WorldWideScience

Sample records for advocates network wepan

  1. Women in Engineering Program Advocates Network (WEPAN): Evaluation of the seventh annual conference

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, S.G.

    1996-08-01

    The primary goals of the 1996 WEPAN Conference were to: (1) Conduct technical and programmatic seminars for institutions desiring to initiate, replicate, or expand women in engineering programs; (2) Provide assistance in fundraising and grant writing; (3) Profile women in engineering programs of excellence; (4) Sponsor inspiring, knowledgeable and motivational keynote speakers; and, (5) Offer a series of workshops focused on topics such as: establishing partnerships with industry, current research findings, retention strategies, issues affecting special populations, and early intervention techniques. In an effort to provide greater access for women to engineering careers, women in engineering program directors at Purdue University, Stevens Institute of Technology and the University of Washington joined together in 1990 to establish WEPAN, a national network of individuals interested in the recruitment, admission, retention, and graduation of women engineering students. This is the seventh year of operation. Success of this effort has been reflected in numerous ways: increased membership in the organization; increased number of women in engineering programs; increased number of women graduating in engineering; and grants from the U.S. Department of Energy, the National Science Foundation, the Alfred P. Sloan Foundation, the AT&T Foundation, and many other corporations to carry out the goals of WEPAN. The Seventh Annual Women in Engineering Conference entitled, Capitalizing on Today`s Challenges, was held in Denver, Colorado on June 1-4, 1996 at the Hyatt Regency. The conference brought together representatives from academia, government, and industry and examined current issues and initiatives for women in technology, science, and education. Building on the successes of the previous conferences, the seventh conference offered a new variety of speakers and topics.

  2. Women in engineering program advocates network (WEPAN): Evaluation of the fourth annual conference

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, S.G.

    1994-08-01

    The 1994 WEPAN conference highlighted the establishment of the three Regional Centers for Women in Engineering, which are located at the University of Washington, Purdue University, and Stevens Insitute of Technology. An overall evaluation was conducted on the effectiveness of the conference, including the quality of plenary sessions, workshops, registration, accommodations and reception.

  3. Evaluation of the 1997 Joint National Conference, Women in Engineering Program Advocates Network (WEPAN) and National Association of Minority Engineering Program Administrators (NAMEPA)

    Energy Technology Data Exchange (ETDEWEB)

    Brainard, Suzanne G.

    1997-07-01

    The primary goal of the 1997 Joint National Conference was to unite NAMEPA and WEPAN in a unique collaborative effort to further the cause of increasing the participation of women and minorities in science and engineering. The specific objectives were to: (1) conduct technical and programmatic seminars for institutions desiring to initiate, replicate, or expand women and minorities in engineering program; (2) provide assistance in fundraising and grant writing; (3) profile women in engineering programs of excellence; (4) sponsor inspiring knowledgeable and motivational keynote speakers; and (5) offer a series of workshops focused on a multitude of topics.

  4. Building a Science Community of Effective Advocates: The Case of the Union of Concerned Scientists Science Network

    Science.gov (United States)

    Varga, M.; Worcester, J.

    2017-12-01

    The Union of Concerned Scientists (UCS) Science Network is a community of over 20,000 scientists, engineers, economists, public health specialists, and technical experts that inform and advocate for science-based solutions to some of our nation's most pressing problems. The role of the community manager here is to train and prepare Science Network members to be effective advocates for science-based decision making, and also to identify opportunities for them to put their skills and expertise into action on science and public health issues. As an organizational asset, but also an important resource to its members, it is crucial that the Science Network demonstrate its impact. But measuring impact when it comes to engagement and advocacy can be difficult. Here we will define a glossary of terms relating to community management and scientist engagement, delve into tracking and measurement of actions taken within a community, and connect the dots between tracking metrics and measuring impact. Measuring impact in community management is a growing field, and here we will also suggest future research that will help standardize impact measurement, as well as bring attention to the growing and unique role that scientist communities can have on policy and public engagement goals. This work has been informed by the American Association for the Advancement of Science's inaugural cohort of the Community Engagement Fellows Program.

  5. Incorrigible advocates

    NARCIS (Netherlands)

    Doornbos, N.; de Groot-van Leeuwen, L.E.

    2012-01-01

    Inspired by the work of Richard Abel, the authors conduct a N=1 study into the career path and disciplinary records of a Dutch immigration advocate. Their aim is to offer explanations as to why some lawyers seem so impervious to discipline. The authors analyse the case from three different angles:

  6. Together Everyone Achieves More: Leadership Networks and Interagency Relationships of the Judge Advocate Generals Corps

    Science.gov (United States)

    2017-02-22

    leadership networks may be formal or informal in nature, but share the trait that all of the nodes of the network create products or perform services...Employment and Reemployment Rights Act (“USERRA”), voting rights by enforcing the Uniformed and Overseas Citizens Absentee Voting Act of 1986

  7. Working with Advocates

    Science.gov (United States)

    Doan, Kim

    2010-01-01

    Court appointed special advocates (CASAs) are volunteers who represent abused and neglected children in the court system. David Soukup, a judge in Washington State, created the first CASA program in 1977 to gather more information about the children whose cases were appearing before him. The likelihood of meeting a CASA may be equal to the…

  8. Korczak, an Advocate for Children.

    Science.gov (United States)

    Bear, Donald; Merrill, Connie

    1994-01-01

    Profiles the life and writings of Janusz Korczak, who lived in Poland from 1878 until his execution by the Nazis in 1942. Korczak was trained as a pediatrician but devoted his life to running an orphanage, advocating children's rights, and educating teacher apprentices and children about the principles of democracy. (LP)

  9. Nuclear physicist, arms control advocate

    CERN Multimedia

    Chang, K

    2002-01-01

    Victor F. Weisskopf, a nuclear physicist who worked on the Manhattan Project to build the first atomic bomb in World War II and later became an ardent advocate of arms control, died Monday at his home in Newton, MA, USA. He was 93 (1 page).

  10. Documenting the Experiences of Special Education Advocates

    Science.gov (United States)

    Burke, Meghan M.; Goldman, Samantha E.

    2017-01-01

    Many parents struggle to advocate for their children with disabilities to obtain services at school. Subsequently, parents may turn to special education advocates to help ensure that their children receive appropriate services. However, it is unclear how special education advocates support families and secure services for children with…

  11. Dental students--dental advocates.

    Science.gov (United States)

    Bensch, Brittany

    2010-01-01

    Student advocacy and involvement in the political process is built into the structure of the American Student Dental Association (ASDA), especially in its Legislative Grassroots Network and an internal communication network among students to ensure political awareness. Students are concerned with such issues as a universally accepted, non-patient-based licensure process, mid-level providers, loan availability and tax deductibility, financial support for schools, and service early in one's professional career (giving forward rather than giving back). Through collaboration with the American Dental Education Association and with many state associations, students participate in lobbying, awareness campaigns, and behind the scenes as legislative aids. Although students share the same love for the profession that animates established practitioners, they are perceived by legislators as being different. Students are involved in the legislative process because it represents their future.

  12. Sibling advocates of people with intellectual disabilities.

    Science.gov (United States)

    Ying Li, Eria Ping

    2006-06-01

    The aim of this study was to examine the experience of the first generation of sibling advocates in Hong Kong. A qualitative approach was adopted and six sibling advocates of people with intellectual disabilities from one non-government organization were interviewed. Data were analyzed using a constant comparative method and content analysis. Findings revealed that the six participants were reactive in the process of taking up the caregiver responsibility and they performed three functions: to advocate for more service provision, to improve service quality, and to facilitate communication between individual service units and family members of people with intellectual disabilities. All of the participants expressed that they needed support from service providers when they tried to function as the sibling advocates. Strategies to promote the involvement of siblings of people with intellectual disabilities as advocates are discussed and it is expected that more siblings of people with intellectual disabilities will be supported to have a higher level of involvement in advocacy.

  13. Advocacy for active transport: advocate and city council perspectives

    Directory of Open Access Journals (Sweden)

    Rosenby Marieah

    2010-01-01

    Full Text Available Abstract Background Effective advocacy is an important part of efforts to increase population participation in physical activity. Research about effective health advocacy is scarce, however, the health sector can learn from the experiences and knowledge of community advocates and those who are on the receiving end of this advocacy. The aim of this study is to explore advocacy for active transport from the perspectives of community advocates and representatives from City councils. Methods Cycling and walking advocates were identified from the local contact list of Cycling Advocates Network and Living Streets Aotearoa. Semi-structured telephone interviews were conducted with cycle and walking advocates from throughout New Zealand. Advocates also nominated a suitable council officer at their local City council to be interviewed. Interviews were recorded and transcribed and categories of responses for each of the questions created. Results Several processes were used by advocates to engage with council staff, including formal council submissions, meetings, stakeholder forums and partnership in running community events promoting active transport. Several other agencies were identified as being influential for active transport, some as potential coalition partners and others as potential adversaries. Barriers to improving conditions for active transport included a lack of funding, a lack of will-power among either council staff or councillors, limited council staff capacity (time or training and a culture of providing infrastructure for motor vehicles instead of people. Several suggestions were made about how the health sector could contribute to advocacy efforts, including encouraging political commitment, engaging the media, communicating the potential health benefits of active transport to the general public and being role models in terms of personal travel mode choice and having workplaces that support participation in active transport

  14. Readying Community Water Fluoridation Advocates through Training, Surveillance, and Empowerment.

    Science.gov (United States)

    Veschusio, C; Jones, M K; Mercer, J; Martin, A B

    2018-05-30

    This paper describes the Community Water Fluoridation Advocacy Training Project that was designed to develop networks of community water fluoridation advocates in rural communities. The South Carolina (SC) Department of Health and Environmental Control Division of Oral Health staff and the SC Dental Association were responsible for developing and facilitating the training sessions for key policy influencers, which included medical and dental providers, early childhood educators, and water system operators and managers. Findings from the post-training survey indicate that participants increased their knowledge and skills to discuss the impact of water fluoridation on the dental health of community residents. Participants identified a need for online access to water fluoridation education and advocacy materials. Dental public health competencies illustrated: communication and collaboration with groups and individuals, and advocate, implement and evaluate public health policy, legislation and regulations. Copyright© 2018 Dennis Barber Ltd.

  15. Advocating for Arts in the Classroom

    Science.gov (United States)

    Bauerlein, Mark

    2010-01-01

    This article contends that every chairman of the National Endowment for the Arts must advocate for arts education. The arts need a voice in power, say people in the field, someone in the corridors of influence to argue the benefits of teaching the nation's students about classical and jazz music, ballet, and sculpture. With No Child Left Behind…

  16. Institutional Support : Advocates Coalition for Development and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Advocates Coalition for Development and Environment (ACODE) is an independent policy research and advocacy organization based in Kampala, Uganda, with a reputation for producing good quality research to underpin its advocacy work. To date, the organization has relied on project-specific funds for its operation, ...

  17. What Arnold Gesell Would Advocate Today

    Science.gov (United States)

    Bergen, Doris

    2017-01-01

    The first issue of "Childhood Education," published in 1924, included an article by the eminent physician, Arnold Gesell. In the article, "The Significance of the Nursery School" he advocated for early childhood education, indicating its importance for both promoting the development of young children and supporting and…

  18. John Dique: dialysis pioneer and political advocate.

    Science.gov (United States)

    George, Charles R P

    2016-02-01

    John Dique (1915-1995) epitomized the internationalism of medicine, the intellectual and manual dexterity of many pioneers of dialysis, and the social concern evinced by many nephrologists. Born in Burma of French, German, British and Indian ancestry; educated in India; an Anglo-Indian who described himself as British without ever having visited Britain; he moved to Australia in 1948 to escape the murderous inter-ethnic conflict that befell multicultural India as it and Pakistan became independent. Settling in Brisbane, he pioneered several novel medical techniques. After inventing some simple equipment to facilitate intravenous therapy, he established a neonatal exchange blood transfusion programme. Then, between 1954 and 1963, he personally constructed and operated two haemodialysis machines with which to treat patients suffering from acute renal failure, the first such treatment performed in Australasia. His patients survival results were, for the era, remarkable. He subsequently helped found the Royal Australasian College of Pathologists and went on to establish a successful private pathology practice. The latter years of his life, however, saw him become a social and political advocate. He fiercely opposed the emerging ideologies of multiculturalism and social liberalism that, he predicted, would seriously damage the national fabric of Western society. Public vilification ensued, his medical achievements disregarded. It does seem likely, however, that in none of the areas that he touched - whether medical, social, or political - has the last word yet been said.

  19. Teen Advocates for Community and Environmental Sustainability

    Science.gov (United States)

    Wunar, B.

    2017-12-01

    The Museum of Science and Industry, Chicago (MSI) is in the early stages of a NOAA supported Environmental Literacy Grant project that aims to engage high school age youth in the exploration of climate and Earth systems science. Participating youth are positioned as teen advocates for establishing resilient communities in the Midwest. The project utilizes a variety of resources, including NOAA Science On a Sphere® (SOS) technology and datasets, Great Lakes and local climate assets, and local municipal resiliency planning guides to develop museum-based youth programming. Teen participants in the project will share their learning through regular facilitated interactions with public visitors in the Museum and will bring learning experiences to Chicago Public Library sites throughout the city's neighborhoods. Project content will also be adapted for use in 100+ after-school science clubs to engage younger students from diverse communities across the Chicago area. Current strategies for supporting teen facilitation of public experiences, linkages to out of school time and summer learning programs, and connections to local resiliency planning agencies will be explored.

  20. Interdisciplinary team communication among forensic nurses and rape victim advocates.

    Science.gov (United States)

    Patterson, Debra

    2014-01-01

    Victim advocates and forensic nurses provide integrated care to address the complex legal, medical, and mental health needs of rape survivors. Research suggests that conflict exists between nurses and advocates, but it remains unknown how their communication patterns contribute to or resolve these conflicts. Utilizing a qualitative case study approach, the current study interviewed 24 nurses and advocates from a Midwest organization to better understand team communication patterns when addressing conflicts. The findings suggest that most nurses communicate concerns directly while advocates avoid direct communication. Factors that influenced direct and indirect communication and their implications for practice will be discussed.

  1. Who Helps the Helpers? Social Support for Rape Crisis Advocates.

    Science.gov (United States)

    Houston-Kolnik, Jaclyn D; Odahl-Ruan, Charlynn A; Greeson, Megan R

    2017-08-01

    Secondary exposure to trauma may have negative effects on rape victim advocates' well-being. Self-care can help to mitigate these negative effects on advocates' well-being, and prior research suggests that social support is an especially important aspect of advocates' self-care. However, there is a lack of research on how rape crisis advocates access and receive social support in relationship to their advocacy work. Therefore, semistructured qualitative interviews were conducted with 15 rape crisis advocates who volunteered for a rape crisis center in Chicago to understand how they accessed social support from informal and formal support providers, and when they did receive support, what was helpful versus unhelpful. Data were analyzed using thematic content analysis. Results revealed that many advocates were able to seek out and receive positive instrumental and emotional social support that nurtured them and their work. However, advocates also experienced a variety of barriers to obtaining positive support from informal support providers, including fear of burdening providers and a reluctance or lack of preparedness of their support providers to speak about the issue. Advocates emphasized the need for rape crisis centers to provide resources for their informal social support systems in order to encourage helpful responses. In addition, advocates praised the rape crisis center for its built-in formal support structures, but also encouraged the organization to seek broader representation of persons from minority backgrounds among their advocates and mentors. Implications and future directions for research and rape crisis centers are also discussed. The present study highlights the importance of social support systems for advocates and potential barriers that may be addressed to reduce service provider burnout and vicarious trauma.

  2. GSA's Teacher Advocate Program - getting teachers to be advocates for Earth Science

    Science.gov (United States)

    Lewis, G. B.

    2011-12-01

    After parents, teachers are they most influential people when it comes to students leaning about their world. However, when it comes to Earth science, the vast majority of our teachers have little to no Earth science training and lack the resources to run exciting and challenging classes on Earth science topics for their students. The Geological Society of America (GSA) is committed to reversing that trend by developing easy to use resources and training teachers on how to use them in their classrooms. Through a program called the Teacher Advocate Program (TAP), GSA has already had teachers using Earth science materials with over 6 million students (1.3 million a year). Formally established in 2003, TAP aims to raise the number of teachers who are advocates for geoscience in their classrooms, schools and school districts by providing those teachers with: Low cost teaching resources that provide them with teaching notes, teaching materials (images, models etc) and usable class room activities. Low cost training opportunities for teachers on how to use TAP materials. In-field experiences for teachers to provide them with teaching materials and insights.

  3. How to Become an Effective Advocate without Selling Your Soul

    Science.gov (United States)

    Grob, George F.

    2014-01-01

    The primary focus of this article is ''advocating for the results of a specific evaluation.'' To some extent, all evaluators are advocates, however the author notes, "there is no great mystery in how to use evaluations for advocacy, especially with respect to influencing policy making within federal and state…

  4. Coaching mental health peer advocates for rural LGBTQ people.

    Science.gov (United States)

    Willging, Cathleen E; Israel, Tania; Ley, David; Trott, Elise M; DeMaria, Catherine; Joplin, Aaron; Smiley, Verida

    Lesbian, gay, bisexual, transgender, and queer or questioning (LGBTQ) people are affected by mental health disparities, especially in rural communities. We trained peer advocates in rural areas in the fundamentals of mental health, outreach, education, and support for this population. The peer advocates were coached by licensed mental health professionals. We evaluated this process through iterative qualitative analysis of semi-structured interviews and written logs from coaches and advocates. The six major themes comprising the results centered on (1) coaching support, (2) peer advocate skills and preparation, (3) working with help seekers, (4) negotiating diversity, (5) logistical challenges in rural contexts, and (6) systemic challenges. We concluded that peer advocacy for LGBTQ people with mental distress offers an affirmative, community-based strategy to assist the underserved. To be successful, however, peer advocates will likely require ongoing training, coaching, and infrastructural support to negotiate contextual factors that can influence provision of community resources and support to LGBTQ people within rural communities.

  5. Family victim advocates: the importance of critical job duties

    Directory of Open Access Journals (Sweden)

    Teresa H. Young

    Full Text Available Child advocacy centers across the United States intervened in more than 250,000 child abuse cases in 2011(National Children's Alliance, 2012. Understanding the work of family victim advocates is imperative to helping children and families in child abuse cases. In this exploratory study, we surveyed advocates and program directors from child advocacy centers (CACs across the United States to compare their perceptions of the critical job duties of family victim advocates. Data analysis revealed that CAC directors rated the importance of these duties significantly higher than family victim advocates. Results suggest the need for additional training to ensure that family victim advocates understand the importance of critical job duties to meet the needs of children and families in child abuse cases.

  6. Police officers' collaboration with rape victim advocates: barriers and facilitators.

    Science.gov (United States)

    Rich, Karen; Seffrin, Patrick

    2013-01-01

    Secondary victimization may occur when rape victims make police reports. This can compromise the quality of official statements and jeopardize criminal cases. Rape reporters receive better treatment by police officers when advocates are involved and best practice police work includes such collaboration. Studies of advocates have described tension, role confusion, and poor communication with police officers. Many variables, including rape myth acceptance (RMA) and training on sexual assault dynamics, may affect officers' collaboration with advocates. There were 429 police officers who responded to a survey measuring their victim interviewing skill, formal training about rape, years on the job, number of victims known personally, number of recent rape cases, RMA, and collaboration with advocates. Results suggest that officers' interviewing skill, years on the job, and specific training are related to collaboration with victim advocates on rape cases. Professional, rather than personal, variables were most predictive of collaboration. Implications for officer selection and training are explored.

  7. Today's threat is tomorrow's crisis: advocating for dental education, dental and biomedical research, and oral health.

    Science.gov (United States)

    Bresch, Jack E; Luke, Gina G; McKinnon, Monette D; Moss, Myla J; Pritchard, Daryl; Valachovic, Richard W

    2006-06-01

    The current political environment in the nation's capital threatens federal support for programs vital to the academic dental community. To develop a strong cadre of advocates who can deliver an effective and unified message to members of Congress on behalf of dental education and dental research, the American Dental Education Association (ADEA) and the American Association for Dental Research (AADR) created a new organizational structure: the National Oral Health Advocacy Committee (NOHAC) and the National Advocacy Network (NAN). The basic skills and knowledge required to function as an effective advocate include an understanding of the political environment, a working knowledge of the legislative processes and the political players, and the ability to build and work with grassroots networks and coalitions. NOHAC and NAN are designed to provide leadership in these areas to support effective advocacy for dental education and dental research.

  8. Designing a Mobile Application: The Case of iAdvocate

    Directory of Open Access Journals (Sweden)

    Alan R. Foley

    2012-01-01

    Full Text Available In this article, the design of a mobile application (app called iAdvocate is illustrated. The goal of iAdvocate is to share and develop specific strategies with parents of children with disabilities for working collaboratively with a school team to improve their children’s education. iAdvocate uses problem-based learning strategies, simulations, and provides contextual access resources to build parental advocacy skills and knowledge. iAdvocate provides parents with both information and strategies regarding their educational rights and getting their child’s needs met. The goal of iAdvocate is to share and develop specific strategies with parents for working collaboratively with a school team to improve their children’s education. iAdvocate contains three sections: strategies, a compilation of approaches that parents can pursue as advocates; resources, which lists and, where possible, links to such references as laws, books, articles, web sites, video presentations, and organizations that provide information on inclusive education; and, responses, which features simulated interactions, such as replies to common statements made by school professionals regarding services and accommodations for children. This case illustrates the design processes and techniques used to develop an instructional mobile application by presenting the background and context of the project, initial design and design iterations, negative case analysis, and prototyping. Additional documents illustrating the project background, and design process are also included.

  9. Vicarious resilience in sexual assault and domestic violence advocates.

    Science.gov (United States)

    Frey, Lisa L; Beesley, Denise; Abbott, Deah; Kendrick, Elizabeth

    2017-01-01

    There is little research related to sexual assault and domestic violence advocates' experiences, with the bulk of the literature focused on stressors and systemic barriers that negatively impact efforts to assist survivors. However, advocates participating in these studies have also emphasized the positive impact they experience consequent to their work. This study explores the positive impact. Vicarious resilience, personal trauma experiences, peer relational quality, and perceived organizational support in advocates (n = 222) are examined. Also, overlap among the conceptual components of vicarious resilience is explored. The first set of multiple regressions showed that personal trauma experiences and peer relational health predicted compassion satisfaction and vicarious posttraumatic growth, with organizational support predicting only compassion satisfaction. The second set of multiple regressions showed that (a) there was significant shared variance between vicarious posttraumatic growth and compassion satisfaction; (b) after accounting for vicarious posttraumatic growth, organizational support accounted for significant variance in compassion satisfaction; and (c) after accounting for compassion satisfaction, peer relational health accounted for significant variance in vicarious posttraumatic growth. Results suggest that it may be more meaningful to conceptualize advocates' personal growth related to their work through the lens of a multidimensional construct such as vicarious resilience. Organizational strategies promoting vicarious resilience (e.g., shared organizational power, training components) are offered, and the value to trauma-informed care of fostering advocates' vicarious resilience is discussed. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  10. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  11. Remembering Albert deutsch, an advocate for mental health.

    Science.gov (United States)

    Weiss, Kenneth J

    2011-12-01

    Albert Deutsch, journalist, advocate for the mentally ill, and honorary APA Fellow died 50 years ago. Author of The Mentally Ill in America and The Shame of the States, he believed in the obligation of individuals and institutions to advocate for patients. In 1961, he was in the midst of a vast project to assess the state of the art in psychiatric research. This article recalls aspects of Deutsch's life and work and places him in the historical context of individuals who have shown great compassion for disabled persons.

  12. The Economic Impact of Education. Facts for Education Advocates

    Science.gov (United States)

    Alliance for Excellent Education, 2008

    2008-01-01

    Investing in a good education for all of America's students benefits both individuals and the nation as a whole. Some advantages are immediate; others pay off over the longer term. The benefits range from personal wealth to lower health care costs to increased tax revenue. The "Facts for Education Advocates" feature in this edition discusses some…

  13. Occupational Disease, Workers' Compensation, and the Social Work Advocate.

    Science.gov (United States)

    Shanker, Renee

    1983-01-01

    Charges that the overwhelming majority of victims of work-related illnesses are not receiving their entitlements. Describes ways in which social workers and health professionals may become advocates to broaden the effectiveness of the workers' compensation system, illustrated by case studies from the Montefiore Project. (Author/JAC)

  14. Training Tribal Lay Advocates at Sitting Bull College

    Science.gov (United States)

    Shelley, W. L.

    2015-01-01

    Students in Sitting Bull College's lay advocate program develop a well-rounded understanding of the law, enabling them to represent defendants in tribal courts. The program offers legal training for its students--and illustrates how American Indian nations can broaden legal representation for Native defendants in tribal courts. It is one of only…

  15. Phenomenological Study of the Experience of Parent Advocates of Students Diagnosed with ADHD

    Science.gov (United States)

    Peterson-Malen, Melissa

    2013-01-01

    Advocates of students with ADHD in the school system are usually parents who must become advocates in response to the child's need for support and a call for parental involvement from the school. Parent advocates are confronted with many challenges, the primary being the daunting, often solitary task of advocating for a child who is often viewed…

  16. TTI Phase 2 Institutional Support: Advocates Coalition for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Le financement contribuera à renforcer le rôle de l'Advocates Coalition for Development and Environment (ACODE) en tant qu'organisme crédible de recherche sur les politiques publiques en Ouganda, en améliorant sa capacité à fournir des recherches de qualité supérieure, influentes et utiles en matière de politiques.

  17. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  18. 78 FR 69660 - Association of Businesses Advocating Tariff Equity, Coalition of Miso Transmission Customers...

    Science.gov (United States)

    2013-11-20

    ... Businesses Advocating Tariff Equity, Coalition of Miso Transmission Customers, Illinois Industrial Energy... LLC, Duke Energy Business Services, LLC, Entergy Arkansas, Inc., Entergy Gulf States Louisiana, LLC....206 (2013), Association of Businesses Advocating Tariff Equity, Coalition of Miso Transmission...

  19. Jules Stein, MD: Ophthalmologist, Entertainment Magnate, and Advocate for Vision.

    Science.gov (United States)

    Straatsma, Bradley R; Weeks, David F

    2016-04-01

    To report the lifetime activities and accomplishments of Jules Stein, MD. Retrospective review. Assessment of published and unpublished biographical material. Jules Stein combined his love of music and medicine with organizational skills to achieve successive careers as a musician, an ophthalmologist, an entertainment magnate, and an advocate for vision. To preserve vision, he founded Research to Prevent Blindness, founded the Jules Stein Eye Institute at the University of California, Los Angeles, and led a multiyear campaign to establish the National Eye Institute. With successive careers and extraordinary achievements, Jules Stein created an enduring legacy of benefits to ophthalmology, vision research, and the prevention of blindness. Copyright © 2016 American Academy of Ophthalmology. Published by Elsevier Inc. All rights reserved.

  20. The challenge of gun control for mental health advocates.

    Science.gov (United States)

    Pandya, Anand

    2013-09-01

    Mass shootings, such as the 2012 Newtown massacre, have repeatedly led to political discourse about limiting access to guns for individuals with serious mental illness. Although the political climate after such tragic events poses a considerable challenge to mental health advocates who wish to minimize unsympathetic portrayals of those with mental illness, such media attention may be a rare opportunity to focus attention on risks of victimization of those with serious mental illness and barriers to obtaining psychiatric care. Current federal gun control laws may discourage individuals from seeking psychiatric treatment and describe individuals with mental illness using anachronistic, imprecise, and gratuitously stigmatizing language. This article lays out potential talking points that may be useful after future gun violence.

  1. 32 CFR 776.53 - Responsibilities of the Judge Advocate General and supervisory attorneys.

    Science.gov (United States)

    2010-07-01

    ... of the Judge Advocate General and supervisory attorneys. (a) Responsibilities of the Judge Advocate General and supervisory attorneys. (1) The JAG and supervisory attorneys shall make reasonable efforts to... 32 National Defense 5 2010-07-01 2010-07-01 false Responsibilities of the Judge Advocate General...

  2. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  3. Pere Albert: Barcelona Canon, Royal Advocate, Feudal Theorist

    Directory of Open Access Journals (Sweden)

    Kagay, Donald K.

    2002-06-01

    Full Text Available In this article, the life and career of one of Catalonia's greatest medieval legists is discussed. Using notarial and court documentation, the author explores the work of Pere Albert as judge and advocate. The Customs of Catalonia and other of Pere Albert's treatises form the basis for the review of the legist's career as a theorist in feudal law. The basis for this article is the collection of documents pertaining to Pere Albert, which the author includes in an appendix.

    En este artículo se estudia la vida y la carrera de uno de los jurisconsultos medievales más importantes de Cataluña. Utilizando la documentación notarial y judicial, el autor analiza la labor de Pere Albert como juez y abogado. ElsCostums de Catalunya y otros tratados de Pere Albert constituyen la base para el estudio de la carrera del jurisconsulto, como teórico en ley feudal y real. El artículo se basa en una colección de documentos originales relativos a Pere Albert, que el autor incluye en un apéndice.

  4. Narrative Aversion: Challenges for the Illness Narrative Advocate.

    Science.gov (United States)

    Behrendt, Kathy

    2017-02-01

    Engaging in self-narrative is often touted as a powerful antidote to the bad effects of illness. However, there are various examples of what may broadly be termed "aversion" to illness narrative. I group these into three kinds: aversion to certain types of illness narrative; aversion to illness narrative as a whole; and aversion to illness narrative as an essentially therapeutic endeavor. These aversions can throw into doubt the advantages claimed for the illness narrator, including the key benefits of repair to the damage illness does to identity and life-trajectory. Underlying these alleged benefits are two key presuppositions: that it is the whole of one's life that is narratively unified, and that one's identity is inextricably bound up with narrative. By letting go of these assumptions, illness narrative advocates can respond to the challenges of narrative aversions. © The Author 2016. Published by Oxford University Press, on behalf of The Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Esther McCready, RN: Nursing Advocate for Civil Rights

    Science.gov (United States)

    Pollitt, Phoebe A

    2016-02-15

    More than a decade before the Civil Rights Act of 1964, as an African American teenager from Baltimore, Maryland, Esther McCready challenged the discriminatory admissions policies of the University of Maryland School of Nursing (UMSON). The article explores nurse advocacy and how Esther McCready advocated for herself and greater racial equity in nursing education during a time of civil rights turmoil. Her actions eventually resulted in the formation of numerous schools of nursing for African Americans across the south. This article recounts McCready’s early life experiences and the powerful impact her actions had on creating educational options for nurses during a time when they were severely limited for African American women, including discussion of her student days at UMSON and her journey after nursing school. A review of pertinent legal cases and policies related to segregation and integration of higher education in the mid-twentieth century is presented, along with details of McCready’s continued education and advocacy.

  6. Planning for the next generation of public health advocates: evaluation of an online advocacy mentoring program.

    Science.gov (United States)

    O'Connell, Emily; Stoneham, Melissa; Saunders, Julie

    2016-04-01

    Issue addressed Despite being viewed as a core competency for public health professionals, public health advocacy lacks a prominent place in the public health literature and receives minimal coverage in university curricula. The Public Health Advocacy Institute of Western Australia (PHAIWA) sought to fill this gap by establishing an online e-mentoring program for public health professionals to gain knowledge through skill-based activities and engaging in a mentoring relationship with an experienced public health advocate. This study is a qualitative evaluation of the online e-mentoring program. Methods Semi-structured interviews were conducted with program participants at the conclusion of the 12-month program to examine program benefits and determine the perceived contribution of individual program components to overall advocacy outcomes. Results Increased mentee knowledge, skills, level of confidence and experience, and expanded public health networks were reported. Outcomes were dependent on participants' level of commitment, time and location barriers, mentoring relationship quality, adaptability to the online format and the relevance of activities for application to participants' workplace context. Program facilitators had an important role through the provision of timely feedback and maintaining contact with participants. Conclusion An online program that combines public health advocacy content via skill-based activities with mentoring from an experienced public health advocate is a potential strategy to build advocacy capacity in the public health workforce. So what? Integrating advocacy as a core component of professional development programs will help counteract current issues surrounding hesitancy by public health professionals to proactively engage in advocacy, and ensure that high quality, innovative and effective advocacy leadership continues in the Australian public health workforce.

  7. Advocates' Experiences With Media and the Impact of Media on Human Trafficking Advocacy.

    Science.gov (United States)

    Houston-Kolnik, Jaclyn D; Soibatian, Christina; Shattell, Mona M

    2017-02-01

    The present qualitative study explores advocates' opinions of misinformation about human trafficking in the media and describes advocates' strategies to counter the misinformation presented by the media. Thus, 15 advocates who work against human trafficking in Chicago-based nonprofit organizations participated in semistructured interviews about their opinions and strategies. Data were analyzed using thematic content analysis. The present study identifies specific misperceptions of human trafficking in the media, highlights advocates' opinions of this misinformation, and discusses advocates' strategies to counteract inaccurate media, adding support to the role of media advocacy. Advocates note how media images shape and perpetuate stereotypes of trafficking through glamorizing sex work and sensationalizing stories that are most often international depictions of trafficking. Advocates report media generally shares only a piece of the story, simplifying the stories of survivors and the issue of human trafficking. Advocates critique media perpetuating these misperceptions for how they may contribute to policies and programs which fail to address structural factors that create vulnerabilities to be trafficked and the multisystem needs of survivors. However, advocates also note misperceptions can be counteracted by producing sensitive, informed media through social platforms. Advocates share their strategies counteracting misinformation through engaging in informative conversations, utilizing social media to educate, and promoting media messages of survivor agency. Research, clinical, and policy implications are also discussed. The present study emphasizes the importance of decision makers and service providers being critical consumers of media and to assess how media portrayals may (or may not) inform their understanding and response to the issue.

  8. Constructions of Battered Asian Indian Marriage Migrants: The Narratives of Domestic Violence Advocates.

    Science.gov (United States)

    Kapur, Sonia; Zajicek, Anna

    2018-03-01

    How are the images of abused South Asian marriage migrants shaped by domestic violence advocates? We explore the social constructions of battered Asian Indian marriage migrants in the victim advocates' narratives. First, we find the narratives both reproduce and challenge the dominant stereotypes, utilizing some individualistic typifications while constructing these images with an understanding of the broader context of battered South Asian women's experiences. Second, depending on the issue (e.g., economic dependence or religion), the advocates paint either a multidimensional or a one-dimensional picture of their clients. We emphasize the need for further intersectional studies of the images of abused immigrants constructed by victim advocates.

  9. William Graham Brooke (1835-1907): Advocate of Girls' Superior Schooling in Nineteenth-Century Ireland

    Science.gov (United States)

    McCormack, Christopher F.

    2015-01-01

    This paper examines the role of William Graham Brooke as advocate of women's higher education and access to university. His work as advocate is considered against the religious, political, social and economic backdrop of late nineteenth century Ireland. A barrister, as Clerk in the Lord Chancellor's office, he was centrally involved in the…

  10. How Exemplar Counselor Advocates Develop Social Justice Interest: A Qualitative Investigation

    Science.gov (United States)

    Swartz, Melissa Robinson; Limberg, Dodie; Gold, Joshua

    2018-01-01

    The authors examined the experiences of 10 peer-nominated exemplar counselor advocates using grounded theory methodology (Strauss & Corbin, [Strauss, A., 1998]). Analysis by the authors yielded a model of how exemplar counselor advocates develop a social justice interest and provided key insights on how counselor educators can enhance social…

  11. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  12. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  13. Training the next generation of global health advocates through experiential education: A mixed-methods case study evaluation.

    Science.gov (United States)

    Hoffman, Steven J; Silverberg, Sarah L

    2015-10-15

    This case study evaluates a global health education experience aimed at training the next generation of global health advocates. Demand and interest in global health among Canadian students is well documented, despite the difficulty in integrating meaningful experiences into curricula. Global health advocacy was taught to 19 undergraduate students at McMaster University through an experiential education course, during which they developed a national advocacy campaign on global access to medicines. A quantitative survey and an analysis of social network dynamics were conducted, along with a qualitative analysis of written work and course evaluations. Data were interpreted through a thematic synthesis approach. Themes were identified related to students' learning outcomes, experience and class dynamics. The experiential education format helped students gain authentic, real-world experience in global health advocacy and leadership. The tangible implications for their course work was a key motivating factor. While experiential education is an effective tool for some learning outcomes, it is not suitable for all. As well, group dynamics and evaluation methods affect the learning environment. Real-world global health issues, public health practice and advocacy approaches can be effectively taught through experiential education, alongside skills like communication and professionalism. Students developed a nuanced understanding of many strategies, challenges and barriers that exist in advocating for public health ideas. These experiences are potentially empowering and confidence-building despite the heavy time commitment they require. Attention should be given to how such experiences are designed, as course dynamics and grading structure significantly influence students' experience.

  14. Choosing Wisely Canada Students and Trainees Advocating for Resource Stewardship (STARS) campaign: a descriptive evaluation.

    Science.gov (United States)

    Cardone, Franco; Cheung, Daphne; Han, Angela; Born, Karen B; Alexander, Lisa; Levinson, Wendy; Wong, Brian M

    2017-12-19

    Resource stewardship is being increasingly recognized as an essential competency for physicians, but medical schools are just beginning to integrate this into education. We describe the evaluation of Choosing Wisely Canada's Students and Trainees Advocating for Resource Stewardship (STARS) campaign, a student-led campaign to advance resource stewardship education in medical schools across Canada. We evaluated the campaign 6 months after its launch, in November 2015. STARS students were administered a telephone survey eliciting a description of the initiatives that they had implemented or planned to implement at their schools to promote resource stewardship, and exploring their perceptions of facilitators of and barriers to successful implementation of their initiatives. We used a mixed-methods approach to analyze and summarize the data. Twenty-seven (82%) of the 33 eligible students representing all 17 medical schools responded. In 14 schools (82%), students led various local activities (e.g., interest groups, campaign weeks) to raise awareness about resource stewardship among medical students and faculty. Students contributed to curriculum change (both planned and implemented) at 10 schools (59%). Thematic analysis revealed key program characteristics that facilitated success (e.g., pan-Canadian student network, local faculty champion) as well as barriers to implementing change (e.g., complex processes to change curriculum, hierarchical nature of medical school). This student-led campaign, with support from local faculty and Choosing Wisely Canada staff, led to awareness-building activities and early curricula change at medical schools across Canada. Future plans will build on the initial momentum created by the STARS campaign to sustain and spread local initiatives. Copyright 2017, Joule Inc. or its licensors.

  15. The Psychosocial and Independent Living Donor Advocate Evaluation and Post-surgery Care of Living Donors.

    Science.gov (United States)

    Rudow, Dianne LaPointe; Swartz, Kathleen; Phillips, Chelsea; Hollenberger, Jennifer; Smith, Taylor; Steel, Jennifer L

    2015-09-01

    Solid organ transplantation as a treatment for end stage organ failure has been an accepted treatment option for decades. Despite advances in medicine and technology, and increased awareness of organ donation and transplantation, the gap between supply and demand continues to widen. Living donation has been an option that has increased the number of transplants despite the continued shortage of deceased organs. In the early 2000s live donor transplantation reached an all-time high in the United States. As a result, a consensus meeting was convened in 2000 to increase the oversight of living donor transplantation. Both the Centers for Medicare and Medicaid Services and the United Network for Organ Sharing developed regulations that transplant programs performing live donor transplantation. These regulations and guidelines involve the education, evaluation, informed consent process and living donor follow-up care. Two areas in which had significant changes included the psychosocial and the independent living donor advocate (ILDA) evaluation. The purpose of this paper was to outline the current regulations and guidelines associated with the psychosocial and ILDA evaluation as well as provide further recommendations for the administration of a high quality evaluation of living donors. The goals and timing of the evaluation and education of donors; qualifications of the health care providers performing the evaluation; components of the evaluation; education provided to donors; documentation of the evaluation; participation in the selection committee meeting; post-decline and post-donation care of donors is described. Caveats including the paired donor exchange programs and non-directed and directed donation are also considered.

  16. Excelling in the Role of Advocate: A Qualitative Study Exploring Advocacy as an Essential Physiotherapy Competency

    Science.gov (United States)

    Kelland, Kerri; Hoe, Erica; McGuire, Michaela J.; Yu, Jane; Andreoli, Angie

    2014-01-01

    ABSTRACT Purpose: To explore the perspectives of leading advocates regarding the attributes required for excelling in the advocate role as described within the Essential Competency Profile for Physiotherapists in Canada (2009). Methods: We used a descriptive qualitative design involving in-depth, semi-structured interviews conducted with leading Canadian advocates within the physiotherapy profession. Transcribed interviews were coded and analyzed using thematic analysis. Results: The 17 participants identified eight attributes necessary for excelling in the role of advocate: collaboration, communication, scholarly practice, management, professionalism, passion, perseverance, and humility. The first five attributes correspond to roles within the Essential Competency Profile for Physiotherapists in Canada. Participants identified the attributes of collaboration, communication, and scholarly practice as the most important for successful advocacy. Participants also noted that the eight identified attributes must be used together and tailored to meet the needs of the advocacy setting. Conclusions: Identifying these eight attributes is an important first step in understanding how competence in the advocate role can be developed among physiotherapy students and practitioners. Most importantly, this study contributes to the knowledge base that helps physiotherapists to excel in advocating for their clients and the profession. PMID:24719513

  17. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions...

  18. The Advocate.

    Science.gov (United States)

    Schnaiberg, Lynn

    2001-01-01

    Describes the experiences of a teacher who teaches in the Cook County, Illinois, Juvenile Temporary Detention Center, explaining how her many roles include that of teacher, social worker, and surrogate mother to the children. She also frequently deals with issues of race, since 65 percent of the students are African American. (SM)

  19. Information Literacy Advocates: developing student skills through a peer support approach.

    Science.gov (United States)

    Curtis, Ruth

    2016-12-01

    Since 2013/2014, an Information Literacy Advocates (ILA) scheme has been running at the University of Nottingham as an extracurricular module on the Nottingham Advantage Award programme. The Information Literacy Advocates scheme, which recruits medicine and health sciences students in their second year or above, aims to facilitate development of information literacy skills and confidence, as well as communication, organisation and teamwork, through the provision of peer support. Previous research indicates peer assistance effectively enhances such skills and is valued by fellow students who welcome the opportunity to approach more experienced students for help. This article, written by guest writer Ruth Curtis from the University of Nottingham, provides an overview of administering the ILA scheme and explores its impact on the Information Literacy Advocates, peers and librarians, and discusses future developments for taking the scheme forward. H. S. © 2016 Health Libraries Group.

  20. Secondary traumatic stress among domestic violence advocates: workplace risk and protective factors.

    Science.gov (United States)

    Slattery, Suzanne M; Goodman, Lisa A

    2009-11-01

    This study identified workplace factors associated with secondary traumatic stress (STS) in a sample of 148 domestic violence advocates working in diverse settings. Findings indicate that coworker support and quality clinical supervision are critical to emotional well-being and that an environment in which there is shared power-that is, respect for diversity, mutuality, and consensual decision making-provides better protection for advocates than more traditional, hierarchical organizational models. Furthermore, shared power emerged as the only workplace variable to significantly predict STS above and beyond individual factors. The discussion includes implications for practice and policy as well as directions for future research.

  1. Advancement Staff and Alumni Advocates: Cultivating LGBTQ Alumni by Promoting Individual and Community Uplift

    Science.gov (United States)

    Garvey, Jason C.; Drezner, Noah D.

    2013-01-01

    Using a constructivist case-study analysis, we explore philanthropy toward higher education among lesbian, gay, bisexual, transgender, and queer (LGBTQ) alumni, examining the role of advancement staff and alumni advocates in engaging LGBTQ alumni to promote individual and community uplift. Data come from focus groups with 37 advancement staff and…

  2. Academics and Advocates: Using Participatory Action Research To Influence Welfare Policy.

    Science.gov (United States)

    Quoss, Bernita; Cooney, Margaret; Longhurst, Terri

    2000-01-01

    Participatory action research is a useful technique for helping low income groups access postsecondary education. Conducting research involving analysis of the use of surplus welfare funds and federal regulations and advocating policy changes by explaining the benefits of public investment in postsecondary education are two roles for consumer…

  3. Using Action Research to Assess and Advocate for Innovative School Library Design

    Science.gov (United States)

    Harper, Meghan; Deskins,Liz

    2015-01-01

    This article describes a collaborative project designed to use action research to assess and advocate for innovative design changes in a school library. The high school library was in its fifth year of service, and yet the layout of the library was not meeting the learning and technological needs of 21st-century high school students. The purpose…

  4. Beyond the Playing Field: Jackie Robinson, Civil Rights Advocate. Lesson Plan.

    Science.gov (United States)

    National Archives and Records Administration, Washington, DC.

    This packet provides primary source documents and lesson plans relating to the study of Jackie Robinson as a civil rights advocate. The legendary baseball player, Jack Roosevelt Robinson, was the first black man to "officially" play in the big leagues in the 20th century. Jackie Robinson was not only a stellar baseball player, but he…

  5. Dare We Not Teach 9/11 yet Advocate Citizenship Education?

    Science.gov (United States)

    Waterson, Robert A.; Haas, Mary E.

    2011-01-01

    The authors advocate for systematic teaching of 9/11 within the social studies curriculum (K-16). The examination of the issues and impact of 9/11 illustrate the power of civic education in a democracy. Illustrated are the key concepts and associated issues and values of 9/11 with the National Council for the Social Studies curriculum standards.…

  6. Be Your Own Best Advocate. PACER Center ACTion Information Sheets. PHP-c116

    Science.gov (United States)

    PACER Center, 2006

    2006-01-01

    Being a self-advocate means asking for what one needs while respecting the needs of others. Self-advocacy is asking for what is needed in a direct, respectful manner. It is an important skill to acquire because self-advocacy helps: (1) Obtain what is needed; (2) People make personal choices; (3) Learn to say no without feeling guilty; and (4)…

  7. Librarians and OER: Cultivating a Community of Practice to Be More Effective Advocates

    Science.gov (United States)

    Smith, Brenda; Lee, Leva

    2017-01-01

    As the costs of scholarly and educational publications skyrocket, open educational resources (OER) are becoming an important way to provide content and enhance the teaching and learning experience. Librarians have a key role to play in developing, advocating, and managing OER. For many librarians, however, championing OERs means adding an…

  8. Sexual Assault Nurse Examiners' Perceptions of Their Relationship with Doctors, Rape Victim Advocates, Police, and Prosecutors

    Science.gov (United States)

    Maier, Shana L.

    2012-01-01

    In response to the negative and inefficient treatment of rape victims by emergency room personnel, the first Sexual Assault Nurse Examiner (SANE) programs began in the late 1970s. While SANEs, doctors, rape victim advocates, police officers and prosecutors work together to ensure the most comprehensive and sensitive care of rape victims, they all…

  9. Title XX: Social Services in Your State. A Child Advocate's Handbook for Action.

    Science.gov (United States)

    Children's Defense Fund, Washington, DC.

    This booklet is a guide for those wishing to route Title XX money into the community programs for children. Part I discusses ways for child advocates to participate in four key stages of the Title XX planning process in their state: planning proposals, raising the 25% non-federal share of the funds required by Title XX, and publishing proposed and…

  10. Advocating for Safe Schools, Positive School Climate, and Comprehensive Mental Health Services

    Science.gov (United States)

    Cowan, Katherine C.; Vaillancourt, Kelly

    2013-01-01

    The tragedy at Sandy Hook Elementary School, Newtown, CT (USA) has brought the conversation about how to reduce violence, make schools safer, improve school climate, and increase access to mental health services to the forefront of the national conversation. Advocating for comprehensive initiatives to address school safety, school climate, and…

  11. Connecting Children to the Future: A Telecommunications Policy Guide for Child Advocates.

    Science.gov (United States)

    Center for Media Education, Washington, DC.

    New digital technologies and the rapid growth of the Internet are restructuring communications systems and transforming education and the economy. Noting that many of the resulting telecommunications policies will be made at the state level, this publication provides guidelines for child advocates to influence state policy regarding children's use…

  12. Two Good Gay Teachers: Pioneering Advocate-Practitioners Confronting Homophobia in Schooling in British Columbia, Canada

    Science.gov (United States)

    Grace, André P.

    2017-01-01

    This article investigates the political, cultural, and educational work of two pioneering Canadian gay teachers during the 1990s: James Chamberlain and Murray Corren. These advocate-practitioners took up roles as social activists, cultural workers, and engaged teachers whose transgressive acts focused on the social and cultural transformation of…

  13. Peer Assessment and Compliance Review (PACR) Innovative Strategies Report. California Court Appointed Special Advocates (CASA) Programs

    Science.gov (United States)

    Macro, Bronwen; Huang, Lee Ann

    2005-01-01

    This report focuses on the innovative strategies study component of the Peer Assessment and Compliance Review (PACR) project. California (Court Appointed Special Advocates) CASA programs have developed many innovative strategies to serve children in their communities. At each of the programs visited during the PACR project, the team identified at…

  14. Are Leaders Influenced by Advocates in Decisions on Special Education Eligibility?

    Science.gov (United States)

    Kirkland, Erin K. B.; Bauer, Scott C.

    2016-01-01

    The purpose of this study was to investigate the influence of the opinions of private practitioners and educational advocates on instructional leaders' decision-making processes when making a recommendation for special education eligibility. School-based administrators (n = 56) with varying years of experience as special education administrators…

  15. Get the lead out: Wildlife advocates file suit to replace toxic ammo ...

    African Journals Online (AJOL)

    2007-03-02

    Mar 2, 2007 ... Get the lead out: Wildlife advocates file suit to replace toxic ammo with safer alternatives. Simple, practical ... who eats game, which often contains shot or small metal fragments. Lead is an extremely toxic ... eating meat from animals taken with lead ammunition often have unhealthy lead levels in their own ...

  16. Social values and solar energy policy: the policy maker and the advocate

    Energy Technology Data Exchange (ETDEWEB)

    Shama, A.; Jacobs, K.

    1980-07-01

    Solar energy policy makers and advocates have significantly different hierarchies (clusters) of values upon which they evaluate the adoption of solar technologies. Content analysis, which examines the frequency with which policy makers identify different types of values, indicates that they hold economic values to be of primary importance. Environmental, social, and national security values are also substantial elements of the policy makers' value clusters associated with solar energy. This finding is confirmed by a qualitative analysis of policy makers' values. Advocates, on the other hand, assign almost equal weights (33%) to economic values and social values, slightly less weight to environmental values, and significant attention to ethical and security values as well. These results of frequency analysis are made somewhat more complicated by a qualitative interpretation of the advocates' positions. As part of their more holistic approach, several of the advocates indicated that all values discussed by them are instrumental toward achieving higher-order, ethical and environmental values. In addition, our preliminary investigation indicates that neither group is entirely homogeneous. Testing this and other propositions, as well as obtaining a similar picture of the values which the public associates with solar energy, are topics of future research.

  17. Content-Specific Strategies to Advocate for Lesbian, Gay, Bisexual, and Transgender Youth: An Exploratory Study

    Science.gov (United States)

    Graybill, Emily C.; Varjas, Kris; Meyers, Joel; Watson, Laurel B.

    2009-01-01

    Researchers suggest that supportive school personnel may decrease some of the challenges encountered by lesbian, gay, bisexual, and transgender (LGBT) youth in schools (Russell, Seif, & Truong, 2001); however, little is known about the approaches used by school-based advocates for LGBT youth. This exploratory study investigated the strategies used…

  18. Reconstructing Parents’ Meetings in Primary Schools: The Teacher as Expert, the Parent as Advocate and the Pupil as Self-Advocate

    Directory of Open Access Journals (Sweden)

    Gillian Inglis

    2012-01-01

    Full Text Available The efficacy of parents’ meetings in primary schools in the UK is anarea in need of research. This article uses an approach informed by grounded theory to explore the experiences and satisfaction of parents, teachers and pupils regarding bi-annual meetings to discuss pupil progress. A two-phase approach was utilised, with diary-interviews with parents and teachers and group pupil interviews in Phase 1, followed by a parents’ questionnaire in Phase 2 derived from Phase 1 data. The findings from a doctoral study provide an overall more positive depiction of these meetings compared to existing research in the secondary sector. A model of the teacher as the expert and information-giver persists, but a consumerist ideology appears evident as parents seek to participate and advocate on behalf of their child. As parents become more proactive and teachers act to retain their professional authority, the interaction of the professional and advocate has excluded the perspective of the child. This leaves pupils in search of self-advocacy at meetings in which they are the object of discussion, but cannot be present. While pupils generally favour involvement, adults express a protectionist perspective on pupil exclusion with exceptional factors indicated as being the age of the child and the content of the meeting.

  19. The President's pleasant surprise: how LGBT advocates ended Don't Ask, Don't Tell.

    Science.gov (United States)

    Frank, Nathaniel

    2013-01-01

    This study assesses the role of LGBT advocates in repealing the military's Don't Ask, Don't Tell policy in the U.S. Congress. It draws on the author's direct involvement with that effort as well as personal interviews and media evidence to consider the contributions of the Obama Administration, members of Congress, the media, and individuals and pressure groups in the repeal process. It argues that repeal succeeded not because of the effective implementation of a White House plan but because the pressure of LGBT advocates ultimately shattered several key obstacles including inadequate messaging and dysfunction and inertia among both politicians and interest groups in Washington. The article offers insight into the role of public pressure in forwarding social change.

  20. Domestic Violence Offender Treatment and Multidisciplinary Treatment Teams: The Role of "Treatment" Victim Advocates.

    Science.gov (United States)

    Richards, Tara N; Gover, Angela R

    2018-03-01

    In Colorado, "treatment victim advocates" (TVAs) serve alongside providers and probation/parole officers on "multidisciplinary treatment teams" (MTTs) to oversee domestic violence offender's treatment. Although this model provides an opportunity for victim safety concerns to be heard, the utility of using victim advocates as advisors regarding interventions for domestic violence offenders has yet to be studied. Using survey data and narrative responses from TVAs ( N = 37), the current study examines the challenges and opportunities TVAs face while serving on MTTs. Results suggest that, overall, TVAs are successful in communicating with other members of the MTT, are confident that their perspectives are valued in the offender decision-making process, and are able to provide a wide variety of services and referrals to the victims with whom they are engaged. Implications and recommendations for the Colorado model as well as correctional professionals managing domestic violence offenders internationally are presented and discussed.

  1. The Technology-Enabled Patient Advocate: A Valuable Emerging Healthcare Partner.

    Science.gov (United States)

    Kent, Susan M; Yellowlees, Peter

    2015-12-01

    The U.S. healthcare system is changing and is becoming more patient-centered and technology-supported, with greater emphasis on population health outcomes and team-based care. The roles of healthcare providers are changing, and new healthcare roles are developing such as that of the patient advocate. This article reviews the history of this type of role, the changes that have taken place over time, the technological innovations in service delivery that further enable the role, and how the role could increasingly be developed in the future. Logical future extensions of the current typical patient advocate are the appearance of a virtual or avatar-driven care navigator, using telemedicine and related information technologies, as healthcare provision moves increasingly in a hybrid direction, with care being given both in-person and online.

  2. Erasmus of Rotterdam (1466-1536): renaissance advocate of the public role of medicine.

    Science.gov (United States)

    Albury, W R; Weisz, G M

    2003-08-01

    The great Renaissance scholar Erasmus of Rotterdam was a pioneering advocate of the importance of medicine for social as well as individual welfare. Erasmus' "Oration in praise of the art of medicine" (1518) illustrates his literary approach to this topic. Although the original version of his text did not address the state's role in promoting the health of the populace, Erasmus inserted new material on this topic into the "Oration" for a 1529 edition. This new material and references in some of his other writings from the same period indicate that it was in the 1520s that Erasmus first became a strong advocate of government intervention in public health matters. It is suggested that medical events in Erasmus' own life-his experiences both as a patient and as an observer of diseases-may explain why his interest in public health legislation increased significantly around this time.

  3. A thematic analysis for how patients, prescribers, experts, and patient advocates view the prescription choice process.

    Science.gov (United States)

    Schommer, Jon C; Worley, Marcia M; Kjos, Andrea L; Pakhomov, Serguei V S; Schondelmeyer, Stephen W

    2009-06-01

    Typically, patients are unaware of the cost consequences regarding prescribing decisions during their clinical encounter and rarely talk with their physicians about costs of prescription drugs. Prescription medications that are deemed by patients to be too costly when the costs become known after purchase are discontinued or used at suboptimal doses compared to prescription medications that are deemed to be worth the cost. To learn more about the prescription choice process from several viewpoints, the purpose of this study was to uncover and describe how patients, prescribers, experts, and patient advocates view the prescription choice process. Data were collected via 9 focus group interviews held between April 24 and July 31, 2007 (3 with patients, 3 with prescribers, 2 with experts, and 1 with patient advocates). The interviews were audiotaped and transcribed. The resulting text was analyzed in a descriptive and interpretive manner. Theme extraction was based on convergence and external divergence; that is, identified themes were internally consistent but distinct from one and another. To ensure quality and credibility of analysis, multiple analysts and multiple methods were used to provide a quality check on selective perception and blind interpretive bias that could occur through a single person doing all of the analysis or through employment of a single method. The findings revealed 5 overall themes related to the prescription choice process: (1) information, (2) relationship, (3) patient variation, (4) practitioner variation, and (5) role expectations. The results showed that patients, prescribers, experts, and patient advocates viewed the themes within differing contexts. It appears that the prescription choice process entails an interplay among information, relationship, patient variation, practitioner variation, and role expectations, with each viewed within different contexts by individuals engaged in such decision making.

  4. It's All in the Lens: Differences in Views on Obesity Prevention between Advocates and Policy Makers

    Science.gov (United States)

    Jones, Ellen; Nguyen, Leah; Kong, Jooyoung; Brownson, Ross C.; Bailey, Jessica H.

    2012-01-01

    Abstract Background: Intervention strategies to reduce obesity include policy and environmental changes that are designed to provide opportunities, support, and cues to help people develop healthier behaviors. Policy changes at the state level are one way to influence access, social norms, and opportunities for better nutrition and increased physical activity among the population. Methods: Ten states were selected for a broad variance in obesity rates and number of enacted obesity prevention policies during the years of 2006–2009. Within the selected states, a purely qualitative study of attitudes of childhood obesity policy using semistructured telephone interviews was conducted. Interviews were conducted with state policy makers who serve on public health committees. A set of six states that had more than eight childhood obesity policies enacted were selected for subsequent qualitative interviews with a convenience sample of well-established advocates. Results: Policy makers in states where there was more childhood obesity policy action believed in the evidence behind obesity policy proposals. Policy makers also varied in the perception of obesity as a constituent priority. The major differences between advocates and policy makers included a disconnect in information dissemination, opposition, and effectiveness of these policies. Conclusions: The findings from this study show differences in perceptions among policy makers in states with a greater number of obesity prevention bills enacted. There are differences among policy makers and advocates regarding the role and effectiveness of state policy on obesity prevention. This presents an opportunity for researchers and practitioners to improve communication and translation of evidence to policy makers, particularly in states with low legislation. PMID:22799551

  5. Enhancing Police Responses to Domestic Violence Incidents: Reports From Client Advocates in New South Wales.

    Science.gov (United States)

    Goodman-Delahunty, Jane; Crehan, Anna Corbo

    2016-07-01

    In an online survey about experiences with the police complaint system, 239 client advocates described a recent incident in which a client with grounds to lodge a complaint declined to do so. Almost one third of those incidents involved domestic violence. Thematic analysis of case descriptions revealed that many police did not take domestic violence reports seriously. A typology of problematic police conduct was developed. Many officers failed to observe current procedures and appeared to lack knowledge of relevant laws. Citizens feared retaliatory victimization by police and/or perceived that complaining was futile. Implications of these findings are reviewed in light of procedural justice theory. © The Author(s) 2015.

  6. Development and Evaluation of Training for Rural LGBTQ Mental Health Peer Advocates.

    Science.gov (United States)

    Israel, Tania; Willging, Cathleen; Ley, David

    2016-01-01

    Lesbian, gay, bisexual, transgender, and queer/questioning (LGBTQ) people in rural areas experience negative mental health consequences of minority stress, and encounter multiple barriers to accessing mental health and substance use treatment services. As part of a larger intervention study, we developed and piloted a unique training program to prepare peer advocates for roles as paraprofessionals who assist rural LGBTQ people with mental health needs. Thirty-seven people in New Mexico took part in either the initial training or a second revised training to improve their knowledge and skills to address LGBTQ mental health needs. Evaluation of this training consisted of self-administered structured assessments, focus groups, and open-ended interviews. Results for the initial training showed no significant increases from pre- and post-test scores on knowledge about LGBTQ people and their mental health issues, whereas significant increases were detected for the revised training. There also were significant increases in self-efficacy to perform tasks associated with the peer advocate role for all but a subset of tasks for the revised training. Qualitative data reveal that participants appreciated the opportunity to increase information and skills, especially concerning bisexual and transgender persons, and the opportunity to connect with others in the community who want to support LGBTQ people.

  7. Expert searcher, teacher, content manager, and patient advocate: an exploratory study of clinical librarian roles.

    Science.gov (United States)

    Tan, Maria C; Maggio, Lauren A

    2013-01-01

    The research explored the roles of practicing clinical librarians embedded in a patient care team. Six clinical librarians from Canada and one from the United States were interviewed to elicit detailed descriptions of their clinical roles and responsibilities and the context in which these were performed. Participants were embedded in a wide range of clinical service areas, working with a diverse complement of health professionals. As clinical librarians, participants wore many hats, including expert searcher, teacher, content manager, and patient advocate. Unique aspects of how these roles played out included a sense of urgency surrounding searching activities, the broad dissemination of responses to clinical questions, and leverage of the roles of expert searcher, teacher, and content manager to advocate for patients. Detailed role descriptions of clinical librarians embedded in patient care teams suggest possible new practices for existing clinical librarians, provide direction for training new librarians working in patient care environments, and raise awareness of the clinical librarian specialty among current and budding health information professionals.

  8. Why health advocates must get involved in development economics: the case of the International Monetary Fund.

    Science.gov (United States)

    Rowden, Rick

    2010-01-01

    International health advocates have traditionally focused on calling for external strategies for achieving health goals in developing countries, such as more foreign aid, foreign direct investment, loans, and debt cancellation, as opposed to internal approaches, such as building domestic productive capacity and accumulating capital. They have largely neglected questions of development economics, particularly the effectiveness, or lack thereof, of the currently dominant neoliberal development model promoted by the rich countries and aid agencies for poor countries. While critics have been correct to blame the International Monetary Fund for its policies curtailing public health spending in developing countries, their analysis generally neglects the underlying issue of why developing countries are seemingly unable to build their domestic tax base on which health budgets depend. International health advocates should engage with such macroeconomic questions and challenge the failures of the dominant neoliberal economic model that blocks countries from industrializing and building their own productive capacities with which to generate their own resources for financing their health budgets over time.

  9. The Role of Non-Governmental Organization (NGO in Advocating the National Security Bill

    Directory of Open Access Journals (Sweden)

    Yusa Djuyandi

    2016-05-01

    Full Text Available The role run by a coalition of NGOs in advocating the National Security Bill aimed at encouraging the birth of national security policy to appropriate to the purpose of reform. However, until now the role of NGOs in advocating National Security Bill has not been able to encourage the authorities to reconstruct the draft of national security policy that is consistent with the objectives of security sector reform. This study is conducted to analyze the role of NGOs in the security sector reform in Indonesia, particularly through the advocacy of the National Security Bill. The method used in this study is a qualitative method. The result shows that NGOs, which are members of the KMSRK, have been running the multiple roles, such as: popularly involved in policy making, providing political education to the community, promoting or encouraging reform, and promoting the interests of the community. The study also suggests the existence of new findings of the role of NGOs, which is forming a coherent unity of interests.

  10. Reflections on the contributions of self-advocates to an interdisciplinary leadership development program for graduate students in health affairs.

    Science.gov (United States)

    Rosenberg, Angela; Zuver, Deborah; Kermon, McCafferty; Fernandez, Claudia; Margolis, Lewis H

    2018-04-01

    To advance equity and to enhance leadership skills, self-advocates with intellectual/developmental disabilities are now part of the cohort of trainees in the University of North Carolina LEND, which means that they fully participate in the Interdisciplinary Leadership Development Program, a collaboration among programs in public health, social work, and LEND, which meets monthly. Given this important new participation by self-advocates, this study analyzes the reflections of graduate students on the contributions of self-advocates to their leadership training. At the conclusion of the program each year, graduate students respond to a questionnaire about how self-advocates influenced the content and interactions/discussions of the monthly workshops and are asked to provide specific examples to explain their perceptions. The 12 MCH leadership competencies were used to guide the coding of the comments for this qualitative, directed content analysis. Forty-six of 58 students (79.3%) from two consecutive cohorts responded for this cross-sectional study. Interactions with self-advocates prompted comments on 8 of the 12 leadership competencies, including interdisciplinary team building (29% of the comments); developing others through teaching and mentoring (22%); and self-reflection (18%). The inclusion of self-advocates throughout an interdisciplinary leadership development program for graduate students in health affairs can strengthen MCH leadership competencies for all participants as they enter an increasingly interdisciplinary workforce. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. Bridging the gap between knowledge and health: the epidemiologist as Accountable Health Advocate ("AHA!").

    Science.gov (United States)

    Dowdy, David W; Pai, Madhukar

    2012-11-01

    Epidemiology occupies a unique role as a knowledge-generating scientific discipline with roots in the knowledge translation of public health practice. As our fund of incompletely-translated knowledge expands and as budgets for health research contract, epidemiology must rediscover and adapt its historical skill set in knowledge translation. The existing incentive structures of academic epidemiology - designed largely for knowledge generation - are ill-equipped to train and develop epidemiologists as knowledge translators. A useful heuristic is the epidemiologist as Accountable Health Advocate (AHA) who enables society to judge the value of research, develops new methods to translate existing knowledge into improved health, and actively engages with policymakers and society. Changes to incentive structures could include novel funding streams (and review), alternative publication practices, and parallel frameworks for professional advancement and promotion.

  12. Biological processes for advancing lignocellulosic waste biorefinery by advocating circular economy.

    Science.gov (United States)

    Liguori, Rossana; Faraco, Vincenza

    2016-09-01

    The actualization of a circular economy through the use of lignocellulosic wastes as renewable resources can lead to reduce the dependence from fossil-based resources and contribute to a sustainable waste management. The integrated biorefineries, exploiting the overall lignocellulosic waste components to generate fuels, chemicals and energy, are the pillar of the circular economy. The biological treatment is receiving great attention for the biorefinery development since it is considered an eco-friendly alternative to the physico-chemical strategies to increase the biobased product recovery from wastes and improve saccharification and fermentation yields. This paper reviews the last advances in the biological treatments aimed at upgrading lignocellulosic wastes, implementing the biorefinery concept and advocating circular economy. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Coleman Advocates for Children And Youth: a pioneering child advocacy organization (1974-2008).

    Science.gov (United States)

    Carnochan, Sarah; Austin, Michael J

    2011-01-01

    Coleman Advocates for Youth and Children is a pioneering 30-year-old child advocacy organization founded by several affluent community members and children's service professionals to stop housing abused and neglected children in juvenile hall. Today, low-income youth and parents in families of color are now assuming leadership in developing a unique hybrid approach that integrates community organizing with more traditional child advocacy strategies and focuses on increasing affordable housing and improving the city's educational system. The strategies employed by Coleman have also evolved, shifting from insider advocacy with administrative officials to public campaigns targeting the city budget process, to local initiative campaigns, and most recently to electoral politics. This organizational history features the issues mission and structure, leadership, managing issues, advocacy strategies and community relations, and funding.

  14. The long-term effects of the Houston Child Advocates, Inc., program on children and family outcomes.

    Science.gov (United States)

    Waxman, Hersh C; Houston, W Robert; Profilet, Susan M; Sanchez, Betsi

    2009-01-01

    The objective of the study is to investigate the longitudinal effects of the Houston Child Advocates, Inc., program on children's outcomes. The treatment group consisted of children in the court system that were assigned Child Advocates volunteers, and the comparison children were chosen randomly from a similar population of children. The treatment group had significantly higher scores on the protective factor and family functioning measures and received more social services than those in the comparison group. Children in the treatment group also had significantly fewer placement changes and did better academically and behaviorally in school than children in the comparison group.

  15. Dog fight: Darwin as animal advocate in the antivivisection controversy of 1875.

    Science.gov (United States)

    Feller, David Allan

    2009-12-01

    The traditional characterization of Charles Darwin as a strong advocate of physiological experimentation on animals was posited in Richard French's Antivivisection and medical science in Victorian England (1975), where French portrayed him as a soldier in Thomas Huxley's efforts to preserve anatomical experimentation on animals unfettered by government regulation. That interpretation relied too much on, inter alia, Huxley's own description of the legislative battles of 1875, and shared many historians' propensity to foster a legacy of Darwin as a leader among a new wave of scientists, even where personal interests might indicate a conflicting story. Animal rights issues concerned more than mere science for Darwin, however, and where debates over other scientific issues failed to inspire Darwin to become publicly active, he readily joined the battle over vivisection, helping to draft legislation which, in many ways, was more protective of animal rights than even the bills proposed by his friend and anti-vivisectionist, Frances Power Cobbe. Darwin may not have officially joined Cobbe's side in the fight, but personal correspondence of the period between 1870 and 1875 reveals a man whose first interest was to protect animals from inhumane treatment, and second to protect the reputations of those men and physiologists who were his friends, and who he believed incapable of inhumane acts. On this latter point he and Cobbe never did reach agreement, but they certainly agreed on the humane treatment of animals, and the need to proscribe various forms of animal experimentation.

  16. Trade policy governance: What health policymakers and advocates need to know.

    Science.gov (United States)

    Jarman, Holly

    2017-11-01

    Trade policies affect determinants of health as well as the options and resources available to health policymakers. There is therefore a need for health policymakers and related stakeholders in all contexts to understand and connect with the trade policymaking process. This paper uses the TAPIC (transparency, accountability, participation, integrity, capacity) governance framework to analyze how trade policy is commonly governed. I conclude that the health sector is likely to benefit when transparency in trade policymaking is increased, since trade negotiations to date have often left out health advocates and policymakers. Trade policymakers and negotiators also tend to be accountable to economic and trade ministries, which are in turn accountable to economic and business interests. Neither tend to appreciate the health consequences of trade and trade policies. Greater accountability to health ministries and interests, and greater participation by them, could improve the health effects of trade negotiations. Trade policies are complex, requiring considerable policy capacity to understand and influence. Nevertheless, investing in understanding trade can pay off in terms of managing future legal risks. Copyright © 2017. Published by Elsevier B.V.

  17. Preventing Filipino Mental Health Disparities: Perspectives from Adolescents, Caregivers, Providers, and Advocates.

    Science.gov (United States)

    Javier, Joyce R; Supan, Jocelyn; Lansang, Anjelica; Beyer, William; Kubicek, Katrina; Palinkas, Lawrence A

    2014-12-01

    Filipino Americans are the second largest immigrant population and second largest Asian ethnic group in the U.S. Disparities in youth behavioral health problems and the receipt of mental health services among Filipino youth have been documented previously. However, few studies have elicited perspectives from community stakeholders regarding how to prevent mental health disparities among Filipino youth. The purpose of the current study is to identify intervention strategies for implementing mental health prevention programs among Filipino youth. We conducted semi-structured interviews (n=33) with adolescents, caregivers, advocates, and providers and focus groups (n=18) with adolescents and caregivers. Interviews were audio taped and transcribed verbatim. Transcripts were analyzed using a methodology of "coding consensus, co-occurrence, and comparison" and was rooted in grounded theory. Four recommendations were identified when developing mental health prevention strategies among Filipino populations: address the intergenerational gap between Filipino parents and children, provide evidence-based parenting programs, collaborate with churches in order to overcome stigma associated with mental health, and address mental health needs of parents. Findings highlight the implementation of evidence-based preventive parenting programs in faith settings as a community-identified and culturally appropriate strategy to prevent Filipino youth behavioral health disparities.

  18. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    Bernard, Jean-Francois

    1989-01-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  19. Are the advocates of nuclear power and the adversaries listening to each other?

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Jean-Francois [Electricite de France, Engineering and Construction Division, Sites-Environment-Information Branch, 22-30, avenue de Wagram, 75008, Paris (France)

    1989-07-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting.

  20. Using a Domestic and Sexual Violence Prevention Advocate to Implement a Dating Violence Prevention Program with Athletes

    Science.gov (United States)

    Jaime, M. C. D.; Stocking, M.; Freire, K.; Perkinson, L.; Ciaravino, S.; Miller, E.

    2016-01-01

    "Coaching Boys into Men" is an evidence-based dating violence prevention program for coaches to implement with male athletes. A common adaptation of this program is delivery by domestic violence and sexual violence prevention advocates instead of coaches. We explored how this implementer adaptation may influence athlete uptake of program…

  1. 39 CFR Appendix A to Part 3002 - Postal Regulatory Commission, Mission Statement of the Office of the Consumer Advocate

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Postal Regulatory Commission, Mission Statement of the Office of the Consumer Advocate A Appendix A to Part 3002 Postal Service POSTAL REGULATORY COMMISSION PERSONNEL ORGANIZATION Pt. 3002, App. A Appendix A to Part 3002—Postal Regulatory Commission, Mission Statement of the Office of the Consumer...

  2. Advocates for Women's Sports Say 1988 Civil-Rights Act Has Not Brought Hoped-for Equity with Men.

    Science.gov (United States)

    Oberlander, Susan

    1989-01-01

    The passage of the Civil Rights Restoration Act of 1988 was seen by advocates of women's sports as a powerful tool to redress sex imbalances in college sports programs, but few sex discrimination complaints have been filed as a result. The reasons are disputed and not fully understood. (MSE)

  3. Being and Becoming a Teacher: How African American and White Preservice Teachers Envision Their Future Roles as Teacher Advocates

    Science.gov (United States)

    Mawhinney, Lynnette; Rinke, Carol R.; Park, Gloria

    2012-01-01

    This article captures the life histories and professional futures of preservice teachers at three institutions of higher education. In this article, we focus on the experiences and expectations of 4 preservice teachers. We find that, although African American and White preservice teachers both see themselves as advocates for their students, they…

  4. FEAST: Empowering Community Residents to Use Technology to Assess and Advocate for Healthy Food Environments.

    Science.gov (United States)

    Sheats, Jylana L; Winter, Sandra J; Romero, Priscilla Padilla; King, Abby C

    2017-04-01

    Creating environments that support healthy eating is important for successful aging, particularly in light of the growing population of older adults in the United States. There is an urgent need to identify innovative upstream solutions to barriers experienced by older adults in accessing and buying healthy food. FEAST (Food Environment Assessment STudy) is an effort that is part of the global Our Voice initiative, which utilizes a combination of technology and community-engaged methods to empower citizen scientists (i.e., community residents) to: (1) use the Healthy Neighborhood Discovery Tool (Discovery Tool) mobile application to collect data (geocoded photos, audio narratives) about aspects of their environment that facilitate or hinder healthy living; and (2) use findings to advocate for change in partnership with local decision and policy makers. In FEAST, 23 racially/ethnically diverse, low-income, and food-insecure older adults residing in urban, North San Mateo County, CA, were recruited to use the Discovery Tool to examine factors that facilitated or hindered their access to food as well as their food-related behaviors. Participants collectively reviewed data retrieved from the Discovery Tool and identified and prioritized important, yet feasible, issues to address. Access to affordable healthy food and transportation were identified as the major barriers to eating healthfully and navigating their neighborhood food environments. Subsequently, participants were trained in advocacy skills and shared their findings with relevant decision and policymakers, who in turn dispelled myths and discussed and shared resources to address relevant community needs. Proximal and distal effects of the community-engaged process at 3, 6, 12, and 24 months were documented and revealed individual-, community-, and policy-level impacts. Finally, FEAST contributes to the evidence on multi-level challenges that low-income, racially/ethnically diverse older adults experience

  5. Awareness and predictors of female genital mutilation/cutting among young health advocates.

    Science.gov (United States)

    Abolfotouh, Sherif M; Ebrahim, Ahmed Z; Abolfotouh, Mostafa A

    2015-01-01

    The act of female genital mutilation/cutting (FGM/C) is considered internationally as a violent act against girls and women and a violation of their human rights. This study sought to assess the awareness and predictors of FGM/C in young Egyptian health advocates. A cross-sectional study of 600 medical students from a total of 2,500 members of the International Federation of Medical Students' Associations (IFMSA)-Egypt, across all Egyptian medical schools, was conducted using a previously validated online Google survey. The overall prevalence of circumcision was 14.7/100 female students, with a significantly higher prevalence in students from rural areas (25%) than in non-rural areas (10.8%, P=0.001), and in those residing in Upper (southern) Egypt (20.6%) than in Lower (northern) Egypt (8.7%, P=0.003). The students' mean percentage score for knowledge about the negative health consequences of FGM/C was 53.50±29.07, reflecting a modest level of knowledge; only 30.5% had a good level of knowledge. The mean percentage score for the overall attitude toward discontinuation of the practice of FGM/C was 76.29±17.93, reflecting a neutral attitude; 58.7% had a favorable attitude/norms toward discontinuation of the practice. Of circumcised students, approximately one-half (46.8%) were unwilling to have their daughters circumcised, and 60% reported no harm from being circumcised. After controlling for confounders, a negative attitude toward FGM/C was significantly (Pdrive a change in attitude toward discontinuation of this harmful practice.

  6. Building Community Through a #pulmcc Twitter Chat to Advocate for Pulmonary, Critical Care, and Sleep.

    Science.gov (United States)

    Carroll, Christopher L; Bruno, Kristi; Ramachandran, Pradeep

    2017-08-01

    Social media sites such as Twitter can significantly enhance education and advocacy efforts. In 2013, the American College of Chest Physicians (CHEST) launched a Twitter chat series using the hashtag #pulmcc to educate and advocate for topics related to pulmonary, critical care, and sleep medicine. To assess the reach of these chats, we analyzed the metrics using Symplur analytics, and compared data from each chat, as well as participant data. Since December 19, 2013, there have been 12 Twitter chats: six have been on critical care-related topics, four have been on pulmonary-/sleep-related topics, and two have been conducted during the CHEST annual meeting on more general topics. During these 1-h Twitter chats, there were a total of 4,212 tweets by 418 participants, resulting in 9,361,519 impressions (ie, views). There were similar numbers of participants and tweets in the three categories of Twitter chats, but there was a significantly greater reach during the more general Twitter chats conducted at the CHEST annual meeting, with 1,596,013 ± 126,472 impressions per chat session at these chats, compared with 739,203 ± 73,109 impressions per chat session during the critical care Twitter chats and 621,965 ± 123,933 impressions per chat session in the pulmonary/sleep chats. Seventy-five participants participated in two or more #pulmcc Twitter chats, and the average percent of return participants in each chat was 30% ± 7%. Most of the return participants were health-care providers. Twitter chats can be a powerful tool for the widespread engagement of a medical audience. Copyright © 2017 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  7. Advocates, interest groups and Australian news coverage of alcohol advertising restrictions: content and framing analysis.

    Science.gov (United States)

    Fogarty, Andrea S; Chapman, Simon

    2012-08-31

    Legislating restrictions on alcohol advertising is a cost-effective measure to reduce consumption of alcohol. Yet Australia relies upon industry self-regulation through voluntary codes of practice regarding the content, timing and placement of alcohol advertising. Ending industry self-regulation was recommended by the National Preventative Health Taskforce; a suggestion contested by the drinks industry. Debates about emerging alcohol-control policies regularly play out in the news media, with various groups seeking to influence the discussion. This paper examines news coverage of recommendations to restrict alcohol advertising to see how supporters and opponents frame the debate, with a view to providing some suggestions for policy advocates to advance the discussion. We used content and framing analyses to examine 329 Australian newspaper items mentioning alcohol advertising restrictions over 24 months. All items were coded for mentions of specific types of advertising and types of advertising restrictions, the presence of news frames that opposed or endorsed advertising restrictions, statements made within each frame and the news-actors who appeared. Restrictions were the main focus in only 36% of 329 items. Alcohol advertising was conceived of as television (47%) and sport-related (56%). Restrictions were mentioned in non-specific terms (45%), or specified as restrictions on timing and placement (49%), or content (22%). Public health professionals (47%) appeared more frequently than drinks industry representatives (18%). Five supportive news frames suggested the policy is a sensible public health response, essential to protect children, needed to combat the drinks industry, required to stop pervasive branding, or as only an issue in sport. Four unsupportive frames positioned restrictions as unnecessary for a responsible industry, an attack on legitimate commercial activities, ineffective and 'nannyist', or inessential to government policy. Support varied among

  8. Advocates, interest groups and Australian news coverage of alcohol advertising restrictions: content and framing analysis

    Science.gov (United States)

    2012-01-01

    Background Legislating restrictions on alcohol advertising is a cost-effective measure to reduce consumption of alcohol. Yet Australia relies upon industry self-regulation through voluntary codes of practice regarding the content, timing and placement of alcohol advertising. Ending industry self-regulation was recommended by the National Preventative Health Taskforce; a suggestion contested by the drinks industry. Debates about emerging alcohol-control policies regularly play out in the news media, with various groups seeking to influence the discussion. This paper examines news coverage of recommendations to restrict alcohol advertising to see how supporters and opponents frame the debate, with a view to providing some suggestions for policy advocates to advance the discussion. Methods We used content and framing analyses to examine 329 Australian newspaper items mentioning alcohol advertising restrictions over 24 months. All items were coded for mentions of specific types of advertising and types of advertising restrictions, the presence of news frames that opposed or endorsed advertising restrictions, statements made within each frame and the news-actors who appeared. Results Restrictions were the main focus in only 36% of 329 items. Alcohol advertising was conceived of as television (47%) and sport-related (56%). Restrictions were mentioned in non-specific terms (45%), or specified as restrictions on timing and placement (49%), or content (22%). Public health professionals (47%) appeared more frequently than drinks industry representatives (18%). Five supportive news frames suggested the policy is a sensible public health response, essential to protect children, needed to combat the drinks industry, required to stop pervasive branding, or as only an issue in sport. Four unsupportive frames positioned restrictions as unnecessary for a responsible industry, an attack on legitimate commercial activities, ineffective and ‘nannyist’, or inessential to government

  9. Advocates, interest groups and Australian news coverage of alcohol advertising restrictions: content and framing analysis

    Directory of Open Access Journals (Sweden)

    Fogarty Andrea S

    2012-08-01

    Full Text Available Abstract Background Legislating restrictions on alcohol advertising is a cost-effective measure to reduce consumption of alcohol. Yet Australia relies upon industry self-regulation through voluntary codes of practice regarding the content, timing and placement of alcohol advertising. Ending industry self-regulation was recommended by the National Preventative Health Taskforce; a suggestion contested by the drinks industry. Debates about emerging alcohol-control policies regularly play out in the news media, with various groups seeking to influence the discussion. This paper examines news coverage of recommendations to restrict alcohol advertising to see how supporters and opponents frame the debate, with a view to providing some suggestions for policy advocates to advance the discussion. Methods We used content and framing analyses to examine 329 Australian newspaper items mentioning alcohol advertising restrictions over 24 months. All items were coded for mentions of specific types of advertising and types of advertising restrictions, the presence of news frames that opposed or endorsed advertising restrictions, statements made within each frame and the news-actors who appeared. Results Restrictions were the main focus in only 36% of 329 items. Alcohol advertising was conceived of as television (47% and sport-related (56%. Restrictions were mentioned in non-specific terms (45%, or specified as restrictions on timing and placement (49%, or content (22%. Public health professionals (47% appeared more frequently than drinks industry representatives (18%. Five supportive news frames suggested the policy is a sensible public health response, essential to protect children, needed to combat the drinks industry, required to stop pervasive branding, or as only an issue in sport. Four unsupportive frames positioned restrictions as unnecessary for a responsible industry, an attack on legitimate commercial activities, ineffective and ‘nannyist’, or

  10. Awareness and predictors of female genital mutilation/cutting among young health advocates

    Directory of Open Access Journals (Sweden)

    Abolfotouh SM

    2015-02-01

    Full Text Available Sherif M Abolfotouh,1,2 Ahmed Z Ebrahim,1,3 Mostafa A Abolfotouh4 On Behalf of IFMSA-Egypt 1IFMSA-Egypt, Alexandria, Egypt; 2Oulu University Hospital, Oulu, Finland; 3Alexandria Faculty of Medicine, Alexandria, Egypt; 4King Abdullah International Medical Research Center (KAIMRC, King Saud bin-Abdulaziz University for Health Sciences, Riyadh, Saudi Arabia Abstract: The act of female genital mutilation/cutting (FGM/C is considered internationally as a violent act against girls and women and a violation of their human rights. This study sought to assess the awareness and predictors of FGM/C in young Egyptian health advocates. A cross-sectional study of 600 medical students from a total of 2,500 members of the International Federation of Medical Students’ Associations (IFMSA-Egypt, across all Egyptian medical schools, was conducted using a previously validated online Google survey. The overall prevalence of circumcision was 14.7/100 female students, with a significantly higher prevalence in students from rural areas (25% than in non-rural areas (10.8%, P=0.001, and in those residing in Upper (southern Egypt (20.6% than in Lower (northern Egypt (8.7%, P=0.003. The students’ mean percentage score for knowledge about the negative health consequences of FGM/C was 53.50±29.07, reflecting a modest level of knowledge; only 30.5% had a good level of knowledge. The mean percentage score for the overall attitude toward discontinuation of the practice of FGM/C was 76.29±17.93, reflecting a neutral attitude; 58.7% had a favorable attitude/norms toward discontinuation of the practice. Of circumcised students, approximately one-half (46.8% were unwilling to have their daughters circumcised, and 60% reported no harm from being circumcised. After controlling for confounders, a negative attitude toward FGM/C was significantly (P<0.001 in all cases associated with male sex, residency in Upper Egypt, rural origin, previous circumcision, and the preclinical

  11. A Randomized Controlled Trial Determining Variances in Ostomy Skin Conditions and the Economic Impact (ADVOCATE Trial).

    Science.gov (United States)

    Colwell, Janice C; Pittman, Joyce; Raizman, Rose; Salvadalena, Ginger

    To compare ostomy-related costs and incidence of peristomal skin complications (PSCs) for ceramide-infused ostomy skin barriers and control skin barriers. The ADVOCATE trial is a multi-centered randomized controlled trial, and double-blinded international study with an adaptive design. The sample comprised 153 adults from 25 sites from the United States, Canada, and Europe. Participants were seen in hospital and outpatient care settings. Data were collected by investigators at each site during face-to-face visits and during telephone check-in calls between visits. Cost of care data were collected using a questionnaire developed specifically for the study. The peristomal skin was assessed using the Ostomy Skin Tool. Health-related quality of life was measured using the SF-12v2. Patient-reported outcomes were collected using a patient-centered study-specific questionnaire. Cost of care was analyzed via analysis of covariance comparing total cost of care for 12 weeks between the 2 groups. The incidence of PSC was analyzed via Barnard's exact test comparing the incidence of PSCs between the control and treatment groups. Tertiary outcomes were exploratory in nature and not statistically powered. Use of the ceramide-infused barrier significantly reduced stoma-related cost of care over a 12-week period, resulting in a $36.46 decrease in cost (14% relative decrease). The adjusted average costs were $223.73 in the treatment group and $260.19 in the control group (P = .017). The overall incidence of PSCs in the study was 47.7%; PSC incidence was 40.5% for the treatment group versus 55.4% for controls (P = .069, 95% confidence interval of the difference: -1.2 to 30.4). Significantly more participants using the ceramide-infused skin barrier were "very satisfied" with barrier performance (75% vs 55%; P = .033), prevention of leakage (63% vs 38%; P < .01), and prevention of itching (53% vs 31%; P = .016). General postoperative improvement in health-related quality of life was

  12. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates.

    Science.gov (United States)

    Dellson, P; Nilbert, M; Bendahl, P-O; Malmström, P; Carlsson, C

    2011-07-01

    Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used in three clinical trials for breast cancer. Primary data collection was done in focus group interviews with breast cancer patient advocates. Content analysis identified three major themes: comprehensibility, emotions and associations, and decision making. Based on the advocates' suggestions for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials. © 2010 Blackwell Publishing Ltd.

  13. Neural Network Models for Time Series Forecasts

    OpenAIRE

    Tim Hill; Marcus O'Connor; William Remus

    1996-01-01

    Neural networks have been advocated as an alternative to traditional statistical forecasting methods. In the present experiment, time series forecasts produced by neural networks are compared with forecasts from six statistical time series methods generated in a major forecasting competition (Makridakis et al. [Makridakis, S., A. Anderson, R. Carbone, R. Fildes, M. Hibon, R. Lewandowski, J. Newton, E. Parzen, R. Winkler. 1982. The accuracy of extrapolation (time series) methods: Results of a ...

  14. Reef-fish larval dispersal patterns validate no-take marine reserve network connectivity that links human communities

    KAUST Repository

    Abesamis, Rene A.; Saenz-Agudelo, Pablo; Berumen, Michael L.; Bode, Michael; Jadloc, Claro Renato L.; Solera, Leilani A.; Villanoy, Cesar L.; Bernardo, Lawrence Patrick C.; Alcala, Angel C.; Russ, Garry R.

    2017-01-01

    Networks of no-take marine reserves (NTMRs) are a widely advocated strategy for managing coral reefs. However, uncertainty about the strength of population connectivity between individual reefs and NTMRs through larval dispersal remains a major

  15. Conceptions of Speech Acts in the Theory and Practice of Argumentation: A Case Study of a Debate About Advocating

    Directory of Open Access Journals (Sweden)

    Goodwin Jean

    2014-03-01

    Full Text Available Far from being of interest only to argumentation theorists, conceptions of speech acts play an important role in practitioners’ self-reflection on their own activities. After a brief review of work by Houtlosser, Jackson and Kauffeld on the ways that speech acts provide normative frameworks for argumentative interactions, this essay examines an ongoing debate among scientists in natural resource fields as to the appropriateness of the speech act of advocating in policy settings. Scientists’ reflections on advocacy align well with current scholarship, and the scholarship in turn can provide a deeper understanding of how to manage the communication challenges scientists face.

  16. Bringing a Network-Oriented Approach to Domestic Violence Services: A Focus Group Exploration of Promising Practices.

    Science.gov (United States)

    Goodman, Lisa A; Banyard, Victoria; Woulfe, Julie; Ash, Sarah; Mattern, Grace

    2016-01-01

    Despite powerful evidence that informal social support contributes to survivors' safety and well-being, mainstream domestic violence (DV) programs have not developed comprehensive models for helping isolated survivors re-engage with these networks. Although many advocates use network-oriented strategies informally, they often do so without resources, funding, or training. This qualitative focus group study explored advocates' use and perceptions of network-oriented strategies. Advocates working in a range of DV programs across one state described the importance of network-oriented work and articulated its five dimensions, including helping survivors build their capacity to form healthy relationships, identify helpful and harmful network members, re-engage with existing networks, develop new relationships, and respond more effectively to network members. © The Author(s) 2015.

  17. Networking activism: implications for Greece

    Directory of Open Access Journals (Sweden)

    Pantelis Vatikiotis

    2011-12-01

    Full Text Available The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-global interplay in protest culture along new mediating practices (beyond the creation of transnational publics, that of the implications of transnational networking for local social activism and identification, addressing relevant questions in the Greek context.

  18. Sex workers as peer health advocates: community empowerment and transformative learning through a Canadian pilot program.

    Science.gov (United States)

    Benoit, Cecilia; Belle-Isle, Lynne; Smith, Michaela; Phillips, Rachel; Shumka, Leah; Atchison, Chris; Jansson, Mikael; Loppie, Charlotte; Flagg, Jackson

    2017-08-30

    Social marginalization and criminalization create health and safety risks for sex workers and reduce their access to health promotion and prevention services compared to the general population. Community empowerment-based interventions that prioritize the engagement of sex workers show promising results. Peer-to-peer interventions, wherein sex workers act as educators of their colleagues, managers, clients and romantic partners, foster community mobilization and critical consciousness among sex workers and equip them to exercise agency in their work and personal lives. A pilot peer health education program was developed and implemented, with and for sex workers in one urban centre in Canada. To explore how the training program contributed to community empowerment and transformative learning among participants, the authors conducted qualitative interviews, asked participants to keep personal journals and to fill out feedback forms after each session. Thematic analysis was conducted on these three data sources, with emerging themes identified, organized and presented in the findings. Five themes emerged from the analysis. Our findings show that the pilot program led to reduced internalized stigma and increased self-esteem in participants. Participants' critical consciousness increased concerning issues of diversity in cultural background, sexual orientation, work experiences and gender identity. Participants gained knowledge about how sex work stigma is enacted and perpetuated. They also became increasingly comfortable challenging negative judgments from others, including frontline service providers. Participants were encouraged to actively shape the training program, which fostered positive relationships and solidarity among them, as well as with colleagues in their social network and with the local sex worker organization housing the program. Resources were also mobilized within the sex worker community through skills building and knowledge acquisition. The peer

  19. Community perceptions towards the new role of traditional birth attendants as birth companions and nutrition advocates in Kakamega County, Kenya.

    Science.gov (United States)

    Anono, Esther L; Ochola, Sophie; Wawire, Salome; Ogada, Irene; Ndedda, Crispin; Kung'u, Jacqueline K

    2018-02-01

    Delivery with skilled birth attendants is important for reducing maternal mortality in developing countries. However, traditional birth attendants (TBAs) are abundant in such settings, managing deliveries without the skills and resources necessary to prevent mortality in this situations. Interventions that have been proposed to mitigate the situation include redefining the role of TBAs to nutrition advocates and birth companions for pregnant women to health facilities. We thus explored community perceptions on these new roles of TBAs, as birth companions and nutrition advocates, and their influence on health facility deliveries in Kakamega County, Kenya. Qualitative data was collected through key informant interviews with health workers and focus group discussions with lactating mothers, pregnant women, husbands, community leaders, community health volunteers, and TBA. Content analysis was conducted; data was organized into subthemes and conclusions made from each subtheme using Atlas.ti software. TBAs adopted their birth companion role as the majority offered companionship to mothers delivering at health facilities. Mothers were happy with this role as TBAs continued providing companionship even after delivery. The community members were happy with the new role of TBAs and reported increased deliveries at the health facilities. In contrast, TBAs did not adopt the nutrition advocacy role sufficiently. We found that redefining the role of the TBAs into birth companions to support facility-based delivery is thus feasible and acceptable. Nutrition advocacy by the TBAs should be strengthened to maximize on the opportunity provided by the close association between TBAs and mothers and the community. © 2018 John Wiley & Sons Ltd.

  20. Understanding the potential of facilities managers to be advocates for energy efficiency retrofits in mid-tier commercial office buildings

    International Nuclear Information System (INIS)

    Curtis, Jim; Walton, Andrea; Dodd, Michael

    2017-01-01

    Realising energy efficiency opportunities in new commercial office buildings is an easier task than retrofitting older, mid-tier building stock. As a result, a number of government programs aim to support retrofits by offering grants, upgrades, and energy audits to facilitate energy efficiency opportunities. This study reports on a state government program in Victoria, Australia, where the uptake of such offerings was lower than expected, prompting the program team to consider whether targeting facilities managers (FMs), rather than building owners, might be a better way of delivering the program. The influences and practices of FMs that impact on their ability to be advocates for energy efficiency were explored. The results revealed that complex building ownership arrangements, poor communication skills, isolation from key decision making processes, a lack of credible business cases and information, split incentives, and the prospect of business disruptions can all impact on FMs’ ability to drive organizational change. Future program efforts should continue to interrogate the social context of retrofits in mid-tier buildings, including other influences and influencers beyond FMs, and adapt accordingly. - Highlights: • Energy efficiency retrofits of older commercial buildings can be a challenge. • Government support for retrofits is not always taken up by building owners. • Targeting facilities managers (FMs) to encourage retrofits is proposed. • FMs’ ability to be advocates for energy efficiency is constrained. • Government offerings need to better fit with the realities of the problem.

  1. Using peer advocates to improve access to services among hard-to-reach populations with hepatitis C: a qualitative study of client and provider relationships.

    Science.gov (United States)

    MacLellan, Jennifer; Surey, Julian; Abubakar, Ibrahim; Stagg, Helen R; Mannell, Jenevieve

    2017-11-28

    Peer support programmes use individuals with specific experiences to improve engagement and outcomes among new clients. However, the skills and techniques used to achieve this engagement have not been mapped. This potentially restricts the development and replication of successful peer advocate models of care. This study explored how a group of peer advocates with experience of homelessness, alcohol and drug misuse made and sustained relationships with their client group. For the purposes of this project, the client group were located among a hepatitis C-positive cohort of people who have a history of injecting drug use and homelessness. Five self-selecting advocates gave a narrative interview lasting 40-90 min. These interviews were double transcribed using both thematic analysis and narrative analysis in order to triangulate the data and provide a robust set of findings about the unique skills of peer advocates in creating and sustaining relationships with clients from hard-to-reach populations. Peer advocates build rapport with clients through disclosing personal details about their lives. While this runs counter to assumptions about the need to maintain distance in client-patient relationships, the therapeutic benefits appear to outweigh the potential costs of this engagement. We conclude the therapeutic benefits of self-disclosure between peer advocates and their clients offer a moral grounding for self-disclosure as a means of building relationships with key hard-to-reach populations.

  2. Towards optimised information about clinical trials; identification and validation of key issues in collaboration with cancer patient advocates

    DEFF Research Database (Denmark)

    Dellson, P; Nilbert, M; Bendahl, P-O

    2011-01-01

    for improvements, 21 key issues were defined and validated through a questionnaire in an independent group of breast cancer patient advocates. Clear messages, emotionally neutral expressions, careful descriptions of side effects, clear comparisons between different treatment alternatives and information about......Clinical trials are crucial to improve cancer treatment but recruitment is difficult. Optimised patient information has been recognised as a key issue. In line with the increasing focus on patients' perspectives in health care, we aimed to study patients' opinions about the written information used...... the possibility to discontinue treatment were perceived as the most important issues. Patients' views of the information in clinical trials provide new insights and identify key issues to consider in optimising future written information and may improve recruitment to clinical cancer trials....

  3. Controversy matters: Impacts of topic and solution controversy on the perceived credibility of a scientist who advocates.

    Directory of Open Access Journals (Sweden)

    Lindsey Beall

    Full Text Available In this article, we focus on the potential influence of a scientist's advocacy position on the public's perceived credibility of scientists as a whole. Further, we examine how the scientist's solution position (information only, non-controversial, and controversial affects the public's perception of the scientist's motivation for sharing information about specific issues (flu, marijuana, climate change, severe weather. Finally, we assess how perceived motivations mediate the relationship between solution position and credibility. Using data from a quota sample of American adults obtained by Qualtrics (n = 2,453, we found that in some conditions advocating for a solution positively predicted credibility, while in one condition, it negatively predicted scientist credibility. We also found that the influence of solution position on perceived credibility was mediated by several motivation perceptions; most notably through perception that the scientist was motivated to: (a serve the public and (b persuade the public. Further results and implications are discussed.

  4. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  5. Autonomic computing enabled cooperative networked design

    CERN Document Server

    Wodczak, Michal

    2014-01-01

    This book introduces the concept of autonomic computing driven cooperative networked system design from an architectural perspective. As such it leverages and capitalises on the relevant advancements in both the realms of autonomic computing and networking by welding them closely together. In particular, a multi-faceted Autonomic Cooperative System Architectural Model is defined which incorporates the notion of Autonomic Cooperative Behaviour being orchestrated by the Autonomic Cooperative Networking Protocol of a cross-layer nature. The overall proposed solution not only advocates for the inc

  6. Patient Advocate Foundation

    Science.gov (United States)

    ... issues with access to care, medical debt, and job retention related to their illness. Select one of the ... to Care Related Assistance Financial Assistance Insurance Assistance Job Retention Assistance Asistencia al Paciente en Espanol View Resource ...

  7. Advocating beyond the academy

    DEFF Research Database (Denmark)

    Mackenzie, Catrina; Christensen, Julia; Turner, Sarah

    2015-01-01

    the right audience with whom to share results, our attempts to craft communication to be relevant within specific contexts, and dilemmas over self-censorship. We also document our struggles to manage our own expectations and those of the communities with whom we work regarding the ability of our research...

  8. Rethinking Social Network Assessment for Students with Intellectual Disabilities (ID) in Postsecondary Education

    Science.gov (United States)

    Eisenman, Laura T.; Farley-Ripple, Elizabeth; Culnane, Mary; Freedman, Brian

    2013-01-01

    Social networks of persons with intellectual disabilities (ID) have been characterized as smaller and less diverse than those of typical peers. Advocates have focused on strengthening those social networks by expanding circles of social support, protection, and friendship. As young adults with ID experience increasing levels of community…

  9. The Use of Elgg Social Networking Tool for Students' Project Peer-Review Activity

    Science.gov (United States)

    Samardzija, Ana Coric; Bubas, Goran

    2014-01-01

    Numerous e-learning 2.0 studies have advocated the use of social networking sites for educational purposes, but only a few of them have observed social networking sites as an instrument for specific learner skill development. This paper discusses a study which addresses the motivation and challenges associated with the introduction of the social…

  10. A Practical View on Tunable Sparse Network Coding

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Shahbaz Badr, Arash; Cabrera Guerrero, Juan Alberto

    2015-01-01

    Tunable sparse network coding (TSNC) constitutes a promising concept for trading off computational complexity and delay performance. This paper advocates for the use of judicious feedback as a key not only to make TSNC practical, but also to deliver a highly consistent and controlled delay perfor...

  11. Web Sites for Young Children: Gateway to Online Social Networking?

    Science.gov (United States)

    Bauman, Sheri; Tatum, Tanisha

    2009-01-01

    Traffic on Web sites for young children (ages 3-12) has increased exponentially in recent years. Advocates proclaim that they are safe introductions to the Internet and online social networking and teach essential 21st-century skills. Critics note developmental concerns. In this article, we provide basic information about Web sites for young…

  12. Distributed Cloud Storage Using Network Coding

    OpenAIRE

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani; Pedersen, Morten Videbæk

    2014-01-01

    Distributed storage is usually considered within acloud provider to ensure availability and reliability of the data.However, the user is still directly dependent on the quality of asingle system. It is also entrusting the service provider with largeamounts of private data, which may be accessed by a successfulattack to that cloud system or even be inspected by governmentagencies in some countries. This paper advocates a generalframework for network coding enabled distributed storage overmulti...

  13. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  14. Improving resident engagement in quality improvement and patient safety initiatives at the bedside: the Advocate for Clinical Education (ACE).

    Science.gov (United States)

    Schleyer, Anneliese M; Best, Jennifer A; McIntyre, Lisa K; Ehrmantraut, Ross; Calver, Patty; Goss, J Richard

    2013-01-01

    Quality improvement (QI) and patient safety (PS) are essential competencies in residency training; however, the most effective means to engage physicians remains unclear. The authors surveyed all medicine and surgery physicians at their institution to describe QI/PS practices and concurrently implemented the Advocate for Clinical Education (ACE) program to determine if a physician-centered program in the context of educational structures and at the point of care improved performance. The ACE rounded with medicine and surgery teams and provided individual and team-level education and feedback targeting 4 domains: professionalism, infection control, interpreter use, and pain assessment. In a pilot, the ACE observed 2862 physician-patient interactions and 178 physicians. Self-reported compliance often was greater than the behaviors observed. Following ACE implementation, observed professionalism behaviors trended toward improvement; infection control also improved. Physicians were highly satisfied with the program. The ACE initiative is one coaching/feedback model for engaging residents in QI/PS that may warrant further study.

  15. Facilitating and supporting HIV+ parenthood: Lessons for developing the advocate role of voluntary HIV support services workers.

    Science.gov (United States)

    Cane, Tam Pheona Chipawe

    2018-06-01

    Increasingly as people living with HIV (PLWHIV) aim to become parents, they engage with HIV voluntary services for support through either fertility or adoption services. Yet, little is known about the role of HIV support services workers in facilitating access to fertility treatment or child adoption. The purpose of this study was to explore the role of HIV support workers based in HIV voluntary organisations who have a key role helping PLWHIV in navigating relevant fertility and adoption processes. This was an exploratory qualitative study which involved interviewing six HIV support workers, from across the UK. Interviews were conducted using face to face interviews, recorded and transcribed. Findings revealed that HIV services support workers provide practical support in advocating service provision, and emotional and social support along the journey. They also face challenges in their role from health care professionals including information sharing and gatekeeping. The role of HIV support workers is important in facilitating access to resources and complex systems. HIV support workers should be recognised and as they are often a trusted professional to address stigma, discrimination and barriers to services. The study contributes to research seeking to understand the emerging needs and support requirements for people living with HIV seeking fertility and adoption. Further work in this area is warranted. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Narrating Developmental Disability: Researchers, Advocates, and the Creation of an Interview Space in the Context of University-Community Partnerships

    Directory of Open Access Journals (Sweden)

    Niamh Mulcahy

    2012-04-01

    Full Text Available This paper examines the narration of developmental disability through interviews between participants, researchers, and members of community organizations serving the disabled population, in the context of university-community collaborations. These kinds of collaborations are extremely important for researching vulnerable or hard-to-reach populations, which often face lower levels of physical, mental, and social well-being as a consequence of shame, stigma, or discrimination. Community collaboration can thus be invaluable for reaching members of marginalized populations, who may be difficult to locate or otherwise avoid contact with outsiders, because it provides members of a research team with local knowledge of a population, a means of accessing possible participants, and legitimation for the project. I suggest, however, that although the researcher's externality may initially invite skepticism toward the investigation from participants, it can also benefit them by providing a forum for catharsis. Based on a pilot study I conducted with a community advocacy organization for the disabled, I note that some participants expressed an appreciation for being able to discuss certain emotions and experiences during interviews with an outsider who was not involved as a caseworker. I conclude that the presence of a trusted community advocate and a researcher at an interview affects a participant's narrative by providing a safe space for participants to voice their stories to outsiders.

  17. DOCUMENTING FOR POSTERITY: ADVOCATING THE USE OF ADVANCED RECORDING TECHNIQUES FOR DOCUMENTATION IN THE FIELD OF BUILDING ARCHAEOLOGY

    Directory of Open Access Journals (Sweden)

    P. J. De Vos

    2017-08-01

    Full Text Available Since the new millennium, living in historic cities has become extremely popular in the Netherlands. As a consequence, historic environments are being adapted to meet modern living standards. Houses are constantly subjected to development, restoration and renovation. Although most projects are carried out with great care and strive to preserve and respect as much historic material as possible, nevertheless a significant amount of historical fabric disappears. This puts enormous pressure on building archaeologists that struggle to rapidly and accurately capture in situ authentic material and historical evidence in the midst of construction works. In Leiden, a medieval city that flourished during the seventeenth century and that today counts over 3,000 listed monuments, a solution to the problem has been found with the implementation of advanced recording techniques. Since 2014, building archaeologists of the city council have experienced first-hand that new recording techniques, such as laser scanning and photogrammetry, have dramatically decreased time spent on site with documentation. Time they now use to uncover, analyse and interpret the recovered historical data. Nevertheless, within building archaeology education, a strong case is made for hand drawing as a method for understanding a building, emphasising the importance of close observation and physical contact with the subject. In this paper, the use of advanced recording techniques in building archaeology is being advocated, confronting traditional educational theory with practise, and research tradition with the rapid rise of new recording technologies.

  18. Documenting for Posterity: Advocating the Use of Advanced Recording Techniques for Documentation in the Field of Building Archaeology

    Science.gov (United States)

    De Vos, P. J.

    2017-08-01

    Since the new millennium, living in historic cities has become extremely popular in the Netherlands. As a consequence, historic environments are being adapted to meet modern living standards. Houses are constantly subjected to development, restoration and renovation. Although most projects are carried out with great care and strive to preserve and respect as much historic material as possible, nevertheless a significant amount of historical fabric disappears. This puts enormous pressure on building archaeologists that struggle to rapidly and accurately capture in situ authentic material and historical evidence in the midst of construction works. In Leiden, a medieval city that flourished during the seventeenth century and that today counts over 3,000 listed monuments, a solution to the problem has been found with the implementation of advanced recording techniques. Since 2014, building archaeologists of the city council have experienced first-hand that new recording techniques, such as laser scanning and photogrammetry, have dramatically decreased time spent on site with documentation. Time they now use to uncover, analyse and interpret the recovered historical data. Nevertheless, within building archaeology education, a strong case is made for hand drawing as a method for understanding a building, emphasising the importance of close observation and physical contact with the subject. In this paper, the use of advanced recording techniques in building archaeology is being advocated, confronting traditional educational theory with practise, and research tradition with the rapid rise of new recording technologies.

  19. Mapping and characterization of LCA networks

    DEFF Research Database (Denmark)

    Bjørn, Anders; Owsianiak, Mikolaj; Laurent, Alexis

    2013-01-01

    Purpose: The aims of this study were to provide an up-todate overview of global, regional and local networks supporting life cycle thinking and to characterize them according to their structure and activities. Methods: Following a tentative life cycle assessment (LCA) network definition, a mapping......: The provided list of LCA networks is currently the most comprehensive, publicly available mapping. We believe that the results of this mapping can serve as a basis for deciding where priorities should be set to increase the dissemination and development of LCA worldwide. In this aim, we also advocate...... was performed based on (1) a literature search, (2) a web search and (3) an inquiry to stakeholders distributed via the two largest LCA fora. Networks were characterized based on responses from a survey. Results and discussion: We identified 100 networks, of which 29 fulfilled all six criteria composing our...

  20. Ninth Annual "Brown" Lecture in Education Research: Black Educators as Educational Advocates in the Decades before "Brown v. Board of Education"

    Science.gov (United States)

    Walker, Vanessa Siddle

    2013-01-01

    This research sought to extend the historical record of advocacy for Black education by exploring the role of Black educators in the decades before the "Brown v. Board of Education" decision. It addressed (a) the ways the educators were involved in advocating for Black schools and (b) the relationship of the activities to the more…

  1. Law-based arguments and messages to advocate for later school start time policies in the United States.

    Science.gov (United States)

    Lee, Clark J; Nolan, Dennis M; Lockley, Steven W; Pattison, Brent

    2017-12-01

    The increasing scientific evidence that early school start times are harmful to the health and safety of teenagers has generated much recent debate about changing school start times policies for adolescent students. Although efforts to promote and implement such changes have proliferated in the United States in recent years, they have rarely been supported by law-based arguments and messages that leverage the existing legal infrastructure regulating public education and child welfare in the United States. Furthermore, the legal bases to support or resist such changes have not been explored in detail to date. This article provides an overview of how law-based arguments and messages can be constructed and applied to advocate for later school start time policies in US public secondary schools. The legal infrastructure impacting school start time policies in the United States is briefly reviewed, including descriptions of how government regulates education, what legal obligations school officials have concerning their students' welfare, and what laws and public policies currently exist that address adolescent sleep health and safety. On the basis of this legal infrastructure, some hypothetical examples of law-based arguments and messages that could be applied to various types of advocacy activities (eg, litigation, legislative and administrative advocacy, media and public outreach) to promote later school start times are discussed. Particular consideration is given to hypothetical arguments and messages aimed at emphasizing the consistency of later school start time policies with existing child welfare law and practices, legal responsibilities of school officials and governmental authorities, and societal values and norms. Copyright © 2017 National Sleep Foundation. Published by Elsevier Inc. All rights reserved.

  2. Women’s experiences of referral to a domestic violence advocate in UK primary care settings: a service-user collaborative study

    Science.gov (United States)

    Malpass, Alice; Sales, Kim; Johnson, Medina; Howell, Annie; Agnew-Davies, Roxane; Feder, Gene

    2014-01-01

    Background Women experiencing domestic violence and abuse (DVA) are more likely to be in touch with health services than any other agency, yet doctors and nurses rarely ask about abuse, often failing to identify signs of DVA in their patients. Aim To understand women’s experience of disclosure of DVA in primary care settings and subsequent referral to a DVA advocate in the context of a DVA training and support programme for primary care clinicians: Identification and Referral to Improve Safety (IRIS). Design and setting A service-user collaborative study using a qualitative study design. Recruitment was from across IRIS trial settings in Bristol and Hackney, London. Method Twelve women who had been referred to one of two specialist DVA advocates (based at specialist DVA agencies) were recruited by a GP taking part in IRIS. Women were interviewed by a survivor of DVA and interviews were recorded and transcribed verbatim. Analysis was thematic using constant comparison. Results GPs and nurses can play an important role in identifying women experiencing DVA and referring them to DVA specialist agencies. GPs may also have an important role to play in helping women maintain any changes they make as a result of referral to an advocate, by asking about DVA in subsequent consultations. Conclusion A short time interval between a primary care referral and initial contact with an advocate was valued by some women. For the initial contact with an advocate to happen as soon as possible after a primary care referral has been made, a close working relationship between primary care and the third sector needs to be cultivated. PMID:24567654

  3. Towards a theoretical framework for analyzing complex linguistic networks

    CERN Document Server

    Lücking, Andy; Banisch, Sven; Blanchard, Philippe; Job, Barbara

    2016-01-01

    The aim of this book is to advocate and promote network models of linguistic systems that are both based on thorough mathematical models and substantiated in terms of linguistics. In this way, the book contributes first steps towards establishing a statistical network theory as a theoretical basis of linguistic network analysis the boarder of the natural sciences and the humanities.This book addresses researchers who want to get familiar with theoretical developments, computational models and their empirical evaluation in the field of complex linguistic networks. It is intended to all those who are interested in statisticalmodels of linguistic systems from the point of view of network research. This includes all relevant areas of linguistics ranging from phonological, morphological and lexical networks on the one hand and syntactic, semantic and pragmatic networks on the other. In this sense, the volume concerns readers from many disciplines such as physics, linguistics, computer science and information scien...

  4. Using Prenatal Advocates to Implement a Psychosocial Education Intervention for Posttraumatic Stress Disorder during Pregnancy: Feasibility, Care Engagement, and Predelivery Behavioral Outcomes.

    Science.gov (United States)

    Upshur, Carole C; Wenz-Gross, Melodie; Weinreb, Linda; Moffitt, Jennifer Jo Averill

    2016-01-01

    Pregnant women with posttraumatic stress disorder (PTSD) engage in more high-risk behavior and use less prenatal care. Although treating depression in pregnancy is becoming widespread, options for addressing PTSD are few. This study was designed to test the feasibility of implementing a manualized psychosocial PTSD intervention, Seeking Safety, delivered by prenatal advocates. All women entering prenatal care at two federally qualified health centers were screened for current symptoms of PTSD. One site was selected randomly to have prenatal care advocates deliver eight Seeking Safety topics for women that indicated clinical or subclinical PTSD symptoms. Baseline and pre-delivery interviews were conducted, which collected background characteristics and assessed PTSD severity and coping skills. Medical records were collected to document care visits. Documentation of participation rates, fidelity to the treatment, and qualitative feedback from advocates and participants was collected. More than one-half (57.3%) of the intervention women received all Seeking Safety sessions and fidelity ratings of the session showed acceptable quality. Using an intent-to-treat analysis, intervention women participated in significantly more prenatal care visits (M = 11.7 versus 8.9; p accounting for baseline differences, intervention women also reduced negative coping skills but not PTSD symptoms. Using prenatal care advocates to deliver Seeking Safety sessions to women screening positive for PTSD symptoms at entry to prenatal care is a promising intervention that seems to increase prenatal care participation and may reduce negative coping strategies. Copyright © 2016 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  5. Microfilaricidal efficacy of a single administration of Advocate(®) (Bayer Animal Health) in dogs naturally infected with Dirofilaria immitis or Dirofilaria repens.

    Science.gov (United States)

    Frangipane di Regalbono, Antonio; Di Cesare, Angela; Traversa, Donato; Simonato, Giulia; Poser, Helen; Danesi, Patrizia; Furnari, Carmelo; Russi, Ilaria; Raele, Donato Antonio; Crisi, Paolo; Pampurini, Fabrizio; Pietrobelli, Mario

    2016-08-15

    The present study evaluated the microfilaricidal efficacy of a single application of the spot-on containing imidacloprid 10%/moxidectin 2.5% (Advocate(®), Bayer Animal Health) in dogs naturally infected either by Dirofilaria immitis or Dirofilaria repens. Dogs living in north-eastern and central-southern Italy, endemic for D. immitis and D. repens respectively, were randomly screened. Sixteen animals, eight infected with D. immitis and eight with D. repens, and fulfilling inclusion criteria were enrolled. Dogs infected with D. immitis received an adulticide treatment prior to the study and Advocate(®) 3 weeks after. The animals were divided in blocks of two (1:1, T1:T2) animals each, where Day 0 (D0) had an interval of 15days to compare T2 vs. T1 dogs during the first fortnight of examination (i.e. T2 dogs acted as control animals at each examination). At baseline (Days -15 and 0 for T2 and T1 dogs, respectively) the animals had a range of microfilaraemia of 180-99.700mff/ml (D. immitis) and 60-750 mff/ml (D. repens). All animals received a topical administration of Advocate(®) at D0 and were examined for microfilariae with microscopic and molecular tests at D15, D30, D60 and D90. All animals scored negative for mff at the first control post-treatment and throughout the study, with the exception of two D. immitis- infected animals that had a 2 mff/ml count at D15, and then become negative from Day 30 onwards. No adverse events were observed. The present study demonstrates the safety and the high microfilaricidal efficacy (99.97% and 100% for D. immitis and D. repens, respectively) of a single dose of moxidectin contained in Advocate(®) in naturally infected dogs. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Tracking investments by financial institutions in tobacco companies (2007-2016 - what tobacco control advocates need to know and do about it?

    Directory of Open Access Journals (Sweden)

    Pranay Lal

    2018-03-01

    Definition of socially responsible investments within the perspective of screening tobacco investments is perceived variably by financial institutions. Also in the absence of a watchdog institution and few disincentives for truant behaviour, investors continue to invest tobacco companies. Tobacco control advocates need to monitor investments made by large lending banks and financial institutions in tobacco industry and ensure that banks which have committed to SRI codes conform to them.

  7. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  8. The Limited English Proficiency Patient Family Advocate Role: Fostering Respectful and Effective Care Across Language and Culture in a Pediatric Oncology Setting.

    Science.gov (United States)

    Gil, Stephanie; Hooke, Mary C; Niess, Dawn

    2016-01-01

    Patients and families with limited English proficiency (LEP) face a multitude of barriers both inside and outside the hospital walls. These barriers can contribute to difficulty accessing care and understanding/adhering to treatment recommendations, ultimately placing them at higher risk for poorer outcomes than their English-speaking counterparts. The LEP Patient Family Advocate role was created with the aim of improving access, promoting effective communication, and equalizing care for children with cancer from families with LEP. The goal of this mixed methods study was to describe the level of satisfaction and experiences of parents and health care providers who used the LEP Patient Family Advocate while receiving or providing care. Twelve parents and 15 health care providers completed quantitative surveys and an open-ended question about their experiences. High levels of satisfaction were reported. Themes about the role from qualitative responses included its positive effect on communication, trust, and connectedness between parents and staff. Continuity of care and safety were improved, and parents thought the role helped decrease their stress. The LEP Patient Family Advocate has a positive influence on family-centered cultural care. © 2015 by Association of Pediatric Hematology/Oncology Nurses.

  9. Collaboration Strategies in Nontraditional Community-Based Participatory Research Partnerships: Lessons From an Academic–Community Partnership With Autistic Self-Advocates

    Science.gov (United States)

    Nicolaidis, Christina; Raymaker, Dora; McDonald, Katherine; Dern, Sebastian; Ashkenazy, Elesia; Boisclair, Cody; Robertson, Scott; Baggs, Amanda

    2012-01-01

    Background Most community-based participatory research (CBPR) projects involve local communities defined by race, ethnicity, geography, or occupation. Autistic self-advocates, a geographically dispersed community defined by disability, experience issues in research similar to those expressed by more traditional minorities. Objectives We sought to build an academic–community partnership that uses CBPR to improve the lives of people on the autistic spectrum. Methods The Academic Autistic Spectrum Partnership in Research and Education (AASPIRE) includes representatives from academic, self-advocate, family, and professional communities. We are currently conducting several studies about the health care experiences and well-being of autistic adults. Lessons Learned We have learned a number of strategies that integrate technology and process to successfully equalize power and accommodate diverse communication and collaboration needs. Conclusions CBPR can be conducted successfully with autistic self-advocates. Our strategies may be useful to other CBPR partnerships, especially ones that cannot meet in person or that include people with diverse communication needs. PMID:21623016

  10. Building a mentoring network.

    Science.gov (United States)

    McBride, Angela Barron; Campbell, Jacquelyn; Woods, Nancy Fugate; Manson, Spero M

    Mentoring has long been regarded as one of the key components of research training and faculty development. The Robert Wood Johnson Foundation Nurse Faculty Scholars program purposely facilitated scholars' development of a mentoring network by providing each individual with three mentors: a school-of-nursing mentor (primary), a university-based non-nurse research mentor (research), and a nationally-recognized nurse leader at another university (national). The Mentorship Effectiveness Scale was used to assess the effectiveness of each type of mentor in the first five completed cohorts. The ratings of mentorship effectiveness for all three kinds of mentors were generally high. Scholars valued most their mentors' support and advocacy; the biggest weakness in dealing with all mentors was accessibility. Even when one mentor proved a poor match, another mentor turned out to be an advocate and helpful, thus reaffirming the benefits of a mentoring network as opposed to only a single mentoring relationship. One lesson learned is the importance of preparing mentors for their role via written materials, in-person or phone orientations, and discussions at the annual meeting. Copyright © 2016. Published by Elsevier Inc.

  11. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  12. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  13. On the Need of Network coding for Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    for mobile clouds. The paper will list the benefits of network coding for mobile clouds as well as introduce both concepts in a tutorial way. The results used throughout this paper are collaborative work of different research institutes, but mainly taken from the mobile device group at Aalborg University.......This paper advocates the need of network coding for mobile clouds. Mobile clouds as well as network coding are describing two novel concepts. The concept of mobile clouds describes the potential of mobile devices to communicate with each other and form a cooperative cluster in which new services...... and potentials are created. Network coding on the other side enables the mobile cloud to communicate in a very efficient and secure way in terms of energy and bandwidth usage. Even though network coding can be applied in a variety of communication networks, it has some inherent features that makes it suitable...

  14. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2017-01-01

    the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both

  15. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  16. Interviewing clinicians and advocates who work with sexual assault survivors: a personal perspective on moving from quantitative to qualitative research methods.

    Science.gov (United States)

    Ullman, Sarah E

    2005-09-01

    This article describes the author's personal experiences of conducting a qualitative semistructured interview study, after having done predominantly quantitative survey research in the social sciences. The author describes the process of learning how to approach conducting semistructured interviews with female advocates and clinicians who provide services to sexual assault survivors in the community. The author describes making the transition from a logical positivist deductive approach to thinking about and conducting research to a more social constructionist stance in which one learns from participants about their experiences and perspectives in narrative form to discover knowledge and develop theory inductively.

  17. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  18. Environmental policy-making networks and the future of the Amazon

    OpenAIRE

    Lemos, Maria Carmen; Roberts, J. Timmons

    2008-01-01

    This article examines four periods of environmental policy-making in the Amazonian region of Brazil. It specifically analyses the role of pro-environment and pro-development policy networks in affecting policy design and implementation. It argues that the efforts of environmentalist networks trying to advocate or block relative developmentalist policies in the Amazon depend on three critical factors - whether they are able to attract the support of elites (or at least block their developmenta...

  19. Loyalty and positive word-of-mouth: patients and hospital personnel as advocates of a customer-centric health care organization.

    Science.gov (United States)

    Ferguson, Ronald J; Paulin, Michele; Leiriao, Elizabeth

    2006-01-01

    The ability to attract and retain loyal customers depends on the successful implementation of a customer-centric strategy. Customer loyalty is an attitude about an organization and its' services that is manifested by intentions and behaviors of re-patronization and recommendation. In the context of many medical services, loyalty through repeat patronization is not pertinent, whereas loyalty through positive word-of mouth (WOM) recommendation can be a powerful marketing tool. The Shouldice Hospital, a well-known institution for the surgical correction of hernias, instituted a marketing plan to develop a stable base of patients by creating positive WOM advocacy. This study focused on the consequences of both hernia patient overall satisfaction (and overall service quality) and hospital personnel satisfaction on the level of positive WOM advocacy. Using a commitment ladder of positive WOM advocacy, respondents were divided into three categories described as passive supporters, active advocates and ambassador advocates. Patient assessments of overall satisfaction and service quality were significantly related to these progressive levels of WOM for recommending the hospital to potential patients. Similarly, the satisfaction of the hospital employees was also significantly related to these progressive levels of positive WOM about recommending the hospital to potential patients and to potential employees. High levels of satisfaction are required to create true ambassadors of a service organization.

  20. Advocating for schools to provide effective HIV and sexuality education: a case study in how social service organizations working in coalition can (and should) affect sustained policy change.

    Science.gov (United States)

    Ogusky, Jeremy; Tenner, Adam

    2010-05-01

    Advocates believed that to slow an expanding HIV/ AIDS epidemic in Washington, D.C., a local effort could ensure that HIV prevention was brought to scale. Schools were chosen as the focus and a new coalition advocated for the city government to pass new academic standards for health education. HIV and sex education policies had not been revised in more than 12 years and HIV education in D.C. public schools varied greatly in quality. Metro TeenAIDS (MTA), a traditional social service organization with no real history of advocacy work, reached only 10% of D.C. adolescents with critical HIV/AIDS prevention information. Clearly, to make a sustained impact, system change was necessary. After deciding to pursue a campaign focused on updating health education policy and creating standards, MTA convened a variety of reproductive health, adolescent medicine, and other organizations to establish the DC Healthy Youth Coalition. The Coalition used three complementary strategies to achieve campaign goals: mobilizing grassroots community support, involving parents in the discussion, and educating city leaders. By building an alliance of social service organizations and influencing critical public policy, the coalition ensured that new educational standards were passed.

  1. On Measuring the Complexity of Networks: Kolmogorov Complexity versus Entropy

    Directory of Open Access Journals (Sweden)

    Mikołaj Morzy

    2017-01-01

    Full Text Available One of the most popular methods of estimating the complexity of networks is to measure the entropy of network invariants, such as adjacency matrices or degree sequences. Unfortunately, entropy and all entropy-based information-theoretic measures have several vulnerabilities. These measures neither are independent of a particular representation of the network nor can capture the properties of the generative process, which produces the network. Instead, we advocate the use of the algorithmic entropy as the basis for complexity definition for networks. Algorithmic entropy (also known as Kolmogorov complexity or K-complexity for short evaluates the complexity of the description required for a lossless recreation of the network. This measure is not affected by a particular choice of network features and it does not depend on the method of network representation. We perform experiments on Shannon entropy and K-complexity for gradually evolving networks. The results of these experiments point to K-complexity as the more robust and reliable measure of network complexity. The original contribution of the paper includes the introduction of several new entropy-deceiving networks and the empirical comparison of entropy and K-complexity as fundamental quantities for constructing complexity measures for networks.

  2. Temporal networks

    CERN Document Server

    Saramäki, Jari

    2013-01-01

    The concept of temporal networks is an extension of complex networks as a modeling framework to include information on when interactions between nodes happen. Many studies of the last decade examine how the static network structure affect dynamic systems on the network. In this traditional approach  the temporal aspects are pre-encoded in the dynamic system model. Temporal-network methods, on the other hand, lift the temporal information from the level of system dynamics to the mathematical representation of the contact network itself. This framework becomes particularly useful for cases where there is a lot of structure and heterogeneity both in the timings of interaction events and the network topology. The advantage compared to common static network approaches is the ability to design more accurate models in order to explain and predict large-scale dynamic phenomena (such as, e.g., epidemic outbreaks and other spreading phenomena). On the other hand, temporal network methods are mathematically and concept...

  3. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  4. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  5. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  6. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  7. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  8. Network Convergence

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Network Convergence. User is interested in application and content - not technical means of distribution. Boundaries between distribution channels fade out. Network convergence leads to seamless application and content solutions.

  9. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...

  10. Network Science

    National Research Council Canada - National Science Library

    Leland, Will

    2006-01-01

    OVERVIEW: (1) A committee of technical experts, military officers and R&D managers was assembled by the National Research Council to reach consensus on the nature of networks and network research. (2...

  11. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  12. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson

    International Nuclear Information System (INIS)

    Macpherson, John A.

    1989-01-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening

  13. What kind of evidence is it that Evidence-Based Medicine advocates want health care providers and consumers to pay attention to?

    Directory of Open Access Journals (Sweden)

    Haynes R Brian

    2002-03-01

    Full Text Available Abstract Background In 1992, Evidence-Based Medicine advocates proclaimed a "new paradigm", in which evidence from health care research is the best basis for decisions for individual patients and health systems. Hailed in New York Times Magazine in 2001 as one of the most influential ideas of the year, this approach was initially and provocatively pitted against the traditional teaching of medicine, in which the key elements of knowing for clinical purposes are understanding of basic pathophysiologic mechanisms of disease coupled with clinical experience. This paper reviews the origins, aspirations, philosophical limitations, and practical challenges of evidence-based medicine. Discussion EBM has long since evolved beyond its initial (misconception, that EBM might replace traditional medicine. EBM is now attempting to augment rather than replace individual clinical experience and understanding of basic disease mechanisms. EBM must continue to evolve, however, to address a number of issues including scientific underpinnings, moral stance and consequences, and practical matters of dissemination and application. For example, accelerating the transfer of research findings into clinical practice is often based on incomplete evidence from selected groups of people, who experience a marginal benefit from an expensive technology, raising issues of the generalizability of the findings, and increasing problems with how many and who can afford the new innovations in care. Summary Advocates of evidence-based medicine want clinicians and consumers to pay attention to the best findings from health care research that are both valid and ready for clinical application. Much remains to be done to reach this goal.

  14. Should fee-for-service be for all guideline-advocated acute coronary syndrome (ACS) care? Observations from the Snapshot ACS study.

    Science.gov (United States)

    Briffa, Thomas G; Hammett, Christopher J; Cross, David B; Macisaac, Andrew I; Rankin, James M; Board, Neville; Carr, Bridie; Hyun, Karice K; French, John; Brieger, David B; Chew, Derek P

    2015-09-01

    The aim of the present study was to explore the association of health insurance status on the provision of guideline-advocated acute coronary syndrome (ACS) care in Australia. Consecutive hospitalisations of suspected ACS from 14 to 27 May 2012 enrolled in the Snapshot study of Australian and New Zealand patients were evaluated. Descriptive and logistic regression analysis was performed to evaluate the association of patient risk and insurance status with the receipt of care. In all, 3391 patients with suspected ACS from 247 hospitals (23 private) were enrolled in the present study. One-third of patients declared private insurance coverage; of these, 27.9% (304/1088) presented to private facilities. Compared with public patients, privately insured patients were more likely to undergo in-patient echocardiography and receive early angiography; furthermore, in those with a discharge diagnosis of ACS, there was a higher rate of revascularisation (P fee-for-service. In contrast, proportionately fewer privately insured ACS patients were discharged on selected guideline therapies and were referred to a secondary prevention program (P = 0.056), neither of which directly attracts a fee. Typically, as GRACE (the Global Registry of Acute Coronary Events) risk score rose, so did the level of ACS care; however, propensity-adjusted analyses showed lower in-hospital adverse events among the insured group (odds ratio 0.68; 95% confidence interval 0.52-0.88; P = 0.004). Fee-for-service reimbursement may explain differences in the provision of selected guideline-advocated components of ACS care between privately insured and public patients.

  15. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  16. Spatial networks

    Science.gov (United States)

    Barthélemy, Marc

    2011-02-01

    Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, and neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields, ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated with the length of edges which in turn has dramatic effects on the topological structure of these networks. We will thoroughly explain the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spatial networks, such as phase transitions, random walks, synchronization, navigation, resilience, and disease spread.

  17. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  18. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  19. Synchronization in Complex Oscillator Networks and Smart Grids

    Energy Technology Data Exchange (ETDEWEB)

    Dorfler, Florian [Los Alamos National Laboratory; Chertkov, Michael [Los Alamos National Laboratory; Bullo, Francesco [Center for Control, Dynamical Systems and Computation, University of California at Santa Babara, Santa Barbara CA

    2012-07-24

    The emergence of synchronization in a network of coupled oscillators is a fascinating topic in various scientific disciplines. A coupled oscillator network is characterized by a population of heterogeneous oscillators and a graph describing the interaction among them. It is known that a strongly coupled and sufficiently homogeneous network synchronizes, but the exact threshold from incoherence to synchrony is unknown. Here we present a novel, concise, and closed-form condition for synchronization of the fully nonlinear, non-equilibrium, and dynamic network. Our synchronization condition can be stated elegantly in terms of the network topology and parameters, or equivalently in terms of an intuitive, linear, and static auxiliary system. Our results significantly improve upon the existing conditions advocated thus far, they are provably exact for various interesting network topologies and parameters, they are statistically correct for almost all networks, and they can be applied equally to synchronization phenomena arising in physics and biology as well as in engineered oscillator networks such as electric power networks. We illustrate the validity, the accuracy, and the practical applicability of our results in complex networks scenarios and in smart grid applications.

  20. Advocating investments in information technology

    International Nuclear Information System (INIS)

    Nirenberg, L.M.

    1992-01-01

    Information and communication systems can improve the timeliness and quality of decisions. These benefits are strategically important to the utility industry in an era of increasing competition. Because these systems often do not reduce labor cost, however, they can be difficult to evaluate. This report presents a new process for reaching consensus of the value of capital investment in information and communication systems. The results of this project is A Strategic Advocacy Process (ASAP), a methodology that can be used to evaluate investments in information technology. ASAP uses belief graphs to produce a living business case showing facts, assumptions, goals, and metrics for measuring progress toward those goals; shows how to use option pricing theory to quantify the value of managerial flexibility; ASAP uses an organizational impact assessment tool to identify the potential impact of new information systems and how to realize the benefits of managerial flexibility. The ASAP methodology addresses the critical problem of correctly valuing information and communication systems. The methodology offers a way to account for the ''intangible'' value of these systems by recognizing the managerial flexibility these systems can provide in addressing risks and uncovering new business opportunities. Metrics for measuring progress toward new goals can be defined, and plans for achieving the goals can be made. As a result, agreement can be reached on the uses, value, and priority of projects based on a metric other than on labor replacement savings

  1. Karen Blixen. The Devil's Advocate

    DEFF Research Database (Denmark)

    Bunch, Mads

    Denne Ph.d. er en artikel-Ph.d. og består af tre artikler, der er integreret i en længere baggrundssektion, der indeholder 1) en forskningsoversigt over Blixen Kierkegaard forskningen fra 1934 til i dag, 2) refleksioner over den teori og metode, der er anvendt i hver af artiklerne, 3) en række su...

  2. Advocating for Patient Care Literacy.

    Science.gov (United States)

    Poirier, Therese I

    2018-02-01

    The value of the arts and humanities in becoming an "educated" pharmacist is reviewed in this commentary. The term "patient care literacy" is defined as becoming a more humane pharmacist. This implies not only using heads but HARTSS (humanities, arts and social sciences) for developing the necessary skills. A conceptual framework for curricular reform that focuses on using the arts and humanities is proposed for advancing patient care literacy. Methods for enhancing use of arts and humanities for developing pharmacy graduates is specifically proposed. The need for more empiric research to demonstrate the value of the arts and humanities in developing a patient care literate professional is highlighted.

  3. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  4. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  5. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago V. V.; Giannitsarou, Chryssi; Johnson, Charles R.

    2016-01-01

    This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s00199-016-0992-1 We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and d...

  6. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  7. Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases: report of the First International African Vaccinology Conference.

    Science.gov (United States)

    Wiysonge, Charles Shey; Waggie, Zainab; Hawkridge, Anthony; Schoub, Barry; Madhi, Shabir Ahmed; Rees, Helen; Hussey, Gregory

    2016-01-01

    One means of improving healthcare workers' knowledge of and attitudes to vaccines is through running vaccine conferences which are accessible, affordable, and relevant to their everyday work. Various vaccinology conferences are held each year worldwide. These meetings focus heavily on basic science with much discussion about new developments in vaccines, and relatively little coverage of policy, advocacy, and communication issues. A negligible proportion of delegates at these conferences come from Africa, home to almost 40% of the global burden of vaccine-preventable diseases. To the best of our knowledge, no major vaccinology conference has ever been held on the African continent apart from World Health Organization (WHO) meetings. The content of the first International African Vaccinology Conference was planned to be different; to focus on the science, with a major part of discussions being on clinical, programmatic, policy, and advocacy issues. The conference was held in Cape Town, South Africa, from 8 to 11 November 2012. The theme of the conference was "Advocating for efforts to protect African children, families, and communities from the threat of infectious diseases". There were more than 550 registered participants from 55 countries (including 37 African countries). There were nine pre-conference workshops, ten plenary sessions, and 150 oral and poster presentations. The conference discussed the challenges to universal immunisation in Africa as well as the promotion of dialogue and communication on immunisation among all stakeholders. There was general acknowledgment that giant strides have been made in Africa since the global launch of the Expanded Programme on Immunisation in 1974. For example, there has been significant progress in introducing new and under-utilised vaccines; including hepatitis B, Haemophilus influenza type b, pneumococcal conjugate, rotavirus, meningococcal A conjugate, and human papillomavirus vaccines. In May 2012, African countries

  8. [The Quebec Healthy Cities and Towns Network: a powerful movement faced with new challenges].

    Science.gov (United States)

    Simard, Paule

    2007-01-01

    After twenty years serving its members, the Quebec Healthy Cities and Towns Network (QHCTN) faces several challenges. There are currently many changes being made in the local organization and the administration of services. The Network, through its capacity to mobilize the different municipalities, is the best placed to advocate and support a coordinated approach to government initiatives and also to encourage partnerships with other institutions (education, health, socio-economic) and communities. There is, nonetheless, a need to rethink its direct support to members, especially in terms of communication and networking among them.

  9. Marketing Network Centric Warfare

    National Research Council Canada - National Science Library

    McCarthy, Shannon

    2001-01-01

    ... the other services. In order to be effective, NCW must transition from a Navy concept to a joint product. NCW advocates can effect this transition by using basic business principles to market NCW...

  10. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  11. To Encounter, to Build the World and to Become a Human Being. Advocating for a Material-Cultural Turn in Developmental Psychology.

    Science.gov (United States)

    Moro, Christiane

    2016-12-01

    Why have material world of daily life and material objects in their conventional features or to say it in other words, why have the mundane world and mundane objects, in which the human beings live and children come to, encounter, experience and develop through, received so little attention from psychologists thus remaining a blind spot in mainstream developmental psychology? Certainly the object has not been totally forgotten (e.g. Piaget's constructivist paradigm) but it has been considered as theoretically determined by the categories of understanding (cf. Kant), and considered as a key to understanding the world in its physical properties by the infant. But the material world and the material objects that are used for everyday purposes (i.e. pragmatically) belonging to material culture, have been totally neglected by developmental psychologists. Reacting to the Kantian agenda of developmental psychology but also to heterodox non developmentalist thinkers such as Gibson who is a growing source of inspiration for developmental psychologists today, we challenge the taken-for-granted mundane world, arguing for the importance of material objects related to material culture in psychological development during the prelinguistic period. On the basis of recent research in early development grounded in the Vygotskian paradigm, we discuss this issue through Marxist Anthropology, Material Culture Studies and Phenomenology. As a consequence we advocate for a material-cultural turn in psychological development in order to place the issue of material world and material objects in their pragmatic and semiotic features on the agenda of developmental psychology.

  12. Introductory remarks by Augusto Ancarani[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Ancarani, Augusto [Commission of the European Communities, Brussels (Belgium)

    1989-07-01

    The subject proposed for the present roundtable is in the form of a twofold question. To assert that advocates and adversaries of nuclear power are listening to each other will hopefully result from what will be said. But, as far as the chance of a dialogue is concerned, one can answer in the positive from the start. Indeed a dialogue is always possible, even among deaf people, provided they are polite. This has been and still is the situation in many instances. If we consider the politics situation in a worldwide perspective, we hove to acknowledge that the mood is favorable to the dialogue on almost every possible subject. If this is true among the great powers, it will also be the case, at all the Levels, inside our democratic and articulate societies, O rice set in motion the solution of the great problems concerning peace among notions, still remain to be tackled the ones about the welfare of humankind. Such welfare rests heavily on the availability of energy; besides, energy cannot bp produced without some consequences upon the environment. This process will bi a Long and a difficult one; it will be exhausted only through confrontations, exchanges of view, dialogues, discussions - any term that you will care to choose.

  13. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  14. Bipartite Networks

    NARCIS (Netherlands)

    Agneessens, F.; Moser, C.; Barnett, G.A.

    2011-01-01

    Bipartite networks refer to a specific kind of network in which the nodes (or actors) can be partitioned into two subsets based on the fact that no links exist between actors within each subset, but only between the two subsets. Due to the partition of actors in two sets and the absence of relations

  15. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  16. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  17. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  18. Accelerating networks

    International Nuclear Information System (INIS)

    Smith, David M D; Onnela, Jukka-Pekka; Johnson, Neil F

    2007-01-01

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  19. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  20. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  1. A Patient Advocate to facilitate access and improve communication, care, and outcomes in adults with moderate or severe asthma: Rationale, design, and methods of a randomized controlled trial

    Science.gov (United States)

    Apter, Andrea J.; Morales, Knashawn H.; Han, Xiaoyan; Perez, Luzmercy; Huang, Jingru; Ndicu, Grace; Localio, Anna; Nardi, Alyssa; Klusaritz, Heather; Rogers, Marisa; Phillips, Alexis; Cidav, Zuleyha; Schwartz, J. Sanford

    2017-01-01

    Few interventions to improve asthma outcomes have targeted low-income minority adults. Even fewer have focused on the real-world practice where care is delivered. We adapted a patient navigator, here called a Patient Advocate (PA), a term preferred by patients, to facilitate and maintain access to chronic care for adults with moderate or severe asthma and prevalent co-morbidities recruited from clinics serving low-income urban neighborhoods. We describe the planning, design, methodology (informed by patient and provider focus groups), baseline results, and challenges of an ongoing randomized controlled trial of 312 adults of a PA intervention implemented in a variety of practices. The PA coaches, models, and assists participants with preparations for a visit with the asthma clinician; attends the visit with permission of participant and provider; and confirms participants’ understanding of what transpired at the visit. The PA facilitates scheduling, obtaining insurance coverage, overcoming patients’ unique social and administrative barriers to carrying out medical advice and transfer of information between providers and patients. PA activities are individualized, take account of comorbidities, and are generalizable to other chronic diseases. PAs are recent college graduates interested in health-related careers, research experience, working with patients, and generally have the same race/ethnicity distribution as potential participants. We test whether the PA intervention, compared to usual care, is associated with improved and sustained asthma control and other asthma outcomes (prednisone bursts, ED visits, hospitalizations, quality of life, FEV1) relative to baseline. Mediators and moderators of the PA-asthma outcome relationship are examined along with the intervention’s cost-effectiveness. PMID:28315481

  2. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Macpherson, John A [Atomic Energy of Canada Ltd., Mississauga, ON (Canada)

    1989-07-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening.

  3. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide......-Configurable Intelligent Distributed Antenna System (SCIDAS)’ that overlays intelligence over the conventional DAS architecture and latter is in the form of a swarm of intelligent hovering base stations working in a team to cooperatively resolve the PTC congestion at the Area of Event (AoE). A suitable network...

  4. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    Human Resource Development was the first and remains an important pillar in Japanese foreign aid. I will argue that Japan has access to a global network of alumni who will co-define Japanese foreign aid in the future, because Japan has encouraged alumni societies and networking since 1965. A total...... of more than a million people in more than 100 countries have attended courses in Japan funded fully or partly by Japanese ODA since the inception of the technical assistance programs in 1954 through the Colombo Plan and since 1959 through the Association of Overseas Technical Scholarships (AOTS from 2009...... HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...

  5. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  6. Exchange Network

    Science.gov (United States)

    The Environmental Information Exchange Network (EN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.

  7. Diversity Networks

    Science.gov (United States)

    and professional growth of women through networking, mentoring and training. We strive to ensure that will be used. National Processing Center Seniors Leader: Jo Anne Hankins Champion: Eric Milliner NO

  8. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    , as a Danida fellow. Today, the older sister works in Nepal and the younger in Seattle, where they still make use of their personal networks including connections to their fellow alumni of technical assistance courses. Inspired by work on social remittances in combination with network theory , I argue......Technical Assistance courses have many functions apart from disseminating knowledge and information, one such function is to engender networks. During the course period, participants meet and establish contact and some of these contacts remain connections between alumni for many years after...... the courses are finished. The alumni networks depend on the uses they are put to by the individual alumni and the support they get from alumni and host countries. The United Nations initiated technical assistance courses in the late 1940s in order to train nationals from developing countries as a means...

  9. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  10. Neural networks

    International Nuclear Information System (INIS)

    Denby, Bruce; Lindsey, Clark; Lyons, Louis

    1992-01-01

    The 1980s saw a tremendous renewal of interest in 'neural' information processing systems, or 'artificial neural networks', among computer scientists and computational biologists studying cognition. Since then, the growth of interest in neural networks in high energy physics, fueled by the need for new information processing technologies for the next generation of high energy proton colliders, can only be described as explosive

  11. Pintadas network

    OpenAIRE

    Cruz, Maria do Carmo Meirelles T.

    2006-01-01

    The Pintadas Network has been organized in Pintadas, a small municipality (11.254 inhabitants) in Bahia, located in the semi-arid region. It has been composed by civil society organizacions (social, productive, cultural and religious organizations and a credit cooperative), with support from the local town hall and from national and international institutions. The Network is a space for articulation, which intends to formulate, execute, follow-up, inspect and evaluate the municipal public pol...

  12. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...... the organizational forms discussed in the paper. It is asserted that the underlying organizational phenomena are not changing but that the manifestations and representations are shifting due to technological developments....

  13. Exploring the Impact of Network Structure and Demand Collaboration on the Dynamics of a Supply Chain Network Using a Robust Control Approach

    Directory of Open Access Journals (Sweden)

    Yongchang Wei

    2015-01-01

    uncertain environment. The impact of network structure and collaboration on the dynamics and robustness of supply chain network, however, remains to be explored. In this paper, a unified state space model for a two-layer supply chain network composed of multiple distributors and multiple retailers is developed. A robust control algorithm is advocated to reduce both order and demand fluctuations for unknown demand. Numerical simulations demonstrate that the robust control approach has the advantage to reduce both inventory and order fluctuations. In the simulation experiment, it is interesting to notice that complex network structure and collaborations might contribute to the reduction of inventory and order oscillations. This paper yields new insights into the overestimated bullwhip effect problem and helps us understand the complexities of supply chain networks.

  14. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  15. Critical conducting networks in disordered solids: ac universality from topological arguments

    DEFF Research Database (Denmark)

    Milovanov, A.V.; Juul Rasmussen, Jens

    2001-01-01

    This paper advocates an unconventional description of charge transport processes in disordered solids, which brings together the ideas of fractal geometry, percolation theory, and topology of manifolds. We demonstrate that the basic features of ac conductivity in disordered materials as seen...... in various experiments are reproduced with remarkable accuracy by the conduction properties of percolating fractal networks near the threshold of percolation. The universal character of ac conductivity in three embedding dimensions is discussed in connection with the available experimental data. An important...

  16. Neural Networks

    International Nuclear Information System (INIS)

    Smith, Patrick I.

    2003-01-01

    Physicists use large detectors to measure particles created in high-energy collisions at particle accelerators. These detectors typically produce signals indicating either where ionization occurs along the path of the particle, or where energy is deposited by the particle. The data produced by these signals is fed into pattern recognition programs to try to identify what particles were produced, and to measure the energy and direction of these particles. Ideally, there are many techniques used in this pattern recognition software. One technique, neural networks, is particularly suitable for identifying what type of particle caused by a set of energy deposits. Neural networks can derive meaning from complicated or imprecise data, extract patterns, and detect trends that are too complex to be noticed by either humans or other computer related processes. To assist in the advancement of this technology, Physicists use a tool kit to experiment with several neural network techniques. The goal of this research is interface a neural network tool kit into Java Analysis Studio (JAS3), an application that allows data to be analyzed from any experiment. As the final result, a physicist will have the ability to train, test, and implement a neural network with the desired output while using JAS3 to analyze the results or output. Before an implementation of a neural network can take place, a firm understanding of what a neural network is and how it works is beneficial. A neural network is an artificial representation of the human brain that tries to simulate the learning process [5]. It is also important to think of the word artificial in that definition as computer programs that use calculations during the learning process. In short, a neural network learns by representative examples. Perhaps the easiest way to describe the way neural networks learn is to explain how the human brain functions. The human brain contains billions of neural cells that are responsible for processing

  17. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  18. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...... they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics....

  19. Nuclear networking.

    Science.gov (United States)

    Xie, Wei; Burke, Brian

    2017-07-04

    Nuclear lamins are intermediate filament proteins that represent important structural components of metazoan nuclear envelopes (NEs). By combining proteomics and superresolution microscopy, we recently reported that both A- and B-type nuclear lamins form spatially distinct filament networks at the nuclear periphery of mouse fibroblasts. In particular, A-type lamins exhibit differential association with nuclear pore complexes (NPCs). Our studies reveal that the nuclear lamina network in mammalian somatic cells is less ordered and more complex than that of amphibian oocytes, the only other system in which the lamina has been visualized at high resolution. In addition, the NPC component Tpr likely links NPCs to the A-type lamin network, an association that appears to be regulated by C-terminal modification of various A-type lamin isoforms. Many questions remain, however, concerning the structure and assembly of lamin filaments, as well as with their mode of association with other nuclear components such as peripheral chromatin.

  20. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... threats to the critical infrastructure. Finally, before our conclusions and outlook, we give a brief overview of some key activities in the field and what research directions are currently investigated....

  1. Network interruptions

    CERN Multimedia

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  2. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies....

  3. Cross-border trading and transmission networks: a model for competition in natural gas and electricity grids

    International Nuclear Information System (INIS)

    Hogan, W.W.

    1992-01-01

    Cross border energy trading, for which transmission networks are a vital policy, is expanding. Within an environment of competition and open access, reform of transmission pricing, access and investment is needed. A theoretical framework for such reform is outlined. The design objectives advocated are to maintain a reliable service; to provide economic efficiency; to allow for long-term transmission contracts; to arrange compensation through a settlements system; to allow decomposition by region and company and to preserve administrative feasibility. A ''contract network'' model for transmission rights in a network is discussed. (UK)

  4. Contemporary social network sites: Relevance in anesthesiology teaching, training, and research.

    Science.gov (United States)

    Haldar, Rudrashish; Kaushal, Ashutosh; Samanta, Sukhen; Ambesh, Paurush; Srivastava, Shashi; Singh, Prabhat K

    2016-01-01

    The phenomenal popularity of social networking sites has been used globally by medical professionals to boost professional associations and scientific developments. They have tremendous potential to forge professional liaisons, generate employment,upgrading skills and publicizing scientific achievements. We highlight the role of social networking mediums in influencing teaching, training and research in anaesthesiology. The growth of social networking sites have been prompted by the limitations of previous facilities in terms of ease of data and interface sharing and the amalgamation of audio visual aids on common platforms in the newer facilities. Contemporary social networking sites like Facebook, Twitter, Tumblr,Linkedn etc and their respective features based on anaesthesiology training or practice have been discussed. A host of advantages which these sites confer are also discussed. Likewise the potential pitfalls and drawbacks of these facilities have also been addressed. Social networking sites have immense potential for development of training and research in Anaesthesiology. However responsible and cautious utilization is advocated.

  5. Percolation of interdependent network of networks

    International Nuclear Information System (INIS)

    Havlin, Shlomo; Stanley, H. Eugene; Bashan, Amir; Gao, Jianxi; Kenett, Dror Y.

    2015-01-01

    Complex networks appear in almost every aspect of science and technology. Previous work in network theory has focused primarily on analyzing single networks that do not interact with other networks, despite the fact that many real-world networks interact with and depend on each other. Very recently an analytical framework for studying the percolation properties of interacting networks has been introduced. Here we review the analytical framework and the results for percolation laws for a Network Of Networks (NONs) formed by n interdependent random networks. The percolation properties of a network of networks differ greatly from those of single isolated networks. In particular, because the constituent networks of a NON are connected by node dependencies, a NON is subject to cascading failure. When there is strong interdependent coupling between networks, the percolation transition is discontinuous (first-order) phase transition, unlike the well-known continuous second-order transition in single isolated networks. Moreover, although networks with broader degree distributions, e.g., scale-free networks, are more robust when analyzed as single networks, they become more vulnerable in a NON. We also review the effect of space embedding on network vulnerability. It is shown that for spatially embedded networks any finite fraction of dependency nodes will lead to abrupt transition

  6. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2017-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  7. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2018-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  8. Network Views

    Science.gov (United States)

    Alexander, Louis

    2010-01-01

    The world changed in 2008. The financial crisis brought with it a deepening sense of insecurity, and the desire to be connected to a network increased. Throughout the summer and fall of 2008, events were unfolding with alarming rapidity. The Massachusetts Institute of Technology (MIT) Alumni Association wanted to respond to this change in the…

  9. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  10. Global Networking.

    Science.gov (United States)

    Lynch, Clifford

    1997-01-01

    Discusses the state of the Internet. Highlights include the magnitude of the infrastructure, costs, its increasing pace, constraints in international links, provision of network capacity to homes and small businesses, cable television modems, political and cultural problems, the digital library concept, search engines, the failure of personal…

  11. Network management for 900-1300 MW PWR power plant industrial network

    International Nuclear Information System (INIS)

    Schlosser, J.G.; Maillart, H.; Lopinto, Y.

    1993-07-01

    Communication networks are a vital element in industrial information system projects. Because of the complexity of these networks, which are heterogeneous in terms of hardware, protocols and communication software, the need is now clear to consider them as applications in and of themselves. For this reason, EDF communication networks are now covered by system requirement specifications with SPRINT, and by an acceptance policy which calls for conformance certificates and defines methods for interoperability tests. Network management completes the picture, and attempts to provide the resources with which to assess present network status and manage communication networks. For this purpose, EDF has selected the OSI standard, which is based on four key concepts: - the ''Manager - Agent'' structural model, - a service (CMISE) and a protocol (CMIP) which enable exchange of management information, - an object-oriented management data model, -functions for: configuration, anomaly, performance and alarm management. This document presents the results of a project to integrate into a single management platform communication systems which do not conform to the OSI management recommendations. There were three major phases to the project: - a review of the OSI management model, and most particularly of the information model advocated; - a review of the resources to be managed and a comparison of the information provided by the different agents. Specifications were proposed for the management object and attribute classes which can usefully be implemented; - integration of ARLIC. During development of a breadboard version based on a BULL ISM platform for management of the power plant local area network, one possible solution for integration of ARLIC was proposed, describing the ARLIC information modeling along the lines of the OSI model. This project showed that it is possible to use the OSI modeling to represent management data manipulated by the communication software used on

  12. Janis Huston Audin, MSc, DVM,1950-2009. Dynamic editor-in-chief of the Journal of the American Veterinary Medical Association and strong One Health advocate dies

    Directory of Open Access Journals (Sweden)

    Bruce Kaplan, DVM

    2009-09-01

    Full Text Available Dr Janis H. Audin (MSc Illinois 1975, DVM Illinois 1979, a champion of progressive veterinary medical journalism and ‘One Health’ died on 22 April 2009 following a long, courageous and difficult battle with pancreatic cancer. The world has lost a truly significant One Health leader and advocate. Under her guidance, the Journal of the American Veterinary Medical Association (JAVMA implemented a ‘one-health wonders’ column that recognised and highlighted prominent One Health individuals among the medical and veterinary medical professions in the United States. The American Veterinary Medical Association (AVMA has lost a dedicated and gifted editor-in-chief.Dr Audin joined the editorial staff of the AVMA in 1985, as an assistant editor and was promoted to associate editor in 1989 and editor in 1994. She became the editor-in-chief of both the JAVMA and the American Journal of Veterinary Research in 1995. Prior to that, Dr Audin practised as an associate veterinarian in Calumet City, Illinois, for four years.During her tenure, Dr Audin was noted for implementing procedural and technological changes in the journal to reduce costs, improve timeliness of publications and promote readership interest and awareness. New features in the News section introduced under her leadership have made the journals more practical and public health-relevant. For instance, Dr Audin fostered the United States Department of Agriculture’s Food Safety and Inspection Service (USDA-FSIS ‘Inspection Insights’ - a public health-oriented food safety monthly column related to meat, poultry and egg products - from 1996 through 1998. She also increased international manuscript submissions.On 23 March 2009 AVMA Executive Vice President Dr W. Ron DeHaven named Dr Audin as editor-in-chief emeritus of the Publications Division. Wisely, it also meant that Dr Audin could continue contributing to the staff effort to ensure the high quality of the AVMA scientific journals

  13. Ecological network analysis: network construction

    NARCIS (Netherlands)

    Fath, B.D.; Scharler, U.M.; Ulanowicz, R.E.; Hannon, B.

    2007-01-01

    Ecological network analysis (ENA) is a systems-oriented methodology to analyze within system interactions used to identify holistic properties that are otherwise not evident from the direct observations. Like any analysis technique, the accuracy of the results is as good as the data available, but

  14. Neural Networks

    Directory of Open Access Journals (Sweden)

    Schwindling Jerome

    2010-04-01

    Full Text Available This course presents an overview of the concepts of the neural networks and their aplication in the framework of High energy physics analyses. After a brief introduction on the concept of neural networks, the concept is explained in the frame of neuro-biology, introducing the concept of multi-layer perceptron, learning and their use as data classifer. The concept is then presented in a second part using in more details the mathematical approach focussing on typical use cases faced in particle physics. Finally, the last part presents the best way to use such statistical tools in view of event classifers, putting the emphasis on the setup of the multi-layer perceptron. The full article (15 p. corresponding to this lecture is written in french and is provided in the proceedings of the book SOS 2008.

  15. Feedback Networks

    OpenAIRE

    Zamir, Amir R.; Wu, Te-Lin; Sun, Lin; Shen, William; Malik, Jitendra; Savarese, Silvio

    2016-01-01

    Currently, the most successful learning models in computer vision are based on learning successive representations followed by a decision layer. This is usually actualized through feedforward multilayer neural networks, e.g. ConvNets, where each layer forms one of such successive representations. However, an alternative that can achieve the same goal is a feedback based approach in which the representation is formed in an iterative manner based on a feedback received from previous iteration's...

  16. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  17. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  18. Networks of networks – An introduction

    International Nuclear Information System (INIS)

    Kenett, Dror Y.; Perc, Matjaž; Boccaletti, Stefano

    2015-01-01

    Graphical abstract: Interdependent network reciprocity. Only those blue cooperative domains that are initially present on both networks survive. Abstract: This is an introduction to the special issue titled “Networks of networks” that is in the making at Chaos, Solitons & Fractals. Recent research and reviews attest to the fact that networks of networks are the next frontier in network science [1–7]. Not only are interactions limited and thus inadequately described by well-mixed models, it is also a fact that the networks that should be an integral part of such models are often interconnected, thus making the processes that are unfolding on them interdependent. From the World economy and transportation systems to social media, it is clear that processes taking place in one network might significantly affect what is happening in many other networks. Within an interdependent system, each type of interaction has a certain relevance and meaning, so that treating all the links identically inevitably leads to information loss. Networks of networks, interdependent networks, or multilayer networks are therefore a much better and realistic description of such systems, and this Special Issue is devoted to their structure, dynamics and evolution, as well as to the study of emergent properties in multi-layered systems in general. Topics of interest include but are not limited to the spread of epidemics and information, percolation, diffusion, synchronization, collective behavior, and evolutionary games on networks of networks. Interdisciplinary work on all aspects of networks of networks, regardless of background and motivation, is very welcome.

  19. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  20. ENLIGHT Network

    CERN Multimedia

    Ballantine, A; Dixon-Altaber, H; Dosanjh, M; Kuchina, L

    2011-01-01

    State-of-the-art techniques borrowed from particle accelerators and detectors are a key element in hadrontherapy and several European projects are actively fostering the collaboration amongst the various disciplines and countries. ENLIGHT was established in 2002 to coordinate these European efforts in hadron therapy. The ENLIGHT network is formed by the European hadrontherapy Community, with more than 300 participants from twenty European countries. A major achievement of ENLIGHT has been the blending of traditionally separate communities so that clinicians, physicists, biologists and engineers with experience and interest in particle therapy are working together.

  1. Implementation and Performance Evaluation of Distributed Cloud Storage Solutions using Random Linear Network Coding

    DEFF Research Database (Denmark)

    Fitzek, Frank; Toth, Tamas; Szabados, Áron

    2014-01-01

    This paper advocates the use of random linear network coding for storage in distributed clouds in order to reduce storage and traffic costs in dynamic settings, i.e. when adding and removing numerous storage devices/clouds on-the-fly and when the number of reachable clouds is limited. We introduce...... various network coding approaches that trade-off reliability, storage and traffic costs, and system complexity relying on probabilistic recoding for cloud regeneration. We compare these approaches with other approaches based on data replication and Reed-Solomon codes. A simulator has been developed...... to carry out a thorough performance evaluation of the various approaches when relying on different system settings, e.g., finite fields, and network/storage conditions, e.g., storage space used per cloud, limited network use, and limited recoding capabilities. In contrast to standard coding approaches, our...

  2. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Heide, Janus; Roetter, Daniel Enrique Lucani

    2018-01-01

    Although cloud systems provide a reliable and flexible storage solution, the use of a single cloud service constitutes a single point of failure, which can compromise data availability, download speed, and security. To address these challenges, we advocate for the use of multiple cloud storage...... providers simultaneously using network coding as the key enabling technology. Our goal is to study two challenges of network coded storage systems. First, the efficient update of the number of coded fragments per cloud in a system aggregating multiple clouds in order to boost the download speed of files. We...... developed a novel scheme using recoding with limited packets to trade-off storage space, reliability, and data retrieval speed. Implementation and measurements with commercial cloud providers show that up to 9x less network use is needed compared to other network coding schemes, while maintaining similar...

  3. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  4. Evaluation of a spot-on imidacloprid-moxidectin formulation (Advocate®) for the treatment of naturally occurring esophageal spirocercosis in dogs: a double-blinded, placebo-controlled study.

    Science.gov (United States)

    Segev, Gilad; Rojas, Alicia; Lavy, Eran; Yaffe, Marganit; Aroch, Itamar; Baneth, Gad

    2018-03-05

    Dogs are the definitive hosts of Spirocerca lupi. Spirocercosis is treated by prolonged avermectin administration by injection or daily oral doses. In this prospective, double-blinded, placebo-controlled, clinical trial, the efficacy of imidacloprid and moxidectin spot-on formulation (Advocate®) was compared to injectable doramectin (Dectomax®). Dogs diagnosed with benign esophageal spirocercosis were divided randomly into doramectin (400 μg/kg IM) or moxidectin and imidacloprid spot-on (2.5-6.25 mg/kg and 10-25 mg/kg, respectively) groups and treated weekly for 12 consecutive weeks. Dogs were followed for 20 weeks by physical examination, owners' questionnaire, blood work, fecal floatation, PCR and endoscopy. All the doramectin group dogs (n = 10) completed the treatment and follow-up, and the disease had completely resolved in all by week 12. Of the Advocate® group (n = 10), four had complete resolution at week 12, four had partial resolution, one dog did not respond to treatment, and one dog was switched to the doramectin protocol on week 5 due to persistent severe clinical signs. PCR analysis was more sensitive in detecting S. lupi eggs compared to fecal floatation. Discrepancies were detected on 22 occasions, of which on 20 occasions, the PCR was positive while fecal floatation was negative, and only on two occasions the PCR results were negative while fecal flotation was positive. The present results indicate that weekly Advocate® spot-on administration may be effective for treating benign esophageal spirocercosis, but is less effective than the currently used injectable doramectin therapy at the dose and duration used herein.

  5. Genomic networks of hybrid sterility.

    Directory of Open Access Journals (Sweden)

    Leslie M Turner

    2014-02-01

    applicable in a broad range of organisms and we advocate for widespread adoption of a network-centered approach in speciation genetics.

  6. Genomic networks of hybrid sterility.

    Science.gov (United States)

    Turner, Leslie M; White, Michael A; Tautz, Diethard; Payseur, Bret A

    2014-02-01

    range of organisms and we advocate for widespread adoption of a network-centered approach in speciation genetics.

  7. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both......The multiple-input-multiple-output (MIMO) technique is the most attractive candidate to improve the spectrum efficiency in the next generation wireless communication systems. However, the efficiency of MIMO techniques reduces in the line of sight (LOS) environments. In this paper, we propose a new...

  8. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  9. Synchronization of networks

    Indian Academy of Sciences (India)

    We study the synchronization of coupled dynamical systems on networks. The dynamics is .... Such a time-varying topology can occur in social networks, computer networks, WWW ... This has the effect of reducing the spread of the transverse ...

  10. Reconfigurable network processing platforms

    NARCIS (Netherlands)

    Kachris, C.

    2007-01-01

    This dissertation presents our investigation on how to efficiently exploit reconfigurable hardware to design flexible, high performance, and power efficient network devices capable to adapt to varying processing requirements of network applications and traffic. The proposed reconfigurable network

  11. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    Camarinha-Matos, L.M.; Afsarmanesh, H.

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  12. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  13. Visualization of Social Networks

    NARCIS (Netherlands)

    Boertjes, E.M.; Kotterink, B.; Jager, E.J.

    2011-01-01

    Current visualizations of social networks are mostly some form of node-link diagram. Depending on the type of social network, this can be some treevisualization with a strict hierarchical structure or a more generic network visualization.

  14. Animal transportation networks

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-01-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. PMID:25165598

  15. Network development plan 1995

    International Nuclear Information System (INIS)

    Anon.

    1995-11-01

    Network plan 1995 concerns several strategic problems, among others environmental policy of power transmission lines. Possibilities of restructuring aerial cable network are described. The state of the existing systems and plans for new network systems are presented. (EG)

  16. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  17. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  18. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  19. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  20. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  1. Integrating Networking into ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2018-01-01

    Networking is foundational to the ATLAS distributed infrastructure and there are many ongoing activities related to networking both within and outside of ATLAS. We will report on the progress in a number of areas exploring ATLAS's use of networking and our ability to monitor the network, analyze metrics from the network, and tune and optimize application and end-host parameters to make the most effective use of the network. Specific topics will include work on Open vSwitch for production systems, network analytics, FTS testing and tuning, and network problem alerting and alarming.

  2. “Psychosocial Interventions for Cancer Survivors, Caregivers and Family Members—One Size Does Not Fit All: My Perspective as a Young Adult Survivor, Advocate and Oncology Social Worker” a personal reflection by Mary Grace Bontempo - Office of Cancer Survivorship

    Science.gov (United States)

    “Psychosocial Interventions for Cancer Survivors, Caregivers and Family Members—One Size Does Not Fit All: My Perspective as a Young Adult Survivor, Advocate and Oncology Social Worker” a personal reflection by Mary Grace Bontempo page

  3. Network Plus

    Science.gov (United States)

    Bender, Walter; Chesnais, Pascal

    1988-05-01

    Over the past several years, the Electronic Publishing Group at the MIT Media Laboratory has been conducting a family of media experiments which explore a new kind of broadcast: the distribution of data and computer programs rather than pre-packaged material. This broadcast is not directed to a human recipient, but to a local computational agent acting on his behalf. In response to instructions from both the broadcaster and the reader, this agent selects from the incoming data and presents it in a manner suggestive of traditional media. The embodiment of these media experiments is a news retrieval system where the news editor has been replaced by the personal computer. A variety of both local and remote databases which operate passively as well as interac-tively are accessed by "reporters." These "reporters" are actually software interfaces, which are programmed to gather news. Ideally, they are "broadcatching" that is to say, watching all broadcast television channels, listening to all radio transmissions, and reading all newspapers, magazines, and journals. 1 A possible consequence of the synthesis of media through active processing is the merger of newspapers and television (figure 1). The result is either a newspaper with illustrations which move 2 or, conversely, print as television output. The latter is the theme of Network Plus.

  4. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  5. Three Eras in Global Tobacco Control: How Global Governance Processes Influenced Online Tobacco Control Networking.

    Science.gov (United States)

    Wipfli, Heather; Chu, Kar-Hai; Lancaster, Molly; Valente, Thomas

    2016-01-01

    Online networks can serve as a platform to diffuse policy innovations and enhance global health governance. This study focuses on how shifts in global health governance may influence related online networks. We compare social network metrics (average degree centrality [AVGD], density [D] and clustering coefficient [CC]) of Globalink, an online network of tobacco control advocates, across three eras in global tobacco control governance; pre-Framework Convention on Tobacco Control (FCTC) policy transfer (1992-1998), global regime formation through the FCTC negotiations (1999-2005), and philanthropic funding through the Bloomberg Initiative (2006-2012). Prior to 1999, Globalink was driven by a handful of high-income countries (AVGD=1.908 D=0.030, CC=0.215). The FCTC negotiations (1999-2005) corresponded with a rapid uptick in the number of countries represented within Globalink and new members were most often brought into the network through relationships with regional neighbors (AVGD=2.824, D=0.021, CC=0.253). Between 2006 and 2012, the centrality of the US in the network increases significantly (AVGD=3.414, D=0.023, CC=0.310). The findings suggest that global institutionalization through WHO, as with the FCTC, can lead to the rapid growth of decentralized online networks. Alternatively, private initiatives, such as the Bloomberg Initiative, can lead to clustering in which a single source of information gains increasing influence over an online network.

  6. Data center networks and network architecture

    Science.gov (United States)

    Esaki, Hiroshi

    2014-02-01

    This paper discusses and proposes the architectural framework, which is for data center networks. The data center networks require new technical challenges, and it would be good opportunity to change the functions, which are not need in current and future networks. Based on the observation and consideration on data center networks, this paper proposes; (i) Broadcast-free layer 2 network (i.e., emulation of broadcast at the end-node), (ii) Full-mesh point-to-point pipes, and (iii) IRIDES (Invitation Routing aDvertisement for path Engineering System).

  7. The European ALARA network. Development, functioning and main activities

    International Nuclear Information System (INIS)

    Schmitt-Hannig, A.

    2009-01-01

    The new ICRP recommendations (ICRP 103), and in particular the detailed treatment of optimisation in the ICRP Publication 101, define optimisation of protection as a source-related process aimed at keeping the likelihood of incurred exposures, the number of people exposed and the magnitude of their individual doses as low as reasonably achievable, also below constraints, taking into account economic and societal factors. Practical implementation and further development of the ALARA principle has been achieved for many years now by the successful cooperation of experts from different European organisations; first as pioneers by establishing the European ALARA Network and then by enthusiastically supporting the activities of the network itself. This contribution presents the evolution, operation and key activities of the European ALARA Network (EAN) in the last years; the successful cooperation of experts from different professional backgrounds, advocating the ALARA principle in a range of radiation protection areas, and contributing to its further development by trading experience and networking. The interaction between the EAN and international organisations, which support the ALARA principle by including relevant activities in their work programmes, is described. (orig.)

  8. Pesquisa em contracepção: opinião de pesquisadores, sujeitos e defensoras dos direitos das mulheres Research on contraception: opinion of researchers, subjects and advocates of women rights

    Directory of Open Access Journals (Sweden)

    Ellen Hardy

    2004-12-01

    Full Text Available OBJETIVO: Conhecer a opinião de pesquisadores, de mulheres - sujeitos de pesquisa, e de defensoras dos direitos das mulheres sobre o significado de "pesquisa" e "cobaia". MÉTODOS: Pesquisadores (11, mulheres (18 e defensoras (10 foram entrevistados. O estudo foi qualitativo e a análise dos dados foi temática. RESULTADOS: Os participantes tiveram dificuldade em explicar o que é pesquisa; alguns não conseguiram. Para pesquisadores e maioria das mulheres, sujeitos de pesquisa não são cobaias, porque têm liberdade de escolha. Para a maioria das defensoras, sujeitos são cobaias, ainda que consintam em participar de um estudo. CONCLUSÕES: Foi surpreendente a dificuldade dos pesquisadores em explicar o que é pesquisa. As diferentes opiniões sobre o termo "cobaia" refletem a controvérsia sobre seu significado em pesquisa. Seguramente o termo "cobaia" não se aplica à maior parte dos estudos realizados hoje no Brasil, mas os diferentes significados identificados servem para alertar os pesquisadores a prestar atenção aos aspectos éticos de seus estudos.OBJECTIVE: To survey the opinion of researchers, women - subjects of research- and of advocates of women's rights about the meaning of "research" and "guinea pigs". Methods: Researchers (11, women (18 and advocates (10 were interviewed. The study was qualitative and a thematic analysis was carried out. RESULTS: Participants experienced difficulty to explain what research meant and some were unable to do so. For the researchers and most of the women, subjects are not guinea pigs, because they have freedom of choice. Most of the advocates, however, said that subjects are guinea pigs, even when they consent to participate in a study. CONCLUSIONS: The difficulty experienced by researchers when explaining the meaning of research was surprising. The different opinions about "guinea pig" reflect the controversy about its meaning in research. Certainly the expression "guinea pig" does not apply to

  9. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  10. Open innovation in networks

    DEFF Research Database (Denmark)

    Hu, Yimei

    and hierarchy can be analyzed from a network approach. Within a network perspective, there are different levels of network, and a firm may not always has the power to “manage” innovation networks due to different levels of power. Based on the strength of a firm’s power, its role may varies from manager...

  11. Formation of multiple networks

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    we introduce the first network formation model for multiple networks. Network formation models are among the most popular tools in traditional network studies, because of both their practical and theoretical impact. However, existing models are not sufficient to describe the generation of multiple...

  12. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  13. Modeling Network Interdiction Tasks

    Science.gov (United States)

    2015-09-17

    118 xiii Table Page 36 Computation times for weighted, 100-node random networks for GAND Approach testing in Python ...in Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 38 Accuracy measures for weighted, 100-node random networks for GAND...networks [15:p. 1]. A common approach to modeling network interdiction is to formulate the problem in terms of a two-stage strategic game between two

  14. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  15. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  16. Epidemics on interconnected networks

    Science.gov (United States)

    Dickison, Mark; Havlin, S.; Stanley, H. E.

    2012-06-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties but will also interact with individuals in other networks. We study the susceptible-infected-recovered process on interconnected network systems and find two distinct regimes. In strongly coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength βc, below which the disease does not spread. In contrast, in weakly coupled network systems, a mixed phase exists below βc of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  17. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  18. Networks in Cell Biology

    Science.gov (United States)

    Buchanan, Mark; Caldarelli, Guido; De Los Rios, Paolo; Rao, Francesco; Vendruscolo, Michele

    2010-05-01

    Introduction; 1. Network views of the cell Paolo De Los Rios and Michele Vendruscolo; 2. Transcriptional regulatory networks Sarath Chandra Janga and M. Madan Babu; 3. Transcription factors and gene regulatory networks Matteo Brilli, Elissa Calistri and Pietro Lió; 4. Experimental methods for protein interaction identification Peter Uetz, Björn Titz, Seesandra V. Rajagopala and Gerard Cagney; 5. Modeling protein interaction networks Francesco Rao; 6. Dynamics and evolution of metabolic networks Daniel Segré; 7. Hierarchical modularity in biological networks: the case of metabolic networks Erzsébet Ravasz Regan; 8. Signalling networks Gian Paolo Rossini; Appendix 1. Complex networks: from local to global properties D. Garlaschelli and G. Caldarelli; Appendix 2. Modelling the local structure of networks D. Garlaschelli and G. Caldarelli; Appendix 3. Higher-order topological properties S. Ahnert, T. Fink and G. Caldarelli; Appendix 4. Elementary mathematical concepts A. Gabrielli and G. Caldarelli; References.

  19. Advocating vaccination of adults aged 60 years and older in Western Europe: statement by the Joint Vaccine Working Group of the European Union Geriatric Medicine Society and the International Association of Gerontology and Geriatrics-European Region.

    Science.gov (United States)

    Michel, Jean-Pierre; Chidiac, Christian; Grubeck-Loebenstein, Beatrix; Johnson, Robert W; Lambert, Paul Henri; Maggi, Stefania; Moulias, Robert; Nicholson, Karl; Werner, Hans

    2009-04-01

    Vaccines are an underused public health strategy for healthy aging. Considering the risks of vaccine-preventable diseases and the current low vaccine coverage rates in older European citizens, the two European geriatric and gerontological societies (European Union Geriatric Medicine Society [EUGMS] and International Association of Gerontology and Geriatrics-European Region [IAGG-ER]) convened a Joint Vaccine Working Group to develop a consensus document advocating routine vaccination of aging populations. The mandate of this Working Group was to improve the uptake of routine vaccinations in adults aged 60 years and over. The consensus statement underlines the need to establish, strengthen, and harmonize European policies that continue routine vaccinations to adulthood and that will include older populations. Improved vaccination rates will promote healthy aging by reducing the burden of vaccine-preventable infectious diseases in older populations, a population that is rapidly increasing in Europe.

  20. vhv supply networks, problems of network structure

    Energy Technology Data Exchange (ETDEWEB)

    Raimbault, J

    1966-04-01

    The present and future power requirements of the Paris area and the structure of the existing networks are discussed. The various limitations that will have to be allowed for to lay down the structure of a regional transmission network leading in the power of the large national transmission network to within the Paris built up area are described. The theoretical solution that has been adopted, and the features of its final achievement, which is planned for about the year 2000, and the intermediate stages are given. The problem of the structure of the National Power Transmission network which is to supply the regional network was studied. To solve this problem, a 730 kV voltage network will have to be introduced.

  1. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  2. Applied Ontology Engineering in Cloud Services, Networks and Management Systems

    CERN Document Server

    Serrano Orozco, J Martín

    2012-01-01

    Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems. �...

  3. Making health policy: networks in research and policy after 1945.

    Science.gov (United States)

    Berridge, Virginia

    2005-01-01

    Science and policy in health and medicine have interacted in new ways in Britain since 1945. The relationship between research and policy has a history. The changing role of social medicine, the rise of health services research and "customer contractor" policies in government have been important. The relationship between research and policy has been analysed by different schools of thought. This chapter categorises them as several groups: "evidence-based", "journalism", "sociology of scientific knowledge" and "science policy studies". The chapters in the book illuminate aspects of these changing relationships. The role of chronic disease epidemiology, of new networks in public health, of media-focussed activism, and of health technology and its advocates have been more important than political interest.

  4. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  5. Network connectivity value.

    Science.gov (United States)

    Dragicevic, Arnaud; Boulanger, Vincent; Bruciamacchie, Max; Chauchard, Sandrine; Dupouey, Jean-Luc; Stenger, Anne

    2017-04-21

    In order to unveil the value of network connectivity, we formalize the construction of ecological networks in forest environments as an optimal control dynamic graph-theoretic problem. The network is based on a set of bioreserves and patches linked by ecological corridors. The node dynamics, built upon the consensus protocol, form a time evolutive Mahalanobis distance weighted by the opportunity costs of timber production. We consider a case of complete graph, where the ecological network is fully connected, and a case of incomplete graph, where the ecological network is partially connected. The results show that the network equilibrium depends on the size of the reception zone, while the network connectivity depends on the environmental compatibility between the ecological areas. Through shadow prices, we find that securing connectivity in partially connected networks is more expensive than in fully connected networks, but should be undertaken when the opportunity costs are significant. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  7. Morphological neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, G.X.; Sussner, P. [Univ. of Florida, Gainesville, FL (United States)

    1996-12-31

    The theory of artificial neural networks has been successfully applied to a wide variety of pattern recognition problems. In this theory, the first step in computing the next state of a neuron or in performing the next layer neural network computation involves the linear operation of multiplying neural values by their synaptic strengths and adding the results. Thresholding usually follows the linear operation in order to provide for nonlinearity of the network. In this paper we introduce a novel class of neural networks, called morphological neural networks, in which the operations of multiplication and addition are replaced by addition and maximum (or minimum), respectively. By taking the maximum (or minimum) of sums instead of the sum of products, morphological network computation is nonlinear before thresholding. As a consequence, the properties of morphological neural networks are drastically different than those of traditional neural network models. In this paper we consider some of these differences and provide some particular examples of morphological neural network.

  8. Network Transformations in Economy

    Directory of Open Access Journals (Sweden)

    Bolychev O.

    2014-09-01

    Full Text Available In the context of ever-increasing market competition, networked interactions play a special role in the economy. The network form of entrepreneurship is increasingly viewed as an effective organizational structure to create a market value embedded in innovative business solutions. The authors study the characteristics of a network as an economic category and emphasize certain similarities between Rus sian and international approaches to identifying interactions of economic systems based on the network principle. The paper focuses on the types of networks widely used in the economy. The authors analyze the transformation of business networks along two lines: from an intra- to an inter-firm network and from an inter-firm to an inter-organizational network. The possible forms of network formation are described depending on the strength of connections and the type of integration. The drivers and reasons behind process of transition from a hierarchical model of the organizational structure to a network type are identified. The authors analyze the advantages of creating inter-firm networks and discuss the features of inter-organizational networks as compares to inter-firm ones. The article summarizes the reasons for and advantages of participation in inter-rganizational networks and identifies the main barriers to the formation of inter-organizational network.

  9. Towards dropout training for convolutional neural networks.

    Science.gov (United States)

    Wu, Haibing; Gu, Xiaodong

    2015-11-01

    Recently, dropout has seen increasing use in deep learning. For deep convolutional neural networks, dropout is known to work well in fully-connected layers. However, its effect in convolutional and pooling layers is still not clear. This paper demonstrates that max-pooling dropout is equivalent to randomly picking activation based on a multinomial distribution at training time. In light of this insight, we advocate employing our proposed probabilistic weighted pooling, instead of commonly used max-pooling, to act as model averaging at test time. Empirical evidence validates the superiority of probabilistic weighted pooling. We also empirically show that the effect of convolutional dropout is not trivial, despite the dramatically reduced possibility of over-fitting due to the convolutional architecture. Elaborately designing dropout training simultaneously in max-pooling and fully-connected layers, we achieve state-of-the-art performance on MNIST, and very competitive results on CIFAR-10 and CIFAR-100, relative to other approaches without data augmentation. Finally, we compare max-pooling dropout and stochastic pooling, both of which introduce stochasticity based on multinomial distributions at pooling stage. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. The Global Virus Network: Challenging chikungunya.

    Science.gov (United States)

    McSweegan, Edward; Weaver, Scott C; Lecuit, Marc; Frieman, Matthew; Morrison, Thomas E; Hrynkow, Sharon

    2015-08-01

    The recent spread of chikungunya virus to the Western Hemisphere, together with the ongoing Ebola epidemic in West Africa, have highlighted the importance of international collaboration in the detection and management of disease outbreaks. In response to this need, the Global Virus Network (GVN) was formed in 2011. The GVN is a coalition of leading medical virologists in 34 affiliated laboratories in 24 countries, who collaborate to share their resources and expertise. The GVN supports research, promotes training for young scientists, serves as a technical resource for governments, businesses and international organizations, facilitates international scientific cooperation, and advocates for funding and evidence-based public policies. In response to the spread of chikungunya, the GVN formed a task force to identify research gaps and opportunities, including models of infection and disease, candidate vaccines and antivirals, epidemiology and vector control measures. Its members also serve as authoritative sources of information for the public, press, and policy-makers. This article forms part of a symposium in Antiviral Research on "Chikungunya discovers the New World". Published by Elsevier B.V.

  11. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  12. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  13. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  14. Cisco networking essentials

    CERN Document Server

    McMillan, Troy

    2015-01-01

    Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and c

  15. Airborne Network Optimization with Dynamic Network Update

    Science.gov (United States)

    2015-03-26

    source si and a target ti . For each commodity (si, ki) the commodity specifies a non- negative demand di [5]. The objective of the multi-commodity...queue predictions, and network con- gestion [15]. The implementation of the DRQC uses the Kalman filter to predict the state of the network and optimize

  16. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  17. Advocating Orchestration amongst RSUST Freshmen | Ngulube ...

    African Journals Online (AJOL)

    AFRREV LALIGENS: An International Journal of Language, Literature and Gender Studies. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 4, No 1 (2015) >. Log in or Register to get access to full text downloads.

  18. PAHO: Advocating for ecohealth | IDRC - International Development ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-05-10

    May 10, 2011 ... “PAHO works with the ministries of health in various countries,” Dr Corvalan said. ... as in the government to start addressing these issues of public health. ... “I work now in Brazil, and I can see how engaged the government is.

  19. Advocates for Radical Change: Two Research Odysseys.

    Science.gov (United States)

    Hall, M. Ann

    1983-01-01

    Research in sport sociology is discussed, especially those studies emphasizing the relationship between sports and class domination. The need for research that pays attention to the power relationships between men and women is pointed out. (PP)

  20. Advocating for Additional Aspects of Quality

    Science.gov (United States)

    Herbel-Eisenmann, Beth A.

    2016-01-01

    Across the set of articles in this Special Issue, various authors describe methodology and methodological decisions, illustrate analyses, and share emerging findings from The Evolution of the Discourse of School Mathematics (EDSM) project. In general, the investigators were interested in identifying "changes over time in the kind of…

  1. Athletic coaches as violence prevention advocates.

    Science.gov (United States)

    Jaime, Maria Catrina D; McCauley, Heather L; Tancredi, Daniel J; Nettiksimmons, Jasmine; Decker, Michele R; Silverman, Jay G; O'Connor, Brian; Stetkevich, Nicholas; Miller, Elizabeth

    2015-04-01

    Adolescent relationship abuse (ARA) is a significant public health problem. Coaching Boys Into Men (CBIM) is an evidence-based ARA prevention program that trains coaches to deliver violence prevention messages to male athletes. Assessing acceptability and impact of CBIM on coaches may inform prevention efforts that involve these important adults in health promotion among youth. As part of a two-armed cluster-randomized controlled trial of CBIM in 16 high schools in Northern California, coaches completed baseline and postseason surveys (n = 176) to assess their attitudes and confidence delivering the program. Coaches in the intervention arm also participated in interviews (n = 36) that explored program acceptability, feasibility, and impact. Relative to controls, intervention coaches showed increases in confidence intervening when witnessing abusive behaviors among their athletes, greater bystander intervention, and greater frequency of violence-related discussions with athletes and other coaches. Coaches reported the program was easy to implement and valuable for their athletes. Findings illustrate the value of exploring attitudinal and behavioral changes among ARA prevention implementers, and suggest that coaches can gain confidence and enact behaviors to discourage ARA among male athletes. Coaches found the program to be feasible and valuable, which suggests potential for long-term uptake and sustainability. © The Author(s) 2014.

  2. Christian Social Justice Advocate: Contradiction or Legacy?

    Science.gov (United States)

    Edwards, Cher N.

    2012-01-01

    In this article, the relationship between Christian religiosity and the principles of social justice is explored, including the sociopolitical aspects of faith and advocacy. A particular emphasis is placed on the historical legacy and theological relationships between Christianity and social justice. The author concludes with a call for…

  3. Understand and Advocate for Communities First

    Science.gov (United States)

    Khalifa, Muhammad; Arnold, Noelle Witherspoon; Newcomb, Whitney

    2015-01-01

    Culturally responsive parent-school relationships require educators to consider the cultural practices and understandings of families as a necessary condition of greater academic achievement. The establishment of healthy parent-school relationships is a complex and dynamic process. A school-community overlap, with a priority given to community…

  4. Default supply issues divides consumer advocates

    International Nuclear Information System (INIS)

    Anon.

    1999-01-01

    In Toronto, various agencies, all claiming to represent the best interests of consumers, have taken very different positions on the limits that should be placed on suppliers of standard electricity service, due to an unexpected effect of Ontario's market design. The debate has polarized into either support for the Market Design Committee's recommendations restricting local companies' distribution of electricity to one of passing on the spot market price to their standard customers or the view that municipal utilities should be permitted to enter into contracts for power in order to supply the needs of their standard service customers. The Independent Power Producers' Society of Ontario (IPPSO) takes the position that its member companies should have direct access to the default supply market and not to be forced to deal solely with the spot market to reach this market sector. This default market is expected to be the largest potential end use market in Ontario for the power produced and/or sold by IPPSO members. It is expected to be 70% of the total Ontario wholesale electricity market for many years to come

  5. Are fathers underused advocates for breastfeeding?

    LENUS (Irish Health Repository)

    Kenosi, M

    2011-11-01

    Fathers\\' knowledge base and attitudes influence breastfeeding practice. We aimed to evaluate if Irish fathers felt included in the breastfeeding education and decision process. 67 fathers completed questionnaires, which assessed their role in the decision to breastfeed, knowledge regarding the benefits of breastfeeding and attitude towards breastfeeding.Forty-two (62.7%) of their partners were breastfeeding. Antenatal classes were attended by 38 (56.7%); 59 (88.1%) discussed breastfeeding with their partners and 26 (38.8%) felt that the decision was made together. Twelve (48%) fathers of formula fed infants were unaware that breastfeeding was healthier for the baby. Most fathers (80.6%) felt that breastfeeding was the mother\\'s decision and most (82.1%) felt that antenatal information was aimed at mothers only. Irish fathers remain relatively uninformed regarding the benefits of breastfeeding. This may contribute to their exclusion from the decision to breastfeed. Antenatal education should incorporate fathers more, and this may result in an improvement in our breastfeeding rates.

  6. Courtland Lee: A Global Advocate for Counseling

    Science.gov (United States)

    Gladding, Samuel T.

    2011-01-01

    Courtland Lee is exemplary in his accomplishments nationally and internationally. His academic achievements are notable in multicultural counseling and social justice. His leadership in counseling has been outstanding with his having served as president of the American Counseling Association, the Association for Multicultural Counseling and…

  7. Vape Shop Employees: Public Health Advocates?

    OpenAIRE

    Hart, Joy L; Walker, Kandi L; Sears, Clara G; Lee, Alexander S; Smith, Courteney; Siu, Allison; Keith, Rachel; Ridner, S. Lee

    2017-01-01

    INTRODUCTION E-cigarettes have increased in popularity and given rise to a new type of sales outlet?the vape shop. Expanding on work examining vape shop employee e-cigarette and tobacco attitudes and behaviors 1 , this study examined key messages that vape shop employees communicate to customers. METHODS Using informal interviews, observations, and a cross-sectional survey, we examined vape shop employees? (n=16) perceptions and e-cigarette use. Data were collected in nine vape shops in Louis...

  8. "PEERLESS ADVOCATE: DANA’S CHRONICLE"

    Directory of Open Access Journals (Sweden)

    Douglas Steeples

    2002-01-01

    Full Text Available In July, 1865, William Buck Dana began to publish the Commercial and Financial Chronicle, in New York City. The Chronicle took for its model The Economist of London. Dana’s recognition of the importance of the telegraph, steam-ships and railroads as new means of conveying accurate and current information for the conduct of domestic and global business were crucial in the rise of his paper to preeminence among American commercial publications. Constant efforts to optimize the use of capital, maximize operational efficiency, stay abreast of and employ technological advances, and add useful features enlarged its value and success. These qualities and Dana’s singular attunement to the temper of his times and his readers assured that the Chronicle's primacy would linger long after his death in 1910.

  9. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  10. Innovations, status, and networks

    NARCIS (Netherlands)

    P. Wang (Pengfei)

    2016-01-01

    markdownabstractTo obtain and maintain competitive advantage, firms need to implement appropriate innovation strategies (i.e. exploration or exploitation) and acquire status in external networks. In this dissertation, I investigate how innovation strategy, status, and network structure jointly

  11. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  12. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  13. Cooperative Hurricane Network Obs

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations from the Cooperative Hurricane Reporting Network (CHURN), a special network of stations that provided observations when tropical cyclones approached the...

  14. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described......Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  15. Bladder Cancer Advocacy Network

    Science.gov (United States)

    ... Grants Bladder Cancer Think Tank Bladder Cancer Research Network Bladder Cancer Genomics Consortium Get Involved Ways to ... us? Who we are The Bladder Cancer Advocacy Network (BCAN) is a community of patients, caregivers, survivors, ...

  16. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  17. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  18. Temporal network epidemiology

    CERN Document Server

    Holme, Petter

    2017-01-01

    This book covers recent developments in epidemic process models and related data on temporally varying networks. It is widely recognized that contact networks are indispensable for describing, understanding, and intervening to stop the spread of infectious diseases in human and animal populations; “network epidemiology” is an umbrella term to describe this research field. More recently, contact networks have been recognized as being highly dynamic. This observation, also supported by an increasing amount of new data, has led to research on temporal networks, a rapidly growing area. Changes in network structure are often informed by epidemic (or other) dynamics, in which case they are referred to as adaptive networks. This volume gathers contributions by prominent authors working in temporal and adaptive network epidemiology, a field essential to understanding infectious diseases in real society.

  19. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  20. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...... from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight...

  1. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  2. Stabilizing weighted complex networks

    International Nuclear Information System (INIS)

    Xiang Linying; Chen Zengqiang; Liu Zhongxin; Chen Fei; Yuan Zhuzhi

    2007-01-01

    Real networks often consist of local units which interact with each other via asymmetric and heterogeneous connections. In this paper, the V-stability problem is investigated for a class of asymmetric weighted coupled networks with nonidentical node dynamics, which includes the unweighted network as a special case. Pinning control is suggested to stabilize such a coupled network. The complicated stabilization problem is reduced to measuring the semi-negative property of the characteristic matrix which embodies not only the network topology, but also the node self-dynamics and the control gains. It is found that network stabilizability depends critically on the second largest eigenvalue of the characteristic matrix. The smaller the second largest eigenvalue is, the more the network is pinning controllable. Numerical simulations of two representative networks composed of non-chaotic systems and chaotic systems, respectively, are shown for illustration and verification

  3. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  4. Reciprocity of weighted networks.

    Science.gov (United States)

    Squartini, Tiziano; Picciolo, Francesco; Ruzzenenti, Franco; Garlaschelli, Diego

    2013-01-01

    In directed networks, reciprocal links have dramatic effects on dynamical processes, network growth, and higher-order structures such as motifs and communities. While the reciprocity of binary networks has been extensively studied, that of weighted networks is still poorly understood, implying an ever-increasing gap between the availability of weighted network data and our understanding of their dyadic properties. Here we introduce a general approach to the reciprocity of weighted networks, and define quantities and null models that consistently capture empirical reciprocity patterns at different structural levels. We show that, counter-intuitively, previous reciprocity measures based on the similarity of mutual weights are uninformative. By contrast, our measures allow to consistently classify different weighted networks according to their reciprocity, track the evolution of a network's reciprocity over time, identify patterns at the level of dyads and vertices, and distinguish the effects of flux (im)balances or other (a)symmetries from a true tendency towards (anti-)reciprocation.

  5. Energy Sciences Network (ESnet)

    Data.gov (United States)

    Federal Laboratory Consortium — The Energy Sciences Network is the Department of Energy’s high-speed network that provides the high-bandwidth, reliable connections that link scientists at national...

  6. Network survivability performance

    Science.gov (United States)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  7. Local network assessment

    Science.gov (United States)

    Glen, D. V.

    1985-04-01

    Local networks, related standards activities of the Institute of Electrical and Electronics Engineers the American National Standards Institute and other elements are presented. These elements include: (1) technology choices such as topology, transmission media, and access protocols; (2) descriptions of standards for the 802 local area networks (LAN's); high speed local networks (HSLN's) and military specification local networks; and (3) intra- and internetworking using bridges and gateways with protocols Interconnection (OSI) reference model. The convergence of LAN/PBX technology is also described.

  8. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project.......Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  9. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  10. Routed planar networks

    Directory of Open Access Journals (Sweden)

    David J. Aldous

    2016-04-01

    Full Text Available Modeling a road network as a planar graph seems very natural. However, in studying continuum limits of such networks it is useful to take {\\em routes} rather than {\\em edges} as primitives. This article is intended to introduce the relevant (discrete setting notion of {\\em routed network} to graph theorists. We give a naive classification of all 71 topologically different such networks on 4 leaves, and pose a variety of challenging research questions.

  11. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  12. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  13. Heterogeneity and Networks

    OpenAIRE

    Goyal, S.

    2018-01-01

    This chapter shows that networks can have large and differentiated effects on behavior and then argues that social and economic pressures facilitate the formation of heterogenous networks. Thus networks can play an important role in understanding the wide diversity in human behaviour and in economic outcomes.

  14. Synchronization of networks

    Indian Academy of Sciences (India)

    We study the synchronization of coupled dynamical systems on networks. The dynamics is governed by a local nonlinear oscillator for each node of the network and interactions connecting different nodes via the links of the network. We consider existence and stability conditions for both single- and multi-cluster ...

  15. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm

    2017-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how such gender......Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how...... such gendering of entrepreneurs’ networks differ between societies and cultures. Research Design: Based on survey data from the Global Entrepreneurships Monitor, a sample of 16,365 entrepreneurs is used to compare the gendering of entrepreneurs’ networks in China, and five countries largely located around...... the Persian Gulf, namely Yemen, Iran, Saudi Arabia, Qatar and United Arab Emirates. Findings: Analyses show that female entrepreneurs tend to have slightly larger private sphere networks than male entrepreneurs. The differences between male and female entrepreneurs’ networking in the public sphere...

  16. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy

  17. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  18. Optimal Fragile Financial Networks

    NARCIS (Netherlands)

    Castiglionesi, F.; Navarro, N.

    2007-01-01

    We study a financial network characterized by the presence of depositors, banks and their shareholders. Belonging to a financial network is beneficial for both the depositors and banks' shareholders since the return to investment increases with the number of banks connected. However, the network is

  19. Actor-Network Procedures

    NARCIS (Netherlands)

    Pavlovic, Dusko; Meadows, Catherine; Ramanujam, R.; Ramaswamy, Srini

    2012-01-01

    In this paper we propose actor-networks as a formal model of computation in heterogenous networks of computers, humans and their devices, where these new procedures run; and we introduce Procedure Derivation Logic (PDL) as a framework for reasoning about security in actor-networks, as an extension

  20. Herding Complex Networks

    KAUST Repository

    Ruf, Sebastian F.; Egersted, Magnus; Shamma, Jeff S.

    2018-01-01

    the ability to drive a system to a specific set in the state space, was recently introduced as an alternative network control notion. This paper considers the application of herdability to the study of complex networks. The herdability of a class of networked

  1. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  2. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  3. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    different online networks for communities of people who share interests or individuals who presents themselves through user produced content is what makes up the social networking of today. The purpose of this paper is to discuss perceived user requirements to the next generation social networks. The paper...

  4. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  5. Designing a parallel evolutionary algorithm for inferring gene networks on the cloud computing environment.

    Science.gov (United States)

    Lee, Wei-Po; Hsiao, Yu-Ting; Hwang, Wei-Che

    2014-01-16

    To improve the tedious task of reconstructing gene networks through testing experimentally the possible interactions between genes, it becomes a trend to adopt the automated reverse engineering procedure instead. Some evolutionary algorithms have been suggested for deriving network parameters. However, to infer large networks by the evolutionary algorithm, it is necessary to address two important issues: premature convergence and high computational cost. To tackle the former problem and to enhance the performance of traditional evolutionary algorithms, it is advisable to use parallel model evolutionary algorithms. To overcome the latter and to speed up the computation, it is advocated to adopt the mechanism of cloud computing as a promising solution: most popular is the method of MapReduce programming model, a fault-tolerant framework to implement parallel algorithms for inferring large gene networks. This work presents a practical framework to infer large gene networks, by developing and parallelizing a hybrid GA-PSO optimization method. Our parallel method is extended to work with the Hadoop MapReduce programming model and is executed in different cloud computing environments. To evaluate the proposed approach, we use a well-known open-source software GeneNetWeaver to create several yeast S. cerevisiae sub-networks and use them to produce gene profiles. Experiments have been conducted and the results have been analyzed. They show that our parallel approach can be successfully used to infer networks with desired behaviors and the computation time can be largely reduced. Parallel population-based algorithms can effectively determine network parameters and they perform better than the widely-used sequential algorithms in gene network inference. These parallel algorithms can be distributed to the cloud computing environment to speed up the computation. By coupling the parallel model population-based optimization method and the parallel computational framework, high

  6. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  7. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique; Ahmad, Qutbuddin S.

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009

  8. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  9. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  10. Peak loads and network investments in sustainable energy transitions

    Energy Technology Data Exchange (ETDEWEB)

    Blokhuis, Erik, E-mail: e.g.j.blokhuis@tue.nl [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands); Brouwers, Bart [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands); Putten, Eric van der [Endinet, Gas and Electricity Network Operations, P.O. Box 2005, 5600CA Eindhoven (Netherlands); Schaefer, Wim [Eindhoven University of Technology, Department of Architecture, Building and Planning, Vertigo 8.11, P.O. Box 513, 5600MB Eindhoven (Netherlands)

    2011-10-15

    Current energy distribution networks are often not equipped for facilitating expected sustainable transitions. Major concerns for future electricity networks are the possibility of peak load increases and the expected growth of decentralized energy generation. In this article, we focus on peak load increases; the effects of possible future developments on peak loads are studied, together with the consequences for the network. The city of Eindhoven (the Netherlands) is used as reference city, for which a scenario is developed in which the assumed future developments adversely influence the maximum peak loads on the network. In this scenario, the total electricity peak load in Eindhoven is expected to increase from 198 MVA in 2009 to 591-633 MVA in 2040. The necessary investments for facilitating the expected increased peak loads are estimated at 305-375 million Euros. Based upon these projections, it is advocated that - contrary to current Dutch policy - choices regarding sustainable transitions should be made from the viewpoint of integral energy systems, evaluating economic implications of changes to generation, grid development, and consumption. Recently applied and finished policies on energy demand reduction showed to be effective; however, additional and connecting policies on energy generation and distribution should be considered on short term. - Highlights: > Sustainable energy transitions can result in major electricity peak load increases. > Introduction of heat pumps and electrical vehicles requires network expansion. > Under worst case assumptions, peak loads in Eindhoven increase with 200% until 2040. > The necessary investment for facilitating this 2040 peak demand is Euro 305-375 million. > Future policy choices should be made from the viewpoint of the integral energy system.

  11. Peak loads and network investments in sustainable energy transitions

    International Nuclear Information System (INIS)

    Blokhuis, Erik; Brouwers, Bart; Putten, Eric van der; Schaefer, Wim

    2011-01-01

    Current energy distribution networks are often not equipped for facilitating expected sustainable transitions. Major concerns for future electricity networks are the possibility of peak load increases and the expected growth of decentralized energy generation. In this article, we focus on peak load increases; the effects of possible future developments on peak loads are studied, together with the consequences for the network. The city of Eindhoven (the Netherlands) is used as reference city, for which a scenario is developed in which the assumed future developments adversely influence the maximum peak loads on the network. In this scenario, the total electricity peak load in Eindhoven is expected to increase from 198 MVA in 2009 to 591-633 MVA in 2040. The necessary investments for facilitating the expected increased peak loads are estimated at 305-375 million Euros. Based upon these projections, it is advocated that - contrary to current Dutch policy - choices regarding sustainable transitions should be made from the viewpoint of integral energy systems, evaluating economic implications of changes to generation, grid development, and consumption. Recently applied and finished policies on energy demand reduction showed to be effective; however, additional and connecting policies on energy generation and distribution should be considered on short term. - Highlights: → Sustainable energy transitions can result in major electricity peak load increases. → Introduction of heat pumps and electrical vehicles requires network expansion. → Under worst case assumptions, peak loads in Eindhoven increase with 200% until 2040. → The necessary investment for facilitating this 2040 peak demand is Euro 305-375 million. → Future policy choices should be made from the viewpoint of the integral energy system.

  12. Logistical networking: a global storage network

    International Nuclear Information System (INIS)

    Beck, Micah; Moore, Terry

    2005-01-01

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it

  13. Learning conditional Gaussian networks

    DEFF Research Database (Denmark)

    Bøttcher, Susanne Gammelgaard

    This paper considers conditional Gaussian networks. The parameters in the network are learned by using conjugate Bayesian analysis. As conjugate local priors, we apply the Dirichlet distribution for discrete variables and the Gaussian-inverse gamma distribution for continuous variables, given...... a configuration of the discrete parents. We assume parameter independence and complete data. Further, to learn the structure of the network, the network score is deduced. We then develop a local master prior procedure, for deriving parameter priors in these networks. This procedure satisfies parameter...... independence, parameter modularity and likelihood equivalence. Bayes factors to be used in model search are introduced. Finally the methods derived are illustrated by a simple example....

  14. Network Characterization Service (NCS)

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Yang, George [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Crowley, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2001-06-06

    Distributed applications require information to effectively utilize the network. Some of the information they require is the current and maximum bandwidth, current and minimum latency, bottlenecks, burst frequency, and congestion extent. This type of information allows applications to determine parameters like optimal TCP buffer size. In this paper, we present a cooperative information-gathering tool called the network characterization service (NCS). NCS runs in user space and is used to acquire network information. Its protocol is designed for scalable and distributed deployment, similar to DNS. Its algorithms provide efficient, speedy and accurate detection of bottlenecks, especially dynamic bottlenecks. On current and future networks, dynamic bottlenecks do and will affect network performance dramatically.

  15. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  16. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  17. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  18. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  19. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  20. Entropy of network ensembles

    Science.gov (United States)

    Bianconi, Ginestra

    2009-03-01

    In this paper we generalize the concept of random networks to describe network ensembles with nontrivial features by a statistical mechanics approach. This framework is able to describe undirected and directed network ensembles as well as weighted network ensembles. These networks might have nontrivial community structure or, in the case of networks embedded in a given space, they might have a link probability with a nontrivial dependence on the distance between the nodes. These ensembles are characterized by their entropy, which evaluates the cardinality of networks in the ensemble. In particular, in this paper we define and evaluate the structural entropy, i.e., the entropy of the ensembles of undirected uncorrelated simple networks with given degree sequence. We stress the apparent paradox that scale-free degree distributions are characterized by having small structural entropy while they are so widely encountered in natural, social, and technological complex systems. We propose a solution to the paradox by proving that scale-free degree distributions are the most likely degree distribution with the corresponding value of the structural entropy. Finally, the general framework we present in this paper is able to describe microcanonical ensembles of networks as well as canonical or hidden-variable network ensembles with significant implications for the formulation of network-constructing algorithms.

  1. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  2. Networks in ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2016-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  3. Networks in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00260714; The ATLAS collaboration

    2017-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  4. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  5. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  6. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Jimenez, Tamara

    2013-01-01

    The use of cognition is a promising element for the control of heterogeneous optical networks. Not only are cognitive networks able to sense current network conditions and act according to them, but they also take into account the knowledge acquired through past experiences; that is, they include...... learning with the aim of improving performance. In this paper, we review the fundamentals of cognitive networks and focus on their application to the optical networking area. In particular, a number of cognitive network architectures proposed so far, as well as their associated supporting technologies......, are reviewed. Moreover, several applications, mainly developed in the framework of the EU FP7 Cognitive Heterogeneous Reconfigurable Optical Network (CHRON) project, are also described....

  7. Attachment and social networks.

    Science.gov (United States)

    Gillath, Omri; C Karantzas, Gery; Lee, Juwon

    2018-02-21

    The current review covers two lines of research linking attachment and social networks. One focuses on attachment networks (the people who fulfill one's attachment needs), examining composition and age-related differences pertaining to these networks. The other line integrates attachment with social network analysis to investigate how individual differences in adult attachment are associated with the management and characteristics (e.g., density, multiplexity, and centrality) of people's social networks. We show that most people's attachment networks are small and hierarchical, with one figure being the primary attachment figure (often a mother or romantic partner, depending on age). Furthermore, attachment style predicts network characteristics and management, such that insecurity is associated with less closeness, multiplexity, centrality, and poorer management (less maintenance, more dissolution). Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. Setting up virtual private network

    International Nuclear Information System (INIS)

    Huang Hongmei; Zhang Chengjun

    2003-01-01

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise's network function and enlarges its private scope. The text introduces virtual private network's principal, privileges and protocols that use in virtual private network. At last, this paper introduces several setting up virtual private network's technologies which based on LAN

  9. Setting up virtual private network

    International Nuclear Information System (INIS)

    Huang Hongmei; Zhang Chengjun

    2003-01-01

    Setting up virtual private network for business enterprise provides a low cost network foundation, increases enterprise network function and enlarges its private scope. This text introduces virtual private network principal, privileges and protocols applied in virtual private network. At last, this paper introduces several setting up virtual private network technologies which is based on LAN

  10. Networks : Empowering Communities through Telecentre Networking

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... Egypt, Syria, Lebanon and Morocco - have pulled together in loose networks for peer support. ... IDRC “unpacks women's empowerment” at McGill University Conference ... New funding opportunity for gender equality and climate change.

  11. Network-Centric Applications and Tactical Networks

    National Research Council Canada - National Science Library

    Krout, Timothy; Durbano, Steven; Shearer, Ruth

    2003-01-01

    .... Command and control applications will always require communications capabilities. There are numerous examples of command and control applications that have been developed without adequate attention to the realities of tactical networks...

  12. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  13. Organization of complex networks

    Science.gov (United States)

    Kitsak, Maksim

    Many large complex systems can be successfully analyzed using the language of graphs and networks. Interactions between the objects in a network are treated as links connecting nodes. This approach to understanding the structure of networks is an important step toward understanding the way corresponding complex systems function. Using the tools of statistical physics, we analyze the structure of networks as they are found in complex systems such as the Internet, the World Wide Web, and numerous industrial and social networks. In the first chapter we apply the concept of self-similarity to the study of transport properties in complex networks. Self-similar or fractal networks, unlike non-fractal networks, exhibit similarity on a range of scales. We find that these fractal networks have transport properties that differ from those of non-fractal networks. In non-fractal networks, transport flows primarily through the hubs. In fractal networks, the self-similar structure requires any transport to also flow through nodes that have only a few connections. We also study, in models and in real networks, the crossover from fractal to non-fractal networks that occurs when a small number of random interactions are added by means of scaling techniques. In the second chapter we use k-core techniques to study dynamic processes in networks. The k-core of a network is the network's largest component that, within itself, exhibits all nodes with at least k connections. We use this k-core analysis to estimate the relative leadership positions of firms in the Life Science (LS) and Information and Communication Technology (ICT) sectors of industry. We study the differences in the k-core structure between the LS and the ICT sectors. We find that the lead segment (highest k-core) of the LS sector, unlike that of the ICT sector, is remarkably stable over time: once a particular firm enters the lead segment, it is likely to remain there for many years. In the third chapter we study how

  14. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  15. Interdisciplinary Approach to the Mental Lexicon: Neural Network and Text Extraction From Long-term Memory

    Directory of Open Access Journals (Sweden)

    Vardan G. Arutyunyan

    2013-01-01

    Full Text Available The paper touches upon the principles of mental lexicon organization in the light of recent research in psycho- and neurolinguistics. As a focal point of discussion two main approaches to mental lexicon functioning are considered: modular or dual-system approach, developed within generativism and opposite single-system approach, representatives of which are the connectionists and supporters of network models. The paper is an endeavor towards advocating the viewpoint that mental lexicon is complex psychological organization based upon specific composition of neural network. In this regard, the paper further elaborates on the matter of storing text in human mental space and introduces a model of text extraction from long-term memory. Based upon data available, the author develops a methodology of modeling structures of knowledge representation in the systems of artificial intelligence.

  16. Cellular Controlled Short-Range Communication for Cooperative P2P Networking

    DEFF Research Database (Denmark)

    Fitzek, Frank H. P.; Katz, Marcos; Zhang, Qi

    2009-01-01

    -range communication network among cooperating mobile and wireless devices. The role of the mobile device will change, from being an agnostic entity in respect to the surrounding world to a cognitive device. This cognitive device is capable of being aware of the neighboring devices as well as on the possibility......This article advocates a novel communication architecture and associated collaborative framework for future wireless communication systems. In contrast to the dominating cellular architecture and the upcoming peer-to-peer architecture, the new approach envisions a cellular controlled short...... to establish cooperation with them. The novel architecture together with several possible cooperative strategies will bring clear benefits for the network and service providers, mobile device manufacturers and also end users....

  17. Actor-networking ceta-sociality, or, what is sociological about contemporary whales?

    DEFF Research Database (Denmark)

    Blok, Anders

    2007-01-01

    theory (ANT) allows for the inclusion of non-human ‘actants' (like whales) into the fabric of sociality. In the ontology of ANT, sociality emerges as semiotic-material configurations of humans, animals and technologies. Starting from a critical review of the work by Adrian Franklin on growing......In contemporary urban Euro-American societies, whales have become hugely popular and iconic creatures, arousing controversies more intense than most other instances of animal politics. How to account sociologically, however, for the dramatic social transformation of whales, from natural resource...... to near-sacrosanct agent, is far from self-evident. This article advocates a change of theoretical perspective, inspired by the work of actor-network theorists Bruno Latour and Michel Callon. Rather than focussing solely on the ‘humanity' of human-animal relations, as does most of sociology, actor-network...

  18. Stochastic Petri nets for the reliability analysis of communication network applications with alternate-routing

    International Nuclear Information System (INIS)

    Balakrishnan, Meera; Trivedi, Kishor S.

    1996-01-01

    In this paper, we present a comparative reliability analysis of an application on a corporate B-ISDN network under various alternate-routing protocols. For simple cases, the reliability problem can be cast into fault-tree models and solved rapidly by means of known methods. For more complex scenarios, state space (Markov) models are required. However, generation of large state space models can get very labor intensive and error prone. We advocate the use of stochastic reward nets (a variant of stochastic Petri nets) for the concise specification, automated generation and solution of alternate-routing protocols in networks. This paper is written in a tutorial style so as to make it accessible to a large audience

  19. Adverse Outcome Pathway Networks II: Network Analytics.

    Science.gov (United States)

    Villeneuve, Daniel L; Angrish, Michelle M; Fortin, Marie C; Katsiadaki, Ioanna; Leonard, Marc; Margiotta-Casaluci, Luigi; Munn, Sharon; O'Brien, Jason M; Pollesch, Nathan L; Smith, L Cody; Zhang, Xiaowei; Knapen, Dries

    2018-02-28

    Toxicological responses to stressors are more complex than the simple one biological perturbation to one adverse outcome model portrayed by individual adverse outcome pathways (AOPs). Consequently, the AOP framework was designed to facilitate de facto development of AOP networks that can aid understanding and prediction of pleiotropic and interactive effects more common to environmentally realistic, complex exposure scenarios. The present paper introduces nascent concepts related to the qualitative analysis of AOP networks. First, graph theory-based approaches for identifying important topological features are illustrated using two example AOP networks derived from existing AOP descriptions. Second, considerations for identifying the most significant path(s) through an AOP network from either a biological or risk assessment perspective are described. Finally, approaches for identifying interactions among AOPs that may result in additive, synergistic, or antagonistic responses, or previously undefined emergent patterns of response, are introduced. Along with a companion article (Knapen et al. part I), these concepts set the stage for development of tools and case studies that will facilitate more rigorous analysis of AOP networks, and the utility of AOP network-based predictions, for use in research and regulatory decision-making. Collectively, this work addresses one of the major themes identified through a SETAC Horizon Scanning effort focused on advancing the AOP framework. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  20. Recent advances on failure and recovery in networks of networks

    International Nuclear Information System (INIS)

    Shekhtman, Louis M.; Danziger, Michael M.; Havlin, Shlomo

    2016-01-01

    Until recently, network science has focused on the properties of single isolated networks that do not interact or depend on other networks. However it has now been recognized that many real-networks, such as power grids, transportation systems, and communication infrastructures interact and depend on other networks. Here, we will present a review of the framework developed in recent years for studying the vulnerability and recovery of networks composed of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes, like for example certain people, play a role in two networks, i.e. in a multiplex. Dependency relations may act recursively and can lead to cascades of failures concluding in sudden fragmentation of the system. We review the analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. The general theory and behavior of interdependent networks has many novel features that are not present in classical network theory. Interdependent networks embedded in space are significantly more vulnerable compared to non-embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences. Finally, when recovery of components is possible, global spontaneous recovery of the networks and hysteresis phenomena occur. The theory developed for this process points to an optimal repairing strategy for a network of networks. Understanding realistic effects present in networks of networks is required in order to move towards determining system vulnerability.

  1. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  2. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  3. Local dependency in networks

    Directory of Open Access Journals (Sweden)

    Kudĕlka Miloš

    2015-06-01

    Full Text Available Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network’s nodes from the structure in local surroundings of individual nodes. For the tasks we deal with in this article, the key technical parameter is locality. Since only the surroundings of the examined nodes are used in computations, there is no need to analyze the entire network. This allows the application of our approach in the area of large-scale networks. We present several experiments using small networks as well as large-scale artificial and real world networks. The results of the experiments show high effectiveness due to the locality of our approach and also high quality node ranking comparable to PageRank.

  4. Serial Network Flow Monitor

    Science.gov (United States)

    Robinson, Julie A.; Tate-Brown, Judy M.

    2009-01-01

    Using a commercial software CD and minimal up-mass, SNFM monitors the Payload local area network (LAN) to analyze and troubleshoot LAN data traffic. Validating LAN traffic models may allow for faster and more reliable computer networks to sustain systems and science on future space missions. Research Summary: This experiment studies the function of the computer network onboard the ISS. On-orbit packet statistics are captured and used to validate ground based medium rate data link models and enhance the way that the local area network (LAN) is monitored. This information will allow monitoring and improvement in the data transfer capabilities of on-orbit computer networks. The Serial Network Flow Monitor (SNFM) experiment attempts to characterize the network equivalent of traffic jams on board ISS. The SNFM team is able to specifically target historical problem areas including the SAMS (Space Acceleration Measurement System) communication issues, data transmissions from the ISS to the ground teams, and multiple users on the network at the same time. By looking at how various users interact with each other on the network, conflicts can be identified and work can begin on solutions. SNFM is comprised of a commercial off the shelf software package that monitors packet traffic through the payload Ethernet LANs (local area networks) on board ISS.

  5. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  6. Multilayer Brain Networks

    Science.gov (United States)

    Vaiana, Michael; Muldoon, Sarah Feldt

    2018-01-01

    The field of neuroscience is facing an unprecedented expanse in the volume and diversity of available data. Traditionally, network models have provided key insights into the structure and function of the brain. With the advent of big data in neuroscience, both more sophisticated models capable of characterizing the increasing complexity of the data and novel methods of quantitative analysis are needed. Recently, multilayer networks, a mathematical extension of traditional networks, have gained increasing popularity in neuroscience due to their ability to capture the full information of multi-model, multi-scale, spatiotemporal data sets. Here, we review multilayer networks and their applications in neuroscience, showing how incorporating the multilayer framework into network neuroscience analysis has uncovered previously hidden features of brain networks. We specifically highlight the use of multilayer networks to model disease, structure-function relationships, network evolution, and link multi-scale data. Finally, we close with a discussion of promising new directions of multilayer network neuroscience research and propose a modified definition of multilayer networks designed to unite and clarify the use of the multilayer formalism in describing real-world systems.

  7. Innovation and network collaboration

    DEFF Research Database (Denmark)

    Kesting, Peter; Müller, Sabine; Jørgensen, Frances

    2011-01-01

    Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size...... and their inherent shortage of resources. In this paper, we propose that human resource management (HRM) practices may provide a means by which SMEs can increase their innovation capacity through network collaboration. Following a brief presentation of the relevant literature on networks, and innovation in networks...... in particular, and HRM, we analyse and evaluate the potential applicability of existing models for supporting innovation in SMEs participating in networks. Finally, we propose several lines of inquiry arising from our analysis that provide directions for future research....

  8. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  9. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  10. Social cognitive radio networks

    CERN Document Server

    Chen, Xu

    2015-01-01

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  11. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  12. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    Network Service Providers (NSP) often choose to overprovision their networks instead of deploying proper Quality of Services (QoS) mechanisms that allow for traffic differentiation and predictable quality. This tendency of overprovisioning is not sustainable for the simple reason that network...... resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  13. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed...... different manufacturing plants in the network and their impact on network transformation. Findings – The paper highlights the dominant role of manufacturing plants in the continuously changing shape of a manufacturing network. The paper demonstrates that a product or process change at one manufacturing...... by identifying the gaps in the reviewed literature. The paper is based on three case studies undertaken in Danish manufacturing companies to explore in detail their manufacturing plants and networks. The cases provide a sound basis for developing the research questions and explaining the interaction between...

  14. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated. Additionally...... with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with elevation......Aim Interacting communities of species are organized into complex networks, and network analysis is reckoned to be a strong tool for describing their architecture. Many species assemblies show strong macroecological patterns, e.g. increasing species richness with decreasing latitude, but whether...

  15. Bio-inspired networking

    CERN Document Server

    Câmara, Daniel

    2015-01-01

    Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks. Future networks are expected to be autonomous, scalable and adaptive. During millions of years of evolution, nature has developed a number of different systems that present these and other characteristics required for the next generation networks. Indeed, a series of bio-inspired methods have been successfully used to solve the most diverse problems linked to computer networks. This book presents some of these techniques from a theoretical and practical point of view. Discusses the key concepts of bio-inspired networking to aid you in finding efficient networking solutions Delivers examples of techniques both in theoretical concepts and practical applications Helps you apply nature's dynamic resource and task management to your co...

  16. Reflections on Active Networking

    Science.gov (United States)

    2005-01-01

    with a Software Switch for Active Networks ”. We had initially called the project “ SoftSwitch ”, but after some concerns David Farber raised that this...Reflections on Active Networking Jonathan M. Smith CIS Department, University of Pennsylvania jms@cis.upenn.edu Abstract Interactions among...telecommunications networks , computers, and other peripheral devices have been of interest since the earliest distributed computing systems. A key

  17. Personal network (PN) applications

    DEFF Research Database (Denmark)

    Prasad, R.; Skouby, Knud Erik

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  18. Prostate Cancer Biorepository Network

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-14-2-0185 TITLE: Prostate Cancer Biorepository Network PRINCIPAL INVESTIGATOR: Jonathan Melamed, MD CONTRACTING ORGANIZATION...AND SUBTITLE 5a. CONTRACT NUMBER Prostate Cancer Biorepository Network 5b. GRANT NUMBER W81XWH-14-2-0185 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...infrastructure and operations of the Prostate Cancer Biorepository Network (PCBN). The aim of the PCBN is to provide prostate researchers with high-quality

  19. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  20. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  1. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  2. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  3. Molecular ecological network analyses.

    Science.gov (United States)

    Deng, Ye; Jiang, Yi-Huei; Yang, Yunfeng; He, Zhili; Luo, Feng; Zhou, Jizhong

    2012-05-30

    Understanding the interaction among different species within a community and their responses to environmental changes is a central goal in ecology. However, defining the network structure in a microbial community is very challenging due to their extremely high diversity and as-yet uncultivated status. Although recent advance of metagenomic technologies, such as high throughout sequencing and functional gene arrays, provide revolutionary tools for analyzing microbial community structure, it is still difficult to examine network interactions in a microbial community based on high-throughput metagenomics data. Here, we describe a novel mathematical and bioinformatics framework to construct ecological association networks named molecular ecological networks (MENs) through Random Matrix Theory (RMT)-based methods. Compared to other network construction methods, this approach is remarkable in that the network is automatically defined and robust to noise, thus providing excellent solutions to several common issues associated with high-throughput metagenomics data. We applied it to determine the network structure of microbial communities subjected to long-term experimental warming based on pyrosequencing data of 16 S rRNA genes. We showed that the constructed MENs under both warming and unwarming conditions exhibited topological features of scale free, small world and modularity, which were consistent with previously described molecular ecological networks. Eigengene analysis indicated that the eigengenes represented the module profiles relatively well. In consistency with many other studies, several major environmental traits including temperature and soil pH were found to be important in determining network interactions in the microbial communities examined. To facilitate its application by the scientific community, all these methods and statistical tools have been integrated into a comprehensive Molecular Ecological Network Analysis Pipeline (MENAP), which is open

  4. NASA Integrated Network COOP

    Science.gov (United States)

    Anderson, Michael L.; Wright, Nathaniel; Tai, Wallace

    2012-01-01

    Natural disasters, terrorist attacks, civil unrest, and other events have the potential of disrupting mission-essential operations in any space communications network. NASA's Space Communications and Navigation office (SCaN) is in the process of studying options for integrating the three existing NASA network elements, the Deep Space Network, the Near Earth Network, and the Space Network, into a single integrated network with common services and interfaces. The need to maintain Continuity of Operations (COOP) after a disastrous event has a direct impact on the future network design and operations concepts. The SCaN Integrated Network will provide support to a variety of user missions. The missions have diverse requirements and include anything from earth based platforms to planetary missions and rovers. It is presumed that an integrated network, with common interfaces and processes, provides an inherent advantage to COOP in that multiple elements and networks can provide cross-support in a seamless manner. The results of trade studies support this assumption but also show that centralization as a means of achieving integration can result in single points of failure that must be mitigated. The cost to provide this mitigation can be substantial. In support of this effort, the team evaluated the current approaches to COOP, developed multiple potential approaches to COOP in a future integrated network, evaluated the interdependencies of the various approaches to the various network control and operations options, and did a best value assessment of the options. The paper will describe the trade space, the study methods, and results of the study.

  5. Networks in ATLAS

    Science.gov (United States)

    McKee, Shawn; ATLAS Collaboration

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage

  6. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  7. Chaotic diagonal recurrent neural network

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Zhang Yi

    2012-01-01

    We propose a novel neural network based on a diagonal recurrent neural network and chaos, and its structure and learning algorithm are designed. The multilayer feedforward neural network, diagonal recurrent neural network, and chaotic diagonal recurrent neural network are used to approach the cubic symmetry map. The simulation results show that the approximation capability of the chaotic diagonal recurrent neural network is better than the other two neural networks. (interdisciplinary physics and related areas of science and technology)

  8. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  9. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  10. Networked professional learning

    NARCIS (Netherlands)

    Sloep, Peter

    2013-01-01

    Sloep, P. B. (2013). Networked professional learning. In A. Littlejohn, & A. Margaryan (Eds.), Technology-enhanced Professional Learning: Processes, Practices and Tools (pp. 97–108). London: Routledge.

  11. Directed network modules

    International Nuclear Information System (INIS)

    Palla, Gergely; Farkas, Illes J; Pollner, Peter; Derenyi, Imre; Vicsek, Tamas

    2007-01-01

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs

  12. Networked Instrumentation Element

    Data.gov (United States)

    National Aeronautics and Space Administration — Armstrong researchers have developed a networked instrumentation system that connects modern experimental payloads to existing analog and digital communications...

  13. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ...) to increase competitive advantage, innovation, and mission effectiveness. Network-based effectiveness occurs due to the influence of various factors such as people, procedures, technology, and organizations...

  14. Networks and Interactivity

    DEFF Research Database (Denmark)

    Considine, Mark; Lewis, Jenny

    2012-01-01

    of `street-level' employment services staff for the impacts of this. Contrary to expectations, networking has generally declined over the last decade. There are signs of path dependence in networking patterns within each country, but also a convergence of patterns for the UK and Australia......The systemic reform of employment services in OECD countries was driven by New Public Management (NPM) and then post-NPM reforms, when first-phase changes such as privatization were amended with `joined up' processes to help manage fragmentation. This article examines the networking strategies......, but not The Netherlands. Networking appears to be mediated by policy and regulatory imperatives....

  15. Dynamic Sensor Networks

    National Research Council Canada - National Science Library

    Schott, Brian

    2004-01-01

    ...: Declarative Languages and Execution Environment includes topographical soldier interface and a sensor network simulation environment for algorithm development, deployment planning, and operational support. Finally, Task 3...

  16. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  17. Introduction to neural networks

    International Nuclear Information System (INIS)

    Pavlopoulos, P.

    1996-01-01

    This lecture is a presentation of today's research in neural computation. Neural computation is inspired by knowledge from neuro-science. It draws its methods in large degree from statistical physics and its potential applications lie mainly in computer science and engineering. Neural networks models are algorithms for cognitive tasks, such as learning and optimization, which are based on concepts derived from research into the nature of the brain. The lecture first gives an historical presentation of neural networks development and interest in performing complex tasks. Then, an exhaustive overview of data management and networks computation methods is given: the supervised learning and the associative memory problem, the capacity of networks, the Perceptron networks, the functional link networks, the Madaline (Multiple Adalines) networks, the back-propagation networks, the reduced coulomb energy (RCE) networks, the unsupervised learning and the competitive learning and vector quantization. An example of application in high energy physics is given with the trigger systems and track recognition system (track parametrization, event selection and particle identification) developed for the CPLEAR experiment detectors from the LEAR at CERN. (J.S.). 56 refs., 20 figs., 1 tab., 1 appendix

  18. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  19. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  20. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  1. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  2. Competing edge networks

    Science.gov (United States)

    Parsons, Mark; Grindrod, Peter

    2012-06-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails.

  3. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  4. Effective professional networking.

    Science.gov (United States)

    Goolsby, Mary Jo; Knestrick, Joyce M

    2017-08-01

    The reasons for nurse practitioners to develop a professional network are boundless and are likely to change over time. Networking opens doors and creates relationships that support new opportunities, personal development, collaborative research, policy activism, evidence-based practice, and more. Successful professional networking involves shared, mutually beneficial interactions between individuals and/or individuals and groups, regardless of whether it occurs face to face or electronically. This article combines nuggets from the literature with guidance based on the authors' combined experience in networking activities at the local, national, and international levels. ©2017 American Association of Nurse Practitioners.

  5. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  6. Modelling dendritic ecological networks in space: An integrated network perspective

    Science.gov (United States)

    Erin E. Peterson; Jay M. Ver Hoef; Dan J. Isaak; Jeffrey A. Falke; Marie-Josee Fortin; Chris E. Jordan; Kristina McNyset; Pascal Monestiez; Aaron S. Ruesch; Aritra Sengupta; Nicholas Som; E. Ashley Steel; David M. Theobald; Christian E. Torgersen; Seth J. Wenger

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of...

  7. Better sales networks.

    Science.gov (United States)

    Ustüner, Tuba; Godes, David

    2006-01-01

    Anyone in sales will tell you that social networks are critical. The more contacts you have, the more leads you'll generate, and, ultimately, the more sales you'll make. But that's a vast oversimplification. Different configurations of networks produce different results, and the salesperson who develops a nuanced understanding of social networks will outshine competitors. The salesperson's job changes over the course of the selling process. Different abilities are required in each stage of the sale: identifying prospects, gaining buy-in from potential customers, creating solutions, and closing the deal. Success in the first stage, for instance, depends on the salesperson acquiring precise and timely information about opportunities from contacts in the marketplace. Closing the deal requires the salesperson to mobilize contacts from prior sales to act as references. Managers often view sales networks only in terms of direct contacts. But someone who knows lots of people doesn't necessarily have an effective network because networks often pay off most handsomely through indirect contacts. Moreover, the density of the connections in a network is important. Do a salesperson's contacts know all the same people, or are their associates widely dispersed? Sparse networks are better, for example, at generating unique information. Managers can use three levers--sales force structure, compensation, and skills development--to encourage salespeople to adopt a network-based view and make the best possible use of social webs. For example, the sales force can be restructured to decouple lead generation from other tasks because some people are very good at building diverse ties but not so good at maintaining other kinds of networks. Companies that take steps of this kind to help their sales teams build better networks will reap tremendous advantages.

  8. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  9. The Benefits of Grid Networks

    Science.gov (United States)

    Tennant, Roy

    2005-01-01

    In the article, the author talks about the benefits of grid networks. In speaking of grid networks the author is referring to both networks of computers and networks of humans connected together in a grid topology. Examples are provided of how grid networks are beneficial today and the ways in which they have been used.

  10. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  11. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  12. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  13. Classroom Computer Network.

    Science.gov (United States)

    Lent, John

    1984-01-01

    This article describes a computer network system that connects several microcomputers to a single disk drive and one copy of software. Many schools are switching to networks as a cheaper and more efficient means of computer instruction. Teachers may be faced with copywriting problems when reproducing programs. (DF)

  14. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various...

  15. Online Social Network Interactions:

    Directory of Open Access Journals (Sweden)

    Hui-Jung Chang

    2018-01-01

    Full Text Available A cross-cultural comparison of social networking structure on McDonald’s Facebook fan sites between Taiwan and the USA was conducted utilizing the individualism/collectivism dimension proposed by Hofstede. Four network indicators are used to describe the network structure of McDonald’s Facebook fan sites: size, density, clique and centralization. Individuals who post on both Facebook sites for the year of 2012 were considered as network participants for the purpose of the study. Due to the huge amount of data, only one thread of postings was sampled from each month of the year of 2012. The final data consists of 1002 postings written by 896 individuals and 5962 postings written by 5532 individuals from Taiwan and the USA respectively. The results indicated that the USA McDonald’s Facebook fan network has more fans, while Taiwan’s McDonald’s Facebook fan network is more densely connected. Cliques did form among the overall multiplex and within the individual uniplex networks in two countries, yet no significant differences were found between them. All the fan networks in both countries are relatively centralized, mostly on the site operators.

  16. Brokerage in SME networks

    NARCIS (Netherlands)

    Kirkels, Y.E.M.; Duysters, G.M.

    2010-01-01

    This study focuses on SME networks of design and high-tech companies in Southeast Netherlands. By highlighting the personal networks of members across design and high-tech industries, the study attempts to identify the main brokers in this dynamic environment. In addition, we investigate whether

  17. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  18. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  19. Joint Hub Network Development

    NARCIS (Netherlands)

    Cruijssen, F.C.A.M.; Borm, P.E.M.; Dullaert, W.; Hamers, H.J.M.

    2007-01-01

    This paper introduces a framework for joint hub network development. Building a joint physical hub for transhipment of goods is expensive and therefore involves considerable risks for the cooperating companies. In a practical setting, it is unlikely that an entire network will be built at once.

  20. FTS2000 network architecture

    Science.gov (United States)

    Klenart, John

    1991-01-01

    The network architecture of FTS2000 is graphically depicted. A map of network A topology is provided, with interservice nodes. Next, the four basic element of the architecture is laid out. Then, the FTS2000 time line is reproduced. A list of equipment supporting FTS2000 dedicated transmissions is given. Finally, access alternatives are shown.

  1. Local Area Networks.

    Science.gov (United States)

    Marks, Kenneth E.; Nielsen, Steven

    1991-01-01

    Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)

  2. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and......, hopefully, to enhance the level of security provided by these solutions even further....

  3. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  4. Network SCADA System

    International Nuclear Information System (INIS)

    Milivojevic, Dragan R.; Tasic, Visa; Karabasevic, Dejan

    2003-01-01

    Copper Institute, Industrial Informatics department, is developing and applying network real time process monitoring and control systems. Some of these systems are already in use. The paper presents some hardware and software general remarks and performances, with special regard to communication sub-systems and network possibilities. (Author)

  5. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... organisation theories and theories about strategic management....

  6. Network Visualization Project (NVP)

    Science.gov (United States)

    2016-07-01

    Application data flow .............................................................................2 Fig. 2 Sample JSON data...interface supporting improved network analysis and network communication visualization. 2. Application Design NVP consists of 2 parts: back-end data...notation ( JSON ) format. This JSON is provided as input to the front-end application of the project. This interaction of the user with the back-end

  7. Building the quantum network

    International Nuclear Information System (INIS)

    Elliott, Chip

    2002-01-01

    We show how quantum key distribution (QKD) techniques can be employed within realistic, highly secure communications systems, using the internet architecture for a specific example. We also discuss how certain drawbacks in existing QKD point-to-point links can be mitigated by building QKD networks, where such networks can be composed of trusted relays or untrusted photonic switches. (author)

  8. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2017-01-01

    A telecommunications network is an electronic system of links, nodes and the controls that govern their operations to allow voice and data transfer among users and devices. This fully revised, updated and expanded second edition covers all aspects of today's networks, including how they are planned, formed and operated.

  9. The Photograph as Network

    DEFF Research Database (Denmark)

    Wiegand, Frauke Katharina

    2017-01-01

    Inspired by actor-network theory (ANT), this article develops a theoretical framework to grasp the dynamic visual work of memory. It introduces three sensitizing concepts of actor-network methodology, namely entanglement, relationality and traceability, and operationalizes them in a methodological...

  10. Networked business process management

    NARCIS (Netherlands)

    Grefen, P.W.P.J.

    2013-01-01

    In the current economy, a shift can be seen from stand-alone business organizations to networks of tightly collaborating business organizations. To allow this tight collaboration, business process management in these collaborative networks is becoming increasingly important. This paper discusses

  11. Integrating networks with Mathematica

    NARCIS (Netherlands)

    Strijkers, R.J.; Meijer, R.J.

    2008-01-01

    We have developed a concept that considers network behavior as a collection of software objects, which can be used or modified in computer programs. The interfaces of these software objects are exposed as web services and enable applications to analyze and manipulate networks, e.g. to find

  12. Communication Network Analysis Methods.

    Science.gov (United States)

    Farace, Richard V.; Mabee, Timothy

    This paper reviews a variety of analytic procedures that can be applied to network data, discussing the assumptions and usefulness of each procedure when applied to the complexity of human communication. Special attention is paid to the network properties measured or implied by each procedure. Factor analysis and multidimensional scaling are among…

  13. CRCHD Integrated Networks

    Science.gov (United States)

    INB supports two network-based programs—the National Outreach Network (NON) and the Geographic Management of Cancer Health Disparities Program (GMaP)—as well as advising on women’s health and sexual and gender minority opportunities within and across the NCI.

  14. A balanced memory network.

    Directory of Open Access Journals (Sweden)

    Yasser Roudi

    2007-09-01

    Full Text Available A fundamental problem in neuroscience is understanding how working memory--the ability to store information at intermediate timescales, like tens of seconds--is implemented in realistic neuronal networks. The most likely candidate mechanism is the attractor network, and a great deal of effort has gone toward investigating it theoretically. Yet, despite almost a quarter century of intense work, attractor networks are not fully understood. In particular, there are still two unanswered questions. First, how is it that attractor networks exhibit irregular firing, as is observed experimentally during working memory tasks? And second, how many memories can be stored under biologically realistic conditions? Here we answer both questions by studying an attractor neural network in which inhibition and excitation balance each other. Using mean-field analysis, we derive a three-variable description of attractor networks. From this description it follows that irregular firing can exist only if the number of neurons involved in a memory is large. The same mean-field analysis also shows that the number of memories that can be stored in a network scales with the number of excitatory connections, a result that has been suggested for simple models but never shown for realistic ones. Both of these predictions are verified using simulations with large networks of spiking neurons.

  15. Advanced Polymer Network Structures

    Science.gov (United States)

    2016-02-01

    attractive interaction (n = 2.0) and a neutral interaction (n = 1.0); n is equal to unity for self-interactions among the monomers of first network and...... Network Structures by Robert Lambeth, Joseph Lenhart, and Tim Sirk Weapons and Materials Research Directorate, ARL Yelena Sliozberg TKC Global

  16. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  17. Home area networks

    NARCIS (Netherlands)

    Koonen, A.M.J.

    2013-01-01

    This article consists of a collection of slides from the author's conference presentation. Some of the specific areas/topics discussed include: Convergence in home networks, home service scenarios; Home wired network architectures, CapEx and OpEx; Residential Gateway; Optical fiber types;

  18. Personalized Home-Networks

    DEFF Research Database (Denmark)

    Soler, José; Gandy, Michael

    2007-01-01

    The paper provides details of a home-networking architecture based on an enhanced residential gateway. Initially the need for mechanisms allowing user-dependent network behavior is described and afterwards details of an initial implementation are provided in terms of architectural description...

  19. CAISSON: Interconnect Network Simulator

    Science.gov (United States)

    Springer, Paul L.

    2006-01-01

    Cray response to HPCS initiative. Model future petaflop computer interconnect. Parallel discrete event simulation techniques for large scale network simulation. Built on WarpIV engine. Run on laptop and Altix 3000. Can be sized up to 1000 simulated nodes per host node. Good parallel scaling characteristics. Flexible: multiple injectors, arbitration strategies, queue iterators, network topologies.

  20. Deep Spiking Networks

    NARCIS (Netherlands)

    O'Connor, P.; Welling, M.

    2016-01-01

    We introduce an algorithm to do backpropagation on a spiking network. Our network is "spiking" in the sense that our neurons accumulate their activation into a potential over time, and only send out a signal (a "spike") when this potential crosses a threshold and the neuron is reset. Neurons only

  1. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  2. Competing Transport Networks

    NARCIS (Netherlands)

    M.J. van der Leij (Marco)

    2003-01-01

    textabstractIn a circular city model, I consider network design and pricing decisions for a single fast transport connection that faces competition from a slower but better accessible transport mode. To access the fast transport network individuals have to make complementary trips by slow mode. This

  3. Robustness Envelopes of Networks

    NARCIS (Netherlands)

    Trajanovski, S.; Martín-Hernández, J.; Winterbach, W.; Van Mieghem, P.

    2013-01-01

    We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case

  4. Innovation in Virtual Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    2011-01-01

    The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective......The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective...

  5. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  6. Wireless networks; Traadloese nettverk

    Energy Technology Data Exchange (ETDEWEB)

    2008-07-01

    Wireless Local Area Networks - WLAN, is being installed in homes, offices, schools and city areas with an increasing speed. Computers communicate with each other through networks by using radio signals. Base stations make sure there is sufficient radio coverage in the current areas. The effects on human and if it is dangerous is discussed

  7. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    In the present paper we consider the allocation of cost in connection networks. Agents have connection demands in form of pairs of locations they want to be connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection demands...

  8. Wireless Sensor Networks Approach

    Science.gov (United States)

    Perotti, Jose M.

    2003-01-01

    This viewgraph presentation provides information on hardware and software configurations for a network architecture for sensors. The hardware configuration uses a central station and remote stations. The software configuration uses the 'lost station' software algorithm. The presentation profiles a couple current examples of this network architecture in use.

  9. Trends in Optical Networks

    Indian Academy of Sciences (India)

    Integrated TDM/IP Service Network: Built using next-generation SDH · Case 2: ISP Backbone over SONET/SDH · Solution for the PoPs · Solution for the Gateway site · Case 3: Ethernet Leased Line Services over Existing Infrastructure · Transport for Mobile Voice/Data Networks · Functions needed for mapping Ethernet to ...

  10. Clustering of correlated networks

    OpenAIRE

    Dorogovtsev, S. N.

    2003-01-01

    We obtain the clustering coefficient, the degree-dependent local clustering, and the mean clustering of networks with arbitrary correlations between the degrees of the nearest-neighbor vertices. The resulting formulas allow one to determine the nature of the clustering of a network.

  11. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  12. Network ties and survival

    DEFF Research Database (Denmark)

    Acheampong, George; Narteh, Bedman; Rand, John

    2017-01-01

    Poultry farming has been touted as one of the major ways by which poverty can be reduced in low-income economies like Ghana. Yet, anecdotally there is a high failure rate among these poultry farms. This current study seeks to understand the relationship between network ties and survival chances...... of small commercial poultry farms (SCPFs). We utilize data from a 2-year network survey of SCPFs in rural Ghana. The survival of these poultry farms are modelled using a lagged probit model of farms that persisted from 2014 into 2015. We find that network ties are important to the survival chances...... but this probability reduces as the number of industry ties increases but moderation with dynamic capability of the firm reverses this trend. Our findings show that not all network ties aid survival and therefore small commercial poultry farmers need to be circumspect in the network ties they cultivate and develop....

  13. Categorical Tensor Network States

    Directory of Open Access Journals (Sweden)

    Jacob D. Biamonte

    2011-12-01

    Full Text Available We examine the use of string diagrams and the mathematics of category theory in the description of quantum states by tensor networks. This approach lead to a unification of several ideas, as well as several results and methods that have not previously appeared in either side of the literature. Our approach enabled the development of a tensor network framework allowing a solution to the quantum decomposition problem which has several appealing features. Specifically, given an n-body quantum state |ψ〉, we present a new and general method to factor |ψ〉 into a tensor network of clearly defined building blocks. We use the solution to expose a previously unknown and large class of quantum states which we prove can be sampled efficiently and exactly. This general framework of categorical tensor network states, where a combination of generic and algebraically defined tensors appear, enhances the theory of tensor network states.

  14. Organization Virtual or Networked?

    Directory of Open Access Journals (Sweden)

    Rūta Tamošiūnaitė

    2013-08-01

    Full Text Available Purpose—to present distinction between “virtual organization” and “networked organization”; giving their definitions.Design/methodology/approach—review of previous researches, systemic analyses of their findings and synthesis of distinctive characteristics of ”virtual organization” and “networked organization.”Findings—the main result of the research is key diverse features separating ”virtual organization” and ”networked organization.” Definitions of “virtual organization” and “networked organization” are presented.Originality/Value—distinction between “virtual organization” and “networked organization” creates possibilities to use all advantages of those types of organizations and gives foundation for deeper researches in this field.Research type: general review.

  15. High-Performance Networking

    CERN Multimedia

    CERN. Geneva

    2003-01-01

    The series will start with an historical introduction about what people saw as high performance message communication in their time and how that developed to the now to day known "standard computer network communication". It will be followed by a far more technical part that uses the High Performance Computer Network standards of the 90's, with 1 Gbit/sec systems as introduction for an in depth explanation of the three new 10 Gbit/s network and interconnect technology standards that exist already or emerge. If necessary for a good understanding some sidesteps will be included to explain important protocols as well as some necessary details of concerned Wide Area Network (WAN) standards details including some basics of wavelength multiplexing (DWDM). Some remarks will be made concerning the rapid expanding applications of networked storage.

  16. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  17. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    2015-01-01

    In the present paper we consider the allocation of costs in connection networks. Agents have connection demands in form of pairs of locations they want to have connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection...... demands. We use a few axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well...... as all connection costs; (3) the central planner selects a cost minimizing network satisfying reported connection demands based on the estimated costs; and, (4) the planner allocates the true costs of the selected network. It turns out that an allocation rule satisfies the axioms if and only if relative...

  18. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  19. Semaphore network encryption report

    Science.gov (United States)

    Johnson, Karen L.

    1994-03-01

    This paper documents the results of a preliminary assessment performed on the commercial off-the-shelf (COTS) Semaphore Communications Corporation (SCC) Network Security System (NSS). The Semaphore NSS is a family of products designed to address important network security concerns, such as network source address authentication and data privacy. The assessment was performed in the INFOSEC Core Integration Laboratory, and its scope was product usability focusing on interoperability and system performance in an existing operational network. Included in this paper are preliminary findings. Fundamental features and functionality of the Semaphore NSS are identified, followed by details of the assessment, including test descriptions and results. A summary of test results and future plans are also included. These findings will be useful to those investigating the use of commercially available solutions to network authentication and data privacy.

  20. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  1. Theory of spatial networks

    Energy Technology Data Exchange (ETDEWEB)

    Watanabe, T

    1983-01-01

    A new framework of synchronous parallel processing systems called spatial networks is examined, in which the family of all cellular automata is included perfectly. This framework is free from the two restrictions of cellular automata of which one is the finiteness of the set of states of a cell and the other is the countability of an array space. Throughout this article, the relationships between function and structure of spatial networks are considered. First, the necessary and sufficient condition for spatial networks to be uniformly interconnected is given. That for spatial networks to be finitely interconnected is also given with a topological approach. The characterization theorem of cellular automata comes from these results. Second, it is shown that finitely and uniformly interconnected linear spatial networks can be characterized by the convolution form. Last, the conditions for their global mappings to be injective or surjective are discussed. 10 references.

  2. Circuit switched optical networks

    DEFF Research Database (Denmark)

    Kloch, Allan

    2003-01-01

    Some of the most important components required for enabling optical networking are investigated through both experiments and modelling. These all-optical components are the wavelength converter, the regenerator and the space switch. When these devices become "off-the-shelf" products, optical cross......, it is expected that the optical solution will offer an economical benefit for hight bit rate networks. This thesis begins with a discussion of the expected impact on communications systems from the rapidly growing IP traffic, which is expected to become the dominant source for traffic. IP traffic has some...... characteristics, which are best supported by an optical network. The interest for such an optical network is exemplified by the formation of the ACTS OPEN project which aim was to investigate the feasibility of an optical network covering Europe. Part of the work presented in this thesis is carried out within...

  3. Optical packet switched networks

    DEFF Research Database (Denmark)

    Hansen, Peter Bukhave

    1999-01-01

    Optical packet switched networks are investigated with emphasis on the performance of the packet switch blocks. Initially, the network context of the optical packet switched network is described showing that a packet network will provide transparency, flexibility and bridge the granularity gap...... in interferometric wavelength converters is investigated showing that a 10 Gbit/s 19 4x4 swich blocks can be cascaded at a BER of 10-14. An analytical traffic model enables the calculation of the traffice performance of a WDM packet network. Hereby the importance of WDM and wavelegth conversion in the switch blocks...... is established as a flexible means to reduce the optical buffer, e.g., the number of fibre delay lines for a 16x16 switch block is reduced from 23 to 6 by going from 2 to 8 wavelength channels pr. inlet. Additionally, a component count analysis is carried out to illustrate the trade-offs in the switch block...

  4. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  5. Maintenance of family networks

    DEFF Research Database (Denmark)

    marsico, giuseppina; Chaudhary, N; Valsiner, Jaan

    2015-01-01

    Families are social units that expand in time (across generations) and space (as a geographically distributed sub-structures of wider kinship networks). Understanding of intergenerational family relations thus requires conceptualization of communication processes that take place within a small...... collective of persons linked with one another by a flexible social network. Within such networks, Peripheral Communication Patterns set the stage for direct everyday life activities within the family context. Peripheral Communication Patterns are conditions where one family network member (A) communicates...... manifestly with another member (B) with the aim of bringing the communicative message to the third member (C) who is present but is not explicitly designated as the manifest addressee of the intended message. Inclusion of physically non-present members of the family network (elders living elsewhere, deceased...

  6. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  7. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  8. Competing edge networks

    International Nuclear Information System (INIS)

    Parsons, Mark; Grindrod, Peter

    2012-01-01

    We introduce a model for a pair of nonlinear evolving networks, defined over a common set of vertices, subject to edgewise competition. Each network may grow new edges spontaneously or through triad closure. Both networks inhibit the other's growth and encourage the other's demise. These nonlinear stochastic competition equations yield to a mean field analysis resulting in a nonlinear deterministic system. There may be multiple equilibria; and bifurcations of different types are shown to occur within a reduced parameter space. This situation models competitive communication networks such as BlackBerry Messenger displacing SMS; or instant messaging displacing emails. -- Highlights: ► A model for edgewise-competing evolving network pairs is introduced. ► Defined competition equations yield to a mean field analysis. ► Multiple equilibrium states and different bifurcation types can occur. ► The system is sensitive to sparse initial conditions and near unstable equilibriums.

  9. Complex Networks IX

    CERN Document Server

    Coronges, Kate; Gonçalves, Bruno; Sinatra, Roberta; Vespignani, Alessandro; Proceedings of the 9th Conference on Complex Networks; CompleNet 2018

    2018-01-01

    This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks. It collects the works presented at the 9th International Conference on Complex Networks (CompleNet) 2018 in Boston, MA in March, 2018. With roots in physical, information and social science, the study of complex networks provides a formal set of mathematical methods, computational tools and theories to describe prescribe and predict dynamics and behaviors of complex systems. Despite their diversity, whether the systems are made up of physical, technological, informational, or social networks, they share many common organizing principles and thus can be studied with similar approaches. This book provides a view of the state-of-the-art in this dynamic field and covers topics such as group decision-making, brain and cellular connectivity, network controllability and resiliency, online activism, recommendation systems, and cyber security.

  10. Tinnitus: Network pathophysiology-network pharmacology

    Directory of Open Access Journals (Sweden)

    Ana Belen eElgoyhen

    2012-01-01

    Full Text Available Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for 1 in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single FDA-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in central nervous system pathologies is changing from that of magic bullets that target individual chemoreceptors or disease-causing genes into that of magic shotguns, promiscuous or dirty drugs that target disease-causing networks, also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  11. Tinnitus: network pathophysiology-network pharmacology.

    Science.gov (United States)

    Elgoyhen, Ana B; Langguth, Berthold; Vanneste, Sven; De Ridder, Dirk

    2012-01-01

    Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for one in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single Food and Drug Administration (FDA)-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system (CNS) disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in CNS pathologies is changing from that of "magic bullets" that target individual chemoreceptors or "disease-causing genes" into that of "magic shotguns," "promiscuous" or "dirty drugs" that target "disease-causing networks," also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  12. Network topology descriptions in hybrid networks

    NARCIS (Netherlands)

    Grosso, P.; Brown, A.; Cedeyn, A.; Dijkstra, F.; van der Ham, J.; Patil, A.; Primet, P.; Swany, M.; Zurawski, J.

    2010-01-01

    The NML-WG goal is to define a schema for describing topologies of hybrid networks. This schema is in first instance intended for: • lightpath provisioning applications to exchange topology information intra and inter domain; • reporting performance metrics. This document constitutes Deliverable 1

  13. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  14. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  15. Network class superposition analyses.

    Directory of Open Access Journals (Sweden)

    Carl A B Pearson

    Full Text Available Networks are often used to understand a whole system by modeling the interactions among its pieces. Examples include biomolecules in a cell interacting to provide some primary function, or species in an environment forming a stable community. However, these interactions are often unknown; instead, the pieces' dynamic states are known, and network structure must be inferred. Because observed function may be explained by many different networks (e.g., ≈ 10(30 for the yeast cell cycle process, considering dynamics beyond this primary function means picking a single network or suitable sample: measuring over all networks exhibiting the primary function is computationally infeasible. We circumvent that obstacle by calculating the network class ensemble. We represent the ensemble by a stochastic matrix T, which is a transition-by-transition superposition of the system dynamics for each member of the class. We present concrete results for T derived from boolean time series dynamics on networks obeying the Strong Inhibition rule, by applying T to several traditional questions about network dynamics. We show that the distribution of the number of point attractors can be accurately estimated with T. We show how to generate Derrida plots based on T. We show that T-based Shannon entropy outperforms other methods at selecting experiments to further narrow the network structure. We also outline an experimental test of predictions based on T. We motivate all of these results in terms of a popular molecular biology boolean network model for the yeast cell cycle, but the methods and analyses we introduce are general. We conclude with open questions for T, for example, application to other models, computational considerations when scaling up to larger systems, and other potential analyses.

  16. Network on Target: Remotely Configured Adaptive Tactical Networks

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Bourakov, Eugene

    2006-01-01

    The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer...

  17. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  18. Neural Networks: Implementations and Applications

    OpenAIRE

    Vonk, E.; Veelenturf, L.P.J.; Jain, L.C.

    1996-01-01

    Artificial neural networks, also called neural networks, have been used successfully in many fields including engineering, science and business. This paper presents the implementation of several neural network simulators and their applications in character recognition and other engineering areas

  19. Wireless sensor network topology control

    OpenAIRE

    Zuk, Olexandr; Romanjuk, Valeriy; Sova, Oleg

    2010-01-01

    Topology control process for the wireless sensor network is considered. In this article the use of rule base for making decision on the search of optimum network topology is offered for the realization of different aims of network management.

  20. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted