directory services and the World-Wide Web that can be used to support the Virtual Science Park. Finally the paper discusses some of the research issues that need to be addressed to fully realize a Virtual Science Park.

  10. A Bilevel Scheduling Approach for Modeling Energy Transaction of Virtual Power Plants in Distribution Networks

    Directory of Open Access Journals (Sweden)

    F. Nazari

    2017-03-01

    Full Text Available By increasing the use of distributed generation (DG in the distribution network operation, an entity called virtual power plant (VPP has been introduced to control, dispatch and aggregate the generation of DGs, enabling them to participate either in the electricity market or the distribution network operation. The participation of VPPs in the electricity market has made challenges to fairly allocate payments and benefits between VPPs and distribution network operator (DNO. This paper presents a bilevel scheduling approach to model the energy transaction between VPPs and DNO.  The upper level corresponds to the decision making of VPPs which bid their long- term contract prices so that their own profits are maximized and the lower level represents the DNO decision making to supply electricity demand of the network by minimizing its overall cost. The proposed bilevel scheduling approach is transformed to a single level optimizing problem using its Karush-Kuhn-Tucker (KKT optimality conditions. Several scenarios are applied to scrutinize the effectiveness and usefulness of the proposed model. 

  11. Virtual Distances Used for Optimization of Applicationsin the Pervasive Computing Domain

    DEFF Research Database (Denmark)

    Schougaard, Kari Rye

    2004-01-01

    This paper presents the notion of virtual distances -- communication proximity -- to describe the quality of a connection between two devices. We use virtual distances as the baisis of optimizations performed by a virtual machine where a part of an application can be moved to another device if th...... advantage of temporarily available resources at the current local area network or through ad-hoc networks...

  12. Aural localization of silent objects by active human biosonar: neural representations of virtual echo-acoustic space.

    Science.gov (United States)

    Wallmeier, Ludwig; Kish, Daniel; Wiegrebe, Lutz; Flanagin, Virginia L

    2015-03-01

    Some blind humans have developed the remarkable ability to detect and localize objects through the auditory analysis of self-generated tongue clicks. These echolocation experts show a corresponding increase in 'visual' cortex activity when listening to echo-acoustic sounds. Echolocation in real-life settings involves multiple reflections as well as active sound production, neither of which has been systematically addressed. We developed a virtualization technique that allows participants to actively perform such biosonar tasks in virtual echo-acoustic space during magnetic resonance imaging (MRI). Tongue clicks, emitted in the MRI scanner, are picked up by a microphone, convolved in real time with the binaural impulse responses of a virtual space, and presented via headphones as virtual echoes. In this manner, we investigated the brain activity during active echo-acoustic localization tasks. Our data show that, in blind echolocation experts, activations in the calcarine cortex are dramatically enhanced when a single reflector is introduced into otherwise anechoic virtual space. A pattern-classification analysis revealed that, in the blind, calcarine cortex activation patterns could discriminate left-side from right-side reflectors. This was found in both blind experts, but the effect was significant for only one of them. In sighted controls, 'visual' cortex activations were insignificant, but activation patterns in the planum temporale were sufficient to discriminate left-side from right-side reflectors. Our data suggest that blind and echolocation-trained, sighted subjects may recruit different neural substrates for the same active-echolocation task. © 2015 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  13. Researching virtual worlds methodologies for studying emergent practices

    CERN Document Server

    Phillips, Louise

    2013-01-01

    This volume presents a wide range of methodological strategies that are designed to take into account the complex, emergent, and continually shifting character of virtual worlds. It interrogates how virtual worlds emerge as objects of study through the development and application of various methodological strategies. Virtual worlds are not considered objects that exist as entities with fixed attributes independent of our continuous engagement with them and interpretation of them. Instead, they are conceived of as complex ensembles of technology, humans, symbols, discourses, and economic structures, ensembles that emerge in ongoing practices and specific situations. A broad spectrum of perspectives and methodologies is presented: Actor-Network-Theory and post-Actor-Network-Theory, performativity theory, ethnography, discourse analysis, Sense-Making Methodology, visual ethnography, multi-sited ethnography, and Social Network Analysis.

  14. Network and user interface for PAT DOME virtual motion environment system

    Science.gov (United States)

    Worthington, J. W.; Duncan, K. M.; Crosier, W. G.

    1993-01-01

    The Device for Orientation and Motion Environments Preflight Adaptation Trainer (DOME PAT) provides astronauts a virtual microgravity sensory environment designed to help alleviate tye symptoms of space motion sickness (SMS). The system consists of four microcomputers networked to provide real time control, and an image generator (IG) driving a wide angle video display inside a dome structure. The spherical display demands distortion correction. The system is currently being modified with a new graphical user interface (GUI) and a new Silicon Graphics IG. This paper will concentrate on the new GUI and the networking scheme. The new GUI eliminates proprietary graphics hardware and software, and instead makes use of standard and low cost PC video (CGA) and off the shelf software (Microsoft's Quick C). Mouse selection for user input is supported. The new Silicon Graphics IG requires an Ethernet interface. The microcomputer known as the Real Time Controller (RTC), which has overall control of the system and is written in Ada, was modified to use the free public domain NCSA Telnet software for Ethernet communications with the Silicon Graphics IG. The RTC also maintains the original ARCNET communications through Novell Netware IPX with the rest of the system. The Telnet TCP/IP protocol was first used for real-time communication, but because of buffering problems the Telnet datagram (UDP) protocol needed to be implemented. Since the Telnet modules are written in C, the Adap pragma 'Interface' was used to interface with the network calls.

  15. Assessment of exposure dose to workers in virtual decommissioning environments

    International Nuclear Information System (INIS)

    Jeong, KwanSeong; Moon, JeiKwon; Choi, ByungSeon; Hyun, Dongjun; Lee, Jonghwan; Kim, Ikjune; Kim, GeunHo; Seo, JaeSeok

    2014-01-01

    This paper is intended to suggest the method analyze and assess the exposure dose to workers in virtual decommissioning environments. To simulate a lot of decommissioning scenarios, decommissioning environments were designed in virtual reality. To simulate and assess the exposure dose to workers, human model also was designed in virtual environments. These virtual decommissioning environments made it possible to real-time simulate and assess the exposure dose to workers. This work was to be able to simulate scenarios of decommissioning so that exposure dose to workers could be measured and assessed. To establish the plan of exposure dose to workers during decommissioning of nuclear facilities before decommissioning activities are accomplished, the method of simulation assessment was developed in virtual radiological environments. But this work was developed as a tool of simulation for single subject mode. Afterwards, the simulation environment for multi-subjects mode will be upgraded by simultaneous modules with networking environments. Then the much more practical method will be developed by changing number of workers and duration of time under any circumstances of decommissioning

  16. Assessment of exposure dose to workers in virtual decommissioning environments

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, KwanSeong; Moon, JeiKwon; Choi, ByungSeon; Hyun, Dongjun; Lee, Jonghwan; Kim, Ikjune; Kim, GeunHo; Seo, JaeSeok [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-10-15

    This paper is intended to suggest the method analyze and assess the exposure dose to workers in virtual decommissioning environments. To simulate a lot of decommissioning scenarios, decommissioning environments were designed in virtual reality. To simulate and assess the exposure dose to workers, human model also was designed in virtual environments. These virtual decommissioning environments made it possible to real-time simulate and assess the exposure dose to workers. This work was to be able to simulate scenarios of decommissioning so that exposure dose to workers could be measured and assessed. To establish the plan of exposure dose to workers during decommissioning of nuclear facilities before decommissioning activities are accomplished, the method of simulation assessment was developed in virtual radiological environments. But this work was developed as a tool of simulation for single subject mode. Afterwards, the simulation environment for multi-subjects mode will be upgraded by simultaneous modules with networking environments. Then the much more practical method will be developed by changing number of workers and duration of time under any circumstances of decommissioning.

  17. On the Role of Hyper-arid Regions within the Virtual Water Trade Network

    Science.gov (United States)

    Aggrey, James; Alshamsi, Aamena; Molini, Annalisa

    2016-04-01

    Climate change, economic development, and population growth are bound to increasingly impact global water resources, posing a significant threat to the sustainable development of arid regions, where water consumption highly exceeds the natural carrying capacity, population growth rate is high, and climate variability is going to impact both water consumption and availability. Virtual Water Trade (VWT) - i.e. the international trade network of water-intensive products - has been proposed as a possible solution to optimize the allocation of water resources on the global scale. By increasing food availability and lowering food prices it may in fact help the rapid development of water-scarce regions. The structure of the VWT network has been analyzed by a number of authors both in connection with trade policies, socioeconomic constrains and agricultural efficiency. However a systematic analysis of the structure and the dynamics of the VWT network conditional to aridity, climatic forcing and energy availability, is still missing. Our goal is hence to analyze the role of arid and hyper-arid regions within the VWN under diverse climatic, demographic, and energy constraints with an aim to contribute to the ongoing Energy-Water-Food nexus discussion. In particular, we focus on the hyper-arid lands of the Arabian Peninsula, the role they play in the global network and the assessment of their specific criticalities, as reflected in the VWN resilience.

  18. Management of synchronized network activity by highly active neurons

    International Nuclear Information System (INIS)

    Shein, Mark; Raichman, Nadav; Ben-Jacob, Eshel; Volman, Vladislav; Hanein, Yael

    2008-01-01

    Increasing evidence supports the idea that spontaneous brain activity may have an important functional role. Cultured neuronal networks provide a suitable model system to search for the mechanisms by which neuronal spontaneous activity is maintained and regulated. This activity is marked by synchronized bursting events (SBEs)—short time windows (hundreds of milliseconds) of rapid neuronal firing separated by long quiescent periods (seconds). However, there exists a special subset of rapidly firing neurons whose activity also persists between SBEs. It has been proposed that these highly active (HA) neurons play an important role in the management (i.e. establishment, maintenance and regulation) of the synchronized network activity. Here, we studied the dynamical properties and the functional role of HA neurons in homogeneous and engineered networks, during early network development, upon recovery from chemical inhibition and in response to electrical stimulations. We found that their sequences of inter-spike intervals (ISI) exhibit long time correlations and a unimodal distribution. During the network's development and under intense inhibition, the observed activity follows a transition period during which mostly HA neurons are active. Studying networks with engineered geometry, we found that HA neurons are precursors (the first to fire) of the spontaneous SBEs and are more responsive to electrical stimulations

  19. QoS-Aware Resource Allocation for Network Virtualization in an Integrated Train Ground Communication System

    Directory of Open Access Journals (Sweden)

    Li Zhu

    2018-01-01

    Full Text Available Urban rail transit plays an increasingly important role in urbanization processes. Communications-Based Train Control (CBTC Systems, Passenger Information Systems (PIS, and Closed Circuit Television (CCTV are key applications of urban rail transit to ensure its normal operation. In existing urban rail transit systems, different applications are deployed with independent train ground communication systems. When the train ground communication systems are built repeatedly, limited wireless spectrum will be wasted, and the maintenance work will also become complicated. In this paper, we design a network virtualization based integrated train ground communication system, in which all the applications in urban rail transit can share the same physical infrastructure. In order to better satisfy the Quality of Service (QoS requirement of each application, this paper proposes a virtual resource allocation algorithm based on QoS guarantee, base station load balance, and application station fairness. Moreover, with the latest achievement of distributed convex optimization, we exploit a novel distributed optimization method based on alternating direction method of multipliers (ADMM to solve the virtual resource allocation problem. Extensive simulation results indicate that the QoS of the designed integrated train ground communication system can be improved significantly using the proposed algorithm.

  20. Networking activities in technology-based entrepreneurial teams

    DEFF Research Database (Denmark)

    Neergaard, Helle

    2005-01-01

    Based on social network theoy, this article investigates the distribution of networking roles and responsibilities in entrepreneurial founding teams. Its focus is on the team as a collection of individuals, thus allowing the research to address differences in networking patterns. It identifies six...... central networking activities and shows that not all founding team members are equally active 'networkers'. The analyses show that team members prioritize different networking activities and that one member in particular has extensive networking activities whereas other memebrs of the team are more...

  1. Dynamics of study strategies and teacher regulation in virtual patient learning activities: a cross sectional survey.

    Science.gov (United States)

    Edelbring, Samuel; Wahlström, Rolf

    2016-04-23

    Students' self-regulated learning becomes essential with increased use of exploratory web-based activities such as virtual patients (VPs). The purpose was to investigate the interplay between students' self-regulated learning strategies and perceived benefit in VP learning activities. A cross-sectional study (n = 150) comparing students' study strategies and perceived benefit of a virtual patient learning activity in a clinical clerkship preparatory course. Teacher regulation varied among three settings and was classified from shared to strong. These settings were compared regarding their respective relations between regulation strategies and perceived benefit of the virtual patient activity. Self-regulation learning strategy was generally associated with perceived benefit of the VP activities (rho 0.27, p strategies can increase the value of flexible web-based learning resources to students.

  2. Two-photon calcium imaging during fictive navigation in virtual environments

    Directory of Open Access Journals (Sweden)

    Misha Benjamin Ahrens

    2013-06-01

    Full Text Available A full understanding of nervous system function requires recording from large populations of neurons during naturalistic behaviors. Here we enable paralyzed larval zebrafish to fictively navigate two-dimensional virtual environments while we record optically from many neurons with two-photon imaging. Electrical recordings from motor nerves in the tail are decoded into intended forward swims and turns, which are used to update a virtual environment displayed underneath the fish. Several behavioral features - such as turning responses to whole-field motion and dark avoidance - are well-replicated in this virtual setting. We readily observed neuronal populations in the hindbrain with laterally selective responses that correlated with right or left optomotor behavior. We also observed neurons in the habenula, pallium, and midbrain with response properties specific to environmental features. Beyond single-cell correlations, the classification of network activity in such virtual settings promises to reveal principles of brainwide neural dynamics during behavior.

  3. Activity flow over resting-state networks shapes cognitive task activations.

    Science.gov (United States)

    Cole, Michael W; Ito, Takuya; Bassett, Danielle S; Schultz, Douglas H

    2016-12-01

    Resting-state functional connectivity (FC) has helped reveal the intrinsic network organization of the human brain, yet its relevance to cognitive task activations has been unclear. Uncertainty remains despite evidence that resting-state FC patterns are highly similar to cognitive task activation patterns. Identifying the distributed processes that shape localized cognitive task activations may help reveal why resting-state FC is so strongly related to cognitive task activations. We found that estimating task-evoked activity flow (the spread of activation amplitudes) over resting-state FC networks allowed prediction of cognitive task activations in a large-scale neural network model. Applying this insight to empirical functional MRI data, we found that cognitive task activations can be predicted in held-out brain regions (and held-out individuals) via estimated activity flow over resting-state FC networks. This suggests that task-evoked activity flow over intrinsic networks is a large-scale mechanism explaining the relevance of resting-state FC to cognitive task activations.

  4. Innovation in Virtual Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    2011-01-01

    The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective......The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective...

  5. Building Modelling Methodologies for Virtual District Heating and Cooling Networks

    Energy Technology Data Exchange (ETDEWEB)

    Saurav, Kumar; Choudhury, Anamitra R.; Chandan, Vikas; Lingman, Peter; Linder, Nicklas

    2017-10-26

    District heating and cooling systems (DHC) are a proven energy solution that has been deployed for many years in a growing number of urban areas worldwide. They comprise a variety of technologies that seek to develop synergies between the production and supply of heat, cooling, domestic hot water and electricity. Although the benefits of DHC systems are significant and have been widely acclaimed, yet the full potential of modern DHC systems remains largely untapped. There are several opportunities for development of energy efficient DHC systems, which will enable the effective exploitation of alternative renewable resources, waste heat recovery, etc., in order to increase the overall efficiency and facilitate the transition towards the next generation of DHC systems. This motivated the need for modelling these complex systems. Large-scale modelling of DHC-networks is challenging, as it has several components interacting with each other. In this paper we present two building methodologies to model the consumer buildings. These models will be further integrated with network model and the control system layer to create a virtual test bed for the entire DHC system. The model is validated using data collected from a real life DHC system located at Lulea, a city on the coast of northern Sweden. The test bed will be then used for simulating various test cases such as peak energy reduction, overall demand reduction etc.

  6. Affective Interaction with a Virtual Character through an fNIRS Brain-Computer Interface

    Directory of Open Access Journals (Sweden)

    Gabor Aranyi

    2016-07-01

    Full Text Available Affective Brain-Computer Interfaces (BCI harness Neuroscience knowledge to develop affective interaction from first principles. In this paper, we explore affective engagement with a virtual agent through Neurofeedback (NF. We report an experiment where subjects engage with a virtual agent by expressing positive attitudes towards her under a NF paradigm. We use for affective input the asymmetric activity in the dorsolateral prefrontal cortex (DL-PFC, which has been previously found to be related to the high-level affective-motivational dimension of approach/avoidance. The magnitude of left-asymmetric DL-PFC activity, measured using fNIRS and treated as a proxy for approach, is mapped onto a control mechanism for the virtual agent’s facial expressions, in which Action Units are activated through a neural network. We carried out an experiment with 18 subjects, which demonstrated that subjects are able to successfully engage with the virtual agent by controlling their mental disposition through NF, and that they perceived the agent’s responses as realistic and consistent with their projected mental disposition. This interaction paradigm is particularly relevant in the case of affective BCI as it facilitates the volitional activation of specific areas normally not under conscious control. Overall, our contribution reconciles a model of affect derived from brain metabolic data with an ecologically valid, yet computationally controllable, virtual affective communication environment.

  7. Nuclear plant's virtual simulation for on-line radioactive environment monitoring and dose assessment for personnel

    International Nuclear Information System (INIS)

    Mol, Antonio Carlos A.; Jorge, Carlos Alexandre F.; Lapa, Celso Marcelo F.

    2009-01-01

    This paper reports the use of nuclear plant's simulation for online dose rate monitoring and dose assessment for personnel, using virtual reality technology. The platform used for virtual simulation was adapted from a low cost game engine, taking advantage of all its image rendering capabilities, as well as the physics for movement and collision, and networking capabilities for multi-user interactive navigation. A real nuclear plant was virtually modeled and simulated, so that a number of users can navigate simultaneously in this virtual environment in first or third person view, each one receiving visual information about both the radiation dose rate in each actual position, and the radiation dose received. Currently, this research and development activity has been extended to consider also on-line measurements collected from radiation monitors installed in the real plant that feed the simulation platform with dose rate data, through a TCP/IP network. Results are shown and commented, and other improvements are discussed, as the execution of a more detailed dose rate mapping campaign.

  8. Utilizing ICN/CCN for service and VM migration support in virtualized LTE systems

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Satria, Triadimas; Karagiannis, Georgios

    2014-01-01

    One of the most important concepts used in mobile networks, like LTE (Long Term Evolution) is service continuity. A mobile user moving from one network to another network should not lose an on-going service. In cloud-based (virtualized) LTE systems, services are hosted on Virtual Machines (VMs) that

  9. THE INTEREST OF GEOGRAPHICAL INFORMATION, ARTIFICIAL INTELLIGENCE AND VIRTUAL REALITY FOR THE UNDERGROUND NETWORK REPRESENTATION

    Directory of Open Access Journals (Sweden)

    M. Lacroix

    2016-01-01

    Full Text Available Two years ago, 63 people died and more than 150 were seriously injured in Beijing (China because of damage to a hydrocarbon pipeline. Urban networks are invisible because usually buried between 1 and 1,5 meters underground. They should be identified to prevent such accidents which involve workers as well as the public. Rural and urban districts, network concessionaries and contractors: everyone could benefit from their networks becoming safer. To prevent such accidents and protect workers and the public as well, some new regulations propose to identify and secure the buried networks. That’s why it is important to develop a software which deals with the risk management process and also about the risk visualization. This work is structured around three major sections:– the utility of the Geographical Information to determine the minimal distances and the topological relations between the networks themselves, and also with the other element in their vicinity;– the use of some Artificial Intelligence tools, and more particularly of Expert System, to take the current regulation into account and determine the accident risk probability;– the contribution of virtual reality to perceive the underground world.

  10. Virtual learning networks for sustainable development

    NARCIS (Netherlands)

    De Kraker, Joop; Cörvers, Ron

    2010-01-01

    Sustainable development is a participatory, multi-actor process. In this process, learning plays a major role as participants have to exchange and integrate a diversity of perspectives and types of knowledge and expertise in order to arrive at innovative, jointly supported solutions. Virtual

  11. A study on haptic collaborative game in shared virtual environment

    Science.gov (United States)

    Lu, Keke; Liu, Guanyang; Liu, Lingzhi

    2013-03-01

    A study on collaborative game in shared virtual environment with haptic feedback over computer networks is introduced in this paper. A collaborative task was used where the players located at remote sites and played the game together. The player can feel visual and haptic feedback in virtual environment compared to traditional networked multiplayer games. The experiment was desired in two conditions: visual feedback only and visual-haptic feedback. The goal of the experiment is to assess the impact of force feedback on collaborative task performance. Results indicate that haptic feedback is beneficial for performance enhancement for collaborative game in shared virtual environment. The outcomes of this research can have a powerful impact on the networked computer games.

  12. Instant Hyper-v Server Virtualization starter

    CERN Document Server

    Eguibar, Vicente Rodriguez

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.The approach would be in a tutorial manner that will guide the users in an orderly manner toward virtualization.This book is conceived for system administrator and advanced PC enthusiasts who want to venture into the virtualization world. Although this book goes from scratch up, knowledge on server Operative Systems, LAN and networking has to be in place. Having a good background on server administration is desirable, including networking service

  13. ONLINE SOCIAL NETWORKS AS A TOOL FOR THE PROMOTION OF PHYSICAL ACTIVITY AND HEALTH: A RESOURCE SCIENTIFICALLY FEW EXPLORED

    Directory of Open Access Journals (Sweden)

    Arían Ramón Aladro Gonzalvo

    2015-06-01

    Full Text Available Due to the great impact  that are exerting the networks in society, it is crucial to know the features that distinguish online social networks bringing together users interested in receiving information and resources to improve or maintain the body in shape. This article aims to comment on the limited research interested in studying the features and particularities of online communities that provide information, advice and support in the execution, performance and promotion of the health and fitness activities. Particularly, it underline about the necessity to know of networks structure, user profiles and peer-to-peer interaction, sort of membership, mechanisms of communication, representation of the body image and patterns of association. Likewise, the size of the support networks, telepresence, technology acceptance and perceived risk on the network. Besides, we recommend exploring two Fitness-related online social networks. Finally, it makes known the recurring problems in the analysis in order to characterize psychosocial and communicative aspects of users in the virtual environment.

  14. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  15. Virtual Private Lan Services Over IP/MPLS Networks and Router Configurations

    Directory of Open Access Journals (Sweden)

    Pınar KIRCI

    2015-06-01

    Full Text Available The rising number of users and ever growing traffic rates over the networks reveal the need of higher bandwidth and transmission rates. At every packet transmission process, routers need to route the packets by looking at the routing tables, this fact leads to an increase at the load of the routers and at the amount of time consumed during the processes. Today, users need high level security, faster data transmission and easy managed network structures because of the increasing technology usage. MPLS network structures can provide these requirements with their QoS feature. In our work, at first a topology structure is constructed with the routers that are used in Alcatel-Lucent laboratories. OSPF (Open Shortest Path First routing protocol and MPLS (Multiprotocol Label Switching technologies are used over the topology. Afterwards, E-pipe (Ethernet Pipe and VPLS (Virtual private LAN services configurations are performed over the routers. To illustrate the current network data traffic, three tests are performed in the study. Routers’ configurations are performed by Secure-CRT and still developing i-Gen software. With i-Gen, many routers’ configurations can be performed with a user friendly interface. Instead of performing the configurations one by one with Secure CRT, the user can perform the routers’ configurations easily by entering the needed values for the system with i-Gen software. So, with the new and developing i-Gen software, the users’ workload is minimized and streamlined. In our work, Secure-CRT software which is mostly preferred for router configurations at Windows operating system and i-Gen software which is developed by Alcatel-Lucent are considered. Both of the router configuration softwares are worked on and gained results are expounded. Consequently, instead of using time consuming Secure-CRT software, with utilizing new developed i-Gen software, the users’ work load is minimized.

  16. Simulasi Saham Berbasis Web dengan Teknologi Virtual Private Network di Portal Www.Kontan.Co.Id

    Directory of Open Access Journals (Sweden)

    Albert Verasius Dian Sano

    2011-12-01

    Full Text Available The objective of this research is to develop a web-based-online-stock-simulation application applying Virtual Private Network (VPN technology. The web-based application is prefered for user’s convenience and comfort since it does not require any software to be installed on the client side and is also accessable anywhere and anytime with internet connection availability. The application is developed by means of analysis and design towards the technology needed to establish the connectivity between servers through internet as well as database analysis and design. The data are real time derived from the Indonesia Stock Exchange (IDX and forwarded through an official data vendor PT XYZ. Data from the IDX will be captured by a middleware application at PT XYZ and forwarded to www.kontan.co.id. This application has been tested and succesfully run by around 700 users. This tool is expected to provide a kind of education and motivation to beginner-level investors who want to be engaged with the stock-trading activities

  17. Design and development of virtual TXP control system software

    International Nuclear Information System (INIS)

    Wang Yunwei; Leng Shan; Liu Zhisheng; Wang Qiang; Shang Yanxia

    2008-01-01

    Taking distributed control system (DCS) of Siemens TELEPERM-XP (TXP) as the simulation object,Virtual TXP (VTXP) control system based on Virtual DCS with high fidelity and reliability was designed and developed on the platform of Windows. In the process of development, the method of object-oriented modeling and modularization program design are adopted, C++ language and technologies such as multithreading, ActiveX control, Socket network communication are used, to realize the wide range dynamic simulation and recreate the functions of the hardware and software of real TXP. This paper puts emphasis on the design and realization of Control server and Communication server. The development of Virtual TXP control system software is with great effect on the construction of simulation system and the design, commission, verification and maintenance of control system in large-scale power plants, nuclear power plants and combined cycle power plants. (authors)

  18. Validity of the Virtual Reality Stroop Task (VRST) in active duty military.

    Science.gov (United States)

    Armstrong, Christina M; Reger, Greg M; Edwards, Joseph; Rizzo, Albert A; Courtney, Christopher G; Parsons, Thomas D

    2013-01-01

    Virtual environments provide the ability to systematically deliver test stimuli in simulated contexts relevant to real world behavior. The current study evaluated the validity of the Virtual Reality Stroop Task (VRST), which presents test stimuli during a virtual reality military convoy with simulated combat threats. Active duty Army personnel (N = 49) took the VRST, a customized version of the Automated Neuropsychological Assessment Metrics (ANAM)-Fourth Edition TBI Battery (2007) that included the addition of the ANAM Stroop and Tower tests, and traditional neuropsychological measures, including the Delis-Kaplan Executive Function System version of the Color-Word Interference Test. Preliminary convergent and discriminant validity was established, and performance on the VRST was significantly associated with computerized and traditional tests of attention and executive functioning. Valid virtual reality cognitive assessments open new lines of inquiry into the impact of environmental stimuli on performance and offer promise for the future of neuropsychological assessments used with military personnel.

  19. Virtual reality and neuropsychological assessment: The reliability of a virtual kitchen to assess daily-life activities in victims of traumatic brain injury.

    Science.gov (United States)

    Besnard, Jeremy; Richard, Paul; Banville, Frederic; Nolin, Pierre; Aubin, Ghislaine; Le Gall, Didier; Richard, Isabelle; Allain, Phillippe

    2016-01-01

    Traumatic brain injury (TBI) causes impairments affecting instrumental activities of daily living (IADL). However, few studies have considered virtual reality as an ecologically valid tool for the assessment of IADL in patients who have sustained a TBI. The main objective of the present study was to examine the use of the Nonimmersive Virtual Coffee Task (NI-VCT) for IADL assessment in patients with TBI. We analyzed the performance of 19 adults suffering from TBI and 19 healthy controls (HCs) in the real and virtual tasks of making coffee with a coffee machine, as well as in global IQ and executive functions. Patients performed worse than HCs on both real and virtual tasks and on all tests of executive functions. Correlation analyses revealed that NI-VCT scores were related to scores on the real task. Moreover, regression analyses demonstrated that performance on NI-VCT matched real-task performance. Our results support the idea that the virtual kitchen is a valid tool for IADL assessment in patients who have sustained a TBI.

  20. The Virtual Mouse Brain: A Computational Neuroinformatics Platform to Study Whole Mouse Brain Dynamics.

    Science.gov (United States)

    Melozzi, Francesca; Woodman, Marmaduke M; Jirsa, Viktor K; Bernard, Christophe

    2017-01-01

    Connectome-based modeling of large-scale brain network dynamics enables causal in silico interrogation of the brain's structure-function relationship, necessitating the close integration of diverse neuroinformatics fields. Here we extend the open-source simulation software The Virtual Brain (TVB) to whole mouse brain network modeling based on individual diffusion magnetic resonance imaging (dMRI)-based or tracer-based detailed mouse connectomes. We provide practical examples on how to use The Virtual Mouse Brain (TVMB) to simulate brain activity, such as seizure propagation and the switching behavior of the resting state dynamics in health and disease. TVMB enables theoretically driven experimental planning and ways to test predictions in the numerous strains of mice available to study brain function in normal and pathological conditions.

  1. Machine learning in virtual screening.

    Science.gov (United States)

    Melville, James L; Burke, Edmund K; Hirst, Jonathan D

    2009-05-01

    In this review, we highlight recent applications of machine learning to virtual screening, focusing on the use of supervised techniques to train statistical learning algorithms to prioritize databases of molecules as active against a particular protein target. Both ligand-based similarity searching and structure-based docking have benefited from machine learning algorithms, including naïve Bayesian classifiers, support vector machines, neural networks, and decision trees, as well as more traditional regression techniques. Effective application of these methodologies requires an appreciation of data preparation, validation, optimization, and search methodologies, and we also survey developments in these areas.

  2. Reference models supporting enterprise networks and virtual enterprises

    DEFF Research Database (Denmark)

    Tølle, Martin; Bernus, Peter

    2003-01-01

    This article analyses different types of reference models applicable to support the set up and (re)configuration of Virtual Enterprises (VEs). Reference models are models capturing concepts common to VEs aiming to convert the task of setting up of VE into a configuration task, and hence reducing...... the time needed for VE creation. The reference models are analysed through a mapping onto the Virtual Enterprise Reference Architecture (VERA) based upon GERAM and created in the IMS GLOBEMEN project....

  3. Virtual reality for spherical images

    Science.gov (United States)

    Pilarczyk, Rafal; Skarbek, Władysław

    2017-08-01

    Paper presents virtual reality application framework and application concept for mobile devices. Framework uses Google Cardboard library for Android operating system. Framework allows to create virtual reality 360 video player using standard OpenGL ES rendering methods. Framework provides network methods in order to connect to web server as application resource provider. Resources are delivered using JSON response as result of HTTP requests. Web server also uses Socket.IO library for synchronous communication between application and server. Framework implements methods to create event driven process of rendering additional content based on video timestamp and virtual reality head point of view.

  4. Online social networks that connect users to physical activity partners: a review and descriptive analysis.

    Science.gov (United States)

    Nakhasi, Atul; Shen, Album Xiaotian; Passarella, Ralph Joseph; Appel, Lawrence J; Anderson, Cheryl Am

    2014-06-16

    The US Centers for Disease Control and Prevention have identified a lack of encouragement, support, or companionship from family and friends as a major barrier to physical activity. To overcome this barrier, online social networks are now actively leveraging principles of companion social support in novel ways. The aim was to evaluate the functionality, features, and usability of existing online social networks which seek to increase physical activity and fitness among users by connecting them to physical activity partners, not just online, but also face-to-face. In September 2012, we used 3 major databases to identify the website addresses for relevant online social networks. We conducted a Google search using 8 unique keyword combinations: the common keyword "find" coupled with 1 of 4 prefix terms "health," "fitness," "workout," or "physical" coupled with 1 of 2 stem terms "activity partners" or "activity buddies." We also searched 2 prominent technology start-up news sites, TechCrunch and Y Combinator, using 2 unique keyword combinations: the common keyword "find" coupled with 1 of 2 stem terms "activity partners" and "activity buddies." Sites were defined as online social health activity networks if they had the ability to (1) actively find physical activity partners or activities for the user, (2) offer dynamic, real-time tracking or sharing of social activities, and (3) provide virtual profiles to users. We excluded from our analysis sites that were not Web-based, publicly available, in English, or free. Of the 360 initial search results, we identified 13 websites that met our complete criteria of an online social health activity network. Features such as physical activity creation (13/13, 100%) and private messaging (12/13, 92%) appeared almost universally among these websites. However, integration with Web 2.0 technologies such as Facebook and Twitter (9/13, 69%) and the option of direct event joining (8/13, 62%) were not as universally present. Largely

  5. Mixed method evaluation of the Virtual Traveller physically active lesson intervention: An analysis using the RE-AIM framework.

    Science.gov (United States)

    Norris, E; Dunsmuir, S; Duke-Williams, O; Stamatakis, E; Shelton, N

    2018-02-02

    Physically active lessons integrating movement into academic content are a way to increase children's physical activity levels. Virtual Traveller was a physically active lesson intervention set in Year 4 (aged 8-9) primary school classes in Greater London, UK. Implemented by classroom teachers, it was a six-week intervention providing 10-min physically active Virtual Field Trips three times a week. The aim of this paper is to report the process evaluation of the Virtual Traveller randomized controlled trial according to RE-AIM framework criteria (Reach, Effectiveness, Adoption, Implementation and Maintenance). A mixed methods approach to evaluation was conducted with five intervention group classes. Six sources of data were collected via informed consent logs, teacher session logs, teacher and pupil questionnaires, teacher interviews and pupil focus groups. High participation and low attrition rates were identified (Reach) alongside positive evaluations of Virtual Traveller sessions from pupil and teachers (Effectiveness). Participants were from more deprived and ethnic backgrounds than local and national averages, with Virtual Traveller having the potential to be a free intervention (Adoption). 70% of sessions were delivered overall (Implementation) but no maintenance of the programme was evident at three month follow-up (Maintenance). Mixed method evaluation of Virtual Traveller showed potential for it to be implemented as a low-cost physically active lesson intervention in UK primary schools. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Fourier Analysis: Creating A “Virtual Laboratory” Using Computer Simulation

    Directory of Open Access Journals (Sweden)

    Jeff Butterfield

    1998-01-01

    Full Text Available At times the desire for specialized laboratory apparatus to support class activities outstrips the available resources.  When this is the case the instructor must look for creative alternatives to help meet the desired objectives.  This report examines how a virtual laboratory was created to model and analyze high-speed networking signals in a LAN class using a spreadsheet simulation.  The students were able to printout various waveforms (e.g., signals of different frequencies/network media that are similar to output from test equipment that would have otherwise been cost prohibitive.  The activity proved to be valuable in helping students to understand an otherwise difficult concept that is central to modern networking applications.  Such simulation is not limited to network signals, but may be applicable in many situations where the artifact under study may be described mathematically.

  7. Local and global perspectives on the virtual water trade

    Directory of Open Access Journals (Sweden)

    S. Tamea

    2013-03-01

    Full Text Available Recent studies on fluxes of virtual water are showing how the global food and goods trade interconnects the water resources of different and distant countries, conditioning the local water balances. This paper presents and discusses the assessment of virtual water fluxes between a single country and its network of trading partners, delineating a country's virtual water budget in space and time (years 1986–2010. The fluxes between the country under study and its importing/exporting partners are visualized with a geographical representation shaping the trade network as a virtual river/delta. Time variations of exchanged fluxes are quantified to show possible trends in the virtual water balance, while characterizing the time evolution of the trade network and its composition in terms of product categories (plant-based, animal-based, luxury food, and non-edible. The average distance traveled by virtual water to arrive to the place of consumption is also introduced as a new measure for the analysis of globalization of the virtual water trade. Using Italy as an example, we find that food trade has a steadily growing importance compared to domestic production, with a major component represented by plant-based products, and luxury products taking an increasingly larger share (26% in 2010. In 2010 Italy had an average net import of 55 km3 of virtual water (38 km3 in 1986, a value which poses the country among the top net importers in the world. On average each cubic meter of virtual water travels nearly 4000 km before entering Italy, while export goes to relatively closer countries (average distance: 2600 km, with increasing trends in time which are almost unique among the world countries. Analyses proposed for Italy are replicated for 10 other world countries, triggering similar investigations on different socio-economic actualities.

  8. Local and global perspectives on the virtual water trade

    Science.gov (United States)

    Tamea, S.; Allamano, P.; Carr, J. A.; Claps, P.; Laio, F.; Ridolfi, L.

    2013-03-01

    Recent studies on fluxes of virtual water are showing how the global food and goods trade interconnects the water resources of different and distant countries, conditioning the local water balances. This paper presents and discusses the assessment of virtual water fluxes between a single country and its network of trading partners, delineating a country's virtual water budget in space and time (years 1986-2010). The fluxes between the country under study and its importing/exporting partners are visualized with a geographical representation shaping the trade network as a virtual river/delta. Time variations of exchanged fluxes are quantified to show possible trends in the virtual water balance, while characterizing the time evolution of the trade network and its composition in terms of product categories (plant-based, animal-based, luxury food, and non-edible). The average distance traveled by virtual water to arrive to the place of consumption is also introduced as a new measure for the analysis of globalization of the virtual water trade. Using Italy as an example, we find that food trade has a steadily growing importance compared to domestic production, with a major component represented by plant-based products, and luxury products taking an increasingly larger share (26% in 2010). In 2010 Italy had an average net import of 55 km3 of virtual water (38 km3 in 1986), a value which poses the country among the top net importers in the world. On average each cubic meter of virtual water travels nearly 4000 km before entering Italy, while export goes to relatively closer countries (average distance: 2600 km), with increasing trends in time which are almost unique among the world countries. Analyses proposed for Italy are replicated for 10 other world countries, triggering similar investigations on different socio-economic actualities.

  9. Exploring Infiniband Hardware Virtualization in OpenNebula towards Efficient High-Performance Computing

    Energy Technology Data Exchange (ETDEWEB)

    Pais Pitta de Lacerda Ruivo, Tiago [IIT, Chicago; Bernabeu Altayo, Gerard [Fermilab; Garzoglio, Gabriele [Fermilab; Timm, Steven [Fermilab; Kim, Hyun-Woo [Fermilab; Noh, Seo-Young [KISTI, Daejeon; Raicu, Ioan [IIT, Chicago

    2014-11-11

    has been widely accepted that software virtualization has a big negative impact on high-performance computing (HPC) application performance. This work explores the potential use of Infiniband hardware virtualization in an OpenNebula cloud towards the efficient support of MPI-based workloads. We have implemented, deployed, and tested an Infiniband network on the FermiCloud private Infrastructure-as-a-Service (IaaS) cloud. To avoid software virtualization towards minimizing the virtualization overhead, we employed a technique called Single Root Input/Output Virtualization (SRIOV). Our solution spanned modifications to the Linux’s Hypervisor as well as the OpenNebula manager. We evaluated the performance of the hardware virtualization on up to 56 virtual machines connected by up to 8 DDR Infiniband network links, with micro-benchmarks (latency and bandwidth) as well as w a MPI-intensive application (the HPL Linpack benchmark).

  10. Hardware/software virtualization for the reconfigurable multicore platform.

    NARCIS (Netherlands)

    Ferger, M.; Al Kadi, M.; Hübner, M.; Koedam, M.L.P.J.; Sinha, S.S.; Goossens, K.G.W.; Marchesan Almeida, Gabriel; Rodrigo Azambuja, J.; Becker, Juergen

    2012-01-01

    This paper presents the Flex Tiles approach for the virtualization of hardware and software for a reconfigurable multicore architecture. The approach enables the virtualization of a dynamic tile-based hardware architecture consisting of processing tiles connected via a network-on-chip and a

  11. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network

    Directory of Open Access Journals (Sweden)

    Jun Li

    2017-03-01

    Full Text Available With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

  12. When should virtual cybercrime be brought under the scope of the criminal law?

    NARCIS (Netherlands)

    Strikwerda, Litska; Rogers, Marcus; Seigfried-Spellar, Kathryn C.

    2012-01-01

    This paper is about the question when virtual cybercrime should be brought under the scope of the criminal law. By virtual cybercrime I mean crime that involves a specific aspect of computers or computer networks: virtuality. Examples of virtual cybercrime are: virtual child pornography, theft of

  13. Demonstration of Supervisory Control and Data Acquisition (SCADA) Virtualization Capability in the US Army Research Laboratory (ARL)/Sustaining Base Network Assurance Branch (SBNAB) US Army Cyber Analytics Laboratory (ACAL) SCADA Hardware Testbed

    Science.gov (United States)

    2015-05-01

    application ,1 while the simulated PLC software is the open source ModbusPal Java application . When queried using the Modbus TCP protocol, ModbusPal reports...and programmable logic controller ( PLC ) components. The HMI and PLC components were instantiated with software and installed in multiple virtual...creating and capturing HMI– PLC network traffic over a 24-h period in the virtualized network and inspect the packets for errors.  Test the

  14. Introduction of Virtualization Technology to Multi-Process Model Checking

    Science.gov (United States)

    Leungwattanakit, Watcharin; Artho, Cyrille; Hagiya, Masami; Tanabe, Yoshinori; Yamamoto, Mitsuharu

    2009-01-01

    Model checkers find failures in software by exploring every possible execution schedule. Java PathFinder (JPF), a Java model checker, has been extended recently to cover networked applications by caching data transferred in a communication channel. A target process is executed by JPF, whereas its peer process runs on a regular virtual machine outside. However, non-deterministic target programs may produce different output data in each schedule, causing the cache to restart the peer process to handle the different set of data. Virtualization tools could help us restore previous states of peers, eliminating peer restart. This paper proposes the application of virtualization technology to networked model checking, concentrating on JPF.

  15. SCM: A method to improve network service layout efficiency with network evolution.

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of "software defined network + network function virtualization" (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently.

  16. Tools for building virtual laboratories

    International Nuclear Information System (INIS)

    Agarwal, Debora; Johnston, William E.; Loken, Stewart; Tierney, Brian

    1996-01-01

    There is increasing interest in making unique research facilities facilities accessible on the Internet. Computer systems, scientific databases and experimental apparatus can be used by international collaborations of scientists using high-speed networks and advanced software tools to support collaboration. We are building tools including video conferencing and electronic white boards that are being used to create examples of virtual laboratories. This paper describes two pilot projects which provide testbeds for the tools. The first is a virtual laboratory project providing remote access to LBNL's Advanced Light Source. The second is the Multidimensional Applications and Gigabit internet work Consortium (MAGIC) testbed which has been established to develop a very high-speed, wide-are network to deliver realtime data at gigabit-per-second rates. (author)

  17. THE INTEGRATION OF CREATIVITY MANAGEMENT MODELS INTO UNIVERSITIES’VIRTUAL LEARNING COMMUNITIES

    Directory of Open Access Journals (Sweden)

    Alexandru STRUNGĂ

    2014-12-01

    Full Text Available Given the access of an increasingly higher number of individuals to virtual learning networks, the issue of creativity management becomes extremely important, especially for schools and universities. In the specialized literature, participating in virtual learning communities has several advantages, including: permanent access to information, high educational performance and increased creativity, and also better-developed professional identity (North and Kumta, 2014; Boulay and van Raalte, 2014. In the Romanian literature, there are few studies that aim directly at the relationship between the participation in virtual learning networks and creativity and innovation management models, especially in higher education institutions. This paper aims to study the ways in which creativity and innovation management models can be used in virtual learning networks in order to achieve better productivity at both individual and organizational levels, taking into account several best practices from this field and their possible implementation in Romanian educational institutions.

  18. Mixed Methods for Mixed Reality: Understanding Users' Avatar Activities in Virtual Worlds

    Science.gov (United States)

    Feldon, David F.; Kafai, Yasmin B.

    2008-01-01

    This paper examines the use of mixed methods for analyzing users' avatar-related activities in a virtual world. Server logs recorded keystroke-level activity for 595 participants over a six-month period in Whyville.net, an informal science website. Participants also completed surveys and participated in interviews regarding their experiences.…

  19. Establishment and preliminary application of the interactive tele-radiologic conference system based on virtual private network

    International Nuclear Information System (INIS)

    Wang Xuejian; Hu Jian; Wang Kang; Yu Hui; Luo Min; Lei Wenyong

    2005-01-01

    Objective: To investigate the establishment and characteristics of the interactive tele-radiological system (IATRS). Methods: Local area network (LAN) of local hospitals with firewall and ADSL Modem was connected into internet, then connected into the Virtual Private Network (VPN) server of the affiliated hospital of Guiyang Medical College (GMCAH) through anti-firewall of GMCAH. The VPN tunnel was acquired and LAN of local hospitals was connected into the PACS server of GMCAH, resulting in sharing of radiological data by both the GMCAH and local hospitals. Results: Radiological data from local hospitals could be transmitted by the PACS server of GMCAH safety and rapidly. The IATRS could provide high-quality images with high-speed, and with ease to perform. Conclusion: IATRS is useful and reliable for transmitting radiological data between remote places. (authors)

  20. Scientific Assistant Virtual Laboratory (SAVL)

    Science.gov (United States)

    Alaghband, Gita; Fardi, Hamid; Gnabasik, David

    2007-03-01

    The Scientific Assistant Virtual Laboratory (SAVL) is a scientific discovery environment, an interactive simulated virtual laboratory, for learning physics and mathematics. The purpose of this computer-assisted intervention is to improve middle and high school student interest, insight and scores in physics and mathematics. SAVL develops scientific and mathematical imagination in a visual, symbolic, and experimental simulation environment. It directly addresses the issues of scientific and technological competency by providing critical thinking training through integrated modules. This on-going research provides a virtual laboratory environment in which the student directs the building of the experiment rather than observing a packaged simulation. SAVL: * Engages the persistent interest of young minds in physics and math by visually linking simulation objects and events with mathematical relations. * Teaches integrated concepts by the hands-on exploration and focused visualization of classic physics experiments within software. * Systematically and uniformly assesses and scores students by their ability to answer their own questions within the context of a Master Question Network. We will demonstrate how the Master Question Network uses polymorphic interfaces and C# lambda expressions to manage simulation objects.

  1. Single-Iteration Learning Algorithm for Feed-Forward Neural Networks

    Energy Technology Data Exchange (ETDEWEB)

    Barhen, J.; Cogswell, R.; Protopopescu, V.

    1999-07-31

    A new methodology for neural learning is presented, whereby only a single iteration is required to train a feed-forward network with near-optimal results. To this aim, a virtual input layer is added to the multi-layer architecture. The virtual input layer is connected to the nominal input layer by a specird nonlinear transfer function, and to the fwst hidden layer by regular (linear) synapses. A sequence of alternating direction singular vrdue decompositions is then used to determine precisely the inter-layer synaptic weights. This algorithm exploits the known separability of the linear (inter-layer propagation) and nonlinear (neuron activation) aspects of information &ansfer within a neural network.

  2. The Effect of Virtual versus Traditional Learning in Achieving Competency-Based Skills

    Science.gov (United States)

    Mosalanejad, Leili; Shahsavari, Sakine; Sobhanian, Saeed; Dastpak, Mehdi

    2012-01-01

    Background: By rapid developing of the network technology, the internet-based learning methods are substituting the traditional classrooms making them expand to the virtual network learning environment. The purpose of this study was to determine the effectiveness of virtual systems on competency-based skills of first-year nursing students.…

  3. Theorizing Network-Centric Activity in Education

    Science.gov (United States)

    HaLevi, Andrew

    2011-01-01

    Networks and network-centric activity are increasingly prevalent in schools and school districts. In addition to ubiquitous social network tools like Facebook and Twitter, educational leaders deal with a wide variety of network organizational forms that include professional development, advocacy, informational networks and network-centric reforms.…

  4. The design of VR-CATS for power plant simulator using virtual reality

    International Nuclear Information System (INIS)

    Park, S. Y.; Yoo, H. J.; Lee, M. S.; Hong, J. H.; Lee, Y. K.

    2001-01-01

    In Hadong fossil power plant simulator project (1998. 1 ∼ 2000. 7), KEPRI applied virtual reality to the simulator. To provide more efficient operator training, KEPRI further developed the virtual reality technology into VR-CATS( Virtual Reality Computer Assistance Training System), a web-based multimedia training system with virtual reality technologies, in KNPEC-2 projects. By visualizing nuclear power plant system with stereoscopic 3-graphics in this project, VR-CATS enable trainee to navigate whole nuclear power plants including high radiation areas and other restricted areas. In addition, instructors can train the local operators to operate the local valves and other equipment in the local area of the plant. It aims at helping trainees understand system locations and system functions more easily. And, by reproducing main control room with stereoscopic 3-D graphics and linking it with P and ID, operating procedures, and plant components, Virtual panels maximize training effects. During the classroom training, the instructor can acess the stand-by host computer of the simulator through a network. This enables the instructor to can operate the simulator with only soft-panel. With the soft-panel, the instructor can activate any malfunction that he wants to instruct, show the trends of major parameters to the trainee and discuss with them. This desktop simulator function helps trainee to understand basic symptoms of the accidents. With CBT, operators can easily understand why some parameters are increasing or decreasing and what they should to mak the system stable. The VR-CATS for Uljin equips with much stronger and higher level virtual environment. First, all components of the virtual plant are linked with P and ID, ISO drawings, and engineering database. In addition, virtual MCR provides much immersive environment with such virtual reality equipment as HMD and data glove. Operators can also do collaboration work in the network through avatar, real

  5. Objective Assessment of Activity Limitation in Glaucoma with Smartphone Virtual Reality Goggles: A Pilot Study.

    Science.gov (United States)

    Goh, Rachel L Z; Kong, Yu Xiang George; McAlinden, Colm; Liu, John; Crowston, Jonathan G; Skalicky, Simon E

    2018-01-01

    To evaluate the use of smartphone-based virtual reality to objectively assess activity limitation in glaucoma. Cross-sectional study of 93 patients (54 mild, 22 moderate, 17 severe glaucoma). Sociodemographics, visual parameters, Glaucoma Activity Limitation-9 and Visual Function Questionnaire - Utility Index (VFQ-UI) were collected. Mean age was 67.4 ± 13.2 years; 52.7% were male; 65.6% were driving. A smartphone placed inside virtual reality goggles was used to administer the Virtual Reality Glaucoma Visual Function Test (VR-GVFT) to participants, consisting of three parts: stationary, moving ball, driving. Rasch analysis and classical validity tests were conducted to assess performance of VR-GVFT. Twenty-four of 28 stationary test items showed acceptable fit to the Rasch model (person separation 3.02, targeting 0). Eleven of 12 moving ball test items showed acceptable fit (person separation 3.05, targeting 0). No driving test items showed acceptable fit. Stationary test person scores showed good criterion validity, differentiating between glaucoma severity groups ( P = 0.014); modest convergence validity, with mild to moderate correlation with VFQ-UI, better eye (BE) mean deviation, BE pattern deviation, BE central scotoma, worse eye (WE) visual acuity, and contrast sensitivity (CS) in both eyes ( R = 0.243-0.381); and suboptimal divergent validity. Multivariate analysis showed that lower WE CS ( P = 0.044) and greater age ( P = 0.009) were associated with worse stationary test person scores. Smartphone-based virtual reality may be a portable objective simulation test of activity limitation related to glaucomatous visual loss. The use of simulated virtual environments could help better understand the activity limitations that affect patients with glaucoma.

  6. Resource Discovery in Activity-Based Sensor Networks

    DEFF Research Database (Denmark)

    Bucur, Doina; Bardram, Jakob

    This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networ....... ABSN enhances the generic Extended Zone Routing Protocol with logical sensor grouping and greatly lowers network overhead during the process of discovery, while keeping discovery latency close to optimal.......This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networks...... (ABSNs) knowledge about their usage even at the network layer. ABSN redesigns classical network-level service discovery protocols to include and use this logical structuring of the network for a more practically applicable service discovery scheme. Noting that in practical settings activity-based sensor...

  7. A Drone Remote Sensing for Virtual Reality Simulation System for Forest Fires: Semantic Neural Network Approach

    Science.gov (United States)

    Narasimha Rao, Gudikandhula; Jagadeeswara Rao, Peddada; Duvvuru, Rajesh

    2016-09-01

    Wild fires have significant impact on atmosphere and lives. The demand of predicting exact fire area in forest may help fire management team by using drone as a robot. These are flexible, inexpensive and elevated-motion remote sensing systems that use drones as platforms are important for substantial data gaps and supplementing the capabilities of manned aircraft and satellite remote sensing systems. In addition, powerful computational tools are essential for predicting certain burned area in the duration of a forest fire. The reason of this study is to built up a smart system based on semantic neural networking for the forecast of burned areas. The usage of virtual reality simulator is used to support the instruction process of fire fighters and all users for saving of surrounded wild lives by using a naive method Semantic Neural Network System (SNNS). Semantics are valuable initially to have a enhanced representation of the burned area prediction and better alteration of simulation situation to the users. In meticulous, consequences obtained with geometric semantic neural networking is extensively superior to other methods. This learning suggests that deeper investigation of neural networking in the field of forest fires prediction could be productive.

  8. Multilingual Writing and Pedagogical Cooperation in Virtual Learning Environments

    DEFF Research Database (Denmark)

    Mousten, Birthe; Vandepitte, Sonia; Arnó Macà, Elisabet

    Multilingual Writing and Pedagogical Cooperation in Virtual Learning Environments is a critical scholarly resource that examines experiences with virtual networks and their advantages for universities and students in the domains of writing, translation, and usability testing. Featuring coverage o...

  9. Work in the virtual enterprise-creating identities, building trust, and sharing knowledge

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard; Wangel, Arne

    2006-01-01

    for an exploratory, sociotechnical research approach combining the dimensions of context, subject and action with the twin objectives of contributing to the enhancement of collaborative capabilities in virtual teams as well as improving the insights into the nature of virtual work....... of the network must be integrated across the barriers of missing face-to-face clues and cultural differences. The social integration of the virtual network involves the creation of identities of the participating nodes, the building of trust between them, and the sharing of tacit and explicit knowledge among...... them. The conventional organisation already doing well in these areas seems to have an edge when going virtual. The paper argues that the whole question of management and control must be reconsidered due to the particular circumstances in the ‘Network Society’. The paper outlines a suggestion...

  10. Virtual worlds: a new frontier for nurse education?

    Science.gov (United States)

    Green, Janet; Wyllie, Aileen; Jackson, Debra

    2014-01-01

    Virtual worlds have the potential to offer nursing students social networking and, learning, opportunities through the use of collaborative and immersive learning. If nursing educators, are to stay, abreast of contemporary learning opportunities an exploration of the potential benefits of, virtual, worlds and their possibilities is needed. Literature was sourced that explored virtual worlds, and their, use in education, but nursing education specifically. It is clear that immersive learning has, positive, benefits for nursing, however the best way to approach virtual reality in nursing education, has yet to, be ascertained.

  11. Mapping, Awareness, And Virtualization Network Administrator Training Tool Virtualization Module

    Science.gov (United States)

    2016-03-01

    bike rides. I learned so much from you all, and will miss each and every one of you. To Mr. John Gibson and Dr. Alan Shaffer: thank you for your...guidance, your long-leash approach to thesis advising, and for the laughs we shared during our meetings. I appreciate the enthusiasm you both had for the...Conclusion and Future Work. This chapter discusses the successes and limitations of the MAVNATT Virtualization Module’s prototype and identifies

  12. The Development of a Virtual Dinosaur Museum

    Science.gov (United States)

    Tarng, Wernhuar; Liou, Hsin-Hun

    2007-01-01

    The objective of this article is to study the network and virtual reality technologies for developing a virtual dinosaur museum, which provides a Web-learning environment for students of all ages and the general public to know more about dinosaurs. We first investigate the method for building the 3D dynamic models of dinosaurs, and then describe…

  13. Termite: Emulation Testbed for Encounter Networks

    Directory of Open Access Journals (Sweden)

    Rodrigo Bruno

    2015-08-01

    Full Text Available Cutting-edge mobile devices like smartphones and tablets are equipped with various infrastructureless wireless interfaces, such as WiFi Direct and Bluetooth. Such technologies allow for novel mobile applications that take advantage of casual encounters between co-located users. However, the need to mimic the behavior of real-world encounter networks makes testing and debugging of such applications hard tasks. We present Termite, an emulation testbed for encounter networks. Our system allows developers to run their applications on a virtual encounter network emulated by software. Developers can model arbitrary encounter networks and specify user interactions on the emulated virtual devices. To facilitate testing and debugging, developers can place breakpoints, inspect the runtime state of virtual nodes, and run experiments in a stepwise fashion. Termite defines its own Petri Net variant to model the dynamically changing topology and synthesize user interactions with virtual devices. The system is designed to efficiently multiplex an underlying emulation hosting infrastructure across multiple developers, and to support heterogeneous mobile platforms. Our current system implementation supports virtual Android devices communicating over WiFi Direct networks and runs on top of a local cloud infrastructure. We evaluated our system using emulator network traces, and found that Termite is expressive and performs well.

  14. Interevent time distributions of human multi-level activity in a virtual world

    Science.gov (United States)

    Mryglod, O.; Fuchs, B.; Szell, M.; Holovatch, Yu.; Thurner, S.

    2015-02-01

    Studying human behavior in virtual environments provides extraordinary opportunities for a quantitative analysis of social phenomena with levels of accuracy that approach those of the natural sciences. In this paper we use records of player activities in the massive multiplayer online game Pardus over 1238 consecutive days, and analyze dynamical features of sequences of actions of players. We build on previous work where temporal structures of human actions of the same type were quantified, and provide an empirical understanding of human actions of different types. This study of multi-level human activity can be seen as a dynamic counterpart of static multiplex network analysis. We show that the interevent time distributions of actions in the Pardus universe follow highly non-trivial distribution functions, from which we extract action-type specific characteristic 'decay constants'. We discuss characteristic features of interevent time distributions, including periodic patterns on different time scales, bursty dynamics, and various functional forms on different time scales. We comment on gender differences of players in emotional actions, and find that while males and females act similarly when performing some positive actions, females are slightly faster for negative actions. We also observe effects on the age of players: more experienced players are generally faster in making decisions about engaging in and terminating enmity and friendship, respectively.

  15. Using Moodle in Ehisical Education classes: a virtual didactic material for teaching athletics

    Directory of Open Access Journals (Sweden)

    Guy Ginciene

    2015-05-01

    Full Text Available Noting the impact of technology in our society, we realize the necessity to create a didactic material based on the Information and Communication Technologies to support the work of the physical education teacher in the teaching of athletics, in particular, the 100 meters dash. For no other reason, the aim of this study was to organize a virtual didactic material, searching virtual games, videos, websites, blogs and social networks related to the 100 meters dash, organizing a database and suggesting activities aiming to the use of this didactic material for the teaching of this event in physical education classes.

  16. Applications of self-organizing neural networks in virtual screening and diversity selection.

    Science.gov (United States)

    Selzer, Paul; Ertl, Peter

    2006-01-01

    Artificial neural networks provide a powerful technique for the analysis and modeling of nonlinear relationships between molecular structures and pharmacological activity. Many network types, including Kohonen and counterpropagation, also provide an intuitive method for the visual assessment of correspondence between the input and output data. This work shows how a combination of neural networks and radial distribution function molecular descriptors can be applied in various areas of industrial pharmaceutical research. These applications include the prediction of biological activity, the selection of screening candidates (cherry picking), and the extraction of representative subsets from large compound collections such as combinatorial libraries. The methods described have also been implemented as an easy-to-use Web tool, allowing chemists to perform interactive neural network experiments on the Novartis intranet.

  17. Writing virtual environments for software visualization

    CERN Document Server

    Jeffery, Clinton

    2015-01-01

    This book describes the software for creating networked, 3D multi-user virtual environments that allow users to create and remotely share visualizations of program behavior. The authors cover the major features of collaborative virtual environments and how to program them in a very high level language, and show how visualization can enable important advances in our ability to understand and reduce the costs of maintaining software. The book also examines the application of popular game-like software technologies.   • Discusses the acquisition of program behavior data to be visualized • Demonstrates the integration of multiple 2D and 3D dynamic views within a 3Dscene • Presents the network messaging capabilities to share those visualizations

  18. Resource Discovery in Activity-Based Sensor Networks

    DEFF Research Database (Denmark)

    Bucur, Doina; Bardram, Jakob

    This paper proposes a service discovery protocol for sensor networks that is specifically tailored for use in humancentered pervasive environments. It uses the high-level concept of computational activities (as logical bundles of data and resources) to give sensors in Activity-Based Sensor Networks...... (ABSNs) knowledge about their usage even at the network layer. ABSN redesigns classical network-level service discovery protocols to include and use this logical structuring of the network for a more practically applicable service discovery scheme. Noting that in practical settings activity-based sensor...

  19. The Virtual Desktop: Options and Challenges in Selecting a Secure Desktop Infrastructure Based on Virtualization

    Science.gov (United States)

    2011-10-01

    the virtual desktop environment still functions for the users associated with it. Users can access the virtual desktop through the local network and...technologie de virtualisation du poste de travail peut contribuer à combler les besoins de partage de l’information sécuritaire au sein du MDN. Le... virtualisation . Il englobe un aperçu de la virtualisation d’un poste de travail, y compris un examen approfondi de deux architectures différentes : le

  20. The neural processing of voluntary completed, real and virtual violent and nonviolent computer game scenarios displaying predefined actions in gamers and nongamers.

    Science.gov (United States)

    Regenbogen, Christina; Herrmann, Manfred; Fehr, Thorsten

    2010-01-01

    Studies investigating the effects of violent computer and video game playing have resulted in heterogeneous outcomes. It has been assumed that there is a decreased ability to differentiate between virtuality and reality in people that play these games intensively. FMRI data of a group of young males with (gamers) and without (controls) a history of long-term violent computer game playing experience were obtained during the presentation of computer game and realistic video sequences. In gamers the processing of real violence in contrast to nonviolence produced activation clusters in right inferior frontal, left lingual and superior temporal brain regions. Virtual violence activated a network comprising bilateral inferior frontal, occipital, postcentral, right middle temporal, and left fusiform regions. Control participants showed extended left frontal, insula and superior frontal activations during the processing of real, and posterior activations during the processing of virtual violent scenarios. The data suggest that the ability to differentiate automatically between real and virtual violence has not been diminished by a long-term history of violent video game play, nor have gamers' neural responses to real violence in particular been subject to desensitization processes. However, analyses of individual data indicated that group-related analyses reflect only a small part of actual individual different neural network involvement, suggesting that the consideration of individual learning history is sufficient for the present discussion.

  1. Archeovirtual 2011: An evaluation approach to virtual museums

    NARCIS (Netherlands)

    Pescarin, S.; Pagano, A.; Wallergård, M.; Hupperetz, W.; Ray, C.; Guidi, G.; Addison, A.C.

    2012-01-01

    November 2011 saw the opening of the exhibition "Archeovirtual" organized by CNR ITABC - Virtual Heritage Lab - and V-MusT Network of Excellence, in Paestum, Italy, under the general direction of BMTA1. The event, that was part of a wider European project focus on virtual museums, turned to be a

  2. Developing Preceptors through Virtual Communities and Networks: Experiences from a Pilot Project.

    Science.gov (United States)

    Ackman, Margaret L; Romanick, Marcel

    2011-11-01

    Supporting preceptors is critical to the expansion of experiential learning opportunities for the pharmacy profession. Informal learning opportunities within communities of practitioners are important for hospital preceptors. However, such communities may be limited by geographic separation of preceptors from peers, faculty members, and supports within the pharmacy services department. To use computer-mediated conferencing to create a sense of community among preceptors, specifically by using this medium to provide initial development of and continuing support for preceptors, and to examine preceptors' satisfaction with this approach. Thirty-nine preceptors who had completed a day-long face-to-face preceptor development workshop and who were supervising students in 1 of 2 specific rotation blocks were invited to participate in the study. The pharmacists used computer-mediated conferencing to meet for virtual networking about specific topics. They met once before the student rotation to receive instructions about the technology and to discuss student orientation and scheduling, and 3 times during the student rotation for open discussion of specific topics. Evaluation and feedback were solicited by means of an electronic survey and virtual (i.e., computer-based) feedback sessions with an independent facilitator. The response rate was 66% (26/39) for the electronic survey, but only 15% (6/39) for the virtual feedback sessions. All of the respondents were experienced preceptors, but for 92% (22/24), this was their first experience with computer-mediated conferencing. Overall, the sessions had a positive reception, and participants found it useful to share information and experiences with other preceptors. The main challenges were related to the technology, perceived lack of support for their participation in the sessions, and inconvenience related to the timing of sessions. Computer-mediated conferencing allowed preceptors to learn from and to support each other

  3. Performance of machine learning methods for ligand-based virtual screening.

    Science.gov (United States)

    Plewczynski, Dariusz; Spieser, Stéphane A H; Koch, Uwe

    2009-05-01

    Computational screening of compound databases has become increasingly popular in pharmaceutical research. This review focuses on the evaluation of ligand-based virtual screening using active compounds as templates in the context of drug discovery. Ligand-based screening techniques are based on comparative molecular similarity analysis of compounds with known and unknown activity. We provide an overview of publications that have evaluated different machine learning methods, such as support vector machines, decision trees, ensemble methods such as boosting, bagging and random forests, clustering methods, neuronal networks, naïve Bayesian, data fusion methods and others.

  4. Virtual IO controllers at J-PARC MR using Xen

    International Nuclear Information System (INIS)

    Kamikubota, N.; Yamada, S.; Yamamoto, N.; Iitsuka, T.; Motohashi, S.; Takagi, M.; Yoshida, S.; Nemoto, H.

    2012-01-01

    The control system for J-PARC accelerator complex has been developed based on the EPICS tool-kit. About 90 traditional ('real') VME-bus computers are used as EPICS IOCs (Input/Output Controller) in the control system for J-PARC MR (Main Ring). In 2010-2011, we demonstrated a 'virtual' IOC using Xen, an open-source virtual machine monitor. Scientific Linux with an EPICS IOC runs on a Xen virtual machine. EPICS records for oscilloscopes (network devices) are configured. Advantages of virtual IOC are discussed. In addition, future directions are discussed. Plan view of virtual IOCs for MR operation will be given. (authors)

  5. Beyond L$: values across the virtual and the real

    NARCIS (Netherlands)

    Hu, J.; Offermans, S.A.M.

    2009-01-01

    Virtual societies and virtual worlds are now patriotically a part of lives of many people, especially the younger generations who have been growing up with the internet and mobile networks. Negative influences such as internet addiction and aggressive behavior have drawn attentions from researchers.

  6. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  7. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    Science.gov (United States)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  8. [Virtual reality in neurosurgery].

    Science.gov (United States)

    Tronnier, V M; Staubert, A; Bonsanto, M M; Wirtz, C R; Kunze, S

    2000-03-01

    Virtual reality enables users to immerse themselves in a virtual three-dimensional world and to interact in this world. The simulation is different from the kind in computer games, in which the viewer is active but acts in a nonrealistic world, or on the TV screen, where we are passively driven in an active world. In virtual reality elements look realistic, they change their characteristics and have almost real-world unpredictability. Virtual reality is not only implemented in gambling dens and the entertainment industry but also in manufacturing processes (cars, furniture etc.), military applications and medicine. Especially the last two areas are strongly correlated, because telemedicine or telesurgery was originated for military reasons to operate on war victims from a secure distance or to perform surgery on astronauts in an orbiting space station. In medicine and especially neurosurgery virtual-reality methods are used for education, surgical planning and simulation on a virtual patient.

  9. Neural correlates of virtual route recognition in congenital blindness

    DEFF Research Database (Denmark)

    Kupers, Ron; Chebat, Daniel R; Madsen, Kristoffer H

    2010-01-01

    Despite the importance of vision for spatial navigation, blind subjects retain the ability to represent spatial information and to move independently in space to localize and reach targets. However, the neural correlates of navigation in subjects lacking vision remain elusive. We therefore used...... functional MRI (fMRI) to explore the cortical network underlying successful navigation in blind subjects. We first trained congenitally blind and blindfolded sighted control subjects to perform a virtual navigation task with the tongue display unit (TDU), a tactile-to-vision sensory substitution device...... that translates a visual image into electrotactile stimulation applied to the tongue. After training, participants repeated the navigation task during fMRI. Although both groups successfully learned to use the TDU in the virtual navigation task, the brain activation patterns showed substantial differences. Blind...

  10. A threat to a virtual hand elicits motor cortex activation.

    Science.gov (United States)

    González-Franco, Mar; Peck, Tabitha C; Rodríguez-Fornells, Antoni; Slater, Mel

    2014-03-01

    We report an experiment where participants observed an attack on their virtual body as experienced in an immersive virtual reality (IVR) system. Participants sat by a table with their right hand resting upon it. In IVR, they saw a virtual table that was registered with the real one, and they had a virtual body that substituted their real body seen from a first person perspective. The virtual right hand was collocated with their real right hand. Event-related brain potentials were recorded in two conditions, one where the participant's virtual hand was attacked with a knife and a control condition where the knife only struck the virtual table. Significantly greater P450 potentials were obtained in the attack condition confirming our expectations that participants had a strong illusion of the virtual hand being their own, which was also strongly supported by questionnaire responses. Higher levels of subjective virtual hand ownership correlated with larger P450 amplitudes. Mu-rhythm event-related desynchronization in the motor cortex and readiness potential (C3-C4) negativity were clearly observed when the virtual hand was threatened-as would be expected, if the real hand was threatened and the participant tried to avoid harm. Our results support the idea that event-related potentials may provide a promising non-subjective measure of virtual embodiment. They also support previous experiments on pain observation and are placed into context of similar experiments and studies of body perception and body ownership within cognitive neuroscience.

  11. Stochastic cycle selection in active flow networks

    Science.gov (United States)

    Woodhouse, Francis; Forrow, Aden; Fawcett, Joanna; Dunkel, Jorn

    2016-11-01

    Active biological flow networks pervade nature and span a wide range of scales, from arterial blood vessels and bronchial mucus transport in humans to bacterial flow through porous media or plasmodial shuttle streaming in slime molds. Despite their ubiquity, little is known about the self-organization principles that govern flow statistics in such non-equilibrium networks. By connecting concepts from lattice field theory, graph theory and transition rate theory, we show how topology controls dynamics in a generic model for actively driven flow on a network. Through theoretical and numerical analysis we identify symmetry-based rules to classify and predict the selection statistics of complex flow cycles from the network topology. Our conceptual framework is applicable to a broad class of biological and non-biological far-from-equilibrium networks, including actively controlled information flows, and establishes a new correspondence between active flow networks and generalized ice-type models.

  12. Virtual laboratory for fusion research in Japan

    International Nuclear Information System (INIS)

    Tsuda, K.; Nagayama, Y.; Yamamoto, T.; Horiuchi, R.; Ishiguro, S.; Takami, S.

    2008-01-01

    A virtual laboratory system for nuclear fusion research in Japan has been developed using SuperSINET, which is a super high-speed network operated by National Institute of Informatics. Sixteen sites including major Japanese universities, Japan Atomic Energy Agency and National Institute for Fusion Science (NIFS) are mutually connected to SuperSINET with the speed of 1 Gbps by the end of 2006 fiscal year. Collaboration categories in this virtual laboratory are as follows: the large helical device (LHD) remote participation; the remote use of supercomputer system; and the all Japan ST (Spherical Tokamak) research program. This virtual laboratory is a closed network system, and is connected to the Internet through the NIFS firewall in order to keep higher security. Collaborators in a remote station can control their diagnostic devices at LHD and analyze the LHD data as they were at the LHD control room. Researchers in a remote station can use the supercomputer of NIFS in the same environment as NIFS. In this paper, we will describe detail of technologies and the present status of the virtual laboratory. Furthermore, the items that should be developed in the near future are also described

  13. Network-dependent modulation of brain activity during sleep.

    Science.gov (United States)

    Watanabe, Takamitsu; Kan, Shigeyuki; Koike, Takahiko; Misaki, Masaya; Konishi, Seiki; Miyauchi, Satoru; Miyahsita, Yasushi; Masuda, Naoki

    2014-09-01

    Brain activity dynamically changes even during sleep. A line of neuroimaging studies has reported changes in functional connectivity and regional activity across different sleep stages such as slow-wave sleep (SWS) and rapid-eye-movement (REM) sleep. However, it remains unclear whether and how the large-scale network activity of human brains changes within a given sleep stage. Here, we investigated modulation of network activity within sleep stages by applying the pairwise maximum entropy model to brain activity obtained by functional magnetic resonance imaging from sleeping healthy subjects. We found that the brain activity of individual brain regions and functional interactions between pairs of regions significantly increased in the default-mode network during SWS and decreased during REM sleep. In contrast, the network activity of the fronto-parietal and sensory-motor networks showed the opposite pattern. Furthermore, in the three networks, the amount of the activity changes throughout REM sleep was negatively correlated with that throughout SWS. The present findings suggest that the brain activity is dynamically modulated even in a sleep stage and that the pattern of modulation depends on the type of the large-scale brain networks. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Virtual blood bank

    Directory of Open Access Journals (Sweden)

    Kit Fai Wong

    2011-01-01

    Full Text Available Virtual blood bank is the computer-controlled, electronically linked information management system that allows online ordering and real-time, remote delivery of blood for transfusion. It connects the site of testing to the point of care at a remote site in a real-time fashion with networked computers thus maintaining the integrity of immunohematology test results. It has taken the advantages of information and communication technologies to ensure the accuracy of patient, specimen and blood component identification and to enhance personnel traceability and system security. The built-in logics and process constraints in the design of the virtual blood bank can guide the selection of appropriate blood and minimize transfusion risk. The quality of blood inventory is ascertained and monitored, and an audit trail for critical procedures in the transfusion process is provided by the paperless system. Thus, the virtual blood bank can help ensure that the right patient receives the right amount of the right blood component at the right time.

  15. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  16. Virtualization of the Y.E.S. Congress 2009 Roundtable Symposia (Invited)

    Science.gov (United States)

    Gonzales, L. M.; Gaines, S. M.

    2009-12-01

    The Y.E.S. Congress 2009 was the first international conference organized by the Y.E.S. Network, an association of early-career geoscientists who represent professional societies, geoscience companies, geoscience departments, and interested policy makers from across the world, in collaboration with the International Year of Planet Earth (IYPE). The conference, hosted by the China University of Geosciences in Beijing, focused on scientific and career challenges faced by early-career geoscientists, with a particular emphasis on how the Y.E.S. Network can work collaboratively and internationally towards solving these challenges and furthering the IYPE motto of “Earth Sciences for Society”. A key features of the Y.E.S. Congress was the implementation of “virtualized” roundtable symposia which engaged senior and early-career geoscientists via presentations, panel discussions, and working group sessions in which strategies related to scientific challenges (i.e. climate change in the polar regions, natural hazards, natural resource sustainability) and academic and career pathway challenges (i.e. academic-industry linkages, gender parity in the geosciences, geoscience education sustainability, and international licensure issues) were developed. These strategies were then tasked to the Y.E.S. Network for further development and implementation. The virtualization of the roundtable symposia facilitated active discussion between those participants and speakers who were physically located at the conference facilities in Beijing with a wider international audience of virtual participants and speakers. This talk will address the key features of the roundtable virtualization, the successes and challenges faced during the pre-conference set-up as well as during the roundtable sessions, and potential future applications.

  17. Virtual prototyping of a semi-active transfemoral prosthetic leg.

    Science.gov (United States)

    Lui, Zhen Wei; Awad, Mohammed I; Abouhossein, Alireza; Dehghani-Sanij, Abbas A; Messenger, Neil

    2015-05-01

    This article presents a virtual prototyping study of a semi-active lower limb prosthesis to improve the functionality of an amputee during prosthesis-environment interaction for level ground walking. Articulated ankle-foot prosthesis and a single-axis semi-active prosthetic knee with active and passive operating modes were considered. Data for level ground walking were collected using a photogrammetric method in order to develop a base-line simulation model and with the hip kinematics input to verify the proposed design. The simulated results show that the semi-active lower limb prosthesis is able to move efficiently in passive mode, and the activation time of the knee actuator can be reduced by approximately 50%. Therefore, this semi-active system has the potential to reduce the energy consumption of the actuators required during level ground walking and requires less compensation from the amputee due to lower deviation of the vertical excursion of body centre of mass. © IMechE 2015.

  18. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  19. Virtual Libraries: Service Realities.

    Science.gov (United States)

    Novak, Jan

    This paper discusses client service issues to be considered when transitioning to a virtual library situation. Themes related to the transitional nature of society in the knowledge era are presented, including: paradox and a contradictory nature; blurring of boundaries; networks, systems, and holistic thinking; process/not product, becoming/not…

  20. Virtualization in the Operations Environments

    Science.gov (United States)

    Pitts, Lee; Lankford, Kim; Felton, Larry; Pruitt, Robert

    2010-01-01

    Virtualization provides the opportunity to continue to do "more with less"---more computing power with fewer physical boxes, thus reducing the overall hardware footprint, power and cooling requirements, software licenses, and their associated costs. This paper explores the tremendous advantages and any disadvantages of virtualization in all of the environments associated with software and systems development to operations flow. It includes the use and benefits of the Intelligent Platform Management Interface (IPMI) specification, and identifies lessons learned concerning hardware and network configurations. Using the Huntsville Operations Support Center (HOSC) at NASA Marshall Space Flight Center as an example, we demonstrate that deploying virtualized servers as a means of managing computing resources is applicable and beneficial to many areas of application, up to and including flight operations.

  1. Virtual Organizations: Trends and Models

    Science.gov (United States)

    Nami, Mohammad Reza; Malekpour, Abbaas

    The Use of ICT in business has changed views about traditional business. With VO, organizations with out physical, geographical, or structural constraint can collaborate with together in order to fulfill customer requests in a networked environment. This idea improves resource utilization, reduces development process and costs, and saves time. Virtual Organization (VO) is always a form of partnership and managing partners and handling partnerships are crucial. Virtual organizations are defined as a temporary collection of enterprises that cooperate and share resources, knowledge, and competencies to better respond to business opportunities. This paper presents an overview of virtual organizations and main issues in collaboration such as security and management. It also presents a number of different model approaches according to their purpose and applications.

  2. Virtual patients on the semantic Web: a proof-of-application study.

    Science.gov (United States)

    Dafli, Eleni; Antoniou, Panagiotis; Ioannidis, Lazaros; Dombros, Nicholas; Topps, David; Bamidis, Panagiotis D

    2015-01-22

    Virtual patients are interactive computer simulations that are increasingly used as learning activities in modern health care education, especially in teaching clinical decision making. A key challenge is how to retrieve and repurpose virtual patients as unique types of educational resources between different platforms because of the lack of standardized content-retrieving and repurposing mechanisms. Semantic Web technologies provide the capability, through structured information, for easy retrieval, reuse, repurposing, and exchange of virtual patients between different systems. An attempt to address this challenge has been made through the mEducator Best Practice Network, which provisioned frameworks for the discovery, retrieval, sharing, and reuse of medical educational resources. We have extended the OpenLabyrinth virtual patient authoring and deployment platform to facilitate the repurposing and retrieval of existing virtual patient material. A standalone Web distribution and Web interface, which contains an extension for the OpenLabyrinth virtual patient authoring system, was implemented. This extension was designed to semantically annotate virtual patients to facilitate intelligent searches, complex queries, and easy exchange between institutions. The OpenLabyrinth extension enables OpenLabyrinth authors to integrate and share virtual patient case metadata within the mEducator3.0 network. Evaluation included 3 successive steps: (1) expert reviews; (2) evaluation of the ability of health care professionals and medical students to create, share, and exchange virtual patients through specific scenarios in extended OpenLabyrinth (OLabX); and (3) evaluation of the repurposed learning objects that emerged from the procedure. We evaluated 30 repurposed virtual patient cases. The evaluation, with a total of 98 participants, demonstrated the system's main strength: the core repurposing capacity. The extensive metadata schema presentation facilitated user exploration

  3. The role of propriospinal neuronal network in transmitting the alternating muscular activities of flexor and extensor in parkinsonian tremor.

    Science.gov (United States)

    Hao, M; He, X; Lan, N

    2012-01-01

    It has been shown that normal cyclic movement of human arm and resting limb tremor in Parkinson's disease (PD) are associated with the oscillatory neuronal activities in different cerebral networks, which are transmitted to the antagonistic muscles via the same spinal pathway. There are mono-synaptic and multi-synaptic corticospinal pathways for conveying motor commands. This study investigates the plausible role of propriospinal neuronal (PN) network in the C3-C4 levels in multi-synaptic transmission of cortical commands for oscillatory movements. A PN network model is constructed based on known neurophysiological connections, and is hypothesized to achieve the conversion of cortical oscillations into alternating antagonistic muscle bursts. Simulations performed with a virtual arm (VA) model indicate that without the PN network, the alternating bursts of antagonistic muscle EMG could not be reliably generated, whereas with the PN network, the alternating pattern of bursts were naturally displayed in the three pairs of antagonist muscles. Thus, it is suggested that oscillations in the primary motor cortex (M1) of single and double tremor frequencies are processed at the PN network to compute the alternating burst pattern in the flexor and extensor muscles.

  4. Virtual network computing: cross-platform remote display and collaboration software.

    Science.gov (United States)

    Konerding, D E

    1999-04-01

    VNC (Virtual Network Computing) is a computer program written to address the problem of cross-platform remote desktop/application display. VNC uses a client/server model in which an image of the desktop of the server is transmitted to the client and displayed. The client collects mouse and keyboard input from the user and transmits them back to the server. The VNC client and server can run on Windows 95/98/NT, MacOS, and Unix (including Linux) operating systems. VNC is multi-user on Unix machines (any number of servers can be run are unrelated to the primary display of the computer), while it is effectively single-user on Macintosh and Windows machines (only one server can be run, displaying the contents of the primary display of the server). The VNC servers can be configured to allow more than one client to connect at one time, effectively allowing collaboration through the shared desktop. I describe the function of VNC, provide details of installation, describe how it achieves its goal, and evaluate the use of VNC for molecular modelling. VNC is an extremely useful tool for collaboration, instruction, software development, and debugging of graphical programs with remote users.

  5. Hyper Hospital on the satellite multi-media network.

    Science.gov (United States)

    Yamaguchi, T

    1997-01-01

    We have been developing the Hyper Hospital, a network based VR mediated medical care system. The Hyper Hospital is composed of two seamlessly integrated environments, that is, the virtual and the real worlds. Of them, its virtual environment expands the conventional medical care system using the virtual reality technology as a principal human interface and a collaboration tool, in the present study, an attempt to extend the Hyper Hospital system to various modalities of communication network is reported. A satellite communication based multi-media network using Internet protocols with the WWW interface is used. Data transmission rate and other performances were measured under various conditions and the satellite network was shown to be suitable to the Hyper Hospital network.

  6. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  7. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  8. Perspectives on the Viable Mobile Virtual Community for Telemedicine

    OpenAIRE

    van 't Klooster, J.W.J.R.; Pawar, P.; van Beijnum, Bernhard J.F.; Dulawan, Chariz; Hermens, Hermanus J.

    2010-01-01

    A virtual community is an electronically supported social network: it can be seen as a group of people who have regular social interaction, independent of time and space, because of a common interest such as a problem, task, or feeling exchange (Eysenbach, Powell, Englesakis, Rizo, & Stern, 2004; Rheingold, 1993). When independence of time and space is achieved through the use of mobile devices and wireless communication technologies, such a virtual community is called a Mobile Virtual Commun...

  9. Development and application of network virtual instrument for emission spectrum of pulsed high-voltage direct current discharge

    Science.gov (United States)

    Gong, X.; Wu, Q.

    2017-12-01

    Network virtual instrument (VI) is a new development direction in current automated test. Based on LabVIEW, the software and hardware system of VI used for emission spectrum of pulsed high-voltage direct current (DC) discharge is developed and applied to investigate pulsed high-voltage DC discharge of nitrogen. By doing so, various functions are realized including real time collection of emission spectrum of nitrogen, monitoring operation state of instruments and real time analysis and processing of data. By using shared variables and DataSocket technology in LabVIEW, the network VI system based on field VI is established. The system can acquire the emission spectrum of nitrogen in the test site, monitor operation states of field instruments, realize real time face-to-face interchange of two sites, and analyze data in the far-end from the network terminal. By employing the network VI system, the staff in the two sites acquired the same emission spectrum of nitrogen and conducted the real time communication. By comparing with the previous results, it can be seen that the experimental data obtained by using the system are highly precise. This implies that the system shows reliable network stability and safety and satisfies the requirements for studying the emission spectrum of pulsed high-voltage discharge in high-precision fields or network terminals. The proposed architecture system is described and the target group gets the useful enlightenment in many fields including engineering remote users, specifically in control- and automation-related tasks.

  10. Typology on Leadership toward Creativity in Virtual Work

    Directory of Open Access Journals (Sweden)

    Iris A Humala

    2017-07-01

    Full Text Available Aim/Purpose: This study aims to develop a descriptive typology to better identify leadership toward creativity in virtual work in different types of companies. Background: The study empirically explores how leadership toward creativity occurs in virtual work and uses the theoretical lenses of creativity-conducive leadership and heterarchy to generate a typology. Methodology\t: A multiple qualitative case study design, interpretivist approach, and abductive analysis are applied. Data is collected by interviewing 21 leaders and employees face-to-face in four companies in the ICT sector and one business advisor company. Contribution: The empirical evidence of this study enriches the understanding of leadership toward creativity in virtual work and contributes to the limited empirical knowledge on leadership that stimulates a virtual workforce to achieve creativity. Findings: The four different types of companies in the typology utilize various transitions toward leadership creativity in virtual work. The trend in leadership in the existing virtually networked business environment is toward the “collective mind” company, which is characterized by shared values, meaningful work, collective intelligence, conscious reflection, transparency, coaching, empowering leadership by example, effective multichannel interaction, and assertiveness. The findings empirically support applying a heterarchy perspective to lead a virtual workforce toward creativity and promote leaders who are genuinely interested in people, their development, collaboration, and technology. Recommendations for Practitioners: The typology helps professionals realize the need to develop leadership, communication, interaction, learning, and growth to foster creative interaction and improve productivity and competitiveness. Recommendation for Researchers: This study enables researchers to more rigorously and creatively conceptualize the conditions and relationships in leadership that

  11. Simulations and experimental evaluation of an active orthosis for interaction in virtual environments

    Directory of Open Access Journals (Sweden)

    Tsveov Mihail

    2018-01-01

    Full Text Available In this work, the development of a human arm active orthosis is presented. The orthosis is designed primarily for training and rehabilitation in virtual environments.The orthosis system is intended for embodiment in virtual reality where it is allowing human to perceive forces at different body parts or the weight of lifted objects. In the paper the choice of a mechanical structure is shown equivalent to the structure of the human arm. A mechanical model of the orthosis arm as haptic device is built, where kinematic and dynamic parameters are evaluated. Impedance control scheme is selected as the most suitable for force refection at the hand or arm. An open-loop impedance controller is presented in the paper. Computer experiments are carried out using the dimensions of a real arm orthosis. Computer experiments have been carried out to provide force reflection by VR, according to virtual scenario. The conducted simulations show the range of the forces on the operator hand, orthosis can provide. The results of additional measurements and experimental evaluations of physical quantities in the interaction in a virtual environment are revealed in the paper.

  12. Activating and inhibiting connections in biological network dynamics

    Directory of Open Access Journals (Sweden)

    Knight Rob

    2008-12-01

    Full Text Available Abstract Background Many studies of biochemical networks have analyzed network topology. Such work has suggested that specific types of network wiring may increase network robustness and therefore confer a selective advantage. However, knowledge of network topology does not allow one to predict network dynamical behavior – for example, whether deleting a protein from a signaling network would maintain the network's dynamical behavior, or induce oscillations or chaos. Results Here we report that the balance between activating and inhibiting connections is important in determining whether network dynamics reach steady state or oscillate. We use a simple dynamical model of a network of interacting genes or proteins. Using the model, we study random networks, networks selected for robust dynamics, and examples of biological network topologies. The fraction of activating connections influences whether the network dynamics reach steady state or oscillate. Conclusion The activating fraction may predispose a network to oscillate or reach steady state, and neutral evolution or selection of this parameter may affect the behavior of biological networks. This principle may unify the dynamics of a wide range of cellular networks. Reviewers Reviewed by Sergei Maslov, Eugene Koonin, and Yu (Brandon Xia (nominated by Mark Gerstein. For the full reviews, please go to the Reviewers' comments section.

  13. Redes virtuais de aprendizagem na sociedade e na pesquisa Virtual learning network in society and research

    Directory of Open Access Journals (Sweden)

    Gustavo Henrique de Araújo Freire

    2008-05-01

    Full Text Available [Portuguese]Apresenta um dos aspectos da tese de que uma rede virtual de aprendizagem (aqui denominada estoques de informação em fluxo facilita a comunicação da informação nos grupos de usuários que dela participa. Aponta que a principal característica da sociedade contemporânea é a aplicação da informação e do conhecimento em um ciclo de realimentação cumulativo da inovação tecnológica. Discute o valor do capital intelectual para o processo de produção social, o que vem a exigir a constante atualização dos estoques dinâmicos de informação armazenados nos indivíduos. Define o papel dos profissionais da informação a partir da responsabilidade social de facilitar a comunicação da informação para um usuário que dela necessita, no processo de construção do seu próprio conhecimento. Propõe que as redes de aprendizagem assumam o papel fundamental de meio não somente na comunicação da informação, mas, especialmente, na criação de possibilidades de produção de novos conhecimentos.[English]Presents an aspect of the thesis in which a virtual learning network (here called information stocks in flow facilitates the communication of information in groups of users that participate in it. Points out that the main characteristic of contemporary society is the application of information and knowledge in a cumulative feedback cycle of technological innovation. Discusses the value of intellectual capital in the process of social production, which means a constant demand of update in dynamic stocks of information stored in individuals. Defines the information professional role beginning with social responsibility in facilitating the communication of information to an user that needs it, in the process of construction of its own knowledge. Proposes that virtual learning networks take on the fundamental task of being a medium, not only as way of communication information, but, specially, in creating possibilities of

  14. ModelforAnalyzing Human Communication Network Based onAgent-Based Simulation

    Science.gov (United States)

    Matsuyama, Shinako; Terano, Takao

    This paper discusses dynamic properties of human communications networks, which appears as a result of informationexchanges among people. We propose agent-based simulation (ABS) to examine implicit mechanisms behind the dynamics. The ABS enables us to reveal the characteristics and the differences of the networks regarding the specific communicationgroups. We perform experiments on the ABS with activity data from questionnaires survey and with virtual data which isdifferent from the activity data. We compare the difference between them and show the effectiveness of the ABS through theexperiments.

  15. Combination of a Flipped Classroom Format and a Virtual Patient Case to Enhance Active Learning in a Required Therapeutics Course

    Science.gov (United States)

    Lichvar, Alicia Beth; Hedges, Ashley; Benedict, Neal J.

    2016-01-01

    Objective. To design and evaluate the integration of a virtual patient activity in a required therapeutics course already using a flipped-classroom teaching format. Design. A narrative-branched, dynamic virtual-patient case was designed to replace the static written cases that students worked through during the class, which was dedicated to teaching the complications of liver disease. Students completed pre- and posttests before and after completing the virtual patient case. Examination scores were compared to those in the previous year. Assessment. Students’ posttest scores were higher compared to pretest scores (33% vs 50%). Overall median examination scores were higher compared to the historical control group (70% vs 80%), as well as scores on questions assessing higher-level learning (67% vs 83%). A majority of students (68%) felt the virtual patient helped them apply knowledge gained in the pre-class video lecture. Students preferred this strategy to usual in-class activities (33%) or indicated it was of equal value (37%). Conclusion. The combination of a pre-class video lecture with an in-class virtual patient case is an effective active-learning strategy. PMID:28179724

  16. Combination of a Flipped Classroom Format and a Virtual Patient Case to Enhance Active Learning in a Required Therapeutics Course.

    Science.gov (United States)

    Lichvar, Alicia Beth; Hedges, Ashley; Benedict, Neal J; Donihi, Amy C

    2016-12-25

    Objective. To design and evaluate the integration of a virtual patient activity in a required therapeutics course already using a flipped-classroom teaching format. Design. A narrative-branched, dynamic virtual-patient case was designed to replace the static written cases that students worked through during the class, which was dedicated to teaching the complications of liver disease. Students completed pre- and posttests before and after completing the virtual patient case. Examination scores were compared to those in the previous year. Assessment. Students' posttest scores were higher compared to pretest scores (33% vs 50%). Overall median examination scores were higher compared to the historical control group (70% vs 80%), as well as scores on questions assessing higher-level learning (67% vs 83%). A majority of students (68%) felt the virtual patient helped them apply knowledge gained in the pre-class video lecture. Students preferred this strategy to usual in-class activities (33%) or indicated it was of equal value (37%). Conclusion. The combination of a pre-class video lecture with an in-class virtual patient case is an effective active-learning strategy.

  17. About virtual communities and Alzheimer's disease - Solidarity, care and information

    Directory of Open Access Journals (Sweden)

    Liliane Maria da Silva Melo Bruno

    2013-10-01

    Full Text Available From an approach to the environment virtual communities related to Alzheimer’s Disease, this study sought highlighted the scale of this issue in internet and watch how to approach the pathology in fourteen communities specific. The theoretical study focused on the complexities of family care to old guided the course of drafting the research. Through and analysis qualitative community, observed the importance of virtual environment training support networks for caregivers of relatives with Alzheimer’s. Among 5337 shares of virtual users from a same community it was felt content suggesting the formation of social ties-affective quite significant in reference to an exercise of solidarity social and ability to resist adversities of the progression of degenerative disease. Once standing as a tool for information dissemination and exchange of experience, the internet could represent an additional resource potentially able to establish greater approach among caregivers, which in ultimately could contribute to creation of an interactive network of care beyond the virtual environment.

  18. Virtual Sensor Test Instrumentation

    Science.gov (United States)

    Wang, Roy

    2011-01-01

    Virtual Sensor Test Instrumentation is based on the concept of smart sensor technology for testing with intelligence needed to perform sell-diagnosis of health, and to participate in a hierarchy of health determination at sensor, process, and system levels. A virtual sensor test instrumentation consists of five elements: (1) a common sensor interface, (2) microprocessor, (3) wireless interface, (4) signal conditioning and ADC/DAC (analog-to-digital conversion/ digital-to-analog conversion), and (5) onboard EEPROM (electrically erasable programmable read-only memory) for metadata storage and executable software to create powerful, scalable, reconfigurable, and reliable embedded and distributed test instruments. In order to maximize the efficient data conversion through the smart sensor node, plug-and-play functionality is required to interface with traditional sensors to enhance their identity and capabilities for data processing and communications. Virtual sensor test instrumentation can be accessible wirelessly via a Network Capable Application Processor (NCAP) or a Smart Transducer Interlace Module (STIM) that may be managed under real-time rule engines for mission-critical applications. The transducer senses the physical quantity being measured and converts it into an electrical signal. The signal is fed to an A/D converter, and is ready for use by the processor to execute functional transformation based on the sensor characteristics stored in a Transducer Electronic Data Sheet (TEDS). Virtual sensor test instrumentation is built upon an open-system architecture with standardized protocol modules/stacks to interface with industry standards and commonly used software. One major benefit for deploying the virtual sensor test instrumentation is the ability, through a plug-and-play common interface, to convert raw sensor data in either analog or digital form, to an IEEE 1451 standard-based smart sensor, which has instructions to program sensors for a wide variety of

  19. Using virtual social networks for case finding in clinical studies: An experiment from adolescence, brain, cognition, and diabetes study

    Directory of Open Access Journals (Sweden)

    Ata Pourabbasi

    2017-01-01

    Full Text Available Background: One of the main usages of social networks in clinical studies is facilitating the process of sampling and case finding for scientists. The main focus of this study is on comparing two different methods of sampling through phone calls and using social network, for study purposes. Methods: One of the researchers started calling 214 families of children with diabetes during 90 days. After this period, phone calls stopped, and the team started communicating with families through telegram, a virtual social network for 30 days. The number of children who participated in the study was evaluated. Results: Although the telegram method was 60 days shorter than the phone call method, researchers found that the number of participants from telegram (17.6% did not have any significant differences compared with the ones being phone called (12.9%. Conclusions: Using social networks can be suggested as a beneficial method for local researchers who look for easier sampling methods, winning their samples' trust, following up with the procedure, and an easy-access database.

  20. Intercultural virtual student teams open innovating via online social networks

    OpenAIRE

    Santonen, Teemu

    2011-01-01

    Effective functioning of geographically dispersed, culturally mixed work team is essential for global business success in the era of open innovation. Therefore it is vital to understand and learn how to innovate in a virtually supported intercultural open innovation environments. This case study is developing and testing virtually supported intercultural open innovation process in context of higher education. Our aim is to develop better teaching solutions for experimental innovation learni...

  1. Report on Integrating Activities and Models for Collaboration

    DEFF Research Database (Denmark)

    Buus, Lillian; Dirckinck-Holmfeld, Lone; Ryberg, Thomas

    This report is the deliverable for work package (WP) 28.3 “Integrated network and activities for the exchange of and collaboration between Master students, PhD students and professors” of the European Research Team (ERT) on Conditions for Productive Networked Learning Environments. The objective...... of WP28.3 is to build up an integrated network and activities for the exchange and collaboration between Master students, professional masters, PhD students and professors and to establish a virtual community around the research area of conditions for productive learning in networked learning...

  2. Radiation dose rate map interpolation in nuclear plants using neural networks and virtual reality techniques

    International Nuclear Information System (INIS)

    Mol, Antonio Carlos A.; Pereira, Claudio Marcio N.A.; Freitas, Victor Goncalves G.; Jorge, Carlos Alexandre F.

    2011-01-01

    This paper reports the most recent development results of a simulation tool for assessment of radiation dose exposition by nuclear plant's personnel, using artificial intelligence and virtual reality technologies. The main purpose of this tool is to support training of nuclear plants' personnel, to optimize working tasks for minimisation of received dose. A finer grid of measurement points was considered within the nuclear plant's room, for different power operating conditions. Further, an intelligent system was developed, based on neural networks, to interpolate dose rate values among measured points. The intelligent dose prediction system is thus able to improve the simulation of dose received by personnel. This work describes the improvements implemented in this simulation tool.

  3. Trauma and Self-Narrative in Virtual Reality: Toward Recreating a Healthier Mind

    Directory of Open Access Journals (Sweden)

    Iva Georgieva

    2017-12-01

    Full Text Available This study discusses the concept of virtual selves created in the virtual spaces [e.g. social network services or virtual reality (VR]. It analyzes the activities in the different virtual spaces and claims that experience gained there can be transferred to real life. In respect to that, the effects of the VR treatment on the self as well as the concept of creating a life story are analyzed as interconnected. The research question which arises from these considerations is how to look at psychological trauma in order to explain the effectiveness of the usage of VR for treatment of traumatic disorders. The proposal in the study is to see trauma as a shift in the normal storyline of the narrative people create. With this concept in mind, it might be possible to support the claim that reliving traumatic events, regaining control over one’s life narrative, and creating new stories in the VR aids the treatment process in the search for meaning and resolution in life events. Considering the findings of researchers who argue in the field of self-narrative and traumatic treatment, as well as researchers on virtual selves, virtual spaces and VR, this study discusses the virtual as a possible medium to experience narratives and utilize those narratives as better explanatory stories to facilitate the therapeutic process of recovery and self-recreation. This study supports the idea that VR can be used to visualize patients’ narratives and help them perceive themselves as active authors of their life’s story by retelling traumatic episodes with additional explanation. This experience in the VR is utilized to form healthier narratives and coping techniques for robust therapeutic results that are transferred to real life.

  4. Performance evaluation of data center service localization based on virtual resource migration in software defined elastic optical network.

    Science.gov (United States)

    Yang, Hui; Zhang, Jie; Ji, Yuefeng; Tan, Yuanlong; Lin, Yi; Han, Jianrui; Lee, Young

    2015-09-07

    Data center interconnection with elastic optical network is a promising scenario to meet the high burstiness and high-bandwidth requirements of data center services. In our previous work, we implemented cross stratum optimization of optical network and application stratums resources that allows to accommodate data center services. In view of this, this study extends the data center resources to user side to enhance the end-to-end quality of service. We propose a novel data center service localization (DCSL) architecture based on virtual resource migration in software defined elastic data center optical network. A migration evaluation scheme (MES) is introduced for DCSL based on the proposed architecture. The DCSL can enhance the responsiveness to the dynamic end-to-end data center demands, and effectively reduce the blocking probability to globally optimize optical network and application resources. The overall feasibility and efficiency of the proposed architecture are experimentally verified on the control plane of our OpenFlow-based enhanced SDN testbed. The performance of MES scheme under heavy traffic load scenario is also quantitatively evaluated based on DCSL architecture in terms of path blocking probability, provisioning latency and resource utilization, compared with other provisioning scheme.

  5. Angelópolis territory of virtual model

    OpenAIRE

    Carranza Luna, José Eduardo; Martínez López, Víctor Manuel

    2016-01-01

    The virtual city is no longer an internet affair where you can navigate between fantastic spaces and known sites invented by man. Today the virtual city is a real physical site linked by the network, which is controlled by the big phone service providers offering the necessary connections and bank transfers, financial movements and even provide other services to administrate hotels, restaurants, hospitals, schools, universities and other franchise business The contemporary urban develop...

  6. Innovation and Virtual Environments: Towards Virtual Knowledge Brokers

    OpenAIRE

    VERONA G; PRANDELLI E.; SAWHNEY M.

    2006-01-01

    The authors examine the implications of virtual customer environments for supporting the innovation process. By building on the literature of knowledge brokers, they introduce the concept of virtual knowledge brokers — actors who leverage the internet to support third parties’ innovation activities. These actors enable firms to extend their reach in engaging with customers and they also allow firms to have a richer dialogue with customers because of their perceived neutrality. Consequently...

  7. Virtual diplomacy: an analysis of the structure of the target audiences

    Directory of Open Access Journals (Sweden)

    V. V. Verbytska

    2016-03-01

    Full Text Available In the context of the global information society the communication processes, especially at the international level, become more important.  The effectiveness of communication depends primarily on its focus, i.e. on defining clearly the target audience which it should focus on. Virtual diplomacy, as a kind of political communication at the international level, is no exception.  The novelty, rapid development and dissemination of this phenomenon require profound analysis and elaboration of effective utilization strategies, including studying its recipients and target audiences. Purpose: identification, structuring and analysis of the recipients of virtual diplomacy as the audiences of international political communication. The study uses such research methods, as system analysis, structural functionalism, dialectics and synergy, comparison, critical analysis. Main results of the research: 1. The study examined the specifics of political communication in the context of the development of the global information society at the international level. 2. It also analyzed the recipients of virtual diplomacy as a kind of political communication at the international level. 3. The study highlighted the key target groups in the global Internet network based on the tasks performed by virtual diplomacy. 4. It proved the effectiveness of cooperation with each target group in the framework of virtual diplomacy. 5. It described the specifics of the work with each target group in the context of virtual diplomacy. Practical implications: The article may be useful for writing scientific theoretical studies, tests, essays and term papers, for designing special courses in universities in the sphere of international relations and international information. It can also be a guide for the authorities carrying out diplomatic activities and international information cooperation. Findings: In the context of the establishment of the global information society political

  8. Efficient operating system level virtualization techniques for cloud resources

    Science.gov (United States)

    Ansu, R.; Samiksha; Anju, S.; Singh, K. John

    2017-11-01

    Cloud computing is an advancing technology which provides the servcies of Infrastructure, Platform and Software. Virtualization and Computer utility are the keys of Cloud computing. The numbers of cloud users are increasing day by day. So it is the need of the hour to make resources available on demand to satisfy user requirements. The technique in which resources namely storage, processing power, memory and network or I/O are abstracted is known as Virtualization. For executing the operating systems various virtualization techniques are available. They are: Full System Virtualization and Para Virtualization. In Full Virtualization, the whole architecture of hardware is duplicated virtually. No modifications are required in Guest OS as the OS deals with the VM hypervisor directly. In Para Virtualization, modifications of OS is required to run in parallel with other OS. For the Guest OS to access the hardware, the host OS must provide a Virtual Machine Interface. OS virtualization has many advantages such as migrating applications transparently, consolidation of server, online maintenance of OS and providing security. This paper briefs both the virtualization techniques and discusses the issues in OS level virtualization.

  9. Trends in Virtualized User Environments

    Directory of Open Access Journals (Sweden)

    Diane Barrett

    2008-06-01

    Full Text Available Virtualized environments can make forensics investigation more difficult. Technological advances in virtualization tools essentially make removable media a PC that can be carried around in a pocket or around a neck. Running operating systems and applications this way leaves very little trace on the host system. This paper will explore all the newest methods for virtualized environments and the implications they have on the world of forensics. It will begin by describing and differentiating between software and hardware virtualization. It will then move on to explain the various methods used for server and desktop virtualization. Next, it will explain how virtualization affects the basic forensic process. Finally, it will describe the common methods to find virtualization artifacts and identify virtual activities that affect the examination process of certain virtualized user environments.

  10. Model to Implement Virtual Computing Labs via Cloud Computing Services

    OpenAIRE

    Washington Luna Encalada; José Luis Castillo Sequera

    2017-01-01

    In recent years, we have seen a significant number of new technological ideas appearing in literature discussing the future of education. For example, E-learning, cloud computing, social networking, virtual laboratories, virtual realities, virtual worlds, massive open online courses (MOOCs), and bring your own device (BYOD) are all new concepts of immersive and global education that have emerged in educational literature. One of the greatest challenges presented to e-learning solutions is the...

  11. Neural electrical activity and neural network growth.

    Science.gov (United States)

    Gafarov, F M

    2018-05-01

    The development of central and peripheral neural system depends in part on the emergence of the correct functional connectivity in its input and output pathways. Now it is generally accepted that molecular factors guide neurons to establish a primary scaffold that undergoes activity-dependent refinement for building a fully functional circuit. However, a number of experimental results obtained recently shows that the neuronal electrical activity plays an important role in the establishing of initial interneuronal connections. Nevertheless, these processes are rather difficult to study experimentally, due to the absence of theoretical description and quantitative parameters for estimation of the neuronal activity influence on growth in neural networks. In this work we propose a general framework for a theoretical description of the activity-dependent neural network growth. The theoretical description incorporates a closed-loop growth model in which the neural activity can affect neurite outgrowth, which in turn can affect neural activity. We carried out the detailed quantitative analysis of spatiotemporal activity patterns and studied the relationship between individual cells and the network as a whole to explore the relationship between developing connectivity and activity patterns. The model, developed in this work will allow us to develop new experimental techniques for studying and quantifying the influence of the neuronal activity on growth processes in neural networks and may lead to a novel techniques for constructing large-scale neural networks by self-organization. Copyright © 2018 Elsevier Ltd. All rights reserved.

  12. Spontaneous Plasticity of Multineuronal Activity Patterns in Activated Hippocampal Networks

    Directory of Open Access Journals (Sweden)

    Atsushi Usami

    2008-01-01

    Full Text Available Using functional multineuron imaging with single-cell resolution, we examined how hippocampal networks by themselves change the spatiotemporal patterns of spontaneous activity during the course of emitting spontaneous activity. When extracellular ionic concentrations were changed to those that mimicked in vivo conditions, spontaneous activity was increased in active cell number and activity frequency. When ionic compositions were restored to the control conditions, the activity level returned to baseline, but the weighted spatial dispersion of active cells, as assessed by entropy-based metrics, did not. Thus, the networks can modify themselves by altering the internal structure of their correlated activity, even though they as a whole maintained the same level of activity in space and time.

  13. Difference of cerebral activation between healthy volunteers and MCI-patients during navigation in a virtual reality environment. A parametric study using O15 H2O-PET

    International Nuclear Information System (INIS)

    Drzezga, A.; Wermke, M.D.; Schwaiger, M.; Grimmer, T.; Foerstl, H.; Kurz, A.

    2002-01-01

    Aim: To assess the regional cerebral activation during navigation in a virtual reality (VR) environment in healthy volunteers and patients with mild cognitive impairment (MCI) to identify possible differences in cerebral processing of a complex cognitive task. Materials and Methods: A computer-based VR-system has been developed that allows movements in a virtual labyrinth using a special space-mouse and 3-dimensional perception by shutter-glasses. In 11 healthy, right-handed volunteers (3 female, age 66+/-9 years) and 9 patients with MCI (3 female, 69+/-10 years, diagnosis according to criteria of the Mayo-Clinic) twelve H215O PET-scans were performed (each 370 MBq i.v.-bolus). During the scan subjects had to navigate actively from startpoint to a predefined destination point. Three difficulty levels were presented, 4 times each, in randomized order. Test performance (speed, mistakes) was co-registered. PET data were analyzed using statistical parametric mapping (SPM99, Wellcome Inst., London, UK) including correlation analysis with the acquired test performance results. A significance threshold of p<0,001 uncorrected was applied. Results: In both groups a similar network of extended cerebral activation was identified during active navigation, including maxima in the cerebellum, premotor cortex (Brodmann area [BA] 6), parietal cortex (BA 7, 40) and posterior cingulate cortex (BA 31). However, in MCI-patients a significantly stronger activation of anterior cingulate cortex (BA 24), prefrontal cortex (BA 8) and parietal cortex (BA 40) was observed, as compared to healthy volunteers. Conclusion: The applied combination of PET and VR-technology allows to examine the processing of complex cognitive tasks in the brain. During active navigation significant differences have been observed between the activated cerebral networks in MCI-patients and healthy volunteers. In MCI-patients stronger activation has been identified in cerebral regions associated with attention and

  14. The virtual slice setup.

    Science.gov (United States)

    Lytton, William W; Neymotin, Samuel A; Hines, Michael L

    2008-06-30

    In an effort to design a simulation environment that is more similar to that of neurophysiology, we introduce a virtual slice setup in the NEURON simulator. The virtual slice setup runs continuously and permits parameter changes, including changes to synaptic weights and time course and to intrinsic cell properties. The virtual slice setup permits shocks to be applied at chosen locations and activity to be sampled intra- or extracellularly from chosen locations. By default, a summed population display is shown during a run to indicate the level of activity and no states are saved. Simulations can run for hours of model time, therefore it is not practical to save all of the state variables. These, in any case, are primarily of interest at discrete times when experiments are being run: the simulation can be stopped momentarily at such times to save activity patterns. The virtual slice setup maintains an automated notebook showing shocks and parameter changes as well as user comments. We demonstrate how interaction with a continuously running simulation encourages experimental prototyping and can suggest additional dynamical features such as ligand wash-in and wash-out-alternatives to typical instantaneous parameter change. The virtual slice setup currently uses event-driven cells and runs at approximately 2 min/h on a laptop.

  15. Partner network communities – a resource of universities’ activities

    Directory of Open Access Journals (Sweden)

    Romm Mark V.

    2016-01-01

    Full Text Available The network activity is not only part and parcel of the modern university, but it also demonstrates the level of its success. There appeared an urgent need for understanding the nature of universities’ network interactions and finding the most effective models of their network cooperation. The article analyzes partnership network communities with higher educational establishments (universities’ participation, which are being actively created nowadays. The conditions for successful network activities of a university in scientific, academic and professional network communities are presented.

  16. An optimization method of VON mapping for energy efficiency and routing in elastic optical networks

    Science.gov (United States)

    Liu, Huanlin; Xiong, Cuilian; Chen, Yong; Li, Changping; Chen, Derun

    2018-03-01

    To improve resources utilization efficiency, network virtualization in elastic optical networks has been developed by sharing the same physical network for difference users and applications. In the process of virtual nodes mapping, longer paths between physical nodes will consume more spectrum resources and energy. To address the problem, we propose a virtual optical network mapping algorithm called genetic multi-objective optimize virtual optical network mapping algorithm (GM-OVONM-AL), which jointly optimizes the energy consumption and spectrum resources consumption in the process of virtual optical network mapping. Firstly, a vector function is proposed to balance the energy consumption and spectrum resources by optimizing population classification and crowding distance sorting. Then, an adaptive crossover operator based on hierarchical comparison is proposed to improve search ability and convergence speed. In addition, the principle of the survival of the fittest is introduced to select better individual according to the relationship of domination rank. Compared with the spectrum consecutiveness-opaque virtual optical network mapping-algorithm and baseline-opaque virtual optical network mapping algorithm, simulation results show the proposed GM-OVONM-AL can achieve the lowest bandwidth blocking probability and save the energy consumption.

  17. Planos de realidad, identidad virtual y discurso en las redes sociales

    Directory of Open Access Journals (Sweden)

    Jesús Portillo Fernández

    2016-06-01

    Full Text Available The purpose of this study is to describe the levels of reality in the use of social networks and instant messaging services, the user’s identity and some key discursive mechanisms of communication on the web. An analysis of the parallel relationship between physical reality and virtual enviroments; static identity and e-showcasing on social networks; and the role of the monologue, the context and topoi in cyber-speech was conducted. The study of the tools for interaction in social networks as well as the discursive intentions highlighted the development of projection and participation strategies, a change of identity (an ongoing replacement of physical identity with virtual identity and massive information rather than knowledge. There seemed to be a need to manage massive data because of the plural, emerging reality, the possibility to create an immutable digital identity and the use of virtual environments as communicative launchers rather than as interactive environments.

  18. Virtual enterprise architecture and methodology - Initial results from the Globeman21 project

    DEFF Research Database (Denmark)

    Vesterager, Johan; Larsen, Lars Bjørn; Gobbi, Chiara

    1999-01-01

    This paper will focus on presenting the initial results from the IMS project Globeman21 regarding generic models for Extended Enterprise Management (EEM). In particular the paper outlines a proposed architecture for the creation of virtual enterprises, industrial requirements regarding the generic...... models, terminology for describing extended enterprises, and initial considerations regarding a methodology for EEM. Globeman21 see the extended enterprise as a concept covering the totality of different concepts dealing with the expansion or extension of enterprise activities. One way of realising...... the concept of extended enterprise is through the creation of virtual enterprise, based on a more or less formalised network. This approach is the basis for the development of the generic EEM model within Globeman21....

  19. Virtual Machine Logbook - Enabling virtualization for ATLAS

    International Nuclear Information System (INIS)

    Yao Yushu; Calafiura, Paolo; Leggett, Charles; Poffet, Julien; Cavalli, Andrea; Frederic, Bapst

    2010-01-01

    ATLAS software has been developed mostly on CERN linux cluster lxplus or on similar facilities at the experiment Tier 1 centers. The fast rise of virtualization technology has the potential to change this model, turning every laptop or desktop into an ATLAS analysis platform. In the context of the CernVM project we are developing a suite of tools and CernVM plug-in extensions to promote the use of virtualization for ATLAS analysis and software development. The Virtual Machine Logbook (VML), in particular, is an application to organize work of physicists on multiple projects, logging their progress, and speeding up ''context switches'' from one project to another. An important feature of VML is the ability to share with a single 'click' the status of a given project with other colleagues. VML builds upon the save and restore capabilities of mainstream virtualization software like VMware, and provides a technology-independent client interface to them. A lot of emphasis in the design and implementation has gone into optimizing the save and restore process to makepractical to store many VML entries on a typical laptop disk or to share a VML entry over the network. At the same time, taking advantage of CernVM's plugin capabilities, we are extending the CernVM platform to help increase the usability of ATLAS software. For example, we added the ability to start the ATLAS event display on any computer running CernVM simply by clicking a button in a web browser. We want to integrate seamlessly VML with CernVM unique file system design to distribute efficiently ATLAS software on every physicist computer. The CernVM File System (CVMFS) download files on-demand via HTTP, and cache it locally for future use. This reduces by one order of magnitude the download sizes, making practical for a developer to work with multiple software releases on a virtual machine.

  20. High speed all optical networks

    Science.gov (United States)

    Chlamtac, Imrich; Ganz, Aura

    1990-01-01

    An inherent problem of conventional point-to-point wide area network (WAN) architectures is that they cannot translate optical transmission bandwidth into comparable user available throughput due to the limiting electronic processing speed of the switching nodes. The first solution to wavelength division multiplexing (WDM) based WAN networks that overcomes this limitation is presented. The proposed Lightnet architecture takes into account the idiosyncrasies of WDM switching/transmission leading to an efficient and pragmatic solution. The Lightnet architecture trades the ample WDM bandwidth for a reduction in the number of processing stages and a simplification of each switching stage, leading to drastically increased effective network throughputs. The principle of the Lightnet architecture is the construction and use of virtual topology networks, embedded in the original network in the wavelength domain. For this construction Lightnets utilize the new concept of lightpaths which constitute the links of the virtual topology. Lightpaths are all-optical, multihop, paths in the network that allow data to be switched through intermediate nodes using high throughput passive optical switches. The use of the virtual topologies and the associated switching design introduce a number of new ideas, which are discussed in detail.

  1. Rehabilitation of activities of daily living in virtual environments with intuitive user interface and force feedback.

    Science.gov (United States)

    Chiang, Vico Chung-Lim; Lo, King-Hung; Choi, Kup-Sze

    2017-10-01

    To investigate the feasibility of using a virtual rehabilitation system with intuitive user interface and force feedback to improve the skills in activities of daily living (ADL). A virtual training system equipped with haptic devices was developed for the rehabilitation of three ADL tasks - door unlocking, water pouring and meat cutting. Twenty subjects with upper limb disabilities, supervised by two occupational therapists, received a four-session training using the system. The task completion time and the amount of water poured into a virtual glass were recorded. The performance of the three tasks in reality was assessed before and after the virtual training. Feedback of the participants was collected with questionnaires after the study. The completion time of the virtual tasks decreased during the training (p water successfully poured increased (p = 0.051). The score of the Borg scale of perceived exertion was 1.05 (SD = 1.85; 95% CI =  0.18-1.92) and that of the task specific feedback questionnaire was 31 (SD =  4.85; 95% CI =  28.66-33.34). The feedback of the therapists suggested a positive rehabilitation effect. The participants had positive perception towards the system. The system can potentially be used as a tool to complement conventional rehabilitation approaches of ADL. Implications for rehabilitation Rehabilitation of activities of daily living can be facilitated using computer-assisted approaches. The existing approaches focus on cognitive training rather than the manual skills. A virtual training system with intuitive user interface and force feedback was designed to improve the learning of the manual skills. The study shows that system could be used as a training tool to complement conventional rehabilitation approaches.

  2. CCSDS Advanced Orbiting Systems Virtual Channel Access Service for QoS MACHETE Model

    Science.gov (United States)

    Jennings, Esther H.; Segui, John S.

    2011-01-01

    To support various communications requirements imposed by different missions, interplanetary communication protocols need to be designed, validated, and evaluated carefully. Multimission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in "Simulator of Space Communication Networks" (NPO-41373), NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. By building abstract behavioral models of network protocols, one can validate performance after identifying the appropriate metrics of interest. The innovators have extended the MACHETE model library to include a generic link-layer Virtual Channel (VC) model supporting quality-of-service (QoS) controls based on IP streams. The main purpose of this generic Virtual Channel model addition was to interface fine-grain flow-based QoS (quality of service) between the network and MAC layers of the QualNet simulator, a commercial component of MACHETE. This software model adds the capability of mapping IP streams, based on header fields, to virtual channel numbers, allowing extended QoS handling at link layer. This feature further refines the QoS v existing at the network layer. QoS at the network layer (e.g. diffserv) supports few QoS classes, so data from one class will be aggregated together; differentiating between flows internal to a class/priority is not supported. By adding QoS classification capability between network and MAC layers through VC, one maps multiple VCs onto the same physical link. Users then specify different VC weights, and different queuing and scheduling policies at the link layer. This VC model supports system performance analysis of various virtual channel link-layer QoS queuing schemes independent of the network-layer QoS systems.

  3. Structuring virtual spaces as television places

    DEFF Research Database (Denmark)

    Reinhard, CarrieLynn D.

    As all major American broadcast and cable networks now provide some form and amount of online distribution of their television programming, we are beginning to see more interactive features being attached to this distribution to remediate the conditions of television consumption in the physical...... world.  Attaching such interactivity to their online distribution creates cyberspaces of consumption that become places for virtual audiences to congregate as they view the program.  To illustrate how the virtual environments and worlds are constructed to become places for virtual audiences, four case...... considering how these Internet-based interactive television examples demonstrate the remediation of conventional conceptualizations of television distribution structures and consumption practices, which then indicate the power dynamics of the producer-consumer relationship.  The form in which...

  4. LASSO-ligand activity by surface similarity order: a new tool for ligand based virtual screening.

    Science.gov (United States)

    Reid, Darryl; Sadjad, Bashir S; Zsoldos, Zsolt; Simon, Aniko

    2008-01-01

    Virtual Ligand Screening (VLS) has become an integral part of the drug discovery process for many pharmaceutical companies. Ligand similarity searches provide a very powerful method of screening large databases of ligands to identify possible hits. If these hits belong to new chemotypes the method is deemed even more successful. eHiTS LASSO uses a new interacting surface point types (ISPT) molecular descriptor that is generated from the 3D structure of the ligand, but unlike most 3D descriptors it is conformation independent. Combined with a neural network machine learning technique, LASSO screens molecular databases at an ultra fast speed of 1 million structures in under 1 min on a standard PC. The results obtained from eHiTS LASSO trained on relatively small training sets of just 2, 4 or 8 actives are presented using the diverse directory of useful decoys (DUD) dataset. It is shown that over a wide range of receptor families, eHiTS LASSO is consistently able to enrich screened databases and provides scaffold hopping ability.

  5. LASSO—ligand activity by surface similarity order: a new tool for ligand based virtual screening

    Science.gov (United States)

    Reid, Darryl; Sadjad, Bashir S.; Zsoldos, Zsolt; Simon, Aniko

    2008-06-01

    Virtual Ligand Screening (VLS) has become an integral part of the drug discovery process for many pharmaceutical companies. Ligand similarity searches provide a very powerful method of screening large databases of ligands to identify possible hits. If these hits belong to new chemotypes the method is deemed even more successful. eHiTS LASSO uses a new interacting surface point types (ISPT) molecular descriptor that is generated from the 3D structure of the ligand, but unlike most 3D descriptors it is conformation independent. Combined with a neural network machine learning technique, LASSO screens molecular databases at an ultra fast speed of 1 million structures in under 1 min on a standard PC. The results obtained from eHiTS LASSO trained on relatively small training sets of just 2, 4 or 8 actives are presented using the diverse directory of useful decoys (DUD) dataset. It is shown that over a wide range of receptor families, eHiTS LASSO is consistently able to enrich screened databases and provides scaffold hopping ability.

  6. Green Virtualization for Multiple Collaborative Cellular Operators

    KAUST Repository

    Farooq, Muhammad Junaid; Ghazzai, Hakim; Yaacoub, Elias; Kadri, Abdullah; Alouini, Mohamed-Slim

    2017-01-01

    This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed

  7. Secure virtualization: benefits, risks and constraints

    CSIR Research Space (South Africa)

    Carroll, M

    2011-05-01

    Full Text Available Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization...

  8. State-dependent, bidirectional modulation of neural network activity by endocannabinoids.

    Science.gov (United States)

    Piet, Richard; Garenne, André; Farrugia, Fanny; Le Masson, Gwendal; Marsicano, Giovanni; Chavis, Pascale; Manzoni, Olivier J

    2011-11-16

    The endocannabinoid (eCB) system and the cannabinoid CB1 receptor (CB1R) play key roles in the modulation of brain functions. Although actions of eCBs and CB1Rs are well described at the synaptic level, little is known of their modulation of neural activity at the network level. Using microelectrode arrays, we have examined the role of CB1R activation in the modulation of the electrical activity of rat and mice cortical neural networks in vitro. We find that exogenous activation of CB1Rs expressed on glutamatergic neurons decreases the spontaneous activity of cortical neural networks. Moreover, we observe that the net effect of the CB1R antagonist AM251 inversely correlates with the initial level of activity in the network: blocking CB1Rs increases network activity when basal network activity is low, whereas it depresses spontaneous activity when its initial level is high. Our results reveal a complex role of CB1Rs in shaping spontaneous network activity, and suggest that the outcome of endogenous neuromodulation on network function might be state dependent.

  9. The virtual education fractality: nature and organization

    Directory of Open Access Journals (Sweden)

    Osbaldo Turpo Gebera

    2013-04-01

    Full Text Available  The potential generated by ICT in education raises reflect on the underlying frameworks. In this sense, the fractal is an opportunity to explain how it organizes and manages virtual education.This approach recognizes that educational dynamics are recursive and iterative processes instituted as progressive sequences, by way of fractals. This understanding enables becoming as mediated and articulated successive levels. In each dimension are embodied own activities and in turn, involves the recurrence of subsequent levels as possible solving of problem situations. Thus, the knowledge built in response to a collaborative action, participation in networks, ranging from autonomous to the cultural level or conversely.

  10. Declarative virtual water maze learning and emotional fear conditioning in primary insomnia.

    Science.gov (United States)

    Kuhn, Marion; Hertenstein, Elisabeth; Feige, Bernd; Landmann, Nina; Spiegelhalder, Kai; Baglioni, Chiara; Hemmerling, Johanna; Durand, Diana; Frase, Lukas; Klöppel, Stefan; Riemann, Dieter; Nissen, Christoph

    2018-05-02

    Healthy sleep restores the brain's ability to adapt to novel input through memory formation based on activity-dependent refinements of the strength of neural transmission across synapses (synaptic plasticity). In line with this framework, patients with primary insomnia often report subjective memory impairment. However, investigations of memory performance did not produce conclusive results. The aim of this study was to further investigate memory performance in patients with primary insomnia in comparison to healthy controls, using two well-characterized learning tasks, a declarative virtual water maze task and emotional fear conditioning. Twenty patients with primary insomnia according to DSM-IV criteria (17 females, three males, 43.5 ± 13.0 years) and 20 good sleeper controls (17 females, three males, 41.7 ± 12.8 years) were investigated in a parallel-group study. All participants completed a hippocampus-dependent virtual Morris water maze task and amygdala-dependent classical fear conditioning. Patients with insomnia showed significantly delayed memory acquisition in the virtual water maze task, but no significant difference in fear acquisition compared with controls. These findings are consistent with the notion that memory processes that emerge from synaptic refinements in a hippocampal-neocortical network are particularly sensitive to chronic disruptions of sleep, while those in a basic emotional amygdala-dependent network may be more resilient. © 2018 European Sleep Research Society.

  11. Analysis of the characteristics of the global virtual water trade network using degree and eigenvector centrality, with a focus on food and feed crops

    Directory of Open Access Journals (Sweden)

    S.-H. Lee

    2016-10-01

    Full Text Available This study aims to analyze the characteristics of global virtual water trade (GVWT, such as the connectivity of each trader, vulnerable importers, and influential countries, using degree and eigenvector centrality during the period 2006–2010. The degree centrality was used to measure the connectivity, and eigenvector centrality was used to measure the influence on the entire GVWT network. Mexico, Egypt, China, the Republic of Korea, and Japan were classified as vulnerable importers, because they imported large quantities of virtual water with low connectivity. In particular, Egypt had a 15.3 Gm3 year−1 blue water saving effect through GVWT: the vulnerable structure could cause a water shortage problem for the importer. The entire GVWT network could be changed by a few countries, termed "influential traders". We used eigenvector centrality to identify those influential traders. In GVWT for food crops, the USA, Russian Federation, Thailand, and Canada had high eigenvector centrality with large volumes of green water trade. In the case of blue water trade, western Asia, Pakistan, and India had high eigenvector centrality. For feed crops, the green water trade in the USA, Brazil, and Argentina was the most influential. However, Argentina and Pakistan used high proportions of internal water resources for virtual water export (32.9 and 25.1 %; thus other traders should carefully consider water resource management in these exporters.

  12. Analysis of the characteristics of the global virtual water trade network using degree and eigenvector centrality, with a focus on food and feed crops

    Science.gov (United States)

    Lee, Sang-Hyun; Mohtar, Rabi H.; Choi, Jin-Yong; Yoo, Seung-Hwan

    2016-10-01

    This study aims to analyze the characteristics of global virtual water trade (GVWT), such as the connectivity of each trader, vulnerable importers, and influential countries, using degree and eigenvector centrality during the period 2006-2010. The degree centrality was used to measure the connectivity, and eigenvector centrality was used to measure the influence on the entire GVWT network. Mexico, Egypt, China, the Republic of Korea, and Japan were classified as vulnerable importers, because they imported large quantities of virtual water with low connectivity. In particular, Egypt had a 15.3 Gm3 year-1 blue water saving effect through GVWT: the vulnerable structure could cause a water shortage problem for the importer. The entire GVWT network could be changed by a few countries, termed "influential traders". We used eigenvector centrality to identify those influential traders. In GVWT for food crops, the USA, Russian Federation, Thailand, and Canada had high eigenvector centrality with large volumes of green water trade. In the case of blue water trade, western Asia, Pakistan, and India had high eigenvector centrality. For feed crops, the green water trade in the USA, Brazil, and Argentina was the most influential. However, Argentina and Pakistan used high proportions of internal water resources for virtual water export (32.9 and 25.1 %); thus other traders should carefully consider water resource management in these exporters.

  13. An Activity Theory Approach to Analyze Barriers to a Virtual Management Information Systems (MIS) Curriculum

    Science.gov (United States)

    Jaradat, Suhair; Qablan, Ahmad; Barham, Areej

    2011-01-01

    This paper explains how the activity theory is used as a framework to analyze the barriers to a virtual Management Information Stream (MIS) Curriculum in Jordanian schools, from both the sociocultural and pedagogical perspectives. Taking the activity system as a unit of analysis, this study documents the processes by which activities shape and are…

  14. Virtuelne privatne mreže - moguće rešenje pouzdanih komunikacija / Virtual private networks: Possible solution of reliable communications

    Directory of Open Access Journals (Sweden)

    Marinko Smiljanić

    2008-04-01

    Full Text Available U radu su prikazane osnovne karakteristike virtuelnih privatnih mreža (VPN - Virtual Private Networks. Analizirane su VPN mreže na drugom i trećem sloju sistema otvorenog za povezivanje (OSI - Open System Interconnection. Objašnjena je realizacija internet protokola (IP - Internet Protocol VPN mreže i VPN mreže u okruženju višestruke komutacije labela (MPLS - Multi-Protocol Label Switching. Posebna pažnja posvećena je sigurnosti MPLS VPN mreža, naročito sa stanovišta upotrebe u funkcionalnim sistemima veza, kao što je sistem veza Vojske. / In this paper the basic characteristics of the VPN networks are presented. The VPN networks on the second and the third level of the OSI reference model are analyzed. The realization of the IP VPN and VPN networks within MPLS environment is presented as well. Security in MPLS networks is one of the most important characteristics, especially in military communication systems, which is shown in the second part of this paper.

  15. Social networks and their influence over the social consciousness forming

    Directory of Open Access Journals (Sweden)

    A. G. Ananeva

    2011-09-01

    Full Text Available The article describes the analysis of social network influence on social consciousness forming. The examples of connection between international politic courses and events and blogosrheres’ virtual activity are given. Due to the analysis made, authors point at negative consequences following the information wars’ dissemination.

  16. Differences in typing forces, muscle activity, comfort, and typing performance among virtual, notebook, and desktop keyboards.

    Science.gov (United States)

    Kim, Jeong Ho; Aulck, Lovenoor; Bartha, Michael C; Harper, Christy A; Johnson, Peter W

    2014-11-01

    The present study investigated whether there were physical exposure and typing productivity differences between a virtual keyboard with no tactile feedback and two conventional keyboards where key travel and tactile feedback are provided by mechanical switches under the keys. The key size and layout were same across all the keyboards. Typing forces; finger and shoulder muscle activity; self-reported comfort; and typing productivity were measured from 19 subjects while typing on a virtual (0 mm key travel), notebook (1.8 mm key travel), and desktop keyboard (4 mm key travel). When typing on the virtual keyboard, subjects typed with less force (p's typing forces and finger muscle activity came at the expense of a 60% reduction in typing productivity (p typing sessions or when typing productivity is at a premium, conventional keyboards with tactile feedback may be more suitable interface. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  17. A Virtual Collaboration Testbed for C2

    National Research Council Canada - National Science Library

    Gardner, Sheldon

    2000-01-01

    .... To be effective in future Network Centric Warfare (NCW), mission planners will need to operate in a virtual environment with seamless sharing and collaboration among participants and the resources they use to do work...

  18. The potential of virtual reality-based training to enhance the functional autonomy of Alzheimer's disease patients in cooking activities: A single case study.

    Science.gov (United States)

    Foloppe, Déborah A; Richard, Paul; Yamaguchi, Takehiko; Etcharry-Bouyx, Frédérique; Allain, Philippe

    2018-07-01

    Impairments in performing activities of daily living occur early in the course of Alzheimer's disease (AD). There is a great need to develop non-pharmacological therapeutic interventions likely to reduce dependency in everyday activities in AD patients. This study investigated whether it was possible to increase autonomy in these patients in cooking activities using interventions based on errorless learning, vanishing-cue, and virtual reality techniques. We recruited a 79-year-old woman who met NINCDS-ADRDA criteria for probable AD. She was trained in four cooking tasks for four days per task, one hour per day, in virtual and in real conditions. Outcome measures included subjective data concerning the therapeutic intervention and the experience of virtual reality, repeated assessments of training activities, neuropsychological scores, and self-esteem and quality of life measures. The results indicated that our patient could relearn some cooking activities using virtual reality techniques. Transfer to real life was also observed. Improvement of the task performance remained stable over time. This case report supports the value of a non-immersive virtual kitchen to help people with AD to relearn cooking activities.

  19. Who Benefits from Virtuality?

    Science.gov (United States)

    Harper, Barry; Hedberg, John G.; Wright, Rob

    2000-01-01

    Discusses the use of constructivist frameworks to develop effective and successful learning environments, including educational software. Topics include technology supporting reform; virtuality and multimedia; attributes of interactive multimedia and virtual reality; and examples of context and learner active participation. (Contains 35…

  20. Performance assessment and Self-Organisation of Virtual Sectorisation in a realistic LTE network

    NARCIS (Netherlands)

    Martinez, A.M.; Trichias, K.; Litjens, R.

    2016-01-01

    Active Antenna Systems (AAS) technology is one of several advanced features that enable a mobile network operator to cost-efficiently increase its network capacity to cope with the exponential mobile data traffic growth and the ever more demanding performance requirements. AAS can be exploited to

  1. Modelling the dependability in Network Function Virtualisation

    OpenAIRE

    Lin, Wenqi

    2017-01-01

    Network Function Virtualization has been brought up to allow the TSPs to have more possibilities and flexibilities to provision services with better load optimizing, energy utilizing and dynamic scaling. Network functions will be decoupled from the underlying dedicated hardware into software instances that run on commercial off-the-shelf servers. However, the development is still at an early stage and the dependability concerns raise by the virtualization of the network functions are touched ...

  2. Radiation dose rate map interpolation in nuclear plants using neural networks and virtual reality techniques

    Energy Technology Data Exchange (ETDEWEB)

    Mol, Antonio Carlos A., E-mail: mol@ien.gov.br [Comissao Nacional de Energia Nuclear, Instituto de Engenharia Nuclear Rua Helio de Almeida, 75, Ilha do Fundao, P.O. Box 68550, 21941-906 Rio de Janeiro, RJ (Brazil); Instituto Nacional de Ciencia e Tecnologia de Reatores Nucleares Inovadores/CNPq (Brazil); Pereira, Claudio Marcio N.A., E-mail: cmnap@ien.gov.br [Comissao Nacional de Energia Nuclear, Instituto de Engenharia Nuclear Rua Helio de Almeida, 75, Ilha do Fundao, P.O. Box 68550, 21941-906 Rio de Janeiro, RJ (Brazil); Instituto Nacional de Ciencia e Tecnologia de Reatores Nucleares Inovadores/CNPq (Brazil); Freitas, Victor Goncalves G. [Universidade Federal do Rio de Janeiro, Programa de Engenharia Nuclear, Rio de Janeiro, RJ (Brazil); Jorge, Carlos Alexandre F., E-mail: calexandre@ien.gov.br [Comissao Nacional de Energia Nuclear, Instituto de Engenharia Nuclear Rua Helio de Almeida, 75, Ilha do Fundao, P.O. Box 68550, 21941-906 Rio de Janeiro, RJ (Brazil)

    2011-02-15

    This paper reports the most recent development results of a simulation tool for assessment of radiation dose exposition by nuclear plant's personnel, using artificial intelligence and virtual reality technologies. The main purpose of this tool is to support training of nuclear plants' personnel, to optimize working tasks for minimisation of received dose. A finer grid of measurement points was considered within the nuclear plant's room, for different power operating conditions. Further, an intelligent system was developed, based on neural networks, to interpolate dose rate values among measured points. The intelligent dose prediction system is thus able to improve the simulation of dose received by personnel. This work describes the improvements implemented in this simulation tool.

  3. Push Attack: Binding Virtual and Real Identities Using Mobile Push Notifications

    Directory of Open Access Journals (Sweden)

    Pierpaolo Loreti

    2018-01-01

    Full Text Available Popular mobile apps use push notifications extensively to offer an “always connected” experience to their users. Social networking apps use them as a real-time channel to notify users about new private messages or new social interactions (e.g., friendship request, tagging, etc.. Despite the cryptography used to protect these communication channels, the strict temporal binding between the actions that trigger the notifications and the reception of the notification messages in the mobile device may represent a privacy issue. In this work, we present the push notification attack designed to bind the physical owners of mobile devices with their virtual identities, even if pseudonyms are used. In an online attack, an active attacker triggers a push notification and captures the notification packets that transit in the network. In an offline attack, a passive attacker correlates the social network activity of a user with the received push notification. The push notification attack bypasses the standard ways of protecting user privacy based on the network layer by operating at the application level. It requires no additional software on the victim’s mobile device.

  4. The Reality of Virtual Learning.

    Science.gov (United States)

    Berman, Sheldon

    1999-01-01

    Through a $7.5 million U.S. Department of Education grant, students at the Hudson (Massachusetts) Public Schools "attend" Virtual High School--a network of 30 schools in 10 states. Kids attend classes any time, work collaboratively, and choose among innovative, timely, technologically rich course offerings. Other sites are described.…

  5. The effect on lower spine muscle activation of walking on a narrow beam in virtual reality.

    Science.gov (United States)

    Antley, Angus; Slater, Mel

    2011-02-01

    To what extent do people behave in immersive virtual environments as they would in similar situations in a physical environment? There are many ways to address this question, ranging from questionnaires, behavioral studies, and the use of physiological measures. Here, we compare the onsets of muscle activity using surface electromyography (EMG) while participants were walking under three different conditions: on a normal floor surface, on a narrow ribbon along the floor, and on a narrow platform raised off the floor. The same situation was rendered in an immersive virtual environment (IVE) Cave-like system, and 12 participants did the three types of walking in a counter-balanced within-groups design. The mean number of EMG activity onsets per unit time followed the same pattern in the virtual environment as in the physical environment-significantly higher for walking on the platform compared to walking on the floor. Even though participants knew that they were in fact really walking at floor level in the virtual environment condition, the visual illusion of walking on a raised platform was sufficient to influence their behavior in a measurable way. This opens up the door for this technique to be used in gait and posture related scenarios including rehabilitation.

  6. Evolutionary Approach of Virtual Communities of Practice: A Reflection within a Network of Spanish Rural Schools

    Science.gov (United States)

    Frossard, Frédérique; Trifonova, Anna; Barajas Frutos, Mario

    The isolation of rural communities creates special necessities for teachers and students in rural schools. The present article describes "Rural Virtual School", a Virtual Community of Practice (VCoP) in which Spanish teachers of rural schools share learning resources and teaching methodologies through social software applications. The article arrives to an evolutionary model, in which the use of the social software tools evolves together with the needs and the activities of the VCoP through the different stages of its lifetime. Currently, the community has reached a high level of maturity and, in order to keep its momentum, the members intentionally use appropriate technologies specially designed to enhance rich innovative educational approaches, through which they collaboratively generate creative practices.

  7. Performance evaluation of multi-stratum resources integration based on network function virtualization in software defined elastic data center optical interconnect.

    Science.gov (United States)

    Yang, Hui; Zhang, Jie; Ji, Yuefeng; Tian, Rui; Han, Jianrui; Lee, Young

    2015-11-30

    Data center interconnect with elastic optical network is a promising scenario to meet the high burstiness and high-bandwidth requirements of data center services. In our previous work, we implemented multi-stratum resilience between IP and elastic optical networks that allows to accommodate data center services. In view of this, this study extends to consider the resource integration by breaking the limit of network device, which can enhance the resource utilization. We propose a novel multi-stratum resources integration (MSRI) architecture based on network function virtualization in software defined elastic data center optical interconnect. A resource integrated mapping (RIM) scheme for MSRI is introduced in the proposed architecture. The MSRI can accommodate the data center services with resources integration when the single function or resource is relatively scarce to provision the services, and enhance globally integrated optimization of optical network and application resources. The overall feasibility and efficiency of the proposed architecture are experimentally verified on the control plane of OpenFlow-based enhanced software defined networking (eSDN) testbed. The performance of RIM scheme under heavy traffic load scenario is also quantitatively evaluated based on MSRI architecture in terms of path blocking probability, provisioning latency and resource utilization, compared with other provisioning schemes.

  8. PROJECT ACTIVITY ANALYSIS WITHOUT THE NETWORK MODEL

    Directory of Open Access Journals (Sweden)

    S. Munapo

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper presents a new procedure for analysing and managing activity sequences in projects. The new procedure determines critical activities, critical path, start times, free floats, crash limits, and other useful information without the use of the network model. Even though network models have been successfully used in project management so far, there are weaknesses associated with the use. A network is not easy to generate, and dummies that are usually associated with it make the network diagram complex – and dummy activities have no meaning in the original project management problem. The network model for projects can be avoided while still obtaining all the useful information that is required for project management. What are required are the activities, their accurate durations, and their predecessors.

    AFRIKAANSE OPSOMMING: Die navorsing beskryf ’n nuwerwetse metode vir die ontleding en bestuur van die sekwensiële aktiwiteite van projekte. Die voorgestelde metode bepaal kritiese aktiwiteite, die kritieke pad, aanvangstye, speling, verhasing, en ander groothede sonder die gebruik van ’n netwerkmodel. Die metode funksioneer bevredigend in die praktyk, en omseil die administratiewe rompslomp van die tradisionele netwerkmodelle.

  9. Virtual Proprioception for eccentric training.

    Science.gov (United States)

    LeMoyne, Robert; Mastroianni, Timothy

    2017-07-01

    Wireless inertial sensors enable quantified feedback, which can be applied to evaluate the efficacy of therapy and rehabilitation. In particular eccentric training promotes a beneficial rehabilitation and strength training strategy. Virtual Proprioception for eccentric training applies real-time feedback from a wireless gyroscope platform enabled through a software application for a smartphone. Virtual Proprioception for eccentric training is applied to the eccentric phase of a biceps brachii strength training and contrasted to a biceps brachii strength training scenario without feedback. During the operation of Virtual Proprioception for eccentric training the intent is to not exceed a prescribed gyroscope signal threshold based on the real-time presentation of the gyroscope signal, in order to promote the eccentric aspect of the strength training endeavor. The experimental trial data is transmitted wireless through connectivity to the Internet as an email attachment for remote post-processing. A feature set is derived from the gyroscope signal for machine learning classification of the two scenarios of Virtual Proprioception real-time feedback for eccentric training and eccentric training without feedback. Considerable classification accuracy is achieved through the application of a multilayer perceptron neural network for distinguishing between the Virtual Proprioception real-time feedback for eccentric training and eccentric training without feedback.

  10. Intrinsically-generated fluctuating activity in excitatory-inhibitory networks

    Science.gov (United States)

    Mastrogiuseppe, Francesca; Ostojic, Srdjan

    2017-01-01

    Recurrent networks of non-linear units display a variety of dynamical regimes depending on the structure of their synaptic connectivity. A particularly remarkable phenomenon is the appearance of strongly fluctuating, chaotic activity in networks of deterministic, but randomly connected rate units. How this type of intrinsically generated fluctuations appears in more realistic networks of spiking neurons has been a long standing question. To ease the comparison between rate and spiking networks, recent works investigated the dynamical regimes of randomly-connected rate networks with segregated excitatory and inhibitory populations, and firing rates constrained to be positive. These works derived general dynamical mean field (DMF) equations describing the fluctuating dynamics, but solved these equations only in the case of purely inhibitory networks. Using a simplified excitatory-inhibitory architecture in which DMF equations are more easily tractable, here we show that the presence of excitation qualitatively modifies the fluctuating activity compared to purely inhibitory networks. In presence of excitation, intrinsically generated fluctuations induce a strong increase in mean firing rates, a phenomenon that is much weaker in purely inhibitory networks. Excitation moreover induces two different fluctuating regimes: for moderate overall coupling, recurrent inhibition is sufficient to stabilize fluctuations; for strong coupling, firing rates are stabilized solely by the upper bound imposed on activity, even if inhibition is stronger than excitation. These results extend to more general network architectures, and to rate networks receiving noisy inputs mimicking spiking activity. Finally, we show that signatures of the second dynamical regime appear in networks of integrate-and-fire neurons. PMID:28437436

  11. Linking structure and activity in nonlinear spiking networks.

    Directory of Open Access Journals (Sweden)

    Gabriel Koch Ocker

    2017-06-01

    Full Text Available Recent experimental advances are producing an avalanche of data on both neural connectivity and neural activity. To take full advantage of these two emerging datasets we need a framework that links them, revealing how collective neural activity arises from the structure of neural connectivity and intrinsic neural dynamics. This problem of structure-driven activity has drawn major interest in computational neuroscience. Existing methods for relating activity and architecture in spiking networks rely on linearizing activity around a central operating point and thus fail to capture the nonlinear responses of individual neurons that are the hallmark of neural information processing. Here, we overcome this limitation and present a new relationship between connectivity and activity in networks of nonlinear spiking neurons by developing a diagrammatic fluctuation expansion based on statistical field theory. We explicitly show how recurrent network structure produces pairwise and higher-order correlated activity, and how nonlinearities impact the networks' spiking activity. Our findings open new avenues to investigating how single-neuron nonlinearities-including those of different cell types-combine with connectivity to shape population activity and function.

  12. Linking structure and activity in nonlinear spiking networks.

    Science.gov (United States)

    Ocker, Gabriel Koch; Josić, Krešimir; Shea-Brown, Eric; Buice, Michael A

    2017-06-01

    Recent experimental advances are producing an avalanche of data on both neural connectivity and neural activity. To take full advantage of these two emerging datasets we need a framework that links them, revealing how collective neural activity arises from the structure of neural connectivity and intrinsic neural dynamics. This problem of structure-driven activity has drawn major interest in computational neuroscience. Existing methods for relating activity and architecture in spiking networks rely on linearizing activity around a central operating point and thus fail to capture the nonlinear responses of individual neurons that are the hallmark of neural information processing. Here, we overcome this limitation and present a new relationship between connectivity and activity in networks of nonlinear spiking neurons by developing a diagrammatic fluctuation expansion based on statistical field theory. We explicitly show how recurrent network structure produces pairwise and higher-order correlated activity, and how nonlinearities impact the networks' spiking activity. Our findings open new avenues to investigating how single-neuron nonlinearities-including those of different cell types-combine with connectivity to shape population activity and function.

  13. Meditation leads to reduced default mode network activity beyond an active task.

    Science.gov (United States)

    Garrison, Kathleen A; Zeffiro, Thomas A; Scheinost, Dustin; Constable, R Todd; Brewer, Judson A

    2015-09-01

    Meditation has been associated with relatively reduced activity in the default mode network, a brain network implicated in self-related thinking and mind wandering. However, previous imaging studies have typically compared meditation to rest, despite other studies having reported differences in brain activation patterns between meditators and controls at rest. Moreover, rest is associated with a range of brain activation patterns across individuals that has only recently begun to be better characterized. Therefore, in this study we compared meditation to another active cognitive task, both to replicate the findings that meditation is associated with relatively reduced default mode network activity and to extend these findings by testing whether default mode activity was reduced during meditation, beyond the typical reductions observed during effortful tasks. In addition, prior studies had used small groups, whereas in the present study we tested these hypotheses in a larger group. The results indicated that meditation is associated with reduced activations in the default mode network, relative to an active task, for meditators as compared to controls. Regions of the default mode network showing a Group × Task interaction included the posterior cingulate/precuneus and anterior cingulate cortex. These findings replicate and extend prior work indicating that the suppression of default mode processing may represent a central neural process in long-term meditation, and they suggest that meditation leads to relatively reduced default mode processing beyond that observed during another active cognitive task.

  14. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  15. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  16. BRAIN NETWORKS. Correlated gene expression supports synchronous activity in brain networks.

    Science.gov (United States)

    Richiardi, Jonas; Altmann, Andre; Milazzo, Anna-Clare; Chang, Catie; Chakravarty, M Mallar; Banaschewski, Tobias; Barker, Gareth J; Bokde, Arun L W; Bromberg, Uli; Büchel, Christian; Conrod, Patricia; Fauth-Bühler, Mira; Flor, Herta; Frouin, Vincent; Gallinat, Jürgen; Garavan, Hugh; Gowland, Penny; Heinz, Andreas; Lemaître, Hervé; Mann, Karl F; Martinot, Jean-Luc; Nees, Frauke; Paus, Tomáš; Pausova, Zdenka; Rietschel, Marcella; Robbins, Trevor W; Smolka, Michael N; Spanagel, Rainer; Ströhle, Andreas; Schumann, Gunter; Hawrylycz, Mike; Poline, Jean-Baptiste; Greicius, Michael D

    2015-06-12

    During rest, brain activity is synchronized between different regions widely distributed throughout the brain, forming functional networks. However, the molecular mechanisms supporting functional connectivity remain undefined. We show that functional brain networks defined with resting-state functional magnetic resonance imaging can be recapitulated by using measures of correlated gene expression in a post mortem brain tissue data set. The set of 136 genes we identify is significantly enriched for ion channels. Polymorphisms in this set of genes significantly affect resting-state functional connectivity in a large sample of healthy adolescents. Expression levels of these genes are also significantly associated with axonal connectivity in the mouse. The results provide convergent, multimodal evidence that resting-state functional networks correlate with the orchestrated activity of dozens of genes linked to ion channel activity and synaptic function. Copyright © 2015, American Association for the Advancement of Science.

  17. Virtual reality adaptive stimulation of limbic networks in the mental readiness training.

    Science.gov (United States)

    Cosić, Kresimir; Popović, Sinisa; Kostović, Ivica; Judas, Milos

    2010-01-01

    A significant proportion of severe psychological problems in recent large-scale peacekeeping operations underscores the importance of effective methods for strengthening the stress resilience. Virtual reality (VR) adaptive stimulation, based on the estimation of the participant's emotional state from physiological signals, may enhance the mental readiness training (MRT). Understanding neurobiological mechanisms by which the MRT based on VR adaptive stimulation can affect the resilience to stress is important for practical application in the stress resilience management. After the delivery of a traumatic audio-visual stimulus in the VR, the cascade of events occurs in the brain, which evokes various physiological manifestations. In addition to the "limbic" emotional and visceral brain circuitry, other large-scale sensory, cognitive, and memory brain networks participate with less known impact in this physiological response. The MRT based on VR adaptive stimulation may strengthen the stress resilience through targeted brain-body interactions. Integrated interdisciplinary efforts, which would integrate the brain imaging and the proposed approach, may contribute to clarifying the neurobiological foundation of the resilience to stress.

  18. Multi-objective evolutionary optimization for constructing neural networks for virtual reality visual data mining: application to geophysical prospecting.

    Science.gov (United States)

    Valdés, Julio J; Barton, Alan J

    2007-05-01

    A method for the construction of virtual reality spaces for visual data mining using multi-objective optimization with genetic algorithms on nonlinear discriminant (NDA) neural networks is presented. Two neural network layers (the output and the last hidden) are used for the construction of simultaneous solutions for: (i) a supervised classification of data patterns and (ii) an unsupervised similarity structure preservation between the original data matrix and its image in the new space. A set of spaces are constructed from selected solutions along the Pareto front. This strategy represents a conceptual improvement over spaces computed by single-objective optimization. In addition, genetic programming (in particular gene expression programming) is used for finding analytic representations of the complex mappings generating the spaces (a composition of NDA and orthogonal principal components). The presented approach is domain independent and is illustrated via application to the geophysical prospecting of caves.

  19. Question-Answer Activities in Synchronous Virtual Classrooms in Terms of Interest and Usefulness

    Directory of Open Access Journals (Sweden)

    Melike Aydemir

    2016-03-01

    Full Text Available Instructors generally convey their face to face habits to synchronous virtual classrooms, but these face to face strategies do not work in these environments. In this sense, the purpose of this study was to investigate the effects of question type and answer format used in synchronous class implementations on perceived interest and usefulness. To do this, questions were asked in different ways and answers were requested in different formats in synchronous virtual sessions. The participants consisted of 28 postgraduate students registered in an online criminal justice program at a university located in the North-East part of Turkey. Data was collected in the context of a Research Methods in Security Sciences course during 2012–2013 fall semester. Results showed effects of question type on learner interest, while answer format has an effect on usefulness of online activities. In conclusion, to increase interest in synchronous virtual classrooms by asking questions, instead of closed-ended questions, open-ended questions which everybody can answer should be preferred.

  20. Achieving High Resolution Timer Events in Virtualized Environment.

    Science.gov (United States)

    Adamczyk, Blazej; Chydzinski, Andrzej

    2015-01-01

    Virtual Machine Monitors (VMM) have become popular in different application areas. Some applications may require to generate the timer events with high resolution and precision. This however may be challenging due to the complexity of VMMs. In this paper we focus on the timer functionality provided by five different VMMs-Xen, KVM, Qemu, VirtualBox and VMWare. Firstly, we evaluate resolutions and precisions of their timer events. Apparently, provided resolutions and precisions are far too low for some applications (e.g. networking applications with the quality of service). Then, using Xen virtualization we demonstrate the improved timer design that greatly enhances both the resolution and precision of achieved timer events.