WorldWideScience

Sample records for advocates network wepan

  1. Women in Engineering Program Advocates Network (WEPAN): Evaluation of the seventh annual conference

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, S.G.

    1996-08-01

    The primary goals of the 1996 WEPAN Conference were to: (1) Conduct technical and programmatic seminars for institutions desiring to initiate, replicate, or expand women in engineering programs; (2) Provide assistance in fundraising and grant writing; (3) Profile women in engineering programs of excellence; (4) Sponsor inspiring, knowledgeable and motivational keynote speakers; and, (5) Offer a series of workshops focused on topics such as: establishing partnerships with industry, current research findings, retention strategies, issues affecting special populations, and early intervention techniques. In an effort to provide greater access for women to engineering careers, women in engineering program directors at Purdue University, Stevens Institute of Technology and the University of Washington joined together in 1990 to establish WEPAN, a national network of individuals interested in the recruitment, admission, retention, and graduation of women engineering students. This is the seventh year of operation. Success of this effort has been reflected in numerous ways: increased membership in the organization; increased number of women in engineering programs; increased number of women graduating in engineering; and grants from the U.S. Department of Energy, the National Science Foundation, the Alfred P. Sloan Foundation, the AT&T Foundation, and many other corporations to carry out the goals of WEPAN. The Seventh Annual Women in Engineering Conference entitled, Capitalizing on Today`s Challenges, was held in Denver, Colorado on June 1-4, 1996 at the Hyatt Regency. The conference brought together representatives from academia, government, and industry and examined current issues and initiatives for women in technology, science, and education. Building on the successes of the previous conferences, the seventh conference offered a new variety of speakers and topics.

  2. Women in engineering program advocates network (WEPAN): Evaluation of the fourth annual conference

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, S.G.

    1994-08-01

    The 1994 WEPAN conference highlighted the establishment of the three Regional Centers for Women in Engineering, which are located at the University of Washington, Purdue University, and Stevens Insitute of Technology. An overall evaluation was conducted on the effectiveness of the conference, including the quality of plenary sessions, workshops, registration, accommodations and reception.

  3. Networks advocate for youth services.

    Science.gov (United States)

    1998-01-01

    This article discusses the role of networks in promoting reproductive health for youth in Ghana. The Suhum-Kraboa-Coaltar Network and the New Juaben Network are situated in the eastern region of Ghana. These two programs advocate for client-centered programs and for policy change at every level. Since the 1994 ICPD Plan of Action, these networks have worked to increase and improve health services for youth and to improve cooperation between government and nongovernmental groups. These networks provide family planning, reproductive health (RH), and, most importantly, promotion of adolescent health. CEDPA realized that many organizations had the capacity to extend services to youth and to fulfill other mandates of the 1994 ICPD Program of Action. But, these organizations lacked advocacy and networking skills for effectively challenging community policies and programs. CEDPA, in collaboration with others, initiated the POLICY project in 1996 in Ghana. The aim was to create a supportive policy context for family planning and RH programs by formation of a participatory policy process. The POLICY project in Ghana helped networks develop advocacy plans targeted to local decision-makers. The aim was to increase funding for adolescent RH in district plans and budgets. The first action taken by the POLICY project was to conduct a survey, which found that 67% of adolescent females and 53% of adolescent males were sexually active. Only 10% used contraceptives. Advocacy did not increase funding but did result in a supportive network of policy-makers. There are POLICY projects in over 12 countries. PMID:12294636

  4. Urban Parents of Children with Special Needs: Advocating for Their Children through Social Networks

    Science.gov (United States)

    Munn-Joseph, Marlene S.; Gavin-Evans, Karen

    2008-01-01

    Three families living in an urban area in the Midwest with elementary-age children diagnosed with disabilities were interviewed about their family involvement in special education programming and intervention. The study explored how three mothers used social networks to advocate and care for their child's special education programming. Using…

  5. Perspectives--A Tribute to Katie Beckett: Advocate for Youth with Disabilities and Founder of "Kids As Self-Advocates" Network (March 9, 1978-May 18, 2012)

    Science.gov (United States)

    Oser, Cindy; Whiteman, Jodi

    2012-01-01

    The authors remember the life of Katie Beckett, who was an outspoken advocate for disability rights and inspired the Katie Beckett Waiver Program, which allowed children to continue to be eligible for Medicaid and to have their health care needs provided in the home rather than being forced to be in a hospital or institution. Together, Katie and…

  6. Enable, mediate, advocate.

    Science.gov (United States)

    Saan, Hans; Wise, Marilyn

    2011-12-01

    The authors of the Ottawa Charter selected the words enable, mediate and advocate to describe the core activities in what was, in 1986, the new Public Health. This article considers these concepts and the values and ideas upon which they were based. We discuss their relevance in the current context within which health promotion is being conducted, and discuss the implications of changes in the health agenda, media and globalization for practice. We consider developments within health promotion since 1986: its central role in policy rhetoric, the increasing understanding of complexities and the interlinkage with many other societal processes. So the three core activities are reviewed: they still fit well with the main health promotion challenges, but should be refreshed by new ideas and values. As the role of health promotion in the political arena has grown we have become part of the policy establishment and that is a mixed blessing. Making way for community advocates is now our challenge. Enabling requires greater sensitivity to power relations involved and an understanding of the role of health literacy. Mediating keeps its central role as it bridges vital interests of parties. We conclude that these core concepts in the Ottawa Charter need no serious revision. There are, however, lessons from the last 25 years that point to ways to address present and future challenges with greater sensitivity and effectiveness. We invite the next generation to avoid canonizing this text: as is true of every heritage, the heirs must decide on its use. PMID:22080073

  7. Nuclear physicist, arms control advocate

    CERN Multimedia

    Chang, K

    2002-01-01

    Victor F. Weisskopf, a nuclear physicist who worked on the Manhattan Project to build the first atomic bomb in World War II and later became an ardent advocate of arms control, died Monday at his home in Newton, MA, USA. He was 93 (1 page).

  8. Dental students--dental advocates.

    Science.gov (United States)

    Bensch, Brittany

    2010-01-01

    Student advocacy and involvement in the political process is built into the structure of the American Student Dental Association (ASDA), especially in its Legislative Grassroots Network and an internal communication network among students to ensure political awareness. Students are concerned with such issues as a universally accepted, non-patient-based licensure process, mid-level providers, loan availability and tax deductibility, financial support for schools, and service early in one's professional career (giving forward rather than giving back). Through collaboration with the American Dental Education Association and with many state associations, students participate in lobbying, awareness campaigns, and behind the scenes as legislative aids. Although students share the same love for the profession that animates established practitioners, they are perceived by legislators as being different. Students are involved in the legislative process because it represents their future.

  9. Dental students--dental advocates.

    Science.gov (United States)

    Bensch, Brittany

    2010-01-01

    Student advocacy and involvement in the political process is built into the structure of the American Student Dental Association (ASDA), especially in its Legislative Grassroots Network and an internal communication network among students to ensure political awareness. Students are concerned with such issues as a universally accepted, non-patient-based licensure process, mid-level providers, loan availability and tax deductibility, financial support for schools, and service early in one's professional career (giving forward rather than giving back). Through collaboration with the American Dental Education Association and with many state associations, students participate in lobbying, awareness campaigns, and behind the scenes as legislative aids. Although students share the same love for the profession that animates established practitioners, they are perceived by legislators as being different. Students are involved in the legislative process because it represents their future. PMID:21314046

  10. Advocacy for active transport: advocate and city council perspectives

    Directory of Open Access Journals (Sweden)

    Rosenby Marieah

    2010-01-01

    Full Text Available Abstract Background Effective advocacy is an important part of efforts to increase population participation in physical activity. Research about effective health advocacy is scarce, however, the health sector can learn from the experiences and knowledge of community advocates and those who are on the receiving end of this advocacy. The aim of this study is to explore advocacy for active transport from the perspectives of community advocates and representatives from City councils. Methods Cycling and walking advocates were identified from the local contact list of Cycling Advocates Network and Living Streets Aotearoa. Semi-structured telephone interviews were conducted with cycle and walking advocates from throughout New Zealand. Advocates also nominated a suitable council officer at their local City council to be interviewed. Interviews were recorded and transcribed and categories of responses for each of the questions created. Results Several processes were used by advocates to engage with council staff, including formal council submissions, meetings, stakeholder forums and partnership in running community events promoting active transport. Several other agencies were identified as being influential for active transport, some as potential coalition partners and others as potential adversaries. Barriers to improving conditions for active transport included a lack of funding, a lack of will-power among either council staff or councillors, limited council staff capacity (time or training and a culture of providing infrastructure for motor vehicles instead of people. Several suggestions were made about how the health sector could contribute to advocacy efforts, including encouraging political commitment, engaging the media, communicating the potential health benefits of active transport to the general public and being role models in terms of personal travel mode choice and having workplaces that support participation in active transport

  11. Advocating for Grade-Based Acceleration

    Science.gov (United States)

    Guilbault, Keri M.

    2014-01-01

    Parents often struggle with the decision to accelerate their child and may worry about social and emotional issues, although research indicates positive effects on the social and emotional adjustment of carefully selected accelerants. As children's advocates, parents can work effectively with a school system to secure an appropriate academic…

  12. ESOL Teachers as Advocates: An Important Role?

    Science.gov (United States)

    Linville, Heather A.

    2016-01-01

    Due to the fact that English language learners (ELLs) often do not have the same educational opportunities or outcomes as non-ELL students in the United States, the professional standards for initial certification for teaching English for speakers of other languages (ESOL) call on ESOL teachers to advocate for them. Yet little research exists on…

  13. The neonatal nurse: advocating for breastfeeding mothers.

    Science.gov (United States)

    Darby, Colm; Nurse, Sharon

    2016-02-01

    Accurate information and support from healthcare professionals as well as respect for parental choice are all factors which contribute to effective breastfeeding in the neonatal unit; with this in mind, Colm Darby and Sharon Nurse discuss the potential problems in expressing breast milk and the interventions which might be effective in avoiding them. Advocacy is an inherent part of neonatal nurses' role whilst caring for sick, vulnerable babies. Colm Darby is a male neonatal nurse working in a predominantly female environment and passionately believes in supporting and advocating for mothers who want to provide breast milk for their babies. In this article, CoIm uses Borton's model of reflection to discuss how he acted as an effective advocate for such a mother.

  14. An Advocates' Guide to Advocating...or A Good Offense without Being Offensive.

    Science.gov (United States)

    Monson, Jay A.

    1984-01-01

    A policy maker offers guidelines for people wishing to advocate for gifted education. Suggestions touch on such aspects as the need for apathy, the role of telephone and letter advocacy, and the appropriate target of advocacy efforts. (CL)

  15. Autoethnographic Mother-Writing: Advocating Radical Specificity

    Directory of Open Access Journals (Sweden)

    Patty Sotirin

    2010-01-01

    Full Text Available In considering the similarities between "momoirs"--popular memoirs written by mothers about motherhood experiences--and evocative autoethnographic mother-writing, I argue that differentiating these two forms of intimate observation and personal narrative requires a rethinking of autoethnographic practice. Specifically, I draw on the work of Gilles Deleuze to advocate for a radical specificity in autoethnographic writing. Thinking the autoethnographic narrative in terms of specificities and differences encourages us to think creatively about personal experiences and cultural relations beyond what is shared and communicable.

  16. Advocating for the Use of Pharmacogenomics: One Nurse's Story.

    Science.gov (United States)

    Pestka, Elizabeth L; Shea, Catherine E

    2016-07-01

    The current article describes the experiences of a motivated nurse who gained an understanding of pharmacogenomics and advocated for the use cytochrome P450 testing for patients in her clinical practice, her family members, herself, and for changing the health care delivery system to more readily recognize and address drug-metabolizing-enzyme abnormalities. Recommendations for nurses interested in promoting the use of pharmacogenomics include learning as much as possible about testing and implications, networking with other providers, identifying a knowledgeable pharmacist, assessing for a family history of problems with medication side effects or lack of efficacy, and keeping records of relevant medical and medication information to share with providers. [Journal of Psychosocial Nursing and Mental Health Services, 54(7), 38-42.]. PMID:27362384

  17. John Dique: dialysis pioneer and political advocate.

    Science.gov (United States)

    George, Charles R P

    2016-02-01

    John Dique (1915-1995) epitomized the internationalism of medicine, the intellectual and manual dexterity of many pioneers of dialysis, and the social concern evinced by many nephrologists. Born in Burma of French, German, British and Indian ancestry; educated in India; an Anglo-Indian who described himself as British without ever having visited Britain; he moved to Australia in 1948 to escape the murderous inter-ethnic conflict that befell multicultural India as it and Pakistan became independent. Settling in Brisbane, he pioneered several novel medical techniques. After inventing some simple equipment to facilitate intravenous therapy, he established a neonatal exchange blood transfusion programme. Then, between 1954 and 1963, he personally constructed and operated two haemodialysis machines with which to treat patients suffering from acute renal failure, the first such treatment performed in Australasia. His patients survival results were, for the era, remarkable. He subsequently helped found the Royal Australasian College of Pathologists and went on to establish a successful private pathology practice. The latter years of his life, however, saw him become a social and political advocate. He fiercely opposed the emerging ideologies of multiculturalism and social liberalism that, he predicted, would seriously damage the national fabric of Western society. Public vilification ensued, his medical achievements disregarded. It does seem likely, however, that in none of the areas that he touched - whether medical, social, or political - has the last word yet been said. PMID:26913881

  18. John Dique: dialysis pioneer and political advocate.

    Science.gov (United States)

    George, Charles R P

    2016-02-01

    John Dique (1915-1995) epitomized the internationalism of medicine, the intellectual and manual dexterity of many pioneers of dialysis, and the social concern evinced by many nephrologists. Born in Burma of French, German, British and Indian ancestry; educated in India; an Anglo-Indian who described himself as British without ever having visited Britain; he moved to Australia in 1948 to escape the murderous inter-ethnic conflict that befell multicultural India as it and Pakistan became independent. Settling in Brisbane, he pioneered several novel medical techniques. After inventing some simple equipment to facilitate intravenous therapy, he established a neonatal exchange blood transfusion programme. Then, between 1954 and 1963, he personally constructed and operated two haemodialysis machines with which to treat patients suffering from acute renal failure, the first such treatment performed in Australasia. His patients survival results were, for the era, remarkable. He subsequently helped found the Royal Australasian College of Pathologists and went on to establish a successful private pathology practice. The latter years of his life, however, saw him become a social and political advocate. He fiercely opposed the emerging ideologies of multiculturalism and social liberalism that, he predicted, would seriously damage the national fabric of Western society. Public vilification ensued, his medical achievements disregarded. It does seem likely, however, that in none of the areas that he touched - whether medical, social, or political - has the last word yet been said.

  19. Advocating Global Forest Issues on the Internet.

    Science.gov (United States)

    Kempf, Alois

    Sustainable development, biological diversity and conservation of tropical forests are only a few of the hot environmental and political topics where the actors involved have started to make use of the world-wide computer networks. The Internet (as a transport medium of information exchange) and the World Wide Web (as the favorite service to…

  20. Introducing Forum Theatre to Elicit and Advocate Children's Views

    Science.gov (United States)

    Hammond, Nick

    2013-01-01

    Eliciting and advocating the voice of the child remains at the heart of international political agenda and also remains a central role for educational psychologists (EPs). Previous research indicates that EPs tend to use language-based methods for eliciting and advocating views of children. However, these approaches are often limited. Taking a…

  1. Police officers' collaboration with rape victim advocates: barriers and facilitators.

    Science.gov (United States)

    Rich, Karen; Seffrin, Patrick

    2013-01-01

    Secondary victimization may occur when rape victims make police reports. This can compromise the quality of official statements and jeopardize criminal cases. Rape reporters receive better treatment by police officers when advocates are involved and best practice police work includes such collaboration. Studies of advocates have described tension, role confusion, and poor communication with police officers. Many variables, including rape myth acceptance (RMA) and training on sexual assault dynamics, may affect officers' collaboration with advocates. There were 429 police officers who responded to a survey measuring their victim interviewing skill, formal training about rape, years on the job, number of victims known personally, number of recent rape cases, RMA, and collaboration with advocates. Results suggest that officers' interviewing skill, years on the job, and specific training are related to collaboration with victim advocates on rape cases. Professional, rather than personal, variables were most predictive of collaboration. Implications for officer selection and training are explored.

  2. Designing a Mobile Application: The Case of iAdvocate

    Directory of Open Access Journals (Sweden)

    Alan R. Foley

    2012-01-01

    Full Text Available In this article, the design of a mobile application (app called iAdvocate is illustrated. The goal of iAdvocate is to share and develop specific strategies with parents of children with disabilities for working collaboratively with a school team to improve their children’s education. iAdvocate uses problem-based learning strategies, simulations, and provides contextual access resources to build parental advocacy skills and knowledge. iAdvocate provides parents with both information and strategies regarding their educational rights and getting their child’s needs met. The goal of iAdvocate is to share and develop specific strategies with parents for working collaboratively with a school team to improve their children’s education. iAdvocate contains three sections: strategies, a compilation of approaches that parents can pursue as advocates; resources, which lists and, where possible, links to such references as laws, books, articles, web sites, video presentations, and organizations that provide information on inclusive education; and, responses, which features simulated interactions, such as replies to common statements made by school professionals regarding services and accommodations for children. This case illustrates the design processes and techniques used to develop an instructional mobile application by presenting the background and context of the project, initial design and design iterations, negative case analysis, and prototyping. Additional documents illustrating the project background, and design process are also included.

  3. Yalana B. Bryant receives education advocate of the year award

    OpenAIRE

    Harris, Jennifer

    2008-01-01

    Yalana B. Bryant, assistant director for diversity initiatives at Virginia Tech's Office of Undergraduate Admissions, recently received this year's American Association of University Women (AAUW) of Virginia's Education Advocate of the Year Award at a ceremony in Roanoke, Va.

  4. Advocacy for active transport: advocate and city council perspectives

    OpenAIRE

    Rosenby Marieah; Reeder Anthony I; Murdoch Linda; Richards Rosalina

    2010-01-01

    Abstract Background Effective advocacy is an important part of efforts to increase population participation in physical activity. Research about effective health advocacy is scarce, however, the health sector can learn from the experiences and knowledge of community advocates and those who are on the receiving end of this advocacy. The aim of this study is to explore advocacy for active transport from the perspectives of community advocates and representatives from City councils. Methods Cycl...

  5. Having a patient advocate dedicated to the ED.

    Science.gov (United States)

    2008-02-01

    The ED at St. Mary's Hospital in Tucson, AZ, has its own departmental patient advocate. This new staff position saves a lot of time for the rest of the team members. Here are some of the functions a patient advocate can perform in your ED: proactively prevent problems and satisfy delivery of care needs in a timelier manner to avoid complaints; train the ED staff in customer service and communication techniques; communicate with outside clinics to support uninsured or underinsured patients who don't have primary care physicians. PMID:18447293

  6. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  7. Sage Advocate Employment Service--WHEEE: A Program Description.

    Science.gov (United States)

    Radding, Natalie M.

    1980-01-01

    Sage Advocate Employment Service in New Haven, Connecticut, is a nonprofit agency that aids older adults in seeking jobs and obtaining needed services. The agency began as a volunteer activity of Yale University students, WHEEE--We Help Elders Establish Employment. The history and factors contributing to its growth are reviewed. (Author/BEF)

  8. A Rhythm Recognition Computer Program to Advocate Interactivist Perception

    Science.gov (United States)

    Buisson, Jean-Christophe

    2004-01-01

    This paper advocates the main ideas of the interactive model of representation of Mark Bickhard and the assimilation/accommodation framework of Jean Piaget, through a rhythm recognition demonstration program. Although completely unsupervised, the program progressively learns to recognize more and more complex rhythms struck on the user's keyboard.…

  9. The challenge of gun control for mental health advocates.

    Science.gov (United States)

    Pandya, Anand

    2013-09-01

    Mass shootings, such as the 2012 Newtown massacre, have repeatedly led to political discourse about limiting access to guns for individuals with serious mental illness. Although the political climate after such tragic events poses a considerable challenge to mental health advocates who wish to minimize unsympathetic portrayals of those with mental illness, such media attention may be a rare opportunity to focus attention on risks of victimization of those with serious mental illness and barriers to obtaining psychiatric care. Current federal gun control laws may discourage individuals from seeking psychiatric treatment and describe individuals with mental illness using anachronistic, imprecise, and gratuitously stigmatizing language. This article lays out potential talking points that may be useful after future gun violence. PMID:24042247

  10. The challenge of gun control for mental health advocates.

    Science.gov (United States)

    Pandya, Anand

    2013-09-01

    Mass shootings, such as the 2012 Newtown massacre, have repeatedly led to political discourse about limiting access to guns for individuals with serious mental illness. Although the political climate after such tragic events poses a considerable challenge to mental health advocates who wish to minimize unsympathetic portrayals of those with mental illness, such media attention may be a rare opportunity to focus attention on risks of victimization of those with serious mental illness and barriers to obtaining psychiatric care. Current federal gun control laws may discourage individuals from seeking psychiatric treatment and describe individuals with mental illness using anachronistic, imprecise, and gratuitously stigmatizing language. This article lays out potential talking points that may be useful after future gun violence.

  11. Research subject advocate: a new protector of research participants.

    Science.gov (United States)

    Neill, Kathleen M

    2003-01-01

    In 2001, the National Center for Research Resources (NCRR) directed the 78 General Clinical Research Centers (GCRC) to develop a Research Subject Advocate (RSA) position. The RSA would report directly to the Principal Investigator (PI) of each GCRC and assure compliance of studies conducted on the GCRC with federal regulations and policies. Seven RSAs agreed to be interviewed about their new role. Website documents, electronic correspondence, and presentations at the first annual national meeting of RSAs were scrutinized using discursive analysis to shed light on this new organizational form and its potential for increased protection of human research participants. The RSA role actualizes the ethical principles of respect for persons, justice, and beneficence that are the foundation of the protection of research participants. The results also reveal the regulatory, institutional, collegial, and personal resources and barriers that assist the RSA in the successful implementation of the RSA role. In addition, issues important to the RSAs are described. PMID:14979318

  12. Pere Albert: Barcelona Canon, Royal Advocate, Feudal Theorist

    Directory of Open Access Journals (Sweden)

    Kagay, Donald K.

    2002-06-01

    Full Text Available In this article, the life and career of one of Catalonia's greatest medieval legists is discussed. Using notarial and court documentation, the author explores the work of Pere Albert as judge and advocate. The Customs of Catalonia and other of Pere Albert's treatises form the basis for the review of the legist's career as a theorist in feudal law. The basis for this article is the collection of documents pertaining to Pere Albert, which the author includes in an appendix.

    En este artículo se estudia la vida y la carrera de uno de los jurisconsultos medievales más importantes de Cataluña. Utilizando la documentación notarial y judicial, el autor analiza la labor de Pere Albert como juez y abogado. ElsCostums de Catalunya y otros tratados de Pere Albert constituyen la base para el estudio de la carrera del jurisconsulto, como teórico en ley feudal y real. El artículo se basa en una colección de documentos originales relativos a Pere Albert, que el autor incluye en un apéndice.

  13. Planning for the next generation of public health advocates: evaluation of an online advocacy mentoring program.

    Science.gov (United States)

    O'Connell, Emily; Stoneham, Melissa; Saunders, Julie

    2016-04-01

    Issue addressed Despite being viewed as a core competency for public health professionals, public health advocacy lacks a prominent place in the public health literature and receives minimal coverage in university curricula. The Public Health Advocacy Institute of Western Australia (PHAIWA) sought to fill this gap by establishing an online e-mentoring program for public health professionals to gain knowledge through skill-based activities and engaging in a mentoring relationship with an experienced public health advocate. This study is a qualitative evaluation of the online e-mentoring program. Methods Semi-structured interviews were conducted with program participants at the conclusion of the 12-month program to examine program benefits and determine the perceived contribution of individual program components to overall advocacy outcomes. Results Increased mentee knowledge, skills, level of confidence and experience, and expanded public health networks were reported. Outcomes were dependent on participants' level of commitment, time and location barriers, mentoring relationship quality, adaptability to the online format and the relevance of activities for application to participants' workplace context. Program facilitators had an important role through the provision of timely feedback and maintaining contact with participants. Conclusion An online program that combines public health advocacy content via skill-based activities with mentoring from an experienced public health advocate is a potential strategy to build advocacy capacity in the public health workforce. So what? Integrating advocacy as a core component of professional development programs will help counteract current issues surrounding hesitancy by public health professionals to proactively engage in advocacy, and ensure that high quality, innovative and effective advocacy leadership continues in the Australian public health workforce.

  14. Planning for the next generation of public health advocates: evaluation of an online advocacy mentoring program.

    Science.gov (United States)

    O'Connell, Emily; Stoneham, Melissa; Saunders, Julie

    2016-04-01

    Issue addressed Despite being viewed as a core competency for public health professionals, public health advocacy lacks a prominent place in the public health literature and receives minimal coverage in university curricula. The Public Health Advocacy Institute of Western Australia (PHAIWA) sought to fill this gap by establishing an online e-mentoring program for public health professionals to gain knowledge through skill-based activities and engaging in a mentoring relationship with an experienced public health advocate. This study is a qualitative evaluation of the online e-mentoring program. Methods Semi-structured interviews were conducted with program participants at the conclusion of the 12-month program to examine program benefits and determine the perceived contribution of individual program components to overall advocacy outcomes. Results Increased mentee knowledge, skills, level of confidence and experience, and expanded public health networks were reported. Outcomes were dependent on participants' level of commitment, time and location barriers, mentoring relationship quality, adaptability to the online format and the relevance of activities for application to participants' workplace context. Program facilitators had an important role through the provision of timely feedback and maintaining contact with participants. Conclusion An online program that combines public health advocacy content via skill-based activities with mentoring from an experienced public health advocate is a potential strategy to build advocacy capacity in the public health workforce. So what? Integrating advocacy as a core component of professional development programs will help counteract current issues surrounding hesitancy by public health professionals to proactively engage in advocacy, and ensure that high quality, innovative and effective advocacy leadership continues in the Australian public health workforce. PMID:27468984

  15. Advocate's Viewpoint on Hereditary Breast/Ovarian Cancer

    Directory of Open Access Journals (Sweden)

    Kolling-Dandrieu Francisca

    2004-08-01

    Full Text Available Abstract This paper discusses the presentation I held at the symposium on genetics during the 4th European Breast Cancer Conference held in Hamburg in March 2004. Primarily, the goals and working methods of the advocacy group specialised in Hereditary Breast/Ovarian Cancer of the Dutch Breast Cancer Patient Organisation known as BorstkankerVereniging Nederland (BVN are explained. Furthermore, some specific individual problems that mutation carriers might encounter before and after BRCA1/2 susceptibility testing are discussed. These include: dilemmas in choosing preventive interventions, dealing with the psychological impact of knowing you are a mutation carrier, dealing with the social implications of being genetically at risk, an example of insurance discrimination. In addition, some controversial social and ethical issues that are currently under debate are highlighted, such as the issue of the European patenting of the breast cancer susceptibility genes BRCA1 and BRCA2. Since this topic could also become relevant for other gene-related diseases, society as a whole has to consider the ethical and social implications related to the patenting of human genes in general. Another ethical area of debate is the controversial issue of prenatal BRCA testing and the choice of pregnancy termination. Finally, the Working Party pleads for the international co-operation and exchange of data and experience among professionals as well as patients. It appears that professionals in different European countries tend to advise on different risk management strategies and treatments and as such, the Working Party strongly advocates the international standardisation of risk management and treatment of mutation carriers. In this respect, specific attention should be given to a group that has had a non-informative or negative BRCA test result, because this group is still considered to be at high risk to develop the disease.

  16. Excelling in the Role of Advocate: A Qualitative Study Exploring Advocacy as an Essential Physiotherapy Competency

    OpenAIRE

    Kelland, Kerri; Hoe, Erica; McGuire, Michaela J.; Yu, Jane; Andreoli, Angie; Nixon, Stephanie A.

    2014-01-01

    Purpose: To explore the perspectives of leading advocates regarding the attributes required for excelling in the advocate role as described within the Essential Competency Profile for Physiotherapists in Canada (2009). Methods: We used a descriptive qualitative design involving in-depth, semi-structured interviews conducted with leading Canadian advocates within the physiotherapy profession. Transcribed interviews were coded and analyzed using thematic analysis. Results: The 17 participants i...

  17. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani;

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage...... buffering, scheduling, and processing over the network. On the other hand, NC has shown great potential for increasing robustness and performance when deployed on intermediate nodes in the network. This new paradigm changes the dynamics of network protocols, requiring new designs that exploit its potential....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  18. "Never Such an Opportunity": Every Teacher Is an Advocate for Music Education

    Science.gov (United States)

    Wagener, Dorothy

    2007-01-01

    Every music educator is an advocate for music education. Members of the The National Association for Music Education (MENC) advocate for the cause of music education. Beginning right in the classroom and moving beyond it to community leaders state decision makers, music teachers have spheres of influence where they can cultivate support for music…

  19. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe;

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm....... The inherent flexibility of both SDN and NC provides fertile ground to envision more efficient, robust, and secure networking designs, which may also incorporate content caching and storage, all of which are key challenges of the upcoming 5G networks. This article not only proposes the fundamentals...

  20. The Perfect Tens: The Top Twenty Books Reviewed in "Voice of Youth Advocates" 2001-2002.

    Science.gov (United States)

    Voice of Youth Advocates, 2003

    2003-01-01

    Explains the review procedures and rating system for teen books in "Voice of Youth Advocates" and provides annotated bibliographies for the twenty best books in 2001-2202, including fiction, nonfiction, and science fiction and fantasy. (LRW)

  1. African American Men and Prostate Cancer: Be Your Own Advocate and Understand Screening

    Science.gov (United States)

    AFRICAN AMERICAN MEN AND PROSTATE CANCER: BE YOUR OWN ADVOCATE AND UNDERSTAND SCREENING By the National Cancer ... American men. For reasons that are still unknown, African American men are more likely to get prostate ...

  2. When would we advocate a total thyroidectomy in cases of hypopharyngeal carcinoma?

    Directory of Open Access Journals (Sweden)

    Zeiad Gad

    2014-06-01

    Conclusion: We would advocate a total thyroidectomy in cases of advanced stages of hypopharyngeal carcinoma, bilateral tumors, postcricoid carcinoma and in all patients with definite radiological evidence of thyroid gland invasion.

  3. A Consensus Definition and Core Competencies for Being an Advocate for Pharmacy

    OpenAIRE

    Bzowyckyj, Andrew S.; Janke, Kristin K.

    2013-01-01

    Objective. To develop a consensus definition for “advocacy for the profession of pharmacy” and core competencies for doctor of pharmacy (PharmD) graduates to be effective advocates for the profession.

  4. Youth and caregiver access to peer advocates and satisfaction with mental health services.

    Science.gov (United States)

    Radigan, Marleen; Wang, Rui; Chen, Yu; Xiang, Jiani

    2014-11-01

    Access to peer advocates is increasingly available to youth and their caregivers who are receiving services in the public mental health system. This study examines associations between reported access to a youth or family advocate and perceptions of satisfaction with mental health services. A cross-sectional survey of youth (N = 768) and caregivers (N = 1,231) who utilized public mental health services in New York State in 2012 was conducted. The survey includes items on access to youth or family advocates and degree of satisfaction with mental health services. A greater proportion of youth or caregivers with access to peer advocates compared to those without access responded positively on the satisfaction domains of access to services, appropriateness of services, participation in services and overall/global satisfaction. Access to peer advocates was also positively associated with agreement on the psychotropic medication comprehension domain for youth and on perceptions of child functioning and social connectedness for caregivers compared to those without access. This study adds to the growing understanding of the important role peer advocates play in engaging youth with mental health needs and their caregivers in mental health services.

  5. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; de Fries, Louise Skovlund

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social...

  6. Secondary traumatic stress among domestic violence advocates: workplace risk and protective factors.

    Science.gov (United States)

    Slattery, Suzanne M; Goodman, Lisa A

    2009-11-01

    This study identified workplace factors associated with secondary traumatic stress (STS) in a sample of 148 domestic violence advocates working in diverse settings. Findings indicate that coworker support and quality clinical supervision are critical to emotional well-being and that an environment in which there is shared power-that is, respect for diversity, mutuality, and consensual decision making-provides better protection for advocates than more traditional, hierarchical organizational models. Furthermore, shared power emerged as the only workplace variable to significantly predict STS above and beyond individual factors. The discussion includes implications for practice and policy as well as directions for future research. PMID:19809098

  7. Women in History--Pearl Buck: An Advocate for Women and Children

    Science.gov (United States)

    Watts, Lynette

    2008-01-01

    This article profiles Pearl Buck, an advocate for women's rights and minority children, an author of Chinese history, and a pioneer in many ways. Buck established the Welcome House in 1949 in order to help unadoptable children find families (Conn, 1996). In 1964, Buck founded the Pearl S. Buck Foundation, now Pearl S. Buck International, which…

  8. Sexual Assault Nurse Examiners' Perceptions of Their Relationship with Doctors, Rape Victim Advocates, Police, and Prosecutors

    Science.gov (United States)

    Maier, Shana L.

    2012-01-01

    In response to the negative and inefficient treatment of rape victims by emergency room personnel, the first Sexual Assault Nurse Examiner (SANE) programs began in the late 1970s. While SANEs, doctors, rape victim advocates, police officers and prosecutors work together to ensure the most comprehensive and sensitive care of rape victims, they all…

  9. Professional School Counselors as Social Justice Advocates for Undocumented Immigrant Students in Group Work

    Science.gov (United States)

    Chen, Eric C.; Budianto, Lina; Wong, Kimberly

    2010-01-01

    Due to cultural and linguistic barriers, as well as a fear of deportation, undocumented immigrant students have remained an invisible group face in the existing school system. We provide specific strategies for school counselors to consider in advocating social justice and in facilitating empowerment of undocumented immigrant students through…

  10. Be Your Own Best Advocate. PACER Center ACTion Information Sheets. PHP-c116

    Science.gov (United States)

    PACER Center, 2006

    2006-01-01

    Being a self-advocate means asking for what one needs while respecting the needs of others. Self-advocacy is asking for what is needed in a direct, respectful manner. It is an important skill to acquire because self-advocacy helps: (1) Obtain what is needed; (2) People make personal choices; (3) Learn to say no without feeling guilty; and (4)…

  11. Advocating the Implementation of Mastery Learning in Higher Education to Increase Student Learning and Retention

    Science.gov (United States)

    Klecker, Beverly M.; Chapman, Ann

    2008-01-01

    The purpose of this paper was three-fold: (1) to review mastery learning and criterion-based assessment; (2) to advocate extending these concepts to higher education; and (3) to invite MSERA members to join in research projects examining mastery learning in higher education. The authors used Guskey's (2001) definition of mastery learning from his…

  12. Women in History--Sarah Winnemucca: Native Educator and Human Rights Advocate

    Science.gov (United States)

    Krumm, Bernita L.

    2006-01-01

    This article profiles Sarah Winnemucca, a Native educator and dedicated human rights advocate who devoted her life to building communication and creating understanding between the Native and white cultures. On March 1, 2005, Congressman Jon Porter of Nevada addressed Congress on a bill to allow for the placement of a statue of Sarah Winnemucca…

  13. Pitfalls Advocates Should Avoid in Arbitration of Educational Negotiated Grievances Procedures.

    Science.gov (United States)

    Roumell, George T., Jr.

    1980-01-01

    Advocates at grievance arbitrations should know the requirements for challenging arbitrator jurisdiction, especially timeliness; should know the procedural safeguards in the contract that must be followed in order to sustain discipline; should know the theory of the case; and should realize that techniques of presentation may be important.…

  14. Content-Specific Strategies to Advocate for Lesbian, Gay, Bisexual, and Transgender Youth: An Exploratory Study

    Science.gov (United States)

    Graybill, Emily C.; Varjas, Kris; Meyers, Joel; Watson, Laurel B.

    2009-01-01

    Researchers suggest that supportive school personnel may decrease some of the challenges encountered by lesbian, gay, bisexual, and transgender (LGBT) youth in schools (Russell, Seif, & Truong, 2001); however, little is known about the approaches used by school-based advocates for LGBT youth. This exploratory study investigated the strategies used…

  15. Advocating Student-within-Environment: A Humanistic Theory for School Counseling

    Science.gov (United States)

    Lemberger, Matthew E.

    2010-01-01

    The author introduces a humanistic theory for school counseling called Advocating Student-within-Environment (ASE). According to this theory, the student is an adaptive agent who operates within ever-evolving environments. With ASE, a school counselor can use the capacities of the student, the school environment, and their shared agency to promote…

  16. Peer Assessment and Compliance Review (PACR) Innovative Strategies Report. California Court Appointed Special Advocates (CASA) Programs

    Science.gov (United States)

    Macro, Bronwen; Huang, Lee Ann

    2005-01-01

    This report focuses on the innovative strategies study component of the Peer Assessment and Compliance Review (PACR) project. California (Court Appointed Special Advocates) CASA programs have developed many innovative strategies to serve children in their communities. At each of the programs visited during the PACR project, the team identified at…

  17. Using Action Research to Assess and Advocate for Innovative School Library Design

    Science.gov (United States)

    Harper, Meghan; Deskins,Liz

    2015-01-01

    This article describes a collaborative project designed to use action research to assess and advocate for innovative design changes in a school library. The high school library was in its fifth year of service, and yet the layout of the library was not meeting the learning and technological needs of 21st-century high school students. The purpose…

  18. Perspectives of Social Justice Activists: Advocating against Native-Themed Mascots, Nicknames, and Logos

    Science.gov (United States)

    Steinfeldt, Jesse A.; Foltz, Brad D.; LaFollette, Julie R.; White, Mattie R.; Wong, Y. Joel; Steinfeldt, Matthew Clint

    2012-01-01

    This study investigated perspectives of social justice activists who directly advocate for eliminating Native-themed mascots, nicknames, and logos. Using consensual qualitative research methodology, the research team analyzed transcripts of interviews conducted with 11 social justice activists to generate themes, categories, and domains within the…

  19. Seven Guidelines for Parents of Gifted: How to Advocate Intelligently in a Tough Economy

    Science.gov (United States)

    Mersino, Deborah

    2010-01-01

    Almost every day, another gifted education program bites the proverbial dust. Parents all across the country feel both apprehensive and anxious about the cuts. They are concerned about the educational and social emotional well-being of these students. They also wonder if it is even possible to advocate for gifted education in today's bleak…

  20. Social values and solar energy policy: the policy maker and the advocate

    Energy Technology Data Exchange (ETDEWEB)

    Shama, A.; Jacobs, K.

    1980-07-01

    Solar energy policy makers and advocates have significantly different hierarchies (clusters) of values upon which they evaluate the adoption of solar technologies. Content analysis, which examines the frequency with which policy makers identify different types of values, indicates that they hold economic values to be of primary importance. Environmental, social, and national security values are also substantial elements of the policy makers' value clusters associated with solar energy. This finding is confirmed by a qualitative analysis of policy makers' values. Advocates, on the other hand, assign almost equal weights (33%) to economic values and social values, slightly less weight to environmental values, and significant attention to ethical and security values as well. These results of frequency analysis are made somewhat more complicated by a qualitative interpretation of the advocates' positions. As part of their more holistic approach, several of the advocates indicated that all values discussed by them are instrumental toward achieving higher-order, ethical and environmental values. In addition, our preliminary investigation indicates that neither group is entirely homogeneous. Testing this and other propositions, as well as obtaining a similar picture of the values which the public associates with solar energy, are topics of future research.

  1. Reconstructing Parents’ Meetings in Primary Schools: The Teacher as Expert, the Parent as Advocate and the Pupil as Self-Advocate

    Directory of Open Access Journals (Sweden)

    Gillian Inglis

    2012-01-01

    Full Text Available The efficacy of parents’ meetings in primary schools in the UK is anarea in need of research. This article uses an approach informed by grounded theory to explore the experiences and satisfaction of parents, teachers and pupils regarding bi-annual meetings to discuss pupil progress. A two-phase approach was utilised, with diary-interviews with parents and teachers and group pupil interviews in Phase 1, followed by a parents’ questionnaire in Phase 2 derived from Phase 1 data. The findings from a doctoral study provide an overall more positive depiction of these meetings compared to existing research in the secondary sector. A model of the teacher as the expert and information-giver persists, but a consumerist ideology appears evident as parents seek to participate and advocate on behalf of their child. As parents become more proactive and teachers act to retain their professional authority, the interaction of the professional and advocate has excluded the perspective of the child. This leaves pupils in search of self-advocacy at meetings in which they are the object of discussion, but cannot be present. While pupils generally favour involvement, adults express a protectionist perspective on pupil exclusion with exceptional factors indicated as being the age of the child and the content of the meeting.

  2. Professional development through policy advocacy: communicating and advocating for health and health equity.

    Science.gov (United States)

    Garcia, Lydia Berenice; Hernandez, Kristen Eileen; Mata, Holly

    2015-03-01

    Communicating and advocating for evidence-based public health policy is a key component of health promotion practice, but public health professionals often lack experience in policy advocacy. This article provides perspectives from public health professionals who participated in successful public health policy advocacy efforts in their community. Their experiences using evidence-based research to advocate for policies that promote health equity contributed significantly to their career development, and also contributed to community capacity to reduce tobacco-related disparities. This article builds on previous work emphasizing the value of career development opportunities that enhance and diversify the public health workforce, and provides practical tips and "lessons learned" that are relevant to a wide range of public health professionals. PMID:25416310

  3. Chapter Oral Health Advocates: A Nationwide Model for Pediatrician Peer Education and Advocacy about Oral Health

    OpenAIRE

    Lewis, Charlotte W.; Lauren Barone; Rocio B. Quinonez; Suzanne Boulter; Mouradian, Wendy E.

    2013-01-01

    Objective. (1) To describe an innovative program training US pediatricians to be Chapter Oral Health Advocates (COHAs). (2) To provide insight into COHAs’ experiences disseminating oral health knowledge to fellow pediatricians. Patients and Methods. Interviews with 40 COHAs who responded to an email request, from a total of 64 (62% response). Transcripts were analyzed for common themes about COHA activities, facilitators, and barriers. Results. COHAs reported positive experiences at the AAP ...

  4. Tobacco control advocates must demand high-quality media campaigns: the California experience

    OpenAIRE

    Balbach, E; GLANTZ, S.

    1998-01-01

    OBJECTIVE—To document efforts on the part of public officials in California to soften the media campaign's attack on the tobacco industry and to analyse strategies to counter those efforts on the part of tobacco control advocates.
METHODS—Data were gathered from interviews with programme participants, direct observation, written materials, and media stories. In addition, internal documents were released by the state's Department of Health Services in response to requests made under the Califo...

  5. Monitoring the Gamma-ray Sky through 4.5 Years of Fermi LAT Flare Advocate Service

    CERN Document Server

    Ciprini, Stefano

    2013-01-01

    The Fermi Flare Advocate (also known as Gamma-ray Sky Watcher, FA-GSW) service provides for a quick look and review of the gamma-ray sky observed daily by the Fermi Large Area Telescope (LAT). The FA-GSW service provides alerts and communicates to the external scientific community potentially new gamma-ray sources, interesting transients and source flares. A weekly digest containing the highlights about the variable LAT gamma-ray sky at E>100 MeV is published in the web ("Fermi Sky Blog"). Other news items are occasionally posted through the Fermi multiwavelength mailing list, Astronomer's Telegrams (ATels) and Gamma-ray Coordination Network notes (GCNs). From July 2008 to January 2013 about 230 ATels and some GCNs have been published by the Fermi LAT Collaboration, more than 40 target of opportunity observing programs have been triggered by the LAT Collaboration and performed though the Swift satellite, and individual observing alerts have been addressed to ground-based Cherenkov telescopes. This is helping ...

  6. Enhancing Police Responses to Domestic Violence Incidents: Reports From Client Advocates in New South Wales.

    Science.gov (United States)

    Goodman-Delahunty, Jane; Crehan, Anna Corbo

    2016-07-01

    In an online survey about experiences with the police complaint system, 239 client advocates described a recent incident in which a client with grounds to lodge a complaint declined to do so. Almost one third of those incidents involved domestic violence. Thematic analysis of case descriptions revealed that many police did not take domestic violence reports seriously. A typology of problematic police conduct was developed. Many officers failed to observe current procedures and appeared to lack knowledge of relevant laws. Citizens feared retaliatory victimization by police and/or perceived that complaining was futile. Implications of these findings are reviewed in light of procedural justice theory. PMID:26567295

  7. Boundaries in carework: a case study of domestic violence shelter advocates in the USA.

    Science.gov (United States)

    Wies, J R

    2009-01-01

    Recent decades have witnessed the professionalisation of carework in the USA, including the work of caring for the elderly, people living with mental/physical disabilities and other vulnerable populations. In the past, carework was primarily performed by family members or others as a service. Using an ethnographic case study of domestic violence shelter advocacy as a sector in the carework industry, this article defines boundaries as a mechanism for creating and maintaining organisational and attitudinal professionalism. The discourse of boundaries is also a lens through which domestic violence advocates articulate the multiple pressures they negotiate, as they embrace and resist their professional identities.

  8. Advocating for environmental changes to increase access to parks: engaging promotoras and youth leaders.

    Science.gov (United States)

    Arredondo, Elva; Mueller, Kristin; Mejia, Elizabeth; Rovira-Oswalder, Tanya; Richardson, Dana; Hoos, Tracy

    2013-09-01

    Access to physical activity opportunities are limited in underserved communities. Community-based programs can increase promotoras and youth leaders' capacity to advocate for built environmental changes. Promotoras and youth leaders were trained on walkability assessment, park audits, and advocacy. The youth and promotoras from one church located adjacent to a park implemented a community survey, conducted walk audits, and engaged in consciousness-raising activities about environmental factors that affect communities. They also mobilized community members to advocate for a nearby park. Advocacy tactics included attending and making presentations at the City Council, planning meetings, organizing health fairs, and speaking to community members. The following changes were made at the park: removed overgrown plants, relocated storage container, increased park security (i.e., lighting, fencing), improved safety (i.e., covered sewer drain, sand lot removed), enhanced amenities (i.e., drinking fountain, bathroom, benches, tables), improved pedestrian safety in park (i.e., leveled the old and added new walking paths), and improved children's play area (i.e., new play equipment, fencing). The current program highlights factors that contributed to park changes and challenges in increasing access to parks. Furthermore, the current study notes steps that other programs can take to make environmental changes. PMID:23362333

  9. Biological processes for advancing lignocellulosic waste biorefinery by advocating circular economy.

    Science.gov (United States)

    Liguori, Rossana; Faraco, Vincenza

    2016-09-01

    The actualization of a circular economy through the use of lignocellulosic wastes as renewable resources can lead to reduce the dependence from fossil-based resources and contribute to a sustainable waste management. The integrated biorefineries, exploiting the overall lignocellulosic waste components to generate fuels, chemicals and energy, are the pillar of the circular economy. The biological treatment is receiving great attention for the biorefinery development since it is considered an eco-friendly alternative to the physico-chemical strategies to increase the biobased product recovery from wastes and improve saccharification and fermentation yields. This paper reviews the last advances in the biological treatments aimed at upgrading lignocellulosic wastes, implementing the biorefinery concept and advocating circular economy. PMID:27131870

  10. HESS Opinions: Advocating process modeling and de-emphasizing parameter estimation

    Science.gov (United States)

    Bahremand, Abdolreza

    2016-04-01

    Since its origins as an engineering discipline, with its widespread use of "black box" (empirical) modeling approaches, hydrology has evolved into a scientific discipline that seeks a more "white box" (physics-based) modeling approach to solving problems such as the description and simulation of the rainfall-runoff responses of a watershed. There has been much recent debate regarding the future of the hydrological sciences, and several publications have voiced opinions on this subject. This opinion paper seeks to comment and expand upon some recent publications that have advocated an increased focus on process-based modeling while de-emphasizing the focus on detailed attention to parameter estimation. In particular, it offers a perspective that emphasizes a more hydraulic (more physics-based and less empirical) approach to development and implementation of hydrological models.

  11. Coleman Advocates for Children And Youth: a pioneering child advocacy organization (1974-2008).

    Science.gov (United States)

    Carnochan, Sarah; Austin, Michael J

    2011-01-01

    Coleman Advocates for Youth and Children is a pioneering 30-year-old child advocacy organization founded by several affluent community members and children's service professionals to stop housing abused and neglected children in juvenile hall. Today, low-income youth and parents in families of color are now assuming leadership in developing a unique hybrid approach that integrates community organizing with more traditional child advocacy strategies and focuses on increasing affordable housing and improving the city's educational system. The strategies employed by Coleman have also evolved, shifting from insider advocacy with administrative officials to public campaigns targeting the city budget process, to local initiative campaigns, and most recently to electoral politics. This organizational history features the issues mission and structure, leadership, managing issues, advocacy strategies and community relations, and funding.

  12. Patient Abuse in the Health Care Setting: The Nurse as Patient Advocate.

    Science.gov (United States)

    Albina, Julie K

    2016-01-01

    Incidents of verbal and physical patient abuse in health care settings continue to occur, with some making headline news. Nurses have a professional and ethical responsibility to advocate for their patients when incidents of abuse occur. Tolerating or ignoring inappropriate behaviors occurs for multiple reasons, including ignorance, fear of retaliation, the need for peer acceptance, and concerns for personal advancement. Nurses need to reflect on their biases before they can truly respect patients' autonomy. Through the examination of reported cases of patient abuse, the need for a change in hospital culture becomes evident. The primary steps in eliminating patient abuse are opening communication, providing education, establishing competency, eliminating tolerance of unacceptable behavior, and creating a code of mutual respect. A change in culture to one of mutual respect and dignity for staff members and patients will lead to the best outcomes for all involved. PMID:26746029

  13. Community Health Advocate-Identified Enablers of HIV Testing for Latina Immigrant Women.

    Science.gov (United States)

    Massengale, Kelley E; Morrison, Sharon D; Sudha, S

    2016-08-01

    This study aims to identify enablers or facilitators of HIV testing among Latina immigrant women through qualitative interviews with five community health advocates (CHAs). CHAs act as cultural bridges between Latinos and service providers. We employed a single case-study design using the PEN-3 model as a conceptual framework for situating HIV testing behaviors within cultural and structural contexts of Latina immigrant women's lives. A cross-case analysis of themes revealed that intrinsic enablers of HIV testing included individual trust, confidentiality, intergenerational family participation, and peers. The extrinsic enablers were local community outreach, bicultural/bilingual testing staff, service location and mass media outlets. These results have implications for the cultural competency of health and social service providers, instituting and revising HIV testing outreach interventions, and the earlier identification of women who may have been infected. They offer important insights for promoting other health behaviors among the Latino communities. PMID:27427927

  14. Dynamic Network Delay Cartography

    CERN Document Server

    Rajawat, Ketan; Giannakis, Georgios B

    2012-01-01

    Path delays in IP networks are important metrics, required by network operators for assessment, planning, and fault diagnosis. Monitoring delays of all source-destination pairs in a large network is however challenging and wasteful of resources. The present paper advocates a spatio-temporal Kalman filtering approach to construct network-wide delay maps using measurements on only a few paths. The proposed network cartography framework allows efficient tracking and prediction of delays by relying on both topological as well as historical data. Optimal paths for delay measurement are selected in an online fashion by leveraging the notion of submodularity. The resulting predictor is optimal in the class of linear predictors, and outperforms competing alternatives on real-world datasets.

  15. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  16. Violence prevention in schools and other community settings: the pediatrician as initiator, educator, collaborator, and advocate.

    Science.gov (United States)

    Wilson-Brewer, R; Spivak, H

    1994-10-01

    Attention to the problem of youth violence has resulted in a proliferation of violence prevention and intervention strategies. Examined in this paper are those strategies that can be categorized as educational, environmental/technological, and recreational. In the educational category are conflict resolution and mediation, crime prevention and law-related education, handgun violence education, life skills training, self-esteem development, public education, and media education. The environmental/technological category covers a range of strategies: metal detectors, school police, concrete barriers, dress codes, and safe corridor programs, among others. The rather broad recreational category is based upon the importance of physical activity as an outlet for stress and anger and as a component of a multicomponent program. Multi-intervention programs are described as well as some of the major gaps in current violence prevention programming. The suggested role of the pediatrician in violence prevention efforts is described as both initiator and collaborator, as counselor, and as advocate. Because of their great credibility with respect to issues related to children and youth, pediatricians can influence not only parents in their contacts with them in the health care setting, but also school administrators and community leaders. Pediatricians have access to the media, and they can speak to the issue in public forums as well. Furthermore, pediatricians can join existing community efforts to determine ways in which violence prevention and intervention strategies can be incorporated into agency activities. PMID:7936888

  17. Chapter Oral Health Advocates: A Nationwide Model for Pediatrician Peer Education and Advocacy about Oral Health.

    Science.gov (United States)

    Lewis, Charlotte W; Barone, Lauren; Quinonez, Rocio B; Boulter, Suzanne; Mouradian, Wendy E

    2013-01-01

    Objective. (1) To describe an innovative program training US pediatricians to be Chapter Oral Health Advocates (COHAs). (2) To provide insight into COHAs' experiences disseminating oral health knowledge to fellow pediatricians. Patients and Methods. Interviews with 40 COHAs who responded to an email request, from a total of 64 (62% response). Transcripts were analyzed for common themes about COHA activities, facilitators, and barriers. Results. COHAs reported positive experiences at the AAP oral health training program. A subset of academic COHAs focused on legislative activity and another on resident education about oral health. Residents had an easier time adopting oral health activities while practicing pediatricians cited time constraints. COHAs provided insights into policy, barriers, and facilitators for incorporating oral health into practice. Conclusions. This report identifies factors influencing pediatricians' adoption of oral health care into practice. COHAs reported successes in training peers on integrating oral health into pediatric practice, identified opportunities and challenges to oral health implementation in primary care, and reported issues about the state of children's oral health in their communities. With ongoing support, the COHA program has a potential to improve access to preventive oral health services in the Medical Home and to increase referrals to a Dental Home. PMID:24228032

  18. Chapter Oral Health Advocates: A Nationwide Model for Pediatrician Peer Education and Advocacy about Oral Health

    Directory of Open Access Journals (Sweden)

    Charlotte W. Lewis

    2013-01-01

    Full Text Available Objective. (1 To describe an innovative program training US pediatricians to be Chapter Oral Health Advocates (COHAs. (2 To provide insight into COHAs’ experiences disseminating oral health knowledge to fellow pediatricians. Patients and Methods. Interviews with 40 COHAs who responded to an email request, from a total of 64 (62% response. Transcripts were analyzed for common themes about COHA activities, facilitators, and barriers. Results. COHAs reported positive experiences at the AAP oral health training program. A subset of academic COHAs focused on legislative activity and another on resident education about oral health. Residents had an easier time adopting oral health activities while practicing pediatricians cited time constraints. COHAs provided insights into policy, barriers, and facilitators for incorporating oral health into practice. Conclusions. This report identifies factors influencing pediatricians’ adoption of oral health care into practice. COHAs reported successes in training peers on integrating oral health into pediatric practice, identified opportunities and challenges to oral health implementation in primary care, and reported issues about the state of children’s oral health in their communities. With ongoing support, the COHA program has a potential to improve access to preventive oral health services in the Medical Home and to increase referrals to a Dental Home.

  19. Family Advocates' Perspectives on the Early Academic Success of Children Born to Low-Income Adolescent Mothers

    Science.gov (United States)

    Luster, Tom; Bates, Laura; Vandenbelt, Marcia; Nievar, M. Angela

    2004-01-01

    Qualitative analyses were conducted to examine family factors related to individual differences in the early school success of children born to low-income adolescent mothers from the perspective of paraprofessional family advocates. These families were participants in a 5-year family support program. Achievement test scores and teacher ratings…

  20. How You Can Help Your Child Learn to Be a Good Self Advocate. PHP-c95

    Science.gov (United States)

    PACER Center, 2004

    2004-01-01

    It is never too early for parents to start teaching children how they can advocate for themselves. Like many other important life skills, self-advocacy is a critical tool children need in order to achieve goals, increase self-sufficiency, and become successful young adults. It is a life long process that begins with children learning by watching…

  1. A Little Help from Their Friends: Institutions Build Armies of Alumni Advocates to Influence Legislators and Shape Public Opinion

    Science.gov (United States)

    Simonetti, Kristin

    2013-01-01

    Institutions build armies of alumni advocates to influence legislators and shape public opinion. This article describes two types of alumni advocacy: grasstops and grassroots. Grasstops advocacy engages smaller, targeted groups of alumni who have a stronger, more influential connection with legislators and other public officeholders. Grassroots…

  2. Advocates, interest groups and Australian news coverage of alcohol advertising restrictions: content and framing analysis

    Directory of Open Access Journals (Sweden)

    Fogarty Andrea S

    2012-08-01

    Full Text Available Abstract Background Legislating restrictions on alcohol advertising is a cost-effective measure to reduce consumption of alcohol. Yet Australia relies upon industry self-regulation through voluntary codes of practice regarding the content, timing and placement of alcohol advertising. Ending industry self-regulation was recommended by the National Preventative Health Taskforce; a suggestion contested by the drinks industry. Debates about emerging alcohol-control policies regularly play out in the news media, with various groups seeking to influence the discussion. This paper examines news coverage of recommendations to restrict alcohol advertising to see how supporters and opponents frame the debate, with a view to providing some suggestions for policy advocates to advance the discussion. Methods We used content and framing analyses to examine 329 Australian newspaper items mentioning alcohol advertising restrictions over 24 months. All items were coded for mentions of specific types of advertising and types of advertising restrictions, the presence of news frames that opposed or endorsed advertising restrictions, statements made within each frame and the news-actors who appeared. Results Restrictions were the main focus in only 36% of 329 items. Alcohol advertising was conceived of as television (47% and sport-related (56%. Restrictions were mentioned in non-specific terms (45%, or specified as restrictions on timing and placement (49%, or content (22%. Public health professionals (47% appeared more frequently than drinks industry representatives (18%. Five supportive news frames suggested the policy is a sensible public health response, essential to protect children, needed to combat the drinks industry, required to stop pervasive branding, or as only an issue in sport. Four unsupportive frames positioned restrictions as unnecessary for a responsible industry, an attack on legitimate commercial activities, ineffective and ‘nannyist’, or

  3. Awareness and predictors of female genital mutilation/cutting among young health advocates.

    Science.gov (United States)

    Abolfotouh, Sherif M; Ebrahim, Ahmed Z; Abolfotouh, Mostafa A

    2015-01-01

    The act of female genital mutilation/cutting (FGM/C) is considered internationally as a violent act against girls and women and a violation of their human rights. This study sought to assess the awareness and predictors of FGM/C in young Egyptian health advocates. A cross-sectional study of 600 medical students from a total of 2,500 members of the International Federation of Medical Students' Associations (IFMSA)-Egypt, across all Egyptian medical schools, was conducted using a previously validated online Google survey. The overall prevalence of circumcision was 14.7/100 female students, with a significantly higher prevalence in students from rural areas (25%) than in non-rural areas (10.8%, P=0.001), and in those residing in Upper (southern) Egypt (20.6%) than in Lower (northern) Egypt (8.7%, P=0.003). The students' mean percentage score for knowledge about the negative health consequences of FGM/C was 53.50±29.07, reflecting a modest level of knowledge; only 30.5% had a good level of knowledge. The mean percentage score for the overall attitude toward discontinuation of the practice of FGM/C was 76.29±17.93, reflecting a neutral attitude; 58.7% had a favorable attitude/norms toward discontinuation of the practice. Of circumcised students, approximately one-half (46.8%) were unwilling to have their daughters circumcised, and 60% reported no harm from being circumcised. After controlling for confounders, a negative attitude toward FGM/C was significantly (P<0.001 in all cases) associated with male sex, residency in Upper Egypt, rural origin, previous circumcision, and the preclinical medical phase of education. The low level of knowledge among even future health professions in our study suggests that communication, rather than passive learning, is needed to convey the potentially negative consequences of FGM/C and to drive a change in attitude toward discontinuation of this harmful practice. PMID:25759602

  4. Awareness and predictors of female genital mutilation/cutting among young health advocates

    Directory of Open Access Journals (Sweden)

    Abolfotouh SM

    2015-02-01

    Full Text Available Sherif M Abolfotouh,1,2 Ahmed Z Ebrahim,1,3 Mostafa A Abolfotouh4 On Behalf of IFMSA-Egypt 1IFMSA-Egypt, Alexandria, Egypt; 2Oulu University Hospital, Oulu, Finland; 3Alexandria Faculty of Medicine, Alexandria, Egypt; 4King Abdullah International Medical Research Center (KAIMRC, King Saud bin-Abdulaziz University for Health Sciences, Riyadh, Saudi Arabia Abstract: The act of female genital mutilation/cutting (FGM/C is considered internationally as a violent act against girls and women and a violation of their human rights. This study sought to assess the awareness and predictors of FGM/C in young Egyptian health advocates. A cross-sectional study of 600 medical students from a total of 2,500 members of the International Federation of Medical Students’ Associations (IFMSA-Egypt, across all Egyptian medical schools, was conducted using a previously validated online Google survey. The overall prevalence of circumcision was 14.7/100 female students, with a significantly higher prevalence in students from rural areas (25% than in non-rural areas (10.8%, P=0.001, and in those residing in Upper (southern Egypt (20.6% than in Lower (northern Egypt (8.7%, P=0.003. The students’ mean percentage score for knowledge about the negative health consequences of FGM/C was 53.50±29.07, reflecting a modest level of knowledge; only 30.5% had a good level of knowledge. The mean percentage score for the overall attitude toward discontinuation of the practice of FGM/C was 76.29±17.93, reflecting a neutral attitude; 58.7% had a favorable attitude/norms toward discontinuation of the practice. Of circumcised students, approximately one-half (46.8% were unwilling to have their daughters circumcised, and 60% reported no harm from being circumcised. After controlling for confounders, a negative attitude toward FGM/C was significantly (P<0.001 in all cases associated with male sex, residency in Upper Egypt, rural origin, previous circumcision, and the preclinical

  5. Conceptions of Speech Acts in the Theory and Practice of Argumentation: A Case Study of a Debate About Advocating

    OpenAIRE

    Goodwin Jean

    2014-01-01

    Far from being of interest only to argumentation theorists, conceptions of speech acts play an important role in practitioners’ self-reflection on their own activities. After a brief review of work by Houtlosser, Jackson and Kauffeld on the ways that speech acts provide normative frameworks for argumentative interactions, this essay examines an ongoing debate among scientists in natural resource fields as to the appropriateness of the speech act of advocating in policy settings. Scientists’ r...

  6. Bond percolation on multiplex networks

    CERN Document Server

    Hackett, A; Gómez, S; Arenas, A; Gleeson, J P

    2015-01-01

    We present an analytical approach for bond percolation on multiplex networks and use it to determine the expected size of the giant connected component and the value of the critical bond occupation probability in these networks. We advocate the relevance of these tools to the modeling of multilayer robustness and contribute to the debate on whether any benefit is to be yielded from studying a full multiplex structure as opposed to its monoplex projection, especially in the seemingly irrelevant case of a bond occupation probability that does not depend on the layer. Although we find that in many cases the predictions of our theory for multiplex networks coincide with previously derived results for monoplex networks, we also uncover the remarkable result that for a certain class of multiplex networks, well described by our theory, new critical phenomena occur as multiple percolation phase transitions are present. We provide an instance of this phenomenon in a multipex network constructed from London rail and Eu...

  7. Interconnection and incentive regulation in network industries

    OpenAIRE

    Iván Major; Károly M. Kiss

    2013-01-01

    The price regulation of network industries has changed tremendously all over the world recently. Theoretical contributions specifically advocate and telecommunications, energy and other market regulators in various parts of the world practice cost-based pricing for inter-firm network access services. Cost-based pricing is performed under the assumption that the regulator has perfect information regarding the costs of producing the services. We show that — under fairly general conditions — cos...

  8. Bringing a Network-Oriented Approach to Domestic Violence Services: A Focus Group Exploration of Promising Practices.

    Science.gov (United States)

    Goodman, Lisa A; Banyard, Victoria; Woulfe, Julie; Ash, Sarah; Mattern, Grace

    2016-01-01

    Despite powerful evidence that informal social support contributes to survivors' safety and well-being, mainstream domestic violence (DV) programs have not developed comprehensive models for helping isolated survivors re-engage with these networks. Although many advocates use network-oriented strategies informally, they often do so without resources, funding, or training. This qualitative focus group study explored advocates' use and perceptions of network-oriented strategies. Advocates working in a range of DV programs across one state described the importance of network-oriented work and articulated its five dimensions, including helping survivors build their capacity to form healthy relationships, identify helpful and harmful network members, re-engage with existing networks, develop new relationships, and respond more effectively to network members.

  9. Conceptions of Speech Acts in the Theory and Practice of Argumentation: A Case Study of a Debate About Advocating

    Directory of Open Access Journals (Sweden)

    Goodwin Jean

    2014-03-01

    Full Text Available Far from being of interest only to argumentation theorists, conceptions of speech acts play an important role in practitioners’ self-reflection on their own activities. After a brief review of work by Houtlosser, Jackson and Kauffeld on the ways that speech acts provide normative frameworks for argumentative interactions, this essay examines an ongoing debate among scientists in natural resource fields as to the appropriateness of the speech act of advocating in policy settings. Scientists’ reflections on advocacy align well with current scholarship, and the scholarship in turn can provide a deeper understanding of how to manage the communication challenges scientists face.

  10. Simplified models of biological networks.

    Science.gov (United States)

    Sneppen, Kim; Krishna, Sandeep; Semsey, Szabolcs

    2010-01-01

    The function of living cells is controlled by complex regulatory networks that are built of a wide diversity of interacting molecular components. The sheer size and intricacy of molecular networks of even the simplest organisms are obstacles toward understanding network functionality. This review discusses the achievements and promise of a bottom-up approach that uses well-characterized subnetworks as model systems for understanding larger networks. It highlights the interplay between the structure, logic, and function of various types of small regulatory circuits. The bottom-up approach advocates understanding regulatory networks as a collection of entangled motifs. We therefore emphasize the potential of negative and positive feedback, as well as their combinations, to generate robust homeostasis, epigenetics, and oscillations. PMID:20192769

  11. Networking activism: implications for Greece

    Directory of Open Access Journals (Sweden)

    Pantelis Vatikiotis

    2011-12-01

    Full Text Available The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-global interplay in protest culture along new mediating practices (beyond the creation of transnational publics, that of the implications of transnational networking for local social activism and identification, addressing relevant questions in the Greek context.

  12. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  13. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O;

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  14. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  15. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  16. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  17. The Use of Elgg Social Networking Tool for Students' Project Peer-Review Activity

    Science.gov (United States)

    Samardzija, Ana Coric; Bubas, Goran

    2014-01-01

    Numerous e-learning 2.0 studies have advocated the use of social networking sites for educational purposes, but only a few of them have observed social networking sites as an instrument for specific learner skill development. This paper discusses a study which addresses the motivation and challenges associated with the introduction of the social…

  18. A Mixed-Methods Social Networks Study Design for Research on Transnational Families

    Science.gov (United States)

    Bernardi, Laura

    2011-01-01

    This paper advocates the adoption of a mixed-methods research design to describe and analyze ego-centered social networks in transnational family research. Drawing on the experience of the "Social Networks Influences on Family Formation" project (2004-2005; see Bernardi, Keim, & von der Lippe, 2007a, 2007b), I show how the combined use of network…

  19. A Practical View on Tunable Sparse Network Coding

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Shahbaz Badr, Arash; Guerrero, Juan;

    2015-01-01

    Tunable sparse network coding (TSNC) constitutes a promising concept for trading off computational complexity and delay performance. This paper advocates for the use of judicious feedback as a key not only to make TSNC practical, but also to deliver a highly consistent and controlled delay......) can result in a radical improvement of the complexity-delay trade-off....

  20. Advocating beyond the academy

    DEFF Research Database (Denmark)

    Mackenzie, Catrina; Christensen, Julia; Turner, Sarah

    2015-01-01

    Drawing from experiences in Northern Indigenous Canada, Uganda, and Vietnam, we discuss the challenges encountered while trying to communicate relevant results to local communities with whom we work. Wavering between participatory and advocacy research, we explore how we grapple with finding...... the right audience with whom to share results, our attempts to craft communication to be relevant within specific contexts, and dilemmas over self-censorship. We also document our struggles to manage our own expectations and those of the communities with whom we work regarding the ability of our research...... to broker change. This article emerged from our frustration at wanting to be accountable to our interviewee communities, but finding few academic articles that go beyond ideals to examine how researchers often struggle to meet these expectations. While participatory approaches are increasingly mainstreamed...

  1. Patient Advocate Foundation

    Science.gov (United States)

    ... Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma ... Employment Resources Disease Specific Resources Prevention Cancer Prevention Diabetes Prevention Cardiovascular/Heart Disease Prevention Healthcare Reform Additional ...

  2. Student Leaders as Advocates

    Science.gov (United States)

    Suitt, Regina

    2016-01-01

    The need for adult education programs and services is great, yet federal and state funding and enrollment have declined. This reality means that the field is burdened to protect what federal dollars still exist. One approach to address these funding challenges is to engage students in making the case to funders and policy makers for addressing…

  3. Revealing Hidden Connections in Recommendation Networks

    CERN Document Server

    Minhano, Rogerio; Kamienski, Carlos

    2016-01-01

    Companies have been increasingly seeking new mechanisms for making their electronic marketing campaigns to become viral, thus obtaining a cascading recommendation effect similar to word-of-mouth. We analysed a dataset of a magazine publisher that uses email as the main marketing strategy and found out that networks emerging from those campaigns form a very sparse graph. We show that online social networks can be effectively used as a means to expand recommendation networks. Starting from a set of users, called seeders, we crawled Google's Orkut and collected about 20 million users and 80 million relationships. Next, we extended the original recommendation network by adding new edges using Orkut relationships that built a much denser network. Therefore, we advocate that online social networks are much more effective than email-based marketing campaigns

  4. Female Virtues Advocated by People in the Tang Dynasty%论唐人崇尚的女性美德

    Institute of Scientific and Technical Information of China (English)

    强跃; 景亚鹂

    2012-01-01

    唐代是我国历史上伦理发展的一个重要阶段。朝廷、官府树立、表彰道德楷模对女性进行道德教化,女性在日常生活中也表现出种种美德,这种情况在西安碑林新藏唐代墓志中多有反映。透过墓志所描述的典型女性形象,从女性婚前个人修养、婚姻家庭生活、社会生活及影响诸方面可以管窥唐人崇尚的女性美德,体味唐代女性的风采。%The Tang Dynasty marked a significant stage of development in our history. Many epitaphs in the Tang Dynasty recently collected by Xi' an Museum of Stele Forest recorded the moral examples commended by the court and local government to moralize women and varieties of virtues expressed by broad females in daily life. Thus we can review those female virtues advocated by the current people and appreciate the elegant style of women of the Tang Dynasty by appraising the typical female image described in the epitaphs and evaluating their pre-marriage personal breeding, post-marriage family life, social life and relevant social effects.

  5. Building a Generation of Physician Advocates: The Case for Including Mandatory Training in Advocacy in Canadian Medical School Curricula.

    Science.gov (United States)

    Bhate, Tahara D; Loh, Lawrence C

    2015-12-01

    There is an increasing focus on the social accountability of physicians as individuals, and of medicine itself. This has led to increasing emphasis on physician advocacy from a wide variety of institutions. The physician advocacy concept is now part of the Health Advocacy competency mandated by the Royal College of Physicians and Surgeons of Canada. Despite its growing prominence, physician advocacy remains poorly integrated into current medical undergraduate curricula. The authors recommend how and why curricular reform should proceed; they focus on Canadian medical education, although they hope their views will be useful in other countries as well.The authors discuss conflicting definitions of physician advocacy, which have previously hampered curriculum development efforts, and suggest a way of reconciling the conflicts. They review current gaps in advocacy-related curricula, suggest that these can be addressed by incorporating practice-based and skills acquisition elements into current didactic teaching, and offer several strategies by which an advocacy curriculum could be implemented, ranging from small modifications to current curriculum to developing new competencies in medical education nationally.The authors present a case for making an advocacy curriculum mandatory for every Canadian medical trainee; they argue that teaching trainees how to fulfill their professional responsibility to advocate may also help them meet the social accountability mandate of medical school education. Finally, the authors explain why making the development and implementation of a mandatory, skill-based curriculum in advocacy should be a priority.

  6. Building a Generation of Physician Advocates: The Case for Including Mandatory Training in Advocacy in Canadian Medical School Curricula.

    Science.gov (United States)

    Bhate, Tahara D; Loh, Lawrence C

    2015-12-01

    There is an increasing focus on the social accountability of physicians as individuals, and of medicine itself. This has led to increasing emphasis on physician advocacy from a wide variety of institutions. The physician advocacy concept is now part of the Health Advocacy competency mandated by the Royal College of Physicians and Surgeons of Canada. Despite its growing prominence, physician advocacy remains poorly integrated into current medical undergraduate curricula. The authors recommend how and why curricular reform should proceed; they focus on Canadian medical education, although they hope their views will be useful in other countries as well.The authors discuss conflicting definitions of physician advocacy, which have previously hampered curriculum development efforts, and suggest a way of reconciling the conflicts. They review current gaps in advocacy-related curricula, suggest that these can be addressed by incorporating practice-based and skills acquisition elements into current didactic teaching, and offer several strategies by which an advocacy curriculum could be implemented, ranging from small modifications to current curriculum to developing new competencies in medical education nationally.The authors present a case for making an advocacy curriculum mandatory for every Canadian medical trainee; they argue that teaching trainees how to fulfill their professional responsibility to advocate may also help them meet the social accountability mandate of medical school education. Finally, the authors explain why making the development and implementation of a mandatory, skill-based curriculum in advocacy should be a priority. PMID:26200573

  7. Graduate midwives' perception of their preparation and support in using evidence to advocate for women's choice: A Western Australian study.

    Science.gov (United States)

    Hauck, Yvonne; Lewis, Lucy; Kuliukas, Lesley; Butt, Janice; Wood, Jennifer

    2016-01-01

    A retrospective cohort study was conducted with 83 midwives working across the Western Australian (WA) maternity sector who graduated from one WA University. We explored midwives' attitudes and utilisation of research and assertive communication in addition to perceptions of their educational preparation to advocate for women. The greatest opportunity for research exposure was working on a clinical audit (25.3%). No differences were found between graduate groups using the Edmonton Research Orientation subscales, although findings suggest a positive view towards research. Midwives were more likely to be assertive with their clinical colleagues than a midwifery manager or medical colleague when: expressing their opinions (P = communication skills', work environment' and 'knowing the woman and what she wants'. Findings suggest strategies are needed in their entry to practice preparation and ongoing professional development to facilitate research engagement. Using assertive behaviour to provide feedback to clinical colleagues warrants attention to enhance reflective practice. Building communication skills through observing positive role models and participating in role play was highlighted. PMID:26144597

  8. The research subject advocate at minority Clinical Research Centers: an added resource for protection of human subjects.

    Science.gov (United States)

    Easa, David; Norris, Keith; Hammatt, Zoë; Kim, Kari; Hernandez, Esther; Kato, Kambrie; Balaraman, Venkataraman; Ho, Tammy; Shomaker, Samuel

    2005-01-01

    In early 2001, the National Institutes of Health (NIH) created the research subject advocate (RSA) position as an additional resource for human subjects protection at NIH-funded Clinical Research Centers (CRCs) to enhance the protection of human participants in clinical research studies. We describe the RSA position in the context of clinical research, with a particular emphasis on the role of the RSA in two of the five CRCs funded by the NIH Research Centers in Minority Institutions (RCMI) program. Through participation in protocol development, informed consent procedures, study implementation and follow-up with adverse events, the RSA works closely with research investigators and their staff to protect study participants. The RSA also conducts workshops, training and education sessions, and consultation with investigators to foster enhanced communication and adherence to ethical standards and safety regulations. Although we cannot yet provide substantive evidence of positive outcomes, this article illuminates the value of the RSA position in ensuring that safety of research participants is accorded the highest priority at CRCs. On the basis of initial results, we conclude that the RSA is an effective mechanism for achieving the NIH goal of maintaining the utmost scrutiny of protocols involving human subjects.

  9. Farm to School and the Child Nutrition Act: Improving School Meals through Advocating Federal Support for Farm-to-School Programs. Program Results Report

    Science.gov (United States)

    Wood, James

    2011-01-01

    From 2009 to 2010, the Community Food Security Coalition advocated for more federal support and funding for farm-to-school programs as Congress considered reauthorizing the Child Nutrition Act. Farm-to-school initiatives aim to improve the quality and healthfulness of student meals through the inclusion of more fresh fruits and vegetables provided…

  10. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  11. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter

    2011-01-01

    Sloep, P. B. (2011). Learning Networks, Networked Learning. Presentation at Annual Assembly of the European Society for the Systemic Innovation of Education - ESSIE. May, 27, 2011, Leuven, Belgium: Open University in the Netherlands.

  12. Composition Matters: Multi-Context Informal Mentoring Networks for Low-Income Urban Adolescent Girls Pursuing Healthcare Careers

    Science.gov (United States)

    Packard, Becky Wai-Ling; Kim, Grace June; Sicley, Marissa; Piontkowski, Sarah

    2009-01-01

    In the career research literature focused on adults, diversely composed mentoring networks are advocated due to their effectiveness in providing a wide range of mentoring functions. This study investigates the composition of informal mentoring networks utilized by low-income urban adolescent girls with healthcare college and career aspirations. In…

  13. Network Potentials

    OpenAIRE

    Chakrabarti, Subhadip; Gilles, Robert Paul

    2005-01-01

    A network payoff function assigns a utility to all participants in a (social) network. In this paper we discuss properties of such network payoff functions that guarantee the existence of certain types of pairwise stable networks and the convergence of certain network formation processes. In particular we investigate network payoff functions that admit an exact network potential or an ordinal network potential. We relate these network potentials to exact and ordinal potentials of a non-cooper...

  14. Setting the global health agenda: The influence of advocates and ideas on political priority for maternal and newborn survival.

    Science.gov (United States)

    Smith, Stephanie L; Shiffman, Jeremy

    2016-10-01

    This study investigates a puzzle concerning global health priorities-why do comparable issues receive differential levels of attention and resources? It considers maternal and neonatal mortality, two high-burden issues that pertain to groups at risk at birth and whose lives could be saved with effective intrapartum care. Why did maternal survival gain status as a global health priority earlier and to a greater degree than newborn survival? Higher mortality and morbidity burdens among newborns and the cost-effectiveness of interventions would seem to predict that issue's earlier and higher prioritization. Yet maternal survival emerged as a priority two decades earlier and had attracted considerably more attention and resources by the close of the Millennium Development Goals era. This study uses replicative process-tracing case studies to examine the emergence and growth of political priority for these two issues, probing reasons for unexpected variance. The study finds that maternal survival's grounding as a social justice issue spurred growth of a strong and diverse advocacy network and aligned the issue with powerful international norms (e.g. expectations to advance women's rights and the Millennium Development Goals), drawing attention and resources to the issue over three decades. Newborn survival's disadvantage stems from its long status as an issue falling under the umbrellas of maternal and child survival but not fully adopted by these networks, and with limited appeal as a public health issue advanced by a small and technically focused network; network expansion and alignment with child survival norms have improved the issue's status in the past few years. PMID:27543685

  15. Network Competition with Local Network

    OpenAIRE

    Oystein Fjeldstad; Moen, Espen R; Christian Riis

    2007-01-01

    Local network externalities are present when the network externalities associated with entering a certain network depends not only on the total number of agents in the network, but on the identity of the agents in the network. We explore the consequences of local network externalities within a framework where two networks compete on the Hotelling circle. We first show that local network externalities, in contrast to global network externalities, do not sharpen competition. Then we show that t...

  16. Towards a theoretical framework for analyzing complex linguistic networks

    CERN Document Server

    Lücking, Andy; Banisch, Sven; Blanchard, Philippe; Job, Barbara

    2016-01-01

    The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics. In this way, the book contributes first steps towards establishing a statistical network theory as a theoretical basis of linguistic network analysis the boarder of the natural sciences and the humanities.This book addresses researchers who want to get familiar with theoretical developments, computational models and their empirical evaluation in the field of complex linguistic networks. It is intended to all those who are interested in statisticalmodels of linguistic systems from the point of view of network research. This includes all relevant areas of linguistics ranging from phonological, morphological and lexical networks on the one hand and syntactic, semantic and pragmatic networks on the other. In this sense, the volume concerns readers from many disciplines such as physics, linguistics, computer science and information scien...

  17. The Limited English Proficiency Patient Family Advocate Role: Fostering Respectful and Effective Care Across Language and Culture in a Pediatric Oncology Setting.

    Science.gov (United States)

    Gil, Stephanie; Hooke, Mary C; Niess, Dawn

    2016-01-01

    Patients and families with limited English proficiency (LEP) face a multitude of barriers both inside and outside the hospital walls. These barriers can contribute to difficulty accessing care and understanding/adhering to treatment recommendations, ultimately placing them at higher risk for poorer outcomes than their English-speaking counterparts. The LEP Patient Family Advocate role was created with the aim of improving access, promoting effective communication, and equalizing care for children with cancer from families with LEP. The goal of this mixed methods study was to describe the level of satisfaction and experiences of parents and health care providers who used the LEP Patient Family Advocate while receiving or providing care. Twelve parents and 15 health care providers completed quantitative surveys and an open-ended question about their experiences. High levels of satisfaction were reported. Themes about the role from qualitative responses included its positive effect on communication, trust, and connectedness between parents and staff. Continuity of care and safety were improved, and parents thought the role helped decrease their stress. The LEP Patient Family Advocate has a positive influence on family-centered cultural care. PMID:26589355

  18. Applying Intelligent Computing Techniques to Modeling Biological Networks from Expression Data

    Institute of Scientific and Technical Information of China (English)

    Wei-Po Lee; Kung-Cheng Yang

    2008-01-01

    Constructing biological networks is one of the most important issues in system sbiology. However, constructing a network from data manually takes a considerable large amount of time, therefore an automated procedure is advocated. To automate the procedure of network construction, in this work we use two intelligent computing techniques, genetic programming and neural computation, to infer two kinds of network models that use continuous variables. To verify the presented approaches, experiments have been conducted and the preliminary results show that both approaches can be used to infer networks successfully.

  19. Using Social Network Analysis to Predict Early Collaboration within Health Advocacy Coalitions

    Science.gov (United States)

    Honeycutt, Todd C.; Strong, Debra A.

    2012-01-01

    Within coalitions of consumer advocates formed to advance health insurance coverage expansions, engaging in united advocacy activities soon after formation might be an important precursor to attaining coalition effectiveness in shaping policy. In this article, the authors apply social network analysis (SNA) to examine how organizational…

  20. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  1. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it suitable...... for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg University....

  2. Saving Muslim women in the era of Axis of Evil? : pious women’s movement advocates in Iran, 2001-2010

    OpenAIRE

    Raunio, Paola Maria

    2014-01-01

    This thesis aims to investigate US foreign policies in the post-9/11 world, focusing on the ways in which they affected the Iranian women’s movement after Iran was included in the Axis of Evil in January 2002. The focus of the thesis draws on the Bush Administration’s decision to use Muslim women’s human rights as moral justifications for the War on Terror. The thesis argues that, despite the US commitment to Iranian women’s human rights, Iranian women’s movement advocates have found thems...

  3. Outline of LI Dong-yuan's Academic Thinking on Advocating the Application of "Wind Medicine"%李东垣倡风药应用学术思想述要

    Institute of Scientific and Technical Information of China (English)

    张真全

    2012-01-01

    The history of using "wind medicine" was briefly elaborated through studying literature, especially Li Dong-yucai's academic thinking on using wind medicine was emphatically pointed out, in which he stresses primordial Qi, advocating the acquired constitution (spleen) nourishes the congenital one (kidney); stresses the spleen and stomach, advocating to invigorate the middle with the drugs of sweet and warm nature; stresses descending and ascending, advocating ShaoYang governs sprout and growth; stresses wind medicine, advocating wind medicine ascending Yang.%从文献角度梳理了"风药"使用的历史,重点阐述了金元四大家之一的李东垣重视风药应用的学术思想:重元气,倡后天养先天;重脾胃,倡甘温补中;重升降,倡少阳生发;重风药,倡风药升阳.

  4. Loyalty and positive word-of-mouth: patients and hospital personnel as advocates of a customer-centric health care organization.

    Science.gov (United States)

    Ferguson, Ronald J; Paulin, Michele; Leiriao, Elizabeth

    2006-01-01

    The ability to attract and retain loyal customers depends on the successful implementation of a customer-centric strategy. Customer loyalty is an attitude about an organization and its' services that is manifested by intentions and behaviors of re-patronization and recommendation. In the context of many medical services, loyalty through repeat patronization is not pertinent, whereas loyalty through positive word-of mouth (WOM) recommendation can be a powerful marketing tool. The Shouldice Hospital, a well-known institution for the surgical correction of hernias, instituted a marketing plan to develop a stable base of patients by creating positive WOM advocacy. This study focused on the consequences of both hernia patient overall satisfaction (and overall service quality) and hospital personnel satisfaction on the level of positive WOM advocacy. Using a commitment ladder of positive WOM advocacy, respondents were divided into three categories described as passive supporters, active advocates and ambassador advocates. Patient assessments of overall satisfaction and service quality were significantly related to these progressive levels of WOM for recommending the hospital to potential patients. Similarly, the satisfaction of the hospital employees was also significantly related to these progressive levels of positive WOM about recommending the hospital to potential patients and to potential employees. High levels of satisfaction are required to create true ambassadors of a service organization. PMID:18681199

  5. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter;

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  6. Control of communication networks: welfare maximization and multipath transfers.

    Science.gov (United States)

    Key, Peter B; Massoulié, Laurent

    2008-06-13

    We discuss control strategies for communication networks such as the Internet. We advocate the goal of welfare maximization as a paradigm for network resource allocation. We explore the application of this paradigm to the case of parallel network paths. We show that welfare maximization requires active balancing across paths by data sources, and potentially requires implementation of novel transport protocols. However, the only requirement from the underlying 'network layer' is to expose the marginal congestion cost of network paths to the 'transport layer'. We further illustrate the versatility of the corresponding layered architecture by describing transport protocols with the following properties: they welfare maximization, each communication may use an arbitrary collection of paths, where paths may be from an overlay, and paths may be combined in series and parallel. We conclude by commenting on incentives, pricing and open problems. PMID:18325871

  7. Joint community and anomaly tracking in dynamic networks

    CERN Document Server

    Baingana, Brian

    2015-01-01

    Most real-world networks exhibit community structure, a phenomenon characterized by existence of node clusters whose intra-edge connectivity is stronger than edge connectivities between nodes belonging to different clusters. In addition to facilitating a better understanding of network behavior, community detection finds many practical applications in diverse settings. Communities in online social networks are indicative of shared functional roles, or affiliation to a common socio-economic status, the knowledge of which is vital for targeted advertisement. In buyer-seller networks, community detection facilitates better product recommendations. Unfortunately, reliability of community assignments is hindered by anomalous user behavior often observed as unfair self-promotion, or "fake" highly-connected accounts created to promote fraud. The present paper advocates a novel approach for jointly tracking communities while detecting such anomalous nodes in time-varying networks. By postulating edge creation as the ...

  8. DENIAL OF SERVICE ATTACK IN DISTRIBUTED WIRELESS NETWORK BY DISTRIBUTED JAMMER NETWORK: A BIRTH-DEATH RANDOM PROCESS ANALYSIS

    Directory of Open Access Journals (Sweden)

    R. Dhanasekaran

    2014-01-01

    Full Text Available Large number of low power, tiny radio jammers are constituting a Distributed Jammer Network (DJN is used nowadays to cause a Denial of Service (DoS attack on a Distributed Wireless Network (DWN. Using NANO technologies, it is possible to build huge number of tiny jammers in millions, if not more. The Denial of Service (DoS attacks in Distributed Wireless Network (DWN using Distributed Jammer Network (DJN considering each of them as separate Poisson Random Process. In an integrated approach, in this study, we advocate the more natural Birth-Death Random Process route to study the impact of Distributed Jammer Network (DJN on the connectivity of Distributed Wireless Network (DWN. We express that the Distributed Jammer Network (DJN can root a phase transition in the performance of the target network. We use Birth-Death Random Process (BDRP route for this phase transition to evaluate the collision of Distributed Jammer Network (DJN on the connectivity and global percolation of the target network. This study confirms the global percolation of Distributed Wireless Network (DWN is definite when the Distributed Jammer Network (DJN is not more significant.

  9. Green networking

    CERN Document Server

    Krief, Francine

    2012-01-01

    This book focuses on green networking, which is an important topic for the scientific community composed of engineers, academics, researchers and industrialists working in the networking field. Reducing the environmental impact of the communications infrastructure has become essential with the ever increasing cost of energy and the need for reducing global CO2 emissions to protect our environment.Recent advances and future directions in green networking are presented in this book, including energy efficient networks (wired networks, wireless networks, mobile networks), adaptive networ

  10. Transformation of legacy network management system to service oriented architecture

    Science.gov (United States)

    Sathyan, Jithesh; Shenoy, Krishnananda

    2007-09-01

    Service providers today are facing the challenge of operating and maintaining multiple networks, based on multiple technologies. Network Management System (NMS) solutions are being used to manage these networks. However the NMS is tightly coupled with Element or the Core network components. Hence there are multiple NMS solutions for heterogeneous networks. Current network management solutions are targeted at a variety of independent networks. The wide spread popularity of IP Multimedia Subsystem (IMS) is a clear indication that all of these independent networks will be integrated into a single IP-based infrastructure referred to as Next Generation Networks (NGN) in the near future. The services, network architectures and traffic pattern in NGN will dramatically differ from the current networks. The heterogeneity and complexity in NGN including concepts like Fixed Mobile Convergence will bring a number of challenges to network management. The high degree of complexity accompanying the network element technology necessitates network management systems (NMS) which can utilize this technology to provide more service interfaces while hiding the inherent complexity. As operators begin to add new networks and expand existing networks to support new technologies and products, the necessity of scalable, flexible and functionally rich NMS systems arises. Another important factor influencing NMS architecture is mergers and acquisitions among the key vendors. Ease of integration is a key impediment in the traditional hierarchical NMS architecture. These requirements trigger the need for an architectural framework that will address the NGNM (Next Generation Network Management) issues seamlessly. This paper presents a unique perspective of bringing service orientated architecture (SOA) to legacy network management systems (NMS). It advocates a staged approach in transforming a legacy NMS to SOA. The architecture at each stage is detailed along with the technical advantages and

  11. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  12. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson

    International Nuclear Information System (INIS)

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening

  13. 'When you haven't got much of a voice': an evaluation of the quality of Independent Mental Health Advocate (IMHA) services in England.

    Science.gov (United States)

    Newbigging, Karen; Ridley, Julie; McKeown, Mick; Machin, Karen; Poursanidou, Konstantina

    2015-05-01

    Advocacy serves to promote the voice of service users, represent their interests and enable participation in decision-making. Given the context of increasing numbers of people detained under the Mental Health Act and heightened awareness of the potential for neglect and abuse in human services, statutory advocacy is an important safeguard supporting human rights and democratising the social relationships of care. This article reports findings from a national review of Independent Mental Health Advocate (IMHA) provision in England. A qualitative study used a two-stage design to define quality and assess the experience and impact of IMHA provision in eight study sites. A sample of 289 participants - 75 focus group participants and 214 individuals interviewed - including 90 people eligible for IMHA services, as well as advocates, a range of hospital and community-based mental health professionals, and commissioners. The research team included people with experience of compulsion. Findings indicate that the experience of compulsion can be profoundly disempowering, confirming the need for IMHA. However, access was highly variable and more problematic for people with specific needs relating to ethnicity, age and disability. Uptake of IMHA services was influenced by available resources, attitude and understanding of mental health professionals, as well as the organisation of IMHA provision. Access could be improved through a system of opt-out as opposed to opt-in. Service user satisfaction was most frequently reported in terms of positive experiences of the process of advocacy rather than tangible impacts on care and treatment under the Mental Health Act. IMHA services have the potential to significantly shift the dynamic so that service users have more of a voice in their care and treatment. However, a shift is needed from a narrow conception of statutory advocacy as safeguarding rights to one emphasising self-determination and participation in decisions about care and

  14. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  15. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  16. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  17. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  18. Fermionic networks

    Science.gov (United States)

    Javarone, Marco Alberto

    2016-08-01

    We study the structure of fermionic networks, i.e. a model of networks based on the behavior of fermionic gases, and we analyze dynamical processes over them. In this model, particle dynamics have been mapped to the domain of networks, hence a parameter representing the temperature controls the evolution of the system. In doing so, it is possible to generate adaptive networks, i.e. networks whose structure varies over time. As shown in previous works, networks generated by quantum statistics can undergo critical phenomena as phase transitions and, moreover, they can be considered as thermodynamic systems. In this study, we analyze fermionic networks and opinion dynamics processes over them, framing this network model as a computational model useful to represent complex and adaptive systems. Results highlight that a strong relation holds between the gas temperature and the structure of the achieved networks. Notably, both the degree distribution and the assortativity vary as the temperature varies, hence we can state that fermionic networks behave as adaptive networks. On the other hand, it is worth to highlight that we did not finding relation between outcomes of opinion dynamics processes and the gas temperature. Therefore, although the latter plays a fundamental role in gas dynamics, on the network domain, its importance is related only to structural properties of fermionic networks.

  19. Network Topology Inference from Spectral Templates

    CERN Document Server

    Segarra, Santiago; Mateos, Gonzalo; Ribeiro, Alejandro

    2016-01-01

    We address the problem of identifying a graph structure from the observation of signals defined on its nodes. Fundamentally, the unknown graph encodes direct relationships between signal elements, which we aim to recover from observable indirect relationships generated by a diffusion process on the graph. The fresh look advocated here permeates benefits from convex optimization and stationarity of graph signals, in order to identify the graph shift operator (a matrix representation of the graph) given only its eigenvectors. These spectral templates can be obtained, e.g., from the sample covariance of independent graph signals diffused on the sought network. The novel idea is to find a graph shift that, while being consistent with the provided spectral information, endows the network with certain desired properties such as sparsity. To that end we develop efficient inference algorithms stemming from provably-tight convex relaxations of natural nonconvex criteria, particularizing the results for two shifts: the...

  20. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  1. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  2. Synchronization in complex oscillator networks and smart grids.

    Science.gov (United States)

    Dörfler, Florian; Chertkov, Michael; Bullo, Francesco

    2013-02-01

    The emergence of synchronization in a network of coupled oscillators is a fascinating topic in various scientific disciplines. A widely adopted model of a coupled oscillator network is characterized by a population of heterogeneous phase oscillators, a graph describing the interaction among them, and diffusive and sinusoidal coupling. It is known that a strongly coupled and sufficiently homogeneous network synchronizes, but the exact threshold from incoherence to synchrony is unknown. Here, we present a unique, concise, and closed-form condition for synchronization of the fully nonlinear, nonequilibrium, and dynamic network. Our synchronization condition can be stated elegantly in terms of the network topology and parameters or equivalently in terms of an intuitive, linear, and static auxiliary system. Our results significantly improve upon the existing conditions advocated thus far, they are provably exact for various interesting network topologies and parameters; they are statistically correct for almost all networks; and they can be applied equally to synchronization phenomena arising in physics and biology as well as in engineered oscillator networks, such as electrical power networks. We illustrate the validity, the accuracy, and the practical applicability of our results in complex network scenarios and in smart grid applications.

  3. Synchronization in complex oscillator networks and smart grids.

    Science.gov (United States)

    Dörfler, Florian; Chertkov, Michael; Bullo, Francesco

    2013-02-01

    The emergence of synchronization in a network of coupled oscillators is a fascinating topic in various scientific disciplines. A widely adopted model of a coupled oscillator network is characterized by a population of heterogeneous phase oscillators, a graph describing the interaction among them, and diffusive and sinusoidal coupling. It is known that a strongly coupled and sufficiently homogeneous network synchronizes, but the exact threshold from incoherence to synchrony is unknown. Here, we present a unique, concise, and closed-form condition for synchronization of the fully nonlinear, nonequilibrium, and dynamic network. Our synchronization condition can be stated elegantly in terms of the network topology and parameters or equivalently in terms of an intuitive, linear, and static auxiliary system. Our results significantly improve upon the existing conditions advocated thus far, they are provably exact for various interesting network topologies and parameters; they are statistically correct for almost all networks; and they can be applied equally to synchronization phenomena arising in physics and biology as well as in engineered oscillator networks, such as electrical power networks. We illustrate the validity, the accuracy, and the practical applicability of our results in complex network scenarios and in smart grid applications. PMID:23319658

  4. Synchronization in Complex Oscillator Networks and Smart Grids

    Energy Technology Data Exchange (ETDEWEB)

    Dorfler, Florian [Los Alamos National Laboratory; Chertkov, Michael [Los Alamos National Laboratory; Bullo, Francesco [Center for Control, Dynamical Systems and Computation, University of California at Santa Babara, Santa Barbara CA

    2012-07-24

    The emergence of synchronization in a network of coupled oscillators is a fascinating topic in various scientific disciplines. A coupled oscillator network is characterized by a population of heterogeneous oscillators and a graph describing the interaction among them. It is known that a strongly coupled and sufficiently homogeneous network synchronizes, but the exact threshold from incoherence to synchrony is unknown. Here we present a novel, concise, and closed-form condition for synchronization of the fully nonlinear, non-equilibrium, and dynamic network. Our synchronization condition can be stated elegantly in terms of the network topology and parameters, or equivalently in terms of an intuitive, linear, and static auxiliary system. Our results significantly improve upon the existing conditions advocated thus far, they are provably exact for various interesting network topologies and parameters, they are statistically correct for almost all networks, and they can be applied equally to synchronization phenomena arising in physics and biology as well as in engineered oscillator networks such as electric power networks. We illustrate the validity, the accuracy, and the practical applicability of our results in complex networks scenarios and in smart grid applications.

  5. Advocating investments in information technology

    International Nuclear Information System (INIS)

    Information and communication systems can improve the timeliness and quality of decisions. These benefits are strategically important to the utility industry in an era of increasing competition. Because these systems often do not reduce labor cost, however, they can be difficult to evaluate. This report presents a new process for reaching consensus of the value of capital investment in information and communication systems. The results of this project is A Strategic Advocacy Process (ASAP), a methodology that can be used to evaluate investments in information technology. ASAP uses belief graphs to produce a living business case showing facts, assumptions, goals, and metrics for measuring progress toward those goals; shows how to use option pricing theory to quantify the value of managerial flexibility; ASAP uses an organizational impact assessment tool to identify the potential impact of new information systems and how to realize the benefits of managerial flexibility. The ASAP methodology addresses the critical problem of correctly valuing information and communication systems. The methodology offers a way to account for the ''intangible'' value of these systems by recognizing the managerial flexibility these systems can provide in addressing risks and uncovering new business opportunities. Metrics for measuring progress toward new goals can be defined, and plans for achieving the goals can be made. As a result, agreement can be reached on the uses, value, and priority of projects based on a metric other than on labor replacement savings

  6. Advocating Students’Individual Learning

    Institute of Scientific and Technical Information of China (English)

    任锡平

    2014-01-01

    A new approach formed with the application of modern teaching facilities makes English teaching and learning more collaborative and individualized through using computers, the Internet, and multimedia. Therefore, students ’individual English learning, teaching and learning environment, and conditions that students need in their individual learning are discussed.

  7. Parents, Reading Partners, Library Advocates

    Science.gov (United States)

    Deskins, Liz

    2011-01-01

    According to the author, one of her most important goals as a school librarian is to inspire her students to become lifelong lovers of reading. She recognizes that she cannot do this alone, and one of her most powerful partners is a parent. She can encourage a child to check out a book that may open their eyes to the wonders of literature, but if…

  8. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...

  9. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  10. Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases: report of the First International African Vaccinology Conference.

    Science.gov (United States)

    Wiysonge, Charles Shey; Waggie, Zainab; Hawkridge, Anthony; Schoub, Barry; Madhi, Shabir Ahmed; Rees, Helen; Hussey, Gregory

    2016-01-01

    One means of improving healthcare workers' knowledge of and attitudes to vaccines is through running vaccine conferences which are accessible, affordable, and relevant to their everyday work. Various vaccinology conferences are held each year worldwide. These meetings focus heavily on basic science with much discussion about new developments in vaccines, and relatively little coverage of policy, advocacy, and communication issues. A negligible proportion of delegates at these conferences come from Africa, home to almost 40% of the global burden of vaccine-preventable diseases. To the best of our knowledge, no major vaccinology conference has ever been held on the African continent apart from World Health Organization (WHO) meetings. The content of the first International African Vaccinology Conference was planned to be different; to focus on the science, with a major part of discussions being on clinical, programmatic, policy, and advocacy issues. The conference was held in Cape Town, South Africa, from 8 to 11 November 2012. The theme of the conference was "Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases". There were more than 550 registered participants from 55 countries (including 37 African countries). There were nine pre-conference workshops, ten plenary sessions, and 150 oral and poster presentations. The conference discussed the challenges to universal immunisation in Africa as well as the promotion of dialogue and communication on immunisation among all stakeholders. There was general acknowledgment that giant strides have been made in Africa since the global launch of the Expanded Programme on Immunisation in 1974. For example, there has been significant progress in introducing new and under-utilised vaccines; including hepatitis B, Haemophilus influenza type b, pneumococcal conjugate, rotavirus, meningococcal A conjugate, and human papillomavirus vaccines. In May 2012, African countries

  11. Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases: report of the First International African Vaccinology Conference.

    Science.gov (United States)

    Wiysonge, Charles Shey; Waggie, Zainab; Hawkridge, Anthony; Schoub, Barry; Madhi, Shabir Ahmed; Rees, Helen; Hussey, Gregory

    2016-01-01

    One means of improving healthcare workers' knowledge of and attitudes to vaccines is through running vaccine conferences which are accessible, affordable, and relevant to their everyday work. Various vaccinology conferences are held each year worldwide. These meetings focus heavily on basic science with much discussion about new developments in vaccines, and relatively little coverage of policy, advocacy, and communication issues. A negligible proportion of delegates at these conferences come from Africa, home to almost 40% of the global burden of vaccine-preventable diseases. To the best of our knowledge, no major vaccinology conference has ever been held on the African continent apart from World Health Organization (WHO) meetings. The content of the first International African Vaccinology Conference was planned to be different; to focus on the science, with a major part of discussions being on clinical, programmatic, policy, and advocacy issues. The conference was held in Cape Town, South Africa, from 8 to 11 November 2012. The theme of the conference was "Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases". There were more than 550 registered participants from 55 countries (including 37 African countries). There were nine pre-conference workshops, ten plenary sessions, and 150 oral and poster presentations. The conference discussed the challenges to universal immunisation in Africa as well as the promotion of dialogue and communication on immunisation among all stakeholders. There was general acknowledgment that giant strides have been made in Africa since the global launch of the Expanded Programme on Immunisation in 1974. For example, there has been significant progress in introducing new and under-utilised vaccines; including hepatitis B, Haemophilus influenza type b, pneumococcal conjugate, rotavirus, meningococcal A conjugate, and human papillomavirus vaccines. In May 2012, African countries

  12. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  13. Network regularizability

    CERN Document Server

    Franceschet, Massimo

    2016-01-01

    A network is regularizable if it is possible to assign weights to its edges so that all nodes have the same degree. We define a hierarchy of four network classes in terms of their regularization properties. For the classes of the hierarchy, we investigate structural conditions on both the network and the corresponding adjacency matrix that are necessary and sufficient for the inclusion of a network in the class. Moreover, we provide an algorithmic solution for the problem of positioning a network in the hierarchy. We argue that the regularization solution is useful to build an egalitarian, friction-free network in which all actors of the network has the same centrality (and power).

  14. Computer Networks As Social Networks

    Science.gov (United States)

    Wellman, Barry

    2001-09-01

    Computer networks are inherently social networks, linking people, organizations, and knowledge. They are social institutions that should not be studied in isolation but as integrated into everyday lives. The proliferation of computer networks has facilitated a deemphasis on group solidarities at work and in the community and afforded a turn to networked societies that are loosely bounded and sparsely knit. The Internet increases people's social capital, increasing contact with friends and relatives who live nearby and far away. New tools must be developed to help people navigate and find knowledge in complex, fragmented, networked societies.

  15. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...... (WNF). Through the alumni network, Japan continues to infuse ideas to participants and alumni, who interpret and disseminate these ideas through alumni society networks and activities, but their discussions nationally and regionally also get reported back to Japan and affect future policies...

  16. Channel Networks

    Science.gov (United States)

    Rinaldo, Andrea; Rodriguez-Iturbe, Ignacio; Rigon, Riccardo

    This review proceeds from Luna Leopold's and Ronald Shreve's lasting accomplishments dealing with the study of random-walk and topologically random channel networks. According to the random perspective, which has had a profound influence on the interpretation of natural landforms, nature's resiliency in producing recurrent networks and landforms was interpreted to be the consequence of chance. In fact, central to models of topologically random networks is the assumption of equal likelihood of any tree-like configuration. However, a general framework of analysis exists that argues that all possible network configurations draining a fixed area are not necessarily equally likely. Rather, a probability P(s) is assigned to a particular spanning tree configuration, say s, which can be generally assumed to obey a Boltzmann distribution: P(s) % e^-H(s)/T, where T is a parameter and H(s) is a global property of the network configuration s related to energetic characters, i.e. its Hamiltonian. One extreme case is the random topology model where all trees are equally likely, i.e. the limit case for T6 4 . The other extreme case is T 6 0, and this corresponds to network configurations that tend to minimize their total energy dissipation to improve their likelihood. Networks obtained in this manner are termed optimal channel networks (OCNs). Observational evidence suggests that the characters of real river networks are reproduced extremely well by OCNs. Scaling properties of energy and entropy of OCNs suggest that large network development is likely to effectively occur at zero temperature (i.e. minimizing its Hamiltonian). We suggest a corollary of dynamic accessibility of a network configuration and speculate towards a thermodynamics of critical self-organization. We thus conclude that both chance and necessity are equally important ingredients for the dynamic origin of channel networks---and perhaps of the geometry of nature.

  17. Network medicine

    DEFF Research Database (Denmark)

    Pawson, Tony; Linding, Rune

    2008-01-01

    for new therapeutic intervention. We argue that by targeting the architecture of aberrant signaling networks associated with cancer and other diseases new therapeutic strategies can be implemented. Transforming medicine into a network driven endeavour will require quantitative measurements of cell...... signaling processes; we will describe how this may be performed and combined with new algorithms to predict the trajectories taken by a cellular system either in time or through disease states. We term this approach, network medicine....

  18. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  19. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  20. Network Security

    CERN Document Server

    Huang, Scott; Du, Ding-Zhu

    2010-01-01

    This book provides a reference tool for the increasing number of the scientists whose research is related to sensor network security. The book is organized into several sections, each including some chapters exploring a specific topic. Network security is attracting great attention and there are many research topics waiting to be studied. In this book, the topics covered include network design and modeling, network management, data management, security and applications. The aim, intent, and motivation of this book is to provide a reference tool for the increasing number of scientists whose res

  1. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  2. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  3. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  4. Diophantine networks

    Science.gov (United States)

    Bedogne', C.; Masucci, A. P.; Rodgers, G. J.

    2008-03-01

    We introduce a new class of deterministic networks by associating networks with Diophantine equations, thus relating network topology to algebraic properties. The network is formed by representing integers as vertices and by drawing cliques between M vertices every time that M distinct integers satisfy the equation. We analyse the network generated by the Pythagorean equation x2 +y2 =z2 showing that its degree distribution is well approximated by a power law with exponential cut-off. We also show that the properties of this network differ considerably from the features of scale-free networks generated through preferential attachment. Remarkably we also recover a power law for the clustering coefficient. We then study the network associated with the equation x2 +y2 = z showing that the degree distribution is consistent with a power law for several decades of values of k and that, after having reached a minimum, the distribution begins rising again. The power-law exponent, in this case, is given by γ ∼ 4.5 We then analyse clustering and ageing and compare our results to the ones obtained in the Pythagorean case.

  5. Diabetes network.

    Science.gov (United States)

    2016-07-01

    Diabetes UK has launched a network of information and support for commissioning and improvement in diabetes care. The network is free to join and offers monthly updates on good practice from around the UK, a forum for sharing ideas and learning, and access to Diabetes UK resources. PMID:27369708

  6. Organizational Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Grande, Bård

    1996-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed.......The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed....

  7. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  8. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating......This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...

  9. Natural networks

    CERN Document Server

    Hartonen, Tuomo

    2011-01-01

    Scale-free and non-computable characteristics of natural networks are found to result from the least-time dispersal of energy. To consider a network as a thermodynamic system is motivated since ultimately everything that exists can be expressed in terms of energy. According to the variational principle, the network will grow and restructure when flows of energy diminish energy differences between nodes as well as relative to nodes in surrounding systems. The natural process will yield scale-free characteristics because the nodes that contribute to the least-time consumption of free energy preferably attach to each other. Network evolution is a path-dependent and non-deterministic process when there are two or more paths to consume a common source of energy. Although evolutionary courses of these non-Hamiltonian systems cannot be predicted, many mathematical functions, models and measures that characterize networks can be recognized as appropriate approximations of the thermodynamic equation of motion that has...

  10. Assessing the Bias in Communication Networks Sampled from Twitter

    CERN Document Server

    González-Bailón, Sandra; Rivero, Alejandro; Borge-Holthoefer, Javier; Moreno, Yamir

    2012-01-01

    We collect and analyse messages exchanged in Twitter using two of the platform's publicly available APIs (the search and stream specifications). We assess the differences between the two samples, and compare the networks of communication reconstructed from them. The empirical context is given by political protests taking place in May 2012: we track online communication around these protests for the period of one month, and reconstruct the network of mentions and re-tweets according to the two samples. We find that the search API over-represents the more central users and does not offer an accurate picture of peripheral activity; we also find that the bias is greater for the network of mentions. We discuss the implications of this bias for the study of diffusion dynamics and collective action in the digital era, and advocate the need for more uniform sampling procedures in the study of online communication.

  11. Accelerating networks

    International Nuclear Information System (INIS)

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  12. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  13. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  14. Design and Performance Evaluation of Cooperative Retransmission Scheme for Reliable Multicast Services in Cellular Controlled P2P Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, F.H.P.; Iversen, Villy Bæk

    2007-01-01

    Reliable multicast applications such as software distribution, data distribution and replication and mailing list delivery, etc. [1] are getting more and more interests from network and service providers. The conventional error/loss recovery schemes are not efficient when they are applied...... to multicast scenarios in wireless networks. The reason lies in the unreliable wireless channel, the limited wireless bandwidth and resource, the battery powered wireless devices, and others. To have an effective error/loss recovery scheme for reliable multicast in wireless networks, we advocate a new...

  15. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  16. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Technical Assistance courses have many functions apart from disseminating knowledge and information, one such function is to engender networks. During the course period, participants meet and establish contact and some of these contacts remain connections between alumni for many years after...... the courses are finished. The alumni networks depend on the uses they are put to by the individual alumni and the support they get from alumni and host countries. The United Nations initiated technical assistance courses in the late 1940s in order to train nationals from developing countries as a means......, as a Danida fellow. Today, the older sister works in Nepal and the younger in Seattle, where they still make use of their personal networks including connections to their fellow alumni of technical assistance courses. Inspired by work on social remittances in combination with network theory , I argue...

  17. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  18. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  19. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...... the focus of operations management from managing the own organization to continuously developing and managing a network of external and internal resources forming a production system. This perspective may be called managing an “extraprise” rather than an “enterprise.” It should be noted that “an industrial...... network” should not be seen as an organizational form but as a perspective that can be used to enrich one's understanding of organizations. The industrial network perspective has three basic building blocks: actors, resources, and activities. The three building blocks and their relations constitute...

  20. Affective Networks

    Directory of Open Access Journals (Sweden)

    Jodi Dean

    2010-02-01

    Full Text Available This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  1. Chemical networks*

    OpenAIRE

    Thi Wing-Fai

    2015-01-01

    This chapter discusses the fundamental ideas of how chemical networks are build, their strengths and limitations. The chemical reactions that occur in disks combine the cold phase reactions used to model cold molecular clouds with the hot chemistry applied to planetary atmosphere models. With a general understanding of the different types of reactions that can occur, one can proceed in building a network of chemical reactions and use it to explain the abundance of species seen in disks. One o...

  2. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  3. Sentient networks

    Energy Technology Data Exchange (ETDEWEB)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  4. Network virtualization and programmability

    OpenAIRE

    Colle, Didier; Jooris, Bart; Gurzi, Pasquale; Pickavet, Mario; Demeester, Piet

    2010-01-01

    We present network virtualization (building virtual or logical networks over a physical infrastructure) and network programmability (allowing the network operator to at least control the network but more fundamentally to define its behavior) concepts.

  5. Janis Huston Audin, MSc, DVM,1950-2009. Dynamic editor-in-chief of the Journal of the American Veterinary Medical Association and strong One Health advocate dies

    Directory of Open Access Journals (Sweden)

    Bruce Kaplan, DVM

    2009-09-01

    Full Text Available Dr Janis H. Audin (MSc Illinois 1975, DVM Illinois 1979, a champion of progressive veterinary medical journalism and ‘One Health’ died on 22 April 2009 following a long, courageous and difficult battle with pancreatic cancer. The world has lost a truly significant One Health leader and advocate. Under her guidance, the Journal of the American Veterinary Medical Association (JAVMA implemented a ‘one-health wonders’ column that recognised and highlighted prominent One Health individuals among the medical and veterinary medical professions in the United States. The American Veterinary Medical Association (AVMA has lost a dedicated and gifted editor-in-chief.Dr Audin joined the editorial staff of the AVMA in 1985, as an assistant editor and was promoted to associate editor in 1989 and editor in 1994. She became the editor-in-chief of both the JAVMA and the American Journal of Veterinary Research in 1995. Prior to that, Dr Audin practised as an associate veterinarian in Calumet City, Illinois, for four years.During her tenure, Dr Audin was noted for implementing procedural and technological changes in the journal to reduce costs, improve timeliness of publications and promote readership interest and awareness. New features in the News section introduced under her leadership have made the journals more practical and public health-relevant. For instance, Dr Audin fostered the United States Department of Agriculture’s Food Safety and Inspection Service (USDA-FSIS ‘Inspection Insights’ - a public health-oriented food safety monthly column related to meat, poultry and egg products - from 1996 through 1998. She also increased international manuscript submissions.On 23 March 2009 AVMA Executive Vice President Dr W. Ron DeHaven named Dr Audin as editor-in-chief emeritus of the Publications Division. Wisely, it also meant that Dr Audin could continue contributing to the staff effort to ensure the high quality of the AVMA scientific journals

  6. Network Cosmology

    CERN Document Server

    Krioukov, Dmitri; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguna, Marian

    2012-01-01

    Causal sets are an approach to quantum gravity in which the causal structure of spacetime plays a fundamental role. The causal set is a quantum network which underlies the fabric of spacetime. The nodes in this network are tiny quanta of spacetime, with two such quanta connected if they are causally related. Here we show that the structure of these networks in de Sitter spacetime, such as our accelerating universe, is remarkably similar to the structure of complex networks -- the brain or the Internet, for example. Specifically, we show that the node degree distribution of causal sets in de Sitter spacetime is described by a power law with exponent 2, similar to many complex networks. Quantifying the differences between the causal set structure in de Sitter spacetime and in the real universe, we find that since the universe today is relatively young, its power-law exponent is not 2 but 3/4, yet exponent 2 is currently emerging. Finally, we show that as a consequence of a simple geometric duality, the growth d...

  7. Network management for 900-1300 MW PWR power plant industrial network

    International Nuclear Information System (INIS)

    Communication networks are a vital element in industrial information system projects. Because of the complexity of these networks, which are heterogeneous in terms of hardware, protocols and communication software, the need is now clear to consider them as applications in and of themselves. For this reason, EDF communication networks are now covered by system requirement specifications with SPRINT, and by an acceptance policy which calls for conformance certificates and defines methods for interoperability tests. Network management completes the picture, and attempts to provide the resources with which to assess present network status and manage communication networks. For this purpose, EDF has selected the OSI standard, which is based on four key concepts: - the ''Manager - Agent'' structural model, - a service (CMISE) and a protocol (CMIP) which enable exchange of management information, - an object-oriented management data model, -functions for: configuration, anomaly, performance and alarm management. This document presents the results of a project to integrate into a single management platform communication systems which do not conform to the OSI management recommendations. There were three major phases to the project: - a review of the OSI management model, and most particularly of the information model advocated; - a review of the resources to be managed and a comparison of the information provided by the different agents. Specifications were proposed for the management object and attribute classes which can usefully be implemented; - integration of ARLIC. During development of a breadboard version based on a BULL ISM platform for management of the power plant local area network, one possible solution for integration of ARLIC was proposed, describing the ARLIC information modeling along the lines of the OSI model. This project showed that it is possible to use the OSI modeling to represent management data manipulated by the communication software used on

  8. Network interruptions

    CERN Multimedia

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  9. Network dismantling

    CERN Document Server

    Braunstein, Alfredo; Semerjian, Guilhem; Zdeborová, Lenka

    2016-01-01

    We study the problem of network dismantling, that is of finding a minimal set of vertices whose removal leaves the network broken in connected components of sub-extensive size. For a large class of random graphs this problem is tightly connected to the decycling problem (the removal of vertices leaving the graph acyclic). Exploiting this connection and recent works on epidemic spreading we present precise predictions for the minimal size of a dismantling set in a large random graph with a prescribed (light-tailed) degree distribution. Building on the statistical mechanics perspective we propose a three-stage Min-Sum algorithm for efficiently dismantling networks, including heavy-tailed ones for which the dismantling and decycling problems are not equivalent. We also provide insight into the dismantling problem concluding that it is an intrinsically collective problem and optimal dismantling sets cannot be viewed as a collection of individually well performing nodes.

  10. Gradient networks

    Science.gov (United States)

    Toroczkai, Zoltán; Kozma, Balázs; Bassler, Kevin E.; Hengartner, N. W.; Korniss, G.

    2008-04-01

    Gradient networks are defined (Toroczkai and Bassler 2004 Nature 428 716) as directed graphs formed by local gradients of a scalar field distributed on the nodes of a substrate network G. We present the derivation for some of the general properties of gradient graphs and give an exact expression for the in-degree distribution R(l) of the gradient network when the substrate is a binomial (Erd{\\;\\kern -0.10em \\raise -0.35ex \\{{^{^{\\prime\\prime}}}}\\kern -0.57em \\o} s-Rényi) random graph, G_{N,p} , and the scalars are independent identically distributed (i.i.d.) random variables. We show that in the limit N \\to \\infty, p \\to 0, z = pN = \\mbox{const} \\gg 1, R(l)\\propto l^{-1} for l Bassler (2004 Nature 428 716).

  11. Innovation networks

    CERN Document Server

    Ahrweiler, Petra

    2013-01-01

    This paper advances a framework for modeling the component interactions between cognitive and social aspects of scientific creativity and technological innovation. Specifically, it aims to characterize Innovation Networks; those networks that involve the interplay of people, ideas and organizations to create new, technologically feasible, commercially-realizable products, processes and organizational structures. The tri-partite framework captures networks of ideas (Concept Level), people (Individual Level) and social structures (Social-Organizational Level) and the interactions between these levels. At the concept level, new ideas are the nodes that are created and linked, kept open for further investigation or closed if solved by actors at the individual or organizational levels. At the individual level, the nodes are actors linked by shared worldviews (based on shared professional, educational, experiential backgrounds) who are the builders of the concept level. At the social-organizational level, the nodes...

  12. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies.......Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...

  13. Power Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    @@Present States and Characteristics Since implementing reform and open policy,power industry in China has implemented the policy of separating govemment functions from enterprises, taking provincial power sectors as independent entities,integrating power networks, unified power dispatching and raising fund from various sources”, which has brought about rapid growth of power industry. With 12 years of continuous annual growth over 10,000 MW since 1988, the national total installed capacity reached 319.320.9 MW with an annual generation of 1368.482 TWh in 2000. To cope with the rapid growth of power source. all power networks in China have expanded correspondingly.

  14. String Network

    OpenAIRE

    Sen, Ashoke

    1997-01-01

    Type IIB string theory admits a BPS configuration in which three strings (of different type) meet at a point. Using this three string configuration we construct a string network and study its properties. In particular we prove supersymmetry of this configuration. We also consider string lattices, which can be used to construct BPS states in toroidally compactified string theory.

  15. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard;

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control...

  16. A knowledge network for a dynamic taxonomy of psychiatric disease.

    Science.gov (United States)

    Krishnan, Ranga R

    2015-03-01

    Current taxonomic approaches in medicine and psychiatry are limited in validity and utility. They do serve simple communication purposes for medical coding, teaching, and reimbursement, but they are not suited for the modern era with its rapid explosion of knowledge from the "omics" revolution. The National Academy of Sciences published a report entitled Toward Precision Medicine: Building a Knowledge Network for Biomedical Research and a New Taxonomy of Disease. The authors advocate a new taxonomy that would integrate molecular data, clinical data, and health outcomes in a dynamic, iterative fashion, bringing together research, public health, and health-care delivery with the interlinked goals of advancing our understanding of disease pathogenesis and thereby improving health. As the need for an information hub and a knowledge network with a dynamic taxonomy based on integration of clinical and research data is vital, and timely, this proposal merits consideration.

  17. Ecological network analysis: network construction

    NARCIS (Netherlands)

    Fath, B.D.; Scharler, U.M.; Ulanowicz, R.E.; Hannon, B.

    2007-01-01

    Ecological network analysis (ENA) is a systems-oriented methodology to analyze within system interactions used to identify holistic properties that are otherwise not evident from the direct observations. Like any analysis technique, the accuracy of the results is as good as the data available, but t

  18. Network Security Scanner

    OpenAIRE

    G. MURALI; M.Pranavi; Y.Navateja; K. Bhargavi

    2011-01-01

    Network Security Scanner (NSS) is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS) is an easy to use, intuitive network security scanner that c...

  19. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  20. Inferring connectivity in networked dynamical systems: Challenges using Granger causality

    Science.gov (United States)

    Lusch, Bethany; Maia, Pedro D.; Kutz, J. Nathan

    2016-09-01

    Determining the interactions and causal relationships between nodes in an unknown networked dynamical system from measurement data alone is a challenging, contemporary task across the physical, biological, and engineering sciences. Statistical methods, such as the increasingly popular Granger causality, are being broadly applied for data-driven discovery of connectivity in fields from economics to neuroscience. A common version of the algorithm is called pairwise-conditional Granger causality, which we systematically test on data generated from a nonlinear model with known causal network structure. Specifically, we simulate networked systems of Kuramoto oscillators and use the Multivariate Granger Causality Toolbox to discover the underlying coupling structure of the system. We compare the inferred results to the original connectivity for a wide range of parameters such as initial conditions, connection strengths, community structures, and natural frequencies. Our results show a significant systematic disparity between the original and inferred network, unless the true structure is extremely sparse or dense. Specifically, the inferred networks have significant discrepancies in the number of edges and the eigenvalues of the connectivity matrix, demonstrating that they typically generate dynamics which are inconsistent with the ground truth. We provide a detailed account of the dynamics for the Erdős-Rényi network model due to its importance in random graph theory and network science. We conclude that Granger causal methods for inferring network structure are highly suspect and should always be checked against a ground truth model. The results also advocate the need to perform such comparisons with any network inference method since the inferred connectivity results appear to have very little to do with the ground truth system.

  1. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée;

    2010-01-01

    Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization – are......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics.......Algorithmic discrete mathematics plays a key role in the development of information and communication technologies, and methods that arise in computer science, mathematics and operations research – in particular in algorithms, computational complexity, distributed computing and optimization...... – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...

  2. Network Gravity

    CERN Document Server

    Lombard, John

    2016-01-01

    We introduce the construction of a new framework for probing discrete emergent geometry and boundary-boundary observables based on a fundamentally a-dimensional underlying network structure. Using a gravitationally motivated action with Forman weighted combinatorial curvatures and simplicial volumes relying on a decomposition of an abstract simplicial complex into realized embeddings of proper skeletons, we demonstrate properties such as a minimal volume-scale cutoff, the necessity of a positive-definite cosmological constant as a regulator for non-degenerate geometries, and naturally emergent simplicial structures from Metropolis network evolution simulations with no restrictions on attachment rules or regular building blocks. We see emergent properties which echo results from both the spinfoam formalism and causal dynamical triangulations in quantum gravity, and provide analytical and numerical results to support the analogy. We conclude with a summary of open questions and intent for future work in develop...

  3. Neural Networks

    Directory of Open Access Journals (Sweden)

    Schwindling Jerome

    2010-04-01

    Full Text Available This course presents an overview of the concepts of the neural networks and their aplication in the framework of High energy physics analyses. After a brief introduction on the concept of neural networks, the concept is explained in the frame of neuro-biology, introducing the concept of multi-layer perceptron, learning and their use as data classifer. The concept is then presented in a second part using in more details the mathematical approach focussing on typical use cases faced in particle physics. Finally, the last part presents the best way to use such statistical tools in view of event classifers, putting the emphasis on the setup of the multi-layer perceptron. The full article (15 p. corresponding to this lecture is written in french and is provided in the proceedings of the book SOS 2008.

  4. Open innovation in networks

    DEFF Research Database (Denmark)

    Hu, Yimei

    Open innovation in networks has been a popular topic for long, this paper rethinks the concepts of innovation network and network organization, and clarifies the differences between them based on the network perspective. Network perspective means that: network is the context of firms; market...

  5. Socialist Networks

    OpenAIRE

    Agarez, Ricardo; Bechini, Thibault; Dalachanis, Angelos; El-Wakil, Leila; Gzowska, Alicja; James-Chakraborty, Kathleen; Kögel, Eduard; Kulić, Vladimir; Lagae, Johan; Schwenkel, Christina; Stanek, Łukasz; Zandi-Sayek, Sibel

    2014-01-01

    This issue of ABE focuses on the internationalization of building culture after WWII and the contributions of architects, planners, and engineers from socialist countries to these processes. Complementing the studies of colonial and postcolonial links, international organizations such as the UN, and economic globalization as conduits of the world-wide spread of architecture, this issue discusses the intersection of these networks with flows of labor power, materials, technologies, discourses ...

  6. Studying Fin Whales with Seafloor Seismic Networks

    Science.gov (United States)

    Wilcock, W. S.; Soule, D. C.; Weirathmueller, M.; Thomson, R.

    2011-12-01

    Baleen whales are found throughout the world's oceans and their welfare captivates the general public. Depending on the species, baleen whales vocalize at frequencies ranging from ~10 Hz to several kilohertz. Passive acoustic studies of whale calls are used to investigate behavior and habitat usage, monitor the recovery of populations from whaling and assess the impacts of anthropogenic sounds. Since airguns are a significant source of sound in the oceans, the research goals of academic seismologists can lead to conflicts with those who advocate for whale conservation while being unwilling to consider the societal benefits of marine geophysical studies. In contrast, studies that monitor earthquakes with ocean bottom seismometers (OBSs) provide an opportunity to enhance studies of baleen whales and improve relationships with environmental advocates. The bandwidth of the typical high-frequency or intermediate-band ocean bottom seismometer overlaps the call frequency of the two largest baleen whale species; blue whales generate sequences of 10- to 20-s-long calls centered at ~16 Hz and fin whales produce long sequences of downswept 1-s-long chirps centered at ~20 Hz. Several studies have demonstrated the potential of OBS networks to monitor calling patterns and determine tracks for fin and blue whales. We will summarize the results from a study to track fin whales near the Endeavour hydrothermal vent fields on the Juan de Fuca Ridge and investigate a potential correlation between the density of whales and enhanced zooplankton found throughout the water column overlying the vent fields. From 2003-2006 an 8-station local seismic network that was designed to monitor hydrothermal earthquakes also recorded ~300,000 fin whale vocalizations, mostly in the fall and winter. Automatic picking and localization techniques that are analogous to those used to analyze earthquakes are employed to determine whale tracks. The tracks are then used to interpret calling patterns in the

  7. Why Network? Theoretical Perspectives on Networking

    Science.gov (United States)

    Muijs, Daniel; West, Mel; Ainscow, Mel

    2010-01-01

    In recent years, networking and collaboration have become increasingly popular in education. However, there is at present a lack of attention to the theoretical basis of networking, which could illuminate when and when not to network and under what conditions networks are likely to be successful. In this paper, we will attempt to sketch the…

  8. Optimal design of systems that evolve over time using neural networks

    Science.gov (United States)

    Nolan, Michael K.

    2007-04-01

    Design optimization is challenging when the number of variables becomes large. One method of addressing this problem is to use pattern recognition to decrease the solution space in which the optimizer searches. Human "common sense" is used by designers to narrow the scope of search to a confined area defined by patterns conforming to likely solution candidates. However, computer-based optimization generally does not apply similar heuristics. In this paper, a system is presented that recognizes patterns and adjusts its search for optimal solutions based on these patterns. A design problem was selected that requires the optimization algorithm to assess designs that evolve over time. A small sensor network design is evolved into a larger sensor network design. Optimal design solutions for the small network do not necessarily lead to optimal solutions for the larger network. Systems that are well-positioned to evolve have characteristics that distinguish themselves from systems that are not well-positioned to evolve. In this study, a neural network was able to recognize a pattern whereby flexible sensor networks evolved more successfully than less flexible networks. The optimizing algorithm used this pattern to select candidate systems that showed promise for evolution. A genetic algorithm assisted by a neural network achieved better performance than an unassisted genetic algorithm did. This thesis advocates the merit of neural network use in multi-objective system design optimization and to lay a basis for future study.

  9. Geographical networks: geographical effects on network properties

    Institute of Scientific and Technical Information of China (English)

    Kong-qing YANG; Lei YANG; Bai-hua GONG; Zhong-cai LIN; Hong-sheng HE; Liang HUANG

    2008-01-01

    Complex networks describe a wide range of sys-tems in nature and society. Since most real systems exist in certain physical space and the distance between the nodes has influence on the connections, it is helpful to study geographi-cal complex networks and to investigate how the geographical constrains on the connections affect the network properties. In this paper, we briefly review our recent progress on geo-graphical complex networks with respect of statistics, mod-elling, robustness, and synchronizability. It has been shown that the geographical constrains tend to make the network less robust and less synchronizable. Synchronization on random networks and clustered networks is also studied.

  10. Best of enemies: Using social network analysis to explore a policy network in European smoke-free policy.

    Science.gov (United States)

    Weishaar, Heide; Amos, Amanda; Collin, Jeff

    2015-05-01

    Networks and coalitions of stakeholders play a crucial role in the development and implementation of policies, with previous research highlighting that networks in tobacco control are characterised by an antagonism between supporters and opponents of comprehensive tobacco control policies. This UK-based study used quantitative and qualitative network analysis (drawing on 176 policy submissions and 32 interviews) to systematically map and analyse a network of actors involved in the development of European Union (EU) smoke-free policy. Policy debates were dominated by two coalitions of stakeholders with starkly opposing positions on the issue. One coalition, consisting primarily of health-related organisations, supported comprehensive EU smoke-free policy, whereas the other, led by tobacco manufacturers' organisations, opposed the policy initiative. The data suggest that, aided by strong political commitment of EU decision makers to develop smoke-free policy, advocates supporting comprehensive EU policy were able to frame policy debates in ways which challenged the tobacco industry's legitimacy. They then benefited from the stark polarisation between the two coalitions. The paper provides empirical evidence of the division between two distinct coalitions in tobacco policy debates and draws attention to the complex processes of consensus-seeking, alliance-building and strategic action which are integral to the development of EU policy. Highlighting network polarisation and industry isolation as factors which seemed to increase tobacco control success, the study demonstrates the potential significance and value of FCTC article 5.3 for tobacco control policy-making. PMID:25863723

  11. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  12. “Psychosocial Interventions for Cancer Survivors, Caregivers and Family Members—One Size Does Not Fit All: My Perspective as a Young Adult Survivor, Advocate and Oncology Social Worker” a personal reflection by Mary Grace Bontempo - Office of Cancer Survivorship

    Science.gov (United States)

    “Psychosocial Interventions for Cancer Survivors, Caregivers and Family Members—One Size Does Not Fit All: My Perspective as a Young Adult Survivor, Advocate and Oncology Social Worker” a personal reflection by Mary Grace Bontempo page

  13. ENLIGHT Network

    CERN Multimedia

    Ballantine, A; Dixon-Altaber, H; Dosanjh, M; Kuchina, L

    2011-01-01

    State-of-the-art techniques borrowed from particle accelerators and detectors are a key element in hadrontherapy and several European projects are actively fostering the collaboration amongst the various disciplines and countries. ENLIGHT was established in 2002 to coordinate these European efforts in hadron therapy. The ENLIGHT network is formed by the European hadrontherapy Community, with more than 300 participants from twenty European countries. A major achievement of ENLIGHT has been the blending of traditionally separate communities so that clinicians, physicists, biologists and engineers with experience and interest in particle therapy are working together.

  14. Network Security with Cryptography

    OpenAIRE

    Prof. Mukund R. Joshi; Renuka Avinash Karkade

    2015-01-01

    Network Security & Cryptography is a concept to protect network and data transmission over wireless network. Data Security is the main aspect of secure data transmission over unreliable network. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Netw...

  15. Local Social Networks

    OpenAIRE

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social commun...

  16. Genomic networks of hybrid sterility.

    Science.gov (United States)

    Turner, Leslie M; White, Michael A; Tautz, Diethard; Payseur, Bret A

    2014-02-01

    range of organisms and we advocate for widespread adoption of a network-centered approach in speciation genetics.

  17. Genomic networks of hybrid sterility.

    Directory of Open Access Journals (Sweden)

    Leslie M Turner

    2014-02-01

    applicable in a broad range of organisms and we advocate for widespread adoption of a network-centered approach in speciation genetics.

  18. Robustness of a Network of Networks

    Science.gov (United States)

    Gao, Jianxi; Buldyrev, Sergey V.; Stanley, H. Eugene; Havlin, Shlomo

    2012-02-01

    Network research has been focused on studying the properties of a single isolated network, which rarely exists. We develop a general analytical framework for studying percolation of n interdependent networks. We illustrate our analytical solutions for three examples: (i) For any tree of n fully dependent Erdos-R'enyi (ER) networks, each of average degree k, we find that the giant component P∞=p[1-(-kP∞)]^n where 1 - p is the initial fraction of removed nodes. This general result coincides for n = 1 with the known second-order phase transition for a single network. For any n>1 cascading failures occur and the percolation becomes an abrupt first-order transition. (ii) For a starlike network of n partially interdependent ER networks, P∞ depends also on the topology--in contrast to case (i). (iii) For a looplike network formed by n partially dependent ER networks, P∞ is independent of n.

  19. Network Monitoring with Zabbix

    OpenAIRE

    Shokhin, Anatolii

    2015-01-01

    Network monitoring became an essential part of any network size. It brings monitoring of network components 24/7. This provides clarity and transparency of network infrastructure and performance. With on time alert notification, network administrator may start failure troubleshooting immediately. As a result, end users may not even notice the issue.

  20. Interconnection networks

    Science.gov (United States)

    Faber, V.; Moore, J.W.

    1988-06-20

    A network of interconnected processors is formed from a vertex symmetric graph selected from graphs GAMMA/sub d/(k) with degree d, diameter k, and (d + 1)exclamation/ (d /minus/ k + 1)exclamation processors for each d greater than or equal to k and GAMMA/sub d/(k, /minus/1) with degree d /minus/ 1, diameter k + 1, and (d + 1)exclamation/(d /minus/ k + 1)exclamation processors for each d greater than or equal to k greater than or equal to 4. Each processor has an address formed by one of the permutations from a predetermined sequence of letters chosen a selected number of letters at a time, and an extended address formed by appending to the address the remaining ones of the predetermined sequence of letters. A plurality of transmission channels is provided from each of the processors, where each processor has one less channel than the selected number of letters forming the sequence. Where a network GAMMA/sub d/(k, /minus/1) is provided, no processor has a channel connected to form an edge in a direction delta/sub 1/. Each of the channels has an identification number selected from the sequence of letters and connected from a first processor having a first extended address to a second processor having a second address formed from a second extended address defined by moving to the front of the first extended address the letter found in the position within the first extended address defined by the channel identification number. The second address is then formed by selecting the first elements of the second extended address corresponding to the selected number used to form the address permutations. 9 figs.

  1. Pesquisa em contracepção: opinião de pesquisadores, sujeitos e defensoras dos direitos das mulheres Research on contraception: opinion of researchers, subjects and advocates of women rights

    Directory of Open Access Journals (Sweden)

    Ellen Hardy

    2004-12-01

    Full Text Available OBJETIVO: Conhecer a opinião de pesquisadores, de mulheres - sujeitos de pesquisa, e de defensoras dos direitos das mulheres sobre o significado de "pesquisa" e "cobaia". MÉTODOS: Pesquisadores (11, mulheres (18 e defensoras (10 foram entrevistados. O estudo foi qualitativo e a análise dos dados foi temática. RESULTADOS: Os participantes tiveram dificuldade em explicar o que é pesquisa; alguns não conseguiram. Para pesquisadores e maioria das mulheres, sujeitos de pesquisa não são cobaias, porque têm liberdade de escolha. Para a maioria das defensoras, sujeitos são cobaias, ainda que consintam em participar de um estudo. CONCLUSÕES: Foi surpreendente a dificuldade dos pesquisadores em explicar o que é pesquisa. As diferentes opiniões sobre o termo "cobaia" refletem a controvérsia sobre seu significado em pesquisa. Seguramente o termo "cobaia" não se aplica à maior parte dos estudos realizados hoje no Brasil, mas os diferentes significados identificados servem para alertar os pesquisadores a prestar atenção aos aspectos éticos de seus estudos.OBJECTIVE: To survey the opinion of researchers, women - subjects of research- and of advocates of women's rights about the meaning of "research" and "guinea pigs". Methods: Researchers (11, women (18 and advocates (10 were interviewed. The study was qualitative and a thematic analysis was carried out. RESULTS: Participants experienced difficulty to explain what research meant and some were unable to do so. For the researchers and most of the women, subjects are not guinea pigs, because they have freedom of choice. Most of the advocates, however, said that subjects are guinea pigs, even when they consent to participate in a study. CONCLUSIONS: The difficulty experienced by researchers when explaining the meaning of research was surprising. The different opinions about "guinea pig" reflect the controversy about its meaning in research. Certainly the expression "guinea pig" does not apply to

  2. A Network-of-Networks Model for Electrical Infrastructure Networks

    CERN Document Server

    Halappanavar, Mahantesh; Hogan, Emilie; Duncan, Daniel; Zhenyu,; Huang,; Hines, Paul D H

    2015-01-01

    Modeling power transmission networks is an important area of research with applications such as vulnerability analysis, study of cascading failures, and location of measurement devices. Graph-theoretic approaches have been widely used to solve these problems, but are subject to several limitations. One of the limitations is the ability to model a heterogeneous system in a consistent manner using the standard graph-theoretic formulation. In this paper, we propose a {\\em network-of-networks} approach for modeling power transmission networks in order to explicitly incorporate heterogeneity in the model. This model distinguishes between different components of the network that operate at different voltage ratings, and also captures the intra and inter-network connectivity patterns. By building the graph in this fashion we present a novel, and fundamentally different, perspective of power transmission networks. Consequently, this novel approach will have a significant impact on the graph-theoretic modeling of powe...

  3. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  4. Visualization of Social Networks

    NARCIS (Netherlands)

    Boertjes, E.M.; Kotterink, B.; Jager, E.J.

    2011-01-01

    Current visualizations of social networks are mostly some form of node-link diagram. Depending on the type of social network, this can be some treevisualization with a strict hierarchical structure or a more generic network visualization.

  5. Animal transportation networks.

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-11-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research.

  6. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    L.M. Camarinha-Matos; H. Afsarmanesh

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  7. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  8. Reconfigurable network processing platforms

    NARCIS (Netherlands)

    Kachris, C.

    2007-01-01

    This dissertation presents our investigation on how to efficiently exploit reconfigurable hardware to design flexible, high performance, and power efficient network devices capable to adapt to varying processing requirements of network applications and traffic. The proposed reconfigurable network pr

  9. Neural Network Applications

    NARCIS (Netherlands)

    Vonk, E.; Jain, L.C.; Veelenturf, L.P.J.

    1995-01-01

    Artificial neural networks, also called neural networks, have been used successfully in many fields including engineering, science and business. This paper presents the implementation of several neural network simulators and their applications in character recognition and other engineering areas

  10. A NOVEL QOS SCHEDULING FOR WIRELESS BROADBAND NETWORKS

    Directory of Open Access Journals (Sweden)

    D. David Neels Pon Kumar

    2010-09-01

    Full Text Available During the last few years, users all over the world have become more and more familiar to the availability of broadband access. When users want broadband Internet service, they are generally restricted to a DSL (Digital Subscribers Line, or cable-modem-based connection. Proponents are advocating worldwide interoperability for microwave access (WiMAX, a technology based on an evolving standard for point-to multipoint wireless networking. Scheduling algorithms that support Quality of Service (QoS differentiation and guarantees for wireless data networks are crucial to the deployment of broadband wireless networks. The performance affecting parameters like fairness, bandwidth allocation, throughput, latency are studied and found out that none of the conventional algorithms perform effectively for both fairness and bandwidth allocation simultaneously. Hence it is absolutely essential for an efficient scheduling algorithm with a better trade off for these two parameters. So we are proposing a novel Scheduling Algorithm using Fuzzy logic and Artificial neural networks that addresses these aspects simultaneously. The initial results show that a fair amount of fairness is attained while keeping the priority intact. Results also show that maximum channel utilization is achieved with a negligible increment in processing time.

  11. Network robustness of correlated multiplex networks

    CERN Document Server

    Min, Byungjoon; Lee, Kyu-Min; Goh, K -I

    2013-01-01

    We study the network robustness properties of multiplex networks which contain multiple types of links, focusing on the role of correlation between degrees of a node in different layers. We use generating function formalism to address various types of network robustness of multiplex networks: the ordinary and mutual connectivity under random or targeted node removals as well as the biconnectivity. We found that correlated multiplexity can affect the resilience of networks in diverse ways. Specifically, for maximally-correlated multiplex networks, all pairs of nodes in the giant component are connected by at least two independent paths and networks structure is highly robust to random failures. In contrast, anti-correlated networks are resilient against attacks on targeted nodes with high degrees but vulnerable to random failures.

  12. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant;

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity....... Coding density tuning can be performed by designing time-dependent coding matrices. In multicast networks, this tuning can be performed within the network by designing time-dependent pre- coding and network coding matrices with mild conditions on the network structure for specific densities. We present a...

  13. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  14. Super sensor network

    OpenAIRE

    Fjukstad, Bård

    2008-01-01

    This dissertation studies composing a super sensor network from the combination of three functional sensor networks; A Sensor data producing network, a sensor data computing network and a sensor controlling network. The target devices are today labeled as large sensor nodes. The communication are based on an IP network using HTTP as the main protocol. Bonjour is used for service discovery, with some adjustments for technical reasons. This allows for naming and location of available servi...

  15. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  16. Corporate Business Networking

    OpenAIRE

    Kanepeja, Zane

    2012-01-01

    Conscious networking is emerging as a mindset, similar to knowledge society, who were known for their drive for knowledge. The new network society is driven by a networking mindset. This emerging tendency of network requirement and usage in social environment sets a ”must- agenda” for companies to implement networking in their business strategies as companies in the current market situation do not only have to compete with each other but also with their networks. It is a sink or swim choice....

  17. Stem Cell Networks

    OpenAIRE

    Werner, Eric

    2016-01-01

    We present a general computational theory of stem cell networks and their developmental dynamics. Stem cell networks are special cases of developmental control networks. Our theory generates a natural classification of all possible stem cell networks based on their network architecture. Each stem cell network has a unique topology and semantics and developmental dynamics that result in distinct phenotypes. We show that the ideal growth dynamics of multicellular systems generated by stem cell ...

  18. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  19. Software Defined Networking for Heterogeneous Networks

    OpenAIRE

    Mendonca, Marc; Astuto, Bruno Nunes; Obraczka, Katia; Turletti, Thierry

    2013-01-01

    In this paper, motivated by the vision that future internets will comprise infrastructure--based and infrastructure--less networks, we explore the use of the Software-Defined Networking (SDN) paradigm in these so-called ''heterogeneous'' networked environments. To make the case for SDN in heterogeneous networks, we examine an application scenario in which SDN is a key enabling technology. We also identify the additional requirements imposed by the SDN paradigm and discuss the research challen...

  20. Software defined networking for community network testbeds

    OpenAIRE

    Dimogerontakis, Emmanouil; Vilalta, Ivan; Navarro Moldes, Leandro

    2013-01-01

    Wireless Community Networks have received increasing attention the latest years. In an effort to set the cornerstone for an internet without central authorities and monopolies, network engineers throughout the world have started creating community networks. To enhance this effort, Community-lab, a wireless community networks testbed, was created which allows researchers to experiment with new protocols and applications in a realistic environment. Nevertheless, this testbed does not offer the ...

  1. Defining Business Network

    Directory of Open Access Journals (Sweden)

    Raffaele Trequattrini

    2012-02-01

    Full Text Available The purpose of the present scientific contribution is to investigate from the business economics standpoing the emerging phenomenon of company networks. In particular, through the analysis of the theory of networks will be proposed the principal categories of business networks, and even before this the concept of the network will be defined. The proposed research, qualitatively, represents the point of departure for the study of the network phenomenon in light of the current economic phase termed “economy of knowledge”. Moreover, the research questions are the following: From where does the theory of networks arise? Do company networks consider themselves equal to knowledge networks?

  2. Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Ladislav Schwartz

    2006-01-01

    Full Text Available Two network types had been existing in Slovakia by the end of the year 2004 – public switched telephone network – PSTN and packet switched data network – DCN. The other network, known as the next generation network – NGN, has been put into operation since the beginning of the year 2005. The role of the next generation network is to merge the both previous network types into one unified complex network with the full centralised control, based on routing and packet switching. The T-Com company (previous Slovak Telecom was the first who did it.

  3. Enlightenment on Computer Network Reliability From Transportation Network Reliability

    Directory of Open Access Journals (Sweden)

    Hu Wenjun

    2011-06-01

    Full Text Available Referring to transportation network reliability problem, five new computer network reliability definitions are proposed and discussed. They are computer network connectivity reliability, computer network time reliability, computer network capacity reliability, computer network behavior reliability and computer network potential reliability. Finally strategies are suggested to enhance network reliability.

  4. Enlightenment on Computer Network Reliability From Transportation Network Reliability

    OpenAIRE

    Hu Wenjun; Zhou Xizhao

    2011-01-01

    Referring to transportation network reliability problem, five new computer network reliability definitions are proposed and discussed. They are computer network connectivity reliability, computer network time reliability, computer network capacity reliability, computer network behavior reliability and computer network potential reliability. Finally strategies are suggested to enhance network reliability.

  5. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  6. Isomorphisms in Multilayer Networks

    CERN Document Server

    Kivelä, Mikko

    2015-01-01

    We extend the concept of graph isomorphisms to multilayer networks, and we identify multiple types of isomorphisms. For example, in multilayer networks with a single "aspect" (i.e., type of layering), permuting vertex labels, layer labels, and both of types of layers each yield a different type of isomorphism. We discuss how multilayer network isomorphisms naturally lead to defining isomorphisms in any type of network that can be represented as a multilayer network. This thereby yields isomorphisms for multiplex networks, temporal networks, networks with both such features, and more. We reduce each of the multilayer network isomorphism problems to a graph isomorphism problem, and we use this reduction to prove that the multilayer network isomorphism problem is computationally equally hard as the graph isomorphism problem. One can thus use software that has been developed to solve graph isomorphism problems as a practical means for solving multilayer network isomorphism problems.

  7. Formation of multiple networks

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    While most research in Social Network Analysis has focused on single networks, the availability of complex on-line data about individuals and their mutual heterogenous connections has recently determined a renewed interest in multi-layer network analysis. To the best of our knowledge, in this paper...... we introduce the first network formation model for multiple networks. Network formation models are among the most popular tools in traditional network studies, because of both their practical and theoretical impact. However, existing models are not sufficient to describe the generation of multiple...... networks. Our model, motivated by an empirical analysis of real multi-layered network data, is a conservative extension of single-network models and emphasizes the additional level of complexity that we experience when we move from a single- to a more complete and realistic multi-network context....

  8. [Neuronal network].

    Science.gov (United States)

    Langmeier, M; Maresová, D

    2005-01-01

    Function of the central nervous system is based on mutual relations among the nerve cells. Description of nerve cells and their processes, including their contacts was enabled by improvement of optical features of the microscope and by the development of impregnation techniques. It is associated with the name of Antoni van Leeuwenhoek (1632-1723), J. Ev. Purkyne (1787-1869), Camillo Golgi (1843-1926), and Ramón y Cajal (1852-1934). Principal units of the neuronal network are the synapses. The term synapse was introduced into neurophysiology by Charles Scott Sherrington (1857-1952). Majority of the interactions between nerve cells is mediated by neurotransmitters acting at the receptors of the postsynaptic membrane or at the autoreceptors of the presynaptic part of the synapse. Attachment of the vesicles to the presynaptic membrane and the release of the neurotransmitter into the synaptic cleft depend on the intracellular calcium concentration and on the presence of several proteins in the presynaptic element.

  9. Network Mobiles

    Directory of Open Access Journals (Sweden)

    Alhamali Masoud Alfrgani .Ali

    2015-07-01

    Full Text Available Mobile devices are becoming increasingly popular for delivering multimedia content, particularly by means of streaming. The main disadvantage of these devices is their limited battery life. Unfortunately, streaming of multimedia content causes the battery of the device to discharge very fast, often causing the battery to deplete before the streaming task finishes, resulting in user dissatisfaction. It is generally not possible to charge the device while on the go as electricity socket and charger are required. Therefore, to avoid this user dissatisfaction, it is necessary to find ways to prolong the battery lifetime and to support the completion of the multimedia streaming tasks. A typical architecture for mobile multimedia streaming is presented In this architecture, a wired server streams multimedia content over a wireless IP network to a number of client devices. These devices could be PDAs, smartphones or any other mobile device with 802.11 connectivity. In relation to possible power savings, the multimedia streaming process can be described as consisting of three stages: reception, decoding and playing. Other researchers have shown that energy savings can be made in each stage, for example by using pre-buffering in the reception stage, feedback control during decoding and backlight adjustment for playing. However, it is not a common practice to combine energy savings in the three stages in order to achieve the best

  10. Data center networks and network architecture

    Science.gov (United States)

    Esaki, Hiroshi

    2014-02-01

    This paper discusses and proposes the architectural framework, which is for data center networks. The data center networks require new technical challenges, and it would be good opportunity to change the functions, which are not need in current and future networks. Based on the observation and consideration on data center networks, this paper proposes; (i) Broadcast-free layer 2 network (i.e., emulation of broadcast at the end-node), (ii) Full-mesh point-to-point pipes, and (iii) IRIDES (Invitation Routing aDvertisement for path Engineering System).

  11. Network Externality: An Uncommon Tragedy

    OpenAIRE

    S. J. Liebowitz; Stephen E. Margolis

    1994-01-01

    Economists have defined 'network externality' and have examined putative inframarginal market failures associated with it. This paper distinguishes between network effects and network externalities, where the latter are market failures. The authors argue that while network effects are important, network externalities are theoretically fragile and empirically undocumented. Some network externalities are merely pecuniary. Network ownership or transactions among network participants can internal...

  12. Network epidemiology and plant trade networks.

    Science.gov (United States)

    Pautasso, Marco; Jeger, Mike J

    2014-01-01

    Models of epidemics in complex networks are improving our predictive understanding of infectious disease outbreaks. Nonetheless, applying network theory to plant pathology is still a challenge. This overview summarizes some key developments in network epidemiology that are likely to facilitate its application in the study and management of plant diseases. Recent surveys have provided much-needed datasets on contact patterns and human mobility in social networks, but plant trade networks are still understudied. Human (and plant) mobility levels across the planet are unprecedented-there is thus much potential in the use of network theory by plant health authorities and researchers. Given the directed and hierarchical nature of plant trade networks, there is a need for plant epidemiologists to further develop models based on undirected and homogeneous networks. More realistic plant health scenarios would also be obtained by developing epidemic models in dynamic, rather than static, networks. For plant diseases spread by the horticultural and ornamental trade, there is the challenge of developing spatio-temporal epidemic simulations integrating network data. The use of network theory in plant epidemiology is a promising avenue and could contribute to anticipating and preventing plant health emergencies such as European ash dieback.

  13. Applied Ontology Engineering in Cloud Services, Networks and Management Systems

    CERN Document Server

    Serrano Orozco, J Martín

    2012-01-01

    Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems. �...

  14. Social Networks in Education

    OpenAIRE

    Larionovs, Aleksandrs

    2015-01-01

    Nowadays popularity of social networks (draugiem.lv, facebook etc.) is increasing, virtually every student has at least one account in one of the social networks. But the problem is that little is known about how to use social networking in Latvian education. The author of this paper will try to prevent it, to summarize available information on social networking in education.

  15. Holographic neural networks

    OpenAIRE

    Manger, R

    1998-01-01

    Holographic neural networks are a new and promising type of artificial neural networks. This article gives an overview of the holographic neural technology and its possibilities. The theoretical principles of holographic networks are first reviewed. Then, some other papers are presented, where holographic networks have been applied or experimentally evaluated. A case study dealing with currency exchange rate prediction is described in more detail.

  16. Engineering technology for networks

    Science.gov (United States)

    Paul, Arthur S.; Benjamin, Norman

    1991-01-01

    Space Network (SN) modeling and evaluation are presented. The following tasks are included: Network Modeling (developing measures and metrics for SN, modeling of the Network Control Center (NCC), using knowledge acquired from the NCC to model the SNC, and modeling the SN); and Space Network Resource scheduling.

  17. About Network telecom

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    NETWORK TELECOM magazine, commenced publication in 1999, is the network & telecommunicationsindust0?s leading publication in China. specializing in the field of optic fiber communications, access network,mobile communications, CATV network,cabling system and data communications; and has established itsrepuion by a combination of authoritative editorial content, targeting a ckcuatlon of high o.uality covering theentire China regiom

  18. About Network Telecom

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    NETWORK TELECOM magazine is the network & telecommunications industry's leading publication in China, specializing in the field of optic fiber communications, access network, mobile communications, CATV network,cabling system and data communications; and has established its reputation by a combination of authoritative editorial content, targeting a circulation of high quality covering the entire China region.

  19. About Network Telecom

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    NETWORK TELECOM magazine is the network & telecommunications industry's leading publication in China. specializing in the field of optic fiber communications, access network, mobile communications. CATV network,cabling system and data communications;and has established its reputation by a combination of authoritative editorial content, targeting a circulation of high quality covering the entire China region.

  20. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  1. Network simulation experiments manual

    CERN Document Server

    Aboelela, Emad

    2011-01-01

    Network Simulation Experiments Manual, Third Edition, contains simulation-based experiments to help students and professionals learn about key concepts in computer networking. The simulation approach provides a virtual environment for a wide range of desirable features, such as modeling a network based on specified criteria and analyzing its performance under different scenarios. The experiments include the basics of using OPNET IT Guru Academic Edition; operation of the Ethernet network; partitioning of a physical network into separate logical networks using virtual local area networks (V

  2. A logic for networks

    CERN Document Server

    Franceschet, Massimo

    2010-01-01

    Networks are pervasive in the real world. Nature, society, economy, and technology are supported by ostensibly different networks that in fact share an amazing number of interesting structural properties. Network thinking exploded in the last decade, boosted by the availability of large databases on the topology of various real networks, mainly the Web and biological networks, and converged to the new discipline of network analysis - the holistic analysis of complex systems through the study of the network that wires their components. Physicists mainly drove the investigation, studying the structure and function of networks using methods and tools of statistical mechanics. Here, we give an alternative perspective on network analysis, proposing a logic for specifying general properties of networks and a modular algorithm for checking these properties. The logic borrows from two intertwined computing fields: XML databases and model checking.

  3. Networks in Cell Biology

    Science.gov (United States)

    Buchanan, Mark; Caldarelli, Guido; De Los Rios, Paolo; Rao, Francesco; Vendruscolo, Michele

    2010-05-01

    Introduction; 1. Network views of the cell Paolo De Los Rios and Michele Vendruscolo; 2. Transcriptional regulatory networks Sarath Chandra Janga and M. Madan Babu; 3. Transcription factors and gene regulatory networks Matteo Brilli, Elissa Calistri and Pietro Lió; 4. Experimental methods for protein interaction identification Peter Uetz, Björn Titz, Seesandra V. Rajagopala and Gerard Cagney; 5. Modeling protein interaction networks Francesco Rao; 6. Dynamics and evolution of metabolic networks Daniel Segré; 7. Hierarchical modularity in biological networks: the case of metabolic networks Erzsébet Ravasz Regan; 8. Signalling networks Gian Paolo Rossini; Appendix 1. Complex networks: from local to global properties D. Garlaschelli and G. Caldarelli; Appendix 2. Modelling the local structure of networks D. Garlaschelli and G. Caldarelli; Appendix 3. Higher-order topological properties S. Ahnert, T. Fink and G. Caldarelli; Appendix 4. Elementary mathematical concepts A. Gabrielli and G. Caldarelli; References.

  4. Complex networks and computing

    Institute of Scientific and Technical Information of China (English)

    Shuigeng ZHOU; Zhongzhi ZHANG

    2009-01-01

    @@ Nowadays complex networks are pervasive in various areas of science and technology. Popular examples of complex networks include the Internet, social networks of collaboration, citations and co-authoring, as well as biological networks such as gene and protein interactions and others. Complex networks research spans across mathematics, computer science, engineering, biology and the social sciences. Even in computer science area, increasing problems are either found to be related to complex networks or studied from the perspective of complex networks, such as searching on Web and P2P networks, routing in sensor networks, language processing, software engineering etc. The interaction and mergence of complex networks and computing is inspiring new chances and challenges in computer science.

  5. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  6. Control of Multilayer Networks

    CERN Document Server

    Menichetti, Giulia; Bianconi, Ginestra

    2015-01-01

    The controllability of a network is a theoretical problem of relevance in a variety of contexts ranging from financial markets to the brain. Until now, network controllability has been characterized only on isolated networks, while the vast majority of complex systems are formed by multilayer networks. Here we build a theoretical framework for the linear controllability of multilayer networks by mapping the problem into a combinatorial matching problem. We found that correlating the external signals in the different layers can significantly reduce the multiplex network robustness to node removal, as it can be seen in conjunction with a hybrid phase transition occurring in interacting Poisson networks. Moreover we observe that multilayer networks can stabilize the fully controllable multiplex network configuration that can be stable also when the full controllability of the single network is not stable.

  7. Networks: An Economic Perspective

    CERN Document Server

    Jackson, Matthew O; Zenou, Yves

    2016-01-01

    We discuss social network analysis from the perspective of economics. We organize the presentaion around the theme of externalities: the effects that one's behavior has on others' well-being. Externalities underlie the interdependencies that make networks interesting. We discuss network formation, as well as interactions between peoples' behaviors within a given network, and the implications in a variety of settings. Finally, we highlight some empirical challenges inherent in the statistical analysis of network-based data.

  8. On bibliographic networks

    OpenAIRE

    Batagelj, Vladimir; Cerinšek, Monika

    2013-01-01

    In the paper we show that the bibliographic data can be transformed into a collection of compatible networks. Using network multiplication different interesting derived networks can be obtained. In defining them an appropriate normalization should be considered. The proposed approach can be applied also to other collections of compatible networks. We also discuss the question when the multiplication of sparse networks preserves sparseness. The proposed approaches are illustrated with analyses...

  9. Fundamentals of Stochastic Networks

    CERN Document Server

    Ibe, Oliver C

    2011-01-01

    An interdisciplinary approach to understanding queueing and graphical networks In today's era of interdisciplinary studies and research activities, network models are becoming increasingly important in various areas where they have not regularly been used. Combining techniques from stochastic processes and graph theory to analyze the behavior of networks, Fundamentals of Stochastic Networks provides an interdisciplinary approach by including practical applications of these stochastic networks in various fields of study, from engineering and operations management to communications and the physi

  10. Toward a network hospitality

    OpenAIRE

    Germann Molz, Jennie

    2014-01-01

    The growing popularity of online hospitality exchange networks like Couchsurfing and Airbnb point toward a new paradigm of sociality for a mobile and networked society as hospitable encounters among friends and strangers become entangled with social media and networking technologies. Inspired by Andreas Wittel’s notion of ‘network sociality’, this paper introduces the concept of ‘network hospitality’ to describe the kind of sociality that emerges around these new mobile, peer–to–peer, and onl...

  11. Generalized Network Externality Function

    OpenAIRE

    A. Paothong; G.S. Ladde

    2012-01-01

    In this work, we focus on the development of mathematical modeling of network externality processes. The introduction of the generalized network externality function provides a unified source of a tool for developing and analyzing the planning, policy and performance of the network externality process and network goods/services in a systematic way. This leads to fulfill all existing network externality assumptions as special cases. We study its properties and applications. This study provides...

  12. Stochastic Weighted Fractal Networks

    OpenAIRE

    Carletti, Timoteo

    2010-01-01

    In this paper we introduce new models of complex weighted networks sharing several properties with fractal sets: the deterministic non-homogeneous weighted fractal networks and the stochastic weighted fractal networks. Networks of both classes can be completely analytically characterized in terms of the involved parameters. The proposed algorithms improve and extend the framework of weighted fractal networks recently proposed in (T. Carletti & S. Righi, in press Physica A, 2010)

  13. Software Defined Networking and Virtualization for Broadband Satellite Networks

    OpenAIRE

    Bertaux, Lionel; Medjiah, Samir; Berthou, Pascal; Abdellatif, Slim; Hakiri, Akram; Gelard, Patrick; Planchou, Fabrice; De Bruyère, Marc

    2015-01-01

    Satellite networks have traditionally been considered for specific purposes. Recently, new satellite technologies have been pushed to the market enabling high-performance satellite access networks. On the other hand, network architectures are taking advantages from emerging technologies such as Software-Defined Networking (SDN), network virtualization and Network Functions Virtualization (NFV). Therefore, benefiting communications services over satellite networks from these new technologies a...

  14. Complex networks theory for analyzing metabolic networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Jing; YU Hong; LUO Jianhua; CAO Z.W.; LI Yixue

    2006-01-01

    One of the main tasks of post-genomic informatics is to systematically investigate all molecules and their interactions within a living cell so as to understand how these molecules and the interactions between them relate to the function of the organism,while networks are appropriate abstract description of all kinds of interactions. In the past few years, great achievement has been made in developing theory of complex networks for revealing the organizing principles that govern the formation and evolution of various complex biological, technological and social networks. This paper reviews the accomplishments in constructing genome-based metabolic networks and describes how the theory of complex networks is applied to analyze metabolic networks.

  15. Minimal Increase Network Coding for Dynamic Networks.

    Science.gov (United States)

    Zhang, Guoyin; Fan, Xu; Wu, Yanxia

    2016-01-01

    Because of the mobility, computing power and changeable topology of dynamic networks, it is difficult for random linear network coding (RLNC) in static networks to satisfy the requirements of dynamic networks. To alleviate this problem, a minimal increase network coding (MINC) algorithm is proposed. By identifying the nonzero elements of an encoding vector, it selects blocks to be encoded on the basis of relationship between the nonzero elements that the controls changes in the degrees of the blocks; then, the encoding time is shortened in a dynamic network. The results of simulations show that, compared with existing encoding algorithms, the MINC algorithm provides reduced computational complexity of encoding and an increased probability of delivery. PMID:26867211

  16. An Advocate Model for Intervention with Homosexuals

    Science.gov (United States)

    Berger, Raymond M.

    1977-01-01

    Homosexual behavior has received little attention from social workers. Starting with the premise that homosexuality is a legitimate variation of life-style, the author suggests a model for social work intervention with the homosexual. (Author)

  17. "PEERLESS ADVOCATE: DANA’S CHRONICLE"

    Directory of Open Access Journals (Sweden)

    Douglas Steeples

    2002-01-01

    Full Text Available In July, 1865, William Buck Dana began to publish the Commercial and Financial Chronicle, in New York City. The Chronicle took for its model The Economist of London. Dana’s recognition of the importance of the telegraph, steam-ships and railroads as new means of conveying accurate and current information for the conduct of domestic and global business were crucial in the rise of his paper to preeminence among American commercial publications. Constant efforts to optimize the use of capital, maximize operational efficiency, stay abreast of and employ technological advances, and add useful features enlarged its value and success. These qualities and Dana’s singular attunement to the temper of his times and his readers assured that the Chronicle's primacy would linger long after his death in 1910.

  18. Forensic perioperative nursing. Advocates for justice.

    Science.gov (United States)

    Carrigan, M; Collington, P; Tyndall, J

    2000-12-01

    Facts and evidence have been negated or lost by the inexperience of health care professionals who are not cognizant of the legal requirements concerning potential criminal cases. In the perioperative setting, policy and procedure should provide guidelines for potential criminal cases based on the key concepts and principles of forensic science. Potential forensic cases and traumatic injuries are not limited to major health care centres. All hospitals should have policies and procedures which outline: traumatic injuries/death, staff responsibilities, details of collecting evidence, documentation, chain of custody. The procedure should also include care of victims, suspected perpetrators as well as family/persons accompanying patient.

  19. Are fathers underused advocates for breastfeeding?

    LENUS (Irish Health Repository)

    Kenosi, M

    2011-11-01

    Fathers\\' knowledge base and attitudes influence breastfeeding practice. We aimed to evaluate if Irish fathers felt included in the breastfeeding education and decision process. 67 fathers completed questionnaires, which assessed their role in the decision to breastfeed, knowledge regarding the benefits of breastfeeding and attitude towards breastfeeding.Forty-two (62.7%) of their partners were breastfeeding. Antenatal classes were attended by 38 (56.7%); 59 (88.1%) discussed breastfeeding with their partners and 26 (38.8%) felt that the decision was made together. Twelve (48%) fathers of formula fed infants were unaware that breastfeeding was healthier for the baby. Most fathers (80.6%) felt that breastfeeding was the mother\\'s decision and most (82.1%) felt that antenatal information was aimed at mothers only. Irish fathers remain relatively uninformed regarding the benefits of breastfeeding. This may contribute to their exclusion from the decision to breastfeed. Antenatal education should incorporate fathers more, and this may result in an improvement in our breastfeeding rates.

  20. The Importance of Playing Devil's Advocate.

    Science.gov (United States)

    Schwenk, Charles; Cosier, Richard

    1990-01-01

    A "devil's advocacy" approach is proposed for the management of higher education conflict and ultimate improvement in the quality of decisions. Research supporting the value of active questioning of a preferred plan or strategy is summarized and its application is described. (DB)

  1. Christian Social Justice Advocate: Contradiction or Legacy?

    Science.gov (United States)

    Edwards, Cher N.

    2012-01-01

    In this article, the relationship between Christian religiosity and the principles of social justice is explored, including the sociopolitical aspects of faith and advocacy. A particular emphasis is placed on the historical legacy and theological relationships between Christianity and social justice. The author concludes with a call for…

  2. Round Table Meeting Advocates IPR Protection

    Institute of Scientific and Technical Information of China (English)

    Sun Yongjian

    2005-01-01

    @@ Intellectual Property Rights(IPR) pro tection is a universal issue in the cur rent age. On December 8, a round table meeting was jointly held by China Council for the Promotion of Interna tional Trade(CCPIT) and United States Council for International Business (USCIB),especially focused on the issue.Attendees including Wang Jinzhen, Chairman Assistant,CCPIT,Wang Zhiguang,Director of Ministry of Security,Peter Robinson, President and CEO of USCIB performed speeches in the meeting.

  3. Round Table Meeting Advocates IPR Protection

    Institute of Scientific and Technical Information of China (English)

    Sun; Yongjian

    2005-01-01

      Intellectual Property Rights(IPR) pro tection is a universal issue in the cur rent age. On December 8, a round table meeting was jointly held by China Council for the Promotion of Interna tional Trade(CCPIT) and United States Council for International Business (USCIB),especially focused on the issue.Attendees including Wang Jinzhen, Chairman Assistant,CCPIT,Wang Zhiguang,Director of Ministry of Security,Peter Robinson, President and CEO of USCIB performed speeches in the meeting.……

  4. Proceed with Caution: Advocating Joint Custody.

    Science.gov (United States)

    Hagen, Jan L.

    1987-01-01

    Joint custody, the newest child custody alternative following divorce, is intended to benefit and serve the best interests of children. Unintended consequences, however, have been relatively unexplored, which raises questions as to the viability of joint custody for all families, regardless of social class, race, or ethnicity. Until further…

  5. Stephen Jacobson, Catalonia’s advocates

    OpenAIRE

    Villacorta Baños, Francisco

    2011-01-01

    Durante mucho tiempo ha sido casi un tópico de la historiografía española subrayar la importancia del grupo socio-profesional de los abogados en la tarea de construcción del Estado liberal contemporáneo, al mismo tiempo que se lamentaba la carencia de un adecuado estudio monográfico que lo analizase de forma monográfica en su integralidad. Un trabajo como el que aquí tenemos entre las manos resulta en consecuencia bienvenido, aunque tenga su marco de análisis únicamente a Cataluña y en última...

  6. Chemical Compatibility and Safety of Imidacloprid/Flumethrin Collar (Seresto®) Concomitantly Used with Imidacloprid/Moxidectin (Advocate®, Advantage® Multi) and Emodepside/Praziquantel (Profender®) Spot-on Formulations.

    Science.gov (United States)

    Krüdewagen, Eva Maria; Remer, Carolin; Deuster, Katrin; Schunack, Bettina; Wolken, Sonja; Crafford, Dionne; Fourie, Josephus; Stanneck, Dorothee

    2015-08-01

    Safety of concomitant use of veterinary products is of clinical interest. A series of studies was performed to evaluate the chemical compatibility and short term dermal and systemic safety of an imidacloprid/flumethrin collar (Seresto(®)/ Foresto(®), Bayer) used concomitantly with spot-on or tablet formulations.Chemical compatibility was evaluated in-vitro (study reference A) on collar pieces, followed by two small, non-controlled clinical studies (study reference B) in both, cats and dogs. The studies showed, that certain solvents affected the collar in-vitro, but not in their marketed formulations.Dermal and systemic safety of different spot-on or tablet formulations was first evaluated in a small, non-controlled clinical study (study reference C) in cats and dogs, via clinical observations only, followed by controlled clinical safety studies of concomitant use with imidacloprid/ moxidectin (Advocate(®)/ Advantage(®) Multi, Bayer) in dogs and cats (study reference D) and emodepside/ praziquantel (Profender(®), Bayer) in cats (study reference E), assessing safety aspects by clinical observations and statistical analyses of hematology and clinical chemistry parameters compared to baseline values and between treated and control groups.Dermal safety findings over all clinical studies (study references B to E) matched those already described for the respective products and included transient cosmetic changes (oily hair and crystal formation) at the site of spot-on application and broken hair, transient alopecia and skin alterations at the site of collar application. There were no indications of these findings aggravating under the conditions of concurrent use. There were no systemic safety findings of clinical significance in any of the clinical safety studies (study reference C to E). Assessment of blood parameters revealed some deviations from baseline levels and from the reference range in dogs as well as in cats, but no clinical relevance could be deduced

  7. Chemical Compatibility and Safety of Imidacloprid/Flumethrin Collar (Seresto®) Concomitantly Used with Imidacloprid/Moxidectin (Advocate®, Advantage® Multi) and Emodepside/Praziquantel (Profender®) Spot-on Formulations.

    Science.gov (United States)

    Krüdewagen, Eva Maria; Remer, Carolin; Deuster, Katrin; Schunack, Bettina; Wolken, Sonja; Crafford, Dionne; Fourie, Josephus; Stanneck, Dorothee

    2015-08-01

    Safety of concomitant use of veterinary products is of clinical interest. A series of studies was performed to evaluate the chemical compatibility and short term dermal and systemic safety of an imidacloprid/flumethrin collar (Seresto(®)/ Foresto(®), Bayer) used concomitantly with spot-on or tablet formulations.Chemical compatibility was evaluated in-vitro (study reference A) on collar pieces, followed by two small, non-controlled clinical studies (study reference B) in both, cats and dogs. The studies showed, that certain solvents affected the collar in-vitro, but not in their marketed formulations.Dermal and systemic safety of different spot-on or tablet formulations was first evaluated in a small, non-controlled clinical study (study reference C) in cats and dogs, via clinical observations only, followed by controlled clinical safety studies of concomitant use with imidacloprid/ moxidectin (Advocate(®)/ Advantage(®) Multi, Bayer) in dogs and cats (study reference D) and emodepside/ praziquantel (Profender(®), Bayer) in cats (study reference E), assessing safety aspects by clinical observations and statistical analyses of hematology and clinical chemistry parameters compared to baseline values and between treated and control groups.Dermal safety findings over all clinical studies (study references B to E) matched those already described for the respective products and included transient cosmetic changes (oily hair and crystal formation) at the site of spot-on application and broken hair, transient alopecia and skin alterations at the site of collar application. There were no indications of these findings aggravating under the conditions of concurrent use. There were no systemic safety findings of clinical significance in any of the clinical safety studies (study reference C to E). Assessment of blood parameters revealed some deviations from baseline levels and from the reference range in dogs as well as in cats, but no clinical relevance could be deduced

  8. Wayfinding in Social Networks

    Science.gov (United States)

    Liben-Nowell, David

    With the recent explosion of popularity of commercial social-networking sites like Facebook and MySpace, the size of social networks that can be studied scientifically has passed from the scale traditionally studied by sociologists and anthropologists to the scale of networks more typically studied by computer scientists. In this chapter, I will highlight a recent line of computational research into the modeling and analysis of the small-world phenomenon - the observation that typical pairs of people in a social network are connected by very short chains of intermediate friends - and the ability of members of a large social network to collectively find efficient routes to reach individuals in the network. I will survey several recent mathematical models of social networks that account for these phenomena, with an emphasis on both the provable properties of these social-network models and the empirical validation of the models against real large-scale social-network data.

  9. Multiscale Network Generation

    CERN Document Server

    Gutfraind, Alexander; Safro, Ilya

    2012-01-01

    Networks are widely used in science and technology to represent relationships between entities, such as social or ecological links between organisms, enzymatic interactions in metabolic systems, or computer infrastructure. Statistical analyses of networks can provide critical insights into the structure, function, dynamics, and evolution of those systems. However, the structures of real-world networks are often not known completely, and they may exhibit considerable variation so that no single network is sufficiently representative of a system. In such situations, researchers may turn to proxy data from related systems, sophisticated methods for network inference, or synthetic networks. Here, we introduce a flexible method for synthesizing realistic ensembles of networks starting from a known network, through a series of mappings that coarsen and later refine the network structure by randomized editing. The method, MUSKETEER, preserves structural properties with minimal bias, including unknown or unspecified ...

  10. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  11. Emergent Complex Network Geometry

    CERN Document Server

    Wu, Zhihao; Rahmede, Christoph; Bianconi, Ginestra

    2014-01-01

    Networks are mathematical structures that are universally used to describe a large variety of complex systems such as the brain or the Internet. Characterizing the geometrical properties of these networks has become increasingly relevant for routing problems, inference and data mining. In real growing networks, topological, structural and geometrical properties emerge spontaneously from their dynamical rules. Nevertheless we still miss a model in which networks develop an emergent complex geometry. Here we show that a single two parameter network model, the growing geometrical network, can generate complex network geometries with non-trivial distribution of curvatures, combining exponential growth and small-world properties with finite spectral dimensionality. In one limit, the non-equilibrium dynamical rules of these networks can generate scale-free networks with clustering and communities, in another limit planar random geometries with non-trivial modularity. Finally we find that these properties of the geo...

  12. Morphological neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, G.X.; Sussner, P. [Univ. of Florida, Gainesville, FL (United States)

    1996-12-31

    The theory of artificial neural networks has been successfully applied to a wide variety of pattern recognition problems. In this theory, the first step in computing the next state of a neuron or in performing the next layer neural network computation involves the linear operation of multiplying neural values by their synaptic strengths and adding the results. Thresholding usually follows the linear operation in order to provide for nonlinearity of the network. In this paper we introduce a novel class of neural networks, called morphological neural networks, in which the operations of multiplication and addition are replaced by addition and maximum (or minimum), respectively. By taking the maximum (or minimum) of sums instead of the sum of products, morphological network computation is nonlinear before thresholding. As a consequence, the properties of morphological neural networks are drastically different than those of traditional neural network models. In this paper we consider some of these differences and provide some particular examples of morphological neural network.

  13. Weighted Multiplex Networks

    CERN Document Server

    Menichetti, Giulia; Panzarasa, Pietro; Mondragón, Raúl J; Bianconi, Ginestra

    2013-01-01

    One of the most important challenges in network science is to quantify the information encoded in complex network structures. Disentangling randomness from organizational principles is even more demanding when networks have a multiplex nature. Multiplex networks are multilayer systems of $N$ nodes that can be linked in multiple interacting and co-evolving layers. In these networks, relevant information might not be captured if the single layers were analyzed separately. Here we demonstrate that such partial analysis of layers fails to capture significant correlations between weights and topology of complex multiplex networks. To this end, we study two weighted multiplex co-authorship and citation networks involving the authors included in the American Physical Society. We show that in these networks weights are strongly correlated with multiplex structure, and provide empirical evidence in favor of the advantage of studying weighted measures of multiplex networks, such as multistrength and the inverse multipa...

  14. Strategic Network Disruption and Defense

    OpenAIRE

    K.J.M. De Jaegher; Hoyer, B

    2010-01-01

    Networks are one of the essential building blocks of society. Not only do firms cooperate in R&D networks, but firms themselves may be seen as networks of information-exchanging workers. Social movements increasingly make use of networks to exchange information, just as on the negative side criminal and terrorist networks use them. However, the literature on networks has mainly focused on the cooperative side of networks and has so far neglected the competition side of networks. Networks them...

  15. Networks design and management

    CERN Document Server

    Karris, Steven

    2009-01-01

    Networks are growing in size and complexity and this trend has created a rapid increase for networking engineers to provide practical and efficient solutions. Networking needs vary from one network to another; there is no such thing as ""one size fits all."" Also, a properly designed network must allow for expansion. The management of a small company may feel that this advanced technology is of no use to them since their monetary budget is limited. However, with proper planning, small companies can start with an affordable and versatile network and later expand on the next level of affordabili

  16. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  17. Defining Business Network

    Directory of Open Access Journals (Sweden)

    Raffaele Trequattrini

    2012-02-01

    Full Text Available The purpose of the present scientific contribution is to investigate from the businesseconomics standpoing the emerging phenomenon of company networks. In particular,through the analysis of the theory of networks will be proposed the principal categories ofbusiness networks, and even before this the concept of the network will be defined. Theproposed research, qualitatively, represents the point of departure for the study of thenetwork phenomenon in light of the current economic phase termed “economy of knowledge”.Moreover, the research questions are the following: From where does the theory of networksarise? Do company networks consider themselves equal to knowledge networks?

  18. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP......-based services and possibly becoming service providers themselves. This is already happening in the so-called "social networks" and peer-to-peer file sharing networks on the Internet - making this emerging topic one of the most active research areas in the wireless communications filed....

  19. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  20. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  1. Peak loads and network investments in sustainable energy transitions

    Energy Technology Data Exchange (ETDEWEB)

    Blokhuis, Erik, E-mail: e.g.j.blokhuis@tue.nl [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands); Brouwers, Bart [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands); Putten, Eric van der [Endinet, Gas and Electricity Network Operations, P.O. Box 2005, 5600CA Eindhoven (Netherlands); Schaefer, Wim [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands)

    2011-10-15

    Current energy distribution networks are often not equipped for facilitating expected sustainable transitions. Major concerns for future electricity networks are the possibility of peak load increases and the expected growth of decentralized energy generation. In this article, we focus on peak load increases; the effects of possible future developments on peak loads are studied, together with the consequences for the network. The city of Eindhoven (the Netherlands) is used as reference city, for which a scenario is developed in which the assumed future developments adversely influence the maximum peak loads on the network. In this scenario, the total electricity peak load in Eindhoven is expected to increase from 198 MVA in 2009 to 591-633 MVA in 2040. The necessary investments for facilitating the expected increased peak loads are estimated at 305-375 million Euros. Based upon these projections, it is advocated that - contrary to current Dutch policy - choices regarding sustainable transitions should be made from the viewpoint of integral energy systems, evaluating economic implications of changes to generation, grid development, and consumption. Recently applied and finished policies on energy demand reduction showed to be effective; however, additional and connecting policies on energy generation and distribution should be considered on short term. - Highlights: > Sustainable energy transitions can result in major electricity peak load increases. > Introduction of heat pumps and electrical vehicles requires network expansion. > Under worst case assumptions, peak loads in Eindhoven increase with 200% until 2040. > The necessary investment for facilitating this 2040 peak demand is Euro 305-375 million. > Future policy choices should be made from the viewpoint of the integral energy system.

  2. Peak loads and network investments in sustainable energy transitions

    International Nuclear Information System (INIS)

    Current energy distribution networks are often not equipped for facilitating expected sustainable transitions. Major concerns for future electricity networks are the possibility of peak load increases and the expected growth of decentralized energy generation. In this article, we focus on peak load increases; the effects of possible future developments on peak loads are studied, together with the consequences for the network. The city of Eindhoven (the Netherlands) is used as reference city, for which a scenario is developed in which the assumed future developments adversely influence the maximum peak loads on the network. In this scenario, the total electricity peak load in Eindhoven is expected to increase from 198 MVA in 2009 to 591-633 MVA in 2040. The necessary investments for facilitating the expected increased peak loads are estimated at 305-375 million Euros. Based upon these projections, it is advocated that - contrary to current Dutch policy - choices regarding sustainable transitions should be made from the viewpoint of integral energy systems, evaluating economic implications of changes to generation, grid development, and consumption. Recently applied and finished policies on energy demand reduction showed to be effective; however, additional and connecting policies on energy generation and distribution should be considered on short term. - Highlights: → Sustainable energy transitions can result in major electricity peak load increases. → Introduction of heat pumps and electrical vehicles requires network expansion. → Under worst case assumptions, peak loads in Eindhoven increase with 200% until 2040. → The necessary investment for facilitating this 2040 peak demand is Euro 305-375 million. → Future policy choices should be made from the viewpoint of the integral energy system.

  3. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...... epidemic failure resolution is proposed. The results provide important input to service recovery mechanisms under epidemic failures....

  4. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...... and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs...

  5. Networks and Networking - A Statistical Physics Perspective

    CERN Document Server

    Yeung, Chi Ho

    2013-01-01

    Efficient networking in communication systems, both wired and wireless, has a substantial economic and societal impact. While communication networks become increasingly more complex, the ever increasing demand for higher transmission volume, quality of service, robustness and reduced energy consumption require new tools and methods to meet these conflicting pressures. The new methodology should serve for gaining better understanding of the properties of these networks at the macroscopic level, as well as for the development of new principled optimization and management algorithms at the microscopic level. Methods of statistical physics seem the best place to start the search for new approaches as they have been developed specifically to deal with non-linear large scale systems. This review aims at presenting an overview of tools that have been developed within the statistical physics community and that can be readily applied to address the emerging problems in networking. As network properties are at the hear...

  6. Interdisciplinary Approach to the Mental Lexicon: Neural Network and Text Extraction From Long-term Memory

    Directory of Open Access Journals (Sweden)

    Vardan G. Arutyunyan

    2013-01-01

    Full Text Available The paper touches upon the principles of mental lexicon organization in the light of recent research in psycho- and neurolinguistics. As a focal point of discussion two main approaches to mental lexicon functioning are considered: modular or dual-system approach, developed within generativism and opposite single-system approach, representatives of which are the connectionists and supporters of network models. The paper is an endeavor towards advocating the viewpoint that mental lexicon is complex psychological organization based upon specific composition of neural network. In this regard, the paper further elaborates on the matter of storing text in human mental space and introduces a model of text extraction from long-term memory. Based upon data available, the author develops a methodology of modeling structures of knowledge representation in the systems of artificial intelligence.

  7. Directed network modules

    CERN Document Server

    Pálla, G; Farkas, I J; Pollner, P; Vicsek, T; Derenyi, Imre; Farkas, Illes J.; Palla, Gergely; Pollner, Peter; Vicsek, Tamas

    2007-01-01

    A search technique locating network modules, i.e., internally densely connected groups of nodes in directed networks is introduced by extending the Clique Percolation Method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own webpages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and among Google's webpages the overlaps are likely to contain in-hubs, whereas the modules in the email and t...

  8. Cooperative Hurricane Network Obs

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations from the Cooperative Hurricane Reporting Network (CHURN), a special network of stations that provided observations when tropical cyclones approached...

  9. Intelligent metro network

    Science.gov (United States)

    Luo, Zhongsheng; Kan, Yulun; Wang, Licun

    2001-10-01

    Metro networks have evolved dynamically since its position in the network infrastructure. To gain competitive advantage in this attractive market, carriers should emphasize not only just the power of their networks in terms of the speed, number of channels, distance covered, but also the network's versatility in supporting variety of access interfaces, flexibility in bandwidth provisioning, ability of differentiated service offering, and capability of network management. Based on an overview of four emerging metro network technologies, an intelligent metro network control platform is introduced. The intelligent control platform is necessary for carriers to meet the new metro requirements. Intelligent control and management functions of the platform are proposed respectively. Intelligent metro network will bridge the metro gap and open up a whole new set of services and applications.

  10. Concurrency and network disassortativity.

    Science.gov (United States)

    Khor, Susan

    2010-01-01

    The relationship between a network's degree-degree correlation and a loose version of graph coloring is studied on networks with broad degree distributions. We find that, given similar conditions on the number of nodes, number of links, and clustering levels, fewer colors are needed to color disassortative than assortative networks. Since fewer colors create fewer independent sets, our finding implies that disassortative networks may have higher concurrency potential than assortative networks. This in turn suggests another reason for the disassortative mixing pattern observed in biological networks such as those of protein-protein interaction and gene regulation. In addition to the functional specificity and stability suggested by Maslov and Sneppen, a disassortative network topology may also enhance the ability of cells to perform crucial tasks concurrently. Hence, increased concurrency may also be a driving force in the evolution of biological networks. PMID:20586579

  11. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various......Multilayer networks, in particular multilayer social networks, where users belong to and interact on different networks at the same time, are an active research area in social network analysis, computer science, and physics. These networks have traditionally been studied within these separate...... research communities, leading to the development of several independent models and methods to deal with the same set of problems. This book unifies and consolidates existing practical and theoretical knowledge on multilayer networks including data collection and analysis, modeling, and mining of multilayer...

  12. Time and Citation Networks

    CERN Document Server

    Clough, James R

    2015-01-01

    Citation networks emerge from a number of different social systems, such as academia (from published papers), business (through patents) and law (through legal judgements). A citation represents a transfer of information, and so studying the structure of the citation network will help us understand how knowledge is passed on. What distinguishes citation networks from other networks is time; documents can only cite older documents. We propose that existing network measures do not take account of the strong constraint imposed by time. We will illustrate our approach with two types of causally aware analysis. We apply our methods to the citation networks formed by academic papers on the arXiv, to US patents and to US Supreme Court judgements. We show that our tools can reveal that citation networks which appear to have very similar structure by standard network measures turn out to have significantly different properties. We interpret our results as indicating that many papers in a bibliography were not directly...

  13. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.;

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  14. Energy Sciences Network (ESnet)

    Data.gov (United States)

    Federal Laboratory Consortium — The Energy Sciences Network is the Department of Energy’s high-speed network that provides the high-bandwidth, reliable connections that link scientists at national...

  15. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  16. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...... are presented as well as possible privacy concerns are identified and discussed. In order to address the arising privacy issues, a new concept called diverged personalities is introduced. This concept is based on presentation of different personalities of the user in different circumstances....

  17. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  18. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  19. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network......The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  20. Class network routing

    Science.gov (United States)

    Bhanot, Gyan; Blumrich, Matthias A.; Chen, Dong; Coteus, Paul W.; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Steinmacher-Burow, Burkhard D.; Takken, Todd E.; Vranas, Pavlos M.

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  1. Bladder Cancer Advocacy Network

    Science.gov (United States)

    ... future bladder cancer research through the Patient Survey Network. Read More... The JPB Foundation 2016 Bladder Cancer ... 2016 Young Investigator Awardees The Bladder Cancer Advocacy Network (BCAN) has announced the recipients of the 2016 ...

  2. National Lymphedema Network

    Science.gov (United States)

    ... and article archives // Knowledge and support National Lymphedema Network News Stay up to date with NLN activities and goings-on. Follow the National Lymphedema Network newsfeed below. Also, see the following links for ...

  3. Routed planar networks

    Directory of Open Access Journals (Sweden)

    David J. Aldous

    2016-04-01

    Full Text Available Modeling a road network as a planar graph seems very natural. However, in studying continuum limits of such networks it is useful to take {\\em routes} rather than {\\em edges} as primitives. This article is intended to introduce the relevant (discrete setting notion of {\\em routed network} to graph theorists. We give a naive classification of all 71 topologically different such networks on 4 leaves, and pose a variety of challenging research questions.

  4. Information Horizons in Networks

    OpenAIRE

    Trusina, A.; Rosvall, M.; K. Sneppen

    2004-01-01

    We investigate and quantify the interplay between topology and ability to send specific signals in complex networks. We find that in a majority of investigated real-world networks the ability to communicate is favored by the network topology on small distances, but disfavored at larger distances. We further discuss how the ability to locate specific nodes can be improved if information associated to the overall traffic in the network is available.

  5. Survivable Virtual Network Embedding

    OpenAIRE

    Rahman, Muntasir Raihan; Aib, Issam; Boutaba, Raouf

    2010-01-01

    International audience Network virtualization can offer more flexibility and better manageability for the future Internet by allowing multiple heterogeneous virtual networks (VN) to coexist on a shared infrastructure provider (InP) network. A major challenge in this respect is the VN embedding problem that deals with the efficient mapping of virtual resources on InP network resources. Previous research focused on heuristic algorithms for the VN embedding problem assuming that the InP netwo...

  6. Econometrics Network Information Society

    Directory of Open Access Journals (Sweden)

    Aleksandr Bogomolov

    2014-04-01

    Full Text Available The paper proposes to overcome the shortcomings of classical econometrics , noted economists and practitioners, scientists , using the capabilities of modern computer and information technology, network approach to the description of models and methodology agent - based modeling . The authors propose to introduce the concept of a network and the network of natural economic agent , the latter is a random event , the probability of which can be determined based on Bayesian belief networks .

  7. Local network assessment

    Science.gov (United States)

    Glen, D. V.

    1985-04-01

    Local networks, related standards activities of the Institute of Electrical and Electronics Engineers the American National Standards Institute and other elements are presented. These elements include: (1) technology choices such as topology, transmission media, and access protocols; (2) descriptions of standards for the 802 local area networks (LAN's); high speed local networks (HSLN's) and military specification local networks; and (3) intra- and internetworking using bridges and gateways with protocols Interconnection (OSI) reference model. The convergence of LAN/PBX technology is also described.

  8. Multimedia communications and networking

    CERN Document Server

    da Silva, Mario Marques

    2012-01-01

    The result of decades of research and international project experience, Multimedia Communications and Networking provides authoritative insight into recent developments in multimedia, digital communications, and networking services and technologies. Supplying you with the required foundation in these areas, it illustrates the means that will allow for improved digital communications and networks. The book starts with a review of the fundamental concepts, requirements, and constraints in networks and telecommunications. It describes channel disturbances that can hinder system performance--inclu

  9. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  10. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2006-01-01

    This book provides a broad introduction to all aspects of modern telecommunications networks, covering the principles of operation of the technology and the way that networks using this technology are structured. The main focus is on those technologies in use today in the majority of the public telecommunications networks. Discussion of new technology, in particular the move to the so-called next generation networks (NGN) is also included.

  11. A Network Synthesis Model for Generating Protein Interaction Network Families

    OpenAIRE

    Sayed Mohammad Ebrahim Sahraeian; Byung-Jun Yoon

    2012-01-01

    In this work, we introduce a novel network synthesis model that can generate families of evolutionarily related synthetic protein-protein interaction (PPI) networks. Given an ancestral network, the proposed model generates the network family according to a hypothetical phylogenetic tree, where the descendant networks are obtained through duplication and divergence of their ancestors, followed by network growth using network evolution models. We demonstrate that this network synthesis model ca...

  12. On Random Linear Network Coding for Butterfly Network

    OpenAIRE

    Guang, Xuan; Fu, Fang-Wei

    2010-01-01

    Random linear network coding is a feasible encoding tool for network coding, specially for the non-coherent network, and its performance is important in theory and application. In this letter, we study the performance of random linear network coding for the well-known butterfly network by analyzing the failure probabilities. We determine the failure probabilities of random linear network coding for the well-known butterfly network and the butterfly network with channel failure probability p.

  13. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  14. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  15. Network Descriptions and NEC

    NARCIS (Netherlands)

    Keus, H.E.; Ham, J.J. van der; Daal, M. van; Laat, C. de

    2008-01-01

    The network is one of the most important components of NEC. In order to achieve high levels of agility and flexibility it is important that all users and providers have a good overview of the capabilities and possibilities of the network. Historically network applications have used their own discove

  16. Networks and Economic Behavior

    OpenAIRE

    Jackson, Matthew O.

    2009-01-01

    Recent analyses of social networks, both empirical and theoretical, are discussed, with a focus on how social networks influence economic behavior, as well as how social networks form. Some challenges of such research are discussed as are some of the important considerations for the future.

  17. Spatially embedded random networks

    Science.gov (United States)

    Barnett, L.; di Paolo, E.; Bullock, S.

    2007-11-01

    Many real-world networks analyzed in modern network theory have a natural spatial element; e.g., the Internet, social networks, neural networks, etc. Yet, aside from a comparatively small number of somewhat specialized and domain-specific studies, the spatial element is mostly ignored and, in particular, its relation to network structure disregarded. In this paper we introduce a model framework to analyze the mediation of network structure by spatial embedding; specifically, we model connectivity as dependent on the distance between network nodes. Our spatially embedded random networks construction is not primarily intended as an accurate model of any specific class of real-world networks, but rather to gain intuition for the effects of spatial embedding on network structure; nevertheless we are able to demonstrate, in a quite general setting, some constraints of spatial embedding on connectivity such as the effects of spatial symmetry, conditions for scale free degree distributions and the existence of small-world spatial networks. We also derive some standard structural statistics for spatially embedded networks and illustrate the application of our model framework with concrete examples.

  18. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Jimenez, Tamara;

    2013-01-01

    The use of cognition is a promising element for the control of heterogeneous optical networks. Not only are cognitive networks able to sense current network conditions and act according to them, but they also take into account the knowledge acquired through past experiences; that is, they include...

  19. Electronic Networking. ERIC Digest.

    Science.gov (United States)

    Tucker, Susan

    This digest discusses several aspects of electronic networking, including network functions, implementation, and applications in education. Electronic networking is defined as including the four basic services of electronic mail (E-mail), electronic "bulletin boards," teleconferencing, and online databases, and an overview of these four functions…

  20. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  1. Networking Brown University.

    Science.gov (United States)

    Beckham, Bonnie

    1989-01-01

    Assesses BRUNET, a campuswide network that links more than 100 academic and administrative buildings and 40 dormitories. Notes a key element is hierarchical network management and support. Discusses the deployment, security, and use of four networking spheres in the system. (MVL)

  2. Equilibrium games in networks

    Science.gov (United States)

    Li, Angsheng; Zhang, Xiaohui; Pan, Yicheng; Peng, Pan

    2014-12-01

    It seems a universal phenomenon of networks that the attacks on a small number of nodes by an adversary player Alice may generate a global cascading failure of the networks. It has been shown (Li et al., 2013) that classic scale-free networks (Barabási and Albert, 1999, Barabási, 2009) are insecure against attacks of as small as O(logn) many nodes. This poses a natural and fundamental question: Can we introduce a second player Bob to prevent Alice from global cascading failure of the networks? We proposed a game in networks. We say that a network has an equilibrium game if the second player Bob has a strategy to balance the cascading influence of attacks by the adversary player Alice. It was shown that networks of the preferential attachment model (Barabási and Albert, 1999) fail to have equilibrium games, that random graphs of the Erdös-Rényi model (Erdös and Rényi, 1959, Erdös and Rényi, 1960) have, for which randomness is the mechanism, and that homophyly networks (Li et al., 2013) have equilibrium games, for which homophyly and preferential attachment are the underlying mechanisms. We found that some real networks have equilibrium games, but most real networks fail to have. We anticipate that our results lead to an interesting new direction of network theory, that is, equilibrium games in networks.

  3. Actor-Network Procedures

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Ramanujam, R.; Ramaswamy, Srini

    2012-01-01

    In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks, as an extension o

  4. Metallic nanowire networks

    Science.gov (United States)

    Song, Yujiang; Shelnutt, John A.

    2012-11-06

    A metallic nanowire network synthesized using chemical reduction of a metal ion source by a reducing agent in the presence of a soft template comprising a tubular inverse micellar network. The network of interconnected polycrystalline nanowires has a very high surface-area/volume ratio, which makes it highly suitable for use in catalytic applications.

  5. Global Networks of Expertise

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    2013-01-01

    One significant and often overlooked outcome of technical assistance and overseas capacity development programs is the inclusion of experts from the South in overseas networks. Today more than half a million people from current and former developing countries in Asia, Africa, Latin America...... to global networks of expertise through alumni network structures created in the 1960s....

  6. Spanish Museum Libraries Network.

    Science.gov (United States)

    Lopez de Prado, Rosario

    This paper describes the creation of an automated network of museum libraries in Spain. The only way in which the specialized libraries in the world today can continue to be active and to offer valid information is to automate the service they offer, and create network libraries with cooperative plans. The network can be configured with different…

  7. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  8. Complexity of Public Transport Networks

    Institute of Scientific and Technical Information of China (English)

    LU Huapu; SHI Ye

    2007-01-01

    The theory of complex networks was used to classify public transport networks into public transportation route networks, public transportation transfer networks, and bus station networks. The practical significance of the network parameters was then analyzed. The public transport networks in Langfang, Jining, and Dalian were then chosen as specific research cases. The results show that the public transportation networks have the characteristics of complex networks. In addition, the urban transportation network parameters all significantly affect the accessibility, convenience, and terrorist security capability of the urban public transportation network. The results link the findings with the actual situations to explore means to solve transportation system problems.

  9. Flow networks analysis and optimization of repairable flow networks, networks with disturbed flows, static flow networks and reliability networks

    CERN Document Server

    Todinov, Michael T

    2013-01-01

    Repairable flow networks are a new area of research, which analyzes the repair and flow disruption caused by failures of components in static flow networks. This book addresses a gap in current network research by developing the theory, algorithms and applications related to repairable flow networks and networks with disturbed flows. The theoretical results presented in the book lay the foundations of a new generation of ultra-fast algorithms for optimizing the flow in networks after failures or congestion, and the high computational speed creates the powerful possibility of optimal control

  10. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  11. Logistical networking: a global storage network

    International Nuclear Information System (INIS)

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it

  12. Introduction to communication networks

    CERN Document Server

    Anttalainen, Tarmo

    2014-01-01

    This new book is an introduction to modern communications networks that now rely far less on telephone services and more on cellular and IP networks. The resource is designed to provide answers to the fundamental questions concerning telecommunications networks and services. This includes the structure and main components of a modern telecommunications network; the importance of standardization; and how cellular mobile networks operate; among many others. In addition, you are provided with problems and review questions to work though and help you master the material.

  13. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  14. Networks in cognitive science.

    Science.gov (United States)

    Baronchelli, Andrea; Ferrer-i-Cancho, Ramon; Pastor-Satorras, Romualdo; Chater, Nick; Christiansen, Morten H

    2013-07-01

    Networks of interconnected nodes have long played a key role in Cognitive Science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions, and collaborations among scientists. Today, the inclusion of network theory into Cognitive Sciences, and the expansion of complex-systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the Cognitive Sciences.

  15. Designing sorting networks

    CERN Document Server

    Baddar, Sherenaz W Al-Haj

    2012-01-01

    Designing Sorting Networks: A New Paradigm provides an in-depth guide to maximizing the efficiency of sorting networks, and uses 0/1 cases, partially ordered sets and Haase diagrams to closely analyze their behavior in an easy, intuitive manner. This book also outlines new ideas and techniques for designing faster sorting networks using Sortnet, and illustrates how these techniques were used to design faster 12-key and 18-key sorting networks through a series of case studies. Finally, it examines and explains the mysterious behavior exhibited by the fastest-known 9-step 16-key network. Designi

  16. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  17. Networks in Cognitive Science

    CERN Document Server

    Baronchelli, Andrea; Pastor-Satorras, Romualdo; Chater, Nick; Christiansen, Morten H

    2013-01-01

    Networks of interconnected nodes have long played a key role in cognitive science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions or collaborations among scientists. Today, the inclusion of network theory into cognitive sciences, and the expansion of complex systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the cognitive sciences.

  18. Network Characterization Service (NCS)

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yang, George [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Crowley, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-06-06

    Distributed applications require information to effectively utilize the network. Some of the information they require is the current and maximum bandwidth, current and minimum latency, bottlenecks, burst frequency, and congestion extent. This type of information allows applications to determine parameters like optimal TCP buffer size. In this paper, we present a cooperative information-gathering tool called the network characterization service (NCS). NCS runs in user space and is used to acquire network information. Its protocol is designed for scalable and distributed deployment, similar to DNS. Its algorithms provide efficient, speedy and accurate detection of bottlenecks, especially dynamic bottlenecks. On current and future networks, dynamic bottlenecks do and will affect network performance dramatically.

  19. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  20. Architecture of Network Systems

    CERN Document Server

    Serpanos, Dimitrios

    2011-01-01

    Network systems require technical skills in computer architecture, design methodologies, algorithm design, and networking. Architecture of Network Systems explains the practice and methodologies that will allow you to solve a broad range of problems in system design, including problems related to security, quality of service, performance, manageability, and more. Leading researchers Dimitrios Serpanos and Tilman Wolf develop architectures for all network sub-systems, bridging the gap between operation and VLSI. Discussing the major challenges in the design of networks and the architectures tha

  1. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  2. Groundwater data network interoperability

    Science.gov (United States)

    Brodaric, Boyan; Booth, Nathaniel; Boisvert, Eric; Lucido, Jessica M.

    2016-01-01

    Water data networks are increasingly being integrated to answer complex scientific questions that often span large geographical areas and cross political borders. Data heterogeneity is a major obstacle that impedes interoperability within and between such networks. It is resolved here for groundwater data at five levels of interoperability, within a Spatial Data Infrastructure architecture. The result is a pair of distinct national groundwater data networks for the United States and Canada, and a combined data network in which they are interoperable. This combined data network enables, for the first time, transparent public access to harmonized groundwater data from both sides of the shared international border.

  3. Learning conditional Gaussian networks

    DEFF Research Database (Denmark)

    Bøttcher, Susanne Gammelgaard

    This paper considers conditional Gaussian networks. The parameters in the network are learned by using conjugate Bayesian analysis. As conjugate local priors, we apply the Dirichlet distribution for discrete variables and the Gaussian-inverse gamma distribution for continuous variables, given...... a configuration of the discrete parents. We assume parameter independence and complete data. Further, to learn the structure of the network, the network score is deduced. We then develop a local master prior procedure, for deriving parameter priors in these networks. This procedure satisfies parameter...

  4. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    When it comes to discussing the future of electronic communication, social networking is the buzzword. The Internet has become a platform where new social networks emerge and the Internet it itself support the more traditional computer supported communication. The way users build and verifies...... different online networks for communities of people who share interests or individuals who presents themselves through user produced content is what makes up the social networking of today. The purpose of this paper is to discuss perceived user requirements to the next generation social networks. The paper...

  5. Violence Concealment and Expropriation:the Power Structure of Force -advocating Focus Sway in Chinese Martial Arts%暴力的遮蔽和征用:中国武术尚力重心摇摆的权力架构

    Institute of Scientific and Technical Information of China (English)

    王仕虎; 刘连发

    2014-01-01

    采用文献资料和逻辑分析等研究方法对中国武术尚力重心摇摆的历史变迁现象和权力架构进行研究,主要研究内容涉及武术中的尚力向度的发生学考察、尚武或抑武的风向标摇摆以及中国武术尚力重心摇摆的权力架构。研究认为:历史变迁中,中国武术尚力重心摇摆存在暴力遮蔽或解蔽的二律背反现象;科层制权力,儒、释、道的文化权利,国家权力和身体感性权力共同形塑了武术尚力摇摆的架构;儒、释、道的文化弱化了武术尚力元素,国家权力和科层制出于工具理性对武术暴力实现了褒贬、管控和征用。%In this paper ,documents ,logical analysis and other research methods were used to study the historical evolution phenome-non and power structure for force-advocating focus sway in Chinese martial arts .The main research contents involve study of em-bryology of force-advocating dimension in martial arts ,sway of barometer for martialism -advocating or martialism -despising and power structure for force-advocating focus sway in Chinese martial arts .We hold that in the historical evolution ,there existed the phenomenon of antinomy of violence concealment and revelation in force -advocating focus sway in Chinese martial arts .The bureau-cratic power ,the cultural rights of Confucianism ,Buddhism and Taoism and body sensual power together form the structure or force-advocating sway in martial arts .The culture of Confucianism ,Buddhism and Taoism has weakened the force-advocating elements of martial arts ,the state power and bureaucracy achieved judgment ,control and expropriation of violence of martial arts for instru-mental rationality .

  6. Cheaters in mutualism networks.

    Science.gov (United States)

    Genini, Julieta; Morellato, L Patrícia C; Guimarães, Paulo R; Olesen, Jens M

    2010-08-23

    Mutualism-network studies assume that all interacting species are mutualistic partners and consider that all links are of one kind. However, the influence of different types of links, such as cheating links, on network organization remains unexplored. We studied two flower-visitation networks (Malpighiaceae and Bignoniaceae and their flower visitors), and divide the types of link into cheaters (i.e. robbers and thieves of flower rewards) and effective pollinators. We investigated if there were topological differences among networks with and without cheaters, especially with respect to nestedness and modularity. The Malpighiaceae network was nested, but not modular, and it was dominated by pollinators and had much fewer cheater species than Bignoniaceae network (28% versus 75%). The Bignoniaceae network was mainly a plant-cheater network, being modular because of the presence of pollen robbers and showing no nestedness. In the Malpighiaceae network, removal of cheaters had no major consequences for topology. In contrast, removal of cheaters broke down the modularity of the Bignoniaceae network. As cheaters are ubiquitous in all mutualisms, the results presented here show that they have a strong impact upon network topology.

  7. Network Security Scanner

    Directory of Open Access Journals (Sweden)

    G. Murali

    2011-11-01

    Full Text Available Network Security Scanner (NSS is a tool that allows auditing and monitoring remote network computers for possible vulnerabilities, checks your network for all potential methods that a hacker might use to attack it. Network Security Scanner is a complete networking utilities package that includes a wide range of tools for network security auditing, vulnerability Auditing, scanning, monitoring and more. Network Security Scanner (NSS is an easy to use, intuitive network security scanner that can quickly scan and audit your network computers for vulnerabilities, exploits, and information enumerations. Vulnerability management is an on-going process that protects your valuable data and it is a key component of an effective information security strategy, which provides comprehensive, preemptive protection against threats to your enterprise security. N.S.S is built on an architecture that allows for high reliability and scalability that caters for both medium and large sized networks. NSS consists of six modules. They are Host Scanning, Port Scanning, Pinging, NSLookup, Vulnerability Auditing and Trace route. NSS also performs live host detection, operating system identification, SNMP Auditing. Finds rouge services and open TCP and UDP ports. The ability varies to perform scanning over the network identifying the live hosts and guess the operating system of the remote hosts and installed programs into the remote hosts. Apart identifying the live hosts we could map the ports and list the services which are running in the host.

  8. From Personality Advocation to Repressed Anger Some Opinion on Zhou Zuoren's View of Literary History%从个性的提倡到压抑的愤懑——周作人文学史观管窥

    Institute of Scientific and Technical Information of China (English)

    王军

    2012-01-01

    中国文化,在周作人看来,是无性的文化,缺乏情趣的文化,是于生命成长、生机勃勃上,即个性发育上欠缺的文化。他输入歌咏儿童的文学,提倡“梦想的精神”,主张适当地禁欲,并指出婚姻生活中“爱是移动的”,需夫妻双方不断地创造。就一个人的教育而言,他非常重视性的知识,于当时的复古颇盛的文化风气中坚持自己的个性。到了20世纪30年代,周作人开始了由个性的提倡到压抑的愤懑时期。他所面临的是中国资本主义高度发展的时代,感慨于除却忍从屈服,生活总是为家族制度、阶级制度、资本制度、知识买卖制度而牺牲。在这一时期,周作人的文学史观、文学观也逐渐地完善,指出中国历史上晋文里开始增加了小品文的色彩,初现具有个性色彩的文学。%According to Zhou Zuoren, Chinese culture is asexual culture and lacking in taste and is a person- ality development of defective culture on the vibrant life and growth. He imported literature of singing children, promoted the spirit of the dream and advocated appropriate abstinence, pointing out love is moving in the marriage and both spouses need to create endlessly. He thought highly of sex knowledge in terms of personal education, sticking to his own personality in the culture trend of the prevalent antiquity. To the thirties, Zhou Zuoren changed from the period of personality advocating to repressed anger. He is facing an era of prosperous Chinese capitalism, sighing that except for tolerance and yielding life is always sacrificed for the domestic institution, the caste system, the capital system and the knowledge trading sys- tem. During this period, Zhou Zuoren's literary historical theory, literary concept is gradually improved and pointed out that essays have appeared in the history of China Jin-wen, which is the beginning of litera- ture with personalized colors.

  9. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  10. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  11. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    this latitudinal diversity gradient scales up to entities as complex as networks is unknown.We investigated this using a dataset of 54 community-wide pollination networks and hypothesized that pollination networks would display a latitudinal and altitudinal species richness gradient, increasing...... specialization towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated...... strongly with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with...

  12. Synchronization of networks

    Indian Academy of Sciences (India)

    R E Amritkar

    2008-08-01

    We study the synchronization of coupled dynamical systems on networks. The dynamics is governed by a local nonlinear oscillator for each node of the network and interactions connecting different nodes via the links of the network. We consider existence and stability conditions for both single- and multi-cluster synchronization. For networks with time-varying topology we compare the synchronization properties of these networks with the corresponding time-average network. We find that if the different coupling matrices corresponding to the time-varying networks commute with each other then the stability of the synchronized state for both the time-varying and the time-average topologies are approximately the same. On the other hand, for non-commuting coupling matrices the stability of the synchronized state for the time-varying topology is in general better than the time-average topology.

  13. Enhancing the network synchronizability

    Institute of Scientific and Technical Information of China (English)

    ZHAO Ming; ZHOU Tao; CHEN Guan-rong; WANG Bing-hong

    2007-01-01

    The structural and dynamical properties, partic-ularly the small-world effect and scale-free feature, of com-plex networks have attracted tremendous interest and atten-tion in recent years. This article offers a brief review of one focal issue concerning the structural and dynamical behav-iors of complex network synchronization. In the presenta-tion, the notions of synchronization of dynamical systems on networks, stability of dynamical networks, and relationships between network structure and synchronizability, will be first introduced. Then, various technical methods for enhancing the network synchronizability will be discussed, which are roughly divided into two classes: Structural Modification and Coupling-Pattern Regulation, where the former includes three typical methods-dividing hub nodes, shortening average dis-tances, and deleting overload edges, while the latter mainly is a method of strengthening the hub-nodes' influence on the network.

  14. Networks in ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2016-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  15. Complex Aperture Networks

    CERN Document Server

    Owladeghaffari, Hamed

    2009-01-01

    A complex network approach on a rough fracture is developed. In this manner, some hidden metric spaces (similarity measurements) between apertures profiles are set up and a general evolutionary network in two directions (in parallel and perpendicular to the shear direction) is constructed. Evaluation of the emerged network shows the connectivity degree (distribution) of network, after a transition step; fall in to the stable states which are coincided with the Gaussian distribution. Based on this event and real observations of the complex network changes, an algorithm (COmplex Networks on Apertures: CONA) is proposed in which evolving of a network is accomplished using preferential detachments and attachments of edges (based on a competition and game manner) while the number of nodes is fixed. Also, evolving of clustering coefficients and number of edges display similar patterns as well as are appeared in shear stress, hydraulic conductivity and dilation changes, which can be engaged to estimate shear strengt...

  16. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  17. Seeking Truth and Advocating Humanism: the Mien of Scholars --On Travel Notes of Mo You-zhi%求实尚理 学人风采——莫友芝山水游记简论

    Institute of Scientific and Technical Information of China (English)

    李朝阳

    2012-01-01

    Travel notes of Mo Youzhi are the product of prosperity of Pu School (the theory of simple and plain learning) in the Qing Dynasty and also the product of his learning from the early generations. Apart from describing beautiful mountains and rivers to create beauty of mood by integrating feeling with scene, they also comment and elaborate philosophy of life, introduce knowledge and advocate textual research. His travel notes integrate features of travel notes in various styles of the early generations and make a perfect fusion of "philosophical connotations", " textual research" and " poetry and prose" They represent the unity of feeling, scenery, event and reason.%莫友芝的山水游记是清代朴学兴盛的产物,也是莫友芝多方面学习前代游记遗产的产物。它不仅有“诗人游记”细致客观地模山范水、创造情景交融的意境美的特色,还有“哲人游记”好发议论、阐述人生哲理的因子,更有“学人游记”以知识学问为游记、不厌其烦地在游记中大兴考证的作风,以至于他的游记融合了前代各种类型游记的特长,达到了“义理”、“考据”、“辞章”的交融,情、景、事、理的舍一。

  18. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  19. From global agenda-setting to domestic implementation: successes and challenges of the global health network on tobacco control.

    Science.gov (United States)

    Gneiting, Uwe

    2016-04-01

    Global policy attention to tobacco control has increased significantly since the 1990 s and culminated in the first international treaty negotiated under the auspices of the World Health Organization--the Framework Convention on Tobacco Control (FCTC). Although the political process that led to the creation of the FCTC has been extensively researched, the FCTC's progression from an aspirational treaty towards a global health governance framework with tangible policy effects within FCTC member countries has not been well-understood to date. This article analyses the role of the global health network of tobacco control advocates and scientists, which formed during the FCTC negotiations during the late 1990 s, in translating countries' commitment to the FCTC into domestic policy change. By comparing the network's influence around two central tobacco control interventions (smoke-free environments and taxation), the study identifies several scope conditions, which have shaped the network's effectiveness around the FCTC's implementation: the complexity of the policy issue and the relative importance of non-health expertise, the required scope of domestic political buy-in, the role of the general public as network allies, and the strength of policy opposition. These political factors had a greater influence on the network's success than the evidence base for the effectiveness of tobacco control interventions. The network's variable success points to a trade-off faced by global health networks between their need to maintain internal cohesion and their ability to form alliances with actors in their social environment. PMID:26253698

  20. Network planning under uncertainties

    Science.gov (United States)

    Ho, Kwok Shing; Cheung, Kwok Wai

    2008-11-01

    One of the main focuses for network planning is on the optimization of network resources required to build a network under certain traffic demand projection. Traditionally, the inputs to this type of network planning problems are treated as deterministic. In reality, the varying traffic requirements and fluctuations in network resources can cause uncertainties in the decision models. The failure to include the uncertainties in the network design process can severely affect the feasibility and economics of the network. Therefore, it is essential to find a solution that can be insensitive to the uncertain conditions during the network planning process. As early as in the 1960's, a network planning problem with varying traffic requirements over time had been studied. Up to now, this kind of network planning problems is still being active researched, especially for the VPN network design. Another kind of network planning problems under uncertainties that has been studied actively in the past decade addresses the fluctuations in network resources. One such hotly pursued research topic is survivable network planning. It considers the design of a network under uncertainties brought by the fluctuations in topology to meet the requirement that the network remains intact up to a certain number of faults occurring anywhere in the network. Recently, the authors proposed a new planning methodology called Generalized Survivable Network that tackles the network design problem under both varying traffic requirements and fluctuations of topology. Although all the above network planning problems handle various kinds of uncertainties, it is hard to find a generic framework under more general uncertainty conditions that allows a more systematic way to solve the problems. With a unified framework, the seemingly diverse models and algorithms can be intimately related and possibly more insights and improvements can be brought out for solving the problem. This motivates us to seek a

  1. Security in network environment-network protocols

    OpenAIRE

    Fessl, Jaromír

    2011-01-01

    Work is focused on network protocols features and security characteristics. Overview of protocols is made through all layers of OSI model and by this design structured. For each layer is made summary of interesting facts. Separate chapter is dedicated for VPN and for implementation possibilities of VPN. In chapter Practical problems are reflected most important problems of actual security (from network protocol point of view) concerned on SSL/TLS, SMTP and DNS. Together with security charact...

  2. SCANDEX: Service Centric Networking for Challenged Decentralised Networks

    OpenAIRE

    Sathiaseelan, Arjuna; Wang, Liang; Aucinas, Andrius; Tyson, Gareth; Crowcroft, Jon

    2015-01-01

    Do-It-Yourself (DIY) networks are decentralised networks built by an (often) amateur community. As DIY networks do not rely on the need for backhaul Internet connectivity, these networks are mostly a mix of both offline and online networks. Although DIY networks have their own home- grown services, the current Internet-based cloud services are often useful, and access to some services could be beneficial to the community. Considering that most DIY networks have challenged Internet connectivit...

  3. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    OpenAIRE

    Santosh Kumar Chaudhari; Murthy, Hema A.

    2011-01-01

    A Network Management System (NMS) plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to ...

  4. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  5. A network security monitor

    Energy Technology Data Exchange (ETDEWEB)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  6. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity in the net...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof.......Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...

  7. Toward Sustainable Networking: Storage Area Networks with Network Coding

    CERN Document Server

    Ferner, Ulric J; Soljanin, Emina

    2012-01-01

    This manuscript provides a model to characterize the energy savings of network coded storage (NCS) in storage area networks (SANs). We consider blocking probability of drives as our measure of performance. A mapping technique to analyze SANs as independent M/G/K/K queues is presented, and blocking probabilities for uncoded storage schemes and NCS are derived and compared. We show that coding operates differently than the amalgamation of file chunks and energy savings are shown to scale well with striping number. We illustrate that for enterprise-level SANs energy savings of 20-50% can be realized.

  8. Recursive quantum repeater networks

    CERN Document Server

    Van Meter, Rodney; Horsman, Clare

    2011-01-01

    Internet-scale quantum repeater networks will be heterogeneous in physical technology, repeater functionality, and management. The classical control necessary to use the network will therefore face similar issues as Internet data transmission. Many scalability and management problems that arose during the development of the Internet might have been solved in a more uniform fashion, improving flexibility and reducing redundant engineering effort. Quantum repeater network development is currently at the stage where we risk similar duplication when separate systems are combined. We propose a unifying framework that can be used with all existing repeater designs. We introduce the notion of a Quantum Recursive Network Architecture, developed from the emerging classical concept of 'recursive networks', extending recursive mechanisms from a focus on data forwarding to a more general distributed computing request framework. Recursion abstracts independent transit networks as single relay nodes, unifies software layer...

  9. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  10. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-09-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  11. Diffusion Adaptation over Networks

    CERN Document Server

    Sayed, Ali H

    2012-01-01

    Adaptive networks are well-suited to perform decentralized information processing and optimization tasks and to model various types of self organized and complex behavior encountered in nature. Adaptive networks consist of a collection of agents with processing and learning abilities. The agents are linked together through a connection topology, and they cooperate with each other through local interactions to solve distributed inference problems in real-time. The continuous diffusion of information across the network enables agents to adapt their performance in relation to changing data and network conditions; it also results in improved adaptation and learning performance relative to non-cooperative networks. This article provides an overview of diffusion strategies for adaptation and learning over networks. The article is divided into several sections: 1. Motivation; 2. Mean-Square-Error Estimation; 3. Distributed Optimization via Diffusion Strategies; 4. Adaptive Diffusion Strategies; 5. Performance of Ste...

  12. A quantum access network

    CERN Document Server

    Fröhlich, Bernd; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-01-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at the network node can be shared between up to 64 users, thereby significantly reducing the hardware requirements for each user added to the network. This shared receiver architecture removes one of the main obstacles restricting the widespread application...

  13. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed...... by identifying the gaps in the reviewed literature. The paper is based on three case studies undertaken in Danish manufacturing companies to explore in detail their manufacturing plants and networks. The cases provide a sound basis for developing the research questions and explaining the interaction between...... different manufacturing plants in the network and their impact on network transformation. Findings – The paper highlights the dominant role of manufacturing plants in the continuously changing shape of a manufacturing network. The paper demonstrates that a product or process change at one manufacturing...

  14. Reconfigureable network node

    Science.gov (United States)

    Vanderveen, Keith B.; Talbot, Edward B.; Mayer, Laurence E.

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  15. Seven Deadliest Network Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Prowell, Stacy J [ORNL; Borkin, Michael [None; Kraus, Robert [Solutionary, Inc.

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  16. Social cognitive radio networks

    CERN Document Server

    Chen, Xu

    2015-01-01

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  17. Brief encounter networks

    CERN Document Server

    Kostakos, Vassilis; Penn, Alan

    2007-01-01

    Many complex human and natural phenomena can usefully be represented as networks describing the relationships between individuals. While these relationships are typically intermittent, previous research has used network representations that aggregate the relationships at discrete intervals. However, such an aggregation discards important temporal information, thus inhibiting our understanding of the networks dynamic behaviour and evolution. We have recorded patterns of human urban encounter using Bluetooth technology thus retaining the temporal properties of this network. Here we show how this temporal information influences the structural properties of the network. We show that the temporal properties of human urban encounter are scale-free, leading to an overwhelming proportion of brief encounters between individuals. While previous research has shown preferential attachment to result in scale-free connectivity in aggregated network data, we found that scale-free connectivity results from the temporal prope...

  18. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    Management literature’s many descriptions of the current and future challenges and new trends within organisation and management forms depict a motley and kaleidoscopic picture of the future. However, one idea reoccurs throughout most of the literature – the organisational network. Some are even...... bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... to isolate some of the forthcoming changes and outlines a map for network management. We will try to avoid summarising the increasingly extensive literature about organisations which are characterised by networks and restrict our focus to management in inter-organisational networks. Inter-organisational...

  19. Spreading processes in Multilayer Networks

    OpenAIRE

    Salehi, Mostafa; Sharma, Rajesh; Marzolla, Moreno; Magnani, Matteo; Siyari, Payam; Montesi, Danilo

    2014-01-01

    Several systems can be modeled as sets of interconnected networks or networks with multiple types of connections, here generally called multilayer networks. Spreading processes such as information propagation among users of an online social networks, or the diffusion of pathogens among individuals through their contact network, are fundamental phenomena occurring in these networks. However, while information diffusion in single networks has received considerable attention from various discipl...

  20. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  1. Chaotic diagonal recurrent neural network

    Institute of Scientific and Technical Information of China (English)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos,and its structure andlearning algorithm are designed.The multilayer feedforward neural network,diagonal recurrent neural network,and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map.The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks.

  2. R&D Networks

    OpenAIRE

    Sanjeev Goyal; Jose Luis Moraga

    2000-01-01

    We develop a model of strategic networks that captures two distinctive features of interfirm collaboration: bilateral agreements and nonexclusive relationships. Our analysis highlights the relationship between market competition, firms' incentives to invest in R&D, and the architecture of collaboration networks. In the absence of firm rivalry, the complete network, where each firm collaborates with all others, is uniquely stable, industry-profit maximizing, and efficient. By contrast, under s...

  3. Entropy in Social Networks

    OpenAIRE

    Pfaltz, John L.

    2012-01-01

    We introduce the concepts of closed sets and closure operators as mathematical tools for the study of social networks. Dynamic networks are represented by transformations. It is shown that under continuous change/transformation, all networks tend to "break down" and become less complex. It is a kind of entropy. The product of this theoretical decomposition is an abundance of triadically closed clusters which sociologists have observed in practice. This gives credence to the relevance of this ...

  4. Learning in Network Games

    OpenAIRE

    Kovarik, Jaromir; Mengel, Friederike; Romero, José Gabriel

    2012-01-01

    We report the findings of an experiment designed to study how people learn and make decisions in network games. Network games offer new opportunities to identify learning rules, since on networks (compared to e.g. random matching) more rules differ in terms of their information requirements. Our experimental design enables us to observe both which actions participants choose and which information they consult before making their choices. We use this information to estimate learning type...

  5. Persistence in corporate networks

    OpenAIRE

    Milaković, Mishael; Raddant, Matthias; Birg, Laura

    2014-01-01

    We examine the bipartite graphs of German corporate boards in 1993, 1999 and 2005, and identify cores of directors who are highly central in the entire network while being densely connected among themselves. The novel feature of this paper is the focus on the dynamics of these networks. Germany's corporate governance has experienced significant changes during this time, and there is substantial turnover in the identity of core members, yet we observe the persistent presence of a network core,...

  6. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  7. Evolution of Social networks

    OpenAIRE

    Hellmann, Tim; Staudigl, Mathias

    2012-01-01

    Modeling the evolution of networks is central to our understanding of modern large communication systems, such as theWorld-Wide-Web, as well as economic and social networks. The research on social and economic networks is truly interdisciplinary and the number of modeling strategies and concepts is enormous. In this survey we present some modeling approaches, covering classical random graph models and game-theoretic models, which may be used to provide a unified framework to model and analyze...

  8. Software Defined Networking

    OpenAIRE

    Roncero Hervás, Óscar

    2014-01-01

    Software Defined Networks (SDN) is a paradigm in which routing decisions are taken by a control layer. In contrast to conventional network structures, the control plane and forwarding plane are separated and communicate through standard protocols like OpenFlow. Historically, network management was based on a layered approach, each one isolated from the others. SDN proposes a radically different approach by bringing together the management of all these layers into a single controller. It is th...

  9. SDN : Software defined networks

    OpenAIRE

    Wiklund, Petter

    2014-01-01

    This report is a specialization in Software defined networking. SDN really comes to revolutionize the industry and it’s under constant development. But is the technology ready to be launched into operation yet? The report would initially involve a number of problems that today's network technology is facing. It then follows a deeper description of what this software-based networking technology really is and how it works. Further, the technique is being tested in a lab assignment, using a prog...

  10. Editorial: "Network Robot Systems"

    OpenAIRE

    Sanfeliu, Alberto; Hagita, Norihiro; Saffiotti, Alessandro

    2008-01-01

    Network Robot Systems (NRS) is a new concept that integrates physical autonomous robots, environments sensors and human–robot interaction through network-based cooperation. The history of NRS is very new, starting in 2004 as Networked Robots, robots that work interconnected by Internet or by tele-operation, and then expanded to robots that share information of their own embedded sensors and the environment sensors, to do tasks with other robots and with human beings. NRS is not an integration...

  11. Bibliographic utility networks

    OpenAIRE

    Das, Anup Kumar; Dutta, Bidyarthi

    2005-01-01

    This article describes the functions, features, and advantages of bibliographic utility networks. Some cases have also described in order to get in-depth knowledge on their core services. The services of a bibliographic utility network are centred on online union catalogue database. Some bibliographic utility networks derived a number of services from their exhaustive union catalogue database to be used by different segments of clienteles. The services are not only contributory from participa...

  12. Networks in cognitive science

    OpenAIRE

    Andrea Baronchelli; Ramon Ferrer-i-Cancho; Romualdo Pastor-Satorras; Nick Chater; Christiansen, Morten H.

    2013-01-01

    Networks of interconnected nodes have long played a key role in Cognitive Science, from artificial neural net- works to spreading activation models of semantic mem- ory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions, and collaborations among scientists. Today, the inclusion of network theory into Cognitive Sciences, and the expansion of complex- s...

  13. Personal Network (PN) Applications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Skouby, K.

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  14. Personal network (PN) applications

    DEFF Research Database (Denmark)

    Prasad, R.; Skouby, Knud Erik

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  15. ON MOBILE MESH NETWORKS

    OpenAIRE

    Namiot, Dmitry

    2015-01-01

    With the advances in mobile computing technologies and the growth of the Net, mobile mesh networks are going through a set of important evolutionary steps. In this paper, we survey architectural aspects of mobile mesh networks and their use cases and deployment models. Also, we survey challenging areas of mobile mesh networks and describe our vision of promising mobile services. This paper presents a basic introductory material for Masters of Open Information Technologies Lab, interested in m...

  16. Affinity driven social networks

    Science.gov (United States)

    Ruyú, B.; Kuperman, M. N.

    2007-04-01

    In this work we present a model for evolving networks, where the driven force is related to the social affinity between individuals of a population. In the model, a set of individuals initially arranged on a regular ordered network and thus linked with their closest neighbors are allowed to rearrange their connections according to a dynamics closely related to that of the stable marriage problem. We show that the behavior of some topological properties of the resulting networks follows a non trivial pattern.

  17. Global Networks of Expertise

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    to global networks of expertise through alumni network structures created in the 1960s. One significant and often overlooked outcome of technical assistance and overseas capacity development programs is the inclusion of experts from the south. The paper shows how the Japanese bilateral programs adapted...... the multilateral framework initiated in the 1950s to make networks of expertise global by enabling South-South and South-North connections....

  18. Marketing in Social Networks

    OpenAIRE

    Hlavatá, Jana

    2012-01-01

    The purpose of theoretical part of my bachelor thesis is to give readers an introduction in internet marketing, social media and social networks, to explain main differences between these terms, to describe social networks and their various forms in more detail and to explain Facebook and Twitter marketing. The purpose of practical part of my bachelor thesis is to show techniques and right strategies how to succeed in social networks and which steps to take to achieve that success. I will exp...

  19. The Hyper-Kautz Network: A New Scalable Product Network

    OpenAIRE

    Wenhong Wei; Wenjun Xiao; Yong Qin

    2009-01-01

    In this paper, we propose a new product network using a Cartesian product of hypercube and Kautz network, named as hyper-Kautz network. The proposed network possesses the properties of both hypercube and the Kautz network including logarithmic diameter, optimal connectivity, and simple routing algorithms.

  20. Relations Between Wavelet Network and Feedforward Neural Network

    Institute of Scientific and Technical Information of China (English)

    刘志刚; 何正友; 钱清泉

    2002-01-01

    A comparison of construction forms and base functions is made between feedforward neural network and wavelet network. The relations between them are studied from the constructions of wavelet functions or dilation functions in wavelet network by different activation functions in feedforward neural network. It is concluded that some wavelet function is equal to the linear combination of several neurons in feedforward neural network.

  1. Networked Instrumentation Element

    Data.gov (United States)

    National Aeronautics and Space Administration — Armstrong researchers have developed a networked instrumentation system that connects modern experimental payloads to existing analog and digital communications...

  2. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  3. Heterogeneous Economic Networks

    CERN Document Server

    Souma, W; Aoyama, H; Souma, Wataru; Fujiwara, Yoshi; Aoyama, Hideaki

    2005-01-01

    The Japanese shareholding network at the end of March 2002 is studied. To understand the characteristics of this network intuitively, we visualize it as a directed graph and an adjacency matrix. Especially detailed features of networks concerned with the automobile industry sector are discussed by using the visualized networks. The shareholding network is also considered as an undirected graph, because many quantities characterizing networks are defined for undirected cases. For this undirected shareholding network, we show that a degree distribution is well fitted by a power law function with an exponential tail. The exponent in the power law range is gamma=1.8. We also show that the spectrum of this network follows asymptotically the power law distribution with the exponent delta=2.6. By comparison with gamma and delta, we find a scaling relation delta=2gamma-1. The reason why this relation holds is attributed to the local tree-like structure of networks. To clarify this structure, the correlation between d...

  4. Sonet Network Design Problems

    CERN Document Server

    Pelleau, Marie; Truchet, Charlotte

    2009-01-01

    This paper presents a new method and a constraint-based objective function to solve two problems related to the design of optical telecommunication networks, namely the Synchronous Optical Network Ring Assignment Problem (SRAP) and the Intra-ring Synchronous Optical Network Design Problem (IDP). These network topology problems can be represented as a graph partitioning with capacity constraints as shown in previous works. We present here a new objective function and a new local search algorithm to solve these problems. Experiments conducted in Comet allow us to compare our method to previous ones and show that we obtain better results.

  5. Introduction to neural networks

    International Nuclear Information System (INIS)

    This lecture is a presentation of today's research in neural computation. Neural computation is inspired by knowledge from neuro-science. It draws its methods in large degree from statistical physics and its potential applications lie mainly in computer science and engineering. Neural networks models are algorithms for cognitive tasks, such as learning and optimization, which are based on concepts derived from research into the nature of the brain. The lecture first gives an historical presentation of neural networks development and interest in performing complex tasks. Then, an exhaustive overview of data management and networks computation methods is given: the supervised learning and the associative memory problem, the capacity of networks, the Perceptron networks, the functional link networks, the Madaline (Multiple Adalines) networks, the back-propagation networks, the reduced coulomb energy (RCE) networks, the unsupervised learning and the competitive learning and vector quantization. An example of application in high energy physics is given with the trigger systems and track recognition system (track parametrization, event selection and particle identification) developed for the CPLEAR experiment detectors from the LEAR at CERN. (J.S.). 56 refs., 20 figs., 1 tab., 1 appendix

  6. Heterogeneous broadband network

    Science.gov (United States)

    Dittmann, Lars

    1995-11-01

    Although the vision for the future Integrated Broadband Communication Network (IBCN) is an all optical network, it is certain that for a long period to come, the network will remain very heterogeneous, with a mixture of different physical media (fiber, coax and twisted pair), transmission systems (PDH, SDH, ADSL) and transport protocols (TCP/IP, AAL/ATM, frame relay). In the current work towards the IBCN, the ATM concept is considered the generic network protocol for both public and private network, with the ability to use different underlying transmission protocols and, through adaptation protocols, provide the appropriate services (old as well as new) to the customer. One of the major difficulties of heterogeneous network is the restriction that is usually given by the lowest common denominator, e.g. in terms of single channel capacity. A possible way to overcome these limitations is by extending the ATM concept with a multilink capability, that allows us to use separate resources as one common. The improved flexibility obtained by this protocol extension further allows a real time optimization of network and call configuration, without any impact on the quality of service seen from the user. This paper describes an example of an ATM based multilink protocol that has been experimentally implemented within the RACE project 'STRATOSPHERIC'. The paper outlines the complexity of introducing an extra network functionality compared with the added value, such as an improved ability to recover an error due to a malfunctioning network component.

  7. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  8. Directed network modules

    International Nuclear Information System (INIS)

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs

  9. Network Monitoring with Nagios

    CERN Document Server

    Dondich, Taylor

    2006-01-01

    Network monitoring can be a complex task to implement and maintain in your IT infrastructure. Nagios, an open-source host, service and network monitoring program can help you streamline your network monitoring tasks and reduce the cost of operation.With this shortcut guide, we'll go over how Nagios fits in the overall network monitoring puzzle. We'll also cover installation and basic usage. Finally, we'll show you how to extend Nagios with other tools to extend functionality.

  10. Operational Research and Networks

    CERN Document Server

    Finke, Gerd

    2008-01-01

    This book presents the principal concepts of operations research (OR) as tools for the planning, support, and management of various types of networks, including both physical and logical networks. It analyzes real problems, and offers a collection of models for many application areas, together with the corresponding solution techniques. Following this, important application areas are addressed, such as project scheduling, distribution networks, telecommunication networks, and planning of satellite imaging. Anyone involved in the theory or practice in this field will find this a vital resource.

  11. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  12. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  13. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  14. A quantum computer network

    CERN Document Server

    Kesidis, George

    2009-01-01

    Wong's diffusion network is a stochastic, zero-input Hopfield network with a Gibbs stationary distribution over a bounded, connected continuum. Previously, logarithmic thermal annealing was demonstrated for the diffusion network and digital versions of it were studied and applied to imaging. Recently, "quantum" annealed Markov chains have garnered significant attention because of their improved performance over "pure" thermal annealing. In this note, a joint quantum and thermal version of Wong's diffusion network is described and its convergence properties are studied. Different choices for "auxiliary" functions are discussed, including those of the kinetic type previously associated with quantum annealing.

  15. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  16. Linear Network Fractional Routing

    Directory of Open Access Journals (Sweden)

    S.ASOKAN,

    2011-07-01

    Full Text Available A Network is a finite directed acyclic graph with source messages from a fixed alphabet and message demands at sink nodes. Linear Programming is an algorithm design method. It can be used whenthe solution to a problem can be viewed as the result of a sequence of decisions. The Linear Programming model for the network problem where in every variable has a value one or zero. The problem is todetermine a method of transmitting the messages through the network such that all sink demands are satisfied. We will prove fractional routing capacity for some solvable network using Linear Programmingmodel.

  17. Controllability of Real Networks

    CERN Document Server

    Cowan, Noah J; Vilhena, Daril A; Bergstrom, Carl T

    2011-01-01

    Liu \\emph{et al.}\\ have forged new links between control theory and network dynamics by focusing on the structural controllability of networks [Lui et al., Nature:473(7346), 167-173, 2011]. Two main results in the paper are that (1) the number of driver nodes, $N_D$, necessary to control a network is determined by the network's degree distribution and (2) $N_D$ tends to represent a substantial fraction of the nodes in inhomogeneous networks such as the real-world examples considered therein. These conclusions hinge on a critical modeling assumption: the dynamical system at each node in the network is degenerate in the sense that it has an infinite time constant, implying that its value neither grows nor decays absent influence from inbound connections. However, the real networks considered in the paper---including food webs, power grids, electronic circuits, metabolic networks, and neuronal networks---manifest dynamics at each node that have finite time constants. Here we apply Liu \\emph{et al.}'s theoretical...

  18. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  19. In memoriam: Janis Huston Audin, MSc, DVM, 1950-2009. Dynamic editor-in-chief of the Journal of the American Veterinary Medical Association and strong One Health advocate dies.

    Science.gov (United States)

    Kaplan, Bruce

    2009-01-01

    Dr Janis H. Audin (MSc Illinois 1975, DVM Illinois 1979), a champion of progressive veterinary medical journalism and 'One Health' died on 22 April 2009 following a long, courageous and difficult battle with pancreatic cancer. The world has lost a truly significant One Health leader and advocate. Under her guidance, the Journal of the American Veterinary Medical Association (JAVMA) implemented a 'one-health wonders' column that recognised and highlighted prominent One Health individuals among the medical and veterinary medical professions in the United States. The American Veterinary Medical Association (AVMA) has lost a dedicated and gifted editor-in-chief. Dr Audin joined the editorial staff of the AVMA in 1985, as an assistant editor and was promoted to associate editor in 1989 and editor in 1994. She became the editor-in-chief of both the JAVMA and the American Journal of Veterinary Research in 1995. Prior to that, Dr Audin practised as an associate veterinarian in Calumet City, Illinois, for four years. During her tenure, Dr Audin was noted for implementing procedural and technological changes in the journal to reduce costs, improve timeliness of publications and promote readership interest and awareness. New features in the News section introduced under her leadership have made the journals more practical and public health-relevant. For instance, Dr Audin fostered the United States Department of Agriculture's Food Safety and Inspection Service (USDA-FSIS) 'Inspection Insights' - a public health-oriented food safety monthly column related to meat, poultry and egg products - from 1996 through 1998. She also increased international manuscript submissions. On 23 March 2009 AVMA Executive Vice President Dr W. Ron DeHaven named Dr Audin as editor-in-chief emeritus of the Publications Division. Wisely, it also meant that Dr Audin could continue contributing to the staff effort to ensure the high quality of the AVMA scientific journals while the Association began a

  20. MOSAIC (MOthers' Advocates In the Community: protocol and sample description of a cluster randomised trial of mentor mother support to reduce intimate partner violence among pregnant or recent mothers

    Directory of Open Access Journals (Sweden)

    Taft Angela J

    2009-05-01

    Full Text Available Abstract Background Intimate partner violence (IPV is prevalent globally, experienced by a significant minority of women in the early childbearing years and is harmful to the mental and physical health of women and children. There are very few studies with rigorous designs which have tested the effectiveness of IPV interventions to improve the health and wellbeing of abused women. Evidence for the separate benefit to victims of social support, advocacy and non-professional mentoring suggested that a combined model may reduce the levels of violence, the associated mental health damage and may increase a woman's health, safety and connection with her children. This paper describes the development, design and implementation of a trial of mentor mother support set in primary care, including baseline characteristics of participating women. Methods/Design MOSAIC (MOtherS' Advocates In the Community was a cluster randomised trial embedded in general practice and maternal and child health (MCH nursing services in disadvantaged suburbs of Melbourne, Australia. Women who were pregnant or with infants, identified as abused or symptomatic of abuse, were referred by IPV-trained GPs and MCH nurses from 24 general practices and eight nurse teams from January 2006 to December 2007. Women in the intervention arm received up to 12 months support from trained and supported non-professional mentor mothers. Vietnamese health professionals also referred Vietnamese women to bilingual mentors in a sub-study. Baseline and follow-up surveys at 12 months measured IPV (CAS, depression (EPDS, general health (SF-36, social support (MOS-SF and attachment to children (PSI-SF. Significant development and piloting occurred prior to trial commencement. Implementation interviews with MCH nurses, GPs and mentors assisted further refinement of the intervention. In-depth interviews with participants and mentors, and follow-up surveys of MCH nurses and GPs at trial conclusion will

  1. 崇尚科学、追求真理:大学教授的学术使命%Advocating Science and Pursuing the Truth:Academic Mission of University Professors

    Institute of Scientific and Technical Information of China (English)

    张意忠

    2012-01-01

    崇尚科学、追求真理是大学教授的神圣使命,它需要教授敬畏学术、培养独立人格。学术是有尊严的,只有敬畏学术,才能培养独立人格,摆脱权力与金钱的桎梏;需要以学术为业,追求卓越。教授对学术应具有内在的期盼,执着追求,痴心不改;需要开展学术批评,提高学术水平。科学发展的无限性与人类智力的有限性需要通过学术批评发现错误,接近真理;需要遵守学术道德,承担学术责任。道德是学术的根基与标杆,是教授学术职业的道德底线,不可逾越。%Advocating science and pursuing the truth is the sacred mission of university professors.Professors should awe the academic and cultivate independent personality,because the academic has the dignity.Only awing the academic,can professors cultivate independent personality,and get rid of the shackles of power and money;professors should take the academic as their own occupation,and pursue the excellence.Professors should have inherent academic expectations,persistent pursuit and unchanged infatuation;professors should carry out academic criticism,and improve academic standards.People find the error,close to the truth by academic critics because of the infinite of the scientific development and the finite of human intelligence;professors should abide by academic moral,and undertake academic responsibility.Ethics is the foundation and benchmarking of the academic,is the moral bottom line of professors' academic career,and is insurmountable.

  2. WE SHOULD ADVOCATE THE NATURAL-ORIENTED PRINCIPLE IN THE SOCIAL SUSTAINABLE DEVELOPMENT%社会可持续发展应倡导“以自然为本”

    Institute of Scientific and Technical Information of China (English)

    曹诗图; 王衍用

    2011-01-01

    The paper puts forward the theoretical proposition of Nature-orientation from the perspective of natural philosophy and analyzes the dialectical relation between Nature-orientation and Human-orientation. The paper further holds that the two concepts are both opposite and complementary to each other, and complementary interaction. The Nature-orientation is the basis and premise of the Human-orientation. Under certain conditions, these two principles shall both be insisted but not biased, in order to mutually form the necessary pulling force in the promotion of resource exploitation and social development. Therefore, during the activities concerning the relationship between human and society, we should advocate the Human-oriented principle, while in the relationship between human and natural activities, especially in terms of social sustainable development, we should adhere to the Nature-orientation principle.%从自然哲学的视角提出“以自然为本”的理论命题,对“以自然为本”的理念进行哲学思辨,对“以人为本”观点的局限进行理论反思,论述了“以自然为本”与“以人为本”的辩证关系。认为“以自然为本”与“以人为本”这两种观点相反相成,二者是一种互补互动的辩证关系。“以自然为本”是“以人为本”的基础和前提,在特定的条件下,这两种原则都应坚持,不能偏颇,二者共同形成正确促进资源开发与社会发展的必要张力。在涉及人与社会关系的活动中,理应倡导“以人为本”;在涉及人与自然关系的活动中特别是社会可持续发展问题上,还是倡导“以自然为本”为好。

  3. Forman curvature for directed networks

    CERN Document Server

    Sreejith, R P; Saucan, Emil; Samal, Areejit

    2016-01-01

    A goal in network science is the geometrical characterization of complex networks. In this direction, we have recently introduced the Forman's discretization of Ricci curvature to the realm of undirected networks. Investigation of Forman curvature in diverse model and real-world undirected networks revealed that this measure captures several aspects of the organization of complex undirected networks. However, many important real-world networks are inherently directed in nature, and the Forman curvature for undirected networks is unsuitable for analysis of such directed networks. Hence, we here extend the Forman curvature for undirected networks to the case of directed networks. The simple mathematical formula for the Forman curvature in directed networks elegantly incorporates node weights, edge weights and edge direction. By applying the Forman curvature for directed networks to a variety of model and real-world directed networks, we show that the measure can be used to characterize the structure of complex ...

  4. Resilient networking in wireless sensor networks

    CERN Document Server

    Erdene-Ochir, Ochirkhand; Valois, Fabrice; Kountouris, Apostolos

    2010-01-01

    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focu...

  5. Local Area Networks: Part II.

    Science.gov (United States)

    Dessy, Raymond E., Ed.

    1982-01-01

    Discusses five approaches used by industry/colleges to provide local area network (LAN) capabilities in the analytical laboratory: (1) mixed baseband bus network coupled to a star net; (2) broadband bus network; (3) ring network; (4) star network coupled to broadband net; and (5) simple multiprocessor center. Part I (September issue) focused on…

  6. The Benefits of Grid Networks

    Science.gov (United States)

    Tennant, Roy

    2005-01-01

    In the article, the author talks about the benefits of grid networks. In speaking of grid networks the author is referring to both networks of computers and networks of humans connected together in a grid topology. Examples are provided of how grid networks are beneficial today and the ways in which they have been used.

  7. On network coding for acyclic networks with delays

    CERN Document Server

    Prasad, K

    2011-01-01

    Problems related to network coding for acyclic, instantaneous networks (where the edges of the acyclic graph representing the network are assumed to have zero-delay) have been extensively dealt with in the recent past. The most prominent of these problems include (a) the existence of network codes that achieve maximum rate of transmission, (b) efficient network code constructions, and (c) field size issues. In practice, however, networks have transmission delays. In network coding theory, such networks with transmission delays are generally abstracted by assuming that their edges have integer delays. Note that using enough memory at the nodes of an acyclic network with integer delays can effectively simulate instantaneous behavior, which is probably why only acyclic instantaneous networks have been primarily focused on thus far. In this work, we elaborate on issues ((a), (b) and (c) above) related to network coding for acyclic networks with integer delays, which have till now been overlooked. We show that the...

  8. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  9. Preventable H5N1 avian influenza epidemics in the British poultry industry network exhibit characteristic scales.

    Science.gov (United States)

    Jonkers, A R T; Sharkey, K J; Christley, R M

    2010-04-01

    Epidemics are frequently simulated on redundantly wired contact networks, which have many more links between sites than are minimally required to connect all. Consequently, the modelled pathogen can travel numerous alternative routes, complicating effective containment strategies. These networks have moreover been found to exhibit 'scale-free' properties and percolation, suggesting resilience to damage. However, realistic H5N1 avian influenza transmission probabilities and containment strategies, here modelled on the British poultry industry network, show that infection dynamics can additionally express characteristic scales. These system-preferred scales constitute small areas within an observed power law distribution that exhibit a lesser slope than the power law itself, indicating a slightly increased relative likelihood. These characteristic scales are here produced by a network-pervading intranet of so-called hotspot sites that propagate large epidemics below the percolation threshold. This intranet is, however, extremely vulnerable; targeted inoculation of a mere 3-6% (depending on incorporated biosecurity measures) of the British poultry industry network prevents large and moderate H5N1 outbreaks completely, offering an order of magnitude improvement over previously advocated strategies affecting the most highly connected 'hub' sites. In other words, hotspots and hubs are separate functional entities that do not necessarily coincide, and hotspots can make more effective inoculation targets. Given the ubiquity and relevance of networks (epidemics, Internet, power grids, protein interaction), recognition of this spreading regime elsewhere would suggest a similar disproportionate sensitivity to such surgical interventions. PMID:19828507

  10. Building the quantum network

    International Nuclear Information System (INIS)

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  11. Miniaturized wireless sensor network

    CERN Document Server

    Lecointre, Aubin; Dubuc, David; Katia, Grenier; Patrick, Pons; Aubert, Hervé; Muller, A; Berthou, Pascal; Gayraud, Thierry; Plana, Robert

    2010-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  12. Network Infrastructure Security

    CERN Document Server

    Wong, Angus

    2009-01-01

    Attacks to network infrastructure affect large portions of the Internet at a time and create large amounts of service disruption, due to breaches such as IP spoofing, routing table poisoning and routing loops. This book includes conceptual examples that show how network attacks can be run, along with appropriate countermeasures and solutions

  13. Online Networking Site

    Institute of Scientific and Technical Information of China (English)

    杨淑恬

    2011-01-01

    @@ According to surveies of what users do on the Internet, it shows that Internet usage falls into four main categories; information, entertainment,social networking,and business.I decided to de- velop an ultimate social networking website that can include all this functions.

  14. Local Area Networks.

    Science.gov (United States)

    Marks, Kenneth E.; Nielsen, Steven

    1991-01-01

    Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)

  15. Environmental Sensor Networks

    OpenAIRE

    Martinez, Kirk; Hart, Jane; Ong, Royan

    2004-01-01

    Sensor networks for the natural environment require an understanding of earth science, combined with sensor, communications and computer technology. We discuss the evolution from data logging to sensor networks, describe our research from a glacial environment and highlight future challenges in this field.

  16. Networking: OFFLU example

    Science.gov (United States)

    World Organization for Animal Health (OIE) and Food and Agriculture Organization (FAO) for the United Nations Influenza Network (OFFLU) is the joint OIE-FAO global network of expertise on animal influenzas: equine, swine, poultry and wild birds. OFFLU aims to reduce negative impacts of animal influ...

  17. Community Wireless Networks

    Science.gov (United States)

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  18. Wireless Sensor Networks Approach

    Science.gov (United States)

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  19. Wireless Sensors Network (Sensornet)

    Science.gov (United States)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  20. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  1. International tourism network

    Science.gov (United States)

    Miguéns, Joana I. L.; Mendes, José F. F.; Costa, Carlos M. M.

    2007-06-01

    The interest in tourism has always been strong, for its important role in economic flows among nations. On this study we analyze the arrivals of international tourism (edges) over 206 countries and territories (nodes) around the world, on the year 2004. International tourist arrivals reached a record of 763 million in 2004. We characterize analytically the topological and weighted properties of the resulting network. International tourist arrivals are analyzed over in strength and out strength flows, resulting on a highly directed network, with a very heterogeneity of weights and strengths. The inclusion of edge weights and directions on the analysis of network architecture allows a more realistic insight on the structure of the networks. Centrality, assortativity and disparity are measured for the topological and weighted structure. Assortativity measures the tendency of having a high weight edges connecting two nodes with similar degrees. ITN is disassortative, opposite to social network. Disparity quantifies the how similar are the flows on a node neighborhood, measuring the heterogeneity of weights for in flows and out flows of tourism. These results provide an application of the recent methods of weighted and directed networks, showing that weights are relevant and that in general the modeling of complex networks must go beyond topology. The network structure may influence how tourism hubs, distribution of flows, and centralization can be explored on countries strategic positioning and policy making.

  2. Optimal Phase Oscillatory Network

    Science.gov (United States)

    Follmann, Rosangela

    2013-03-01

    Important topics as preventive detection of epidemics, collective self-organization, information flow and systemic robustness in clusters are typical examples of processes that can be studied in the context of the theory of complex networks. It is an emerging theory in a field, which has recently attracted much interest, involving the synchronization of dynamical systems associated to nodes, or vertices, of the network. Studies have shown that synchronization in oscillatory networks depends not only on the individual dynamics of each element, but also on the combination of the topology of the connections as well as on the properties of the interactions of these elements. Moreover, the response of the network to small damages, caused at strategic points, can enhance the global performance of the whole network. In this presentation we explore an optimal phase oscillatory network altered by an additional term in the coupling function. The application to associative-memory network shows improvement on the correct information retrieval as well as increase of the storage capacity. The inclusion of some small deviations on the nodes, when solutions are attracted to a false state, results in additional enhancement of the performance of the associative-memory network. Supported by FAPESP - Sao Paulo Research Foundation, grant number 2012/12555-4

  3. Four archetypal networked organisations

    NARCIS (Netherlands)

    Treurniet, W.; Buul, K. van

    2015-01-01

    Complex and multifaceted problems such as emergencies typically require coordinated effort by a network of different organisations. These networks typically rely less on formal hierarchical structures and instead have a stronger focus on allowing the dynamics to emerge in the process of collaboratio

  4. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  5. The Creative Cities Network

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The Creative Cities Network, started by UNESCO in 2004, is one of the world’s highest-level non-governmental organizations in creative industry. The network focuses on the excellence of its member cities as its main product, and finds ways to maintain relevance in city life, local economy

  6. Personalized Home-Networks

    DEFF Research Database (Denmark)

    Soler, José; Gandy, Michael

    2007-01-01

    The paper provides details of a home-networking architecture based on an enhanced residential gateway. Initially the need for mechanisms allowing user-dependent network behavior is described and afterwards details of an initial implementation are provided in terms of architectural description...

  7. Teacher Networks Companion Piece

    Science.gov (United States)

    Hopkins, Ami Patel; Rulli, Carolyn; Schiff, Daniel; Fradera, Marina

    2015-01-01

    Network building vitally impacts career development, but in few professions does it impact daily practice more than in teaching. Teacher networks, known as professional learning communities, communities of practice, peer learning circles, virtual professional communities, as well as other names, play a unique and powerful role in education. In…

  8. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  9. Convergence of Networks

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Ruggieri, Marina

    2008-01-01

    The paper focuses on the revolutionary changes that could characterise the future of networks. Those changes involve many aspects in the conceivement and exploitation of networks: architecture, services, technologies and modeling. The convergence of wired and wireless technologies along with the ...

  10. Communication Network Analysis Methods.

    Science.gov (United States)

    Farace, Richard V.; Mabee, Timothy

    This paper reviews a variety of analytic procedures that can be applied to network data, discussing the assumptions and usefulness of each procedure when applied to the complexity of human communication. Special attention is paid to the network properties measured or implied by each procedure. Factor analysis and multidimensional scaling are among…

  11. Network coding theory

    CERN Document Server

    Yeung, Raymond; Cai, N

    2014-01-01

    Consider a network consisting of point-to-point communicationchannels. Each channel transmits information noiselessly subject to thechannel capacity. Data is to be transmitted from the source node to aprescribed set of destination nodes. Given the transmission requirements,a natural question is whether the network can fulfill theserequirements and how it can be done efficiently.

  12. Integrating networks with Mathematica

    NARCIS (Netherlands)

    R.J. Strijkers; R.J. Meijer

    2008-01-01

    We have developed a concept that considers network behavior as a collection of software objects, which can be used or modified in computer programs. The interfaces of these software objects are exposed as web services and enable applications to analyze and manipulate networks, e.g. to find articulat

  13. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  14. A Distributed Magnetometer Network

    CERN Document Server

    Scoville, John; Freund, Friedemann

    2014-01-01

    Various possiblities for a distributed magnetometer network are considered. We discuss strategies such as croudsourcing smartphone magnetometer data, the use of trees as magnetometers, and performing interferometry using magnetometer arrays to synthesize the magnetometers into the world's largest telescope. Geophysical and other applications of such a network are discussed.

  15. Weighted Fractal Networks

    OpenAIRE

    Carletti, Timoteo; Righi, Simone

    2009-01-01

    In this paper we define a new class of weighted complex networks sharing several properties with fractal sets, and whose topology can be completely analytically characterized in terms of the involved parameters and of the fractal dimension. The proposed framework defines an unifying general theory of fractal networks able to unravel some hidden mechanisms responsible for the emergence of fractal structures in Nature.

  16. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  17. Innovation in Virtual Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    2011-01-01

    The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective......The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective...

  18. Stochastic network calculus

    CERN Document Server

    Jiang, Yuming

    2009-01-01

    Network calculus, a theory dealing with queuing systems found in computer networks, focuses on performance guarantees. This title presents a comprehensive treatment for the stochastic service-guarantee analysis research and provides basic introductory material on the subject, as well as discusses the various researches in the area.

  19. A balanced memory network.

    Directory of Open Access Journals (Sweden)

    Yasser Roudi

    2007-09-01

    Full Text Available A fundamental problem in neuroscience is understanding how working memory--the ability to store information at intermediate timescales, like tens of seconds--is implemented in realistic neuronal networks. The most likely candidate mechanism is the attractor network, and a great deal of effort has gone toward investigating it theoretically. Yet, despite almost a quarter century of intense work, attractor networks are not fully understood. In particular, there are still two unanswered questions. First, how is it that attractor networks exhibit irregular firing, as is observed experimentally during working memory tasks? And second, how many memories can be stored under biologically realistic conditions? Here we answer both questions by studying an attractor neural network in which inhibition and excitation balance each other. Using mean-field analysis, we derive a three-variable description of attractor networks. From this description it follows that irregular firing can exist only if the number of neurons involved in a memory is large. The same mean-field analysis also shows that the number of memories that can be stored in a network scales with the number of excitatory connections, a result that has been suggested for simple models but never shown for realistic ones. Both of these predictions are verified using simulations with large networks of spiking neurons.

  20. Recurrent Spatial Transformer Networks

    DEFF Research Database (Denmark)

    Sønderby, Søren Kaae; Sønderby, Casper Kaae; Maaløe, Lars;

    2015-01-01

    We integrate the recently proposed spatial transformer network (SPN) [Jaderberg et. al 2015] into a recurrent neural network (RNN) to form an RNN-SPN model. We use the RNN-SPN to classify digits in cluttered MNIST sequences. The proposed model achieves a single digit error of 1.5% compared to 2...

  1. Centralized Routing for Prolonged Network Lifetime in Wireless Sensor Networks

    OpenAIRE

    Hansen, Ewa

    2008-01-01

    In this thesis centralized routing methods for wireless sensor networks have been studied. The aim has been to prolong network lifetime by reducing the energy consumed by sensor-node communication. Wireless sensor networks are rapidly becoming common in application areas where information from many sensors is to be collected and acted upon. The use of wireless sensor networks adds flexibility to the network, and the cost of cabling can be avoided. Wireless sensor networks may consist of sever...

  2. Caching in LTE networks using Software-Defined Networking

    OpenAIRE

    Kimmerlin, Maël

    2014-01-01

    Data consumption is increasing rapidly in mobile networks. The cost of network infrastructure is increasing, which leads to an "end of profit" within next few years. Thus, mobile operators require a new technology that allows increasing the network capacity within low network costs. Therefore, using caching is the most evident solution to be used in their backhaul networks. However, the current architecture of LTE network does not provide sufficient flexibility to place the caches in the most...

  3. Using the Network Description Language in Optical Networks

    OpenAIRE

    Ham, van, R.C.H.J.; Grosso, P.; Pol,, M.E.; Toonk, A.; Laat, de, M.M.

    2007-01-01

    Current research networks allow end users to build their own application-specific connections (lightpaths) and Optical Private Networks (OPNs). This requires a clear communication between the requesting application and the network. The Network Description Language (NDL) is a vocabulary designed to describe optical networks based on the Resource Description Framework (RDF). These descriptions aid applications in querying the capabilities of the network and allow them to clearly express request...

  4. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  5. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  6. Innovation and network collaboration

    DEFF Research Database (Denmark)

    Kesting, Peter; Müller, Sabine; Jørgensen, Frances;

    2011-01-01

    Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size and thei......Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size...... in particular, and HRM, we analyse and evaluate the potential applicability of existing models for supporting innovation in SMEs participating in networks. Finally, we propose several lines of inquiry arising from our analysis that provide directions for future research....

  7. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    . We use three axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well as all...... connection costs; and, (3) the central planner selects a cost minimizing network satisfying reported connection demands based on estimated connection costs and allocates true connection costs of the selected network.......In the present paper we consider the allocation of cost in connection networks. Agents have connection demands in form of pairs of locations they want to be connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection demands...

  8. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    2015-01-01

    demands. We use a few axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well...... as all connection costs; (3) the central planner selects a cost minimizing network satisfying reported connection demands based on the estimated costs; and, (4) the planner allocates the true costs of the selected network. It turns out that an allocation rule satisfies the axioms if and only if relative......In the present paper we consider the allocation of costs in connection networks. Agents have connection demands in form of pairs of locations they want to have connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection...

  9. Visualization of Social Networks

    Science.gov (United States)

    Chen, Ing-Xiang; Yang, Cheng-Zen

    With the ubiquitous characteristic of the Internet, today many online social environments are provided to connect people. Various social relationships are thus created, connected, and migrated from our real lives to the Internet environment from different social groups. Many social communities and relationships are also quickly constructed and connected via instant personal messengers, blogs, Twitter, Facebook, and a great variety of online social services. Since social network visualizations can structure the complex relationships between different groups of individuals or organizations, they are helpful to analyze the social activities and relationships of actors, particularly over a large number of nodes. Therefore, many studies and visualization tools have been investigated to present social networks with graph representations. In this chapter, we will first review the background of social network analysis and visualization methods, and then introduce various novel visualization applications for social networks. Finally, the challenges and the future development of visualizing online social networks are discussed.

  10. Sensor Network Motes:

    DEFF Research Database (Denmark)

    Leopold, Martin

    This dissertation describes our efforts to improve sensor network performance evaluation and portability, within the context of the sensor network project Hogthrob. In Hogthrob, we faced the challenge of building an sensor network architecture for sow monitoring. This application has hard...... requirements on price and performance, and shows great potential for using sensor networks. Throughout the project we let the application requirements guide our design choices, leading us to push the technologies further to meet the specific goal of the application. In this dissertation, we attack two key...... to investigate these challenges and apart from developing the methodologies, we also present the results of our experiments. In particular, we present a new vector based methodology for performance evaluation of sensor network devices (motes) and applications, based on application specific benchmarking...

  11. Local area networks

    CERN Document Server

    Zafiropoulo, P

    1982-01-01

    Pitro Zafiropulo is a- staff member at the IBM Research Laboratories at Zurich. He joined IBM in 1968 and has worked on protocol validation, synthesis, integrated networks, network reliability, PABX's and speech recognition. Local Area Networks are intended to provide improved communication capabilities such as high data throughput rates, low error rates and ease of connection among terminal stations and comuters. These new types of networks operate within a limited geographical range like an establishment, campus or building and are owned by a single organization. The presentation introduces these networks and the main techniques are described. It then proceeds to evaluate the main switching techniques as they apply to LAN ring and bus configurations. The preferred technique of token-ring distributed switching is identified. The contents of Mr. Zafiropoulo's talk was somewhat similar to the paper of Mr. Kummerle, which is therefore included in these Proceedings.

  12. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  13. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  14. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun;

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  15. Network class superposition analyses.

    Science.gov (United States)

    Pearson, Carl A B; Zeng, Chen; Simha, Rahul

    2013-01-01

    Networks are often used to understand a whole system by modeling the interactions among its pieces. Examples include biomolecules in a cell interacting to provide some primary function, or species in an environment forming a stable community. However, these interactions are often unknown; instead, the pieces' dynamic states are known, and network structure must be inferred. Because observed function may be explained by many different networks (e.g., ≈ 10(30) for the yeast cell cycle process), considering dynamics beyond this primary function means picking a single network or suitable sample: measuring over all networks exhibiting the primary function is computationally infeasible. We circumvent that obstacle by calculating the network class ensemble. We represent the ensemble by a stochastic matrix T, which is a transition-by-transition superposition of the system dynamics for each member of the class. We present concrete results for T derived from boolean time series dynamics on networks obeying the Strong Inhibition rule, by applying T to several traditional questions about network dynamics. We show that the distribution of the number of point attractors can be accurately estimated with T. We show how to generate Derrida plots based on T. We show that T-based Shannon entropy outperforms other methods at selecting experiments to further narrow the network structure. We also outline an experimental test of predictions based on T. We motivate all of these results in terms of a popular molecular biology boolean network model for the yeast cell cycle, but the methods and analyses we introduce are general. We conclude with open questions for T, for example, application to other models, computational considerations when scaling up to larger systems, and other potential analyses. PMID:23565141

  16. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  17. Tinnitus: Network pathophysiology-network pharmacology

    Directory of Open Access Journals (Sweden)

    Ana Belen eElgoyhen

    2012-01-01

    Full Text Available Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for 1 in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single FDA-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in central nervous system pathologies is changing from that of magic bullets that target individual chemoreceptors or disease-causing genes into that of magic shotguns, promiscuous or dirty drugs that target disease-causing networks, also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  18. Network of networks in Linux operating system

    Science.gov (United States)

    Wang, Haoqin; Chen, Zhen; Xiao, Guanping; Zheng, Zheng

    2016-04-01

    Operating system represents one of the most complex man-made systems. In this paper, we analyze Linux Operating System (LOS) as a complex network via modeling functions as nodes and function calls as edges. It is found that for the LOS network and modularized components within it, the out-degree follows an exponential distribution and the in-degree follows a power-law distribution. For better understanding the underlying design principles of LOS, we explore the coupling correlations of components in LOS from aspects of topology and function. The result shows that the component for device drivers has a strong manifestation in topology while a weak manifestation in function. However, the component for process management shows the contrary phenomenon. Moreover, in an effort to investigate the impact of system failures on networks, we make a comparison between the networks traced from normal and failure status of LOS. This leads to a conclusion that the failure will change function calls which should be executed in normal status and introduce new function calls in the meanwhile.

  19. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  20. Management of Networks Using SNMP

    Directory of Open Access Journals (Sweden)

    Prakash S. Teltumde

    2012-04-01

    Full Text Available The increasing size of network makes the management of network more and more difficult. Management of network is a very difficult task. Traditional centralized design monitoring system do not scale to provide present day , large ,complex, network computing system. This paper is a survey which aims to explain and design the Network Monitoring software which allow us to monitor the network easily and efficiently. The network management system should completely automate the manual monitoring of network system for the administrator of the network. Moreover, after detecting the system which is not responding to the network, the software will mail the administrator of that system to reset the system so that the entire network will be load free and network can work smoothly.