WorldWideScience

Sample records for advocates network wepan

  1. Women in Engineering Program Advocates Network (WEPAN): Evaluation of the seventh annual conference

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, S.G.

    1996-08-01

    The primary goals of the 1996 WEPAN Conference were to: (1) Conduct technical and programmatic seminars for institutions desiring to initiate, replicate, or expand women in engineering programs; (2) Provide assistance in fundraising and grant writing; (3) Profile women in engineering programs of excellence; (4) Sponsor inspiring, knowledgeable and motivational keynote speakers; and, (5) Offer a series of workshops focused on topics such as: establishing partnerships with industry, current research findings, retention strategies, issues affecting special populations, and early intervention techniques. In an effort to provide greater access for women to engineering careers, women in engineering program directors at Purdue University, Stevens Institute of Technology and the University of Washington joined together in 1990 to establish WEPAN, a national network of individuals interested in the recruitment, admission, retention, and graduation of women engineering students. This is the seventh year of operation. Success of this effort has been reflected in numerous ways: increased membership in the organization; increased number of women in engineering programs; increased number of women graduating in engineering; and grants from the U.S. Department of Energy, the National Science Foundation, the Alfred P. Sloan Foundation, the AT&T Foundation, and many other corporations to carry out the goals of WEPAN. The Seventh Annual Women in Engineering Conference entitled, Capitalizing on Today`s Challenges, was held in Denver, Colorado on June 1-4, 1996 at the Hyatt Regency. The conference brought together representatives from academia, government, and industry and examined current issues and initiatives for women in technology, science, and education. Building on the successes of the previous conferences, the seventh conference offered a new variety of speakers and topics.

  2. Women in engineering program advocates network (WEPAN): Evaluation of the fourth annual conference

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, S.G.

    1994-08-01

    The 1994 WEPAN conference highlighted the establishment of the three Regional Centers for Women in Engineering, which are located at the University of Washington, Purdue University, and Stevens Insitute of Technology. An overall evaluation was conducted on the effectiveness of the conference, including the quality of plenary sessions, workshops, registration, accommodations and reception.

  3. Networks advocate for youth services.

    Science.gov (United States)

    1998-01-01

    This article discusses the role of networks in promoting reproductive health for youth in Ghana. The Suhum-Kraboa-Coaltar Network and the New Juaben Network are situated in the eastern region of Ghana. These two programs advocate for client-centered programs and for policy change at every level. Since the 1994 ICPD Plan of Action, these networks have worked to increase and improve health services for youth and to improve cooperation between government and nongovernmental groups. These networks provide family planning, reproductive health (RH), and, most importantly, promotion of adolescent health. CEDPA realized that many organizations had the capacity to extend services to youth and to fulfill other mandates of the 1994 ICPD Program of Action. But, these organizations lacked advocacy and networking skills for effectively challenging community policies and programs. CEDPA, in collaboration with others, initiated the POLICY project in 1996 in Ghana. The aim was to create a supportive policy context for family planning and RH programs by formation of a participatory policy process. The POLICY project in Ghana helped networks develop advocacy plans targeted to local decision-makers. The aim was to increase funding for adolescent RH in district plans and budgets. The first action taken by the POLICY project was to conduct a survey, which found that 67% of adolescent females and 53% of adolescent males were sexually active. Only 10% used contraceptives. Advocacy did not increase funding but did result in a supportive network of policy-makers. There are POLICY projects in over 12 countries. PMID:12294636

  4. Urban Parents of Children with Special Needs: Advocating for Their Children through Social Networks

    Science.gov (United States)

    Munn-Joseph, Marlene S.; Gavin-Evans, Karen

    2008-01-01

    Three families living in an urban area in the Midwest with elementary-age children diagnosed with disabilities were interviewed about their family involvement in special education programming and intervention. The study explored how three mothers used social networks to advocate and care for their child's special education programming. Using…

  5. Perspectives--A Tribute to Katie Beckett: Advocate for Youth with Disabilities and Founder of "Kids As Self-Advocates" Network (March 9, 1978-May 18, 2012)

    Science.gov (United States)

    Oser, Cindy; Whiteman, Jodi

    2012-01-01

    The authors remember the life of Katie Beckett, who was an outspoken advocate for disability rights and inspired the Katie Beckett Waiver Program, which allowed children to continue to be eligible for Medicaid and to have their health care needs provided in the home rather than being forced to be in a hospital or institution. Together, Katie and…

  6. Enable, mediate, advocate.

    Science.gov (United States)

    Saan, Hans; Wise, Marilyn

    2011-12-01

    The authors of the Ottawa Charter selected the words enable, mediate and advocate to describe the core activities in what was, in 1986, the new Public Health. This article considers these concepts and the values and ideas upon which they were based. We discuss their relevance in the current context within which health promotion is being conducted, and discuss the implications of changes in the health agenda, media and globalization for practice. We consider developments within health promotion since 1986: its central role in policy rhetoric, the increasing understanding of complexities and the interlinkage with many other societal processes. So the three core activities are reviewed: they still fit well with the main health promotion challenges, but should be refreshed by new ideas and values. As the role of health promotion in the political arena has grown we have become part of the policy establishment and that is a mixed blessing. Making way for community advocates is now our challenge. Enabling requires greater sensitivity to power relations involved and an understanding of the role of health literacy. Mediating keeps its central role as it bridges vital interests of parties. We conclude that these core concepts in the Ottawa Charter need no serious revision. There are, however, lessons from the last 25 years that point to ways to address present and future challenges with greater sensitivity and effectiveness. We invite the next generation to avoid canonizing this text: as is true of every heritage, the heirs must decide on its use. PMID:22080073

  7. Nuclear physicist, arms control advocate

    CERN Multimedia

    Chang, K

    2002-01-01

    Victor F. Weisskopf, a nuclear physicist who worked on the Manhattan Project to build the first atomic bomb in World War II and later became an ardent advocate of arms control, died Monday at his home in Newton, MA, USA. He was 93 (1 page).

  8. Advocacy for active transport: advocate and city council perspectives

    Directory of Open Access Journals (Sweden)

    Rosenby Marieah

    2010-01-01

    Full Text Available Abstract Background Effective advocacy is an important part of efforts to increase population participation in physical activity. Research about effective health advocacy is scarce, however, the health sector can learn from the experiences and knowledge of community advocates and those who are on the receiving end of this advocacy. The aim of this study is to explore advocacy for active transport from the perspectives of community advocates and representatives from City councils. Methods Cycling and walking advocates were identified from the local contact list of Cycling Advocates Network and Living Streets Aotearoa. Semi-structured telephone interviews were conducted with cycle and walking advocates from throughout New Zealand. Advocates also nominated a suitable council officer at their local City council to be interviewed. Interviews were recorded and transcribed and categories of responses for each of the questions created. Results Several processes were used by advocates to engage with council staff, including formal council submissions, meetings, stakeholder forums and partnership in running community events promoting active transport. Several other agencies were identified as being influential for active transport, some as potential coalition partners and others as potential adversaries. Barriers to improving conditions for active transport included a lack of funding, a lack of will-power among either council staff or councillors, limited council staff capacity (time or training and a culture of providing infrastructure for motor vehicles instead of people. Several suggestions were made about how the health sector could contribute to advocacy efforts, including encouraging political commitment, engaging the media, communicating the potential health benefits of active transport to the general public and being role models in terms of personal travel mode choice and having workplaces that support participation in active transport

  9. Advocating for the Use of Pharmacogenomics: One Nurse's Story.

    Science.gov (United States)

    Pestka, Elizabeth L; Shea, Catherine E

    2016-07-01

    The current article describes the experiences of a motivated nurse who gained an understanding of pharmacogenomics and advocated for the use cytochrome P450 testing for patients in her clinical practice, her family members, herself, and for changing the health care delivery system to more readily recognize and address drug-metabolizing-enzyme abnormalities. Recommendations for nurses interested in promoting the use of pharmacogenomics include learning as much as possible about testing and implications, networking with other providers, identifying a knowledgeable pharmacist, assessing for a family history of problems with medication side effects or lack of efficacy, and keeping records of relevant medical and medication information to share with providers. [Journal of Psychosocial Nursing and Mental Health Services, 54(7), 38-42.]. PMID:27362384

  10. John Dique: dialysis pioneer and political advocate.

    Science.gov (United States)

    George, Charles R P

    2016-02-01

    John Dique (1915-1995) epitomized the internationalism of medicine, the intellectual and manual dexterity of many pioneers of dialysis, and the social concern evinced by many nephrologists. Born in Burma of French, German, British and Indian ancestry; educated in India; an Anglo-Indian who described himself as British without ever having visited Britain; he moved to Australia in 1948 to escape the murderous inter-ethnic conflict that befell multicultural India as it and Pakistan became independent. Settling in Brisbane, he pioneered several novel medical techniques. After inventing some simple equipment to facilitate intravenous therapy, he established a neonatal exchange blood transfusion programme. Then, between 1954 and 1963, he personally constructed and operated two haemodialysis machines with which to treat patients suffering from acute renal failure, the first such treatment performed in Australasia. His patients survival results were, for the era, remarkable. He subsequently helped found the Royal Australasian College of Pathologists and went on to establish a successful private pathology practice. The latter years of his life, however, saw him become a social and political advocate. He fiercely opposed the emerging ideologies of multiculturalism and social liberalism that, he predicted, would seriously damage the national fabric of Western society. Public vilification ensued, his medical achievements disregarded. It does seem likely, however, that in none of the areas that he touched - whether medical, social, or political - has the last word yet been said. PMID:26913881

  11. Introducing Forum Theatre to Elicit and Advocate Children's Views

    Science.gov (United States)

    Hammond, Nick

    2013-01-01

    Eliciting and advocating the voice of the child remains at the heart of international political agenda and also remains a central role for educational psychologists (EPs). Previous research indicates that EPs tend to use language-based methods for eliciting and advocating views of children. However, these approaches are often limited. Taking a…

  12. Designing a Mobile Application: The Case of iAdvocate

    Directory of Open Access Journals (Sweden)

    Alan R. Foley

    2012-01-01

    Full Text Available In this article, the design of a mobile application (app called iAdvocate is illustrated. The goal of iAdvocate is to share and develop specific strategies with parents of children with disabilities for working collaboratively with a school team to improve their children’s education. iAdvocate uses problem-based learning strategies, simulations, and provides contextual access resources to build parental advocacy skills and knowledge. iAdvocate provides parents with both information and strategies regarding their educational rights and getting their child’s needs met. The goal of iAdvocate is to share and develop specific strategies with parents for working collaboratively with a school team to improve their children’s education. iAdvocate contains three sections: strategies, a compilation of approaches that parents can pursue as advocates; resources, which lists and, where possible, links to such references as laws, books, articles, web sites, video presentations, and organizations that provide information on inclusive education; and, responses, which features simulated interactions, such as replies to common statements made by school professionals regarding services and accommodations for children. This case illustrates the design processes and techniques used to develop an instructional mobile application by presenting the background and context of the project, initial design and design iterations, negative case analysis, and prototyping. Additional documents illustrating the project background, and design process are also included.

  13. Yalana B. Bryant receives education advocate of the year award

    OpenAIRE

    Harris, Jennifer

    2008-01-01

    Yalana B. Bryant, assistant director for diversity initiatives at Virginia Tech's Office of Undergraduate Admissions, recently received this year's American Association of University Women (AAUW) of Virginia's Education Advocate of the Year Award at a ceremony in Roanoke, Va.

  14. Advocacy for active transport: advocate and city council perspectives

    OpenAIRE

    Rosenby Marieah; Reeder Anthony I; Murdoch Linda; Richards Rosalina

    2010-01-01

    Abstract Background Effective advocacy is an important part of efforts to increase population participation in physical activity. Research about effective health advocacy is scarce, however, the health sector can learn from the experiences and knowledge of community advocates and those who are on the receiving end of this advocacy. The aim of this study is to explore advocacy for active transport from the perspectives of community advocates and representatives from City councils. Methods Cycl...

  15. Having a patient advocate dedicated to the ED.

    Science.gov (United States)

    2008-02-01

    The ED at St. Mary's Hospital in Tucson, AZ, has its own departmental patient advocate. This new staff position saves a lot of time for the rest of the team members. Here are some of the functions a patient advocate can perform in your ED: proactively prevent problems and satisfy delivery of care needs in a timelier manner to avoid complaints; train the ED staff in customer service and communication techniques; communicate with outside clinics to support uninsured or underinsured patients who don't have primary care physicians. PMID:18447293

  16. Sage Advocate Employment Service--WHEEE: A Program Description.

    Science.gov (United States)

    Radding, Natalie M.

    1980-01-01

    Sage Advocate Employment Service in New Haven, Connecticut, is a nonprofit agency that aids older adults in seeking jobs and obtaining needed services. The agency began as a volunteer activity of Yale University students, WHEEE--We Help Elders Establish Employment. The history and factors contributing to its growth are reviewed. (Author/BEF)

  17. A Rhythm Recognition Computer Program to Advocate Interactivist Perception

    Science.gov (United States)

    Buisson, Jean-Christophe

    2004-01-01

    This paper advocates the main ideas of the interactive model of representation of Mark Bickhard and the assimilation/accommodation framework of Jean Piaget, through a rhythm recognition demonstration program. Although completely unsupervised, the program progressively learns to recognize more and more complex rhythms struck on the user's keyboard.…

  18. Women's business advocate to speak on successful entrepreneurship

    OpenAIRE

    Ho, Sookhan

    2006-01-01

    Women's business advocate Susan Phillips Bari will give a talk on successful entrepreneurship from 5:30 to 7 p.m., Wednesday, March 15, at 1670 Litton Reaves Hall at Virginia Tech. The event, which will include a question-and-answer session, is free and open to the public, no tickets required.

  19. Occupational Disease, Workers' Compensation, and the Social Work Advocate.

    Science.gov (United States)

    Shanker, Renee

    1983-01-01

    Charges that the overwhelming majority of victims of work-related illnesses are not receiving their entitlements. Describes ways in which social workers and health professionals may become advocates to broaden the effectiveness of the workers' compensation system, illustrated by case studies from the Montefiore Project. (Author/JAC)

  20. The challenge of gun control for mental health advocates.

    Science.gov (United States)

    Pandya, Anand

    2013-09-01

    Mass shootings, such as the 2012 Newtown massacre, have repeatedly led to political discourse about limiting access to guns for individuals with serious mental illness. Although the political climate after such tragic events poses a considerable challenge to mental health advocates who wish to minimize unsympathetic portrayals of those with mental illness, such media attention may be a rare opportunity to focus attention on risks of victimization of those with serious mental illness and barriers to obtaining psychiatric care. Current federal gun control laws may discourage individuals from seeking psychiatric treatment and describe individuals with mental illness using anachronistic, imprecise, and gratuitously stigmatizing language. This article lays out potential talking points that may be useful after future gun violence. PMID:24042247

  1. Research subject advocate: a new protector of research participants.

    Science.gov (United States)

    Neill, Kathleen M

    2003-01-01

    In 2001, the National Center for Research Resources (NCRR) directed the 78 General Clinical Research Centers (GCRC) to develop a Research Subject Advocate (RSA) position. The RSA would report directly to the Principal Investigator (PI) of each GCRC and assure compliance of studies conducted on the GCRC with federal regulations and policies. Seven RSAs agreed to be interviewed about their new role. Website documents, electronic correspondence, and presentations at the first annual national meeting of RSAs were scrutinized using discursive analysis to shed light on this new organizational form and its potential for increased protection of human research participants. The RSA role actualizes the ethical principles of respect for persons, justice, and beneficence that are the foundation of the protection of research participants. The results also reveal the regulatory, institutional, collegial, and personal resources and barriers that assist the RSA in the successful implementation of the RSA role. In addition, issues important to the RSAs are described. PMID:14979318

  2. Pere Albert: Barcelona Canon, Royal Advocate, Feudal Theorist

    Directory of Open Access Journals (Sweden)

    Kagay, Donald K.

    2002-06-01

    Full Text Available In this article, the life and career of one of Catalonia's greatest medieval legists is discussed. Using notarial and court documentation, the author explores the work of Pere Albert as judge and advocate. The Customs of Catalonia and other of Pere Albert's treatises form the basis for the review of the legist's career as a theorist in feudal law. The basis for this article is the collection of documents pertaining to Pere Albert, which the author includes in an appendix.

    En este artículo se estudia la vida y la carrera de uno de los jurisconsultos medievales más importantes de Cataluña. Utilizando la documentación notarial y judicial, el autor analiza la labor de Pere Albert como juez y abogado. ElsCostums de Catalunya y otros tratados de Pere Albert constituyen la base para el estudio de la carrera del jurisconsulto, como teórico en ley feudal y real. El artículo se basa en una colección de documentos originales relativos a Pere Albert, que el autor incluye en un apéndice.

  3. Advocate's Viewpoint on Hereditary Breast/Ovarian Cancer

    Directory of Open Access Journals (Sweden)

    Kolling-Dandrieu Francisca

    2004-08-01

    Full Text Available Abstract This paper discusses the presentation I held at the symposium on genetics during the 4th European Breast Cancer Conference held in Hamburg in March 2004. Primarily, the goals and working methods of the advocacy group specialised in Hereditary Breast/Ovarian Cancer of the Dutch Breast Cancer Patient Organisation known as BorstkankerVereniging Nederland (BVN are explained. Furthermore, some specific individual problems that mutation carriers might encounter before and after BRCA1/2 susceptibility testing are discussed. These include: dilemmas in choosing preventive interventions, dealing with the psychological impact of knowing you are a mutation carrier, dealing with the social implications of being genetically at risk, an example of insurance discrimination. In addition, some controversial social and ethical issues that are currently under debate are highlighted, such as the issue of the European patenting of the breast cancer susceptibility genes BRCA1 and BRCA2. Since this topic could also become relevant for other gene-related diseases, society as a whole has to consider the ethical and social implications related to the patenting of human genes in general. Another ethical area of debate is the controversial issue of prenatal BRCA testing and the choice of pregnancy termination. Finally, the Working Party pleads for the international co-operation and exchange of data and experience among professionals as well as patients. It appears that professionals in different European countries tend to advise on different risk management strategies and treatments and as such, the Working Party strongly advocates the international standardisation of risk management and treatment of mutation carriers. In this respect, specific attention should be given to a group that has had a non-informative or negative BRCA test result, because this group is still considered to be at high risk to develop the disease.

  4. "Never Such an Opportunity": Every Teacher Is an Advocate for Music Education

    Science.gov (United States)

    Wagener, Dorothy

    2007-01-01

    Every music educator is an advocate for music education. Members of the The National Association for Music Education (MENC) advocate for the cause of music education. Beginning right in the classroom and moving beyond it to community leaders state decision makers, music teachers have spheres of influence where they can cultivate support for music…

  5. The Perfect Tens: The Top Twenty Books Reviewed in "Voice of Youth Advocates" 2001-2002.

    Science.gov (United States)

    Voice of Youth Advocates, 2003

    2003-01-01

    Explains the review procedures and rating system for teen books in "Voice of Youth Advocates" and provides annotated bibliographies for the twenty best books in 2001-2202, including fiction, nonfiction, and science fiction and fantasy. (LRW)

  6. African American Men and Prostate Cancer: Be Your Own Advocate and Understand Screening

    Science.gov (United States)

    AFRICAN AMERICAN MEN AND PROSTATE CANCER: BE YOUR OWN ADVOCATE AND UNDERSTAND SCREENING By the National Cancer ... American men. For reasons that are still unknown, African American men are more likely to get prostate ...

  7. When would we advocate a total thyroidectomy in cases of hypopharyngeal carcinoma?

    Directory of Open Access Journals (Sweden)

    Zeiad Gad

    2014-06-01

    Conclusion: We would advocate a total thyroidectomy in cases of advanced stages of hypopharyngeal carcinoma, bilateral tumors, postcricoid carcinoma and in all patients with definite radiological evidence of thyroid gland invasion.

  8. A Consensus Definition and Core Competencies for Being an Advocate for Pharmacy

    OpenAIRE

    Bzowyckyj, Andrew S.; Janke, Kristin K.

    2013-01-01

    Objective. To develop a consensus definition for “advocacy for the profession of pharmacy” and core competencies for doctor of pharmacy (PharmD) graduates to be effective advocates for the profession.

  9. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O;

    2011-01-01

    in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for...

  10. The Psychosocial and Independent Living Donor Advocate Evaluation and Post-surgery Care of Living Donors.

    Science.gov (United States)

    Rudow, Dianne LaPointe; Swartz, Kathleen; Phillips, Chelsea; Hollenberger, Jennifer; Smith, Taylor; Steel, Jennifer L

    2015-09-01

    Solid organ transplantation as a treatment for end stage organ failure has been an accepted treatment option for decades. Despite advances in medicine and technology, and increased awareness of organ donation and transplantation, the gap between supply and demand continues to widen. Living donation has been an option that has increased the number of transplants despite the continued shortage of deceased organs. In the early 2000s live donor transplantation reached an all-time high in the United States. As a result, a consensus meeting was convened in 2000 to increase the oversight of living donor transplantation. Both the Centers for Medicare and Medicaid Services and the United Network for Organ Sharing developed regulations that transplant programs performing live donor transplantation. These regulations and guidelines involve the education, evaluation, informed consent process and living donor follow-up care. Two areas in which had significant changes included the psychosocial and the independent living donor advocate (ILDA) evaluation. The purpose of this paper was to outline the current regulations and guidelines associated with the psychosocial and ILDA evaluation as well as provide further recommendations for the administration of a high quality evaluation of living donors. The goals and timing of the evaluation and education of donors; qualifications of the health care providers performing the evaluation; components of the evaluation; education provided to donors; documentation of the evaluation; participation in the selection committee meeting; post-decline and post-donation care of donors is described. Caveats including the paired donor exchange programs and non-directed and directed donation are also considered. PMID:26293351

  11. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; de Fries, Louise Skovlund

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social...

  12. The Advocate.

    Science.gov (United States)

    Schnaiberg, Lynn

    2001-01-01

    Describes the experiences of a teacher who teaches in the Cook County, Illinois, Juvenile Temporary Detention Center, explaining how her many roles include that of teacher, social worker, and surrogate mother to the children. She also frequently deals with issues of race, since 65 percent of the students are African American. (SM)

  13. Social values and solar energy policy: the policy maker and the advocate

    Energy Technology Data Exchange (ETDEWEB)

    Shama, A.; Jacobs, K.

    1980-07-01

    Solar energy policy makers and advocates have significantly different hierarchies (clusters) of values upon which they evaluate the adoption of solar technologies. Content analysis, which examines the frequency with which policy makers identify different types of values, indicates that they hold economic values to be of primary importance. Environmental, social, and national security values are also substantial elements of the policy makers' value clusters associated with solar energy. This finding is confirmed by a qualitative analysis of policy makers' values. Advocates, on the other hand, assign almost equal weights (33%) to economic values and social values, slightly less weight to environmental values, and significant attention to ethical and security values as well. These results of frequency analysis are made somewhat more complicated by a qualitative interpretation of the advocates' positions. As part of their more holistic approach, several of the advocates indicated that all values discussed by them are instrumental toward achieving higher-order, ethical and environmental values. In addition, our preliminary investigation indicates that neither group is entirely homogeneous. Testing this and other propositions, as well as obtaining a similar picture of the values which the public associates with solar energy, are topics of future research.

  14. Narrative in a Nutshell: Sharing Hopes, Fears, and Dreams with Self-Advocates

    Science.gov (United States)

    Roets, Griet; Goodley, Dan; Van Hove, Geert

    2007-01-01

    The grand narrative of modernism is a dominating story with profound sociopolitical implications in the lives of people with the label of intellectual disabilities. In this article, we throw light on the life stories and interpretive theories of self-advocates, which usually remain hidden between the story-lines of life. Professionals in the field…

  15. Using Action Research to Assess and Advocate for Innovative School Library Design

    Science.gov (United States)

    Harper, Meghan; Deskins,Liz

    2015-01-01

    This article describes a collaborative project designed to use action research to assess and advocate for innovative design changes in a school library. The high school library was in its fifth year of service, and yet the layout of the library was not meeting the learning and technological needs of 21st-century high school students. The purpose…

  16. Standardizing the Pre-Licensure Supervision Process: A Commentary on Advocating for Direct Observation of Skills

    Science.gov (United States)

    Gray, Neal D.; Erickson, Paul

    2013-01-01

    The present paper advocates for standardized regulations and laws for supervision of pre-licensed counselors in the United States, particularly for direct observation of clinical skills. A review of regulations by the American Counseling Association (ACA) Office of Professional Affairs (2012) reveals that only two states (Arizona and North…

  17. Women in History--Sarah Winnemucca: Native Educator and Human Rights Advocate

    Science.gov (United States)

    Krumm, Bernita L.

    2006-01-01

    This article profiles Sarah Winnemucca, a Native educator and dedicated human rights advocate who devoted her life to building communication and creating understanding between the Native and white cultures. On March 1, 2005, Congressman Jon Porter of Nevada addressed Congress on a bill to allow for the placement of a statue of Sarah Winnemucca…

  18. The Adjunct Advocate @ FIT: Bringing Part Time Faculty into the Mainstream

    Science.gov (United States)

    Maldonado, Elaine; Riman, Jeffrey

    2009-01-01

    The Adjunct Advocate @ FIT is an online, faculty development program at FIT, part of the State University of New York. This convenient new resource, developed by the Center for Excellence in Teaching, reaches out to adjunct and off-campus faculty with professional development that includes printable materials, video, discussion boards, and…

  19. Women in History--Leta Stetter Hollingworth: Educator and Advocate for Gifted Children

    Science.gov (United States)

    Deeds, Jan

    2008-01-01

    This article profiles Leta Steller Hollingworth, who gave what she had to human beings through her life as a poet, a scholar, a researcher, a feminist, an educational psychologist, and a powerful advocate for gifted children. Hollingworth's research during her graduate studies focused on the psychology of women. At a time when women's professional…

  20. Sexual Assault Nurse Examiners' Perceptions of Their Relationship with Doctors, Rape Victim Advocates, Police, and Prosecutors

    Science.gov (United States)

    Maier, Shana L.

    2012-01-01

    In response to the negative and inefficient treatment of rape victims by emergency room personnel, the first Sexual Assault Nurse Examiner (SANE) programs began in the late 1970s. While SANEs, doctors, rape victim advocates, police officers and prosecutors work together to ensure the most comprehensive and sensitive care of rape victims, they all…

  1. Advocating the Implementation of Mastery Learning in Higher Education to Increase Student Learning and Retention

    Science.gov (United States)

    Klecker, Beverly M.; Chapman, Ann

    2008-01-01

    The purpose of this paper was three-fold: (1) to review mastery learning and criterion-based assessment; (2) to advocate extending these concepts to higher education; and (3) to invite MSERA members to join in research projects examining mastery learning in higher education. The authors used Guskey's (2001) definition of mastery learning from his…

  2. Advocating Student-within-Environment: A Humanistic Theory for School Counseling

    Science.gov (United States)

    Lemberger, Matthew E.

    2010-01-01

    The author introduces a humanistic theory for school counseling called Advocating Student-within-Environment (ASE). According to this theory, the student is an adaptive agent who operates within ever-evolving environments. With ASE, a school counselor can use the capacities of the student, the school environment, and their shared agency to promote…

  3. Title XX: Social Services in Your State. A Child Advocate's Handbook for Action.

    Science.gov (United States)

    Children's Defense Fund, Washington, DC.

    This booklet is a guide for those wishing to route Title XX money into the community programs for children. Part I discusses ways for child advocates to participate in four key stages of the Title XX planning process in their state: planning proposals, raising the 25% non-federal share of the funds required by Title XX, and publishing proposed and…

  4. Perspectives of Social Justice Activists: Advocating against Native-Themed Mascots, Nicknames, and Logos

    Science.gov (United States)

    Steinfeldt, Jesse A.; Foltz, Brad D.; LaFollette, Julie R.; White, Mattie R.; Wong, Y. Joel; Steinfeldt, Matthew Clint

    2012-01-01

    This study investigated perspectives of social justice activists who directly advocate for eliminating Native-themed mascots, nicknames, and logos. Using consensual qualitative research methodology, the research team analyzed transcripts of interviews conducted with 11 social justice activists to generate themes, categories, and domains within the…

  5. Peer Assessment and Compliance Review (PACR) Innovative Strategies Report. California Court Appointed Special Advocates (CASA) Programs

    Science.gov (United States)

    Macro, Bronwen; Huang, Lee Ann

    2005-01-01

    This report focuses on the innovative strategies study component of the Peer Assessment and Compliance Review (PACR) project. California (Court Appointed Special Advocates) CASA programs have developed many innovative strategies to serve children in their communities. At each of the programs visited during the PACR project, the team identified at…

  6. Publishers' PR Tactic Angers University Presses and Open-Access Advocates

    Science.gov (United States)

    Howard, Jennifer

    2007-01-01

    This article reports on reactions to the Association of American Publishers' new public-relations campaign, which has upset many university presses and research librarians, as well as open-access advocates. The effort, known as the "Partnership for Research Integrity in Science & Medicine," or Prism, is the latest tactic in a continuing…

  7. Be Your Own Best Advocate. PACER Center ACTion Information Sheets. PHP-c116

    Science.gov (United States)

    PACER Center, 2006

    2006-01-01

    Being a self-advocate means asking for what one needs while respecting the needs of others. Self-advocacy is asking for what is needed in a direct, respectful manner. It is an important skill to acquire because self-advocacy helps: (1) Obtain what is needed; (2) People make personal choices; (3) Learn to say no without feeling guilty; and (4)…

  8. Pitfalls Advocates Should Avoid in Arbitration of Educational Negotiated Grievances Procedures.

    Science.gov (United States)

    Roumell, George T., Jr.

    1980-01-01

    Advocates at grievance arbitrations should know the requirements for challenging arbitrator jurisdiction, especially timeliness; should know the procedural safeguards in the contract that must be followed in order to sustain discipline; should know the theory of the case; and should realize that techniques of presentation may be important.…

  9. Content-Specific Strategies to Advocate for Lesbian, Gay, Bisexual, and Transgender Youth: An Exploratory Study

    Science.gov (United States)

    Graybill, Emily C.; Varjas, Kris; Meyers, Joel; Watson, Laurel B.

    2009-01-01

    Researchers suggest that supportive school personnel may decrease some of the challenges encountered by lesbian, gay, bisexual, and transgender (LGBT) youth in schools (Russell, Seif, & Truong, 2001); however, little is known about the approaches used by school-based advocates for LGBT youth. This exploratory study investigated the strategies used…

  10. Gay-Straight Alliance Advisors: Negotiating Multiple Ecological Systems when Advocating for LGBTQ Youth

    Science.gov (United States)

    Watson, Laurel B.; Varjas, Kris; Meyers, Joel; Graybill, Emily C.

    2010-01-01

    This qualitative study investigated the barriers and facilitators that advisors of gay-straight alliances encounter when advocating for LGBTQ (lesbian, gay, bisexual, transgender, and queer) youth within schools. Twenty-two advisors were interviewed, and data revealed that multiple ecological systems (e.g., sociocultural, school, and individual…

  11. Reconstructing Parents’ Meetings in Primary Schools: The Teacher as Expert, the Parent as Advocate and the Pupil as Self-Advocate

    Directory of Open Access Journals (Sweden)

    Gillian Inglis

    2012-01-01

    Full Text Available The efficacy of parents’ meetings in primary schools in the UK is anarea in need of research. This article uses an approach informed by grounded theory to explore the experiences and satisfaction of parents, teachers and pupils regarding bi-annual meetings to discuss pupil progress. A two-phase approach was utilised, with diary-interviews with parents and teachers and group pupil interviews in Phase 1, followed by a parents’ questionnaire in Phase 2 derived from Phase 1 data. The findings from a doctoral study provide an overall more positive depiction of these meetings compared to existing research in the secondary sector. A model of the teacher as the expert and information-giver persists, but a consumerist ideology appears evident as parents seek to participate and advocate on behalf of their child. As parents become more proactive and teachers act to retain their professional authority, the interaction of the professional and advocate has excluded the perspective of the child. This leaves pupils in search of self-advocacy at meetings in which they are the object of discussion, but cannot be present. While pupils generally favour involvement, adults express a protectionist perspective on pupil exclusion with exceptional factors indicated as being the age of the child and the content of the meeting.

  12. Professional development through policy advocacy: communicating and advocating for health and health equity.

    Science.gov (United States)

    Garcia, Lydia Berenice; Hernandez, Kristen Eileen; Mata, Holly

    2015-03-01

    Communicating and advocating for evidence-based public health policy is a key component of health promotion practice, but public health professionals often lack experience in policy advocacy. This article provides perspectives from public health professionals who participated in successful public health policy advocacy efforts in their community. Their experiences using evidence-based research to advocate for policies that promote health equity contributed significantly to their career development, and also contributed to community capacity to reduce tobacco-related disparities. This article builds on previous work emphasizing the value of career development opportunities that enhance and diversify the public health workforce, and provides practical tips and "lessons learned" that are relevant to a wide range of public health professionals. PMID:25416310

  13. Erasmus of Rotterdam (1466-1536): renaissance advocate of the public role of medicine.

    Science.gov (United States)

    Albury, W R; Weisz, G M

    2003-08-01

    The great Renaissance scholar Erasmus of Rotterdam was a pioneering advocate of the importance of medicine for social as well as individual welfare. Erasmus' "Oration in praise of the art of medicine" (1518) illustrates his literary approach to this topic. Although the original version of his text did not address the state's role in promoting the health of the populace, Erasmus inserted new material on this topic into the "Oration" for a 1529 edition. This new material and references in some of his other writings from the same period indicate that it was in the 1520s that Erasmus first became a strong advocate of government intervention in public health matters. It is suggested that medical events in Erasmus' own life-his experiences both as a patient and as an observer of diseases-may explain why his interest in public health legislation increased significantly around this time. PMID:12870034

  14. An unlikely advocate: the role of the school nurse with children who have dyslexia.

    Science.gov (United States)

    DeBrew, Jacqueline Kayler

    2014-03-01

    School nurses are often the first line of advocacy for children when problems arise. One common learning disability, dyslexia, requires advocacy from the school nurse. However, due to lack of knowledge, misunderstandings, and misconceptions about the disorder, the school nurse may feel inadequate in an advocacy role. This article describes dyslexia, including warning signs, so that school nurses can be better prepared to assess for signs, provide intervention, and advocate for struggling children and families. PMID:24707652

  15. Tobacco control advocates must demand high-quality media campaigns: the California experience

    OpenAIRE

    Balbach, E; GLANTZ, S.

    1998-01-01

    OBJECTIVE—To document efforts on the part of public officials in California to soften the media campaign's attack on the tobacco industry and to analyse strategies to counter those efforts on the part of tobacco control advocates.
METHODS—Data were gathered from interviews with programme participants, direct observation, written materials, and media stories. In addition, internal documents were released by the state's Department of Health Services in response to requests made under the Califo...

  16. Chapter Oral Health Advocates: A Nationwide Model for Pediatrician Peer Education and Advocacy about Oral Health

    OpenAIRE

    Lewis, Charlotte W.; Lauren Barone; Rocio B. Quinonez; Suzanne Boulter; Mouradian, Wendy E.

    2013-01-01

    Objective. (1) To describe an innovative program training US pediatricians to be Chapter Oral Health Advocates (COHAs). (2) To provide insight into COHAs’ experiences disseminating oral health knowledge to fellow pediatricians. Patients and Methods. Interviews with 40 COHAs who responded to an email request, from a total of 64 (62% response). Transcripts were analyzed for common themes about COHA activities, facilitators, and barriers. Results. COHAs reported positive experiences at the AAP ...

  17. Enhancing Police Responses to Domestic Violence Incidents: Reports From Client Advocates in New South Wales.

    Science.gov (United States)

    Goodman-Delahunty, Jane; Crehan, Anna Corbo

    2016-07-01

    In an online survey about experiences with the police complaint system, 239 client advocates described a recent incident in which a client with grounds to lodge a complaint declined to do so. Almost one third of those incidents involved domestic violence. Thematic analysis of case descriptions revealed that many police did not take domestic violence reports seriously. A typology of problematic police conduct was developed. Many officers failed to observe current procedures and appeared to lack knowledge of relevant laws. Citizens feared retaliatory victimization by police and/or perceived that complaining was futile. Implications of these findings are reviewed in light of procedural justice theory. PMID:26567295

  18. Advocating for environmental changes to increase access to parks: engaging promotoras and youth leaders.

    Science.gov (United States)

    Arredondo, Elva; Mueller, Kristin; Mejia, Elizabeth; Rovira-Oswalder, Tanya; Richardson, Dana; Hoos, Tracy

    2013-09-01

    Access to physical activity opportunities are limited in underserved communities. Community-based programs can increase promotoras and youth leaders' capacity to advocate for built environmental changes. Promotoras and youth leaders were trained on walkability assessment, park audits, and advocacy. The youth and promotoras from one church located adjacent to a park implemented a community survey, conducted walk audits, and engaged in consciousness-raising activities about environmental factors that affect communities. They also mobilized community members to advocate for a nearby park. Advocacy tactics included attending and making presentations at the City Council, planning meetings, organizing health fairs, and speaking to community members. The following changes were made at the park: removed overgrown plants, relocated storage container, increased park security (i.e., lighting, fencing), improved safety (i.e., covered sewer drain, sand lot removed), enhanced amenities (i.e., drinking fountain, bathroom, benches, tables), improved pedestrian safety in park (i.e., leveled the old and added new walking paths), and improved children's play area (i.e., new play equipment, fencing). The current program highlights factors that contributed to park changes and challenges in increasing access to parks. Furthermore, the current study notes steps that other programs can take to make environmental changes. PMID:23362333

  19. Community Health Advocate-Identified Enablers of HIV Testing for Latina Immigrant Women.

    Science.gov (United States)

    Massengale, Kelley E; Morrison, Sharon D; Sudha, S

    2016-08-01

    This study aims to identify enablers or facilitators of HIV testing among Latina immigrant women through qualitative interviews with five community health advocates (CHAs). CHAs act as cultural bridges between Latinos and service providers. We employed a single case-study design using the PEN-3 model as a conceptual framework for situating HIV testing behaviors within cultural and structural contexts of Latina immigrant women's lives. A cross-case analysis of themes revealed that intrinsic enablers of HIV testing included individual trust, confidentiality, intergenerational family participation, and peers. The extrinsic enablers were local community outreach, bicultural/bilingual testing staff, service location and mass media outlets. These results have implications for the cultural competency of health and social service providers, instituting and revising HIV testing outreach interventions, and the earlier identification of women who may have been infected. They offer important insights for promoting other health behaviors among the Latino communities. PMID:27427927

  20. Biological processes for advancing lignocellulosic waste biorefinery by advocating circular economy.

    Science.gov (United States)

    Liguori, Rossana; Faraco, Vincenza

    2016-09-01

    The actualization of a circular economy through the use of lignocellulosic wastes as renewable resources can lead to reduce the dependence from fossil-based resources and contribute to a sustainable waste management. The integrated biorefineries, exploiting the overall lignocellulosic waste components to generate fuels, chemicals and energy, are the pillar of the circular economy. The biological treatment is receiving great attention for the biorefinery development since it is considered an eco-friendly alternative to the physico-chemical strategies to increase the biobased product recovery from wastes and improve saccharification and fermentation yields. This paper reviews the last advances in the biological treatments aimed at upgrading lignocellulosic wastes, implementing the biorefinery concept and advocating circular economy. PMID:27131870

  1. International-Local Visionary, Policy Advocate and Formidable Networker: The Life, Times and Work of Jarl Bengtsson

    Science.gov (United States)

    Schuetze, Hans G.; Duke, Chris

    2014-01-01

    The authors show ways in which Jarl Bengtsson, a Swedish social scientist and policy analyst, has influenced international policy making. As a member and later director of the OECD's Centre for Educational Research and Innovation from the beginning of the 1970s to the end of the twentieth century, he has contributed to the international discussion…

  2. The big picture of lives saved by abortion on demand: User pays applied to pro-life advocates

    OpenAIRE

    Pope, Robin

    2009-01-01

    Pro-life advocates focus on a single entity, the foetus. Pro-choice advocates focus on another single entity, the pregnant mother. There should also be a third focus, on all people already born – on how a new entrant on average damages (or enhances) the whole community. Communal accounts are needed on births, not only on wars. This third big picture communal focus reveals two things. First, abortion on demand actually was the biggest factor in reducing crimes and associated deaths in the US i...

  3. Dynamic Network Delay Cartography

    CERN Document Server

    Rajawat, Ketan; Giannakis, Georgios B

    2012-01-01

    Path delays in IP networks are important metrics, required by network operators for assessment, planning, and fault diagnosis. Monitoring delays of all source-destination pairs in a large network is however challenging and wasteful of resources. The present paper advocates a spatio-temporal Kalman filtering approach to construct network-wide delay maps using measurements on only a few paths. The proposed network cartography framework allows efficient tracking and prediction of delays by relying on both topological as well as historical data. Optimal paths for delay measurement are selected in an online fashion by leveraging the notion of submodularity. The resulting predictor is optimal in the class of linear predictors, and outperforms competing alternatives on real-world datasets.

  4. Chapter Oral Health Advocates: A Nationwide Model for Pediatrician Peer Education and Advocacy about Oral Health.

    Science.gov (United States)

    Lewis, Charlotte W; Barone, Lauren; Quinonez, Rocio B; Boulter, Suzanne; Mouradian, Wendy E

    2013-01-01

    Objective. (1) To describe an innovative program training US pediatricians to be Chapter Oral Health Advocates (COHAs). (2) To provide insight into COHAs' experiences disseminating oral health knowledge to fellow pediatricians. Patients and Methods. Interviews with 40 COHAs who responded to an email request, from a total of 64 (62% response). Transcripts were analyzed for common themes about COHA activities, facilitators, and barriers. Results. COHAs reported positive experiences at the AAP oral health training program. A subset of academic COHAs focused on legislative activity and another on resident education about oral health. Residents had an easier time adopting oral health activities while practicing pediatricians cited time constraints. COHAs provided insights into policy, barriers, and facilitators for incorporating oral health into practice. Conclusions. This report identifies factors influencing pediatricians' adoption of oral health care into practice. COHAs reported successes in training peers on integrating oral health into pediatric practice, identified opportunities and challenges to oral health implementation in primary care, and reported issues about the state of children's oral health in their communities. With ongoing support, the COHA program has a potential to improve access to preventive oral health services in the Medical Home and to increase referrals to a Dental Home. PMID:24228032

  5. Consumer Participation in Regulation: stipulated settlements, the consumer advocate and utility regulation in Florida

    International Nuclear Information System (INIS)

    Stipulations signed between OPC and the utilities have been significant in Florida. They account for 77% of FPSC earnings review rate reductions since 1976. OPC has provided testimony on rate increases but there have been very few stipulations there. The evidence suggests that OPC secured greater and earlier rate reductions than would otherwise have been achieved. This was especially true for industrial electricity customers but residential customers benefited significantly too. OPC and ultimately the Commission accepted several changes in policy in order to get these rate reductions. The main examples include more flexibility on depreciation than the staff and Commission would otherwise have allowed, and more innovative forms of incentive regulation, notably revenue-sharing rather than earnings sharing. Whether this experience is matched by Consumer Advocates in other states or whether Florida's experience is unique is a topic for further research. In either case, the implications for regulation deserve further consideration. Is it helpful to split the regulatory body into two separate parts: essentially a judge and a prosecutor? In the case of Florida this seems to have been advantageous to customers, and presumably to utilities too since they have voluntarily agreed to these stipulated settlements.

  6. Violence prevention in schools and other community settings: the pediatrician as initiator, educator, collaborator, and advocate.

    Science.gov (United States)

    Wilson-Brewer, R; Spivak, H

    1994-10-01

    Attention to the problem of youth violence has resulted in a proliferation of violence prevention and intervention strategies. Examined in this paper are those strategies that can be categorized as educational, environmental/technological, and recreational. In the educational category are conflict resolution and mediation, crime prevention and law-related education, handgun violence education, life skills training, self-esteem development, public education, and media education. The environmental/technological category covers a range of strategies: metal detectors, school police, concrete barriers, dress codes, and safe corridor programs, among others. The rather broad recreational category is based upon the importance of physical activity as an outlet for stress and anger and as a component of a multicomponent program. Multi-intervention programs are described as well as some of the major gaps in current violence prevention programming. The suggested role of the pediatrician in violence prevention efforts is described as both initiator and collaborator, as counselor, and as advocate. Because of their great credibility with respect to issues related to children and youth, pediatricians can influence not only parents in their contacts with them in the health care setting, but also school administrators and community leaders. Pediatricians have access to the media, and they can speak to the issue in public forums as well. Furthermore, pediatricians can join existing community efforts to determine ways in which violence prevention and intervention strategies can be incorporated into agency activities. PMID:7936888

  7. Chapter Oral Health Advocates: A Nationwide Model for Pediatrician Peer Education and Advocacy about Oral Health

    Directory of Open Access Journals (Sweden)

    Charlotte W. Lewis

    2013-01-01

    Full Text Available Objective. (1 To describe an innovative program training US pediatricians to be Chapter Oral Health Advocates (COHAs. (2 To provide insight into COHAs’ experiences disseminating oral health knowledge to fellow pediatricians. Patients and Methods. Interviews with 40 COHAs who responded to an email request, from a total of 64 (62% response. Transcripts were analyzed for common themes about COHA activities, facilitators, and barriers. Results. COHAs reported positive experiences at the AAP oral health training program. A subset of academic COHAs focused on legislative activity and another on resident education about oral health. Residents had an easier time adopting oral health activities while practicing pediatricians cited time constraints. COHAs provided insights into policy, barriers, and facilitators for incorporating oral health into practice. Conclusions. This report identifies factors influencing pediatricians’ adoption of oral health care into practice. COHAs reported successes in training peers on integrating oral health into pediatric practice, identified opportunities and challenges to oral health implementation in primary care, and reported issues about the state of children’s oral health in their communities. With ongoing support, the COHA program has a potential to improve access to preventive oral health services in the Medical Home and to increase referrals to a Dental Home.

  8. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  9. Network Topology Identification from Spectral Templates

    OpenAIRE

    Segarra, Santiago; Marques, Antonio G.; Mateos, Gonzalo; Ribeiro, Alejandro

    2016-01-01

    Network topology inference is a cornerstone problem in statistical analyses of complex systems. In this context, the fresh look advocated here permeates benefits from convex optimization and graph signal processing, to identify the so-termed graph shift operator (encoding the network topology) given only the eigenvectors of the shift. These spectral templates can be obtained, for example, from principal component analysis of a set of graph signals defined on the particular network. The novel ...

  10. How You Can Help Your Child Learn to Be a Good Self Advocate. PHP-c95

    Science.gov (United States)

    PACER Center, 2004

    2004-01-01

    It is never too early for parents to start teaching children how they can advocate for themselves. Like many other important life skills, self-advocacy is a critical tool children need in order to achieve goals, increase self-sufficiency, and become successful young adults. It is a life long process that begins with children learning by watching…

  11. Family Advocates' Perspectives on the Early Academic Success of Children Born to Low-Income Adolescent Mothers

    Science.gov (United States)

    Luster, Tom; Bates, Laura; Vandenbelt, Marcia; Nievar, M. Angela

    2004-01-01

    Qualitative analyses were conducted to examine family factors related to individual differences in the early school success of children born to low-income adolescent mothers from the perspective of paraprofessional family advocates. These families were participants in a 5-year family support program. Achievement test scores and teacher ratings…

  12. Awareness and predictors of female genital mutilation/cutting among young health advocates

    Directory of Open Access Journals (Sweden)

    Abolfotouh SM

    2015-02-01

    Full Text Available Sherif M Abolfotouh,1,2 Ahmed Z Ebrahim,1,3 Mostafa A Abolfotouh4 On Behalf of IFMSA-Egypt 1IFMSA-Egypt, Alexandria, Egypt; 2Oulu University Hospital, Oulu, Finland; 3Alexandria Faculty of Medicine, Alexandria, Egypt; 4King Abdullah International Medical Research Center (KAIMRC, King Saud bin-Abdulaziz University for Health Sciences, Riyadh, Saudi Arabia Abstract: The act of female genital mutilation/cutting (FGM/C is considered internationally as a violent act against girls and women and a violation of their human rights. This study sought to assess the awareness and predictors of FGM/C in young Egyptian health advocates. A cross-sectional study of 600 medical students from a total of 2,500 members of the International Federation of Medical Students’ Associations (IFMSA-Egypt, across all Egyptian medical schools, was conducted using a previously validated online Google survey. The overall prevalence of circumcision was 14.7/100 female students, with a significantly higher prevalence in students from rural areas (25% than in non-rural areas (10.8%, P=0.001, and in those residing in Upper (southern Egypt (20.6% than in Lower (northern Egypt (8.7%, P=0.003. The students’ mean percentage score for knowledge about the negative health consequences of FGM/C was 53.50±29.07, reflecting a modest level of knowledge; only 30.5% had a good level of knowledge. The mean percentage score for the overall attitude toward discontinuation of the practice of FGM/C was 76.29±17.93, reflecting a neutral attitude; 58.7% had a favorable attitude/norms toward discontinuation of the practice. Of circumcised students, approximately one-half (46.8% were unwilling to have their daughters circumcised, and 60% reported no harm from being circumcised. After controlling for confounders, a negative attitude toward FGM/C was significantly (P<0.001 in all cases associated with male sex, residency in Upper Egypt, rural origin, previous circumcision, and the preclinical

  13. Awareness and predictors of female genital mutilation/cutting among young health advocates.

    Science.gov (United States)

    Abolfotouh, Sherif M; Ebrahim, Ahmed Z; Abolfotouh, Mostafa A

    2015-01-01

    The act of female genital mutilation/cutting (FGM/C) is considered internationally as a violent act against girls and women and a violation of their human rights. This study sought to assess the awareness and predictors of FGM/C in young Egyptian health advocates. A cross-sectional study of 600 medical students from a total of 2,500 members of the International Federation of Medical Students' Associations (IFMSA)-Egypt, across all Egyptian medical schools, was conducted using a previously validated online Google survey. The overall prevalence of circumcision was 14.7/100 female students, with a significantly higher prevalence in students from rural areas (25%) than in non-rural areas (10.8%, P=0.001), and in those residing in Upper (southern) Egypt (20.6%) than in Lower (northern) Egypt (8.7%, P=0.003). The students' mean percentage score for knowledge about the negative health consequences of FGM/C was 53.50±29.07, reflecting a modest level of knowledge; only 30.5% had a good level of knowledge. The mean percentage score for the overall attitude toward discontinuation of the practice of FGM/C was 76.29±17.93, reflecting a neutral attitude; 58.7% had a favorable attitude/norms toward discontinuation of the practice. Of circumcised students, approximately one-half (46.8%) were unwilling to have their daughters circumcised, and 60% reported no harm from being circumcised. After controlling for confounders, a negative attitude toward FGM/C was significantly (P<0.001 in all cases) associated with male sex, residency in Upper Egypt, rural origin, previous circumcision, and the preclinical medical phase of education. The low level of knowledge among even future health professions in our study suggests that communication, rather than passive learning, is needed to convey the potentially negative consequences of FGM/C and to drive a change in attitude toward discontinuation of this harmful practice. PMID:25759602

  14. Advocates, interest groups and Australian news coverage of alcohol advertising restrictions: content and framing analysis

    Directory of Open Access Journals (Sweden)

    Fogarty Andrea S

    2012-08-01

    Full Text Available Abstract Background Legislating restrictions on alcohol advertising is a cost-effective measure to reduce consumption of alcohol. Yet Australia relies upon industry self-regulation through voluntary codes of practice regarding the content, timing and placement of alcohol advertising. Ending industry self-regulation was recommended by the National Preventative Health Taskforce; a suggestion contested by the drinks industry. Debates about emerging alcohol-control policies regularly play out in the news media, with various groups seeking to influence the discussion. This paper examines news coverage of recommendations to restrict alcohol advertising to see how supporters and opponents frame the debate, with a view to providing some suggestions for policy advocates to advance the discussion. Methods We used content and framing analyses to examine 329 Australian newspaper items mentioning alcohol advertising restrictions over 24 months. All items were coded for mentions of specific types of advertising and types of advertising restrictions, the presence of news frames that opposed or endorsed advertising restrictions, statements made within each frame and the news-actors who appeared. Results Restrictions were the main focus in only 36% of 329 items. Alcohol advertising was conceived of as television (47% and sport-related (56%. Restrictions were mentioned in non-specific terms (45%, or specified as restrictions on timing and placement (49%, or content (22%. Public health professionals (47% appeared more frequently than drinks industry representatives (18%. Five supportive news frames suggested the policy is a sensible public health response, essential to protect children, needed to combat the drinks industry, required to stop pervasive branding, or as only an issue in sport. Four unsupportive frames positioned restrictions as unnecessary for a responsible industry, an attack on legitimate commercial activities, ineffective and ‘nannyist’, or

  15. Conceptions of Speech Acts in the Theory and Practice of Argumentation: A Case Study of a Debate About Advocating

    OpenAIRE

    Goodwin Jean

    2014-01-01

    Far from being of interest only to argumentation theorists, conceptions of speech acts play an important role in practitioners’ self-reflection on their own activities. After a brief review of work by Houtlosser, Jackson and Kauffeld on the ways that speech acts provide normative frameworks for argumentative interactions, this essay examines an ongoing debate among scientists in natural resource fields as to the appropriateness of the speech act of advocating in policy settings. Scientists’ r...

  16. 75 FR 55392 - Employment Network Report Card

    Science.gov (United States)

    2010-09-10

    ...We are soliciting the views of the public, beneficiaries, advocates, Employment Networks (EN), and other professionals on a key part of our quality assurance and performance measurement system for the Ticket to Work (TTW) program. An EN is a private or public entity that provides employment support and/or vocational rehabilitation services to Social Security Disability Insurance (SSDI) and......

  17. Bond percolation on multiplex networks

    CERN Document Server

    Hackett, A; Gómez, S; Arenas, A; Gleeson, J P

    2015-01-01

    We present an analytical approach for bond percolation on multiplex networks and use it to determine the expected size of the giant connected component and the value of the critical bond occupation probability in these networks. We advocate the relevance of these tools to the modeling of multilayer robustness and contribute to the debate on whether any benefit is to be yielded from studying a full multiplex structure as opposed to its monoplex projection, especially in the seemingly irrelevant case of a bond occupation probability that does not depend on the layer. Although we find that in many cases the predictions of our theory for multiplex networks coincide with previously derived results for monoplex networks, we also uncover the remarkable result that for a certain class of multiplex networks, well described by our theory, new critical phenomena occur as multiple percolation phase transitions are present. We provide an instance of this phenomenon in a multipex network constructed from London rail and Eu...

  18. Networking activism: implications for Greece

    OpenAIRE

    Pantelis Vatikiotis

    2011-01-01

    The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-glob...

  19. Interconnection and incentive regulation in network industries

    OpenAIRE

    Iván Major; Károly M. Kiss

    2013-01-01

    The price regulation of network industries has changed tremendously all over the world recently. Theoretical contributions specifically advocate and telecommunications, energy and other market regulators in various parts of the world practice cost-based pricing for inter-firm network access services. Cost-based pricing is performed under the assumption that the regulator has perfect information regarding the costs of producing the services. We show that — under fairly general conditions — cos...

  20. Bringing a Network-Oriented Approach to Domestic Violence Services: A Focus Group Exploration of Promising Practices.

    Science.gov (United States)

    Goodman, Lisa A; Banyard, Victoria; Woulfe, Julie; Ash, Sarah; Mattern, Grace

    2016-01-01

    Despite powerful evidence that informal social support contributes to survivors' safety and well-being, mainstream domestic violence (DV) programs have not developed comprehensive models for helping isolated survivors re-engage with these networks. Although many advocates use network-oriented strategies informally, they often do so without resources, funding, or training. This qualitative focus group study explored advocates' use and perceptions of network-oriented strategies. Advocates working in a range of DV programs across one state described the importance of network-oriented work and articulated its five dimensions, including helping survivors build their capacity to form healthy relationships, identify helpful and harmful network members, re-engage with existing networks, develop new relationships, and respond more effectively to network members. PMID:26270387

  1. Conceptions of Speech Acts in the Theory and Practice of Argumentation: A Case Study of a Debate About Advocating

    Directory of Open Access Journals (Sweden)

    Goodwin Jean

    2014-03-01

    Full Text Available Far from being of interest only to argumentation theorists, conceptions of speech acts play an important role in practitioners’ self-reflection on their own activities. After a brief review of work by Houtlosser, Jackson and Kauffeld on the ways that speech acts provide normative frameworks for argumentative interactions, this essay examines an ongoing debate among scientists in natural resource fields as to the appropriateness of the speech act of advocating in policy settings. Scientists’ reflections on advocacy align well with current scholarship, and the scholarship in turn can provide a deeper understanding of how to manage the communication challenges scientists face.

  2. Simplified models of biological networks.

    Science.gov (United States)

    Sneppen, Kim; Krishna, Sandeep; Semsey, Szabolcs

    2010-01-01

    The function of living cells is controlled by complex regulatory networks that are built of a wide diversity of interacting molecular components. The sheer size and intricacy of molecular networks of even the simplest organisms are obstacles toward understanding network functionality. This review discusses the achievements and promise of a bottom-up approach that uses well-characterized subnetworks as model systems for understanding larger networks. It highlights the interplay between the structure, logic, and function of various types of small regulatory circuits. The bottom-up approach advocates understanding regulatory networks as a collection of entangled motifs. We therefore emphasize the potential of negative and positive feedback, as well as their combinations, to generate robust homeostasis, epigenetics, and oscillations. PMID:20192769

  3. Networking activism: implications for Greece

    Directory of Open Access Journals (Sweden)

    Pantelis Vatikiotis

    2011-12-01

    Full Text Available The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-global interplay in protest culture along new mediating practices (beyond the creation of transnational publics, that of the implications of transnational networking for local social activism and identification, addressing relevant questions in the Greek context.

  4. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O;

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  5. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  6. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  7. The Use of Elgg Social Networking Tool for Students' Project Peer-Review Activity

    Science.gov (United States)

    Samardzija, Ana Coric; Bubas, Goran

    2014-01-01

    Numerous e-learning 2.0 studies have advocated the use of social networking sites for educational purposes, but only a few of them have observed social networking sites as an instrument for specific learner skill development. This paper discusses a study which addresses the motivation and challenges associated with the introduction of the social…

  8. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  9. "Kracking" the Missing Data Problem: Applying Krackhardt's Cognitive Social Structures to School-Based Social Networks

    Science.gov (United States)

    Neal, Jennifer Watling

    2008-01-01

    Social network analysis can enrich school-based research on children's peer relationships. Unfortunately, accurate network analysis requires near-complete data on all students and is underutilized in school-based research because of low rates of parental consent. This article advocates Krackhardt's cognitive social structures (CSS) as a solution…

  10. Artificial Neural Networks in Policy Research: A Current Assessment.

    Science.gov (United States)

    Woelfel, Joseph

    1993-01-01

    Suggests that artificial neural networks (ANNs) exhibit properties that promise usefulness for policy researchers. Notes that ANNs have found extensive use in areas once reserved for multivariate statistical programs such as regression and multiple classification analysis and are developing an extensive community of advocates for processing text…

  11. Artificial Neural Networks for Modeling Knowing and Learning in Science.

    Science.gov (United States)

    Roth, Wolff-Michael

    2000-01-01

    Advocates artificial neural networks as models for cognition and development. Provides an example of how such models work in the context of a well-known Piagetian developmental task and school science activity: balance beam problems. (Contains 59 references.) (Author/WRM)

  12. 76 FR 76475 - Employment Network (EN) Report Card

    Science.gov (United States)

    2011-12-07

    ...We are soliciting the input of beneficiaries, recipients, advocates, employment networks (ENs), other professionals, and the general public on the draft revised EN Report Card. An EN is a private or public entity that participates in the Ticket to Work (TTW) program and provides employment services, vocational rehabilitation services, or other support services to Social Security Disability......

  13. A Practical View on Tunable Sparse Network Coding

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Shahbaz Badr, Arash; Guerrero, Juan;

    2015-01-01

    Tunable sparse network coding (TSNC) constitutes a promising concept for trading off computational complexity and delay performance. This paper advocates for the use of judicious feedback as a key not only to make TSNC practical, but also to deliver a highly consistent and controlled delay......) can result in a radical improvement of the complexity-delay trade-off....

  14. Learning Networks, Networked Learning

    OpenAIRE

    Sloep, Peter; Berlanga, Adriana

    2011-01-01

    Learning Networks are on-line social networks through which users share knowledge with each other and jointly develop new knowledge. This way, Learning Networks may enrich the experience of formal, school-based learning and form a viable setting for professional development. Although networked learning enjoys an increasing interest, many questions remain on how exactly learning in such networked contexts can contribute to successful education and training. Put differently, how should networke...

  15. Revealing Hidden Connections in Recommendation Networks

    CERN Document Server

    Minhano, Rogerio; Kamienski, Carlos

    2016-01-01

    Companies have been increasingly seeking new mechanisms for making their electronic marketing campaigns to become viral, thus obtaining a cascading recommendation effect similar to word-of-mouth. We analysed a dataset of a magazine publisher that uses email as the main marketing strategy and found out that networks emerging from those campaigns form a very sparse graph. We show that online social networks can be effectively used as a means to expand recommendation networks. Starting from a set of users, called seeders, we crawled Google's Orkut and collected about 20 million users and 80 million relationships. Next, we extended the original recommendation network by adding new edges using Orkut relationships that built a much denser network. Therefore, we advocate that online social networks are much more effective than email-based marketing campaigns

  16. Patient Advocate Foundation

    Science.gov (United States)

    ... Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma ... Employment Resources Disease Specific Resources Prevention Cancer Prevention Diabetes Prevention Cardiovascular/Heart Disease Prevention Healthcare Reform Additional ...

  17. Advocating beyond the academy

    DEFF Research Database (Denmark)

    Mackenzie, Catrina; Christensen, Julia; Turner, Sarah

    2015-01-01

    Drawing from experiences in Northern Indigenous Canada, Uganda, and Vietnam, we discuss the challenges encountered while trying to communicate relevant results to local communities with whom we work. Wavering between participatory and advocacy research, we explore how we grapple with finding the...... right audience with whom to share results, our attempts to craft communication to be relevant within specific contexts, and dilemmas over self-censorship. We also document our struggles to manage our own expectations and those of the communities with whom we work regarding the ability of our research to...... broker change. This article emerged from our frustration at wanting to be accountable to our interviewee communities, but finding few academic articles that go beyond ideals to examine how researchers often struggle to meet these expectations. While participatory approaches are increasingly mainstreamed...

  18. Characterizing Interest Aggregation in Content-Centric Networks

    OpenAIRE

    Dabirmoghaddam, Ali; Dehghan, Mostafa; Garcia-Luna-Aceves, J. J.

    2016-01-01

    The Named Data Networking (NDN) and Content-Centric Networking (CCN) architectures advocate Interest aggregation as a means to reduce end-to-end latency and bandwidth consumption. To enable these benefits, Interest aggregation must be realized through Pending Interest Tables (PIT) that grow in size at the rate of incoming Interests to an extent that may eventually defeat their original purpose. A thorough analysis is provided of the Interest aggregation mechanism using mathematical arguments ...

  19. Graduate midwives' perception of their preparation and support in using evidence to advocate for women's choice: A Western Australian study.

    Science.gov (United States)

    Hauck, Yvonne; Lewis, Lucy; Kuliukas, Lesley; Butt, Janice; Wood, Jennifer

    2016-01-01

    A retrospective cohort study was conducted with 83 midwives working across the Western Australian (WA) maternity sector who graduated from one WA University. We explored midwives' attitudes and utilisation of research and assertive communication in addition to perceptions of their educational preparation to advocate for women. The greatest opportunity for research exposure was working on a clinical audit (25.3%). No differences were found between graduate groups using the Edmonton Research Orientation subscales, although findings suggest a positive view towards research. Midwives were more likely to be assertive with their clinical colleagues than a midwifery manager or medical colleague when: expressing their opinions (P = communication skills', work environment' and 'knowing the woman and what she wants'. Findings suggest strategies are needed in their entry to practice preparation and ongoing professional development to facilitate research engagement. Using assertive behaviour to provide feedback to clinical colleagues warrants attention to enhance reflective practice. Building communication skills through observing positive role models and participating in role play was highlighted. PMID:26144597

  20. Building a Generation of Physician Advocates: The Case for Including Mandatory Training in Advocacy in Canadian Medical School Curricula.

    Science.gov (United States)

    Bhate, Tahara D; Loh, Lawrence C

    2015-12-01

    There is an increasing focus on the social accountability of physicians as individuals, and of medicine itself. This has led to increasing emphasis on physician advocacy from a wide variety of institutions. The physician advocacy concept is now part of the Health Advocacy competency mandated by the Royal College of Physicians and Surgeons of Canada. Despite its growing prominence, physician advocacy remains poorly integrated into current medical undergraduate curricula. The authors recommend how and why curricular reform should proceed; they focus on Canadian medical education, although they hope their views will be useful in other countries as well.The authors discuss conflicting definitions of physician advocacy, which have previously hampered curriculum development efforts, and suggest a way of reconciling the conflicts. They review current gaps in advocacy-related curricula, suggest that these can be addressed by incorporating practice-based and skills acquisition elements into current didactic teaching, and offer several strategies by which an advocacy curriculum could be implemented, ranging from small modifications to current curriculum to developing new competencies in medical education nationally.The authors present a case for making an advocacy curriculum mandatory for every Canadian medical trainee; they argue that teaching trainees how to fulfill their professional responsibility to advocate may also help them meet the social accountability mandate of medical school education. Finally, the authors explain why making the development and implementation of a mandatory, skill-based curriculum in advocacy should be a priority. PMID:26200573

  1. Mapping and characterization of LCA networks

    DEFF Research Database (Denmark)

    Bjørn, Anders; Owsianiak, Mikolaj; Laurent, Alexis;

    2013-01-01

    Purpose: The aims of this study were to provide an up-todate overview of global, regional and local networks supporting life cycle thinking and to characterize them according to their structure and activities. Methods: Following a tentative life cycle assessment (LCA) network definition, a mapping...... was performed based on (1) a literature search, (2) a web search and (3) an inquiry to stakeholders distributed via the two largest LCA fora. Networks were characterized based on responses from a survey. Results and discussion: We identified 100 networks, of which 29 fulfilled all six criteria...... provided list of LCA networks is currently the most comprehensive, publicly available mapping. We believe that the results of this mapping can serve as a basis for deciding where priorities should be set to increase the dissemination and development of LCA worldwide. In this aim, we also advocate the...

  2. Composition Matters: Multi-Context Informal Mentoring Networks for Low-Income Urban Adolescent Girls Pursuing Healthcare Careers

    Science.gov (United States)

    Packard, Becky Wai-Ling; Kim, Grace June; Sicley, Marissa; Piontkowski, Sarah

    2009-01-01

    In the career research literature focused on adults, diversely composed mentoring networks are advocated due to their effectiveness in providing a wide range of mentoring functions. This study investigates the composition of informal mentoring networks utilized by low-income urban adolescent girls with healthcare college and career aspirations. In…

  3. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter

    2011-01-01

    Sloep, P. B. (2011). Learning Networks, Networked Learning. Presentation at Annual Assembly of the European Society for the Systemic Innovation of Education - ESSIE. May, 27, 2011, Leuven, Belgium: Open University in the Netherlands.

  4. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  5. Network Potentials

    OpenAIRE

    Chakrabarti, Subhadip; Gilles, Robert Paul

    2005-01-01

    A network payoff function assigns a utility to all participants in a (social) network. In this paper we discuss properties of such network payoff functions that guarantee the existence of certain types of pairwise stable networks and the convergence of certain network formation processes. In particular we investigate network payoff functions that admit an exact network potential or an ordinal network potential. We relate these network potentials to exact and ordinal potentials of a non-cooper...

  6. Setting the global health agenda: The influence of advocates and ideas on political priority for maternal and newborn survival.

    Science.gov (United States)

    Smith, Stephanie L; Shiffman, Jeremy

    2016-10-01

    This study investigates a puzzle concerning global health priorities-why do comparable issues receive differential levels of attention and resources? It considers maternal and neonatal mortality, two high-burden issues that pertain to groups at risk at birth and whose lives could be saved with effective intrapartum care. Why did maternal survival gain status as a global health priority earlier and to a greater degree than newborn survival? Higher mortality and morbidity burdens among newborns and the cost-effectiveness of interventions would seem to predict that issue's earlier and higher prioritization. Yet maternal survival emerged as a priority two decades earlier and had attracted considerably more attention and resources by the close of the Millennium Development Goals era. This study uses replicative process-tracing case studies to examine the emergence and growth of political priority for these two issues, probing reasons for unexpected variance. The study finds that maternal survival's grounding as a social justice issue spurred growth of a strong and diverse advocacy network and aligned the issue with powerful international norms (e.g. expectations to advance women's rights and the Millennium Development Goals), drawing attention and resources to the issue over three decades. Newborn survival's disadvantage stems from its long status as an issue falling under the umbrellas of maternal and child survival but not fully adopted by these networks, and with limited appeal as a public health issue advanced by a small and technically focused network; network expansion and alignment with child survival norms have improved the issue's status in the past few years. PMID:27543685

  7. The Limited English Proficiency Patient Family Advocate Role: Fostering Respectful and Effective Care Across Language and Culture in a Pediatric Oncology Setting.

    Science.gov (United States)

    Gil, Stephanie; Hooke, Mary C; Niess, Dawn

    2016-01-01

    Patients and families with limited English proficiency (LEP) face a multitude of barriers both inside and outside the hospital walls. These barriers can contribute to difficulty accessing care and understanding/adhering to treatment recommendations, ultimately placing them at higher risk for poorer outcomes than their English-speaking counterparts. The LEP Patient Family Advocate role was created with the aim of improving access, promoting effective communication, and equalizing care for children with cancer from families with LEP. The goal of this mixed methods study was to describe the level of satisfaction and experiences of parents and health care providers who used the LEP Patient Family Advocate while receiving or providing care. Twelve parents and 15 health care providers completed quantitative surveys and an open-ended question about their experiences. High levels of satisfaction were reported. Themes about the role from qualitative responses included its positive effect on communication, trust, and connectedness between parents and staff. Continuity of care and safety were improved, and parents thought the role helped decrease their stress. The LEP Patient Family Advocate has a positive influence on family-centered cultural care. PMID:26589355

  8. Towards a theoretical framework for analyzing complex linguistic networks

    CERN Document Server

    Lücking, Andy; Banisch, Sven; Blanchard, Philippe; Job, Barbara

    2016-01-01

    The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics. In this way, the book contributes first steps towards establishing a statistical network theory as a theoretical basis of linguistic network analysis the boarder of the natural sciences and the humanities.This book addresses researchers who want to get familiar with theoretical developments, computational models and their empirical evaluation in the field of complex linguistic networks. It is intended to all those who are interested in statisticalmodels of linguistic systems from the point of view of network research. This includes all relevant areas of linguistics ranging from phonological, morphological and lexical networks on the one hand and syntactic, semantic and pragmatic networks on the other. In this sense, the volume concerns readers from many disciplines such as physics, linguistics, computer science and information scien...

  9. Network Competition with Local Network

    OpenAIRE

    Oystein Fjeldstad; Moen, Espen R; Christian Riis

    2007-01-01

    Local network externalities are present when the network externalities associated with entering a certain network depends not only on the total number of agents in the network, but on the identity of the agents in the network. We explore the consequences of local network externalities within a framework where two networks compete on the Hotelling circle. We first show that local network externalities, in contrast to global network externalities, do not sharpen competition. Then we show that t...

  10. Applying Intelligent Computing Techniques to Modeling Biological Networks from Expression Data

    Institute of Scientific and Technical Information of China (English)

    Wei-Po Lee; Kung-Cheng Yang

    2008-01-01

    Constructing biological networks is one of the most important issues in system sbiology. However, constructing a network from data manually takes a considerable large amount of time, therefore an automated procedure is advocated. To automate the procedure of network construction, in this work we use two intelligent computing techniques, genetic programming and neural computation, to infer two kinds of network models that use continuous variables. To verify the presented approaches, experiments have been conducted and the preliminary results show that both approaches can be used to infer networks successfully.

  11. Using Social Network Analysis to Predict Early Collaboration within Health Advocacy Coalitions

    Science.gov (United States)

    Honeycutt, Todd C.; Strong, Debra A.

    2012-01-01

    Within coalitions of consumer advocates formed to advance health insurance coverage expansions, engaging in united advocacy activities soon after formation might be an important precursor to attaining coalition effectiveness in shaping policy. In this article, the authors apply social network analysis (SNA) to examine how organizational…

  12. Information-centric networking for machine-to-machine data delivery: a case study in smart grid applications

    OpenAIRE

    Katsaros, Konstantinos; Koong Chai, Wei; Wang, Ning; Pavlou, George; Bontius, Herman; Paolone, Mario

    2014-01-01

    Largely motivated by the proliferation of content-centric applications in the Internet, information-centric networking has attracted the attention of the research community. By tailoring network operations around named information objects instead of end hosts, ICN yields a series of desirable features such as the spatiotemporal decoupling of communicating entities and the support of in-network caching. In this article, we advocate the introduction of such ICN features in a new, rapidly transf...

  13. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it...... suitable for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg...

  14. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  15. Transports Regulators of Networks with Junctions Detected by Durations Functions

    OpenAIRE

    Aubin, Jean-Pierre

    2013-01-01

    This study advocates a mathematical framework of ''transport relations'' on a network. They single out a subset of ''traffic states'' described by time, duration, position and other traffic attributes (called ''monads'' for short). Duration evolutions are non-negative, decreasing toward zero for incoming durations, increasing from zero for outgoing durations, allowing the detection of ''junction states'' defined as traffic states with ''zero duration''. A ''junction relation'' (crossroads, sy...

  16. Saving Muslim women in the era of Axis of Evil? : pious women’s movement advocates in Iran, 2001-2010

    OpenAIRE

    Raunio, Paola Maria

    2014-01-01

    This thesis aims to investigate US foreign policies in the post-9/11 world, focusing on the ways in which they affected the Iranian women’s movement after Iran was included in the Axis of Evil in January 2002. The focus of the thesis draws on the Bush Administration’s decision to use Muslim women’s human rights as moral justifications for the War on Terror. The thesis argues that, despite the US commitment to Iranian women’s human rights, Iranian women’s movement advocates have found thems...

  17. Interviewing clinicians and advocates who work with sexual assault survivors: a personal perspective on moving from quantitative to qualitative research methods.

    Science.gov (United States)

    Ullman, Sarah E

    2005-09-01

    This article describes the author's personal experiences of conducting a qualitative semistructured interview study, after having done predominantly quantitative survey research in the social sciences. The author describes the process of learning how to approach conducting semistructured interviews with female advocates and clinicians who provide services to sexual assault survivors in the community. The author describes making the transition from a logical positivist deductive approach to thinking about and conducting research to a more social constructionist stance in which one learns from participants about their experiences and perspectives in narrative form to discover knowledge and develop theory inductively. PMID:16049103

  18. Outline of LI Dong-yuan's Academic Thinking on Advocating the Application of "Wind Medicine"%李东垣倡风药应用学术思想述要

    Institute of Scientific and Technical Information of China (English)

    张真全

    2012-01-01

    The history of using "wind medicine" was briefly elaborated through studying literature, especially Li Dong-yucai's academic thinking on using wind medicine was emphatically pointed out, in which he stresses primordial Qi, advocating the acquired constitution (spleen) nourishes the congenital one (kidney); stresses the spleen and stomach, advocating to invigorate the middle with the drugs of sweet and warm nature; stresses descending and ascending, advocating ShaoYang governs sprout and growth; stresses wind medicine, advocating wind medicine ascending Yang.%从文献角度梳理了"风药"使用的历史,重点阐述了金元四大家之一的李东垣重视风药应用的学术思想:重元气,倡后天养先天;重脾胃,倡甘温补中;重升降,倡少阳生发;重风药,倡风药升阳.

  19. Loyalty and positive word-of-mouth: patients and hospital personnel as advocates of a customer-centric health care organization.

    Science.gov (United States)

    Ferguson, Ronald J; Paulin, Michele; Leiriao, Elizabeth

    2006-01-01

    The ability to attract and retain loyal customers depends on the successful implementation of a customer-centric strategy. Customer loyalty is an attitude about an organization and its' services that is manifested by intentions and behaviors of re-patronization and recommendation. In the context of many medical services, loyalty through repeat patronization is not pertinent, whereas loyalty through positive word-of mouth (WOM) recommendation can be a powerful marketing tool. The Shouldice Hospital, a well-known institution for the surgical correction of hernias, instituted a marketing plan to develop a stable base of patients by creating positive WOM advocacy. This study focused on the consequences of both hernia patient overall satisfaction (and overall service quality) and hospital personnel satisfaction on the level of positive WOM advocacy. Using a commitment ladder of positive WOM advocacy, respondents were divided into three categories described as passive supporters, active advocates and ambassador advocates. Patient assessments of overall satisfaction and service quality were significantly related to these progressive levels of WOM for recommending the hospital to potential patients. Similarly, the satisfaction of the hospital employees was also significantly related to these progressive levels of positive WOM about recommending the hospital to potential patients and to potential employees. High levels of satisfaction are required to create true ambassadors of a service organization. PMID:18681199

  20. Network Experiments

    OpenAIRE

    Michael Kosfeld

    2003-01-01

    This paper provides a survey of recent experimental work in eco- nomics focussing on social and economic networks.The experiments consider networks of coordination and cooperation,buyer-seller net- works,and network formation.

  1. Spatial Networks

    OpenAIRE

    Barthelemy, Marc

    2010-01-01

    Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields ranging from urbanism t...

  2. Network Security

    OpenAIRE

    Sunil Kumar

    2012-01-01

    The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack or harm due to...

  3. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter;

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  4. Joint community and anomaly tracking in dynamic networks

    CERN Document Server

    Baingana, Brian

    2015-01-01

    Most real-world networks exhibit community structure, a phenomenon characterized by existence of node clusters whose intra-edge connectivity is stronger than edge connectivities between nodes belonging to different clusters. In addition to facilitating a better understanding of network behavior, community detection finds many practical applications in diverse settings. Communities in online social networks are indicative of shared functional roles, or affiliation to a common socio-economic status, the knowledge of which is vital for targeted advertisement. In buyer-seller networks, community detection facilitates better product recommendations. Unfortunately, reliability of community assignments is hindered by anomalous user behavior often observed as unfair self-promotion, or "fake" highly-connected accounts created to promote fraud. The present paper advocates a novel approach for jointly tracking communities while detecting such anomalous nodes in time-varying networks. By postulating edge creation as the ...

  5. DENIAL OF SERVICE ATTACK IN DISTRIBUTED WIRELESS NETWORK BY DISTRIBUTED JAMMER NETWORK: A BIRTH-DEATH RANDOM PROCESS ANALYSIS

    Directory of Open Access Journals (Sweden)

    R. Dhanasekaran

    2014-01-01

    Full Text Available Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN is used nowadays to cause a Denial of Service (DoS attack on a Distributed Wireless Network (DWN. Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS attacks in Distributed Wireless Network (DWN using Distributed Jammer Network (DJN considering each of them as separate Poisson Random Process. In an integrated approach, in this study, we advocate the more natural Birth-Death Random Process route to study the impact of Distributed Jammer Network (DJN on the connectivity of Distributed Wireless Network (DWN. We express that the Distributed Jammer Network (DJN can root a phase transition in the performance of the target network. We use Birth-Death Random Process (BDRP route for this phase transition to evaluate the collision of Distributed Jammer Network (DJN on the connectivity and global percolation of the target network. This study confirms the global percolation of Distributed Wireless Network (DWN is definite when the Distributed Jammer Network (DJN is not more significant.

  6. Green networking

    CERN Document Server

    Krief, Francine

    2012-01-01

    This book focuses on green networking, which is an important topic for the scientific community composed of engineers, academics, researchers and industrialists working in the networking field. Reducing the environmental impact of the communications infrastructure has become essential with the ever increasing cost of energy and the need for reducing global CO2 emissions to protect our environment.Recent advances and future directions in green networking are presented in this book, including energy efficient networks (wired networks, wireless networks, mobile networks), adaptive networ

  7. Advocates or Challengers of Europeanization? An Inquiry into the Discourse of the Romanian Elites on the European Union in the Context of EU Elections 2014

    Directory of Open Access Journals (Sweden)

    Loredana RADU

    2015-10-01

    Full Text Available This paper aims to shed light on the role of elites in the Europeanization of the national public sphere. 15 semi-structured in-depth interviews with representatives of political, administrative, and media elites in Romania were carried out between March 23 and April 24, 2014, which was on the eve of the 2014 European Elections campaign. Our research shows that, in general, the Romanian elites – be them political, administrative, or media-related – declare themselves as euro-enthusiasts or euro-realists; at the same time, through a diversity of blame-avoiding games, they use the EU as a means of diffusing (national responsibility for crisis-related hot topics, such as the implementation of austerity measures. By identifying the key narratives of Europeanization in elites’ discourse on the 2014 European Elections, this paper indicates that we witness a paradoxical trend, in which elites are rather challengers than advocates of Europeanization.

  8. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson

    International Nuclear Information System (INIS)

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening

  9. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  10. 'When you haven't got much of a voice': an evaluation of the quality of Independent Mental Health Advocate (IMHA) services in England.

    Science.gov (United States)

    Newbigging, Karen; Ridley, Julie; McKeown, Mick; Machin, Karen; Poursanidou, Konstantina

    2015-05-01

    Advocacy serves to promote the voice of service users, represent their interests and enable participation in decision-making. Given the context of increasing numbers of people detained under the Mental Health Act and heightened awareness of the potential for neglect and abuse in human services, statutory advocacy is an important safeguard supporting human rights and democratising the social relationships of care. This article reports findings from a national review of Independent Mental Health Advocate (IMHA) provision in England. A qualitative study used a two-stage design to define quality and assess the experience and impact of IMHA provision in eight study sites. A sample of 289 participants - 75 focus group participants and 214 individuals interviewed - including 90 people eligible for IMHA services, as well as advocates, a range of hospital and community-based mental health professionals, and commissioners. The research team included people with experience of compulsion. Findings indicate that the experience of compulsion can be profoundly disempowering, confirming the need for IMHA. However, access was highly variable and more problematic for people with specific needs relating to ethnicity, age and disability. Uptake of IMHA services was influenced by available resources, attitude and understanding of mental health professionals, as well as the organisation of IMHA provision. Access could be improved through a system of opt-out as opposed to opt-in. Service user satisfaction was most frequently reported in terms of positive experiences of the process of advocacy rather than tangible impacts on care and treatment under the Mental Health Act. IMHA services have the potential to significantly shift the dynamic so that service users have more of a voice in their care and treatment. However, a shift is needed from a narrow conception of statutory advocacy as safeguarding rights to one emphasising self-determination and participation in decisions about care and

  11. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  12. Temporal networks

    CERN Document Server

    Saramäki, Jari

    2013-01-01

    The concept of temporal networks is an extension of complex networks as a modeling framework to include information on when interactions between nodes happen. Many studies of the last decade examine how the static network structure affect dynamic systems on the network. In this traditional approach  the temporal aspects are pre-encoded in the dynamic system model. Temporal-network methods, on the other hand, lift the temporal information from the level of system dynamics to the mathematical representation of the contact network itself. This framework becomes particularly useful for cases where there is a lot of structure and heterogeneity both in the timings of interaction events and the network topology. The advantage compared to common static network approaches is the ability to design more accurate models in order to explain and predict large-scale dynamic phenomena (such as, e.g., epidemic outbreaks and other spreading phenomena). On the other hand, temporal network methods are mathematically and concept...

  13. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... and analysed networks using the commonly used and freely available software Gephi (gephi.org). Reflecting upon why science education researchers might be hesitant to adopt network methodology we identify a key problem for networks in science education research: The cost in resources of learning how to include...

  14. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  15. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  16. Network Topology Inference from Spectral Templates

    CERN Document Server

    Segarra, Santiago; Mateos, Gonzalo; Ribeiro, Alejandro

    2016-01-01

    We address the problem of identifying a graph structure from the observation of signals defined on its nodes. Fundamentally, the unknown graph encodes direct relationships between signal elements, which we aim to recover from observable indirect relationships generated by a diffusion process on the graph. The fresh look advocated here permeates benefits from convex optimization and stationarity of graph signals, in order to identify the graph shift operator (a matrix representation of the graph) given only its eigenvectors. These spectral templates can be obtained, e.g., from the sample covariance of independent graph signals diffused on the sought network. The novel idea is to find a graph shift that, while being consistent with the provided spectral information, endows the network with certain desired properties such as sparsity. To that end we develop efficient inference algorithms stemming from provably-tight convex relaxations of natural nonconvex criteria, particularizing the results for two shifts: the...

  17. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  18. Fermionic networks

    Science.gov (United States)

    Javarone, Marco Alberto

    2016-08-01

    We study the structure of fermionic networks, i.e. a model of networks based on the behavior of fermionic gases, and we analyze dynamical processes over them. In this model, particle dynamics have been mapped to the domain of networks, hence a parameter representing the temperature controls the evolution of the system. In doing so, it is possible to generate adaptive networks, i.e. networks whose structure varies over time. As shown in previous works, networks generated by quantum statistics can undergo critical phenomena as phase transitions and, moreover, they can be considered as thermodynamic systems. In this study, we analyze fermionic networks and opinion dynamics processes over them, framing this network model as a computational model useful to represent complex and adaptive systems. Results highlight that a strong relation holds between the gas temperature and the structure of the achieved networks. Notably, both the degree distribution and the assortativity vary as the temperature varies, hence we can state that fermionic networks behave as adaptive networks. On the other hand, it is worth to highlight that we did not finding relation between outcomes of opinion dynamics processes and the gas temperature. Therefore, although the latter plays a fundamental role in gas dynamics, on the network domain, its importance is related only to structural properties of fermionic networks.

  19. Synchronization in complex oscillator networks and smart grids.

    Science.gov (United States)

    Dörfler, Florian; Chertkov, Michael; Bullo, Francesco

    2013-02-01

    The emergence of synchronization in a network of coupled oscillators is a fascinating topic in various scientific disciplines. A widely adopted model of a coupled oscillator network is characterized by a population of heterogeneous phase oscillators, a graph describing the interaction among them, and diffusive and sinusoidal coupling. It is known that a strongly coupled and sufficiently homogeneous network synchronizes, but the exact threshold from incoherence to synchrony is unknown. Here, we present a unique, concise, and closed-form condition for synchronization of the fully nonlinear, nonequilibrium, and dynamic network. Our synchronization condition can be stated elegantly in terms of the network topology and parameters or equivalently in terms of an intuitive, linear, and static auxiliary system. Our results significantly improve upon the existing conditions advocated thus far, they are provably exact for various interesting network topologies and parameters; they are statistically correct for almost all networks; and they can be applied equally to synchronization phenomena arising in physics and biology as well as in engineered oscillator networks, such as electrical power networks. We illustrate the validity, the accuracy, and the practical applicability of our results in complex network scenarios and in smart grid applications. PMID:23319658

  20. Synchronization in Complex Oscillator Networks and Smart Grids

    Energy Technology Data Exchange (ETDEWEB)

    Dorfler, Florian [Los Alamos National Laboratory; Chertkov, Michael [Los Alamos National Laboratory; Bullo, Francesco [Center for Control, Dynamical Systems and Computation, University of California at Santa Babara, Santa Barbara CA

    2012-07-24

    The emergence of synchronization in a network of coupled oscillators is a fascinating topic in various scientific disciplines. A coupled oscillator network is characterized by a population of heterogeneous oscillators and a graph describing the interaction among them. It is known that a strongly coupled and sufficiently homogeneous network synchronizes, but the exact threshold from incoherence to synchrony is unknown. Here we present a novel, concise, and closed-form condition for synchronization of the fully nonlinear, non-equilibrium, and dynamic network. Our synchronization condition can be stated elegantly in terms of the network topology and parameters, or equivalently in terms of an intuitive, linear, and static auxiliary system. Our results significantly improve upon the existing conditions advocated thus far, they are provably exact for various interesting network topologies and parameters, they are statistically correct for almost all networks, and they can be applied equally to synchronization phenomena arising in physics and biology as well as in engineered oscillator networks such as electric power networks. We illustrate the validity, the accuracy, and the practical applicability of our results in complex networks scenarios and in smart grid applications.

  1. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  2. Advocating investments in information technology

    International Nuclear Information System (INIS)

    Information and communication systems can improve the timeliness and quality of decisions. These benefits are strategically important to the utility industry in an era of increasing competition. Because these systems often do not reduce labor cost, however, they can be difficult to evaluate. This report presents a new process for reaching consensus of the value of capital investment in information and communication systems. The results of this project is A Strategic Advocacy Process (ASAP), a methodology that can be used to evaluate investments in information technology. ASAP uses belief graphs to produce a living business case showing facts, assumptions, goals, and metrics for measuring progress toward those goals; shows how to use option pricing theory to quantify the value of managerial flexibility; ASAP uses an organizational impact assessment tool to identify the potential impact of new information systems and how to realize the benefits of managerial flexibility. The ASAP methodology addresses the critical problem of correctly valuing information and communication systems. The methodology offers a way to account for the ''intangible'' value of these systems by recognizing the managerial flexibility these systems can provide in addressing risks and uncovering new business opportunities. Metrics for measuring progress toward new goals can be defined, and plans for achieving the goals can be made. As a result, agreement can be reached on the uses, value, and priority of projects based on a metric other than on labor replacement savings

  3. Advocating Students’Individual Learning

    Institute of Scientific and Technical Information of China (English)

    任锡平

    2014-01-01

    A new approach formed with the application of modern teaching facilities makes English teaching and learning more collaborative and individualized through using computers, the Internet, and multimedia. Therefore, students ’individual English learning, teaching and learning environment, and conditions that students need in their individual learning are discussed.

  4. Achieving Capacity of Bi-Directional Tandem Collision Network by Joint Medium-Access Control and Channel-Network Coding

    CERN Document Server

    Shum, Kenneth W

    2009-01-01

    In ALOHA-type packetized network, the transmission times of packets follow a stochastic process. In this paper, we advocate a deterministic approach for channel multiple-access. Each user is statically assigned a periodic protocol signal, which takes value either zero or one, and transmit packets whenever the value of the protocol signal is equal to one. On top of this multiple-access protocol, efficient channel coding and network coding schemes are devised. We illustrate the idea by constructing a transmission scheme for the tandem collision network, for both slot-synchronous and slot-asynchronous systems. This cross-layer approach is able to achieve the capacity region when the network is bi-directional.

  5. Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases: report of the First International African Vaccinology Conference.

    Science.gov (United States)

    Wiysonge, Charles Shey; Waggie, Zainab; Hawkridge, Anthony; Schoub, Barry; Madhi, Shabir Ahmed; Rees, Helen; Hussey, Gregory

    2016-01-01

    One means of improving healthcare workers' knowledge of and attitudes to vaccines is through running vaccine conferences which are accessible, affordable, and relevant to their everyday work. Various vaccinology conferences are held each year worldwide. These meetings focus heavily on basic science with much discussion about new developments in vaccines, and relatively little coverage of policy, advocacy, and communication issues. A negligible proportion of delegates at these conferences come from Africa, home to almost 40% of the global burden of vaccine-preventable diseases. To the best of our knowledge, no major vaccinology conference has ever been held on the African continent apart from World Health Organization (WHO) meetings. The content of the first International African Vaccinology Conference was planned to be different; to focus on the science, with a major part of discussions being on clinical, programmatic, policy, and advocacy issues. The conference was held in Cape Town, South Africa, from 8 to 11 November 2012. The theme of the conference was "Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases". There were more than 550 registered participants from 55 countries (including 37 African countries). There were nine pre-conference workshops, ten plenary sessions, and 150 oral and poster presentations. The conference discussed the challenges to universal immunisation in Africa as well as the promotion of dialogue and communication on immunisation among all stakeholders. There was general acknowledgment that giant strides have been made in Africa since the global launch of the Expanded Programme on Immunisation in 1974. For example, there has been significant progress in introducing new and under-utilised vaccines; including hepatitis B, Haemophilus influenza type b, pneumococcal conjugate, rotavirus, meningococcal A conjugate, and human papillomavirus vaccines. In May 2012, African countries

  6. Cosmological networks

    International Nuclear Information System (INIS)

    Networks often represent systems that do not have a long history of study in traditional fields of physics; albeit, there are some notable exceptions, such as energy landscapes and quantum gravity. Here, we consider networks that naturally arise in cosmology. Nodes in these networks are stationary observers uniformly distributed in an expanding open Friedmann–Lemaître–Robertson–Walker universe with any scale factor and two observers are connected if one can causally influence the other. We show that these networks are growing Lorentz-invariant graphs with power-law distributions of node degrees. These networks encode maximum information about the observable universe available to a given observer. (paper)

  7. Network regularizability

    CERN Document Server

    Franceschet, Massimo

    2016-01-01

    A network is regularizable if it is possible to assign weights to its edges so that all nodes have the same degree. We define a hierarchy of four network classes in terms of their regularization properties. For the classes of the hierarchy, we investigate structural conditions on both the network and the corresponding adjacency matrix that are necessary and sufficient for the inclusion of a network in the class. Moreover, we provide an algorithmic solution for the problem of positioning a network in the hierarchy. We argue that the regularization solution is useful to build an egalitarian, friction-free network in which all actors of the network has the same centrality (and power).

  8. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  9. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  10. Multilayer Networks

    CERN Document Server

    Kivelä, Mikko; Barthelemy, Marc; Gleeson, James P; Moreno, Yamir; Porter, Mason A

    2013-01-01

    Most real and engineered systems include multiple subsystems and layers of connectivity, and it is important to take such features into account to try to obtain a complete understanding of these systems. It is thus necessary to generalize "traditional" network theory by developing (and validating) a framework and associated tools to study multilayer systems in a comprehensive fashion. The origins of such efforts occurred several decades ago, but now the study of multilayer networks has become one of the major directions in network science. In this paper, we discuss the history of multilayer networks (and related concepts) and then review the exploding body of work on such networks. To unify the disparate terminology in the large body of recent work, we discuss a general framework for multilayer networks, construct a dictionary of terminology to relate the numerous existing concepts to each other, and provide a thorough discussion that compares, contrasts, and translates between related notions such as multila...

  11. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  12. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard;

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part...

  13. Networks, Urban

    OpenAIRE

    Clarke, N.

    2009-01-01

    For much of the twentieth century, urban networks was a term used by sociologists and others to describe social networks, their importance for bonding within communities and bridging between communities, and their relationship to the geographical mobility implied by late-nineteenth- and early-twentieth-century urbanization, mid-twentieth-century suburbanization, and late-twentieth-century globalization. This relationship is often assumed to be one in which social networks are threatened by ge...

  14. Channel Networks

    Science.gov (United States)

    Rinaldo, Andrea; Rodriguez-Iturbe, Ignacio; Rigon, Riccardo

    This review proceeds from Luna Leopold's and Ronald Shreve's lasting accomplishments dealing with the study of random-walk and topologically random channel networks. According to the random perspective, which has had a profound influence on the interpretation of natural landforms, nature's resiliency in producing recurrent networks and landforms was interpreted to be the consequence of chance. In fact, central to models of topologically random networks is the assumption of equal likelihood of any tree-like configuration. However, a general framework of analysis exists that argues that all possible network configurations draining a fixed area are not necessarily equally likely. Rather, a probability P(s) is assigned to a particular spanning tree configuration, say s, which can be generally assumed to obey a Boltzmann distribution: P(s) % e^-H(s)/T, where T is a parameter and H(s) is a global property of the network configuration s related to energetic characters, i.e. its Hamiltonian. One extreme case is the random topology model where all trees are equally likely, i.e. the limit case for T6 4 . The other extreme case is T 6 0, and this corresponds to network configurations that tend to minimize their total energy dissipation to improve their likelihood. Networks obtained in this manner are termed optimal channel networks (OCNs). Observational evidence suggests that the characters of real river networks are reproduced extremely well by OCNs. Scaling properties of energy and entropy of OCNs suggest that large network development is likely to effectively occur at zero temperature (i.e. minimizing its Hamiltonian). We suggest a corollary of dynamic accessibility of a network configuration and speculate towards a thermodynamics of critical self-organization. We thus conclude that both chance and necessity are equally important ingredients for the dynamic origin of channel networks---and perhaps of the geometry of nature.

  15. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  16. One size fits all? Managing trust and privacy on social networking sites in Russia and Germany

    OpenAIRE

    Krasnova, Hanna; Kolesnikova,Elena; Günther, Oliver

    2011-01-01

    When it comes to platform sustainability, mitigating user privacy concerns and enhancing trust represent two major tasks providers of Social Networking Sites (SNSs) are facing today. State-of-the-art research advocates reliance on the justice-based measures as possible means to address these challenges. However, as providers are increasingly expanding into foreign markets, the effectiveness of these measures in a cross-cultural setting is questioned. In an attempt to address this set of issue...

  17. Network Security

    CERN Document Server

    Huang, Scott; Du, Ding-Zhu

    2010-01-01

    This book provides a reference tool for the increasing number of the scientists whose research is related to sensor network security. The book is organized into several sections, each including some chapters exploring a specific topic. Network security is attracting great attention and there are many research topics waiting to be studied. In this book, the topics covered include network design and modeling, network management, data management, security and applications. The aim, intent, and motivation of this book is to provide a reference tool for the increasing number of scientists whose res

  18. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  19. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani;

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage buffe......). Our results on single–hop, multi–hop, and multi–path scenarios show that gains of 3x to 11x are attainable over standard TCP and multi–path TCP....

  20. Novel Concepts for Device to Device Communication using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Hundebøll, Martin; Pedersen, Morten Videbæk;

    2014-01-01

    Device-to-device communication is currently a hot research topic within 3GPP. Even though D2D communication has been part of previous ad hoc, meshed and sensor networks proposals, the main contribution by 3GPP is that the direct communication among two devices is carried out over a dynamically...... assigned, licensed spectrum; thus, it is under full control of the cellular network. D2D communication creates a market potential for new services, new approaches to efficient spectrum use, and security concepts. This is especially true if D2D communication is extended to larger communication groups...... organized in meshed clusters. In this article, we discuss the potential and shortcomings of D2D communication as proposed today, advocating for the use of network coding as an enabling technology for enhanced security and communication efficiency using the PlayNCool and CORE protocols as key examples to...

  1. Assessing the Bias in Communication Networks Sampled from Twitter

    CERN Document Server

    González-Bailón, Sandra; Rivero, Alejandro; Borge-Holthoefer, Javier; Moreno, Yamir

    2012-01-01

    We collect and analyse messages exchanged in Twitter using two of the platform's publicly available APIs (the search and stream specifications). We assess the differences between the two samples, and compare the networks of communication reconstructed from them. The empirical context is given by political protests taking place in May 2012: we track online communication around these protests for the period of one month, and reconstruct the network of mentions and re-tweets according to the two samples. We find that the search API over-represents the more central users and does not offer an accurate picture of peripheral activity; we also find that the bias is greater for the network of mentions. We discuss the implications of this bias for the study of diffusion dynamics and collective action in the digital era, and advocate the need for more uniform sampling procedures in the study of online communication.

  2. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  3. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  4. Bibliometric Networks

    OpenAIRE

    Havemann, Frank; Scharnhorst, Andrea

    2012-01-01

    This text is based on a translation of a chapter in a handbook about network analysis (published in German) where we tried to make beginners familiar with some basic notions and recent developments of network analysis applied to bibliometric issues (Havemann and Scharnhorst 2010). We have added some recent references.

  5. Diophantine networks

    Science.gov (United States)

    Bedogne', C.; Masucci, A. P.; Rodgers, G. J.

    2008-03-01

    We introduce a new class of deterministic networks by associating networks with Diophantine equations, thus relating network topology to algebraic properties. The network is formed by representing integers as vertices and by drawing cliques between M vertices every time that M distinct integers satisfy the equation. We analyse the network generated by the Pythagorean equation x2 +y2 =z2 showing that its degree distribution is well approximated by a power law with exponential cut-off. We also show that the properties of this network differ considerably from the features of scale-free networks generated through preferential attachment. Remarkably we also recover a power law for the clustering coefficient. We then study the network associated with the equation x2 +y2 = z showing that the degree distribution is consistent with a power law for several decades of values of k and that, after having reached a minimum, the distribution begins rising again. The power-law exponent, in this case, is given by γ ∼ 4.5 We then analyse clustering and ageing and compare our results to the ones obtained in the Pythagorean case.

  6. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  7. Organizational Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Grande, Bård

    1996-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed.......The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed....

  8. Networks of spatial genetic variation across species

    Science.gov (United States)

    Fortuna, Miguel A.; Albaladejo, Rafael G.; Fernández, Laura; Aparicio, Abelardo; Bascompte, Jordi

    2009-01-01

    Spatial patterns of genetic variation provide information central to many ecological, evolutionary, and conservation questions. This spatial variability has traditionally been analyzed through summary statistics between pairs of populations, therefore missing the simultaneous influence of all populations. More recently, a network approach has been advocated to overcome these limitations. This network approach has been applied to a few cases limited to a single species at a time. The question remains whether similar patterns of spatial genetic variation and similar functional roles for specific patches are obtained for different species. Here we study the networks of genetic variation of four Mediterranean woody plant species inhabiting the same habitat patches in a highly fragmented forest mosaic in Southern Spain. Three of the four species show a similar pattern of genetic variation with well-defined modules or groups of patches holding genetically similar populations. These modules can be thought of as the long-sought-after, evolutionarily significant units or management units. The importance of each patch for the cohesion of the entire network, though, is quite different across species. This variation creates a tremendous challenge for the prioritization of patches to conserve the genetic variation of multispecies assemblages. PMID:19861546

  9. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  10. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  11. Natural networks

    CERN Document Server

    Hartonen, Tuomo

    2011-01-01

    Scale-free and non-computable characteristics of natural networks are found to result from the least-time dispersal of energy. To consider a network as a thermodynamic system is motivated since ultimately everything that exists can be expressed in terms of energy. According to the variational principle, the network will grow and restructure when flows of energy diminish energy differences between nodes as well as relative to nodes in surrounding systems. The natural process will yield scale-free characteristics because the nodes that contribute to the least-time consumption of free energy preferably attach to each other. Network evolution is a path-dependent and non-deterministic process when there are two or more paths to consume a common source of energy. Although evolutionary courses of these non-Hamiltonian systems cannot be predicted, many mathematical functions, models and measures that characterize networks can be recognized as appropriate approximations of the thermodynamic equation of motion that has...

  12. Technological Networks

    Science.gov (United States)

    Mitra, Bivas

    The study of networks in the form of mathematical graph theory is one of the fundamental pillars of discrete mathematics. However, recent years have witnessed a substantial new movement in network research. The focus of the research is shifting away from the analysis of small graphs and the properties of individual vertices or edges to consideration of statistical properties of large scale networks. This new approach has been driven largely by the availability of technological networks like the Internet [12], World Wide Web network [2], etc. that allow us to gather and analyze data on a scale far larger than previously possible. At the same time, technological networks have evolved as a socio-technological system, as the concepts of social systems that are based on self-organization theory have become unified in technological networks [13]. In today’s society, we have a simple and universal access to great amounts of information and services. These information services are based upon the infrastructure of the Internet and the World Wide Web. The Internet is the system composed of ‘computers’ connected by cables or some other form of physical connections. Over this physical network, it is possible to exchange e-mails, transfer files, etc. On the other hand, the World Wide Web (commonly shortened to the Web) is a system of interlinked hypertext documents accessed via the Internet where nodes represent web pages and links represent hyperlinks between the pages. Peer-to-peer (P2P) networks [26] also have recently become a popular medium through which huge amounts of data can be shared. P2P file sharing systems, where files are searched and downloaded among peers without the help of central servers, have emerged as a major component of Internet traffic. An important advantage in P2P networks is that all clients provide resources, including bandwidth, storage space, and computing power. In this chapter, we discuss these technological networks in detail. The review

  13. Temporal Networks

    CERN Document Server

    Holme, Petter

    2011-01-01

    A great variety of systems in nature, society and technology can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamic systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via email, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, an...

  14. Accelerating networks

    International Nuclear Information System (INIS)

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  15. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  16. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  17. Network medicine

    DEFF Research Database (Denmark)

    Pawson, Tony; Linding, Rune

    2008-01-01

    To more effectively target complex diseases like cancer, diabetes and schizophrenia, we may need to rethink our strategies for drug development and the selection of molecular targets for pharmacological treatments. Here, we discuss the potential use of protein signaling networks as the targets...... for new therapeutic intervention. We argue that by targeting the architecture of aberrant signaling networks associated with cancer and other diseases new therapeutic strategies can be implemented. Transforming medicine into a network driven endeavour will require quantitative measurements of cell...... signaling processes; we will describe how this may be performed and combined with new algorithms to predict the trajectories taken by a cellular system either in time or through disease states. We term this approach, network medicine....

  18. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... of more than a million people in more than 100 countries have attended courses in Japan funded fully or partly by Japanese ODA since the inception of the technical assistance programs in 1954 through the Colombo Plan and since 1959 through the Association of Overseas Technical Scholarships (AOTS from...... 2009 HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of...

  19. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Technical Assistance courses have many functions apart from disseminating knowledge and information, one such function is to engender networks. During the course period, participants meet and establish contact and some of these contacts remain connections between alumni for many years after the...... courses are finished. The alumni networks depend on the uses they are put to by the individual alumni and the support they get from alumni and host countries. The United Nations initiated technical assistance courses in the late 1940s in order to train nationals from developing countries as a means to......, Denmark, as a Danida fellow. Today, the older sister works in Nepal and the younger in Seattle, where they still make use of their personal networks including connections to their fellow alumni of technical assistance courses. Inspired by work on social remittances in combination with network theory , I...

  20. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...... the focus of operations management from managing the own organization to continuously developing and managing a network of external and internal resources forming a production system. This perspective may be called managing an “extraprise” rather than an “enterprise.” It should be noted that “an industrial...... network” should not be seen as an organizational form but as a perspective that can be used to enrich one's understanding of organizations. The industrial network perspective has three basic building blocks: actors, resources, and activities. The three building blocks and their relations constitute...

  1. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  2. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... of organisationalbehaviour developed by Miles and Snow (1978), this paper argues that thepatterns of network behaviour practiced by firms greatly depend on the businesstypology of the company. That is, a company's business typology will to a certaindegree dictate the network identity of the company. In this paper evidence...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...

  3. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  4. Delegation Networks

    OpenAIRE

    Drewes, Frank

    2007-01-01

    We introduce a generalization of tree-based generators called delegation networks. These make it possible to generate objects such as strings, trees, graphs, and pictures in a modular way by combining tree-based generators of several types. Our main result states that, if all underlying tree generators generate regular tree languages (or finite tree languages), then the tree-generating power of delegation networks is the same as that of context-free tree grammars working in IO mode.

  5. Chemical networks*

    OpenAIRE

    Thi Wing-Fai

    2015-01-01

    This chapter discusses the fundamental ideas of how chemical networks are build, their strengths and limitations. The chemical reactions that occur in disks combine the cold phase reactions used to model cold molecular clouds with the hot chemistry applied to planetary atmosphere models. With a general understanding of the different types of reactions that can occur, one can proceed in building a network of chemical reactions and use it to explain the abundance of species seen in disks. One o...

  6. Sentient networks

    Energy Technology Data Exchange (ETDEWEB)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  7. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  8. Network virtualization and programmability

    OpenAIRE

    Colle, Didier; Jooris, Bart; Gurzi, Pasquale; Pickavet, Mario; Demeester, Piet

    2010-01-01

    We present network virtualization (building virtual or logical networks over a physical infrastructure) and network programmability (allowing the network operator to at least control the network but more fundamentally to define its behavior) concepts.

  9. Neural Networks

    International Nuclear Information System (INIS)

    Physicists use large detectors to measure particles created in high-energy collisions at particle accelerators. These detectors typically produce signals indicating either where ionization occurs along the path of the particle, or where energy is deposited by the particle. The data produced by these signals is fed into pattern recognition programs to try to identify what particles were produced, and to measure the energy and direction of these particles. Ideally, there are many techniques used in this pattern recognition software. One technique, neural networks, is particularly suitable for identifying what type of particle caused by a set of energy deposits. Neural networks can derive meaning from complicated or imprecise data, extract patterns, and detect trends that are too complex to be noticed by either humans or other computer related processes. To assist in the advancement of this technology, Physicists use a tool kit to experiment with several neural network techniques. The goal of this research is interface a neural network tool kit into Java Analysis Studio (JAS3), an application that allows data to be analyzed from any experiment. As the final result, a physicist will have the ability to train, test, and implement a neural network with the desired output while using JAS3 to analyze the results or output. Before an implementation of a neural network can take place, a firm understanding of what a neural network is and how it works is beneficial. A neural network is an artificial representation of the human brain that tries to simulate the learning process [5]. It is also important to think of the word artificial in that definition as computer programs that use calculations during the learning process. In short, a neural network learns by representative examples. Perhaps the easiest way to describe the way neural networks learn is to explain how the human brain functions. The human brain contains billions of neural cells that are responsible for processing

  10. Janis Huston Audin, MSc, DVM,1950-2009. Dynamic editor-in-chief of the Journal of the American Veterinary Medical Association and strong One Health advocate dies

    Directory of Open Access Journals (Sweden)

    Bruce Kaplan, DVM

    2009-09-01

    Full Text Available Dr Janis H. Audin (MSc Illinois 1975, DVM Illinois 1979, a champion of progressive veterinary medical journalism and ‘One Health’ died on 22 April 2009 following a long, courageous and difficult battle with pancreatic cancer. The world has lost a truly significant One Health leader and advocate. Under her guidance, the Journal of the American Veterinary Medical Association (JAVMA implemented a ‘one-health wonders’ column that recognised and highlighted prominent One Health individuals among the medical and veterinary medical professions in the United States. The American Veterinary Medical Association (AVMA has lost a dedicated and gifted editor-in-chief.Dr Audin joined the editorial staff of the AVMA in 1985, as an assistant editor and was promoted to associate editor in 1989 and editor in 1994. She became the editor-in-chief of both the JAVMA and the American Journal of Veterinary Research in 1995. Prior to that, Dr Audin practised as an associate veterinarian in Calumet City, Illinois, for four years.During her tenure, Dr Audin was noted for implementing procedural and technological changes in the journal to reduce costs, improve timeliness of publications and promote readership interest and awareness. New features in the News section introduced under her leadership have made the journals more practical and public health-relevant. For instance, Dr Audin fostered the United States Department of Agriculture’s Food Safety and Inspection Service (USDA-FSIS ‘Inspection Insights’ - a public health-oriented food safety monthly column related to meat, poultry and egg products - from 1996 through 1998. She also increased international manuscript submissions.On 23 March 2009 AVMA Executive Vice President Dr W. Ron DeHaven named Dr Audin as editor-in-chief emeritus of the Publications Division. Wisely, it also meant that Dr Audin could continue contributing to the staff effort to ensure the high quality of the AVMA scientific journals

  11. Network management for 900-1300 MW PWR power plant industrial network

    International Nuclear Information System (INIS)

    Communication networks are a vital element in industrial information system projects. Because of the complexity of these networks, which are heterogeneous in terms of hardware, protocols and communication software, the need is now clear to consider them as applications in and of themselves. For this reason, EDF communication networks are now covered by system requirement specifications with SPRINT, and by an acceptance policy which calls for conformance certificates and defines methods for interoperability tests. Network management completes the picture, and attempts to provide the resources with which to assess present network status and manage communication networks. For this purpose, EDF has selected the OSI standard, which is based on four key concepts: - the ''Manager - Agent'' structural model, - a service (CMISE) and a protocol (CMIP) which enable exchange of management information, - an object-oriented management data model, -functions for: configuration, anomaly, performance and alarm management. This document presents the results of a project to integrate into a single management platform communication systems which do not conform to the OSI management recommendations. There were three major phases to the project: - a review of the OSI management model, and most particularly of the information model advocated; - a review of the resources to be managed and a comparison of the information provided by the different agents. Specifications were proposed for the management object and attribute classes which can usefully be implemented; - integration of ARLIC. During development of a breadboard version based on a BULL ISM platform for management of the power plant local area network, one possible solution for integration of ARLIC was proposed, describing the ARLIC information modeling along the lines of the OSI model. This project showed that it is possible to use the OSI modeling to represent management data manipulated by the communication software used on

  12. Network Cosmology

    CERN Document Server

    Krioukov, Dmitri; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguna, Marian

    2012-01-01

    Causal sets are an approach to quantum gravity in which the causal structure of spacetime plays a fundamental role. The causal set is a quantum network which underlies the fabric of spacetime. The nodes in this network are tiny quanta of spacetime, with two such quanta connected if they are causally related. Here we show that the structure of these networks in de Sitter spacetime, such as our accelerating universe, is remarkably similar to the structure of complex networks -- the brain or the Internet, for example. Specifically, we show that the node degree distribution of causal sets in de Sitter spacetime is described by a power law with exponent 2, similar to many complex networks. Quantifying the differences between the causal set structure in de Sitter spacetime and in the real universe, we find that since the universe today is relatively young, its power-law exponent is not 2 but 3/4, yet exponent 2 is currently emerging. Finally, we show that as a consequence of a simple geometric duality, the growth d...

  13. A peer-mediated social network intervention to enhance the social integration of persons with moderate and severe disabilities.

    OpenAIRE

    Haring, T G; Breen, C G

    1992-01-01

    Increasingly, parents, teachers, and students with disabilities are advocating for interventions that go beyond skill training to provide support for participation in integrated environments and support for friendships. The present research demonstrated a social network intervention for youths with moderate and severe disabilities. Two groups of nondisabled peers were recruited to participate in weekly discussions with an adult integration facilitator to increase opportunities for social inte...

  14. Network interruptions

    CERN Multimedia

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  15. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée;

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...... they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics....

  16. Innovation networks

    CERN Document Server

    Ahrweiler, Petra

    2013-01-01

    This paper advances a framework for modeling the component interactions between cognitive and social aspects of scientific creativity and technological innovation. Specifically, it aims to characterize Innovation Networks; those networks that involve the interplay of people, ideas and organizations to create new, technologically feasible, commercially-realizable products, processes and organizational structures. The tri-partite framework captures networks of ideas (Concept Level), people (Individual Level) and social structures (Social-Organizational Level) and the interactions between these levels. At the concept level, new ideas are the nodes that are created and linked, kept open for further investigation or closed if solved by actors at the individual or organizational levels. At the individual level, the nodes are actors linked by shared worldviews (based on shared professional, educational, experiential backgrounds) who are the builders of the concept level. At the social-organizational level, the nodes...

  17. Network dismantling

    CERN Document Server

    Braunstein, Alfredo; Semerjian, Guilhem; Zdeborová, Lenka

    2016-01-01

    We study the problem of network dismantling, that is of finding a minimal set of vertices whose removal leaves the network broken in connected components of sub-extensive size. For a large class of random graphs this problem is tightly connected to the decycling problem (the removal of vertices leaving the graph acyclic). Exploiting this connection and recent works on epidemic spreading we present precise predictions for the minimal size of a dismantling set in a large random graph with a prescribed (light-tailed) degree distribution. Building on the statistical mechanics perspective we propose a three-stage Min-Sum algorithm for efficiently dismantling networks, including heavy-tailed ones for which the dismantling and decycling problems are not equivalent. We also provide insight into the dismantling problem concluding that it is an intrinsically collective problem and optimal dismantling sets cannot be viewed as a collection of individually well performing nodes.

  18. Sentient Networks

    CERN Document Server

    Chapline, G

    1997-01-01

    In this paper we consider the question whether a distributed network of sensors and data processors can form "perceptions" based on the sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed "Helmholtz machine" architecture in which the collective state of the network as a whole provides an explanation for the sensory data.

  19. String Network

    OpenAIRE

    Sen, Ashoke

    1997-01-01

    Type IIB string theory admits a BPS configuration in which three strings (of different type) meet at a point. Using this three string configuration we construct a string network and study its properties. In particular we prove supersymmetry of this configuration. We also consider string lattices, which can be used to construct BPS states in toroidally compactified string theory.

  20. Implementation and Performance Evaluation of Distributed Cloud Storage Solutions using Random Linear Network Coding

    DEFF Research Database (Denmark)

    Fitzek, Frank; Toth, Tamas; Szabados, Áron;

    2014-01-01

    This paper advocates the use of random linear network coding for storage in distributed clouds in order to reduce storage and traffic costs in dynamic settings, i.e. when adding and removing numerous storage devices/clouds on-the-fly and when the number of reachable clouds is limited. We introduce...... various network coding approaches that trade-off reliability, storage and traffic costs, and system complexity relying on probabilistic recoding for cloud regeneration. We compare these approaches with other approaches based on data replication and Reed-Solomon codes. A simulator has been developed...... to carry out a thorough performance evaluation of the various approaches when relying on different system settings, e.g., finite fields, and network/storage conditions, e.g., storage space used per cloud, limited network use, and limited recoding capabilities. In contrast to standard coding approaches, our...

  1. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Heide, Janus; Roetter, Daniel Enrique Lucani;

    2016-01-01

    Although cloud systems provide a reliable and flexible storage solution, the use of a single cloud service constitutes a single point of failure, which can compromise data availability, download speed, and security. To address these challenges, we advocate for the use of multiple cloud storage...... providers simultaneously using network coding as the key enabling technology. Our goal is to study two challenges of network coded storage systems. First, the efficient update of the number of coded fragments per cloud in a system aggregating multiple clouds in order to boost the download speed of files. We...... developed a novel scheme using recoding with limited packets to trade-off storage space, reliability, and data retrieval speed. Implementation and measurements with commercial cloud providers show that up to 9x less network use is needed compared to other network coding schemes, while maintaining similar...

  2. Virtual network functions orchestration in wireless networks

    OpenAIRE

    Riggio, Roberto; Bradai, Abbas; Rasheed, Tinku; Schulz-Zander, Julius; Kuklinski, Slawomir; Ahmed, Toufik

    2015-01-01

    Network Function Virtualization (NFV) is emerging as one of the most innovative concepts in the networking landscape. By migrating network functions from dedicated mid-dleboxes to general purpose computing platforms, NFV can effectively reduce the cost to deploy and to operate large networks. However, in order to achieve its full potential, NFV needs to encompass also the radio access network allowing Mobile Virtual Network Operators to deploy custom resource allocation solutions within their...

  3. Ecological network analysis: network construction

    NARCIS (Netherlands)

    Fath, B.D.; Scharler, U.M.; Ulanowicz, R.E.; Hannon, B.

    2007-01-01

    Ecological network analysis (ENA) is a systems-oriented methodology to analyze within system interactions used to identify holistic properties that are otherwise not evident from the direct observations. Like any analysis technique, the accuracy of the results is as good as the data available, but t

  4. Network Security : Securing Network Equipment and Network Users’ Environment

    OpenAIRE

    Mbah, Mbah

    2010-01-01

    The purpose of this final year project is to research on new network security products and implementation techniques in order to enhance the current network security structure of Savonia University of Applied Sciences. This is very important because, it will avoid the university from suffering any major network attack associated with the present network security architecture. At the time this final project was approved, the university network security architecture was optimized...

  5. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  6. Network Security Scanner

    OpenAIRE

    G. MURALI; M.Pranavi; Y.Navateja; K. Bhargavi

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  7. Network Traffic Anomaly Detection

    OpenAIRE

    Huang, Hong; Al-Azzawi, Hussein; Brani, Hajar

    2014-01-01

    This paper presents a tutorial for network anomaly detection, focusing on non-signature-based approaches. Network traffic anomalies are unusual and significant changes in the traffic of a network. Networks play an important role in today's social and economic infrastructures. The security of the network becomes crucial, and network traffic anomaly detection constitutes an important part of network security. In this paper, we present three major approaches to non-signature-based network detect...

  8. Network Gravity

    CERN Document Server

    Lombard, John

    2016-01-01

    We introduce the construction of a new framework for probing discrete emergent geometry and boundary-boundary observables based on a fundamentally a-dimensional underlying network structure. Using a gravitationally motivated action with Forman weighted combinatorial curvatures and simplicial volumes relying on a decomposition of an abstract simplicial complex into realized embeddings of proper skeletons, we demonstrate properties such as a minimal volume-scale cutoff, the necessity of a positive-definite cosmological constant as a regulator for non-degenerate geometries, and naturally emergent simplicial structures from Metropolis network evolution simulations with no restrictions on attachment rules or regular building blocks. We see emergent properties which echo results from both the spinfoam formalism and causal dynamical triangulations in quantum gravity, and provide analytical and numerical results to support the analogy. We conclude with a summary of open questions and intent for future work in develop...

  9. Chemical networks

    Science.gov (United States)

    Thi, Wing-Fai

    2015-09-01

    This chapter discusses the fundamental ideas of how chemical networks are build, their strengths and limitations. The chemical reactions that occur in disks combine the cold phase reactions used to model cold molecular clouds with the hot chemistry applied to planetary atmosphere models. With a general understanding of the different types of reactions that can occur, one can proceed in building a network of chemical reactions and use it to explain the abundance of species seen in disks. One on-going research subject is finding new paths to synthesize species either in the gas-phase or on grain surfaces. Specific formation routes for water or carbon monoxide are discussed in more details. 13th Lecture of the Summer School "Protoplanetary Disks: Theory and Modelling Meet Observations"

  10. Socialist Networks

    OpenAIRE

    Agarez, Ricardo; Bechini, Thibault; Dalachanis, Angelos; El-Wakil, Leila; Gzowska, Alicja; James-Chakraborty, Kathleen; Kögel, Eduard; Kulić, Vladimir; Lagae, Johan; Schwenkel, Christina; Stanek, Łukasz; Zandi-Sayek, Sibel

    2014-01-01

    This issue of ABE focuses on the internationalization of building culture after WWII and the contributions of architects, planners, and engineers from socialist countries to these processes. Complementing the studies of colonial and postcolonial links, international organizations such as the UN, and economic globalization as conduits of the world-wide spread of architecture, this issue discusses the intersection of these networks with flows of labor power, materials, technologies, discourses ...

  11. Sentient Networks

    OpenAIRE

    Chapline, George

    1997-01-01

    In this paper we consider the question whether a distributed network of sensors and data processors can form "perceptions" based on the sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed "Helmholtz machine" architecture in which the collective state of...

  12. Neural networks

    Czech Academy of Sciences Publication Activity Database

    Vajda, Igor; Grim, Jiří

    Oxford : Eolss Publishers-UNESCO, 2008 - (Parra-Luna, F.), s. 224-248 ISBN 978-1-84826-654-4. - (Encyclopedia of Life Support Systems. Volume III) R&D Projects: GA ČR GA102/07/1594 Institutional research plan: CEZ:AV0Z10750506 Keywords : neural networks * probabilistic approach Subject RIV: BD - Theory of Information http://library.utia.cas.cz/separaty/2008/SI/vajda-systems science and cybernetics .pdf

  13. Conflict Networks

    OpenAIRE

    Franke, Jörg; Öztürk, Tahir

    2009-01-01

    Conflict parties are frequently involved into more than one conflict at a given time. In this paper the interrelated structure of conflictive relations is modeled as a conflict network where opponents are embedded in a local structure of bilateral conflicts. Conflict parties invest in specific conflict technology to attack their respective rivals and defend their own resources. We show that there exists a unique equilibrium for this conflict game and examine the relation between aggregated eq...

  14. Studying Fin Whales with Seafloor Seismic Networks

    Science.gov (United States)

    Wilcock, W. S.; Soule, D. C.; Weirathmueller, M.; Thomson, R.

    2011-12-01

    Baleen whales are found throughout the world's oceans and their welfare captivates the general public. Depending on the species, baleen whales vocalize at frequencies ranging from ~10 Hz to several kilohertz. Passive acoustic studies of whale calls are used to investigate behavior and habitat usage, monitor the recovery of populations from whaling and assess the impacts of anthropogenic sounds. Since airguns are a significant source of sound in the oceans, the research goals of academic seismologists can lead to conflicts with those who advocate for whale conservation while being unwilling to consider the societal benefits of marine geophysical studies. In contrast, studies that monitor earthquakes with ocean bottom seismometers (OBSs) provide an opportunity to enhance studies of baleen whales and improve relationships with environmental advocates. The bandwidth of the typical high-frequency or intermediate-band ocean bottom seismometer overlaps the call frequency of the two largest baleen whale species; blue whales generate sequences of 10- to 20-s-long calls centered at ~16 Hz and fin whales produce long sequences of downswept 1-s-long chirps centered at ~20 Hz. Several studies have demonstrated the potential of OBS networks to monitor calling patterns and determine tracks for fin and blue whales. We will summarize the results from a study to track fin whales near the Endeavour hydrothermal vent fields on the Juan de Fuca Ridge and investigate a potential correlation between the density of whales and enhanced zooplankton found throughout the water column overlying the vent fields. From 2003-2006 an 8-station local seismic network that was designed to monitor hydrothermal earthquakes also recorded ~300,000 fin whale vocalizations, mostly in the fall and winter. Automatic picking and localization techniques that are analogous to those used to analyze earthquakes are employed to determine whale tracks. The tracks are then used to interpret calling patterns in the

  15. Random linear network coding for streams with unequally sized packets: Overhead reduction without zero-padded schemes

    DEFF Research Database (Denmark)

    Taghouti, Maroua; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk;

    2016-01-01

    State of the art Random Linear Network Coding (RLNC) schemes assume that data streams generate packets with equal sizes. This is an assumption that results in the highest efficiency gains for RLNC. A typical solution for managing unequal packet sizes is to zero-pad the smallest packets. However......, the efficiency of this strategy depends heavily on the packet size distribution and can significantly curb the gains of network coding in practice. The work by Compta et al. showed that this strategy could introduce an overhead as high as 100\\% for Internet traffic. Our work advocates for an...

  16. Optimal design of systems that evolve over time using neural networks

    Science.gov (United States)

    Nolan, Michael K.

    2007-04-01

    Design optimization is challenging when the number of variables becomes large. One method of addressing this problem is to use pattern recognition to decrease the solution space in which the optimizer searches. Human "common sense" is used by designers to narrow the scope of search to a confined area defined by patterns conforming to likely solution candidates. However, computer-based optimization generally does not apply similar heuristics. In this paper, a system is presented that recognizes patterns and adjusts its search for optimal solutions based on these patterns. A design problem was selected that requires the optimization algorithm to assess designs that evolve over time. A small sensor network design is evolved into a larger sensor network design. Optimal design solutions for the small network do not necessarily lead to optimal solutions for the larger network. Systems that are well-positioned to evolve have characteristics that distinguish themselves from systems that are not well-positioned to evolve. In this study, a neural network was able to recognize a pattern whereby flexible sensor networks evolved more successfully than less flexible networks. The optimizing algorithm used this pattern to select candidate systems that showed promise for evolution. A genetic algorithm assisted by a neural network achieved better performance than an unassisted genetic algorithm did. This thesis advocates the merit of neural network use in multi-objective system design optimization and to lay a basis for future study.

  17. “Psychosocial Interventions for Cancer Survivors, Caregivers and Family Members—One Size Does Not Fit All: My Perspective as a Young Adult Survivor, Advocate and Oncology Social Worker” a personal reflection by Mary Grace Bontempo - Office of Cancer Survivorship

    Science.gov (United States)

    “Psychosocial Interventions for Cancer Survivors, Caregivers and Family Members—One Size Does Not Fit All: My Perspective as a Young Adult Survivor, Advocate and Oncology Social Worker” a personal reflection by Mary Grace Bontempo page

  18. Open innovation in networks

    DEFF Research Database (Denmark)

    Hu, Yimei

    Open innovation in networks has been a popular topic for long, this paper rethinks the concepts of innovation network and network organization, and clarifies the differences between them based on the network perspective. Network perspective means that: network is the context of firms; market...... and hierarchy can be analyzed from a network approach. Within a network perspective, there are different levels of network, and a firm may not always has the power to “manage” innovation networks due to different levels of power. Based on the strength of a firm’s power, its role may varies from manager...

  19. Geographical networks: geographical effects on network properties

    Institute of Scientific and Technical Information of China (English)

    Kong-qing YANG; Lei YANG; Bai-hua GONG; Zhong-cai LIN; Hong-sheng HE; Liang HUANG

    2008-01-01

    Complex networks describe a wide range of sys-tems in nature and society. Since most real systems exist in certain physical space and the distance between the nodes has influence on the connections, it is helpful to study geographi-cal complex networks and to investigate how the geographical constrains on the connections affect the network properties. In this paper, we briefly review our recent progress on geo-graphical complex networks with respect of statistics, mod-elling, robustness, and synchronizability. It has been shown that the geographical constrains tend to make the network less robust and less synchronizable. Synchronization on random networks and clustered networks is also studied.

  20. Network Management Framework for Wireless Sensor Networks

    Science.gov (United States)

    Kim, Jaewoo; Jeon, Hahnearl; Lee, Jaiyong

    Network Management is the process of managing, monitoring, and controlling the network. Conventional network management was based on wired network which is heavy and unsuitable for resource constrained WSNs. WSNs can have large scale network and it is impossible to manage each node individually. Also, polling mechanism of Simple Network Management Protocol (SNMP) impose heavy management traffic overhead. Since management messages consume resources of WSNs, it can affect the performance of the network. Therefore, it is necessary for WSNs to perform energy efficient network management. In this paper, we will propose network management framework. We will introduce cluster-based network management architecture, and classify the Management Information Base (MIB) according to their characteristics. Then, we will define management messages and message exchange operation for each kind of MIB. The analysis result of the management overhead indicates that the proposed framework can reduce management traffic compared to polling mechanism.

  1. Network epidemiology and plant trade networks

    OpenAIRE

    Pautasso, Marco; Jeger, Mike J.

    2014-01-01

    Models of epidemics in complex networks are improving our predictive understanding of infectious disease outbreaks. Nonetheless, applying network theory to plant pathology is still a challenge. This overview summarizes some key developments in network epidemiology that are likely to facilitate its application in the study and management of plant diseases. Recent surveys have provided much-needed datasets on contact patterns and human mobility in social networks, but plant trade networks are s...

  2. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  3. Genomic networks of hybrid sterility.

    Directory of Open Access Journals (Sweden)

    Leslie M Turner

    2014-02-01

    applicable in a broad range of organisms and we advocate for widespread adoption of a network-centered approach in speciation genetics.

  4. ENLIGHT Network

    CERN Multimedia

    Ballantine, A; Dixon-Altaber, H; Dosanjh, M; Kuchina, L

    2011-01-01

    State-of-the-art techniques borrowed from particle accelerators and detectors are a key element in hadrontherapy and several European projects are actively fostering the collaboration amongst the various disciplines and countries. ENLIGHT was established in 2002 to coordinate these European efforts in hadron therapy. The ENLIGHT network is formed by the European hadrontherapy Community, with more than 300 participants from twenty European countries. A major achievement of ENLIGHT has been the blending of traditionally separate communities so that clinicians, physicists, biologists and engineers with experience and interest in particle therapy are working together.

  5. Local Social Networks

    OpenAIRE

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social commun...

  6. Network Security with Cryptography

    OpenAIRE

    Prof. Mukund R. Joshi; Renuka Avinash Karkade

    2015-01-01

    Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Netw...

  7. Robustness of a Network of Networks

    Science.gov (United States)

    Gao, Jianxi; Buldyrev, Sergey V.; Stanley, H. Eugene; Havlin, Shlomo

    2012-02-01

    Network research has been focused on studying the properties of a single isolated network, which rarely exists. We develop a general analytical framework for studying percolation of n interdependent networks. We illustrate our analytical solutions for three examples: (i) For any tree of n fully dependent Erdos-R'enyi (ER) networks, each of average degree k, we find that the giant component P∞=p[1-(-kP∞)]^n where 1 - p is the initial fraction of removed nodes. This general result coincides for n = 1 with the known second-order phase transition for a single network. For any n>1 cascading failures occur and the percolation becomes an abrupt first-order transition. (ii) For a starlike network of n partially interdependent ER networks, P∞ depends also on the topology--in contrast to case (i). (iii) For a looplike network formed by n partially dependent ER networks, P∞ is independent of n.

  8. Network Monitoring with Zabbix

    OpenAIRE

    Shokhin, Anatolii

    2015-01-01

    Network monitoring became an essential part of any network size. It brings monitoring of network components 24/7. This provides clarity and transparency of network infrastructure and performance. With on time alert notification, network administrator may start failure troubleshooting immediately. As a result, end users may not even notice the issue.

  9. Decentralized Network Coding

    OpenAIRE

    Fragouli, C.; Soljanin, E.

    2004-01-01

    This paper proposes deterministic algorithms for decentralized network coding. Decentralized coding allows to locally specify the coding operations at network nodes without knowledge of the overall network topology, and to accommodate future changes in the network such as addition of receivers. To the best of our knowledge, these are the first deterministic decentralized algorithms proposed for network coding.

  10. Social Network Modelling

    OpenAIRE

    Pugacheva, E

    2015-01-01

    In the offered review some key issues of social network analysis are discussed. This is a brief summary of social network characteristics, models of network formation, and the network perspective. The aim of this overview is to contribute to interdisciplinary dialogue among researchers in physics, mathematics, sociology, who share a common interest in understanding the network phenomena.

  11. Pesquisa em contracepção: opinião de pesquisadores, sujeitos e defensoras dos direitos das mulheres Research on contraception: opinion of researchers, subjects and advocates of women rights

    Directory of Open Access Journals (Sweden)

    Ellen Hardy

    2004-12-01

    Full Text Available OBJETIVO: Conhecer a opinião de pesquisadores, de mulheres - sujeitos de pesquisa, e de defensoras dos direitos das mulheres sobre o significado de "pesquisa" e "cobaia". MÉTODOS: Pesquisadores (11, mulheres (18 e defensoras (10 foram entrevistados. O estudo foi qualitativo e a análise dos dados foi temática. RESULTADOS: Os participantes tiveram dificuldade em explicar o que é pesquisa; alguns não conseguiram. Para pesquisadores e maioria das mulheres, sujeitos de pesquisa não são cobaias, porque têm liberdade de escolha. Para a maioria das defensoras, sujeitos são cobaias, ainda que consintam em participar de um estudo. CONCLUSÕES: Foi surpreendente a dificuldade dos pesquisadores em explicar o que é pesquisa. As diferentes opiniões sobre o termo "cobaia" refletem a controvérsia sobre seu significado em pesquisa. Seguramente o termo "cobaia" não se aplica à maior parte dos estudos realizados hoje no Brasil, mas os diferentes significados identificados servem para alertar os pesquisadores a prestar atenção aos aspectos éticos de seus estudos.OBJECTIVE: To survey the opinion of researchers, women - subjects of research- and of advocates of women's rights about the meaning of "research" and "guinea pigs". Methods: Researchers (11, women (18 and advocates (10 were interviewed. The study was qualitative and a thematic analysis was carried out. RESULTS: Participants experienced difficulty to explain what research meant and some were unable to do so. For the researchers and most of the women, subjects are not guinea pigs, because they have freedom of choice. Most of the advocates, however, said that subjects are guinea pigs, even when they consent to participate in a study. CONCLUSIONS: The difficulty experienced by researchers when explaining the meaning of research was surprising. The different opinions about "guinea pig" reflect the controversy about its meaning in research. Certainly the expression "guinea pig" does not apply to

  12. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  13. A NOVEL QOS SCHEDULING FOR WIRELESS BROADBAND NETWORKS

    Directory of Open Access Journals (Sweden)

    D. David Neels Pon Kumar

    2010-09-01

    Full Text Available During the last few years, users all over the world have become more and more familiar to the availability of broadband access. When users want broadband Internet service, they are generally restricted to a DSL (Digital Subscribers Line, or cable-modem-based connection. Proponents are advocating worldwide interoperability for microwave access (WiMAX, a technology based on an evolving standard for point-to multipoint wireless networking. Scheduling algorithms that support Quality of Service (QoS differentiation and guarantees for wireless data networks are crucial to the deployment of broadband wireless networks. The performance affecting parameters like fairness, bandwidth allocation, throughput, latency are studied and found out that none of the conventional algorithms perform effectively for both fairness and bandwidth allocation simultaneously. Hence it is absolutely essential for an efficient scheduling algorithm with a better trade off for these two parameters. So we are proposing a novel Scheduling Algorithm using Fuzzy logic and Artificial neural networks that addresses these aspects simultaneously. The initial results show that a fair amount of fairness is attained while keeping the priority intact. Results also show that maximum channel utilization is achieved with a negligible increment in processing time.

  14. Interconnection networks

    Science.gov (United States)

    Faber, V.; Moore, J.W.

    1988-06-20

    A network of interconnected processors is formed from a vertex symmetric graph selected from graphs GAMMA/sub d/(k) with degree d, diameter k, and (d + 1)exclamation/ (d /minus/ k + 1)exclamation processors for each d greater than or equal to k and GAMMA/sub d/(k, /minus/1) with degree d /minus/ 1, diameter k + 1, and (d + 1)exclamation/(d /minus/ k + 1)exclamation processors for each d greater than or equal to k greater than or equal to 4. Each processor has an address formed by one of the permutations from a predetermined sequence of letters chosen a selected number of letters at a time, and an extended address formed by appending to the address the remaining ones of the predetermined sequence of letters. A plurality of transmission channels is provided from each of the processors, where each processor has one less channel than the selected number of letters forming the sequence. Where a network GAMMA/sub d/(k, /minus/1) is provided, no processor has a channel connected to form an edge in a direction delta/sub 1/. Each of the channels has an identification number selected from the sequence of letters and connected from a first processor having a first extended address to a second processor having a second address formed from a second extended address defined by moving to the front of the first extended address the letter found in the position within the first extended address defined by the channel identification number. The second address is then formed by selecting the first elements of the second extended address corresponding to the selected number used to form the address permutations. 9 figs.

  15. A Network-of-Networks Model for Electrical Infrastructure Networks

    CERN Document Server

    Halappanavar, Mahantesh; Hogan, Emilie; Duncan, Daniel; Zhenyu,; Huang,; Hines, Paul D H

    2015-01-01

    Modeling power transmission networks is an important area of research with applications such as vulnerability analysis, study of cascading failures, and location of measurement devices. Graph-theoretic approaches have been widely used to solve these problems, but are subject to several limitations. One of the limitations is the ability to model a heterogeneous system in a consistent manner using the standard graph-theoretic formulation. In this paper, we propose a {\\em network-of-networks} approach for modeling power transmission networks in order to explicitly incorporate heterogeneity in the model. This model distinguishes between different components of the network that operate at different voltage ratings, and also captures the intra and inter-network connectivity patterns. By building the graph in this fashion we present a novel, and fundamentally different, perspective of power transmission networks. Consequently, this novel approach will have a significant impact on the graph-theoretic modeling of powe...

  16. Hormone Health Network

    Science.gov (United States)

    ... reduce risk for other diseases The Hormone Health Network helps you and your health care provider have ... Copyright Endocrine Society. All rights reserved. Terms & Policies Network Partners The Hormone Health Network partners with other ...

  17. Visualization of Social Networks

    NARCIS (Netherlands)

    Boertjes, E.M.; Kotterink, B.; Jager, E.J.

    2011-01-01

    Current visualizations of social networks are mostly some form of node-link diagram. Depending on the type of social network, this can be some treevisualization with a strict hierarchical structure or a more generic network visualization.

  18. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    L.M. Camarinha-Matos; H. Afsarmanesh

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  19. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  20. Network robustness of correlated multiplex networks

    CERN Document Server

    Min, Byungjoon; Lee, Kyu-Min; Goh, K -I

    2013-01-01

    We study the network robustness properties of multiplex networks which contain multiple types of links, focusing on the role of correlation between degrees of a node in different layers. We use generating function formalism to address various types of network robustness of multiplex networks: the ordinary and mutual connectivity under random or targeted node removals as well as the biconnectivity. We found that correlated multiplexity can affect the resilience of networks in diverse ways. Specifically, for maximally-correlated multiplex networks, all pairs of nodes in the giant component are connected by at least two independent paths and networks structure is highly robust to random failures. In contrast, anti-correlated networks are resilient against attacks on targeted nodes with high degrees but vulnerable to random failures.

  1. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant;

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity....... Coding density tuning can be performed by designing time-dependent coding matrices. In multicast networks, this tuning can be performed within the network by designing time-dependent pre- coding and network coding matrices with mild conditions on the network structure for specific densities. We present a...

  2. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  3. Heterogeneous Economic Networks

    OpenAIRE

    Souma, Wataru; Fujiwara, Yoshi; Aoyama, Hideaki

    2005-01-01

    The Japanese shareholding network at the end of March 2002 is studied. To understand the characteristics of this network intuitively, we visualize it as a directed graph and an adjacency matrix. Especially detailed features of networks concerned with the automobile industry sector are discussed by using the visualized networks. The shareholding network is also considered as an undirected graph, because many quantities characterizing networks are defined for undirected cases. For this undirect...

  4. Wireless Fidelity Networks

    OpenAIRE

    Jäger, Vítězslav

    2009-01-01

    This work deals with main problems of wireless fidelity networks. In details it’s showing the terminology, used technical standards, network’s architecture and built-in security of wireless fidelity networks. For the question of the network’s security it’s handled regarding to VPN (Virtual Private Network) technology. Based on these theoretical assumptions there is new company’s network designed. This designed network offers combination of free wireless network with internet access and secure...

  5. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  6. Stem Cell Networks

    OpenAIRE

    Werner, Eric

    2016-01-01

    We present a general computational theory of stem cell networks and their developmental dynamics. Stem cell networks are special cases of developmental control networks. Our theory generates a natural classification of all possible stem cell networks based on their network architecture. Each stem cell network has a unique topology and semantics and developmental dynamics that result in distinct phenotypes. We show that the ideal growth dynamics of multicellular systems generated by stem cell ...

  7. Corporate Business Networking

    OpenAIRE

    Kanepeja, Zane

    2012-01-01

    Conscious networking is emerging as a mindset, similar to knowledge society, who were known for their drive for knowledge. The new network society is driven by a networking mindset. This emerging tendency of network requirement and usage in social environment sets a ”must- agenda” for companies to implement networking in their business strategies as companies in the current market situation do not only have to compete with each other but also with their networks. It is a sink or swim choice....

  8. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  9. Flexible Memory Networks

    OpenAIRE

    Curto, Carina; Degeratu, Anda; Itskov, Vladimir

    2010-01-01

    Networks of neurons in some brain areas are flexible enough to encode new memories quickly. Using a standard firing rate model of recurrent networks, we develop a theory of flexible memory networks. Our main results characterize networks having the maximal number of flexible memory patterns, given a constraint graph on the network's connectivity matrix. Modulo a mild topological condition, we find a close connection between maximally flexible networks and rank 1 matrices. The topological cond...

  10. Super sensor network

    OpenAIRE

    Fjukstad, Bård

    2008-01-01

    This dissertation studies composing a super sensor network from the combination of three functional sensor networks; A Sensor data producing network, a sensor data computing network and a sensor controlling network. The target devices are today labeled as large sensor nodes. The communication are based on an IP network using HTTP as the main protocol. Bonjour is used for service discovery, with some adjustments for technical reasons. This allows for naming and location of available servi...

  11. Spatially embedded random networks

    OpenAIRE

    Barnett, Lionel; Di Paolo, Ezequiel; Bullock, Seth

    2007-01-01

    Many real-world networks analyzed in modern network theory have a natural spatial element; e.g., the Internet, social networks, neural networks, etc. Yet, aside from a comparatively small number of somewhat specialized and domain-specific studies, the spatial element is mostly ignored and, in particular, its relation to network structure disregarded. In this paper we introduce a model framework to analyze the mediation of network structure by spatial embedding; specifically, we model connecti...

  12. Software Defined Networking for Heterogeneous Networks

    OpenAIRE

    Mendonca, Marc; Astuto, Bruno Nunes; Obraczka, Katia; Turletti, Thierry

    2013-01-01

    In this paper, motivated by the vision that future internets will comprise infrastructure--based and infrastructure--less networks, we explore the use of the Software-Defined Networking (SDN) paradigm in these so-called ''heterogeneous'' networked environments. To make the case for SDN in heterogeneous networks, we examine an application scenario in which SDN is a key enabling technology. We also identify the additional requirements imposed by the SDN paradigm and discuss the research challen...

  13. Software defined networking for community network testbeds

    OpenAIRE

    Dimogerontakis, Emmanouil; Vilalta, Ivan; Navarro Moldes, Leandro

    2013-01-01

    Wireless Community Networks have received increasing attention the latest years. In an effort to set the cornerstone for an internet without central authorities and monopolies, network engineers throughout the world have started creating community networks. To enhance this effort, Community-lab, a wireless community networks testbed, was created which allows researchers to experiment with new protocols and applications in a realistic environment. Nevertheless, this testbed does not offer the ...

  14. Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Ladislav Schwartz

    2006-01-01

    Full Text Available Two network types had been existing in Slovakia by the end of the year 2004 – public switched telephone network – PSTN and packet switched data network – DCN. The other network, known as the next generation network – NGN, has been put into operation since the beginning of the year 2005. The role of the next generation network is to merge the both previous network types into one unified complex network with the full centralised control, based on routing and packet switching. The T-Com company (previous Slovak Telecom was the first who did it.

  15. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  16. Defining Business Network

    Directory of Open Access Journals (Sweden)

    Raffaele Trequattrini

    2012-02-01

    Full Text Available The purpose of the present scientific contribution is to investigate from the business economics standpoing the emerging phenomenon of company networks. In particular, through the analysis of the theory of networks will be proposed the principal categories of business networks, and even before this the concept of the network will be defined. The proposed research, qualitatively, represents the point of departure for the study of the network phenomenon in light of the current economic phase termed “economy of knowledge”. Moreover, the research questions are the following: From where does the theory of networks arise? Do company networks consider themselves equal to knowledge networks?

  17. Enlightenment on Computer Network Reliability From Transportation Network Reliability

    OpenAIRE

    Hu Wenjun; Zhou Xizhao

    2011-01-01

    Referring to transportation network reliability problem, five new computer network reliability definitions are proposed and discussed. They are computer network connectivity reliability, computer network time reliability, computer network capacity reliability, computer network behavior reliability and computer network potential reliability. Finally strategies are suggested to enhance network reliability.

  18. Enlightenment on Computer Network Reliability From Transportation Network Reliability

    Directory of Open Access Journals (Sweden)

    Hu Wenjun

    2011-06-01

    Full Text Available Referring to transportation network reliability problem, five new computer network reliability definitions are proposed and discussed. They are computer network connectivity reliability, computer network time reliability, computer network capacity reliability, computer network behavior reliability and computer network potential reliability. Finally strategies are suggested to enhance network reliability.

  19. Making health policy: networks in research and policy after 1945.

    Science.gov (United States)

    Berridge, Virginia

    2005-01-01

    Science and policy in health and medicine have interacted in new ways in Britain since 1945. The relationship between research and policy has a history. The changing role of social medicine, the rise of health services research and "customer contractor" policies in government have been important. The relationship between research and policy has been analysed by different schools of thought. This chapter categorises them as several groups: "evidence-based", "journalism", "sociology of scientific knowledge" and "science policy studies". The chapters in the book illuminate aspects of these changing relationships. The role of chronic disease epidemiology, of new networks in public health, of media-focussed activism, and of health technology and its advocates have been more important than political interest. PMID:16212725

  20. Applied Ontology Engineering in Cloud Services, Networks and Management Systems

    CERN Document Server

    Serrano Orozco, J Martín

    2012-01-01

    Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems. �...

  1. Isomorphisms in Multilayer Networks

    CERN Document Server

    Kivelä, Mikko

    2015-01-01

    We extend the concept of graph isomorphisms to multilayer networks, and we identify multiple types of isomorphisms. For example, in multilayer networks with a single "aspect" (i.e., type of layering), permuting vertex labels, layer labels, and both of types of layers each yield a different type of isomorphism. We discuss how multilayer network isomorphisms naturally lead to defining isomorphisms in any type of network that can be represented as a multilayer network. This thereby yields isomorphisms for multiplex networks, temporal networks, networks with both such features, and more. We reduce each of the multilayer network isomorphism problems to a graph isomorphism problem, and we use this reduction to prove that the multilayer network isomorphism problem is computationally equally hard as the graph isomorphism problem. One can thus use software that has been developed to solve graph isomorphism problems as a practical means for solving multilayer network isomorphism problems.

  2. Formation of multiple networks

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    While most research in Social Network Analysis has focused on single networks, the availability of complex on-line data about individuals and their mutual heterogenous connections has recently determined a renewed interest in multi-layer network analysis. To the best of our knowledge, in this paper...... we introduce the first network formation model for multiple networks. Network formation models are among the most popular tools in traditional network studies, because of both their practical and theoretical impact. However, existing models are not sufficient to describe the generation of multiple...... networks. Our model, motivated by an empirical analysis of real multi-layered network data, is a conservative extension of single-network models and emphasizes the additional level of complexity that we experience when we move from a single- to a more complete and realistic multi-network context....

  3. Robustness of Interdependent Networks

    Science.gov (United States)

    Havlin, Shlomo

    2011-03-01

    In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This may happen recursively and can lead to a cascade of failures. In fact, a failure of a very small fraction of nodes in one network may lead to the complete fragmentation of a system of many interdependent networks. We will present a framework for understanding the robustness of interacting networks subject to such cascading failures and provide a basic analytic approach that may be useful in future studies. We present exact analytical solutions for the critical fraction of nodes that upon removal will lead to a failure cascade and to a complete fragmentation of two interdependent networks in a first order transition. Surprisingly, analyzing complex systems as a set of interdependent networks may alter a basic assumption that network theory has relied on: while for a single network a broader degree distribution of the network nodes results in the network being more robust to random failures, for interdependent networks, the broader the distribution is, the more vulnerable the networks become to random failure. We also show that reducing the coupling between the networks leads to a change from a first order percolation phase transition to a second order percolation transition at a critical point. These findings pose a significant challenge to the future design of robust networks that need to consider the unique properties of interdependent networks.

  4. Data center networks and network architecture

    Science.gov (United States)

    Esaki, Hiroshi

    2014-02-01

    This paper discusses and proposes the architectural framework, which is for data center networks. The data center networks require new technical challenges, and it would be good opportunity to change the functions, which are not need in current and future networks. Based on the observation and consideration on data center networks, this paper proposes; (i) Broadcast-free layer 2 network (i.e., emulation of broadcast at the end-node), (ii) Full-mesh point-to-point pipes, and (iii) IRIDES (Invitation Routing aDvertisement for path Engineering System).

  5. Network Externality: An Uncommon Tragedy

    OpenAIRE

    S. J. Liebowitz; Stephen E. Margolis

    1994-01-01

    Economists have defined 'network externality' and have examined putative inframarginal market failures associated with it. This paper distinguishes between network effects and network externalities, where the latter are market failures. The authors argue that while network effects are important, network externalities are theoretically fragile and empirically undocumented. Some network externalities are merely pecuniary. Network ownership or transactions among network participants can internal...

  6. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm;

    2016-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how such gender...

  7. Convex Congestion Network Problems

    OpenAIRE

    2004-01-01

    This paper analyzes convex congestion network problems.It is shown that for network problems with convex congestion costs, an algorithm based on a shortest path algorithm, can be used to find an optimal network for any coalition. Furthermore an easy way of determining if a given network is optimal is provided.

  8. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  9. Holographic neural networks

    OpenAIRE

    Manger, R

    1998-01-01

    Holographic neural networks are a new and promising type of artificial neural networks. This article gives an overview of the holographic neural technology and its possibilities. The theoretical principles of holographic networks are first reviewed. Then, some other papers are presented, where holographic networks have been applied or experimentally evaluated. A case study dealing with currency exchange rate prediction is described in more detail.

  10. About Network Telecom

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    NETWORK TELECOM magazine is the network & telecommunications industry's leading publication in China. specializing in the field of optic fiber communications, access network, mobile communications. CATV network,cabling system and data communications;and has established its reputation by a combination of authoritative editorial content, targeting a circulation of high quality covering the entire China region.

  11. About Network telecom

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    NETWORK TELECOM magazine, commenced publication in 1999, is the network & telecommunicationsindust0?s leading publication in China. specializing in the field of optic fiber communications, access network,mobile communications, CATV network,cabling system and data communications; and has established itsrepuion by a combination of authoritative editorial content, targeting a ckcuatlon of high o.uality covering theentire China regiom

  12. About Network Telecom

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    NETWORK TELECOM magazine is the network & telecommunications industry's leading publication in China, specializing in the field of optic fiber communications, access network, mobile communications, CATV network,cabling system and data communications; and has established its reputation by a combination of authoritative editorial content, targeting a circulation of high quality covering the entire China region.

  13. Engineering technology for networks

    Science.gov (United States)

    Paul, Arthur S.; Benjamin, Norman

    1991-01-01

    Space Network (SN) modeling and evaluation are presented. The following tasks are included: Network Modeling (developing measures and metrics for SN, modeling of the Network Control Center (NCC), using knowledge acquired from the NCC to model the SNC, and modeling the SN); and Space Network Resource scheduling.

  14. Extended Newick: it is time for a standard representation of phylogenetic networks

    Directory of Open Access Journals (Sweden)

    Valiente Gabriel

    2008-12-01

    Full Text Available Abstract Background Phylogenetic trees resulting from molecular phylogenetic analysis are available in Newick format from specialized databases but when it comes to phylogenetic networks, which provide an explicit representation of reticulate evolutionary events such as recombination, hybridization or lateral gene transfer, the lack of a standard format for their representation has hindered the publication of explicit phylogenetic networks in the specialized literature and their incorporation in specialized databases. Two different proposals to represent phylogenetic networks exist: as a single Newick string (where each hybrid node is splitted once for each parent or as a set of Newick strings (one for each hybrid node plus another one for the phylogenetic network. Results The standard we advocate as extended Newick format describes a whole phylogenetic network with k hybrid nodes as a single Newick string with k repeated nodes, and this representation is unique once the phylogenetic network is drawn or the ordering among children nodes is fixed. The extended Newick format facilitates phylogenetic data sharing and exchange, and also allows for the practical use of phylogenetic networks in computer programs and scripts. This standard has been recently agreed upon by a number of computational biologists, is already supported by several phylogenetic tools, and avoids the different drawbacks of using an a priori unknown number of Newick strings without any additional mark-up to represent a phylogenetic network. Conclusion The adoption of the extended Newick format as a standard for the representation of phylogenetic network is an important step towards the publication of explicit phylogenetic networks in peer-reviewed journals and their incorporation in a future database of published phylogenetic networks.

  15. The Global Virus Network: Challenging chikungunya.

    Science.gov (United States)

    McSweegan, Edward; Weaver, Scott C; Lecuit, Marc; Frieman, Matthew; Morrison, Thomas E; Hrynkow, Sharon

    2015-08-01

    The recent spread of chikungunya virus to the Western Hemisphere, together with the ongoing Ebola epidemic in West Africa, have highlighted the importance of international collaboration in the detection and management of disease outbreaks. In response to this need, the Global Virus Network (GVN) was formed in 2011. The GVN is a coalition of leading medical virologists in 34 affiliated laboratories in 24 countries, who collaborate to share their resources and expertise. The GVN supports research, promotes training for young scientists, serves as a technical resource for governments, businesses and international organizations, facilitates international scientific cooperation, and advocates for funding and evidence-based public policies. In response to the spread of chikungunya, the GVN formed a task force to identify research gaps and opportunities, including models of infection and disease, candidate vaccines and antivirals, epidemiology and vector control measures. Its members also serve as authoritative sources of information for the public, press, and policy-makers. This article forms part of a symposium in Antiviral Research on "Chikungunya discovers the New World". PMID:26071007

  16. Network simulation experiments manual

    CERN Document Server

    Aboelela, Emad

    2011-01-01

    Network Simulation Experiments Manual, Third Edition, contains simulation-based experiments to help students and professionals learn about key concepts in computer networking. The simulation approach provides a virtual environment for a wide range of desirable features, such as modeling a network based on specified criteria and analyzing its performance under different scenarios. The experiments include the basics of using OPNET IT Guru Academic Edition; operation of the Ethernet network; partitioning of a physical network into separate logical networks using virtual local area networks (V

  17. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  18. A logic for networks

    CERN Document Server

    Franceschet, Massimo

    2010-01-01

    Networks are pervasive in the real world. Nature, society, economy, and technology are supported by ostensibly different networks that in fact share an amazing number of interesting structural properties. Network thinking exploded in the last decade, boosted by the availability of large databases on the topology of various real networks, mainly the Web and biological networks, and converged to the new discipline of network analysis - the holistic analysis of complex systems through the study of the network that wires their components. Physicists mainly drove the investigation, studying the structure and function of networks using methods and tools of statistical mechanics. Here, we give an alternative perspective on network analysis, proposing a logic for specifying general properties of networks and a modular algorithm for checking these properties. The logic borrows from two intertwined computing fields: XML databases and model checking.

  19. Control of Multilayer Networks

    CERN Document Server

    Menichetti, Giulia; Bianconi, Ginestra

    2015-01-01

    The controllability of a network is a theoretical problem of relevance in a variety of contexts ranging from financial markets to the brain. Until now, network controllability has been characterized only on isolated networks, while the vast majority of complex systems are formed by multilayer networks. Here we build a theoretical framework for the linear controllability of multilayer networks by mapping the problem into a combinatorial matching problem. We found that correlating the external signals in the different layers can significantly reduce the multiplex network robustness to node removal, as it can be seen in conjunction with a hybrid phase transition occurring in interacting Poisson networks. Moreover we observe that multilayer networks can stabilize the fully controllable multiplex network configuration that can be stable also when the full controllability of the single network is not stable.

  20. Complex networks and computing

    Institute of Scientific and Technical Information of China (English)

    Shuigeng ZHOU; Zhongzhi ZHANG

    2009-01-01

    @@ Nowadays complex networks are pervasive in various areas of science and technology. Popular examples of complex networks include the Internet, social networks of collaboration, citations and co-authoring, as well as biological networks such as gene and protein interactions and others. Complex networks research spans across mathematics, computer science, engineering, biology and the social sciences. Even in computer science area, increasing problems are either found to be related to complex networks or studied from the perspective of complex networks, such as searching on Web and P2P networks, routing in sensor networks, language processing, software engineering etc. The interaction and mergence of complex networks and computing is inspiring new chances and challenges in computer science.

  1. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  2. Epidemics on Interconnected Networks

    CERN Document Server

    Dickison, M; Stanley, H E

    2012-01-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties, but will also interact with individuals in other networks. We study the susceptible-infected-recovered (SIR) process on interconnected network systems, and find two distinct regimes. In strongly-coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength $\\beta_c$, below which the disease does not spread. In contrast, in weakly-coupled network systems, a mixed phase exists below $\\beta_c$ of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  3. Security of computer networks

    OpenAIRE

    Kolář, Tomáš

    2012-01-01

    This thesis is focused on design and documentation of computer network and its security in the medium-sized company. First part of this thesis describes basics of computer networks, computer infiltrations, types of assault and preventive protection of corporate networks. The practical part of this thesis is devoted to documentation of the old corporate network and the complete design of a new computer network, its security against attacks and the loss corporate data.

  4. On bibliographic networks

    OpenAIRE

    Batagelj, Vladimir; Cerinšek, Monika

    2013-01-01

    In the paper we show that the bibliographic data can be transformed into a collection of compatible networks. Using network multiplication different interesting derived networks can be obtained. In defining them an appropriate normalization should be considered. The proposed approach can be applied also to other collections of compatible networks. We also discuss the question when the multiplication of sparse networks preserves sparseness. The proposed approaches are illustrated with analyses...

  5. Toward a network hospitality

    OpenAIRE

    Germann Molz, Jennie

    2014-01-01

    The growing popularity of online hospitality exchange networks like Couchsurfing and Airbnb point toward a new paradigm of sociality for a mobile and networked society as hospitable encounters among friends and strangers become entangled with social media and networking technologies. Inspired by Andreas Wittel’s notion of ‘network sociality’, this paper introduces the concept of ‘network hospitality’ to describe the kind of sociality that emerges around these new mobile, peer–to–peer, and onl...

  6. Generalized Network Externality Function

    OpenAIRE

    A. Paothong; G.S. Ladde

    2012-01-01

    In this work, we focus on the development of mathematical modeling of network externality processes. The introduction of the generalized network externality function provides a unified source of a tool for developing and analyzing the planning, policy and performance of the network externality process and network goods/services in a systematic way. This leads to fulfill all existing network externality assumptions as special cases. We study its properties and applications. This study provides...

  7. Stochastic Weighted Fractal Networks

    OpenAIRE

    Carletti, Timoteo

    2010-01-01

    In this paper we introduce new models of complex weighted networks sharing several properties with fractal sets: the deterministic non-homogeneous weighted fractal networks and the stochastic weighted fractal networks. Networks of both classes can be completely analytically characterized in terms of the involved parameters. The proposed algorithms improve and extend the framework of weighted fractal networks recently proposed in (T. Carletti & S. Righi, in press Physica A, 2010)

  8. Networks: An Economic Perspective

    CERN Document Server

    Jackson, Matthew O; Zenou, Yves

    2016-01-01

    We discuss social network analysis from the perspective of economics. We organize the presentaion around the theme of externalities: the effects that one's behavior has on others' well-being. Externalities underlie the interdependencies that make networks interesting. We discuss network formation, as well as interactions between peoples' behaviors within a given network, and the implications in a variety of settings. Finally, we highlight some empirical challenges inherent in the statistical analysis of network-based data.

  9. Open social network

    OpenAIRE

    Robas, Jan

    2012-01-01

    In this thesis we explore the possibilities of open social networks which could be connected with each other. In the first part we describe social networks in general and basic futures of most popular social networks, then we introduce the idea of open social network. We focus on the problem of monopoly position and privacy of social networks. In the middle section we describe research and development of the prototype that we developed using free technology over the idea of open social ...

  10. Network security - Firewalls

    OpenAIRE

    Nepovím, Bohuslav

    2012-01-01

    This thesis deals with the security of computer networks. A theoretical part gradually provides the description of fundamental principles of computer networks, computer network security, possible network attacks and protection against them, social engineering, functions of firewalls and various integration of the firewalls in the network. The practical part consequently describes personal firewall tests by means of the Nessus program, and utilities, so-called the leak tests. Whereas the Ne...

  11. Round Table Meeting Advocates IPR Protection

    Institute of Scientific and Technical Information of China (English)

    Sun Yongjian

    2005-01-01

    @@ Intellectual Property Rights(IPR) pro tection is a universal issue in the cur rent age. On December 8, a round table meeting was jointly held by China Council for the Promotion of Interna tional Trade(CCPIT) and United States Council for International Business (USCIB),especially focused on the issue.Attendees including Wang Jinzhen, Chairman Assistant,CCPIT,Wang Zhiguang,Director of Ministry of Security,Peter Robinson, President and CEO of USCIB performed speeches in the meeting.

  12. Round Table Meeting Advocates IPR Protection

    Institute of Scientific and Technical Information of China (English)

    Sun; Yongjian

    2005-01-01

      Intellectual Property Rights(IPR) pro tection is a universal issue in the cur rent age. On December 8, a round table meeting was jointly held by China Council for the Promotion of Interna tional Trade(CCPIT) and United States Council for International Business (USCIB),especially focused on the issue.Attendees including Wang Jinzhen, Chairman Assistant,CCPIT,Wang Zhiguang,Director of Ministry of Security,Peter Robinson, President and CEO of USCIB performed speeches in the meeting.……

  13. Are fathers underused advocates for breastfeeding?

    LENUS (Irish Health Repository)

    Kenosi, M

    2011-11-01

    Fathers\\' knowledge base and attitudes influence breastfeeding practice. We aimed to evaluate if Irish fathers felt included in the breastfeeding education and decision process. 67 fathers completed questionnaires, which assessed their role in the decision to breastfeed, knowledge regarding the benefits of breastfeeding and attitude towards breastfeeding.Forty-two (62.7%) of their partners were breastfeeding. Antenatal classes were attended by 38 (56.7%); 59 (88.1%) discussed breastfeeding with their partners and 26 (38.8%) felt that the decision was made together. Twelve (48%) fathers of formula fed infants were unaware that breastfeeding was healthier for the baby. Most fathers (80.6%) felt that breastfeeding was the mother\\'s decision and most (82.1%) felt that antenatal information was aimed at mothers only. Irish fathers remain relatively uninformed regarding the benefits of breastfeeding. This may contribute to their exclusion from the decision to breastfeed. Antenatal education should incorporate fathers more, and this may result in an improvement in our breastfeeding rates.

  14. When All Else Fails, Organize and Advocate

    Science.gov (United States)

    Prichard, Ami

    2014-01-01

    Caught in the perfect storm of a sour economy, declining home values, legislative tax hesitance, and growing unfunded mandates, a school district leads a campaign to raise local tax and bond levies to save jobs and enhance education.

  15. Default supply issues divides consumer advocates

    International Nuclear Information System (INIS)

    In Toronto, various agencies, all claiming to represent the best interests of consumers, have taken very different positions on the limits that should be placed on suppliers of standard electricity service, due to an unexpected effect of Ontario's market design. The debate has polarized into either support for the Market Design Committee's recommendations restricting local companies' distribution of electricity to one of passing on the spot market price to their standard customers or the view that municipal utilities should be permitted to enter into contracts for power in order to supply the needs of their standard service customers. The Independent Power Producers' Society of Ontario (IPPSO) takes the position that its member companies should have direct access to the default supply market and not to be forced to deal solely with the spot market to reach this market sector. This default market is expected to be the largest potential end use market in Ontario for the power produced and/or sold by IPPSO members. It is expected to be 70% of the total Ontario wholesale electricity market for many years to come

  16. "PEERLESS ADVOCATE: DANA’S CHRONICLE"

    Directory of Open Access Journals (Sweden)

    Douglas Steeples

    2002-01-01

    Full Text Available In July, 1865, William Buck Dana began to publish the Commercial and Financial Chronicle, in New York City. The Chronicle took for its model The Economist of London. Dana’s recognition of the importance of the telegraph, steam-ships and railroads as new means of conveying accurate and current information for the conduct of domestic and global business were crucial in the rise of his paper to preeminence among American commercial publications. Constant efforts to optimize the use of capital, maximize operational efficiency, stay abreast of and employ technological advances, and add useful features enlarged its value and success. These qualities and Dana’s singular attunement to the temper of his times and his readers assured that the Chronicle's primacy would linger long after his death in 1910.

  17. The Hospice: Advocate for the Dying.

    Science.gov (United States)

    Anspaugh, David J.

    1978-01-01

    The hospice philosophy seeks to meet the needs of dying patients and their families. These needs include: effective control of pain; to be loved and to alleviate loneliness; to retain dignity and maintain control of as many aspects of life as possible; and to help the family be supportive and adapt to their inevitable loss. (JMF)

  18. Organizations Advocating for Youth: The Local Advantage

    Science.gov (United States)

    Deschenes, Sarah; McLaughlin, Milbrey; Newman, Anne

    2008-01-01

    Youth occupy a unique place in democratic society. They must primarily rely on others to speak on their behalf as decisions are made about the allocation of resources within and across various youth-serving institutions. Advocacy organizations comprise crucial representational assets for all youth, but America's poorest children and youth…

  19. Christian Social Justice Advocate: Contradiction or Legacy?

    Science.gov (United States)

    Edwards, Cher N.

    2012-01-01

    In this article, the relationship between Christian religiosity and the principles of social justice is explored, including the sociopolitical aspects of faith and advocacy. A particular emphasis is placed on the historical legacy and theological relationships between Christianity and social justice. The author concludes with a call for…

  20. Chemical Compatibility and Safety of Imidacloprid/Flumethrin Collar (Seresto®) Concomitantly Used with Imidacloprid/Moxidectin (Advocate®, Advantage® Multi) and Emodepside/Praziquantel (Profender®) Spot-on Formulations.

    Science.gov (United States)

    Krüdewagen, Eva Maria; Remer, Carolin; Deuster, Katrin; Schunack, Bettina; Wolken, Sonja; Crafford, Dionne; Fourie, Josephus; Stanneck, Dorothee

    2015-08-01

    Safety of concomitant use of veterinary products is of clinical interest. A series of studies was performed to evaluate the chemical compatibility and short term dermal and systemic safety of an imidacloprid/flumethrin collar (Seresto(®)/ Foresto(®), Bayer) used concomitantly with spot-on or tablet formulations.Chemical compatibility was evaluated in-vitro (study reference A) on collar pieces, followed by two small, non-controlled clinical studies (study reference B) in both, cats and dogs. The studies showed, that certain solvents affected the collar in-vitro, but not in their marketed formulations.Dermal and systemic safety of different spot-on or tablet formulations was first evaluated in a small, non-controlled clinical study (study reference C) in cats and dogs, via clinical observations only, followed by controlled clinical safety studies of concomitant use with imidacloprid/ moxidectin (Advocate(®)/ Advantage(®) Multi, Bayer) in dogs and cats (study reference D) and emodepside/ praziquantel (Profender(®), Bayer) in cats (study reference E), assessing safety aspects by clinical observations and statistical analyses of hematology and clinical chemistry parameters compared to baseline values and between treated and control groups.Dermal safety findings over all clinical studies (study references B to E) matched those already described for the respective products and included transient cosmetic changes (oily hair and crystal formation) at the site of spot-on application and broken hair, transient alopecia and skin alterations at the site of collar application. There were no indications of these findings aggravating under the conditions of concurrent use. There were no systemic safety findings of clinical significance in any of the clinical safety studies (study reference C to E). Assessment of blood parameters revealed some deviations from baseline levels and from the reference range in dogs as well as in cats, but no clinical relevance could be deduced

  1. Complex networks theory for analyzing metabolic networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Jing; YU Hong; LUO Jianhua; CAO Z.W.; LI Yixue

    2006-01-01

    One of the main tasks of post-genomic informatics is to systematically investigate all molecules and their interactions within a living cell so as to understand how these molecules and the interactions between them relate to the function of the organism,while networks are appropriate abstract description of all kinds of interactions. In the past few years, great achievement has been made in developing theory of complex networks for revealing the organizing principles that govern the formation and evolution of various complex biological, technological and social networks. This paper reviews the accomplishments in constructing genome-based metabolic networks and describes how the theory of complex networks is applied to analyze metabolic networks.

  2. Minimal Increase Network Coding for Dynamic Networks.

    Science.gov (United States)

    Zhang, Guoyin; Fan, Xu; Wu, Yanxia

    2016-01-01

    Because of the mobility, computing power and changeable topology of dynamic networks, it is difficult for random linear network coding (RLNC) in static networks to satisfy the requirements of dynamic networks. To alleviate this problem, a minimal increase network coding (MINC) algorithm is proposed. By identifying the nonzero elements of an encoding vector, it selects blocks to be encoded on the basis of relationship between the nonzero elements that the controls changes in the degrees of the blocks; then, the encoding time is shortened in a dynamic network. The results of simulations show that, compared with existing encoding algorithms, the MINC algorithm provides reduced computational complexity of encoding and an increased probability of delivery. PMID:26867211

  3. Software Defined Networking and Virtualization for Broadband Satellite Networks

    OpenAIRE

    Bertaux, Lionel; Medjiah, Samir; Berthou, Pascal; Abdellatif, Slim; Hakiri, Akram; Gelard, Patrick; Planchou, Fabrice; De Bruyère, Marc

    2015-01-01

    Satellite networks have traditionally been considered for specific purposes. Recently, new satellite technologies have been pushed to the market enabling high-performance satellite access networks. On the other hand, network architectures are taking advantages from emerging technologies such as Software-Defined Networking (SDN), network virtualization and Network Functions Virtualization (NFV). Therefore, benefiting communications services over satellite networks from these new technologies a...

  4. Social Network Analysis Based on Network Motifs

    OpenAIRE

    Xu Hong-lin; Yan Han-bing; Gao Cui-fang; Zhu Ping

    2014-01-01

    Based on the community structure characteristics, theory, and methods of frequent subgraph mining, network motifs findings are firstly introduced into social network analysis; the tendentiousness evaluation function and the importance evaluation function are proposed for effectiveness assessment. Compared with the traditional way based on nodes centrality degree, the new approach can be used to analyze the properties of social network more fully and judge the roles of the nodes effectively. I...

  5. Online social networks and networked academic identity

    OpenAIRE

    Jordan, Katy

    2014-01-01

    Academic online social networking has received increasing focus in recent years with the development of a number of services aimed specifically at academics. There has, however, been little empirical work on the subject. This study  seeks  to  understand  the  structure  and  role  of  academics’  ego-networks on social networking sites in relation to developing an academic identity and becoming professional in their disciplines. To this end, a mixed-methods social network analysis approach w...

  6. Network Percolation Based on Complex Network

    Directory of Open Access Journals (Sweden)

    Yong Zhang

    2013-08-01

    Full Text Available Network percolation model is an abstraction of many practical problems, while the spread of the disease model can be described by percolation model. The problem of the spread of the disease has been the focus of academia and the medical. Recently years, the complex network is a true reflection of the some important characteristics of the system, which is the effective means to study realistic network. In this paper, we will introduce the complex networks and network percolation. We will research the disease propagation model while research the network percolation based on complex network. We will summary and analysis the two traditional disease propagation model—SIR and SIS. And it can provide some important reference for controlling the spread of the virus.  In this paper we will analyze the propagation of SIR model when consider the propagation media and the reflection SIS model. At last we will use some experiments to verify the results of those two models. And we can know that the complex network can accurate analyze the network percolation model such as disease propagation model.

  7. Weighted Multiplex Networks

    CERN Document Server

    Menichetti, Giulia; Panzarasa, Pietro; Mondragón, Raúl J; Bianconi, Ginestra

    2013-01-01

    One of the most important challenges in network science is to quantify the information encoded in complex network structures. Disentangling randomness from organizational principles is even more demanding when networks have a multiplex nature. Multiplex networks are multilayer systems of $N$ nodes that can be linked in multiple interacting and co-evolving layers. In these networks, relevant information might not be captured if the single layers were analyzed separately. Here we demonstrate that such partial analysis of layers fails to capture significant correlations between weights and topology of complex multiplex networks. To this end, we study two weighted multiplex co-authorship and citation networks involving the authors included in the American Physical Society. We show that in these networks weights are strongly correlated with multiplex structure, and provide empirical evidence in favor of the advantage of studying weighted measures of multiplex networks, such as multistrength and the inverse multipa...

  8. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  9. Emergent Complex Network Geometry

    CERN Document Server

    Wu, Zhihao; Rahmede, Christoph; Bianconi, Ginestra

    2014-01-01

    Networks are mathematical structures that are universally used to describe a large variety of complex systems such as the brain or the Internet. Characterizing the geometrical properties of these networks has become increasingly relevant for routing problems, inference and data mining. In real growing networks, topological, structural and geometrical properties emerge spontaneously from their dynamical rules. Nevertheless we still miss a model in which networks develop an emergent complex geometry. Here we show that a single two parameter network model, the growing geometrical network, can generate complex network geometries with non-trivial distribution of curvatures, combining exponential growth and small-world properties with finite spectral dimensionality. In one limit, the non-equilibrium dynamical rules of these networks can generate scale-free networks with clustering and communities, in another limit planar random geometries with non-trivial modularity. Finally we find that these properties of the geo...

  10. Wayfinding in Social Networks

    Science.gov (United States)

    Liben-Nowell, David

    With the recent explosion of popularity of commercial social-networking sites like Facebook and MySpace, the size of social networks that can be studied scientifically has passed from the scale traditionally studied by sociologists and anthropologists to the scale of networks more typically studied by computer scientists. In this chapter, I will highlight a recent line of computational research into the modeling and analysis of the small-world phenomenon - the observation that typical pairs of people in a social network are connected by very short chains of intermediate friends - and the ability of members of a large social network to collectively find efficient routes to reach individuals in the network. I will survey several recent mathematical models of social networks that account for these phenomena, with an emphasis on both the provable properties of these social-network models and the empirical validation of the models against real large-scale social-network data.

  11. Peak loads and network investments in sustainable energy transitions

    International Nuclear Information System (INIS)

    Current energy distribution networks are often not equipped for facilitating expected sustainable transitions. Major concerns for future electricity networks are the possibility of peak load increases and the expected growth of decentralized energy generation. In this article, we focus on peak load increases; the effects of possible future developments on peak loads are studied, together with the consequences for the network. The city of Eindhoven (the Netherlands) is used as reference city, for which a scenario is developed in which the assumed future developments adversely influence the maximum peak loads on the network. In this scenario, the total electricity peak load in Eindhoven is expected to increase from 198 MVA in 2009 to 591-633 MVA in 2040. The necessary investments for facilitating the expected increased peak loads are estimated at 305-375 million Euros. Based upon these projections, it is advocated that - contrary to current Dutch policy - choices regarding sustainable transitions should be made from the viewpoint of integral energy systems, evaluating economic implications of changes to generation, grid development, and consumption. Recently applied and finished policies on energy demand reduction showed to be effective; however, additional and connecting policies on energy generation and distribution should be considered on short term. - Highlights: → Sustainable energy transitions can result in major electricity peak load increases. → Introduction of heat pumps and electrical vehicles requires network expansion. → Under worst case assumptions, peak loads in Eindhoven increase with 200% until 2040. → The necessary investment for facilitating this 2040 peak demand is Euro 305-375 million. → Future policy choices should be made from the viewpoint of the integral energy system.

  12. Peak loads and network investments in sustainable energy transitions

    Energy Technology Data Exchange (ETDEWEB)

    Blokhuis, Erik, E-mail: e.g.j.blokhuis@tue.nl [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands); Brouwers, Bart [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands); Putten, Eric van der [Endinet, Gas and Electricity Network Operations, P.O. Box 2005, 5600CA Eindhoven (Netherlands); Schaefer, Wim [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands)

    2011-10-15

    Current energy distribution networks are often not equipped for facilitating expected sustainable transitions. Major concerns for future electricity networks are the possibility of peak load increases and the expected growth of decentralized energy generation. In this article, we focus on peak load increases; the effects of possible future developments on peak loads are studied, together with the consequences for the network. The city of Eindhoven (the Netherlands) is used as reference city, for which a scenario is developed in which the assumed future developments adversely influence the maximum peak loads on the network. In this scenario, the total electricity peak load in Eindhoven is expected to increase from 198 MVA in 2009 to 591-633 MVA in 2040. The necessary investments for facilitating the expected increased peak loads are estimated at 305-375 million Euros. Based upon these projections, it is advocated that - contrary to current Dutch policy - choices regarding sustainable transitions should be made from the viewpoint of integral energy systems, evaluating economic implications of changes to generation, grid development, and consumption. Recently applied and finished policies on energy demand reduction showed to be effective; however, additional and connecting policies on energy generation and distribution should be considered on short term. - Highlights: > Sustainable energy transitions can result in major electricity peak load increases. > Introduction of heat pumps and electrical vehicles requires network expansion. > Under worst case assumptions, peak loads in Eindhoven increase with 200% until 2040. > The necessary investment for facilitating this 2040 peak demand is Euro 305-375 million. > Future policy choices should be made from the viewpoint of the integral energy system.

  13. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  14. Networks design and management

    CERN Document Server

    Karris, Steven

    2009-01-01

    Networks are growing in size and complexity and this trend has created a rapid increase for networking engineers to provide practical and efficient solutions. Networking needs vary from one network to another; there is no such thing as ""one size fits all."" Also, a properly designed network must allow for expansion. The management of a small company may feel that this advanced technology is of no use to them since their monetary budget is limited. However, with proper planning, small companies can start with an affordable and versatile network and later expand on the next level of affordabili

  15. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  16. Robustness of networks

    OpenAIRE

    Wang, H.

    2009-01-01

    Our society depends more strongly than ever on large networks such as transportation networks, the Internet and power grids. Engineers are confronted with fundamental questions such as “how to evaluate the robustness of networks for a given service?”, “how to design a robust network?”, because networks always affect the functioning of a service. Robustness is an important issue for many complex networks, on which various dynamic processes or services take place. In this work, we define robust...

  17. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  18. Defining Business Network

    Directory of Open Access Journals (Sweden)

    Raffaele Trequattrini

    2012-02-01

    Full Text Available The purpose of the present scientific contribution is to investigate from the businesseconomics standpoing the emerging phenomenon of company networks. In particular,through the analysis of the theory of networks will be proposed the principal categories ofbusiness networks, and even before this the concept of the network will be defined. Theproposed research, qualitatively, represents the point of departure for the study of thenetwork phenomenon in light of the current economic phase termed “economy of knowledge”.Moreover, the research questions are the following: From where does the theory of networksarise? Do company networks consider themselves equal to knowledge networks?

  19. Strategic Network Disruption and Defense

    OpenAIRE

    K.J.M. De Jaegher; Hoyer, B

    2010-01-01

    Networks are one of the essential building blocks of society. Not only do firms cooperate in R&D networks, but firms themselves may be seen as networks of information-exchanging workers. Social movements increasingly make use of networks to exchange information, just as on the negative side criminal and terrorist networks use them. However, the literature on networks has mainly focused on the cooperative side of networks and has so far neglected the competition side of networks. Networks them...

  20. Actor-networking ceta-sociality, or, what is sociological about contemporary whales?

    DEFF Research Database (Denmark)

    Blok, Anders

    2007-01-01

    to near-sacrosanct agent, is far from self-evident. This article advocates a change of theoretical perspective, inspired by the work of actor-network theorists Bruno Latour and Michel Callon. Rather than focussing solely on the ‘humanity' of human-animal relations, as does most of sociology, actor......-network theory (ANT) allows for the inclusion of non-human ‘actants' (like whales) into the fabric of sociality. In the ontology of ANT, sociality emerges as semiotic-material configurations of humans, animals and technologies. Starting from a critical review of the work by Adrian Franklin on growing...... ‘zoocentrism' in late modernity, the article proceeds by demonstrating how an ‘ecologised' ANT sociology contributes towards a better understanding of the emergence of whale ‘actor-hood' in global society. In broader terms, the article argues that as societies themselves ecologise by weaving ever...

  1. Interdisciplinary Approach to the Mental Lexicon: Neural Network and Text Extraction From Long-term Memory

    Directory of Open Access Journals (Sweden)

    Vardan G. Arutyunyan

    2013-01-01

    Full Text Available The paper touches upon the principles of mental lexicon organization in the light of recent research in psycho- and neurolinguistics. As a focal point of discussion two main approaches to mental lexicon functioning are considered: modular or dual-system approach, developed within generativism and opposite single-system approach, representatives of which are the connectionists and supporters of network models. The paper is an endeavor towards advocating the viewpoint that mental lexicon is complex psychological organization based upon specific composition of neural network. In this regard, the paper further elaborates on the matter of storing text in human mental space and introduces a model of text extraction from long-term memory. Based upon data available, the author develops a methodology of modeling structures of knowledge representation in the systems of artificial intelligence.

  2. Stochastic Petri nets for the reliability analysis of communication network applications with alternate-routing

    International Nuclear Information System (INIS)

    In this paper, we present a comparative reliability analysis of an application on a corporate B-ISDN network under various alternate-routing protocols. For simple cases, the reliability problem can be cast into fault-tree models and solved rapidly by means of known methods. For more complex scenarios, state space (Markov) models are required. However, generation of large state space models can get very labor intensive and error prone. We advocate the use of stochastic reward nets (a variant of stochastic Petri nets) for the concise specification, automated generation and solution of alternate-routing protocols in networks. This paper is written in a tutorial style so as to make it accessible to a large audience

  3. Network biomarkers, interaction networks and dynamical network biomarkers in respiratory diseases

    OpenAIRE

    Wu, Xiaodan; Chen, Luonan; Wang, Xiangdong

    2014-01-01

    Identification and validation of interaction networks and network biomarkers have become more critical and important in the development of disease-specific biomarkers, which are functionally changed during disease development, progression or treatment. The present review headlined the definition, significance, research and potential application for network biomarkers, interaction networks and dynamical network biomarkers (DNB). Disease-specific interaction networks, network biomarkers, or DNB...

  4. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  5. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social and...... policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs), and...... stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  6. Networks and Networking - A Statistical Physics Perspective

    CERN Document Server

    Yeung, Chi Ho

    2013-01-01

    Efficient networking in communication systems, both wired and wireless, has a substantial economic and societal impact. While communication networks become increasingly more complex, the ever increasing demand for higher transmission volume, quality of service, robustness and reduced energy consumption require new tools and methods to meet these conflicting pressures. The new methodology should serve for gaining better understanding of the properties of these networks at the macroscopic level, as well as for the development of new principled optimization and management algorithms at the microscopic level. Methods of statistical physics seem the best place to start the search for new approaches as they have been developed specifically to deal with non-linear large scale systems. This review aims at presenting an overview of tools that have been developed within the statistical physics community and that can be readily applied to address the emerging problems in networking. As network properties are at the hear...

  7. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  8. Bladder Cancer Advocacy Network

    Science.gov (United States)

    ... future bladder cancer research through the Patient Survey Network. Read More... Don’t Miss the 2016 BCAN ... Click here for more details Bladder Cancer Advocacy Network 4915 St. Elmo Avenue, Suite 202 Bethesda, Maryland ...

  9. Class network routing

    Science.gov (United States)

    Bhanot, Gyan; Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  10. Learning to Generate Networks

    CERN Document Server

    Atwood, James

    2014-01-01

    The recent explosion in social network data has stimulated interest in probabilistic models of networks. Such models are appealing because they are empirically grounded; in contrast to more traditional network models, their parameters are estimated from data, and the models are evaluated on how well they represent the data. The exponential random graph model (ERGM, or, alternatively $p^*$) is currently the dominant framework for probabilistic network modeling. Despite their popularity, ERGMs suffer from a very serious flaw: near degeneracy. Briefly, an ERGM fit to a network or set of networks often ends up generating networks that look nothing at all like the training data. It is deeply troubling that the most likely model will generate instances that look nothing like data, and this calls the validity of models into question. In this work, we seek to address the general problem of learning to generate networks that do look like data. This is a large, challenging problem. To gain an understanding, we decompos...

  11. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  12. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  13. Intelligent metro network

    Science.gov (United States)

    Luo, Zhongsheng; Kan, Yulun; Wang, Licun

    2001-10-01

    Metro networks have evolved dynamically since its position in the network infrastructure. To gain competitive advantage in this attractive market, carriers should emphasize not only just the power of their networks in terms of the speed, number of channels, distance covered, but also the network's versatility in supporting variety of access interfaces, flexibility in bandwidth provisioning, ability of differentiated service offering, and capability of network management. Based on an overview of four emerging metro network technologies, an intelligent metro network control platform is introduced. The intelligent control platform is necessary for carriers to meet the new metro requirements. Intelligent control and management functions of the platform are proposed respectively. Intelligent metro network will bridge the metro gap and open up a whole new set of services and applications.

  14. Concurrency and network disassortativity.

    Science.gov (United States)

    Khor, Susan

    2010-01-01

    The relationship between a network's degree-degree correlation and a loose version of graph coloring is studied on networks with broad degree distributions. We find that, given similar conditions on the number of nodes, number of links, and clustering levels, fewer colors are needed to color disassortative than assortative networks. Since fewer colors create fewer independent sets, our finding implies that disassortative networks may have higher concurrency potential than assortative networks. This in turn suggests another reason for the disassortative mixing pattern observed in biological networks such as those of protein-protein interaction and gene regulation. In addition to the functional specificity and stability suggested by Maslov and Sneppen, a disassortative network topology may also enhance the ability of cells to perform crucial tasks concurrently. Hence, increased concurrency may also be a driving force in the evolution of biological networks. PMID:20586579

  15. Directed network modules

    CERN Document Server

    Pálla, G; Farkas, I J; Pollner, P; Vicsek, T; Derenyi, Imre; Farkas, Illes J.; Palla, Gergely; Pollner, Peter; Vicsek, Tamas

    2007-01-01

    A search technique locating network modules, i.e., internally densely connected groups of nodes in directed networks is introduced by extending the Clique Percolation Method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own webpages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and among Google's webpages the overlaps are likely to contain in-hubs, whereas the modules in the email and t...

  16. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  17. Flexible memory networks.

    Science.gov (United States)

    Curto, Carina; Degeratu, Anda; Itskov, Vladimir

    2012-03-01

    Networks of neurons in some brain areas are flexible enough to encode new memories quickly. Using a standard firing rate model of recurrent networks, we develop a theory of flexible memory networks. Our main results characterize networks having the maximal number of flexible memory patterns, given a constraint graph on the network's connectivity matrix. Modulo a mild topological condition, we find a close connection between maximally flexible networks and rank 1 matrices. The topological condition is H (1)(X;ℤ)=0, where X is the clique complex associated to the network's constraint graph; this condition is generically satisfied for large random networks that are not overly sparse. In order to prove our main results, we develop some matrix-theoretic tools and present them in a self-contained section independent of the neuroscience context. PMID:21826564

  18. Cooperative Hurricane Network Obs

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations from the Cooperative Hurricane Reporting Network (CHURN), a special network of stations that provided observations when tropical cyclones approached...

  19. Time and Citation Networks

    CERN Document Server

    Clough, James R

    2015-01-01

    Citation networks emerge from a number of different social systems, such as academia (from published papers), business (through patents) and law (through legal judgements). A citation represents a transfer of information, and so studying the structure of the citation network will help us understand how knowledge is passed on. What distinguishes citation networks from other networks is time; documents can only cite older documents. We propose that existing network measures do not take account of the strong constraint imposed by time. We will illustrate our approach with two types of causally aware analysis. We apply our methods to the citation networks formed by academic papers on the arXiv, to US patents and to US Supreme Court judgements. We show that our tools can reveal that citation networks which appear to have very similar structure by standard network measures turn out to have significantly different properties. We interpret our results as indicating that many papers in a bibliography were not directly...

  20. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  1. Energy Sciences Network (ESnet)

    Data.gov (United States)

    Federal Laboratory Consortium — The Energy Sciences Network is the Department of Energy’s high-speed network that provides the high-bandwidth, reliable connections that link scientists at national...

  2. National Lymphedema Network

    Science.gov (United States)

    ... and article archives // Knowledge and support National Lymphedema Network News Stay up to date with NLN activities and goings-on. Follow the National Lymphedema Network newsfeed below. Also, see the following links for ...

  3. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.;

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project.......Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  4. Networked learning environments

    OpenAIRE

    Jones, Chris

    2011-01-01

    This chapter introduces the idea of networked learning environments and argues that these environments provide the totality of surrounding conditions for learning in digital networks. It provides illustrative vignettes of the ways that students appropriate networked environments for learning. The chapter then examines the notion of networked learning environments in relation to the idea of infrastructure and infrastructures for learning and sets out some issues arising from this perspective. ...

  5. Local network assessment

    Science.gov (United States)

    Glen, D. V.

    1985-04-01

    Local networks, related standards activities of the Institute of Electrical and Electronics Engineers the American National Standards Institute and other elements are presented. These elements include: (1) technology choices such as topology, transmission media, and access protocols; (2) descriptions of standards for the 802 local area networks (LAN's); high speed local networks (HSLN's) and military specification local networks; and (3) intra- and internetworking using bridges and gateways with protocols Interconnection (OSI) reference model. The convergence of LAN/PBX technology is also described.

  6. Social Networking and Health

    OpenAIRE

    Kevin Curran; Michael Mc Hugh

    2013-01-01

    The rise of social networking has revolutionised how people communicate on a daily basis. In a world where more people are connecting to the internet, social networking services create an immediate communication link between users. Social networking sites provide multiple services which include emailing, instant messaging, uploading files, gaming and finding friends. Just as social networking has become a more popular method of communication in recent years, the ways in which people look afte...

  7. Information Horizons in Networks

    OpenAIRE

    Trusina, A.; Rosvall, M.; K. Sneppen

    2004-01-01

    We investigate and quantify the interplay between topology and ability to send specific signals in complex networks. We find that in a majority of investigated real-world networks the ability to communicate is favored by the network topology on small distances, but disfavored at larger distances. We further discuss how the ability to locate specific nodes can be improved if information associated to the overall traffic in the network is available.

  8. Survivable Virtual Network Embedding

    OpenAIRE

    Rahman, Muntasir Raihan; Aib, Issam; Boutaba, Raouf

    2010-01-01

    International audience Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous virtual networks (VN) to coexist on a shared infrastructure provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on InP network resources. Previous research focused on heuristic algorithms for the VN embedding problem assuming that the InP netwo...

  9. Securing personal network clusters

    OpenAIRE

    Jehangir, Assed; Heemstra de Groot, Sonia M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters are ad-hoc networks of co-located personal devices. The ad-hoc makeup of clusters, coupled with the resource constrained nature of many constituent devices, makes enforcing security a challenging ...

  10. Evolution of neural networks

    OpenAIRE

    Uršič, Aleš

    2012-01-01

    The goal of this work is construction of an artificial life model and simulation of organisms in an environment with food. Organisms survive if they find food successfuly. With evolution and learning organisms develop a neural network which enables that. First neural networks and their history are introduced with the basic concepts like a neuron model, a network, transfer functions, topologies and learning. I describe the backpropagation learning on multilayer feed forward network and dem...

  11. WLAN visual sensor networking

    Science.gov (United States)

    Kostrzewski, Andrew A.; Wang, Wenjian; Jannson, Tomasz P.

    2002-12-01

    This paper presents a discussion on constructing a wireless ad hoc network using unattended ground visual sensors. The IEEE 802.11 WLAN standard is used to implement a single-hop ad hoc network because of its simplicity. The bandwidth allocation and traffic control between visual sensors is coordinated by the Medium Access Control (MAC) protocol. A ground visual sensor tower is designed for the networking purpose with specially designed video compression, power management, and network module to achieve maximum thoroughput

  12. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2006-01-01

    This book provides a broad introduction to all aspects of modern telecommunications networks, covering the principles of operation of the technology and the way that networks using this technology are structured. The main focus is on those technologies in use today in the majority of the public telecommunications networks. Discussion of new technology, in particular the move to the so-called next generation networks (NGN) is also included.

  13. Optimization of Computer Networks

    OpenAIRE

    Saoud Sarwar; Deepa Mahra

    2011-01-01

    Computer Networks have pervaded our life like anything. They are present in all aspects of our life.Information transmission like Internet usage uses computer networks. As more and more people use computer networks, traffic increases. This puts a heavy toll on the infrastructure delivering the data from one point to another. Consequently the design issues in a network need to use the optimized parameters to deliver quality of service. This paper attempts to find a mathematical model for optim...

  14. Multimedia communications and networking

    CERN Document Server

    da Silva, Mario Marques

    2012-01-01

    The result of decades of research and international project experience, Multimedia Communications and Networking provides authoritative insight into recent developments in multimedia, digital communications, and networking services and technologies. Supplying you with the required foundation in these areas, it illustrates the means that will allow for improved digital communications and networks. The book starts with a review of the fundamental concepts, requirements, and constraints in networks and telecommunications. It describes channel disturbances that can hinder system performance--inclu

  15. A Network Synthesis Model for Generating Protein Interaction Network Families

    OpenAIRE

    Sayed Mohammad Ebrahim Sahraeian; Byung-Jun Yoon

    2012-01-01

    In this work, we introduce a novel network synthesis model that can generate families of evolutionarily related synthetic protein-protein interaction (PPI) networks. Given an ancestral network, the proposed model generates the network family according to a hypothetical phylogenetic tree, where the descendant networks are obtained through duplication and divergence of their ancestors, followed by network growth using network evolution models. We demonstrate that this network synthesis model ca...

  16. On Random Linear Network Coding for Butterfly Network

    OpenAIRE

    Guang, Xuan; Fu, Fang-Wei

    2010-01-01

    Random linear network coding is a feasible encoding tool for network coding, specially for the non-coherent network, and its performance is important in theory and application. In this letter, we study the performance of random linear network coding for the well-known butterfly network by analyzing the failure probabilities. We determine the failure probabilities of random linear network coding for the well-known butterfly network and the butterfly network with channel failure probability p.

  17. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  18. Networks and Industry Structure

    OpenAIRE

    Johnson, F P

    1995-01-01

    This paper explores how the network approach to marketing might be informed by concepts drawn from traditional industry structure analysis. It argues that industry structures defined by small numbers of participants such as oligopolies are more likely to lead to network effects while industry structures that approach perfect competition are unlikely to involve network formation.

  19. Random Boolean Networks

    OpenAIRE

    Drossel, Barbara

    2007-01-01

    This review explains in a self-contained way the properties of random Boolean networks and their attractors, with a special focus on critical networks. Using small example networks, analytical calculations, phenomenological arguments, and problems to solve, the basic concepts are introduced and important results concerning phase diagrams, numbers of relevant nodes and attractor properties are derived.

  20. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  1. Network Descriptions and NEC

    NARCIS (Netherlands)

    Keus, H.E.; Ham, J.J. van der; Daal, M. van; Laat, C. de

    2008-01-01

    The network is one of the most important components of NEC. In order to achieve high levels of agility and flexibility it is important that all users and providers have a good overview of the capabilities and possibilities of the network. Historically network applications have used their own discove

  2. Networks and Economic Behavior

    OpenAIRE

    Jackson, Matthew O.

    2009-01-01

    Recent analyses of social networks, both empirical and theoretical, are discussed, with a focus on how social networks influence economic behavior, as well as how social networks form. Some challenges of such research are discussed as are some of the important considerations for the future.

  3. Managing Innovation Networks

    DEFF Research Database (Denmark)

    Awate, Snehal Suyash; Møller Larsen, Marcus; Mudambi, Ram

    the costs and benefits of being centrally located on multiplex network versus having an equal distribution of ties between the different network layers. Using patent data on the global wind power industry, we find evidence suggesting that being centrally positioned on a multiplex network with an equal...

  4. New Networks for Biogas

    Energy Technology Data Exchange (ETDEWEB)

    Eekelen, R. van [Kiwa Gas Technology B. V., Apeldoorn (Netherlands)

    2012-06-15

    The study of 'New Networks for Biogas' main goal is to reduce the uncertainties associated with the design choices for biogas network configurations. Supplementary to the objective an overview of the state-of-the-art on the design, operations and maintenance of biogas networks in Europe is given.

  5. Electronic Networking. ERIC Digest.

    Science.gov (United States)

    Tucker, Susan

    This digest discusses several aspects of electronic networking, including network functions, implementation, and applications in education. Electronic networking is defined as including the four basic services of electronic mail (E-mail), electronic "bulletin boards," teleconferencing, and online databases, and an overview of these four functions…

  6. Metallic nanowire networks

    Science.gov (United States)

    Song, Yujiang; Shelnutt, John A.

    2012-11-06

    A metallic nanowire network synthesized using chemical reduction of a metal ion source by a reducing agent in the presence of a soft template comprising a tubular inverse micellar network. The network of interconnected polycrystalline nanowires has a very high surface-area/volume ratio, which makes it highly suitable for use in catalytic applications.

  7. Spanish Museum Libraries Network.

    Science.gov (United States)

    Lopez de Prado, Rosario

    This paper describes the creation of an automated network of museum libraries in Spain. The only way in which the specialized libraries in the world today can continue to be active and to offer valid information is to automate the service they offer, and create network libraries with cooperative plans. The network can be configured with different…

  8. Networking and Security Measures

    OpenAIRE

    Vaibhav Gupta; Sumit Goswami; Ashok Kumar; Mohinder Singh

    2004-01-01

    By writing this paper a small effort has been put to understand the growing network needs and its security. Various types of network threats and security services are discussed. This will help in designing a secure and robust network infrastructure by discussing management security policies and risk analysis.

  9. Emergent Network Defense

    Science.gov (United States)

    Crane, Earl Newell

    2013-01-01

    The research problem that inspired this effort is the challenge of managing the security of systems in large-scale heterogeneous networked environments. Human intervention is slow and limited: humans operate at much slower speeds than networked computer communications and there are few humans associated with each network. Enabling each node in the…

  10. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  11. Is the immune network a complex network?

    CERN Document Server

    Souza-e-Silva, Hallan

    2012-01-01

    Some years ago a cellular automata model was proposed to describe the evolution of the immune repertoire of B cells and antibodies based on Jerne's immune network theory and shape-space formalism. Here we investigate if the networks generated by this model in the different regimes can be classified as complex networks. We have found that in the chaotic regime the network has random characteristics with large, constant values of clustering coefficients, while in the ordered phase, the degree distribution of the network is exponential and the clustering coefficient exhibits power law behavior. In the transition region we observed a mixed behavior (random-like and exponential) of the degree distribution as opposed to the scale-free behavior reported for other biological networks. Randomness and low connectivity in the active sites allow for rapid changes in the connectivity distribution of the immune network in order to include and/or discard information and generate a dynamic memory. However it is the availabil...

  12. Flow networks analysis and optimization of repairable flow networks, networks with disturbed flows, static flow networks and reliability networks

    CERN Document Server

    Todinov, Michael T

    2013-01-01

    Repairable flow networks are a new area of research, which analyzes the repair and flow disruption caused by failures of components in static flow networks. This book addresses a gap in current network research by developing the theory, algorithms and applications related to repairable flow networks and networks with disturbed flows. The theoretical results presented in the book lay the foundations of a new generation of ultra-fast algorithms for optimizing the flow in networks after failures or congestion, and the high computational speed creates the powerful possibility of optimal control

  13. Complexity of Public Transport Networks

    Institute of Scientific and Technical Information of China (English)

    LU Huapu; SHI Ye

    2007-01-01

    The theory of complex networks was used to classify public transport networks into public transportation route networks, public transportation transfer networks, and bus station networks. The practical significance of the network parameters was then analyzed. The public transport networks in Langfang, Jining, and Dalian were then chosen as specific research cases. The results show that the public transportation networks have the characteristics of complex networks. In addition, the urban transportation network parameters all significantly affect the accessibility, convenience, and terrorist security capability of the urban public transportation network. The results link the findings with the actual situations to explore means to solve transportation system problems.

  14. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  15. Logistical networking: a global storage network

    International Nuclear Information System (INIS)

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it

  16. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  17. Network Characterization Service (NCS)

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yang, George [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Crowley, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-06-06

    Distributed applications require information to effectively utilize the network. Some of the information they require is the current and maximum bandwidth, current and minimum latency, bottlenecks, burst frequency, and congestion extent. This type of information allows applications to determine parameters like optimal TCP buffer size. In this paper, we present a cooperative information-gathering tool called the network characterization service (NCS). NCS runs in user space and is used to acquire network information. Its protocol is designed for scalable and distributed deployment, similar to DNS. Its algorithms provide efficient, speedy and accurate detection of bottlenecks, especially dynamic bottlenecks. On current and future networks, dynamic bottlenecks do and will affect network performance dramatically.

  18. Introduction to communication networks

    CERN Document Server

    Anttalainen, Tarmo

    2014-01-01

    This new book is an introduction to modern communications networks that now rely far less on telephone services and more on cellular and IP networks. The resource is designed to provide answers to the fundamental questions concerning telecommunications networks and services. This includes the structure and main components of a modern telecommunications network; the importance of standardization; and how cellular mobile networks operate; among many others. In addition, you are provided with problems and review questions to work though and help you master the material.

  19. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    When it comes to discussing the future of electronic communication, social networking is the buzzword. The Internet has become a platform where new social networks emerge and the Internet it itself support the more traditional computer supported communication. The way users build and verifies...... different online networks for communities of people who share interests or individuals who presents themselves through user produced content is what makes up the social networking of today. The purpose of this paper is to discuss perceived user requirements to the next generation social networks. The paper...

  20. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  1. Networks in Cognitive Science

    CERN Document Server

    Baronchelli, Andrea; Pastor-Satorras, Romualdo; Chater, Nick; Christiansen, Morten H

    2013-01-01

    Networks of interconnected nodes have long played a key role in cognitive science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions or collaborations among scientists. Today, the inclusion of network theory into cognitive sciences, and the expansion of complex systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the cognitive sciences.

  2. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  3. Architecture of Network Systems

    CERN Document Server

    Serpanos, Dimitrios

    2011-01-01

    Network systems require technical skills in computer architecture, design methodologies, algorithm design, and networking. Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Leading researchers Dimitrios Serpanos and Tilman Wolf develop architectures for all network sub-systems, bridging the gap between operation and VLSI. Discussing the major challenges in the design of networks and the architectures tha

  4. Learning conditional Gaussian networks

    DEFF Research Database (Denmark)

    Bøttcher, Susanne Gammelgaard

    This paper considers conditional Gaussian networks. The parameters in the network are learned by using conjugate Bayesian analysis. As conjugate local priors, we apply the Dirichlet distribution for discrete variables and the Gaussian-inverse gamma distribution for continuous variables, given...... a configuration of the discrete parents. We assume parameter independence and complete data. Further, to learn the structure of the network, the network score is deduced. We then develop a local master prior procedure, for deriving parameter priors in these networks. This procedure satisfies parameter...

  5. From global agenda-setting to domestic implementation: successes and challenges of the global health network on tobacco control.

    Science.gov (United States)

    Gneiting, Uwe

    2016-04-01

    Global policy attention to tobacco control has increased significantly since the 1990s and culminated in the first international treaty negotiated under the auspices of the World Health Organization-the Framework Convention on Tobacco Control (FCTC). Although the political process that led to the creation of the FCTC has been extensively researched, the FCTC's progression from an aspirational treaty towards a global health governance framework with tangible policy effects within FCTC member countries has not been well-understood to date. This article analyses the role of the global health network of tobacco control advocates and scientists, which formed during the FCTC negotiations during the late 1990s, in translating countries' commitment to the FCTC into domestic policy change. By comparing the network's influence around two central tobacco control interventions (smoke-free environments and taxation), the study identifies several scope conditions, which have shaped the network's effectiveness around the FCTC's implementation: the complexity of the policy issue and the relative importance of non-health expertise, the required scope of domestic political buy-in, the role of the general public as network allies, and the strength of policy opposition. These political factors had a greater influence on the network's success than the evidence base for the effectiveness of tobacco control interventions. The network's variable success points to a trade-off faced by global health networks between their need to maintain internal cohesion and their ability to form alliances with actors in their social environment. PMID:26253698

  6. Setting up virtual private network

    International Nuclear Information System (INIS)

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise's network function and enlarges its private scope. The text introduces virtual private network's principal, privileges and protocols that use in virtual private network. At last, this paper introduces several setting up virtual private network's technologies which based on LAN

  7. Setting up virtual private network

    International Nuclear Information System (INIS)

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise network function and enlarges its private scope. This text introduces virtual private network principal, privileges and protocols applied in virtual private network. At last, this paper introduces several setting up virtual private network technologies which is based on LAN

  8. Packet transport network in metro

    Science.gov (United States)

    Huang, Feng; Yi, Xiaobo; Zhang, Hanzheng; Gong, Ping

    2008-11-01

    IP packet based services such as high speed internet, IP voice and IP video will be widely deployed in telecom network, which make transport network evolution to packet transport network. Characteristics of transport network and requirements of packet transport network are analyzed, T-MPLS/MPLS-TP based PTN technology is given and it will be used in metro (access, aggregation and core) network.

  9. Network Security Scanner

    Directory of Open Access Journals (Sweden)

    G. Murali

    2011-11-01

    Full Text Available Network Security Scanner (NSS is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS is an easy to use, intuitive network security scanner that can quickly scan and audit your network computers for vulnerabilities, exploits, and information enumerations. Vulnerability management is an on-going process that protects your valuable data and it is a key component of an effective information security strategy, which provides comprehensive, preemptive protection against threats to your enterprise security. N.S.S is built on an architecture that allows for high reliability and scalability that caters for both medium and large sized networks. NSS consists of six modules. They are Host Scanning, Port Scanning, Pinging, NSLookup, Vulnerability Auditing and Trace route. NSS also performs live host detection, operating system identification, SNMP Auditing. Finds rouge services and open TCP and UDP ports. The ability varies to perform scanning over the network identifying the live hosts and guess the operating system of the remote hosts and installed programs into the remote hosts. Apart identifying the live hosts we could map the ports and list the services which are running in the host.

  10. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Jimenez, Tamara;

    2013-01-01

    The use of cognition is a promising element for the control of heterogeneous optical networks. Not only are cognitive networks able to sense current network conditions and act according to them, but they also take into account the knowledge acquired through past experiences; that is, they include...... learning with the aim of improving performance. In this paper, we review the fundamentals of cognitive networks and focus on their application to the optical networking area. In particular, a number of cognitive network architectures proposed so far, as well as their associated supporting technologies, are...... reviewed. Moreover, several applications, mainly developed in the framework of the EU FP7 Cognitive Heterogeneous Reconfigurable Optical Network (CHRON) project, are also described....

  11. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  12. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    this latitudinal diversity gradient scales up to entities as complex as networks is unknown.We investigated this using a dataset of 54 community-wide pollination networks and hypothesized that pollination networks would display a latitudinal and altitudinal species richness gradient, increasing...... specialization towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated...... strongly with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with...

  13. Synchronization of networks

    Indian Academy of Sciences (India)

    R E Amritkar

    2008-08-01

    We study the synchronization of coupled dynamical systems on networks. The dynamics is governed by a local nonlinear oscillator for each node of the network and interactions connecting different nodes via the links of the network. We consider existence and stability conditions for both single- and multi-cluster synchronization. For networks with time-varying topology we compare the synchronization properties of these networks with the corresponding time-average network. We find that if the different coupling matrices corresponding to the time-varying networks commute with each other then the stability of the synchronized state for both the time-varying and the time-average topologies are approximately the same. On the other hand, for non-commuting coupling matrices the stability of the synchronized state for the time-varying topology is in general better than the time-average topology.

  14. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  15. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  16. Complex Aperture Networks

    CERN Document Server

    Owladeghaffari, Hamed

    2009-01-01

    A complex network approach on a rough fracture is developed. In this manner, some hidden metric spaces (similarity measurements) between apertures profiles are set up and a general evolutionary network in two directions (in parallel and perpendicular to the shear direction) is constructed. Evaluation of the emerged network shows the connectivity degree (distribution) of network, after a transition step; fall in to the stable states which are coincided with the Gaussian distribution. Based on this event and real observations of the complex network changes, an algorithm (COmplex Networks on Apertures: CONA) is proposed in which evolving of a network is accomplished using preferential detachments and attachments of edges (based on a competition and game manner) while the number of nodes is fixed. Also, evolving of clustering coefficients and number of edges display similar patterns as well as are appeared in shear stress, hydraulic conductivity and dilation changes, which can be engaged to estimate shear strengt...

  17. Enhancing the network synchronizability

    Institute of Scientific and Technical Information of China (English)

    ZHAO Ming; ZHOU Tao; CHEN Guan-rong; WANG Bing-hong

    2007-01-01

    The structural and dynamical properties, partic-ularly the small-world effect and scale-free feature, of com-plex networks have attracted tremendous interest and atten-tion in recent years. This article offers a brief review of one focal issue concerning the structural and dynamical behav-iors of complex network synchronization. In the presenta-tion, the notions of synchronization of dynamical systems on networks, stability of dynamical networks, and relationships between network structure and synchronizability, will be first introduced. Then, various technical methods for enhancing the network synchronizability will be discussed, which are roughly divided into two classes: Structural Modification and Coupling-Pattern Regulation, where the former includes three typical methods-dividing hub nodes, shortening average dis-tances, and deleting overload edges, while the latter mainly is a method of strengthening the hub-nodes' influence on the network.

  18. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  19. Organization of complex networks

    Science.gov (United States)

    Kitsak, Maksim

    Many large complex systems can be successfully analyzed using the language of graphs and networks. Interactions between the objects in a network are treated as links connecting nodes. This approach to understanding the structure of networks is an important step toward understanding the way corresponding complex systems function. Using the tools of statistical physics, we analyze the structure of networks as they are found in complex systems such as the Internet, the World Wide Web, and numerous industrial and social networks. In the first chapter we apply the concept of self-similarity to the study of transport properties in complex networks. Self-similar or fractal networks, unlike non-fractal networks, exhibit similarity on a range of scales. We find that these fractal networks have transport properties that differ from those of non-fractal networks. In non-fractal networks, transport flows primarily through the hubs. In fractal networks, the self-similar structure requires any transport to also flow through nodes that have only a few connections. We also study, in models and in real networks, the crossover from fractal to non-fractal networks that occurs when a small number of random interactions are added by means of scaling techniques. In the second chapter we use k-core techniques to study dynamic processes in networks. The k-core of a network is the network's largest component that, within itself, exhibits all nodes with at least k connections. We use this k-core analysis to estimate the relative leadership positions of firms in the Life Science (LS) and Information and Communication Technology (ICT) sectors of industry. We study the differences in the k-core structure between the LS and the ICT sectors. We find that the lead segment (highest k-core) of the LS sector, unlike that of the ICT sector, is remarkably stable over time: once a particular firm enters the lead segment, it is likely to remain there for many years. In the third chapter we study how

  20. Security in network environment-network protocols

    OpenAIRE

    Fessl, Jaromír

    2011-01-01

    Work is focused on network protocols features and security characteristics. Overview of protocols is made through all layers of OSI model and by this design structured. For each layer is made summary of interesting facts. Separate chapter is dedicated for VPN and for implementation possibilities of VPN. In chapter Practical problems are reflected most important problems of actual security (from network protocol point of view) concerned on SSL/TLS, SMTP and DNS. Together with security charact...

  1. Network Firewall using Artificial Neural Networks

    OpenAIRE

    Kristián Valentín; Michal Malý

    2014-01-01

    Today's most common firewalls are mostly rule-based. Their knowledge consists of a set of rules upon which they process received packets. They cannot do anything they have not been explicitly configured to do. This makes the system more straightforward to set up, but less flexible and less adaptive to changing circumstances. We will investigate a network firewall whose rule-base we will try to model using an artificial neural network, more specifically using a multi-layer perceptron (MLP) tra...

  2. Revisiting Network Organization in Practice

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    networks in a network organization, which are internal market, IT networks, informal and social networks, global R&D project networks, global R&D specialists’ network, and alliances with external partners. Though the case TNCs are network-based, hierarchies remain to be an important part of the......The theory of constructing a network organization for TNC’s R&D has become a common sense. However, there are still queries about the network organization, such as a network organization is only a “bureaucracy-lite” organization. From a multiple-case study, we find that there are six forms of...

  3. SCANDEX: Service Centric Networking for Challenged Decentralised Networks

    OpenAIRE

    Sathiaseelan, Arjuna; Wang, Liang; Aucinas, Andrius; Tyson, Gareth; Crowcroft, Jon

    2015-01-01

    Do-It-Yourself (DIY) networks are decentralised networks built by an (often) amateur community. As DIY networks do not rely on the need for backhaul Internet connectivity, these networks are mostly a mix of both offline and online networks. Although DIY networks have their own home- grown services, the current Internet-based cloud services are often useful, and access to some services could be beneficial to the community. Considering that most DIY networks have challenged Internet connectivit...

  4. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    OpenAIRE

    Santosh Kumar Chaudhari; Murthy, Hema A.

    2011-01-01

    A Network Management System (NMS) plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to ...

  5. Toward Sustainable Networking: Storage Area Networks with Network Coding

    CERN Document Server

    Ferner, Ulric J; Soljanin, Emina

    2012-01-01

    This manuscript provides a model to characterize the energy savings of network coded storage (NCS) in storage area networks (SANs). We consider blocking probability of drives as our measure of performance. A mapping technique to analyze SANs as independent M/G/K/K queues is presented, and blocking probabilities for uncoded storage schemes and NCS are derived and compared. We show that coding operates differently than the amalgamation of file chunks and energy savings are shown to scale well with striping number. We illustrate that for enterprise-level SANs energy savings of 20-50% can be realized.

  6. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  7. Folksodriven Structure Network

    CERN Document Server

    Mas, Massimiliano Dal

    2011-01-01

    Nowadays folksonomy is used as a system derived from user-generated electronic tags or keywords that annotate and describe online content. But it is not a classification system as an ontology. To consider it as a classification system it would be necessary to share a representation of contexts by all the users. This paper is proposing the use of folksonomies and network theory to devise a new concept: a "Folksodriven Structure Network" to represent folksonomies. This paper proposed and analyzed the network structure of Folksodriven tags thought as folsksonomy tags suggestions for the user on a dataset built on chosen websites. It is observed that the Folksodriven Network has relative low path lengths checking it with classic networking measures (clustering coefficient). Experiment result shows it can facilitate serendipitous discovery of content among users. Neat examples and clear formulas can show how a "Folksodriven Structure Network" can be used to tackle ontology mapping challenges.

  8. Social cognitive radio networks

    CERN Document Server

    Chen, Xu

    2015-01-01

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  9. A quantum access network

    CERN Document Server

    Fröhlich, Bernd; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-01-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at the network node can be shared between up to 64 users, thereby significantly reducing the hardware requirements for each user added to the network. This shared receiver architecture removes one of the main obstacles restricting the widespread application...

  10. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-09-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  11. Reconfigureable network node

    Science.gov (United States)

    Vanderveen, Keith B.; Talbot, Edward B.; Mayer, Laurence E.

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  12. Innovation and network collaboration

    DEFF Research Database (Denmark)

    Kesting, Peter; Müller, Sabine; Jørgensen, Frances;

    2011-01-01

    Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size...... and their inherent shortage of resources. In this paper, we propose that human resource management (HRM) practices may provide a means by which SMEs can increase their innovation capacity through network collaboration. Following a brief presentation of the relevant literature on networks, and innovation in networks...... in particular, and HRM, we analyse and evaluate the potential applicability of existing models for supporting innovation in SMEs participating in networks. Finally, we propose several lines of inquiry arising from our analysis that provide directions for future research....

  13. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed...... by identifying the gaps in the reviewed literature. The paper is based on three case studies undertaken in Danish manufacturing companies to explore in detail their manufacturing plants and networks. The cases provide a sound basis for developing the research questions and explaining the interaction between...... different manufacturing plants in the network and their impact on network transformation. Findings – The paper highlights the dominant role of manufacturing plants in the continuously changing shape of a manufacturing network. The paper demonstrates that a product or process change at one manufacturing...

  14. Diffusion Adaptation over Networks

    CERN Document Server

    Sayed, Ali H

    2012-01-01

    Adaptive networks are well-suited to perform decentralized information processing and optimization tasks and to model various types of self organized and complex behavior encountered in nature. Adaptive networks consist of a collection of agents with processing and learning abilities. The agents are linked together through a connection topology, and they cooperate with each other through local interactions to solve distributed inference problems in real-time. The continuous diffusion of information across the network enables agents to adapt their performance in relation to changing data and network conditions; it also results in improved adaptation and learning performance relative to non-cooperative networks. This article provides an overview of diffusion strategies for adaptation and learning over networks. The article is divided into several sections: 1. Motivation; 2. Mean-Square-Error Estimation; 3. Distributed Optimization via Diffusion Strategies; 4. Adaptive Diffusion Strategies; 5. Performance of Ste...

  15. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    gain access in the network and the information transferred within. While much work has been done on trying to defend these networks, little has been done on suggesting sophisticated tools for proving how vulnerable sensor networks are. This work demonstrates a tool that allows both passive monitoring...... of transactional data in sensor networks, such as message rate, mote frequency, message routing, etc., but also discharge of various attacks against them. To the best of our knowledge, this is the first instance of an attack tool that can be used by an adversary to penetrate the confidentiality and...... functionality of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security...

  16. Vulnerability of weighted networks

    CERN Document Server

    Dall'Asta, L; Barthelemy, M; Vespignani, A; Asta, Luca Dall'; Barrat, Alain; Barthelemy, Marc; Vespignani, Alessandro

    2006-01-01

    In real networks complex topological features are often associated with a diversity of interactions as measured by the weights of the links. Moreover, spatial constraints may as well play an important role, resulting in a complex interplay between topology, weight, and geography. In order to study the vulnerability of such networks to intentional attacks, these attributes must be therefore considered along with the topological quantities. In order to tackle this issue, we consider the case of the world-wide airport network, which is a weighted heterogeneous network whose evolution and structure are influenced by traffic and geographical constraints. We first characterize relevant topological and weighted centrality measures and then use these quantities as selection criteria for the removal of vertices. We consider different attack strategies and different measures of the damage achieved in the network. The analysis of weighted properties shows that centrality driven attacks are capable to shatter the network...

  17. Brief encounter networks

    CERN Document Server

    Kostakos, Vassilis; Penn, Alan

    2007-01-01

    Many complex human and natural phenomena can usefully be represented as networks describing the relationships between individuals. While these relationships are typically intermittent, previous research has used network representations that aggregate the relationships at discrete intervals. However, such an aggregation discards important temporal information, thus inhibiting our understanding of the networks dynamic behaviour and evolution. We have recorded patterns of human urban encounter using Bluetooth technology thus retaining the temporal properties of this network. Here we show how this temporal information influences the structural properties of the network. We show that the temporal properties of human urban encounter are scale-free, leading to an overwhelming proportion of brief encounters between individuals. While previous research has shown preferential attachment to result in scale-free connectivity in aggregated network data, we found that scale-free connectivity results from the temporal prope...

  18. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    Management literature’s many descriptions of the current and future challenges and new trends within organisation and management forms depict a motley and kaleidoscopic picture of the future. However, one idea reoccurs throughout most of the literature – the organisational network. Some are even...... bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... to isolate some of the forthcoming changes and outlines a map for network management. We will try to avoid summarising the increasingly extensive literature about organisations which are characterised by networks and restrict our focus to management in inter-organisational networks. Inter...

  19. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  20. 崇尚科学、追求真理:大学教授的学术使命%Advocating Science and Pursuing the Truth:Academic Mission of University Professors

    Institute of Scientific and Technical Information of China (English)

    张意忠

    2012-01-01

    崇尚科学、追求真理是大学教授的神圣使命,它需要教授敬畏学术、培养独立人格。学术是有尊严的,只有敬畏学术,才能培养独立人格,摆脱权力与金钱的桎梏;需要以学术为业,追求卓越。教授对学术应具有内在的期盼,执着追求,痴心不改;需要开展学术批评,提高学术水平。科学发展的无限性与人类智力的有限性需要通过学术批评发现错误,接近真理;需要遵守学术道德,承担学术责任。道德是学术的根基与标杆,是教授学术职业的道德底线,不可逾越。%Advocating science and pursuing the truth is the sacred mission of university professors.Professors should awe the academic and cultivate independent personality,because the academic has the dignity.Only awing the academic,can professors cultivate independent personality,and get rid of the shackles of power and money;professors should take the academic as their own occupation,and pursue the excellence.Professors should have inherent academic expectations,persistent pursuit and unchanged infatuation;professors should carry out academic criticism,and improve academic standards.People find the error,close to the truth by academic critics because of the infinite of the scientific development and the finite of human intelligence;professors should abide by academic moral,and undertake academic responsibility.Ethics is the foundation and benchmarking of the academic,is the moral bottom line of professors' academic career,and is insurmountable.

  1. MOSAIC (MOthers' Advocates In the Community: protocol and sample description of a cluster randomised trial of mentor mother support to reduce intimate partner violence among pregnant or recent mothers

    Directory of Open Access Journals (Sweden)

    Taft Angela J

    2009-05-01

    Full Text Available Abstract Background Intimate partner violence (IPV is prevalent globally, experienced by a significant minority of women in the early childbearing years and is harmful to the mental and physical health of women and children. There are very few studies with rigorous designs which have tested the effectiveness of IPV interventions to improve the health and wellbeing of abused women. Evidence for the separate benefit to victims of social support, advocacy and non-professional mentoring suggested that a combined model may reduce the levels of violence, the associated mental health damage and may increase a woman's health, safety and connection with her children. This paper describes the development, design and implementation of a trial of mentor mother support set in primary care, including baseline characteristics of participating women. Methods/Design MOSAIC (MOtherS' Advocates In the Community was a cluster randomised trial embedded in general practice and maternal and child health (MCH nursing services in disadvantaged suburbs of Melbourne, Australia. Women who were pregnant or with infants, identified as abused or symptomatic of abuse, were referred by IPV-trained GPs and MCH nurses from 24 general practices and eight nurse teams from January 2006 to December 2007. Women in the intervention arm received up to 12 months support from trained and supported non-professional mentor mothers. Vietnamese health professionals also referred Vietnamese women to bilingual mentors in a sub-study. Baseline and follow-up surveys at 12 months measured IPV (CAS, depression (EPDS, general health (SF-36, social support (MOS-SF and attachment to children (PSI-SF. Significant development and piloting occurred prior to trial commencement. Implementation interviews with MCH nurses, GPs and mentors assisted further refinement of the intervention. In-depth interviews with participants and mentors, and follow-up surveys of MCH nurses and GPs at trial conclusion will

  2. Spreading processes in Multilayer Networks

    OpenAIRE

    Salehi, Mostafa; Sharma, Rajesh; Marzolla, Moreno; Magnani, Matteo; Siyari, Payam; Montesi, Danilo

    2014-01-01

    Several systems can be modeled as sets of interconnected networks or networks with multiple types of connections, here generally called multilayer networks. Spreading processes such as information propagation among users of an online social networks, or the diffusion of pathogens among individuals through their contact network, are fundamental phenomena occurring in these networks. However, while information diffusion in single networks has received considerable attention from various discipl...

  3. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  4. Chaotic diagonal recurrent neural network

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos,and its structure andlearning algorithm are designed.The multilayer feedforward neural network,diagonal recurrent neural network,and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map.The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks.

  5. Chaotic diagonal recurrent neural network

    International Nuclear Information System (INIS)

    We propose a novel neural network based on a diagonal recurrent neural network and chaos, and its structure and learning algorithm are designed. The multilayer feedforward neural network, diagonal recurrent neural network, and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map. The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks. (interdisciplinary physics and related areas of science and technology)

  6. Clustering signatures classify directed networks

    Science.gov (United States)

    Ahnert, S. E.; Fink, T. M. A.

    2008-09-01

    We use a clustering signature, based on a recently introduced generalization of the clustering coefficient to directed networks, to analyze 16 directed real-world networks of five different types: social networks, genetic transcription networks, word adjacency networks, food webs, and electric circuits. We show that these five classes of networks are cleanly separated in the space of clustering signatures due to the statistical properties of their local neighborhoods, demonstrating the usefulness of clustering signatures as a classifier of directed networks.

  7. Shareholding Networks in Japan

    OpenAIRE

    Souma, Wataru; Fujiwara, Yoshi; Aoyama, Hideaki

    2005-01-01

    The Japanese shareholding network existing at the end of March 2002 is studied empirically. The network is constructed from 2,303 listed companies and 53 non-listed financial institutions. We consider this network as a directed graph by drawing edges from shareholders to stock corporations. The lengths of the shareholder lists vary with the companies, and the most comprehensive lists contain the top 30 shareholders. Consequently, the distribution of incoming edges has an upper bound, while th...

  8. Bibliographic utility networks

    OpenAIRE

    Das, Anup Kumar; Dutta, Bidyarthi

    2005-01-01

    This article describes the functions, features, and advantages of bibliographic utility networks. Some cases have also described in order to get in-depth knowledge on their core services. The services of a bibliographic utility network are centred on online union catalogue database. Some bibliographic utility networks derived a number of services from their exhaustive union catalogue database to be used by different segments of clienteles. The services are not only contributory from participa...

  9. Affinity driven social networks

    Science.gov (United States)

    Ruyú, B.; Kuperman, M. N.

    2007-04-01

    In this work we present a model for evolving networks, where the driven force is related to the social affinity between individuals of a population. In the model, a set of individuals initially arranged on a regular ordered network and thus linked with their closest neighbors are allowed to rearrange their connections according to a dynamics closely related to that of the stable marriage problem. We show that the behavior of some topological properties of the resulting networks follows a non trivial pattern.

  10. Prices in Networks

    OpenAIRE

    Tan, Hi-Lin

    2006-01-01

    When there is strategic complementarity of consumption between neighbors in a social network, we find that certain consumers may have a bigger impact than other consumers on the market demand and therefore the equilibrium price. The influence that a particular consumer has on the market demand depends on the network structure and the consumer’s location in the network. This analysis may, for example, shed light on the segment of consumers that should be the target of selective advertisements ...

  11. Marketing in Social Networks

    OpenAIRE

    HLAVATÁ, Jana

    2012-01-01

    The purpose of theoretical part of my bachelor thesis is to give readers an introduction in internet marketing, social media and social networks, to explain main differences between these terms, to describe social networks and their various forms in more detail and to explain Facebook and Twitter marketing. The purpose of practical part of my bachelor thesis is to show techniques and right strategies how to succeed in social networks and which steps to take to achieve that success. I will exp...

  12. Learning in Network Games

    OpenAIRE

    Kovarik, Jaromir; Mengel, Friederike; Romero, José Gabriel

    2012-01-01

    We report the findings of an experiment designed to study how people learn and make decisions in network games. Network games offer new opportunities to identify learning rules, since on networks (compared to e.g. random matching) more rules differ in terms of their information requirements. Our experimental design enables us to observe both which actions participants choose and which information they consult before making their choices. We use this information to estimate learning type...

  13. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  14. Searchability of Networks

    OpenAIRE

    Rosvall, M.; Gronlund, A.; Minnhagen, P.; Sneppen, K.

    2005-01-01

    We investigate the searchability of complex systems in terms of their interconnectedness. Associating searchability with the number and size of branch points along the paths between the nodes, we find that scale-free networks are relatively difficult to search, and thus that the abundance of scale-free networks in nature and society may reflect an attempt to protect local areas in a highly interconnected network from nonrelated communication. In fact, starting from a random node, real-world n...

  15. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  16. Personal network (PN) applications

    DEFF Research Database (Denmark)

    Prasad, R.; Skouby, Knud Erik

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  17. Personal Network (PN) Applications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Skouby, K.

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  18. Operational Network Intrusion Detection

    OpenAIRE

    Dreger, Holger

    2008-01-01

    The goal of this thesis is to examine dependencies and tradeoffs between the resource usage (CPU and memory) and the analysis capabilities of Network Intrusion Detection Systems (NIDS). We base our work on the experience of running NIDS in large network environments (among them the Münchener Wissenschaftsnetz (MWN)). These show that resource management is vital for running NIDS in high volume networks. To reduce the resource consumption of NIDS is often only possible by reducing the NIDS' ana...

  19. R&D Networks

    OpenAIRE

    Sanjeev Goyal; Jose Luis Moraga

    2000-01-01

    We develop a model of strategic networks that captures two distinctive features of interfirm collaboration: bilateral agreements and nonexclusive relationships. Our analysis highlights the relationship between market competition, firms' incentives to invest in R&D, and the architecture of collaboration networks. In the absence of firm rivalry, the complete network, where each firm collaborates with all others, is uniquely stable, industry-profit maximizing, and efficient. By contrast, under s...

  20. Persistence in corporate networks

    OpenAIRE

    Milaković, Mishael; Raddant, Matthias; Birg, Laura

    2014-01-01

    We examine the bipartite graphs of German corporate boards in 1993, 1999 and 2005, and identify cores of directors who are highly central in the entire network while being densely connected among themselves. The novel feature of this paper is the focus on the dynamics of these networks. Germany's corporate governance has experienced significant changes during this time, and there is substantial turnover in the identity of core members, yet we observe the persistent presence of a network core,...

  1. Integrating networks with Mathematica

    OpenAIRE

    Strijkers, R.J.; de Meijer, R. J.

    2008-01-01

    We have developed a concept that considers network behavior as a collection of software objects, which can be used or modified in computer programs. The interfaces of these software objects are exposed as web services and enable applications to analyze and manipulate networks, e.g. to find articulation vertices or configure non-default routes. This article describes the software that allows Mathematica to optimize networks and applications in a continuous cycle of monitoring, analysis and ada...

  2. Advances in emergency networking

    OpenAIRE

    de Graaf,, Dirk C; Berg, van den, C.A.; Boucherie, Richard J.; Elfrink, Herman; Heemstra de Groot, Sonia; Haan, de, R.J.; Marvelde, te, Arjan; Ommeren, van, F.J.; Roijers, Frank; Stemerdink, Jan; Tromp, Erik

    2007-01-01

    Crisis situations require fast regain of control. Wireless ad-hoc networks will enable emergency services to act upon the actual status of the situation by retrieving and exchanging detailed up-to-date information. Deployment of highbandwidth, robust, self-organising ad-hoc networks will therefore enable quicker response to typical hat/where/when questions, than the more vulnerable low-bandwidth communication networks currently in use. This paper addresses a number of results of the projects ...

  3. ON MOBILE MESH NETWORKS

    OpenAIRE

    Namiot, Dmitry

    2015-01-01

    With the advances in mobile computing technologies and the growth of the Net, mobile mesh networks are going through a set of important evolutionary steps. In this paper, we survey architectural aspects of mobile mesh networks and their use cases and deployment models. Also, we survey challenging areas of mobile mesh networks and describe our vision of promising mobile services. This paper presents a basic introductory material for Masters of Open Information Technologies Lab, interested in m...

  4. Marketing in Random Networks

    OpenAIRE

    Amini, Hamed; Draief, Moez; Lelarge, Marc

    2008-01-01

    Viral marketing takes advantage of preexisting social networks among customers to achieve large changes in behaviour. Models of influence spread have been studied in a number of domains, including the effect of "word of mouth" in the promotion of new products or the diffusion of technologies. A social network can be represented by a graph where the nodes are individuals and the edges indicate a form of social relationship. The flow of influence through this network can be thought of as an inc...

  5. Consciousness supporting networks

    OpenAIRE

    Demertzi, Athina; Soddu, Andrea; Laureys, Steven

    2013-01-01

    Functional neuroimaging shows that patients with disorders of consciousness exhibit disrupted system-level functional connectivity. Unresponsive/’’vegetative state’’ patients preserve wakefulness networks of brainstem and basal forebrain but the cerebral networks accounting for external perceptual awareness and internal self-related mentation are disrupted. Specifically, the ‘external awareness’ network encompassing lateral fronto-temporo-parietal cortices bilaterally, and the ‘internal aware...

  6. Entropy in Social Networks

    OpenAIRE

    Pfaltz, John L.

    2012-01-01

    We introduce the concepts of closed sets and closure operators as mathematical tools for the study of social networks. Dynamic networks are represented by transformations. It is shown that under continuous change/transformation, all networks tend to "break down" and become less complex. It is a kind of entropy. The product of this theoretical decomposition is an abundance of triadically closed clusters which sociologists have observed in practice. This gives credence to the relevance of this ...

  7. Software Defined Networking

    OpenAIRE

    Roncero Hervás, Óscar

    2014-01-01

    Software Defined Networks (SDN) is a paradigm in which routing decisions are taken by a control layer. In contrast to conventional network structures, the control plane and forwarding plane are separated and communicate through standard protocols like OpenFlow. Historically, network management was based on a layered approach, each one isolated from the others. SDN proposes a radically different approach by bringing together the management of all these layers into a single controller. It is th...

  8. SDN : Software defined networks

    OpenAIRE

    Wiklund, Petter

    2014-01-01

    This report is a specialization in Software defined networking. SDN really comes to revolutionize the industry and it’s under constant development. But is the technology ready to be launched into operation yet? The report would initially involve a number of problems that today's network technology is facing. It then follows a deeper description of what this software-based networking technology really is and how it works. Further, the technique is being tested in a lab assignment, using a prog...

  9. Regression with network cohesion

    OpenAIRE

    Li, Tianxi; Levina, Elizaveta; Zhu, Ji

    2016-01-01

    Prediction problems typically assume the training data are independent samples, but in many modern applications samples come from individuals connected by a network. For example, in adolescent health studies of risk-taking behaviors, information on the subjects' social networks is often available and plays an important role through network cohesion, the empirically observed phenomenon of friends behaving similarly. Taking cohesion into account in prediction models should allow us to improve t...

  10. Generic Network Location Service

    OpenAIRE

    Laban Mwansa; Jan Janeček

    2010-01-01

    This work presents the Generic Network Location Service based on the Chord implementation utilizing data structures called distributed hash tables (DHT) or structured overlay networks, which are used to build scalable self-managing distributed systems. The provided algorithms guarantee resilience in the presence of dynamism: they guarantee consistent lookup results in the presence of nodes failing and leaving. Generic Network Location Service provides a Location Service system based on DHT te...

  11. The Hyper-Kautz Network: A New Scalable Product Network

    OpenAIRE

    Wenhong Wei; Wenjun Xiao; Yong Qin

    2009-01-01

    In this paper, we propose a new product network using a Cartesian product of hypercube and Kautz network, named as hyper-Kautz network. The proposed network possesses the properties of both hypercube and the Kautz network including logarithmic diameter, optimal connectivity, and simple routing algorithms.

  12. Network Performance Improvement under Epidemic Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    In this paper we investigate epidemic failure spreading in large- scale GMPLS-controlled transport networks. By evaluating the effect of the epidemic failure spreading on the network, we design several strategies for cost-effective network performance improvement via differentiated repair times...... model can be used during the network planning process for facilitating cost- effective network survivability design....

  13. Relations Between Wavelet Network and Feedforward Neural Network

    Institute of Scientific and Technical Information of China (English)

    刘志刚; 何正友; 钱清泉

    2002-01-01

    A comparison of construction forms and base functions is made between feedforward neural network and wavelet network. The relations between them are studied from the constructions of wavelet functions or dilation functions in wavelet network by different activation functions in feedforward neural network. It is concluded that some wavelet function is equal to the linear combination of several neurons in feedforward neural network.

  14. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  15. Directed network modules

    Science.gov (United States)

    Palla, Gergely; Farkas, Illés J.; Pollner, Péter; Derényi, Imre; Vicsek, Tamás

    2007-06-01

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos Rényi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs.

  16. Network Monitoring with Nagios

    CERN Document Server

    Dondich, Taylor

    2006-01-01

    Network monitoring can be a complex task to implement and maintain in your IT infrastructure. Nagios, an open-source host, service and network monitoring program can help you streamline your network monitoring tasks and reduce the cost of operation.With this shortcut guide, we'll go over how Nagios fits in the overall network monitoring puzzle. We'll also cover installation and basic usage. Finally, we'll show you how to extend Nagios with other tools to extend functionality.

  17. Networked professional learning

    OpenAIRE

    Sloep, Peter

    2013-01-01

    Sloep, P. B. (2013). Networked professional learning. In A. Littlejohn, & A. Margaryan (Eds.), Technology-enhanced Professional Learning: Processes, Practices and Tools (pp. 97–108). London: Routledge.

  18. Heterogeneous broadband network

    Science.gov (United States)

    Dittmann, Lars

    1995-11-01

    Although the vision for the future Integrated Broadband Communication Network (IBCN) is an all optical network, it is certain that for a long period to come, the network will remain very heterogeneous, with a mixture of different physical media (fiber, coax and twisted pair), transmission systems (PDH, SDH, ADSL) and transport protocols (TCP/IP, AAL/ATM, frame relay). In the current work towards the IBCN, the ATM concept is considered the generic network protocol for both public and private network, with the ability to use different underlying transmission protocols and, through adaptation protocols, provide the appropriate services (old as well as new) to the customer. One of the major difficulties of heterogeneous network is the restriction that is usually given by the lowest common denominator, e.g. in terms of single channel capacity. A possible way to overcome these limitations is by extending the ATM concept with a multilink capability, that allows us to use separate resources as one common. The improved flexibility obtained by this protocol extension further allows a real time optimization of network and call configuration, without any impact on the quality of service seen from the user. This paper describes an example of an ATM based multilink protocol that has been experimentally implemented within the RACE project 'STRATOSPHERIC'. The paper outlines the complexity of introducing an extra network functionality compared with the added value, such as an improved ability to recover an error due to a malfunctioning network component.

  19. Introduction to neural networks

    International Nuclear Information System (INIS)

    This lecture is a presentation of today's research in neural computation. Neural computation is inspired by knowledge from neuro-science. It draws its methods in large degree from statistical physics and its potential applications lie mainly in computer science and engineering. Neural networks models are algorithms for cognitive tasks, such as learning and optimization, which are based on concepts derived from research into the nature of the brain. The lecture first gives an historical presentation of neural networks development and interest in performing complex tasks. Then, an exhaustive overview of data management and networks computation methods is given: the supervised learning and the associative memory problem, the capacity of networks, the Perceptron networks, the functional link networks, the Madaline (Multiple Adalines) networks, the back-propagation networks, the reduced coulomb energy (RCE) networks, the unsupervised learning and the competitive learning and vector quantization. An example of application in high energy physics is given with the trigger systems and track recognition system (track parametrization, event selection and particle identification) developed for the CPLEAR experiment detectors from the LEAR at CERN. (J.S.). 56 refs., 20 figs., 1 tab., 1 appendix

  20. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  1. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  2. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  3. Directed network modules

    International Nuclear Information System (INIS)

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs

  4. Mission Critical Networking

    Energy Technology Data Exchange (ETDEWEB)

    Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario; Giordano, Silvia; Gouda, Mohamed; Schulzrinne, Henning; Youssef, Moustafa

    2010-06-01

    Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

  5. Linear Network Fractional Routing

    Directory of Open Access Journals (Sweden)

    S.ASOKAN,

    2011-07-01

    Full Text Available A Network is a finite directed acyclic graph with source messages from a fixed alphabet and message demands at sink nodes. Linear Programming is an algorithm design method. It can be used whenthe solution to a problem can be viewed as the result of a sequence of decisions. The Linear Programming model for the network problem where in every variable has a value one or zero. The problem is todetermine a method of transmitting the messages through the network such that all sink demands are satisfied. We will prove fractional routing capacity for some solvable network using Linear Programmingmodel.

  6. Celestial data routing network

    Science.gov (United States)

    Bordetsky, Alex

    2000-11-01

    Imagine that information processing human-machine network is threatened in a particular part of the world. Suppose that an anticipated threat of physical attacks could lead to disruption of telecommunications network management infrastructure and access capabilities for small geographically distributed groups engaged in collaborative operations. Suppose that small group of astronauts are exploring the solar planet and need to quickly configure orbital information network to support their collaborative work and local communications. The critical need in both scenarios would be a set of low-cost means of small team celestial networking. To the geographically distributed mobile collaborating groups such means would allow to maintain collaborative multipoint work, set up orbital local area network, and provide orbital intranet communications. This would be accomplished by dynamically assembling the network enabling infrastructure of the small satellite based router, satellite based Codec, and set of satellite based intelligent management agents. Cooperating single function pico satellites, acting as agents and personal switching devices together would represent self-organizing intelligent orbital network of cooperating mobile management nodes. Cooperative behavior of the pico satellite based agents would be achieved by comprising a small orbital artificial neural network capable of learning and restructing the networking resources in response to the anticipated threat.

  7. Transportation network reduction

    Directory of Open Access Journals (Sweden)

    Stanislav PALÚCH

    2015-06-01

    Full Text Available Network reduction problem is formulated as follows: We are given a transportation network T, a set of important origin – destination relations R and a number q greater than 1. The goal is to find a subnetwork S of the given network T such that all shortest paths between all origin – destination pairs from R using only subnetwork S are not longer than q-multiple of the corresponding distance in original network T. A mathematical model and an exact algorithm of just mentioned task is presented.

  8. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  9. Directed network modules

    Energy Technology Data Exchange (ETDEWEB)

    Palla, Gergely [Statistical and Biological Physics Research Group of HAS, Pazmany Peter Setany 1A, Budapest, H-1117 (Hungary); Farkas, Illes J [Statistical and Biological Physics Research Group of HAS, Pazmany Peter Setany 1A, Budapest, H-1117 (Hungary); Pollner, Peter [Statistical and Biological Physics Research Group of HAS, Pazmany Peter Setany 1A, Budapest, H-1117 (Hungary); Derenyi, Imre [Department of Biological Physics, Eoetvoes University, Pazmany Peter Setany 1A, Budapest, H-1117 (Hungary); Vicsek, Tamas [Statistical and Biological Physics Research Group of HAS, Pazmany Peter Setany 1A, Budapest, H-1117 (Hungary)

    2007-06-15

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs.

  10. Networked Instrumentation Element

    Data.gov (United States)

    National Aeronautics and Space Administration — Armstrong researchers have developed a networked instrumentation system that connects modern experimental payloads to existing analog and digital communications...

  11. Heterogeneous Economic Networks

    CERN Document Server

    Souma, W; Aoyama, H; Souma, Wataru; Fujiwara, Yoshi; Aoyama, Hideaki

    2005-01-01

    The Japanese shareholding network at the end of March 2002 is studied. To understand the characteristics of this network intuitively, we visualize it as a directed graph and an adjacency matrix. Especially detailed features of networks concerned with the automobile industry sector are discussed by using the visualized networks. The shareholding network is also considered as an undirected graph, because many quantities characterizing networks are defined for undirected cases. For this undirected shareholding network, we show that a degree distribution is well fitted by a power law function with an exponential tail. The exponent in the power law range is gamma=1.8. We also show that the spectrum of this network follows asymptotically the power law distribution with the exponent delta=2.6. By comparison with gamma and delta, we find a scaling relation delta=2gamma-1. The reason why this relation holds is attributed to the local tree-like structure of networks. To clarify this structure, the correlation between d...

  12. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  13. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-01

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. PMID:26809571

  14. Resilient networking in wireless sensor networks

    CERN Document Server

    Erdene-Ochir, Ochirkhand; Valois, Fabrice; Kountouris, Apostolos

    2010-01-01

    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focu...

  15. Forman curvature for directed networks

    CERN Document Server

    Sreejith, R P; Saucan, Emil; Samal, Areejit

    2016-01-01

    A goal in network science is the geometrical characterization of complex networks. In this direction, we have recently introduced the Forman's discretization of Ricci curvature to the realm of undirected networks. Investigation of Forman curvature in diverse model and real-world undirected networks revealed that this measure captures several aspects of the organization of complex undirected networks. However, many important real-world networks are inherently directed in nature, and the Forman curvature for undirected networks is unsuitable for analysis of such directed networks. Hence, we here extend the Forman curvature for undirected networks to the case of directed networks. The simple mathematical formula for the Forman curvature in directed networks elegantly incorporates node weights, edge weights and edge direction. By applying the Forman curvature for directed networks to a variety of model and real-world directed networks, we show that the measure can be used to characterize the structure of complex ...

  16. The Benefits of Grid Networks

    Science.gov (United States)

    Tennant, Roy

    2005-01-01

    In the article, the author talks about the benefits of grid networks. In speaking of grid networks the author is referring to both networks of computers and networks of humans connected together in a grid topology. Examples are provided of how grid networks are beneficial today and the ways in which they have been used.

  17. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  18. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  19. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  20. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  1. Miniaturized wireless sensor network

    CERN Document Server

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert

    2010-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  2. KUBIS Dataverse Network

    DEFF Research Database (Denmark)

    Drachen, Thea Marie; Larsen, Asger Væring; Dorch, Bertil F.

    2012-01-01

    Sciecom Info 1 (2012) Drachen, Larsen, Dorch The KUBIS Dataverse Network (https://data.kb.dk/dvn) is a digital archive for scientific primary data for use by researchers at The University of Copenhagen. KUBIS Dataverse Network is available to researchers, departments and institutes at the...

  3. Network Infrastructure Security

    CERN Document Server

    Wong, Angus

    2009-01-01

    Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. This book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions

  4. Information Theory of Networks

    Directory of Open Access Journals (Sweden)

    Matthias Dehmer

    2011-11-01

    Full Text Available The paper puts the emphasis on surveying information-theoretic network measures for analyzing the structure of networks. In order to apply the quantities interdisciplinarily, we also discuss some of their properties such as their structural interpretation and uniqueness.

  5. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  6. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  7. Networked professional learning

    OpenAIRE

    Sloep, Peter; Rusman, Ellen

    2013-01-01

    Sloep, P. B., & Rusman, E. (2013, 27-31 August). Networked Professional Learning. Symposium contribution to N. Pataraia & A. Margayan, Learning Through Networks, Symposium at the EARLI Conference for Research on Learning and Instruction, Responsible Teaching and Sustainable Learning, Munich, Germany.

  8. Environmental Sensor Networks

    OpenAIRE

    Martinez, Kirk; Hart, Jane; Ong, Royan

    2004-01-01

    Sensor networks for the natural environment require an understanding of earth science, combined with sensor, communications and computer technology. We discuss the evolution from data logging to sensor networks, describe our research from a glacial environment and highlight future challenges in this field.

  9. Network SCADA System

    International Nuclear Information System (INIS)

    Copper Institute, Industrial Informatics department, is developing and applying network real time process monitoring and control systems. Some of these systems are already in use. The paper presents some hardware and software general remarks and performances, with special regard to communication sub-systems and network possibilities. (Author)

  10. The Creative Cities Network

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The Creative Cities Network, started by UNESCO in 2004, is one of the world’s highest-level non-governmental organizations in creative industry. The network focuses on the excellence of its member cities as its main product, and finds ways to maintain relevance in city life, local economy

  11. Personalized Home-Networks

    DEFF Research Database (Denmark)

    Soler, José; Gandy, Michael

    2007-01-01

    The paper provides details of a home-networking architecture based on an enhanced residential gateway. Initially the need for mechanisms allowing user-dependent network behavior is described and afterwards details of an initial implementation are provided in terms of architectural description...

  12. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  13. Communication Network Analysis Methods.

    Science.gov (United States)

    Farace, Richard V.; Mabee, Timothy

    This paper reviews a variety of analytic procedures that can be applied to network data, discussing the assumptions and usefulness of each procedure when applied to the complexity of human communication. Special attention is paid to the network properties measured or implied by each procedure. Factor analysis and multidimensional scaling are among…

  14. Network coding theory

    CERN Document Server

    Yeung, Raymond; Cai, N

    2014-01-01

    Consider a network consisting of point-to-point communicationchannels. Each channel transmits information noiselessly subject to thechannel capacity. Data is to be transmitted from the source node to aprescribed set of destination nodes. Given the transmission requirements,a natural question is whether the network can fulfill theserequirements and how it can be done efficiently.

  15. Clustering of correlated networks

    OpenAIRE

    Dorogovtsev, S. N.

    2003-01-01

    We obtain the clustering coefficient, the degree-dependent local clustering, and the mean clustering of networks with arbitrary correlations between the degrees of the nearest-neighbor vertices. The resulting formulas allow one to determine the nature of the clustering of a network.

  16. Online Networking Site

    Institute of Scientific and Technical Information of China (English)

    杨淑恬

    2011-01-01

    @@ According to surveies of what users do on the Internet, it shows that Internet usage falls into four main categories; information, entertainment,social networking,and business.I decided to de- velop an ultimate social networking website that can include all this functions.

  17. International tourism network

    Science.gov (United States)

    Miguéns, Joana I. L.; Mendes, José F. F.; Costa, Carlos M. M.

    2007-06-01

    The interest in tourism has always been strong, for its important role in economic flows among nations. On this study we analyze the arrivals of international tourism (edges) over 206 countries and territories (nodes) around the world, on the year 2004. International tourist arrivals reached a record of 763 million in 2004. We characterize analytically the topological and weighted properties of the resulting network. International tourist arrivals are analyzed over in strength and out strength flows, resulting on a highly directed network, with a very heterogeneity of weights and strengths. The inclusion of edge weights and directions on the analysis of network architecture allows a more realistic insight on the structure of the networks. Centrality, assortativity and disparity are measured for the topological and weighted structure. Assortativity measures the tendency of having a high weight edges connecting two nodes with similar degrees. ITN is disassortative, opposite to social network. Disparity quantifies the how similar are the flows on a node neighborhood, measuring the heterogeneity of weights for in flows and out flows of tourism. These results provide an application of the recent methods of weighted and directed networks, showing that weights are relevant and that in general the modeling of complex networks must go beyond topology. The network structure may influence how tourism hubs, distribution of flows, and centralization can be explored on countries strategic positioning and policy making.

  18. Networks versus Economic Incentives

    DEFF Research Database (Denmark)

    Larsen, Christian Albrekt

    market it is argued that networks are of special importance for unemployed. At the same time unemployed is likely to lose network, which starts a vicious circle. Due to a formalised labour market, high integration of long-term unemployed and a number of other factors Denmark comes close to a worst case...

  19. Weighted Fractal Networks

    OpenAIRE

    Carletti, Timoteo; Righi, Simone

    2009-01-01

    In this paper we define a new class of weighted complex networks sharing several properties with fractal sets, and whose topology can be completely analytically characterized in terms of the involved parameters and of the fractal dimension. The proposed framework defines an unifying general theory of fractal networks able to unravel some hidden mechanisms responsible for the emergence of fractal structures in Nature.

  20. Stochastic network calculus

    CERN Document Server

    Jiang, Yuming

    2009-01-01

    Network calculus, a theory dealing with queuing systems found in computer networks, focuses on performance guarantees. This title presents a comprehensive treatment for the stochastic service-guarantee analysis research and provides basic introductory material on the subject, as well as discusses the various researches in the area.