WorldWideScience

Sample records for all-or-none network events

  1. Coherence potentials: loss-less, all-or-none network events in the cortex.

    Directory of Open Access Journals (Sweden)

    Tara C Thiagarajan

    2010-01-01

    Full Text Available Transient associations among neurons are thought to underlie memory and behavior. However, little is known about how such associations occur or how they can be identified. Here we recorded ongoing local field potential (LFP activity at multiple sites within the cortex of awake monkeys and organotypic cultures of cortex. We show that when the composite activity of a local neuronal group exceeds a threshold, its activity pattern, as reflected in the LFP, occurs without distortion at other cortex sites via fast synaptic transmission. These large-amplitude LFPs, which we call coherence potentials, extend up to hundreds of milliseconds and mark periods of loss-less spread of temporal and amplitude information much like action potentials at the single-cell level. However, coherence potentials have an additional degree of freedom in the diversity of their waveforms, which provides a high-dimensional parameter for encoding information and allows identification of particular associations. Such nonlinear behavior is analogous to the spread of ideas and behaviors in social networks.

  2. Power equation for all-or-none effects of oxygen toxicity and cumulative oxygen toxicity.

    Science.gov (United States)

    Arieli, R

    1994-01-01

    Quantification of the level of O2 toxicity may provide a means of setting limits on various hyperoxic exposures. A previously suggested expression for quantitative oxygen toxicity, DMG = a x t2 x PO2c (t-time, DMG-measured level of O2 toxicity), has been adapted for the all-or-none phenomenon: K = t2 x PO2c. A symptom may appear when K reaches a threshold value Kc. Non-linear regression was successfully applied to all-or-none symptoms from the literature: survival, convulsions, substernal distress, reduction in short circuit current and nerve conduction blockade. The generality of these expressions enabled calculation of cumulative oxygen toxicity and a search for the mechanism of oxygen toxicity. Cumulative oxygen toxicity is calculated in three-step calculation loops in three suggested exposure profiles. For a possible recovery period between exposures the expressions took the form: DMGt = DMGc x e-rt, and Kt = Kc x e-rt, where r is the recovery constant. A possibly bimodal distribution of c close to the values of 1 and 4 could be attributed to systemic effects. PMID:8736032

  3. Footwear modification following hallux valgus surgery: The all-or-none phenomenon

    Science.gov (United States)

    Robinson, Cal; Bhosale, Abhijit; Pillai, Anand

    2016-01-01

    AIM: To define footwear outcomes following hallux valgus surgery, focusing on patient return to comfortable and heeled footwear and patterns of post-operative footwear selection. METHODS: Surgical intervention is indicated for symptomatic cases of hallux valgus unresponsive to conservative methods, with favourable reported outcomes. The return to various types of footwear post-operatively is reflective of the degree of correction achieved, and corresponds to patient satisfaction. Patients are expected to return to comfortable footwear post-operatively without significant residual symptoms. Many female patients will additionally attempt to return to high-heeled, narrow toe box shoes. However, minimal evidence exists to guide their expectations. Sixty-five female hallux valgus patients that had undergone primary surgery between 2011 and 2013 were retrospectively identified using our hospital surgical database. Patients were reviewed using a footwear-specific outcome questionnaire at a mean 18.5 mo follow-up. RESULTS: Eighty-six percent of patients were able to return to comfortable footwear post-operatively with minimal discomfort. Of those intending to resume wearing heeled footwear, 62% were able to do so, with 77% of these patients wearing these as or more frequently than pre-operatively. No significant difference was observed between pre- and post-operative heel size. Mean time to return to heeled footwear was 21.4 wk post-operation. Cosmetic outcomes were very high and did not adversely impact footwear selection. CONCLUSION: We report high rates of return to both comfortable and heeled shoes in female patients following primary hallux valgus surgery. We observed an “all-or-none phenomenon” where patients rejected a return to heeled footwear unless able to tolerate them at the same frequency and heel size as pre-operatively. A minority of patients were unable to return to comfortable footwear post-operatively, which had adverse ramifications on their quality

  4. All-or-none suppression of B cell terminal differentiation by environmental contaminant 2,3,7,8-tetrachlorodibenzo-p-dioxin

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Qiang, E-mail: qzhang@thehamner.org [Institute for Chemical Safety Sciences, The Hamner Institutes for Health Sciences, RTP, NC 27709 (United States); Kline, Douglas E. [Department of Pharmacology and Toxicology and Center for Integrative Toxicology, Michigan State University, East Lansing, MI 48824 (United States); Bhattacharya, Sudin [Institute for Chemical Safety Sciences, The Hamner Institutes for Health Sciences, RTP, NC 27709 (United States); Crawford, Robert B. [Department of Pharmacology and Toxicology and Center for Integrative Toxicology, Michigan State University, East Lansing, MI 48824 (United States); Conolly, Rory B. [Integrated Systems Toxicology Division, National Health and Environmental Effects Research Laboratory, U.S. Environmental Protection Agency, RTP, NC 27711 (United States); Thomas, Russell S.; Andersen, Melvin E. [Institute for Chemical Safety Sciences, The Hamner Institutes for Health Sciences, RTP, NC 27709 (United States); Kaminski, Norbert E., E-mail: kamins11@msu.edu [Department of Pharmacology and Toxicology and Center for Integrative Toxicology, Michigan State University, East Lansing, MI 48824 (United States)

    2013-04-01

    Many environmental contaminants can disrupt the adaptive immune response. Exposure to the ubiquitous aryl hydrocarbon receptor (AhR) ligand 2,3,7,8-tetrachlorodibenzo-p-dioxin (TCDD) and other agonists suppresses the antibody response. The underlying pathway mechanism by which TCDD alters B cell function is not well understood. The present study investigated the mechanism of AhR-mediated pathways and mode of suppression by which TCDD perturbs terminal differentiation of B cells to plasma cells and thereby impairs antibody production. An integrated approach combining computational pathway modeling and in vitro assays with primary mouse B cells activated by lipopolysaccharide was employed. We demonstrated that suppression of the IgM response by TCDD occurs in an all-or-none (binary) rather than graded mode: i.e., it reduces the number of IgM-secreting cells in a concentration-dependent manner without affecting the IgM content in individual plasma cells. The mathematical model of the gene regulatory circuit underpinning B cell differentiation revealed that two previously identified AhR-regulated pathways, inhibition of signaling protein AP-1 and activation of transcription factor Bach2, could account for the all-or-none mode of suppression. Both pathways disrupt the operation of a bistable-switch circuit that contains transcription factors Bcl6, Prdm1, Pax5, and Bach2 and regulates B cell fate. The model further predicted that by transcriptionally activating Bach2, TCDD might delay B cell differentiation and increase the likelihood of isotype switching, thereby altering the antibody repertoire. In conclusion, the present study revealed the mode and specific pathway mechanisms by which the environmental immunosuppressant TCDD suppresses B cell differentiation. - Highlights: ► TCDD suppresses B cell differentiation stimulated by LPS in an all-or-none mode. ► TCDD reduces the fraction of IgM-secreting cells, not the IgM level in those cells. ► A mathematical model

  5. All or none cell responses of Ca2+-dependent K channels elicited by calcium or lead in human red cells can be explained by heterogeneity of agonist distribution

    International Nuclear Information System (INIS)

    We have studied the all or none cell response of Ca2+-dependent K+ channels to added Ca in human red cells depleted of ATP by incubation with iodoacetate and inosine. A procedure was used which allows separation and differential analysis of responding and nonresponding cells. Responding (H for heavy) cells incubated in medium containing 5 mM K lose KCl and water and increase their density to the point of sinking on diethylphthalate (specific gravity = 1.12) on centrifugation. Nonresponding (L for light) cells do not lose KCl at all. There is no intermediate behavior. Increasing the Ca concentration in the medium increases the fraction of cells which become H. No differences in the sensitivity to Ca2+ of the individual K+ channels were detected in inside-out vesicles prepared either from H or from L cells. The Ca content of H cells was higher than that of L cells. Cells depleted of ATP by incubation with iodoacetate and inosine sustain pump-leak Ca fluxes of about 15 mumol/liter cells per hour. ATP seems to be resynthesized in these cells at the expense of cell 2,3-diphosphoglycerate stores at a rate of about 150 mumol/liter cells per hour. Inhibition of 2,3-diphosphoglycerate phosphatase by tetrathionate increased 6-8 times the measured rate of uptake of external 45Ca. This was accompanied by an increase in the fraction of H cells. All or none cell responses of Ca2+-dependent K channels have also been evidenced in intact human red cells on addition of Pb. They have the same characteristics as those in responding and nonresponding cells. The detailed study of the kinetics of Pb-induced shrinkage of red cells suspended in medium containing 5 mM K showed that changes of Pb concentration changed not only the fraction of H cells but also the rate of shrinkage of responding cells. H cells generated by Pb treatment contained significantly more lead than L cells

  6. "All or None" Criteria for Professional Development Schools.

    Science.gov (United States)

    Murray, Frank B.

    1993-01-01

    Attempts to implement the professional development school (PDS) are frustrated by a lack of consensus about these schools' defining characteristics. This article discusses some common criteria, emphasizes that the professional development school is not a laboratory or demonstration school, and compares the PDS to other forms of academic inquiry.…

  7. An Event Network for Exploring Open Information

    OpenAIRE

    Chen, Yanping

    2015-01-01

    In this paper, an event network is presented for exploring open information, where linguistic units about an event are organized for analysing. The process is divided into three steps: document event detection, event network construction and event network analysis. First, by implementing event detection or tracking, documents are retrospectively (or on-line) organized into document events. Secondly, for each of the document event, linguistic units are extracted and combined into event network...

  8. Host Event Based Network Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Jonathan Chugg

    2013-01-01

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  9. Climate Networks and Extreme Events

    Science.gov (United States)

    Kurths, J.

    2014-12-01

    We analyse some climate dynamics from a complex network approach. This leads to an inverse problem: Is there a backbone-like structure underlying the climate system? For this we propose a method to reconstruct and analyze a complex network from data generated by a spatio-temporal dynamical system. This approach enables us to uncover relations to global circulation patterns in oceans and atmosphere. The global scale view on climate networks offers promising new perspectives for detecting dynamical structures based on nonlinear physical processes in the climate system. Moreover, we evaluate different regional climate models from this aspect. This concept is also applied to Monsoon data in order to characterize the regional occurrence of extreme rain events and its impact on predictability. Changing climatic conditions have led to a significant increase in magnitude and frequency of spatially extensive extreme rainfall events in the eastern Central Andes of South America. These events impose substantial natural hazards for population, economy, and ecology by floods and landslides. For example, heavy floods in Bolivia in early 2007 affected more than 133.000 households and produced estimated costs of 443 Mio. USD. Here, we develop a general framework to predict extreme events by combining a non-linear synchronization technique with complex networks. We apply our method to real-time satellite-derived rainfall data and are able to predict a large amount of extreme rainfall events. Our study reveals a linkage between polar and subtropical regimes as responsible mechanism: Extreme rainfall in the eastern Central Andes is caused by the interplay of northward migrating frontal systems and a low-level wind channel from the western Amazon to the subtropics, providing additional moisture. Frontal systems from the Antarctic thus play a key role for sub-seasonal variability of the South American Monsoon System.

  10. All or None Hypothesis: A Global-Default Mode that Characterizes the Brain and Mind

    Science.gov (United States)

    Diamond, Adele

    2009-01-01

    It is proposed that the mind and brain often work at a gross level and only with fine tuning or inhibition act in a more differentiated manner, even when one might think the domains being issued the global command should be distinct. This applies to disparate findings in cognitive science and neuroscience in both children and adults. Thus, it is…

  11. Importance of individual events in temporal networks

    CERN Document Server

    Takaguchi, Taro; Yano, Kazuo; Masuda, Naoki

    2012-01-01

    Records of time-stamped social interactions between pairs of individuals (e.g., face-to-face conversations, e-mail exchanges, and phone calls) constitute a so-called temporal network. A remarkable difference between temporal networks and conventional static networks is that time-stamped events rather than links are the unit elements generating the collective behavior of nodes. We propose an importance measure for single interaction events. By generalizing the concept of the advance of event proposed by [Kossinets G, Kleinberg J, and Watts DJ (2008) The structure of information pathways in a social communication network. Proceeding of the 14th ACM SIGKDD International conference on knowledge discovery and data mining, 435-443], we propose that an event is central when it carries new information about others to the two nodes involved in the event. We find that the proposed measure properly quantifies the importance of events in connecting nodes along time-ordered paths. Because of strong heterogeneity in the im...

  12. Emergence of event cascades in inhomogeneous networks

    Science.gov (United States)

    Onaga, Tomokatsu; Shinomoto, Shigeru

    2016-09-01

    There is a commonality among contagious diseases, tweets, and neuronal firings that past events facilitate the future occurrence of events. The spread of events has been extensively studied such that the systems exhibit catastrophic chain reactions if the interaction represented by the ratio of reproduction exceeds unity; however, their subthreshold states are not fully understood. Here, we report that these systems are possessed by nonstationary cascades of event-occurrences already in the subthreshold regime. Event cascades can be harmful in some contexts, when the peak-demand causes vaccine shortages, heavy traffic on communication lines, but may be beneficial in other contexts, such that spontaneous activity in neural networks may be used to generate motion or store memory. Thus it is important to comprehend the mechanism by which such cascades appear, and consider controlling a system to tame or facilitate fluctuations in the event-occurrences. The critical interaction for the emergence of cascades depends greatly on the network structure in which individuals are connected. We demonstrate that we can predict whether cascades may emerge, given information about the interactions between individuals. Furthermore, we develop a method of reallocating connections among individuals so that event cascades may be either impeded or impelled in a network.

  13. Emergence of event cascades in inhomogeneous networks.

    Science.gov (United States)

    Onaga, Tomokatsu; Shinomoto, Shigeru

    2016-01-01

    There is a commonality among contagious diseases, tweets, and neuronal firings that past events facilitate the future occurrence of events. The spread of events has been extensively studied such that the systems exhibit catastrophic chain reactions if the interaction represented by the ratio of reproduction exceeds unity; however, their subthreshold states are not fully understood. Here, we report that these systems are possessed by nonstationary cascades of event-occurrences already in the subthreshold regime. Event cascades can be harmful in some contexts, when the peak-demand causes vaccine shortages, heavy traffic on communication lines, but may be beneficial in other contexts, such that spontaneous activity in neural networks may be used to generate motion or store memory. Thus it is important to comprehend the mechanism by which such cascades appear, and consider controlling a system to tame or facilitate fluctuations in the event-occurrences. The critical interaction for the emergence of cascades depends greatly on the network structure in which individuals are connected. We demonstrate that we can predict whether cascades may emerge, given information about the interactions between individuals. Furthermore, we develop a method of reallocating connections among individuals so that event cascades may be either impeded or impelled in a network. PMID:27625183

  14. Emergence of event cascades in inhomogeneous networks

    CERN Document Server

    Onaga, Tomokatsu

    2016-01-01

    There is a commonality among contagious diseases, tweets, urban crimes, nuclear reactions, and neuronal firings that past events facilitate the future occurrence of events. The spread of events has been extensively studied such that the systems exhibit catastrophic chain reactions if the interaction represented by the ratio of reproduction exceeds unity; however, their subthreshold states for the case of the weaker interaction are not fully understood. Here, we report that these systems are possessed by nonstationary cascades of event-occurrences already in the subthreshold regime. Event cascades can be harmful in some contexts, when the peak-demand causes vaccine shortages, heavy traffic on communication lines, frequent crimes, or large fluctuations in nuclear reactions, but may be beneficial in other contexts, such that spontaneous activity in neural networks may be used to generate motion or store memory. Thus it is important to comprehend the mechanism by which such cascades appear, and consider controlli...

  15. Acoustic network event classification using swarm optimization

    Science.gov (United States)

    Burman, Jerry

    2013-05-01

    Classifying acoustic signals detected by distributed sensor networks is a difficult problem due to the wide variations that can occur in the transmission of terrestrial, subterranean, seismic and aerial events. An acoustic event classifier was developed that uses particle swarm optimization to perform a flexible time correlation of a sensed acoustic signature to reference data. In order to mitigate the effects from interference such as multipath, the classifier fuses signatures from multiple sensors to form a composite sensed acoustic signature and then automatically matches the composite signature with reference data. The approach can classify all types of acoustic events but is particularly well suited to explosive events such as gun shots, mortar blasts and improvised explosive devices that produce an acoustic signature having a shock wave component that is aperiodic and non-linear. The classifier was applied to field data and yielded excellent results in terms of reconstructing degraded acoustic signatures from multiple sensors and in classifying disparate acoustic events.

  16. AGU Hosts Networking Event for Female Scientists

    Science.gov (United States)

    McEntee, Chris

    2013-01-01

    At Fall Meeting this year I had the pleasure of cohosting a new event, a Networking Reception for Early Career Female Scientists and Students, with Jane Lubchenco, under secretary of Commerce for Oceans and Atmosphere and National Oceanic and Atmospheric Administration administrator, and Marcia McNutt, director of the U.S. Geological Survey. AGU recognizes the importance of having a diverse pool of new researchers who can enrich Earth and space sciences with their skills and innovation. That's why one of our four strategic goals is to help build the global talent pool and provide early-career scientists with networking opportunities like this one.

  17. Construction of Network Fault Simulation Platform and Event Samples Acquisition Techniques for Event Correlation

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Event correlation is one key technique in network fault management. For the event sample acqui sition problem in event correlation, a novel approach is proposed to collect the samples by constructing net work simtmulation platform. The platform designed can set kinds of network faults according to user's demand and generate a lot of network fault events, which will benefit the research on efficient event correlation tech niques.

  18. Events And Temporality In Business Networks: A Conceptual Analysis

    OpenAIRE

    Hedaa, L; Törnroos, J

    1998-01-01

    Perspectives of temporality in networks in business marketing is analysed in this conceptual paper. Core foundations of business network theory are analysed taking especially time and timing into consideration. A model of event-based networks is developed in grasping the temporal nature of business networks. The findings suggest extensions of network theory, methods and models using events as a promising but complex avenue for research.

  19. Predicting the evolution of social networks with life cycle events

    OpenAIRE

    Sharmeen, F Fariya; Arentze, TA Theo; Timmermans, HJP Harry

    2015-01-01

    This paper presents a model of social network evolution, to predict and simulate changes in social networks induced by lifecycle events. We argue that social networks change with lifecycle events, and we extend a model of friendship selection to incorporate these dynamics of personal social networks. The model uses theories of homophily and reciprocity and is formulated in a random utility maximization framework to predict the formation of social ties between individuals in the population. It...

  20. Growing community networks with local events

    OpenAIRE

    Xu, Xin-Jian; Zhang, Xun; Mendes, J. F. F.

    2009-01-01

    The study of community networks has attracted considerable attention recently. In this paper, we propose an evolving community network model based on local processes, the addition of new nodes intra-community and new links intra- or inter-community. Employing growth and preferential attachment mechanisms, we generate networks with a generalized power-law distribution of nodes' degrees.

  1. Online Unsupervised Event Detection in Wireless Sensor Networks

    NARCIS (Netherlands)

    Bahrepour, Majid; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    Event detection applications of wireless sensor networks (WSNs) highly rely on accurate and timely detection of out of ordinary situations. Majority of the existing event detection techniques designed for WSNs have focused on detection of events with known patterns requiring a priori knowledge about

  2. Detecting weak changes in dynamic events over networks

    OpenAIRE

    Li, Shuang; Xie, Yao; Farajtabar, Mehrdad; Song, Le

    2016-01-01

    Large volume of event data are becoming increasingly available in a wide variety of applications, such as social network analysis, Internet traffic monitoring and healthcare analytics. Event data are observed irregularly in continuous time, and the precise time interval between two events carries a great deal of information about the dynamics of the underlying systems. How to detect changes in these systems as quickly as possible based on such event data? In this paper, we present a novel onl...

  3. A Survey on Event Mining for ICT Network Infrastructure Management

    Institute of Scientific and Technical Information of China (English)

    LIU Zheng; LI Tao; WANG Junchang

    2016-01-01

    Managing large⁃scale complex network infrastructures is chal⁃lenging due to the huge number of heterogeneous network el⁃ements. The goal of this survey is to provide an overview of event mining techniques applied in the network management domain. Event mining includes a series of techniques for au⁃tomatically and effectively discovering valuable knowledge from historical event/log data. We present three research challenges (i.e., event generation, root cause analysis, and failure prediction) for event mining in network management and introduce the corresponding solutions. Event generation (i.e., converting messages in log files into structured events) is the first step in many event mining applications. Automat⁃ic root cause analysis can locate the faulty elements/compo⁃nents without the help of experienced domain experts. Fail⁃ure prediction in proactive fault management improves net⁃work reliability. The representative studies to address the three aforementioned challenges are reviewed and their main ideas are summarized in the survey. In addition, our survey shows that using event mining techniques can improve the network management efficiency and reduce the management cost.

  4. Multimodal Event Detection in Twitter Hashtag Networks

    OpenAIRE

    Yilmaz, Yasin; Hero, Alfred

    2016-01-01

    Event detection in a multimodal Twitter dataset is considered. We treat the hashtags in the dataset as instances with two modes: text and geolocation features. The text feature consists of a bag-of-words representation. The geolocation feature consists of geotags (i.e., geographical coordinates) of the tweets. Fusing the multimodal data we aim to detect, in terms of topic and geolocation, the interesting events and the associated hashtags. To this end, a generative latent variable model is as...

  5. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  6. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  7. Intensity-based Event Localization in Wireless Sensor Networks

    OpenAIRE

    Waelchli, Markus; Scheidegger, Matthias; Braun, Torsten

    2006-01-01

    http://citi.insa-lyon.fr/wons2006/index.html Event detection and event localization are inherent tasks of many wireless sensor network applications. The inaccuracy of sensor measurements on the one hand and resource limitations on the other make efficient event localization a challenging problem. In this paper we propose a fully distributed localization scheme that consists of two algorithms. The distributed election-winner notification algorithm (DENA) performs the determination of the cl...

  8. Abnormal Event Detection via Multikernel Learning for Distributed Camera Networks

    OpenAIRE

    Tian Wang; Jie Chen; Paul Honeine; Hichem Snoussi

    2015-01-01

    Distributed camera networks play an important role in public security surveillance. Analyzing video sequences from cameras set at different angles will provide enhanced performance for detecting abnormal events. In this paper, an abnormal detection algorithm is proposed to identify unusual events captured by multiple cameras. The visual event is summarized and represented by the histogram of the optical flow orientation descriptor, and then a multikernel strategy that takes the multiview scen...

  9. ATLAS, CMS, LHCb and ALICE Career Networking Event 2015

    CERN Multimedia

    Marinov, Andrey; Strom, Derek Axel

    2015-01-01

    A networking event for alumni of the ATLAS, CMS, LHCb and ALICE experiments as well as current ATLAS/CMS/LHCb/ALICE postdocs and graduate students. This event offers an insight into career opportunities outside of academia. Various former members of the ATLAS, CMS, LHCb and ALICE collaborations will give presentations and be part of a panel discussion and elaborate on their experience in companies in a diverse range of fields (industry, finance, IT,...). Details at https://indico.cern.ch/event/440616

  10. A Convolutional Neural Network Neutrino Event Classifier

    CERN Document Server

    Aurisano, A; Rocco, D; Himmel, A; Messier, M D; Niner, E; Pawloski, G; Psihas, F; Sousa, A; Vahle, P

    2016-01-01

    Convolutional neural networks (CNNs) have been widely applied in the computer vision community to solve complex problems in image recognition and analysis. We describe an application of the CNN technology to the problem of identifying particle interactions in sampling calorimeters used commonly in high energy physics and high energy neutrino physics in particular. Following a discussion of the core concepts of CNNs and recent innovations in CNN architectures related to the field of deep learning, we outline a specific application to the NOvA neutrino detector. This algorithm, CVN (Convolutional Visual Network) identifies neutrino interactions based on their topology without the need for detailed reconstruction and outperforms algorithms currently in use by the NOvA collaboration.

  11. A convolutional neural network neutrino event classifier

    Science.gov (United States)

    Aurisano, A.; Radovic, A.; Rocco, D.; Himmel, A.; Messier, M. D.; Niner, E.; Pawloski, G.; Psihas, F.; Sousa, A.; Vahle, P.

    2016-09-01

    Convolutional neural networks (CNNs) have been widely applied in the computer vision community to solve complex problems in image recognition and analysis. We describe an application of the CNN technology to the problem of identifying particle interactions in sampling calorimeters used commonly in high energy physics and high energy neutrino physics in particular. Following a discussion of the core concepts of CNNs and recent innovations in CNN architectures related to the field of deep learning, we outline a specific application to the NOvA neutrino detector. This algorithm, CVN (Convolutional Visual Network) identifies neutrino interactions based on their topology without the need for detailed reconstruction and outperforms algorithms currently in use by the NOvA collaboration.

  12. Subsurface Event Detection and Classification Using Wireless Signal Networks

    Directory of Open Access Journals (Sweden)

    Muhannad T. Suleiman

    2012-11-01

    Full Text Available Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs. The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events.

  13. Subsurface event detection and classification using Wireless Signal Networks.

    Science.gov (United States)

    Yoon, Suk-Un; Ghazanfari, Ehsan; Cheng, Liang; Pamukcu, Sibel; Suleiman, Muhannad T

    2012-01-01

    Subsurface environment sensing and monitoring applications such as detection of water intrusion or a landslide, which could significantly change the physical properties of the host soil, can be accomplished using a novel concept, Wireless Signal Networks (WSiNs). The wireless signal networks take advantage of the variations of radio signal strength on the distributed underground sensor nodes of WSiNs to monitor and characterize the sensed area. To characterize subsurface environments for event detection and classification, this paper provides a detailed list and experimental data of soil properties on how radio propagation is affected by soil properties in subsurface communication environments. Experiments demonstrated that calibrated wireless signal strength variations can be used as indicators to sense changes in the subsurface environment. The concept of WSiNs for the subsurface event detection is evaluated with applications such as detection of water intrusion, relative density change, and relative motion using actual underground sensor nodes. To classify geo-events using the measured signal strength as a main indicator of geo-events, we propose a window-based minimum distance classifier based on Bayesian decision theory. The window-based classifier for wireless signal networks has two steps: event detection and event classification. With the event detection, the window-based classifier classifies geo-events on the event occurring regions that are called a classification window. The proposed window-based classification method is evaluated with a water leakage experiment in which the data has been measured in laboratory experiments. In these experiments, the proposed detection and classification method based on wireless signal network can detect and classify subsurface events. PMID:23202191

  14. On Event Detection and Localization in Acyclic Flow Networks

    KAUST Repository

    Suresh, Mahima Agumbe

    2013-05-01

    Acyclic flow networks, present in many infrastructures of national importance (e.g., oil and gas and water distribution systems), have been attracting immense research interest. Existing solutions for detecting and locating attacks against these infrastructures have been proven costly and imprecise, particularly when dealing with large-scale distribution systems. In this article, to the best of our knowledge, for the first time, we investigate how mobile sensor networks can be used for optimal event detection and localization in acyclic flow networks. We propose the idea of using sensors that move along the edges of the network and detect events (i.e., attacks). To localize the events, sensors detect proximity to beacons, which are devices with known placement in the network. We formulate the problem of minimizing the cost of monitoring infrastructure (i.e., minimizing the number of sensors and beacons deployed) in a predetermined zone of interest, while ensuring a degree of coverage by sensors and a required accuracy in locating events using beacons. We propose algorithms for solving the aforementioned problem and demonstrate their effectiveness with results obtained from a realistic flow network simulator.

  15. Distributed Event Detection in Wireless Sensor Networks for Disaster Management

    OpenAIRE

    Bahrepour, Majid; Meratnia, Nirvana; Poel, Mannes; Taghikhaki, Zahra; Havinga, Paul J. M.

    2010-01-01

    Recently, wireless sensor networks (WSNs) have become mature enough to go beyond being simple fine-grained continuous monitoring platforms and become one of the enabling technologies for disaster early-warning systems. Event detection functionality of WSNs can be of great help and importance for (near) real-time detection of, for example, meteorological natural hazards and wild and residential fires. From the data-mining perspective, many real world events exhibit specific patterns, which can...

  16. Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks

    Science.gov (United States)

    Zhou, Zhangbing; Xing, Riliang; Duan, Yucong; Zhu, Yueqin; Xiang, Jianming

    2015-01-01

    With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper responses. To address this challenge, a technique that detects event coverage and determines event sources is developed in this article. Specifically, the occurrence of possible events corresponds to a set of neighboring sensor nodes whose sensory data may deviate from a normal sensing range in a collective fashion. An appropriate sensor node is selected as the relay node for gathering and routing sensory data to sink node(s). When sensory data are collected at sink node(s), the event coverage is detected and represented as a weighted graph, where the vertices in this graph correspond to sensor nodes and the weight specified upon the edges reflects the extent of sensory data deviating from a normal sensing range. Event sources are determined, which correspond to the barycenters in this graph. The results of the experiments show that our technique is more energy efficient, especially when the network topology is relatively steady. PMID:26694394

  17. Automatic event detection based on artificial neural networks

    Science.gov (United States)

    Doubravová, Jana; Wiszniowski, Jan; Horálek, Josef

    2015-04-01

    The proposed algorithm was developed to be used for Webnet, a local seismic network in West Bohemia. The Webnet network was built to monitor West Bohemia/Vogtland swarm area. During the earthquake swarms there is a large number of events which must be evaluated automatically to get a quick estimate of the current earthquake activity. Our focus is to get good automatic results prior to precise manual processing. With automatic data processing we may also reach a lower completeness magnitude. The first step of automatic seismic data processing is the detection of events. To get a good detection performance we require low number of false detections as well as high number of correctly detected events. We used a single layer recurrent neural network (SLRNN) trained by manual detections from swarms in West Bohemia in the past years. As inputs of the SLRNN we use STA/LTA of half-octave filter bank fed by vertical and horizontal components of seismograms. All stations were trained together to obtain the same network with the same neuron weights. We tried several architectures - different number of neurons - and different starting points for training. Networks giving the best results for training set must not be the optimal ones for unknown waveforms. Therefore we test each network on test set from different swarm (but still with similar characteristics, i.e. location, focal mechanisms, magnitude range). We also apply a coincidence verification for each event. It means that we can lower the number of false detections by rejecting events on one station only and force to declare an event on all stations in the network by coincidence on two or more stations. In further work we would like to retrain the network for each station individually so each station will have its own coefficients (neural weights) set. We would also like to apply this method to data from Reykjanet network located in Reykjanes peninsula, Iceland. As soon as we have a reliable detection, we can proceed to

  18. Discrete-event control of stochastic networks multimodularity and regularity

    CERN Document Server

    Altman, Eitan; Hordijk, Arie

    2003-01-01

    Opening new directions in research in both discrete event dynamic systems as well as in stochastic control, this volume focuses on a wide class of control and of optimization problems over sequences of integer numbers. This is a counterpart of convex optimization in the setting of discrete optimization. The theory developed is applied to the control of stochastic discrete-event dynamic systems. Some applications are admission, routing, service allocation and vacation control in queueing networks. Pure and applied mathematicians will enjoy reading the book since it brings together many disciplines in mathematics: combinatorics, stochastic processes, stochastic control and optimization, discrete event dynamic systems, algebra.

  19. Event-based exponential synchronization of complex networks.

    Science.gov (United States)

    Zhou, Bo; Liao, Xiaofeng; Huang, Tingwen

    2016-10-01

    In this paper, we consider exponential synchronization of complex networks. The information diffusions between nodes are driven by properly defined events. By employing the M-matrix theory, algebraic graph theory and the Lyapunov method, two kinds of distributed event-triggering laws are designed, which avoid continuous communications between nodes. Then, several criteria that ensure the event-based exponential synchronization are presented, and the exponential convergence rates are obtained as well. Furthermore, we prove that Zeno behavior of the event-triggering laws can be excluded before synchronization being achieved, that is, the lower bounds of inter-event times are strictly positive. Finally, a simulation example is provided to illustrate the effectiveness of theoretical analysis. PMID:27668021

  20. Forecasting solar proton event with artificial neural network

    Science.gov (United States)

    Gong, J.; Wang, J.; Xue, B.; Liu, S.; Zou, Z.

    Solar proton event (SPE), relatively rare but popular in solar maximum, can bring hazard situation to spacecraft. As a special event, SPE always accompanies flare, which is also called proton flare. To produce such an eruptive event, large amount energy must be accumulated within the active region. So we can investigate the character of the active region and its evolving trend, together with other such as cm radio emission and soft X-ray background to evaluate the potential of SEP in chosen area. In order to summarize the omen of SPEs in the active regions behind the observed parameters, we employed AI technology. Full connecting neural network was chosen to fulfil this job. After constructing the network, we train it with 13 parameters that was able to exhibit the character of active regions and their evolution trend. More than 80 sets of event parameter were defined to teach the neural network to identify whether an active region was potential of SPE. Then we test this model with a data base consisting SPE and non-SPE cases that was not used to train the neural network. The result showed that 75% of the choice by the model was right.

  1. Characterizing interactions in online social networks during exceptional events

    Science.gov (United States)

    Omodei, Elisa; De Domenico, Manlio; Arenas, Alex

    2015-08-01

    Nowadays, millions of people interact on a daily basis on online social media like Facebook and Twitter, where they share and discuss information about a wide variety of topics. In this paper, we focus on a specific online social network, Twitter, and we analyze multiple datasets each one consisting of individuals' online activity before, during and after an exceptional event in terms of volume of the communications registered. We consider important events that occurred in different arenas that range from policy to culture or science. For each dataset, the users' online activities are modeled by a multilayer network in which each layer conveys a different kind of interaction, specifically: retweeting, mentioning and replying. This representation allows us to unveil that these distinct types of interaction produce networks with different statistical properties, in particular concerning the degree distribution and the clustering structure. These results suggests that models of online activity cannot discard the information carried by this multilayer representation of the system, and should account for the different processes generated by the different kinds of interactions. Secondly, our analysis unveils the presence of statistical regularities among the different events, suggesting that the non-trivial topological patterns that we observe may represent universal features of the social dynamics on online social networks during exceptional events.

  2. Mining the key predictors for event outbreaks in social networks

    Science.gov (United States)

    Yi, Chengqi; Bao, Yuanyuan; Xue, Yibo

    2016-04-01

    It will be beneficial to devise a method to predict a so-called event outbreak. Existing works mainly focus on exploring effective methods for improving the accuracy of predictions, while ignoring the underlying causes: What makes event go viral? What factors that significantly influence the prediction of an event outbreak in social networks? In this paper, we proposed a novel definition for an event outbreak, taking into account the structural changes to a network during the propagation of content. In addition, we investigated features that were sensitive to predicting an event outbreak. In order to investigate the universality of these features at different stages of an event, we split the entire lifecycle of an event into 20 equal segments according to the proportion of the propagation time. We extracted 44 features, including features related to content, users, structure, and time, from each segment of the event. Based on these features, we proposed a prediction method using supervised classification algorithms to predict event outbreaks. Experimental results indicate that, as time goes by, our method is highly accurate, with a precision rate ranging from 79% to 97% and a recall rate ranging from 74% to 97%. In addition, after applying a feature-selection algorithm, the top five selected features can considerably improve the accuracy of the prediction. Data-driven experimental results show that the entropy of the eigenvector centrality, the entropy of the PageRank, the standard deviation of the betweenness centrality, the proportion of re-shares without content, and the average path length are the key predictors for an event outbreak. Our findings are especially useful for further exploring the intrinsic characteristics of outbreak prediction.

  3. Towards Optimal Event Detection and Localization in Acyclic Flow Networks

    KAUST Repository

    Agumbe Suresh, Mahima

    2012-01-03

    Acyclic flow networks, present in many infrastructures of national importance (e.g., oil & gas and water distribution systems), have been attracting immense research interest. Existing solutions for detecting and locating attacks against these infrastructures, have been proven costly and imprecise, especially when dealing with large scale distribution systems. In this paper, to the best of our knowledge for the first time, we investigate how mobile sensor networks can be used for optimal event detection and localization in acyclic flow networks. Sensor nodes move along the edges of the network and detect events (i.e., attacks) and proximity to beacon nodes with known placement in the network. We formulate the problem of minimizing the cost of monitoring infrastructure (i.e., minimizing the number of sensor and beacon nodes deployed), while ensuring a degree of sensing coverage in a zone of interest and a required accuracy in locating events. We propose algorithms for solving these problems and demonstrate their effectiveness with results obtained from a high fidelity simulator.

  4. Characterizing interactions in online social networks during exceptional events

    CERN Document Server

    Omodei, Elisa; Arenas, Alex

    2015-01-01

    Nowadays, millions of people interact on a daily basis on online social media like Facebook and Twitter, where they share and discuss information about a wide variety of topics. In this paper, we focus on a specific online social network, Twitter, and we analyze multiple datasets each one consisting of individuals' online activity before, during and after an exceptional event in terms of volume of the communications registered. We consider important events that occurred in different arenas that range from policy to culture or science. For each dataset, the users' online activities are modeled by a multilayer network in which each layer conveys a different kind of interaction, specifically: retweeting, mentioning and replying. This representation allows us to unveil that these distinct types of interaction produce networks with different statistical properties, in particular concerning the degree distribution and the clustering structure. These results suggests that models of online activity cannot discard the...

  5. Local Events and Dynamics on Weighted Complex Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Hui; GAO Zi-You

    2006-01-01

    @@ We examine the weighted networks grown and evolved by local events, such as the addition of new vertices and links and we show that depending on frequency of the events, a generalized power-law distribution of strength can emerge. Continuum theory is used to predict the scaling function as well as the exponents, which is in good agreement with the numerical simulation results. Depending on event frequency, power-law distributions of degree and weight can also be expected. Probability saturation phenomena for small strength and degree in many real world networks can be reproduced. Particularly, the non-trivial clustering coefficient, assortativity coefficient and degree-strength correlation in our model are all consistent with empirical evidences.

  6. Event management for large scale event-driven digital hardware spiking neural networks.

    Science.gov (United States)

    Caron, Louis-Charles; D'Haene, Michiel; Mailhot, Frédéric; Schrauwen, Benjamin; Rouat, Jean

    2013-09-01

    The interest in brain-like computation has led to the design of a plethora of innovative neuromorphic systems. Individually, spiking neural networks (SNNs), event-driven simulation and digital hardware neuromorphic systems get a lot of attention. Despite the popularity of event-driven SNNs in software, very few digital hardware architectures are found. This is because existing hardware solutions for event management scale badly with the number of events. This paper introduces the structured heap queue, a pipelined digital hardware data structure, and demonstrates its suitability for event management. The structured heap queue scales gracefully with the number of events, allowing the efficient implementation of large scale digital hardware event-driven SNNs. The scaling is linear for memory, logarithmic for logic resources and constant for processing time. The use of the structured heap queue is demonstrated on a field-programmable gate array (FPGA) with an image segmentation experiment and a SNN of 65,536 neurons and 513,184 synapses. Events can be processed at the rate of 1 every 7 clock cycles and a 406×158 pixel image is segmented in 200 ms.

  7. Detection capability of the Italian network for teleseismic events

    Directory of Open Access Journals (Sweden)

    A. Marchetti

    1994-06-01

    Full Text Available The future GSE experiment is based on a global seismic monitoring system, that should be designed for monitoring compliance with a nuclear test ban treaty. Every country participating in the test will transmit data to the International Data Center. Because of the high quality of data required, we decided to conduct this study in order to determine the set of stations to be used in the experiment. The Italian telemetered seismological network can detect all events of at least magnitude 2.5 whose epicenters are inside the network itself. For external events the situation is different: the capabilíty of detection is conditioned not only by the noise condition of the station, but also by the relative position of epicenter and station. The ING bulletin (January 1991-June 1992 was the data set for the present work. Comparing these data with the National Earthquake Information Center (NEIC bulletin, we established which stations are most reliable in detecting teleseismic events and, moreover, how distance and back-azimuth can influence event detection. Furthermore, we investigated the reliability of the automatic acquisition system in relation to teleseismic event detection.

  8. Networks that learn the precise timing of event sequences.

    Science.gov (United States)

    Veliz-Cuba, Alan; Shouval, Harel Z; Josić, Krešimir; Kilpatrick, Zachary P

    2015-12-01

    Neuronal circuits can learn and replay firing patterns evoked by sequences of sensory stimuli. After training, a brief cue can trigger a spatiotemporal pattern of neural activity similar to that evoked by a learned stimulus sequence. Network models show that such sequence learning can occur through the shaping of feedforward excitatory connectivity via long term plasticity. Previous models describe how event order can be learned, but they typically do not explain how precise timing can be recalled. We propose a mechanism for learning both the order and precise timing of event sequences. In our recurrent network model, long term plasticity leads to the learning of the sequence, while short term facilitation enables temporally precise replay of events. Learned synaptic weights between populations determine the time necessary for one population to activate another. Long term plasticity adjusts these weights so that the trained event times are matched during playback. While we chose short term facilitation as a time-tracking process, we also demonstrate that other mechanisms, such as spike rate adaptation, can fulfill this role. We also analyze the impact of trial-to-trial variability, showing how observational errors as well as neuronal noise result in variability in learned event times. The dynamics of the playback process determines how stochasticity is inherited in learned sequence timings. Future experiments that characterize such variability can therefore shed light on the neural mechanisms of sequence learning.

  9. Sensor Selection for Event Detection in Wireless Sensor Networks

    OpenAIRE

    Bajovic, Dragana; Sinopoli, Bruno; Xavier, Joao

    2010-01-01

    We consider the problem of sensor selection for event detection in wireless sensor networks (WSNs). We want to choose a subset of p out of n sensors that yields the best detection performance. As the sensor selection optimality criteria, we propose the Kullback-Leibler and Chernoff distances between the distributions of the selected measurements under the two hypothesis. We formulate the maxmin robust sensor selection problem to cope with the uncertainties in distribution means. We prove that...

  10. Event Networks and the Identification of Crime Pattern Motifs.

    Directory of Open Access Journals (Sweden)

    Toby Davies

    Full Text Available In this paper we demonstrate the use of network analysis to characterise patterns of clustering in spatio-temporal events. Such clustering is of both theoretical and practical importance in the study of crime, and forms the basis for a number of preventative strategies. However, existing analytical methods show only that clustering is present in data, while offering little insight into the nature of the patterns present. Here, we show how the classification of pairs of events as close in space and time can be used to define a network, thereby generalising previous approaches. The application of graph-theoretic techniques to these networks can then offer significantly deeper insight into the structure of the data than previously possible. In particular, we focus on the identification of network motifs, which have clear interpretation in terms of spatio-temporal behaviour. Statistical analysis is complicated by the nature of the underlying data, and we provide a method by which appropriate randomised graphs can be generated. Two datasets are used as case studies: maritime piracy at the global scale, and residential burglary in an urban area. In both cases, the same significant 3-vertex motif is found; this result suggests that incidents tend to occur not just in pairs, but in fact in larger groups within a restricted spatio-temporal domain. In the 4-vertex case, different motifs are found to be significant in each case, suggesting that this technique is capable of discriminating between clustering patterns at a finer granularity than previously possible.

  11. Network of Recurrent events - A case study of Japan

    CERN Document Server

    Revathi, P G

    2010-01-01

    A recently proposed method of constructing seismic networks from 'record breaking events' from the earthquake catalog of California (Phy. Rev. E, 77 6,066104, 2008) was successfull in establishing causal features to seismicity and arrive at estimates for rupture length and its scaling with magnitude. The results of our implementation of this procedure on the earthquake catalog of Japan establishes the robustness of the procedure. Additionally, we find that the temporal distributions are able to detect heterogeneties in the seismicity of the region.

  12. Event-Based Control over Networks: Some Research Questions and Preliminary Results

    OpenAIRE

    Henningsson, Toivo; Cervin, Anton

    2006-01-01

    The paper discusses some research questions related to event-based control over networks and presents preliminary results regarding event-based minimum-variance control of first-order systems with specified minimum inter-event times.

  13. A Fuzzy-Decision Based Approach for Composite Event Detection in Wireless Sensor Networks

    OpenAIRE

    Shukui Zhang; Hao Chen; Qiaoming Zhu; Juncheng Jia

    2014-01-01

    The event detection is one of the fundamental researches in wireless sensor networks (WSNs). Due to the consideration of various properties that reflect events status, the Composite event is more consistent with the objective world. Thus, the research of the Composite event becomes more realistic. In this paper, we analyze the characteristics of the Composite event; then we propose a criterion to determine the area of the Composite event and put forward a dominating set based network topology...

  14. Event-triggered networked predictive control of system with data loss

    Directory of Open Access Journals (Sweden)

    Quan Wang

    2016-12-01

    Full Text Available This paper investigates the problem of event-triggered networked predictive control for systems with data loss. An event-triggered networked predictive control system is proposed. Based on predictive control model, a data loss compensation strategy is presented and an extended event-triggered transmission mechanism is developed. The closed-loop event-triggered predictive control system is described as a switched system and sufficient closed-loop stability conditions related to event-triggered mechanism are established. Under the event-triggered networked predictive control scheme, the consumption of the communication resources is reduced. Finally, an example is provided to illustrate the effectiveness of the proposed method.

  15. Event-triggered Decision Propagation in Proximity Networks

    Directory of Open Access Journals (Sweden)

    Soumik eSarkar

    2014-12-01

    Full Text Available This paper proposes a novel event-triggered formulation as an extension of the recently develo-ped generalized gossip algorithm for decision/awareness propagation in mobile sensor networksmodeled as proximity networks. The key idea is to expend energy for communication (messagetransmission and reception only when there is any event of interest in the region of surveillance.The idea is implemented by using an agent’s belief about presence of a hotspot as feedback tochange its probability of (communication activity. In the original formulation, the evolution ofnetwork topology and the dynamics of decision propagation were completely decoupled whichis no longer the case as a consequence of this feedback policy. Analytical results and numeri-cal experiments are presented to show a significant gain in energy savings with no change inthe first moment characteristics of decision propagation. However, numerical experiments showthat the second moment characteristics may change and theoretical results are provided forupper and lower bounds for second moment characteristics. Effects of false alarms on networkformation and communication activity are also investigated.

  16. Data Set From Molisan Regional Seismic Network Events

    CERN Document Server

    De Gasperis, Giovanni

    2016-01-01

    After the earthquake occurred in Molise (Central Italy) on 31st October 2002 (Ml 5.4, 29 people dead), the local Servizio Regionale per la Protezione Civile to ensure a better analysis of local seismic data, through a convention with the Istituto Nazionale di Geofisica e Vulcanologia (INGV), promoted the design of the Regional Seismic Network (RMSM) and funded its implementation. The 5 stations of RMSM worked since 2007 to 2013 collecting a large amount of seismic data and giving an important contribution to the study of seismic sources present in the region and the surrounding territory. This work reports about the dataset containing all triggers collected by RMSM since July 2007 to March 2009, including actual seismic events; among them, all earthquakes events recorded in coincidence to Rete Sismica Nazionale Centralizzata (RSNC) of INGV have been marked with S and P arrival timestamps. Every trigger has been associated to a spectrogram defined into a recorded time vs. frequency domain. The main aim of this...

  17. Distributed topological convex hull estimation of event region in wireless sensor networks without location information

    NARCIS (Netherlands)

    Guo, Peng; Cao, Jiannong; Zhang, Kui

    2015-01-01

    In critical event (e.g., fire or gas) monitoring applications of wireless sensor networks (WSNs), convex hull of the event region is an efficient tool in handling the usual tasks like event report, routes reconstruction and human motion planning. Existing works on estimating convex hull of event reg

  18. Object-Scene Convolutional Neural Networks for Event Recognition in Images

    OpenAIRE

    Wang, Limin; Wang, Zhe; Du, Wenbin; Qiao, Yu

    2015-01-01

    Event recognition from still images is of great importance for image understanding. However, compared with event recognition in videos, there are much fewer research works on event recognition in images. This paper addresses the issue of event recognition from images and proposes an effective method with deep neural networks. Specifically, we design a new architecture, called Object-Scene Convolutional Neural Network (OS-CNN). This architecture is decomposed into object net and scene net, whi...

  19. Sensor Fusion-based Event Detection in Wireless Sensor Networks

    NARCIS (Netherlands)

    Bahrepour, M.; Meratnia, N.; Havinga, P.J.M.

    2009-01-01

    Recently, Wireless Sensor Networks (WSN) community has witnessed an application focus shift. Although, monitoring was the initial application of wireless sensor networks, in-network data processing and (near) real-time actuation capability have made wireless sensor networks suitable candidate for ev

  20. Adult mouse motor units develop almost all of their force in the subprimary range: a new all-or-none strategy for force recruitment?

    Science.gov (United States)

    Manuel, Marin; Heckman, C J

    2011-10-19

    Classical studies of the mammalian neuromuscular system have shown an impressive adaptation match between the intrinsic properties of motoneurons and the contractile properties of their motor units. In these studies, the rate at which motoneurons start to fire repetitively corresponds to the rate at which individual twitches start to sum, and the firing rate increases linearly with the amount of excitation ("primary range") up to the point where the motor unit develops its maximal force. This allows for the gradation of the force produced by a motor unit by rate modulation. In adult mouse motoneurons, however, we recently described a regime of firing ("subprimary range") that appears at lower excitation than what is required for the primary range, a finding that might challenge the classical conception. To investigate the force production of mouse motor units, we simultaneously recorded, for the first time, the motoneuron discharge elicited by intracellular ramps of current and the force developed by its motor unit. We showed that the motor unit developed nearly its maximal force during the subprimary range. This was found to be the case regardless of the input resistance of the motoneuron, the contraction speed, or the tetanic force of the motor unit. Our work suggests that force modulation in small mammals mainly relies on the number of motor units that are recruited rather than on rate modulation of individual motor units.

  1. Multitask Learning-Based Security Event Forecast Methods for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hui He

    2016-01-01

    Full Text Available Wireless sensor networks have strong dynamics and uncertainty, including network topological changes, node disappearance or addition, and facing various threats. First, to strengthen the detection adaptability of wireless sensor networks to various security attacks, a region similarity multitask-based security event forecast method for wireless sensor networks is proposed. This method performs topology partitioning on a large-scale sensor network and calculates the similarity degree among regional subnetworks. The trend of unknown network security events can be predicted through multitask learning of the occurrence and transmission characteristics of known network security events. Second, in case of lacking regional data, the quantitative trend of unknown regional network security events can be calculated. This study introduces a sensor network security event forecast method named Prediction Network Security Incomplete Unmarked Data (PNSIUD method to forecast missing attack data in the target region according to the known partial data in similar regions. Experimental results indicate that for an unknown security event forecast the forecast accuracy and effects of the similarity forecast algorithm are better than those of single-task learning method. At the same time, the forecast accuracy of the PNSIUD method is better than that of the traditional support vector machine method.

  2. Learning Dynamic Classes of Events using Stacked Multilayer Perceptron Networks

    OpenAIRE

    Kanhabua, Nattiya; Ren, Huamin; Moeslund, Thomas B

    2016-01-01

    People often use a web search engine to find information about events of interest, for example, sport competitions, political elections, festivals and entertainment news. In this paper, we study a problem of detecting event-related queries, which is the first step before selecting a suitable time-aware retrieval model. In general, event-related information needs can be observed in query streams through various temporal patterns of user search behavior, e.g., spiky peaks for popular events, an...

  3. Artificial intelligence based event detection in wireless sensor networks

    NARCIS (Netherlands)

    Bahrepour, Majid

    2013-01-01

    Wireless sensor networks (WSNs) are composed of large number of small, inexpensive devices, called sensor nodes, which are equipped with sensing, processing, and communication capabilities. While traditional applications of wireless sensor networks focused on periodic monitoring, the focus of more r

  4. Detection of incidents and events in urban networks

    NARCIS (Netherlands)

    Thomas, T.; Berkum, van E.C.

    2009-01-01

    Events and incidents are relatively rare, but they often have a negative impact on traffic. Reliable travel demand predictions during events and incident detection algorithms are thus essential. The authors study link flows that were collected throughout the Dutch city of Almelo. We show that reliab

  5. Social networking as a marketing tool: study of participation in cultural events promoted by Facebook

    OpenAIRE

    Rebelo, Márcia; Alturas, Bráulio

    2011-01-01

    This paper addresses the topic of Social Networking as a Marketing tool studying the participation in cultural events disseminated through social networks, specifically by Facebook. After a theoretical framework, we propose a conceptual model that identifies and analyses the assumptions of this research. It is argued that “the reading of an invitation to a an event received through Facebook is positively influenced by being sent by a friend”, “users who regularly read invitations to cultural ...

  6. AN ENERGY EFFICIENT EVENT DETECTION CLASSIFIER IN WIRELESS SENSOR NETWORK USING SUPPORT VECTOR MACHINE

    Directory of Open Access Journals (Sweden)

    K.Ramanan

    2015-02-01

    Full Text Available Wireless sensor network (WSN comprises of nodes that are spatially distributed to monitor the environments and detect the events accordingly. Correlated Data Gathering (CDG in wireless sensor network used Adaptive and Distributed Routing (ADR algorithm for correlated data gathering in order to minimize the total energy consumption. Though energy consumption was reduced in the network, energy delay tradeoff occurred while securing data in sensor network was high. Energy-efficient and High-accuracy (EEHA scheme provided a secured data aggregation technique using an aggregation tree which provided privacy but the energy consumption was high during event detection. Recoverable Concealed Data Aggregation (RCDA for Data Integrity recovered all sensing data events even when the data were aggregated, by reducing the transmission overhead but with higher energy ratio. To develop an energy efficient Event Detection Classifier in wireless sensor network, a predetermined event weight based on Support Vector Machine (EDC-SVM is proposed in this paper. The EDC-SVM initially identifies the weight of the events for effective classification using SVM with minimal energy consumption. EDC-SVM uses Doppler Effecting method for recovering all sensing data events with minimal energy. The task of Doppler Effecting method in EDC-SVM is to detect the periodic events of moving objects (i.e., sensor nodes to reduce the classification time of sensor events. With the minimal time on classification, the energy delay tradeoff is overcome in EDC-SVM. Furthermore, with the application of an event section key generation in EDC-SVM, reduces the energy consumption during the generating of section key and broadcast the notification to the sensor nodes within the section. EDC-SVM with event section key generation improves the security level on object collection. Experimental work is carried out on the factors such as classifier rate, security level, and energy consumption rate.

  7. Development of an Event Detection System Based on a Wireless Sensor Network

    OpenAIRE

    Bermingham, Louise

    2011-01-01

    The focus of this research is to develop an event detection system for groundwater flooding. The groundwater monitoring infrastructure is based on a Wireless Sensor Network, which can often lead to corrupted data values. The event detection system seeks to develop an algorithm to identify these corrupted data values and flag them as a false event to the user. It aims to maintain a high accuracy of true events, while keeping the occurrence of a false event to a minimum. The algorithm is based ...

  8. Energy-Efficient Fault-Tolerant Dynamic Event Region Detection in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Enemark, Hans-Jacob; Zhang, Yue; Dragoni, Nicola;

    2015-01-01

    Fault-tolerant event detection is fundamental to wireless sensor network applications. Existing approaches usually adopt neighborhood collaboration for better detection accuracy, while need more energy consumption due to communication. Focusing on energy efficiency, this paper makes an improvement...... efficiency with the number of messages exchanged in the network decreased....

  9. A Hybrid Adaptive Routing Algorithm for Event-Driven Wireless Sensor Networks

    OpenAIRE

    Loureiro, Antonio A. F.; Carlos M. S. Figueiredo; Eduardo F. Nakamura

    2009-01-01

    Routing is a basic function in wireless sensor networks (WSNs). For these networks, routing algorithms depend on the characteristics of the applications and, consequently, there is no self-contained algorithm suitable for every case. In some scenarios, the network behavior (traffic load) may vary a lot, such as an event-driven application, favoring different algorithms at different instants. This work presents a hybrid and adaptive algorithm for routing in WSNs, called Multi-MAF, that adapts ...

  10. Cough event classification by pretrained deep neural network

    Science.gov (United States)

    2015-01-01

    Background Cough is an essential symptom in respiratory diseases. In the measurement of cough severity, an accurate and objective cough monitor is expected by respiratory disease society. This paper aims to introduce a better performed algorithm, pretrained deep neural network (DNN), to the cough classification problem, which is a key step in the cough monitor. Method The deep neural network models are built from two steps, pretrain and fine-tuning, followed by a Hidden Markov Model (HMM) decoder to capture tamporal information of the audio signals. By unsupervised pretraining a deep belief network, a good initialization for a deep neural network is learned. Then the fine-tuning step is a back propogation tuning the neural network so that it can predict the observation probability associated with each HMM states, where the HMM states are originally achieved by force-alignment with a Gaussian Mixture Model Hidden Markov Model (GMM-HMM) on the training samples. Three cough HMMs and one noncough HMM are employed to model coughs and noncoughs respectively. The final decision is made based on viterbi decoding algorihtm that generates the most likely HMM sequence for each sample. A sample is labeled as cough if a cough HMM is found in the sequence. Results The experiments were conducted on a dataset that was collected from 22 patients with respiratory diseases. Patient dependent (PD) and patient independent (PI) experimental settings were used to evaluate the models. Five criteria, sensitivity, specificity, F1, macro average and micro average are shown to depict different aspects of the models. From overall evaluation criteria, the DNN based methods are superior to traditional GMM-HMM based method on F1 and micro average with maximal 14% and 11% error reduction in PD and 7% and 10% in PI, meanwhile keep similar performances on macro average. They also surpass GMM-HMM model on specificity with maximal 14% error reduction on both PD and PI. Conclusions In this paper, we

  11. Spatiotemporal Correlation Based Fault-Tolerant Event Detection in Wireless Sensor Networks

    OpenAIRE

    Kezhong Liu; Yang Zhuang; Zhibo Wang; Jie Ma

    2015-01-01

    Reliable event detection is one of the most important objectives in wireless sensor networks (WSNs), especially in the presence of faulty nodes. Existing fault-tolerant event detection approaches usually take the probability of faulty nodes into account and fusion techniques to weaken the influence of faulty readings are usually developed. Through extensive experiments, we discover a phenomenon that event detection accuracy degrades quickly when the faulty sensors ratio reaches a critical val...

  12. Anomaly Event Detection Method Based on Compressive Sensing and Iteration in Wireless Sensor Networks

    OpenAIRE

    Shihua Cao; Qihui Wang; Yaping Yuan; Junyang Yu

    2014-01-01

    Anomaly event detection is one of the research hotspots in wireless sensor networks. Aiming at the disadvantages of current detection solutions, a novel anomaly event detection algorithm based on compressed sensing and iteration is proposed. Firstly, a measured value can be sensed in each node, based on the compressed sensing. Then the problem of anomaly event detection is modeled as the minimization problem of weighted l1 norm, and OMP algorithm is adopted for solving the problem iteratively...

  13. Energy-efficient fault-tolerant dynamic event region detection in wireless sensor networks

    OpenAIRE

    Enemark, Hans-Jacob; Zhang, Yue; Dragoni, Nicola; Orfanidis, Charalampos

    2015-01-01

    Fault-tolerant event detection is fundamental to wireless sensor network applications. Existing approaches usually adopt neighborhood collaboration for better detection accuracy,while need more energy consumption due to communication.Focusing on energy efficiency, this paper makes an improvement to a hybrid algorithm for dynamic event region detection, such asreal-time tracking of chemical leakage regions. Considering the characteristics of the moving away dynamic events, we propose areturn b...

  14. Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks

    OpenAIRE

    Dyi-Rong Duh; Ssu-Pei Li; Victor W. Cheng

    2013-01-01

    This work provides a distributed fault-tolerant event region detection algorithm for wireless sensor networks. The proposed algorithm can identify faulty and fault-free sensors and ignore the abnormal readings to avoid false alarm. Moreover, every event region can also be detected and identified. Simulation results show that fault detection accuracy (FDA) is greater than 92%, false alarm rate (FAR) is near 0%, and event detection accuracy (EDA) is greater than 99% under uniform distribution. ...

  15. Scale-Free Brain Networks Based on the Event-Related Potential during Visual Spatial Attention

    Institute of Scientific and Technical Information of China (English)

    LI Ling; JIN Zhen-Lan

    2011-01-01

    @@ The human brain is thought of as one of the most complex dynamical systems in the universe.The network view of the dynamical system has emerged since the discovery of scale-free networks.Brain functional networks, which represent functional associations among brain regions, are extracted by measuring the temporal correlations from electroencephalogram data.We measure the topological properties of the brain functional network, including degree distribution, average degree, clustering coefficient and the shortest path length, to compare the networks of multi-channel event-related potential activity between visual spatial attention and unattention conditions.It is found that the degree distribution of the brain functional networks under both the conditions is a power law distribution, which reflects a scale-free property.Moreover, the scaling exponent of the attention condition is significantly smaller than that of the unattention condition.However, the degree distribution of equivalent random networks does not follow the power law distribution.In addition, the clustering coefficient of these random networks is smaller than those of brain networks, and the shortest path length of these random networks is large and comparable with those of brain networks.Our results, typical of scale-free networks, indicate that the scaling exponent of brain activity could reflect different cognitive processes.%The human brain is thought of as one of the most complex dynamical systems in the universe. The network view of the dynamical system has emerged since the discovery of scale-free networks. Brain functional networks, which represent functional associations among brain regions, are extracted by measuring the temporal correlations from electroencephalogram data. We measure the topological properties of the brain functional network, including degree distribution, average degree, clustering coefficient and the shortest path length, to compare the networks of multi-channel event

  16. Event Building in Future Daq Architectures Using ATM Networks

    Science.gov (United States)

    Doughty, David C.; Game, David; Holt, Stephanie; Mitchell, Lisa; Banta, Paul; Heyes, Graham; Putnam, Theodore; Watson, W. A.

    ATM switches and links have been investigated for use as the event building fabric for future data acquisition architectures and will be used in CEBAF's CLAS detector. To avoid contention problems and cell-loss, a linked dual token passing algorithm has been devised, with two different types of tokens being passed through the switch. This algorithm leads to a `barrel shifter' type of parallel data transfer. We describe the hardware architecture and the dual token algorithm, and present simulation and test results.

  17. Enhancing Team Projects Using an Event-Triggered Knowledge Network

    OpenAIRE

    Xuelian Xiao; Jeff DePree; Stanley Y. W. Su (IEEE Fellow)

    2011-01-01

    Across the disciplines and levels of education, team projects are becoming an increasingly important tool for assessment. However, it is often difficult to make sure that work is fairly distributed, that a reasonable schedule is formed which does not leave everything for the last minute, and that individual students are fairly rewarded/penalized for their respective contributions. To solve these problems, we can model a project using events, rules, and workflows. Depending on the nature of an...

  18. Tracking the events in the coverage of wireless sensor networks based on artificial neural-networks algorithms

    Institute of Scientific and Technical Information of China (English)

    BAI Rong-gang; QU Yu-gui; LIN Zhi-ting; WANG Qing-hua; ZHAO Bao-hua

    2006-01-01

    Sensor deployment is an important problem in mobile wireless sensor networks.This paper presents a distributed self-spreading deployment algorithm (SOMDA) for mobile sensors based on artificial neural-networks selforganizing maps algorithm.During the deployment,the nodes compete to track the event and cooperate to form an ordered topology.After going through the algorithm,the statistical distribution of the nodes approaches that of the events in the interest area.The performance of the algorithm is evaluated by the covered percentage of region/events,the detecting ability and the energy equalization of the networks.The simulation results indicate that SOMDA outperforms uniform and random deployment with lossless coverage,enhancive detecting ability and significant energy equalization.

  19. Enhancing Team Projects Using an Event-Triggered Knowledge Network

    Directory of Open Access Journals (Sweden)

    Xuelian Xiao

    2011-06-01

    Full Text Available Across the disciplines and levels of education, team projects are becoming an increasingly important tool for assessment. However, it is often difficult to make sure that work is fairly distributed, that a reasonable schedule is formed which does not leave everything for the last minute, and that individual students are fairly rewarded/penalized for their respective contributions. To solve these problems, we can model a project using events, rules, and workflows. Depending on the nature of an event, an appropriate rule can be triggered, which can subsequently initiate a workflow that will assign specific tasks to specific roles within the team. Events that occur over the course of the project, fired from a variety of sources, can lead to the derivation of new knowledge, and potentially alter the flow of the team’s activities. An integration of mobile devices into the system can insure that students are always aware of the current state of the system and their roles within it. At the conclusion and at all prior points in the project lifecycle, a comprehensive log of each student’s activities will be available and will greatly simplify the task of assigning fair and accurate grades. The result will be a more educational, more equitable, and far more engaging learning experience.

  20. E-njoy the first CERN Global Network e-vent!

    CERN Multimedia

    CERN Bulletin

    2010-01-01

    Empowered by the considerable interest it received after it was launched, the CERN Global Network takes off and organizes the first e-vent, which will be a special talk on science communication that will be held on 29 June at 4.30 p.m. in the Council Chamber. You can experience it live on the Global Network site and, if you are a Member, provide feedback. Stay linked!   On the CERN Global Network webpage, you will be able to choose the topic of the next e-vents. Seven weeks after its launch, about 600 people have already joined the CERN Global Network and six thematic groups have been created. The whole idea of joining the Network is to stay connected or reconnect with life at CERN where seminars, talks and discussions are undoubtedly a very important and much appreciated part of it. This is where the e-vents come into play. “The e-vents enable members of the Global Network to participate in selected events taking place at CERN, such as lectures or panel discussions. They will...

  1. Event-triggered H∞ filter design for delayed neural network with quantization.

    Science.gov (United States)

    Liu, Jinliang; Tang, Jia; Fei, Shumin

    2016-10-01

    This paper is concerned with H∞ filter design for a class of neural network systems with event-triggered communication scheme and quantization. Firstly, a new event-triggered communication scheme is introduced to determine whether or not the current sampled sensor data should be broadcasted and transmitted to quantizer, which can save the limited communication resource. Secondly, a logarithmic quantizer is used to quantify the sampled data, which can reduce the data transmission rate in the network. Thirdly, considering the influence of the constrained network resource, we investigate the problem of H∞ filter design for a class of event-triggered neural network systems with quantization. By using Lyapunov functional and linear matrix inequality (LMI) techniques, some delay-dependent stability conditions for the existence of the desired filter are obtained. Furthermore, the explicit expression is given for the designed filter parameters in terms of LMIs. Finally, a numerical example is given to show the usefulness of the obtained theoretical results.

  2. Network-based event-triggered filtering for Markovian jump systems

    Science.gov (United States)

    Wang, Huijiao; Shi, Peng; Agarwal, Ramesh K.

    2016-06-01

    The problem of event-triggered H∞ filtering for networked Markovian jump system is studied in this paper. A dynamic discrete event-triggered scheme is designed to choose the transmitted data for different Markovian jumping modes. The time-delay modelling method is employed to describe the event-triggered scheme and the network-related behaviour, such as transmission delay, data package dropout and disorder, into a networked Markovian time-delay jump system. Furthermore, a sufficient condition is derived to guarantee that the resulting filtering error system is stochastically stable with a prescribed performance index. A co-design method for the H∞ filter and the event-triggered scheme is then proposed. The effectiveness and potential of the theoretic results obtained are illustrated by a simulation example.

  3. Network Events on Multiple Space and Time Scales in Cultured Neural Networks and in a Stochastic Rate Model.

    Science.gov (United States)

    Gigante, Guido; Deco, Gustavo; Marom, Shimon; Del Giudice, Paolo

    2015-11-01

    Cortical networks, in-vitro as well as in-vivo, can spontaneously generate a variety of collective dynamical events such as network spikes, UP and DOWN states, global oscillations, and avalanches. Though each of them has been variously recognized in previous works as expression of the excitability of the cortical tissue and the associated nonlinear dynamics, a unified picture of the determinant factors (dynamical and architectural) is desirable and not yet available. Progress has also been partially hindered by the use of a variety of statistical measures to define the network events of interest. We propose here a common probabilistic definition of network events that, applied to the firing activity of cultured neural networks, highlights the co-occurrence of network spikes, power-law distributed avalanches, and exponentially distributed 'quasi-orbits', which offer a third type of collective behavior. A rate model, including synaptic excitation and inhibition with no imposed topology, synaptic short-term depression, and finite-size noise, accounts for all these different, coexisting phenomena. We find that their emergence is largely regulated by the proximity to an oscillatory instability of the dynamics, where the non-linear excitable behavior leads to a self-amplification of activity fluctuations over a wide range of scales in space and time. In this sense, the cultured network dynamics is compatible with an excitation-inhibition balance corresponding to a slightly sub-critical regime. Finally, we propose and test a method to infer the characteristic time of the fatigue process, from the observed time course of the network's firing rate. Unlike the model, possessing a single fatigue mechanism, the cultured network appears to show multiple time scales, signalling the possible coexistence of different fatigue mechanisms.

  4. Network Events on Multiple Space and Time Scales in Cultured Neural Networks and in a Stochastic Rate Model.

    Directory of Open Access Journals (Sweden)

    Guido Gigante

    2015-11-01

    Full Text Available Cortical networks, in-vitro as well as in-vivo, can spontaneously generate a variety of collective dynamical events such as network spikes, UP and DOWN states, global oscillations, and avalanches. Though each of them has been variously recognized in previous works as expression of the excitability of the cortical tissue and the associated nonlinear dynamics, a unified picture of the determinant factors (dynamical and architectural is desirable and not yet available. Progress has also been partially hindered by the use of a variety of statistical measures to define the network events of interest. We propose here a common probabilistic definition of network events that, applied to the firing activity of cultured neural networks, highlights the co-occurrence of network spikes, power-law distributed avalanches, and exponentially distributed 'quasi-orbits', which offer a third type of collective behavior. A rate model, including synaptic excitation and inhibition with no imposed topology, synaptic short-term depression, and finite-size noise, accounts for all these different, coexisting phenomena. We find that their emergence is largely regulated by the proximity to an oscillatory instability of the dynamics, where the non-linear excitable behavior leads to a self-amplification of activity fluctuations over a wide range of scales in space and time. In this sense, the cultured network dynamics is compatible with an excitation-inhibition balance corresponding to a slightly sub-critical regime. Finally, we propose and test a method to infer the characteristic time of the fatigue process, from the observed time course of the network's firing rate. Unlike the model, possessing a single fatigue mechanism, the cultured network appears to show multiple time scales, signalling the possible coexistence of different fatigue mechanisms.

  5. Scale-Free Brain Networks Based on the Event-Related Potential during Visual Spatial Attention

    Science.gov (United States)

    Li, Ling; Jin, Zhen-Lan

    2011-04-01

    The human brain is thought of as one of the most complex dynamical systems in the universe. The network view of the dynamical system has emerged since the discovery of scale-free networks. Brain functional networks, which represent functional associations among brain regions, are extracted by measuring the temporal correlations from electroencephalogram data. We measure the topological properties of the brain functional network, including degree distribution, average degree, clustering coefficient and the shortest path length, to compare the networks of multi-channel event-related potential activity between visual spatial attention and unattention conditions. It is found that the degree distribution of the brain functional networks under both the conditions is a power law distribution, which reflects a scale-free property. Moreover, the scaling exponent of the attention condition is significantly smaller than that of the unattention condition. However, the degree distribution of equivalent random networks does not follow the power law distribution. In addition, the clustering coefficient of these random networks is smaller than those of brain networks, and the shortest path length of these random networks is large and comparable with those of brain networks. Our results, typical of scale-free networks, indicate that the scaling exponent of brain activity could reflect different cognitive processes.

  6. Dyadic Event Attribution in Social Networks with Mixtures of Hawkes Processes.

    Science.gov (United States)

    Li, Liangda; Zha, Hongyuan

    2013-01-01

    In many applications in social network analysis, it is important to model the interactions and infer the influence between pairs of actors, leading to the problem of dyadic event modeling which has attracted increasing interests recently. In this paper we focus on the problem of dyadic event attribution, an important missing data problem in dyadic event modeling where one needs to infer the missing actor-pairs of a subset of dyadic events based on their observed timestamps. Existing works either use fixed model parameters and heuristic rules for event attribution, or assume the dyadic events across actor-pairs are independent. To address those shortcomings we propose a probabilistic model based on mixtures of Hawkes processes that simultaneously tackles event attribution and network parameter inference, taking into consideration the dependency among dyadic events that share at least one actor. We also investigate using additive models to incorporate regularization to avoid overfitting. Our experiments on both synthetic and real-world data sets on international armed conflicts suggest that the proposed new method is capable of significantly improve accuracy when compared with the state-of-the-art for dyadic event attribution. PMID:24917494

  7. A hybrid adaptive routing algorithm for event-driven wireless sensor networks.

    Science.gov (United States)

    Figueiredo, Carlos M S; Nakamura, Eduardo F; Loureiro, Antonio A F

    2009-01-01

    Routing is a basic function in wireless sensor networks (WSNs). For these networks, routing algorithms depend on the characteristics of the applications and, consequently, there is no self-contained algorithm suitable for every case. In some scenarios, the network behavior (traffic load) may vary a lot, such as an event-driven application, favoring different algorithms at different instants. This work presents a hybrid and adaptive algorithm for routing in WSNs, called Multi-MAF, that adapts its behavior autonomously in response to the variation of network conditions. In particular, the proposed algorithm applies both reactive and proactive strategies for routing infrastructure creation, and uses an event-detection estimation model to change between the strategies and save energy. To show the advantages of the proposed approach, it is evaluated through simulations. Comparisons with independent reactive and proactive algorithms show improvements on energy consumption. PMID:22423207

  8. A Hybrid Adaptive Routing Algorithm for Event-Driven Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Antonio A. F. Loureiro

    2009-09-01

    Full Text Available Routing is a basic function in wireless sensor networks (WSNs. For these networks, routing algorithms depend on the characteristics of the applications and, consequently, there is no self-contained algorithm suitable for every case. In some scenarios, the network behavior (traffic load may vary a lot, such as an event-driven application, favoring different algorithms at different instants. This work presents a hybrid and adaptive algorithm for routing in WSNs, called Multi-MAF, that adapts its behavior autonomously in response to the variation of network conditions. In particular, the proposed algorithm applies both reactive and proactive strategies for routing infrastructure creation, and uses an event-detection estimation model to change between the strategies and save energy. To show the advantages of the proposed approach, it is evaluated through simulations. Comparisons with independent reactive and proactive algorithms show improvements on energy consumption.

  9. Decentralized event-triggered control over wireless sensor/actuator networks

    CERN Document Server

    Mazo, Manuel

    2010-01-01

    In recent years we have witnessed a move of the major industrial automation providers into the wireless domain. While most of these companies already offer wireless products for measurement and monitoring purposes, the ultimate goal is to be able to close feedback loops over wireless networks interconnecting sensors, computation devices, and actuators. In this paper we present a decentralized event-triggered implementation, over sensor/actuator networks, of centralized nonlinear controllers. Event-triggered control has been recently proposed as an alternative to the more traditional periodic execution of control tasks. In a typical event-triggered implementation, the control signals are kept constant until the violation of a condition on the state of the plant triggers the re-computation of the control signals. The possibility of reducing the number of re-computations, and thus of transmissions, while guaranteeing desired levels of performance makes event-triggered control very appealing in the context of sen...

  10. Estimating inter-event time distributions from finite observation periods in communication networks

    CERN Document Server

    Kivelä, Mikko

    2014-01-01

    A diverse variety of processes --- including recurrent disease episodes, neuron firing, and communication patterns among humans --- can be described using inter-event time (IET) distributions. Many such processes are ongoing, although event sequences are only available during a finite observation window. Because the observation time window is more likely to begin or end during long IETs than during short ones, the analysis of such data is susceptible to a bias induced by the finite observation period. In this paper, we illustrate how this length bias is born and how it can be corrected. To do this, we model event sequences using stationary renewal processes, and we formulate simple heuristics for determining the severity of the bias. To illustrate our results, we focus on the example of empirical communication networks, which are temporal networks that are constructed from communication events. The IET distributions of such systems guide efforts to build models of human behavior, and the variance of IETs is v...

  11. A Database of Tornado Events as Perceived by the USArray Transportable Array Network

    Science.gov (United States)

    Tytell, J. E.; Vernon, F.; Reyes, J. C.

    2015-12-01

    Over the course of the deployment of Earthscope's USArray Transportable Array (TA) network there have numerous tornado events that have occurred within the changing footprint of its network. The Array Network Facility based in San Diego, California, has compiled a database of these tornado events based on data provided by the NOAA Storm Prediction Center (SPC). The SPC data itself consists of parameters such as start-end point track data for each event, maximum EF intensities, and maximum track widths. Our database is Antelope driven and combines these data from the SPC with detailed station information from the TA network. We are now able to list all available TA stations during any specific tornado event date and also provide a single calculated "nearest" TA station per individual tornado event. We aim to provide this database as a starting resource for those with an interest in investigating tornado signatures within surface pressure and seismic response data. On a larger scale, the database may be of particular interest to the infrasound research community

  12. Datacollection in Event-Driven Wireless Sensor Networks with Mobile Sinks

    OpenAIRE

    Harshavardhan Sabbineni; Krishnendu Chakrabarty

    2010-01-01

    We present a two-tier distributed hash table-based scheme for data-collection in event-driven wireless sensor networks. The proposed method leverages mobile sinks to significantly extend the lifetime of the sensor network. We propose localized algorithms using a distributed geographic hash-table mechanism that adds load balancing capabilities to the data-collection process. We address the hotspot problem by rehashing the locations of the mobile sinks periodically. The proposed mobility model ...

  13. A Cluster-Based Fuzzy Fusion Algorithm for Event Detection in Heterogeneous Wireless Sensor Networks

    OpenAIRE

    ZiQi Hao; ZhenJiang Zhang; Han-Chieh Chao

    2015-01-01

    As limited energy is one of the tough challenges in wireless sensor networks (WSN), energy saving becomes important in increasing the lifecycle of the network. Data fusion enables combining information from several sources thus to provide a unified scenario, which can significantly save sensor energy and enhance sensing data accuracy. In this paper, we propose a cluster-based data fusion algorithm for event detection. We use k-means algorithm to form the nodes into clusters, which can signifi...

  14. Chemical event tracking using a low-cost wireless chemical sensing network

    OpenAIRE

    Beirne, Stephen; Corcoran, Brian; Lau, King-Tong; Diamond, Dermot

    2008-01-01

    A recently developed low-cost light emitting diode (LED) chemical sensing technique is integrated with a Mica2Dot wireless communications platform to form a deployable wireless chemical event indicator network. The operation of the colorimetric sensing node has been evaluated to determine its reproducibility and limit of detection for an acidic airborne contaminant. A test-scale network of five similar chemical sensing nodes is deployed in a star communication topology at fixed points withi...

  15. Automatic reaction to a chemical event detected by a low-cost wireless chemical sensing network

    OpenAIRE

    Beirne, Stephen; Lau, King-Tong; Corcoran, Brian; Diamond, Dermot

    2009-01-01

    A test-scale wireless chemical sensor network (WCSN) has been deployed within a controlled Environmental Chamber (EC). The combined signals from the WCSN were used to initiate a controllable response to the detected chemical event. When a particular sensor response pattern was obtained, a purging cycle was initiated. Sensor data were continuously checked against user-defined action limits, to determine if a chemical event had occurred. An acidic contaminant was used to demonstrate the respons...

  16. Event-triggered H∞ reliable control for offshore structures in network environments

    Science.gov (United States)

    Zhang, Bao-Lin; Han, Qing-Long; Zhang, Xian-Ming

    2016-04-01

    This paper investigates the network-based modeling and event-triggered H∞ reliable control for an offshore structure. First, a network-based model of the offshore structure subject to external wave force and actuator faults is presented. Second, an event-triggering mechanism is proposed such that during the control implementation, only requisite sampled-data is transmitted over networks. Third, an event-triggered H∞ reliable control problem for the offshore structure is solved by employing the Lyapunov-Krasovskii functional approach, and the desired controller can be derived. It is shown through simulation results that for possible actuator failures, the networked controller is capable of guaranteeing the stability of the offshore structure. In addition, compared with the H∞ control scheme without network settings, the proposed controller can suppress the vibration of the offshore structure to almost the same level as the H∞ controller, while the former requires less control cost. Furthermore, under the network-based controller, the communication resources can be saved significantly.

  17. An Efficient Parallel Strategy for Data Forwarding in Event Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Itu Snigdh

    2012-06-01

    Full Text Available An event driven wireless sensor network is characterized by itsefficiency in detecting any anomaly and promptly informing thebase station within the real time constraints. Balanced TreeGeneration is a very common means in Wireless Sensor Networks tobalance the load of the sensors so that the energy usage of each nodeis almost equal and the average lifetime of the network is increased.But it is not effective in reducing the average response time of anevent. Here we propose a novel algorithm to reduce the responsetime by implementing the balanced tree structure with paralleltransmissions. Simulation results show that using this algorithmalong with data aggregation reduces the simulation timeconsiderably.

  18. Location Accuracy of the China National Seismograph Network Estimated by Repeating Events

    Institute of Scientific and Technical Information of China (English)

    Jiang Changsheng; Wu Zhongliang

    2006-01-01

    Regionalized location accuracy of the China National Seismograph Network was estimated using the results obtained by studying "repeating earthquakes" or "doublets" in and around China by Schaffand Richards (2004). It is assumed that the "repeating events" or "doublets" are separated by no more than 1 km, and the network measured apparent distance X of "doublets"indicates the order of magnitudes of the location error. It is observed that the average location accuracy of the China National Seismograph Network, as represented by average X value, is in the order of magnitudes of 10km, and is larger in the Qinghai-Xizang (Tibet) Plateau, western and northern Xinjiang, and eastern Inner Mongolia.

  19. Life-Course Events, Social Networks, and the Emergence of Violence among Female Gang Members

    Science.gov (United States)

    Fleisher, Mark S.; Krienert, Jessie L.

    2004-01-01

    Using data gathered from a multi-year field study, this article identifies specific life-course events shared by gang-affiliated women. Gangs emerge as a cultural adaptation or pro-social community response to poverty and racial isolation. Through the use of a social-network approach, data show that violence dramatically increases in the period…

  20. Event-triggered asynchronous intermittent communication strategy for synchronization in complex dynamical networks.

    Science.gov (United States)

    Li, Huaqing; Liao, Xiaofeng; Chen, Guo; Hill, David J; Dong, Zhaoyang; Huang, Tingwen

    2015-06-01

    This paper presents a new framework for synchronization of complex network by introducing a mechanism of event-triggering distributed sampling information. A kind of event which avoids continuous communication between neighboring nodes is designed to drive the controller update of each node. The advantage of the event-triggering strategy is the significant decrease of the number of controller updates for synchronization task of complex networks involving embedded microprocessors with limited on-board resources. To describe the system's ability reaching synchronization, a concept about generalized algebraic connectivity is introduced for strongly connected networks and then extended to the strongly connected components of the directed network containing a directed spanning tree. Two sufficient conditions are presented to reveal the underlying relationships of corresponding parameters to reach global synchronization based on algebraic graph, matrix theory and Lyapunov control method. A positive lower bound for inter-event times is derived to guarantee the absence of Zeno behavior. Finally, a numerical simulation example is provided to demonstrate the theoretical results.

  1. Event classification with the electronic detectors of the OPERA experiment using neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Hierholzer, Martin C.

    2012-02-15

    The OPERA experiment searches for {nu}{sub {mu}} <-> {nu}{sub {tau}} oscillations in appearance mode. It uses the emulsion cloud chamber (ECC) technique for a high spatial resolution combined with on-line components for event localisation and muon identification. The analysis of events in an ECC detector takes considerable time, especially in case of {nu}{sub {tau}}/{nu}{sub e} candidate events. A ranking of events by a probability for being a {nu}{sub {tau}}/{nu}{sub e} event can speed up the analysis of the OPERA experiment. An algorithm for such an event ranking based on a classification-type neural network is presented in this thesis. Almost all candidate events can be found within the first 30% of the analysed events if the described ranking is applied. This event ranking is currently applied for testing purposes by the OPERA collaboration, a decision on a full application for the whole analysis is pending. A similar neural network is used for discrimination between neutral and charged current events. This is used to observe neutrino oscillations in disappearance mode with the on-line components of the OPERA detector by measuring the energy dependence of the fraction of neutral current interactions. The confidence level of the observed oscillation effect is 87%. Assuming full mixing, the mass splitting has been determined to vertical stroke {delta}m{sup 2}{sub 32} vertical stroke =2.8{sub -1.7}{sup +1.4}.10{sup -3}eV{sup 2}.

  2. Sequence similarity network reveals the imprints of major diversification events in the evolution of microbial life

    Directory of Open Access Journals (Sweden)

    Shu eCheng

    2014-11-01

    Full Text Available Ancient transitions, such as between life that evolved in a reducing versus an oxidizing atmosphere precipitated by the Great Oxygenation Event (GOE ca. 2.4 billion years ago, fundamentally altered the space in which prokaryotes could derive metabolic energy. Despite fundamental changes in Earth’s redox state, there are very few comprehensive, proteome-wide analyses about the effects of these changes on gene content and evolution. Here, using a pan-proteome sequence similarity network applied to broadly sampled lifestyles of 84 prokaryotes that were categorized into four different redox groups (i.e., methanogens, obligate anaerobes, facultative anaerobes, and obligate aerobes, we reconstructed the genetic inventory of major respiratory communities. We show that a set of putative core homologs that is highly conserved in prokaryotic proteomes is characterized by the loss of canonical network connections and low conductance that correlates with differences in respiratory phenotypes. We suggest these different network patterns observed for different respiratory communities could be explained by two major evolutionary diversification events in the history of microbial life. The first event (M is a divergence between methanogenesis and other anaerobic lifestyles in prokaryotes (archaebacteria and eubacteria. The second diversification event (OX is from anaerobic to aerobic lifestyles that left a proteome-wide footprint among prokaryotes. Additional analyses revealed that oxidoreductase evolution played a central role in these two diversification events. Distinct cofactor binding domains were frequently recombined, allowing these enzymes to utilize increasingly oxidized substrates with high specificity.

  3. A Discrete Event Modeling and Simulation of Wave Division Multiplexing Unidirectional Slotted Ring Metropolitan Area Network

    Directory of Open Access Journals (Sweden)

    H. A. Fua’ad

    2009-01-01

    Full Text Available Problem statement: The lack of uniformity in the choice of simulation platforms for optical WDM networks stands behind the difficulty of developing a common simulation environment. Correlating WDM unidirectional slotted ring network to Discrete Event Simulation (DES encompassing event definition, time advancing mechanism and scheduler has yet to be developed. Approach: The study focused on the proposed and the development of an event based discrete simulator for the WDM unidirectional slotted ring network to facilitate the reuse of the protocol modules under a common simulation environment. The proposed network architecture implemented for the developed simulator employs a separate wavelength as the control information channel. This control information enabled the nodes to monitor their access to the transmission media. Each node was equipped with a tunable transmitter and fixed receiver for data communication. Access nodes were equipped with a fixed transmitter and fixed receiver for the control information exchange. The developed simulator had derived the use of dividing the wavelength into slots. Nodes used these slots to transmit fixed size packets. Slots can be reused by the access node after receiving packets by the deployment of the spatial reuse scheme, thus enhancing the bandwidth utilization. The developed simulator had derived the set of the parameters, events, performance metrics and other unique WDM simulator elements according to a detailed analysis of the base model. Results: The network delay and packet loss were investigated and compared to a benchmark of the modeled domain. Successful deployment of the developed simulator was proven by the generated results. Conclusion: Extensive performance analysis of WDM unidirectional slotted ring network can be deployed using the developed simulator with low computational overheads. Further enhancements were to extend the developed simulator for bidirectional slotted ring supporting

  4. Discrete Event Modeling and Simulation-Driven Engineering for the ATLAS Data Acquisition Network

    CERN Document Server

    Bonaventura, Matias Alejandro; The ATLAS collaboration; Castro, Rodrigo Daniel

    2016-01-01

    We present an iterative and incremental development methodology for simulation models in network engineering projects. Driven by the DEVS (Discrete Event Systems Specification) formal framework for modeling and simulation we assist network design, test, analysis and optimization processes. A practical application of the methodology is presented for a case study in the ATLAS particle physics detector, the largest scientific experiment built by man where scientists around the globe search for answers about the origins of the universe. The ATLAS data network convey real-time information produced by physics detectors as beams of particles collide. The produced sub-atomic evidences must be filtered and recorded for further offline scrutiny. Due to the criticality of the transported data, networks and applications undergo careful engineering processes with stringent quality of service requirements. A tight project schedule imposes time pressure on design decisions, while rapid technology evolution widens the palett...

  5. A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distributed Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muktikanta Sa, Manas Ranjan Nayak & Amiya Kumar Rath

    2011-08-01

    Full Text Available Wireless Sensor networks (WSN is a promising technology for current as well asfuture. There is vast use of WSN in different fields like military surveillance andtarget tracking, traffic management, weather forecasting, habitat monitoring,designing smart home, structural and seismic monitoring, etc. For successapplication of ubiquitous WSN it is important to maintain the basic security, bothfrom external and internal attacks else entire network may collapse. Maintainingsecurity in WSN network is not a simple job just like securing wireless networksbecause sensor nodes are deployed in randomize manner. Hence majorchallenges in WSN are security. In this paper we have discussed differentattacks in WSN and how these attacks are efficiently detected by using our agentbased model. Our model identifies the abnormal event pattern sensor nodes in alargely deployed distributed sensor network under a common anomaly detectionframework which will be designed by agent based learning and distributed datamining technique.

  6. Using a Deep Understanding of Network Activities for Security Event Management

    Directory of Open Access Journals (Sweden)

    Mona Lange

    2016-05-01

    Full Text Available With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs, intrusion detection systems (IDSs or intrusion prevention systems (IPSs are collected throughout a monitored network such that large series of alerts (alert streams need to be fused. An alert indicates an abnormal behavior, which could potentially be a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators cannot manage the large number of alerts occurring per second, in particular since most alerts are false positives. Hence, an emerging track of security research has focused on alert correlation to better identify true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis (MONA. This method builds on data correlation to derive network dependencies and manage security events by linking incoming alerts to network dependencies.

  7. Energy Efficient Event Driven Data Reporting System for Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hemappa B.

    2012-05-01

    Full Text Available Power conservation is important in sensor devices since battery life is usually one of the critical components in extending the life time of the sensor network. Cluster technology that enables a group ofsensor working closely to form a single cluster head, has been a booming research field in sensor network. When cluster heads cooperate with each other to forward their data to the base station, the cluster heads closer to the base station are burdened with heavy relay traffic and tend to die early, leaving areas of the network uncovered and causing network partition. To address the problem, we propose an event driven packet processing and redundant data eradication using in-network data processing before communicating such data to cluster head or sink. The network nodes are assumed to generate periodic data packets that are reported to the destination via multi hop or single hop routing based on distance to the cluster head. The theoretical analysis and the simulation results reveal that our data reporting and routing schemes reduces the transmission loss and increase the network life time.

  8. A novel decentralised event-triggered ? control for network control systems with communication delays

    Science.gov (United States)

    Li, Fuqiang; Fu, Jingqi; Du, Dajun

    2016-10-01

    This paper studies a novel decentralised event-triggered ? control for network control systems with communication delays and external disturbances. To overcome the drawbacks that the relative event-triggered mechanism (ETM) generates many events when system is close to the origin and the absolute ETM produces many events when system is far away from the origin, a novel decentralised sampled-data-based ETM is first proposed. By using both local state-dependent and state-independent information, the decentralised ETM can effectively reduce network loads in each channel during the whole operation time. Then, a novel general system model with parameters of the decentralised ETM, communication delays and external disturbances is presented, and sufficient conditions for the ultimately bounded stability and asymptotic stability of the closed-loop system are obtained. Specially, the quantitative relationship between the boundness of the stability region and the parameters of the decentralised ETM is established. Moreover, to overcome the inconvenience of the two-step design method that controllers are required to be given a priori, a co-design scheme is presented to design the decentralised event generators and the output-based controller simultaneously. Finally, numerical examples confirm the effectiveness of the proposed method.

  9. Distributed Detection/Isolation Procedures for Quickest Event Detection in Large Extent Wireless Sensor Networks

    CERN Document Server

    Karumbu, Premkumar; Kuri, Joy

    2011-01-01

    We study a problem of distributed detection of an event in a large extent wireless sensor network ($\\wsn$), where the event influences the observations of the sensors only in the vicinity of where it occurs. An event occurs at a random time and at a random location in the coverage region (or region of interest ($\\roi$)) of the $\\wsn$. We consider a general sensing model in which the effect of the event at a sensor node depends on the distance between the event and the sensor node; in particular, in the Boolean sensing model, all sensors in a disk of a given radius around the event are equally affected. Motivated by the change detection/isolation framework introduced by Nikiforov \\cite{nikiforov95change_isolation}, we formulate {\\em the problem of detecting the event and locating it to a subregion of the {\\sf ROI} as early as possible (based on the local decisions at the sensor nodes) under the constraints that the mean time to false alarm and the mean time to false isolation are bounded from below by $\\gamma$...

  10. Minimizing cache misses in an event-driven network server: A case study of TUX

    DEFF Research Database (Denmark)

    Bhatia, Sapan; Consel, Charles; Lawall, Julia Laetitia

    2006-01-01

    We analyze the performance of CPU-bound network servers and demonstrate experimentally that the degradation in the performance of these servers under high-concurrency workloads is largely due to inefficient use of the hardware caches. We then describe an approach to speeding up event-driven network...... servers by optimizing their use of the L2 CPU cache in the context of the TUX Web server, known for its robustness to heavy load. Our approach is based on a novel cache-aware memory allocator and a specific scheduling strategy that together ensure that the total working data set of the server stays...

  11. Congestion and Flow Control in Homogeneous and Heterogeneous Networks: Discrete Event Simulation Model

    Directory of Open Access Journals (Sweden)

    Ajay Kumar

    2007-07-01

    Full Text Available This Paper provides a study and review of existing congestion control algorithms in various types of homogenous and heterogeneous networks. To test the new methodology for the congestion and flow control we have used the two different discrete event simulation tools. The OPNET simulation tool is used to find out performance of the TCP reliable protocol for built-in congestion control mechanism. The second part is for simulation of existing congestion control algorithm (AIMD-Additive Increase Multiplicative Decrease and new suggested congestion and flow control algorithm using OMNeT++ discrete event simulation.

  12. The participation of Interactors in Social Network Sites as a News Event Dimension

    Directory of Open Access Journals (Sweden)

    Gabriela da Silva Zago

    2013-07-01

    Full Text Available Normal 0 21 false false false MicrosoftInternetExplorer4 The article discusses the possibility of considering the participation of interactors in social network sites as a news event dimension, to the extent that, by the recirculation, interactors can assign different and unexpected meanings to the event. We take as a starting point for the discussion, in an exploratory nature, the inauguration of the first stretch of the bike path from the Avenida Ipiranga, in Porto Alegre, Brazil, in May 2012.

  13. Seismic network detection probability assessment using waveforms and accounting to event association logic

    Science.gov (United States)

    Pinsky, Vladimir; Shapira, Avi

    2016-05-01

    The geographical area where a seismic event of magnitude M ≥ M t is detected by a seismic station network, for a defined probability is derived from a station probability of detection estimated as a function of epicentral distance. The latter is determined from both the bulletin data and the waveforms recorded by the station during the occurrence of the event with and without band-pass filtering. For simulating the real detection process, the waveforms are processed using the conventional Carl Johnson detection and association algorithm. The attempt is presented to account for the association time criterion in addition to the conventional approach adopted by the known PMC method.

  14. Robust finite-time event-triggered H∞ boundedness for network-based Markovian jump nonlinear systems.

    Science.gov (United States)

    Zhang, Honglu; Cheng, Jun; Wang, Hailing; Chen, Yiping; Xiang, Huili

    2016-07-01

    This paper investigates the problem of finite-time event-triggered H∞ boundedness for network-based Markovian jump nonlinear system. An improved model is introduced in terms of network-induced delay. By synthesizing the newly event-triggering conditions, the finite-time H∞ boundedness for networked Markovian jump nonlinear systems are guaranteed. At last, a numerical example is given to illustrate the effectiveness of proposed theoretical results.

  15. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network

    Science.gov (United States)

    Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users. PMID:27367610

  16. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Science.gov (United States)

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  17. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Science.gov (United States)

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users. PMID:27367610

  18. Events

    Directory of Open Access Journals (Sweden)

    Igor V. Karyakin

    2016-02-01

    Full Text Available The 9th ARRCN Symposium 2015 was held during 21st–25th October 2015 at the Novotel Hotel, Chumphon, Thailand, one of the most favored travel destinations in Asia. The 10th ARRCN Symposium 2017 will be held during October 2017 in the Davao, Philippines. International Symposium on the Montagu's Harrier (Circus pygargus «The Montagu's Harrier in Europe. Status. Threats. Protection», organized by the environmental organization «Landesbund für Vogelschutz in Bayern e.V.» (LBV was held on November 20-22, 2015 in Germany. The location of this event was the city of Wurzburg in Bavaria.

  19. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  20. Anomaly Event Detection Method Based on Compressive Sensing and Iteration in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shihua Cao

    2014-03-01

    Full Text Available Anomaly event detection is one of the research hotspots in wireless sensor networks. Aiming at the disadvantages of current detection solutions, a novel anomaly event detection algorithm based on compressed sensing and iteration is proposed. Firstly, a measured value can be sensed in each node, based on the compressed sensing. Then the problem of anomaly event detection is modeled as the minimization problem of weighted l1 norm, and OMP algorithm is adopted for solving the problem iteratively. And then the result of problem solving is judged according to detection functions. Finally, in the light of the judgment results, the weight value is updated for beginning a new round iteration. The loop won't stop until all the anomaly events are detected in wireless sensor networks. Simulation experimental results show the proposed algorithm has a better omission detection rate and false alarm rate in different noisy environments. In addition, the detection quality of this algorithm is higher than those of the traditional ones.

  1. Consensus analysis of networks with time-varying topology and event-triggered diffusions.

    Science.gov (United States)

    Han, Yujuan; Lu, Wenlian; Chen, Tianping

    2015-11-01

    This paper studies the consensus problem of networks with time-varying topology. Event-triggered rules are employed in diffusion coupling terms to reduce the updating load of the coupled system. Two strategies are considered: event-triggered strategy, that each node observes the state information in an instantaneous way, to determine the next triggering event time, and self-triggered strategy, that each node only needs to observe the state information at the event time to predict the next triggering event time. In each strategy, two kinds of algorithms are considered: the pull-based algorithm, that the diffusion coupling term of every node is updated at the latest observations of the neighborhood at its triggered time, and push-based algorithm, the diffusion coupling term of every node uses the state information of its neighborhood at their latest triggered time. It is proved that if the coupling matrix across time intervals with length less than some given constant has spanning trees, then the proposed algorithms can realize consensus. Examples with numerical simulation are provided to show the effectiveness of the theoretical results.

  2. Words analysis of online Chinese news headlines about trending events: a complex network perspective.

    Science.gov (United States)

    Li, Huajiao; Fang, Wei; An, Haizhong; Huang, Xuan

    2015-01-01

    Because the volume of information available online is growing at breakneck speed, keeping up with meaning and information communicated by the media and netizens is a new challenge both for scholars and for companies who must address public relations crises. Most current theories and tools are directed at identifying one website or one piece of online news and do not attempt to develop a rapid understanding of all websites and all news covering one topic. This paper represents an effort to integrate statistics, word segmentation, complex networks and visualization to analyze headlines' keywords and words relationships in online Chinese news using two samples: the 2011 Bohai Bay oil spill and the 2010 Gulf of Mexico oil spill. We gathered all the news headlines concerning the two trending events in the search results from Baidu, the most popular Chinese search engine. We used Simple Chinese Word Segmentation to segment all the headlines into words and then took words as nodes and considered adjacent relations as edges to construct word networks both using the whole sample and at the monthly level. Finally, we develop an integrated mechanism to analyze the features of words' networks based on news headlines that can account for all the keywords in the news about a particular event and therefore track the evolution of news deeply and rapidly. PMID:25807376

  3. Words analysis of online Chinese news headlines about trending events: a complex network perspective.

    Directory of Open Access Journals (Sweden)

    Huajiao Li

    Full Text Available Because the volume of information available online is growing at breakneck speed, keeping up with meaning and information communicated by the media and netizens is a new challenge both for scholars and for companies who must address public relations crises. Most current theories and tools are directed at identifying one website or one piece of online news and do not attempt to develop a rapid understanding of all websites and all news covering one topic. This paper represents an effort to integrate statistics, word segmentation, complex networks and visualization to analyze headlines' keywords and words relationships in online Chinese news using two samples: the 2011 Bohai Bay oil spill and the 2010 Gulf of Mexico oil spill. We gathered all the news headlines concerning the two trending events in the search results from Baidu, the most popular Chinese search engine. We used Simple Chinese Word Segmentation to segment all the headlines into words and then took words as nodes and considered adjacent relations as edges to construct word networks both using the whole sample and at the monthly level. Finally, we develop an integrated mechanism to analyze the features of words' networks based on news headlines that can account for all the keywords in the news about a particular event and therefore track the evolution of news deeply and rapidly.

  4. A Cluster-Based Fuzzy Fusion Algorithm for Event Detection in Heterogeneous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    ZiQi Hao

    2015-01-01

    Full Text Available As limited energy is one of the tough challenges in wireless sensor networks (WSN, energy saving becomes important in increasing the lifecycle of the network. Data fusion enables combining information from several sources thus to provide a unified scenario, which can significantly save sensor energy and enhance sensing data accuracy. In this paper, we propose a cluster-based data fusion algorithm for event detection. We use k-means algorithm to form the nodes into clusters, which can significantly reduce the energy consumption of intracluster communication. Distances between cluster heads and event and energy of clusters are fuzzified, thus to use a fuzzy logic to select the clusters that will participate in data uploading and fusion. Fuzzy logic method is also used by cluster heads for local decision, and then the local decision results are sent to the base station. Decision-level fusion for final decision of event is performed by base station according to the uploaded local decisions and fusion support degree of clusters calculated by fuzzy logic method. The effectiveness of this algorithm is demonstrated by simulation results.

  5. Energy–Efficient Sleep Scheduling For Critical Event Monitoring To Improve Performanceof Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yogesh Y. Shinde,

    2014-04-01

    Full Text Available A sensor networked applications can be formed for critical applications where it could send the detected information to the user or to the other sink node. This message is often called as alarm message where it is indicating the current operational state of the system. An alarm needs to be broadcast to the other nodes as soon as possible,when a critical event (e.g., gas leak or fire occurs in the monitoring area and is detected by a sensor node, then, sensor nodes can inform users nearby to take some response to the event. The life of sensor nodes for event monitoring are expected to work for a long time without recharging their batteries, sleep scheduling method is always preferred during the monitoring process. Sleep scheduling could cause transmission delay because sender nodes should wait until receiver nodes are active and ready to receive the message. The delay could be important as the network scale increases. Hence, a delay-efficient sleep scheduling method needs to be designed to ensure low broadcasting delay from any node in the WSN.

  6. Energy efficient data representation and aggregation with event region detection in wireless sensor networks

    Science.gov (United States)

    Banerjee, Torsha

    Unlike conventional networks, wireless sensor networks (WSNs) are limited in power, have much smaller memory buffers, and possess relatively slower processing speeds. These characteristics necessitate minimum transfer and storage of information in order to prolong the network lifetime. In this dissertation, we exploit the spatio-temporal nature of sensor data to approximate the current values of the sensors based on readings obtained from neighboring sensors and itself. We propose a Tree based polynomial REGression algorithm, (TREG) that addresses the problem of data compression in wireless sensor networks. Instead of aggregated data, a polynomial function (P) is computed by the regression function, TREG. The coefficients of P are then passed to achieve the following goals: (i) The sink can get attribute values in the regions devoid of sensor nodes, and (ii) Readings over any portion of the region can be obtained at one time by querying the root of the tree. As the size of the data packet from each tree node to its parent remains constant, the proposed scheme scales very well with growing network density or increased coverage area. Since physical attributes exhibit a gradual change over time, we propose an iterative scheme, UPDATE_COEFF, which obviates the need to perform the regression function repeatedly and uses approximations based on previous readings. Extensive simulations are performed on real world data to demonstrate the effectiveness of our proposed aggregation algorithm, TREG. Results reveal that for a network density of 0.0025 nodes/m2, a complete binary tree of depth 4 could provide the absolute error to be less than 6%. A data compression ratio of about 0.02 is achieved using our proposed algorithm, which is almost independent of the tree depth. In addition, our proposed updating scheme makes the aggregation process faster while maintaining the desired error bounds. We also propose a Polynomial-based scheme that addresses the problem of Event Region

  7. Networks of Recurrent Events, a Theory of Records, and an Application to Finding Causal Signatures in Seismicity

    CERN Document Server

    Davidsen, J; Paczuski, M

    2007-01-01

    We propose a method to search for signs of causal structure in spatiotemporal data making minimal a priori assumptions about the underlying dynamics. To this end, we generalize the elementary concept of recurrence for a point process in time to recurrent events in space and time. An event is defined to be a recurrence of any previous event if it is closer to it in space than all the intervening events. As such, each sequence of recurrences for a given event is a record breaking process. This definition provides a strictly data driven technique to search for structure. Defining events to be nodes, and linking each event to its recurrences, generates a network of recurrent events. Significant deviations in properties of that network compared to networks arising from random processes allows one to infer attributes of the causal dynamics that generate observable correlations in the patterns. We derive analytically a number of properties for the network of recurrent events composed by a random process. We extend t...

  8. The Waveform Correlation Event Detection System project, Phase II: Testing with the IDC primary network

    Energy Technology Data Exchange (ETDEWEB)

    Young, C.J.; Beiriger, J.I.; Moore, S.G. [and others

    1998-04-01

    Further improvements to the Waveform Correlation Event Detection System (WCEDS) developed by Sandia Laboratory have made it possible to test the system on the accepted Comprehensive Test Ban Treaty (CTBT) seismic monitoring network. For our test interval we selected a 24-hour period from December 1996, and chose to use the Reviewed Event Bulletin (REB) produced by the Prototype International Data Center (PIDC) as ground truth for evaluating the results. The network is heterogeneous, consisting of array and three-component sites, and as a result requires more flexible waveform processing algorithms than were available in the first version of the system. For simplicity and superior performance, we opted to use the spatial coherency algorithm of Wagner and Owens (1996) for both types of sites. Preliminary tests indicated that the existing version of WCEDS, which ignored directional information, could not achieve satisfactory detection or location performance for many of the smaller events in the REB, particularly those in the south Pacific where the network coverage is unusually sparse. To achieve an acceptable level of performance, we made modifications to include directional consistency checks for the correlations, making the regions of high correlation much less ambiguous. These checks require the production of continuous azimuth and slowness streams for each station, which is accomplished by means of FK processing for the arrays and power polarization processing for the three-component sites. In addition, we added the capability to use multiple frequency-banded data streams for each site to increase sensitivity to phases whose frequency content changes as a function of distance.

  9. Disentangling the Attention Network Test: Behavioral, Event Related Potentials and neural source analyses.

    Directory of Open Access Journals (Sweden)

    Alejandro eGalvao-Carmona

    2014-10-01

    Full Text Available Background. The study of the attentional system remains a challenge for current neuroscience. The Attention Network Test (ANT was designed to study simultaneously three different attentional networks (alerting, orienting and executive based in subtraction of different experimental conditions. However, some studies recommend caution with these calculations due to the interactions between the attentional networks. In particular, it is highly relevant that several interpretations about attentional impairment have arisen from these calculations in diverse pathologies. Event Related Potentials (ERPs and neural source analysis can be applied to disentangle the relationships between these attentional networks not specifically shown by behavioural measures. Results. This study shows that there is a basic level of alerting (tonic alerting in the no cue condition, represented by a slow negative trend in the ERP trace prior to the onset of the target stimuli. A progressive increase in the CNV amplitude related to the amount of information provided by the cue conditions is also shown. Neural source analysis reveals specific modulations of the CNV related to a task-related expectancy presented in the no cue condition; a late modulation triggered by the central cue condition and probably representing a generic motor preparation; and an early and late modulation for spatial cue condition suggesting specific motor and sensory preactivation. Finally, the first component in the information processing of the target stimuli modulated by the interaction between orienting network and the executive system can be represented by N1. Conclusions. The ANT is useful as a paradigm to study specific attentional mechanisms and their interactions. However, calculation of network effects is based in subtractions with non-comparable experimental conditions, as evidenced by the present data, which can induce misinterpretations in the study of the attentional capacity in human

  10. Enriching unstructured media content about events to enable semi-automated summaries, compilations, and improved search by leveraging social networks

    OpenAIRE

    Steiner, Thomas

    2014-01-01

    (i) Mobile devices and social networks are omnipresent Mobile devices such as smartphones, tablets, or digital cameras together with social networks enable people to create, share, and consume enormous amounts of media items like videos or photos both on the road or at home. Such mobile devices "by pure definition" accompany their owners almost wherever they may go. In consequence, mobile devices are omnipresent at all sorts of events to capture noteworthy moments. Exemplary events can be ...

  11. HOS network-based classification of power quality events via regression algorithms

    Science.gov (United States)

    Palomares Salas, José Carlos; González de la Rosa, Juan José; Sierra Fernández, José María; Pérez, Agustín Agüera

    2015-12-01

    This work compares seven regression algorithms implemented in artificial neural networks (ANNs) supported by 14 power-quality features, which are based in higher-order statistics. Combining time and frequency domain estimators to deal with non-stationary measurement sequences, the final goal of the system is the implementation in the future smart grid to guarantee compatibility between all equipment connected. The principal results are based in spectral kurtosis measurements, which easily adapt to the impulsive nature of the power quality events. These results verify that the proposed technique is capable of offering interesting results for power quality (PQ) disturbance classification. The best results are obtained using radial basis networks, generalized regression, and multilayer perceptron, mainly due to the non-linear nature of data.

  12. Events Determine Spreading Patterns: Information Transmission via Internal and External Influences on Social Networks

    CERN Document Server

    Liu, Chuang; Zhang, Zi-Ke; Sun, Gui-Quan; Hui, Pak Ming

    2015-01-01

    Recently, information transmission models motivated by the classical epidemic propagation, have been applied to a wide-range of social systems, generally assume that information mainly transmits among individuals via peer-to-peer interactions on social networks. In this paper, we consider one more approach for users to get information: the out-of-social-network influence. Empirical analyses of eight typical events' diffusion on a very large micro-blogging system, \\emph{Sina Weibo}, show that the external influence has significant impact on information spreading along with social activities. In addition, we propose a theoretical model to interpret the spreading process via both internal and external channels, considering three essential properties: (i) memory effect; (ii) role of spreaders; and (iii) non-redundancy of contacts. Experimental and mathematical results indicate that the information indeed spreads much quicker and broader with mutual effects of the internal and external influences. More importantly...

  13. Social Network Analysis Evaluating the Customers Influence Factor Over Business Events in TELCO

    Directory of Open Access Journals (Sweden)

    Carlos Andre Reis Pinheiro

    2010-10-01

    Full Text Available The telecommunication industry has evolved into a highly competitive market, which requires companiesto put an effective customer relation approach in place. In order to increase customer relationshipmanagement, social network analysis (SNA can be used to increase the knowledge related to thecustomers’ influence. SNA can improve relevant information that helps to increase the customerexperience. It can be used to evaluate the customers’ relations and therefore clarify distinguishingaspects about the internal communities inside the entire network, allowing companies to deploy a moreefficient action plan to better diffuse their products/services and avoid the customer’s churn. In this paperwe present an approach to evaluate the customer influence factor related to business events.

  14. [Analysis of policies in activating the Infectious Disease Specialist Network (IDSN) for bioterrorism events].

    Science.gov (United States)

    Kim, Yang Soo

    2008-07-01

    Bioterrorism events have worldwide impacts, not only in terms of security and public health policy, but also in other related sectors. Many countries, including Korea, have set up new administrative and operational structures and adapted their preparedness and response plans in order to deal with new kinds of threats. Korea has dual surveillance systems for the early detection of bioterrorism. The first is syndromic surveillance that typically monitors non-specific clinical information that may indicate possible bioterrorism-associated diseases before specific diagnoses are made. The other is infectious disease specialist network that diagnoses and responds to specific illnesses caused by intentional release of biologic agents. Infectious disease physicians, clinical microbiologists, and infection control professionals play critical and complementary roles in these networks. Infectious disease specialists should develop practical and realistic response plans for their institutions in partnership with local and state health departments, in preparation for a real or suspected bioterrorism attack.

  15. Social Network Analysis Evaluating the Customers Influence Factor Over Business Events in TELCO

    Directory of Open Access Journals (Sweden)

    Carlos Andre Reis Pinheiro

    2010-10-01

    Full Text Available The telecommunication industry has evolved into a highly competitive market, which requires companies to put an effective customer relation approach in place. In order to increase customer relationship management, social network analysis (SNA can be used to increase the knowledge related to the customers’ influence. SNA can improve relevant information that helps to increase the customer experience. It can be used to evaluate the customers’ relations and therefore clarify distinguishing aspects about the internal communities inside the entire network, allowing companies to deploy a more efficient action plan to better diffuse their products/services and avoid the customer’s churn. In this paper we present an approach to evaluate the customer influence factor related to business events.

  16. Digital Learning Network Education Events for the Desert Research and Technology Studies

    Science.gov (United States)

    Paul, Heather L.; Guillory, Erika R.

    2007-01-01

    NASA s Digital Learning Network (DLN) reaches out to thousands of students each year through video conferencing and webcasting. As part of NASA s Strategic Plan to reach the next generation of space explorers, the DLN develops and delivers educational programs that reinforce principles in the areas of science, technology, engineering and mathematics. The DLN has created a series of live education videoconferences connecting the Desert Research and Technology Studies (RATS) field test to students across the United States. The programs are also extended to students around the world via live webcasting. The primary focus of the events is the Vision for Space Exploration. During the programs, Desert RATS engineers and scientists inform and inspire students about the importance of exploration and share the importance of the field test as it correlates with plans to return to the Moon and explore Mars. This paper describes the events that took place in September 2006.

  17. Characterization of computer network events through simultaneous feature selection and clustering of intrusion alerts

    Science.gov (United States)

    Chen, Siyue; Leung, Henry; Dondo, Maxwell

    2014-05-01

    As computer network security threats increase, many organizations implement multiple Network Intrusion Detection Systems (NIDS) to maximize the likelihood of intrusion detection and provide a comprehensive understanding of intrusion activities. However, NIDS trigger a massive number of alerts on a daily basis. This can be overwhelming for computer network security analysts since it is a slow and tedious process to manually analyse each alert produced. Thus, automated and intelligent clustering of alerts is important to reveal the structural correlation of events by grouping alerts with common features. As the nature of computer network attacks, and therefore alerts, is not known in advance, unsupervised alert clustering is a promising approach to achieve this goal. We propose a joint optimization technique for feature selection and clustering to aggregate similar alerts and to reduce the number of alerts that analysts have to handle individually. More precisely, each identified feature is assigned a binary value, which reflects the feature's saliency. This value is treated as a hidden variable and incorporated into a likelihood function for clustering. Since computing the optimal solution of the likelihood function directly is analytically intractable, we use the Expectation-Maximisation (EM) algorithm to iteratively update the hidden variable and use it to maximize the expected likelihood. Our empirical results, using a labelled Defense Advanced Research Projects Agency (DARPA) 2000 reference dataset, show that the proposed method gives better results than the EM clustering without feature selection in terms of the clustering accuracy.

  18. How events determine spreading patterns: information transmission via internal and external influences on social networks

    Science.gov (United States)

    Liu, Chuang; Zhan, Xiu-Xiu; Zhang, Zi-Ke; Sun, Gui-Quan; Hui, Pak Ming

    2015-11-01

    Recently, information transmission models motivated by the classical epidemic propagation, have been applied to a wide-range of social systems, generally assume that information mainly transmits among individuals via peer-to-peer interactions on social networks. In this paper, we consider one more approach for users to get information: the out-of-social-network influence. Empirical analyzes of eight typical events’ diffusion on a very large micro-blogging system, Sina Weibo, show that the external influence has significant impact on information spreading along with social activities. In addition, we propose a theoretical model to interpret the spreading process via both internal and external channels, considering three essential properties: (i) memory effect; (ii) role of spreaders; and (iii) non-redundancy of contacts. Experimental and mathematical results indicate that the information indeed spreads much quicker and broader with mutual effects of the internal and external influences. More importantly, the present model reveals that the event characteristic would highly determine the essential spreading patterns once the network structure is established. The results may shed some light on the in-depth understanding of the underlying dynamics of information transmission on real social networks.

  19. Regional seismic event location with a sparse network: Application to eastern Kazakhstan, USSR

    Energy Technology Data Exchange (ETDEWEB)

    Thurber, C.; Given, H.; Berger, J.

    1989-12-10

    Three-component data from a sparse three-station seismic network in eastern Kazakhstan, surrounding the Soviet nuclear test site, were analyzed to determine location estimates for regional events recorded by two or three stations. Included among these events are the Sept. 1987 chemical explosions whose locations are known. Locations are calculated using arrival times of P and S phases and arrival azimuths from first P. Location uncertainties are estimated using a combination of a priori and a posteriori data uncertainties. A layered P wave velocity model adapted from Soviet Deep Seismic Sounding surveys is used for calculating travel times, and two S models are tried. Location results for the chemical explosions are excellent, even if only two stations are used: absolute location errors are less than 10 km, and estimated 90% confidence uncertainties are only a few kilometers. The data are also adequate to determine correctly their depth (i.e., focus at the surface). The other regional events include numerous suspected mine blasts and two earthquakes from the Tien Shan. The calculated locations of the latter events agree well with a teleseismic location for one of them, falling within a belt of regular seismic activity. Nearly all of the presumed blasts can be associated with mapped mines, and we have been able to identify the source areas for two sets of blasts in high-resolution satellite images.

  20. How activation, entanglement, and searching a semantic network contribute to event memory.

    Science.gov (United States)

    Nelson, Douglas L; Kitto, Kirsty; Galea, David; McEvoy, Cathy L; Bruza, Peter D

    2013-08-01

    Free-association norms indicate that words are organized into semantic/associative neighborhoods within a larger network of words and links that bind the net together. We present evidence indicating that memory for a recent word event can depend on implicitly and simultaneously activating related words in its neighborhood. Processing a word during encoding primes its network representation as a function of the density of the links in its neighborhood. Such priming increases recall and recognition and can have long-lasting effects when the word is processed in working memory. Evidence for this phenomenon is reviewed in extralist-cuing, primed free-association, intralist-cuing, and single-item recognition tasks. The findings also show that when a related word is presented in order to cue the recall of a studied word, the cue activates the target in an array of related words that distract and reduce the probability of the target's selection. The activation of the semantic network produces priming benefits during encoding, and search costs during retrieval. In extralist cuing, recall is a negative function of cue-to-distractor strength, and a positive function of neighborhood density, cue-to-target strength, and target-to-cue strength. We show how these four measures derived from the network can be combined and used to predict memory performance. These measures play different roles in different tasks, indicating that the contribution of the semantic network varies with the context provided by the task. Finally, we evaluate spreading-activation and quantum-like entanglement explanations for the priming effects produced by neighborhood density.

  1. Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network

    Science.gov (United States)

    Kuhn, D. Richard; Kacker, Raghu; Lei, Yu

    2010-01-01

    This study compared random and t-way combinatorial inputs of a network simulator, to determine if these two approaches produce significantly different deadlock detection for varying network configurations. Modeling deadlock detection is important for analyzing configuration changes that could inadvertently degrade network operations, or to determine modifications that could be made by attackers to deliberately induce deadlock. Discrete event simulation of a network may be conducted using random generation, of inputs. In this study, we compare random with combinatorial generation of inputs. Combinatorial (or t-way) testing requires every combination of any t parameter values to be covered by at least one test. Combinatorial methods can be highly effective because empirical data suggest that nearly all failures involve the interaction of a small number of parameters (1 to 6). Thus, for example, if all deadlocks involve at most 5-way interactions between n parameters, then exhaustive testing of all n-way interactions adds no additional information that would not be obtained by testing all 5-way interactions. While the maximum degree of interaction between parameters involved in the deadlocks clearly cannot be known in advance, covering all t-way interactions may be more efficient than using random generation of inputs. In this study we tested this hypothesis for t = 2, 3, and 4 for deadlock detection in a network simulation. Achieving the same degree of coverage provided by 4-way tests would have required approximately 3.2 times as many random tests; thus combinatorial methods were more efficient for detecting deadlocks involving a higher degree of interactions. The paper reviews explanations for these results and implications for modeling and simulation.

  2. Source Space Analysis of Event-Related Dynamic Reorganization of Brain Networks

    Directory of Open Access Journals (Sweden)

    Andreas A. Ioannides

    2012-01-01

    Full Text Available How the brain works is nowadays synonymous with how different parts of the brain work together and the derivation of mathematical descriptions for the functional connectivity patterns that can be objectively derived from data of different neuroimaging techniques. In most cases static networks are studied, often relying on resting state recordings. Here, we present a quantitative study of dynamic reconfiguration of connectivity for event-related experiments. Our motivation is the development of a methodology that can be used for personalized monitoring of brain activity. In line with this motivation, we use data with visual stimuli from a typical subject that participated in different experiments that were previously analyzed with traditional methods. The earlier studies identified well-defined changes in specific brain areas at specific latencies related to attention, properties of stimuli, and tasks demands. Using a recently introduced methodology, we track the event-related changes in network organization, at source space level, thus providing a more global and complete view of the stages of processing associated with the regional changes in activity. The results suggest the time evolving modularity as an additional brain code that is accessible with noninvasive means and hence available for personalized monitoring and clinical applications.

  3. Inferring the correlation between lightning events and voltage dips in distribution networks

    Energy Technology Data Exchange (ETDEWEB)

    Nucci, C.A. [University of Bologna (Italy)], E-mail: carloalberto.nucci@unibo.it

    2007-07-01

    To appropriately infer the correlation between lightning events and flashover/voltage dips on real distribution networks, data coming from lightning location systems are certainly needed, but need to be complemented on the one hand by data coming from distributed measurement systems able to record both protection manoeuvres and lightning-originated transients, and on the other hand by accurate calculation results. Additionally, the analysis needs to be performed on a statistical basis. The paper illustrates the main concepts used in developing a procedure aimed at inferring the above mentioned correlation, which is based on the integrated use of experimental data obtained from the Italian lightning location system CESI-SIRF, a monitoring system of relay operation, a distributed monitoring system of lightning-induced transients and of calculations performed using the LIOV-EMTP code. The application of the procedure to the portion of a real distribution network located in Italy in a high level keraunic area is presented by making use of some CESI-SIRF-detected events. (author)

  4. The First Documented Space Weather Event That Perturbed the Communication Networks in Iberia

    Science.gov (United States)

    Ribeiro, P.; Vaquero, J. M.; Gallego, M. C.; Trigo, R. M.

    2016-07-01

    In this work, we review the first space weather event that affected significantly a number of communication networks in the Iberian Peninsula (Southwest of Europe). The event took place on 31 October 1903, during the ascending phase of solar cycle 14 (the lowest since the Dalton Minimum). We describe the widespread problems that occurred in the telegraph communication network in two midlatitude countries (Portugal and Spain), that was practically interrupted from 09 h30 to 21 h00 UT. Different impacts on the telegraphic communication are described and shown to be dependent on the large-scale orientation of the wires. In order to put these results into a wider context we provide measurements of the concurrent geomagnetic field that are available from the observatories of Coimbra (Portugal) and San Fernando (Spain). The measurements confirm the simultaneous occurrence of large geomagnetic disturbances. In particular, the magnetograms recorded in Coimbra show a clear and large amplitude storm sudden commencement around 05 h30. The main phase, with a H (horizontal component of geomagnetic field) maximum range of ~500 nT, started approximately 1 h later and lasted for almost 10 h, suggesting that the interplanetary magnetic field was strongly southward for long time.

  5. A community-based event delivery protocol in publish/subscribe systems for delay tolerant sensor networks.

    Science.gov (United States)

    Liu, Nianbo; Liu, Ming; Zhu, Jinqi; Gong, Haigang

    2009-01-01

    The basic operation of a Delay Tolerant Sensor Network (DTSN) is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extension of Pub/Sub systems in DTSNs has become a promising research topic. However, due to the unique frequent partitioning characteristic of DTSNs, extension of a Pub/Sub system in a DTSN is a considerably difficult and challenging problem, and there are no good solutions to this problem in published works. To ad apt Pub/Sub systems to DTSNs, we propose CED, a community-based event delivery protocol. In our design, event delivery is based on several unchanged communities, which are formed by sensor nodes in the network according to their connectivity. CED consists of two components: event delivery and queue management. In event delivery, events in a community are delivered to mobile subscribers once a subscriber comes into the community, for improving the data delivery ratio. The queue management employs both the event successful delivery time and the event survival time to decide whether an event should be delivered or dropped for minimizing the transmission overhead. The effectiveness of CED is demonstrated through comprehensive simulation studies.

  6. A Community-Based Event Delivery Protocol in Publish/Subscribe Systems for Delay Tolerant Sensor Networks

    Directory of Open Access Journals (Sweden)

    Haigang Gong

    2009-09-01

    Full Text Available The basic operation of a Delay Tolerant Sensor Network (DTSN is to finish pervasive data gathering in networks with intermittent connectivity, while the publish/subscribe (Pub/Sub for short paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extension of Pub/Sub systems in DTSNs has become a promising research topic. However, due to the unique frequent partitioning characteristic of DTSNs, extension of a Pub/Sub system in a DTSN is a considerably difficult and challenging problem, and there are no good solutions to this problem in published works. To ad apt Pub/Sub systems to DTSNs, we propose CED, a community-based event delivery protocol. In our design, event delivery is based on several unchanged communities, which are formed by sensor nodes in the network according to their connectivity. CED consists of two components: event delivery and queue management. In event delivery, events in a community are delivered to mobile subscribers once a subscriber comes into the community, for improving the data delivery ratio. The queue management employs both the event successful delivery time and the event survival time to decide whether an event should be delivered or dropped for minimizing the transmission overhead. The effectiveness of CED is demonstrated through comprehensive simulation studies.

  7. Statistical Patterns of Triggered Landslide Events and their Application to Road Networks

    Science.gov (United States)

    Taylor, Faith E.; Malamud, Bruce D.; Santangelo, Michele; Marchesini, Ivan; Guzzetti, Fausto

    2015-04-01

    In the minutes to weeks after a landslide trigger such as an earthquake or heavy rainfall, as part of a triggered landslide event, one individual to tens of thousands of landslides may occur across a region. If in the region, one or more roads become blocked by landslides, this can cause extensive detours and delay rescue and recovery operations. In this paper, we show the development, application and confrontation with real data of a model to simulate triggered landslide events and their impacts upon road networks. This is done by creating a 'synthetic' triggered landslide event inventory by randomly sampling landslide areas and shapes from already established statistical distributions. These landslides are then semi-randomly dropped across a given study region, conditioned by that region's landslide susceptibility. The resulting synthetic triggered landslide event inventory is overlaid with the region's road network map and the number, size, location and network impact of road blockages and landslides near roads calculated. This process is repeated hundreds of times in a Monte Carlo type simulation. The statistical distributions and approaches used in the model are thought to be generally applicable for low-mobility triggered landslides in many medium to high-topography regions throughout the world. The only local data required to run the model are a road network map, a landslide susceptibility map, a map of the study area boundary and a digital elevation model. Coupled with an Open Source modelling approach (in GRASS-GIS), this model may be applied to many regions where triggered landslide events are an issue. We present model results and confrontation with observed data for two study regions where the model has been applied: Collazzone (Central Italy) where rapid snowmelt triggered 413 landslides in January 1997 and Oat Mountain (Northridge, USA), where the Northridge Earthquake triggered 1,356 landslides in January 1994. We find that when the landslide

  8. Group Sex Events and HIV/STI Risk in an Urban Network

    Science.gov (United States)

    Friedman, Samuel R.; Bolyard, Melissa; Khan, Maria; Maslow, Carey; Sandoval, Milagros; Mateu-Gelabert, Pedro; Krauss, Beatrice; Aral, Sevgi O.

    2012-01-01

    Objectives To describe: a. the prevalence and individual and network characteristics of group sex events (GSE) and GSE attendees; and b. HIV/STI discordance among respondents who said they went to a GSE together. Methods and Design In a sociometric network study of risk partners (defined as sexual partners, persons with whom respondents attended a GSE, or drug-injection partners) in Brooklyn, NY, we recruited a high-risk sample of 465 adults. Respondents reported on GSE attendance, the characteristics of GSEs, and their own and others’ behaviors at GSEs. Sera and urines were collected and STI prevalence was assayed. Results Of the 465 participants, 36% had attended a GSE in the last year, 26% had sex during the most recent of these GSEs, and 13% had unprotected sex there. Certain subgroups (hard drug users, men who have sex with men, women who have sex with women, and sex workers) were more likely to attend and more likely to engage in risk behaviors at these events. Among 90 GSE dyads in which at least one partner named the other as someone with whom they attended a GSE in the previous three months, STI/HIV discordance was common (HSV-2: 45% of dyads, HIV: 12% of dyads, Chlamydia: 21% of dyads). Many GSEs had 10 or more participants, and multiple partnerships at GSEs were common. High attendance rates at GSEs among members of large networks may increase community vulnerability to STI/HIV, particularly since network data show that almost all members of a large sociometric risk network either had sex with a GSE attendee or had sex with someone who had sex with a GSE attended. Conclusions Self-reported GSE attendance and participation was common among this high-risk sample. STI/HIV discordance among GSE attendees was high, highlighting the potential transmission risk associated with GSEs. Research on sexual behaviors should incorporate measures of GSE behaviors as standard research protocol. Interventions should be developed to reduce transmission at GSEs. PMID

  9. Clustering the Parameters of Rhythmographic Analysis of the Events of the Corporate Network Traffic of the Cisco MARS System

    Directory of Open Access Journals (Sweden)

    Denis V. Lozhkarev

    2014-09-01

    Full Text Available This article examines the clustering of the parameters of rhythmographic analysis of the events of the corporate network traffic of the Cisco MARS system. The author dwells upon classifying clustering methods and illustrates a conceptual clustering algorithm. The author infers that, firstly, the results of processing experimental data derived from network traffic logs substantiate the applicability of the methodology of rhythmographic analysis, which is accepted in cardiology, in the analysis of the rhythm of appearance of events in the Cisco MARS system; secondly, the results of clustering the fragments of the rhythm of events substantiate the effectiveness of the approach proposed; thirdly, the practical application of automatic detection of anomalies in network traffic events requires further research.

  10. A discrete event simulation model for evaluating time delays in a pipeline network

    Energy Technology Data Exchange (ETDEWEB)

    Spricigo, Deisi; Muggiati, Filipe V.; Lueders, Ricardo; Neves Junior, Flavio [Federal University of Technology of Parana (UTFPR), Curitiba, PR (Brazil)

    2009-07-01

    Currently in the oil industry the logistic chain stands out as a strong candidate to obtain highest profit, since recent studies have pointed out to a cost reduction by adoption of better policies for distribution of oil derivatives, particularly those where pipelines are used to transport products. Although there are models to represent transfers of oil derivatives in pipelines, they are quite complex and computationally burden. In this paper, we are interested on models that are less detailed in terms of fluid dynamics but provide more information about operational decisions in a pipeline network. We propose a discrete event simulation model in ARENA that allows simulating a pipeline network based on average historical data. Time delays for transferring different products can be evaluated through different routes. It is considered that transport operations follow a historical behavior and average time delays can thus be estimated within certain bounds. Due to its stochastic nature, time quantities are characterized by average and dispersion measures. This allows comparing different operational scenarios for product transportation. Simulation results are compared to data obtained from a real world pipeline network and different scenarios of production and demand are analyzed. (author)

  11. Digital Learning Network Education Events of NASA's Extreme Environments Mission Operations

    Science.gov (United States)

    Paul, Heather; Guillory, Erika

    2007-01-01

    NASA's Digital Learning Network (DLN) reaches out to thousands of students each year through video conferencing and web casting. The DLN has created a series of live education videoconferences connecting NASA s Extreme Environment Missions Operations (NEEMO) team to students across the United States. The programs are also extended to students around the world live web casting. The primary focus of the events is the vision for space exploration. During the programs, NEEMO Crewmembers including NASA astronauts, engineers and scientists inform and inspire students about the importance of exploration and share the impact of the project as it correlates with plans to return to the moon and explore the planet Mars. These events highlight interactivity. Students talk live with the aquanauts in Aquarius, the National Oceanic and Atmospheric Administration s underwater laboratory. With this program, NASA continues the Agency s tradition of investing in the nation's education programs. It is directly tied to the Agency's major education goal of attracting and retaining students in science, technology, and engineering disciplines. Before connecting with the aquanauts, the students conduct experiments of their own designed to coincide with mission objectives. This paper describes the events that took place in September 2006.

  12. Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements

    CERN Document Server

    Shakya, Rajeev K; Verma, Nishchal K

    2012-01-01

    We study the problem of medium access control in domain of event-driven wireless sensor networks (WSN). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSN encounter correlated traffic as a subset of nodes start sending data by sensing a common event simultaneously. We wish to rethink of medium access control (MAC) for this type of traffic characteristics. For WSN, many existing MAC protocols utilize the basic CSMA strategies like 802.11 that uses Binary Exponential Backoff (BEB) algorithm to handle the collisions among packets when more than one node want to access the channel. We show that this BEB algorithm does not work well without incurring access delay or performance degradation due to increased number of collisions and retransmissions when nodes encounter correlated traffic. In this paper, we investigate on how to minimize the access delay and improve throughput by setting contention window (CW) size adaptively accord...

  13. A polar cap absorption event observed using the Southern Hemisphere SuperDARN radar network.

    Science.gov (United States)

    Breed, A.; Morris, R.; Parkinson, M.; Duldig, M.; Dyson, P.

    A large X5 class solar flare and coronal mass ejection were observed emanating from the sun on July 14, 2000. Approximately 10 minutes later a large cosmic ray ground level enhancement was observed using neutron monitors located at Mawson station (70.5°S CGM), Antarctica; Large increases in proton flux were also observed using satellites during this time. This marked the start of a large polar cap absorption event with cosmic noise absorption peaking at 30 dB, as measured by a 30 MHz riometer located at Casey station (80.4°S CGM), Antarctica. The spatial evolution of this event and its subsequent recovery were studied using the Southern Hemisphere SuperDARN radar network, including the relatively low latitude observation provided by the Tasman International Geospace Environment Radar (TIGER) located on Bruny Island (54.6°S GGM), Tasmania. When the bulk of the CME arrived at the Earth two days later it triggered an intense geomagnetic storm. This paper presents observations of the dramatic sequence of events.

  14. EEG-based event detection using optimized echo state networks with leaky integrator neurons.

    Science.gov (United States)

    Ayyagari, Sudhanshu S D P; Jones, Richard D; Weddell, Stephen J

    2014-01-01

    This study investigates the classification ability of linear and nonlinear classifiers on biological signals using the electroencephalogram (EEG) and examines the impact of architectural changes within the classifier in order to enhance the classification. Consequently, artificial events were used to validate a prototype EEG-based microsleep detection system based around an echo state network (ESN) and a linear discriminant analysis (LDA) classifier. The artificial events comprised infrequent 2-s long bursts of 15 Hz sinusoids superimposed on prerecorded 16-channel EEG data which provided a means of determining and optimizing the accuracy of overall classifier on `gold standard' events. The performance of this system was tested on different signal-to-noise amplitude ratios (SNRs) ranging from 16 down to 0.03. Results from several feature selection/reduction and pattern classification modules indicated that training the classifier using a leaky-integrator neuron ESN structure yielded highest classification accuracy. For datasets with a low SNR of 0.3, training the leaky-neuron ESN using only those features which directly correspond to the underlying event, resulted in a phi correlation of 0.92 compared to 0.37 that employed principal component analysis (PCA). On the same datasets, other classifiers such as LDA and simple ESNs using PCA performed weakly with a correlation of 0.05 and 0 respectively. These results suggest that ESNs with leaky neuron architectures have superior pattern recognition properties. This, in turn, may reflect their superior ability to exploit differences in state dynamics and, hence, provide superior temporal characteristics in learning. PMID:25571328

  15. Rainfall-runoff modeling for storm events in a coastal forest catchment using neural networks

    Institute of Scientific and Technical Information of China (English)

    WANG Yi; HE Bin

    2008-01-01

    The process of transformation of rainfall into runoff over a catchment is very complex and highly nonlinear and exhibits both temporal and spatial variabilities. In this article, a rainfall-runoff model using the artificial neural networks (ANN) is proposed for simulating the runoff in storm events. The study uses the data from a coastal forest catchmentlocated in Seto Inland Sea, Japan. This article studies the accuracy of the short-term rainfall forecast obtained by ANN time-series analysis techniques and using antecedent rainfall depths and stream flow as the input information. The verification results from the proposed model indicate that the approach of ANN rainfall-runoff model presented in this paper shows a reasonable agreement in rainfall-runoff modeling with high accuracy.

  16. Analyzing event stream dynamics in two-mode networks : An exploratory analysis of private communication in a question and answer community

    NARCIS (Netherlands)

    Stadtfeld, Christoph; Geyer-Schulz, Andreas

    2011-01-01

    Information about social networks can often be collected as event stream data. However, most methods in social network analysis are defined for static network snapshots or for panel data. We propose an actor oriented Markov process framework to analyze the structural dynamics in event streams. Estim

  17. Simulation of Greenhouse Climate Monitoring and Control with Wireless Sensor Network and Event-Based Control

    Directory of Open Access Journals (Sweden)

    Andrzej Pawlowski

    2009-01-01

    Full Text Available Monitoring and control of the greenhouse environment play a decisive role in greenhouse production processes. Assurance of optimal climate conditions has a direct influence on crop growth performance, but it usually increases the required equipment cost. Traditionally, greenhouse installations have required a great effort to connect and distribute all the sensors and data acquisition systems. These installations need many data and power wires to be distributed along the greenhouses, making the system complex and expensive. For this reason, and others such as unavailability of distributed actuators, only individual sensors are usually located in a fixed point that is selected as representative of the overall greenhouse dynamics. On the other hand, the actuation system in greenhouses is usually composed by mechanical devices controlled by relays, being desirable to reduce the number of commutations of the control signals from security and economical point of views. Therefore, and in order to face these drawbacks, this paper describes how the greenhouse climate control can be represented as an event-based system in combination with wireless sensor networks, where low-frequency dynamics variables have to be controlled and control actions are mainly calculated against events produced by external disturbances. The proposed control system allows saving costs related with wear minimization and prolonging the actuator life, but keeping promising performance results. Analysis and conclusions are given by means of simulation results.

  18. Timing system solution for MedAustron; Real-time event and data distribution network

    International Nuclear Information System (INIS)

    MedAustron is an ion beam research and therapy centre under construction in Wiener Neustadt, Austria. The facility features a synchrotron particle accelerator for light ions. The timing system for this class of accelerators has been developed in close collaboration between MedAustron and Cosylab. Mitigating economical and technological risks, we have chosen a proven, widely used Micro Research Finland (MRF) timing equipment and redesigned its FPGA firmware, extending its high-logic services above transport layer, as required by machine specifics. We obtained a generic real-time broadcast network for coordinating actions of a compact, pulse-to-pulse modulation based particle accelerator. High-level services include support for virtual accelerators and a rich selection of event response mechanisms. The system uses a combination of a real-time link for downstream events and a non-real-time link for upstream messaging and non time-critical communication. It comes with National Instruments LabVIEW-based software support, ready to be integrated into PXIe based front-end controllers. This article explains the high level logic services provided by the real-time link, describes the non-real-time interfaces and presents the software configuration mechanisms. (authors)

  19. Collaborative-Comparison Learning for Complex Event Detection Using Distributed Hierarchical Graph Neuron (DHGN) Approach in Wireless Sensor Network

    Science.gov (United States)

    Muhamad Amin, Anang Hudaya; Khan, Asad I.

    Research trends in existing event detection schemes using Wireless Sensor Network (WSN) have mainly focused on routing and localisation of nodes for optimum coordination when retrieving sensory information. Efforts have also been put in place to create schemes that are able to provide learning mechanisms for event detection using classification or clustering approaches. These schemes entail substantial communication and computational overheads owing to the event-oblivious nature of data transmissions. In this paper, we present an event detection scheme that has the ability to distribute detection processes over the resource-constrained wireless sensor nodes and is suitable for events with spatio-temporal characteristics. We adopt a pattern recognition algorithm known as Distributed Hierarchical Graph Neuron (DHGN) with collaborative-comparison learning for detecting critical events in WSN. The scheme demonstrates good accuracy for binary classification and offers low-complexity and high-scalability in terms of its processing requirements.

  20. Analysis of Network Event Hot Word “Duang”%网络事件热词“Duang”探析

    Institute of Scientific and Technical Information of China (English)

    张肖艺

    2015-01-01

    Network Event hot words refer to the hot words which are well known by network users and were produced on the background of the network events which have certain influences and spread widely .This paper mainly analyzes the features of speech and syntactic function of “Duang”which are presented in the use of the network language .From the point of view of generation , Network Event hot words reflect the interaction of virtual space and the real world .From the point of view of application , Network Event hot words have an enjoyable way of expressing and accepting .From the point of view of popularity , Network Event hot words have a variety of propagation modes .%网络事件热词指以具有一定传播广度和影响力的网络事件为背景而产生的为网民所熟知的一类网络热词。本文主要通过对“Duang”在网络语言运用中所呈现的词性和句法功能的分析,探索网络事件热词的特征。从其产生看,网络事件热词体现网络虚拟空间与现实社会的交互作用;从其应用看,网络事件热词是一种写意型的表达与接受方式;从其流行看,网络事件热词具备多种传播模式。

  1. Tools for the selection of the transmission probability in the cluster formation phase for Event-Driven Wireless Sensor Networks

    OpenAIRE

    Mario Eduardo Rivero-Angeles; Izlian Yolanda Orea-Flores

    2014-01-01

    In the literature, it is common to find studies on Wireless Sensor Networks (WSNs) that consider the Carrier Sense Multiple Access (CSMA) protocol with a fixed transmission probability for means of the random access strategy. This is especially true for event-driven applications for clustered- based architectures. However, due to the highly variable environment in these networks in terms of the number of nodes attempting a transmission (at the beginning of the cluster formation all nodes in t...

  2. The spatial scale of ozone depletion events derived from an autonomous surface ozone network in coastal Antarctica

    OpenAIRE

    Jones, A. E.; Wolff, E. W.; Brough, N.; Bauguitte, S. J.-B.; Weller, R; Yela, M; M. Navarro-Comas; H. A. Ochoa; Theys, N.

    2013-01-01

    To probe the spatial extent of tropospheric ozone depletion events during Antarctic spring, a network of 10 autonomous ozone monitors was established around the Dronning Maud Land sector of Antarctica for a full calendar year. Together with manned stations in the area, the network covered a ~1200 km stretch of coast, as well as a transect ~300 km inland and to ~2000 m above sea level (a.s.l.). Here we present results from the spring period (August to October 2008). While ...

  3. The Complex Alarming Event Detecting and Disposal Processing Approach for Coal Mine Safety Using Wireless Sensor Network

    OpenAIRE

    Cheng Bo; Zhou Peng; Zhu Da; Chen Junliang

    2012-01-01

    Due to the complex environment of the coal mine, the accidents can occur at any time and often result in partial or total evacuation of mine personnel and could result in the loss of lives. Therefore, it is important and necessary to detect the accidents and generate a corresponding alarming disposal in time. This paper proposed a real-time complex alarming event detecting and disposal processing approach for coal mine safety using wireless sensor network. Firstly, we introduce the event and ...

  4. An efficient routing algorithm for event based monitoring in a plant using virtual sink nodes in a wireless sensor network

    International Nuclear Information System (INIS)

    A Wireless Sensor Network is a collection of wireless sensor nodes arranged in a self-forming network without aid of any infrastructure or administration. The individual nodes have limited resources and hence efficient communication mechanisms between the nodes have to be devised for continued operation of the network in a plant environment. In wireless sensor networks a sink node or base station at one end acts as the recipient of information gathered by all other sensor nodes in the network and the information arrives at the sink through multiple hops across the nodes of the network. A routing algorithm has been developed in which a virtual sink node is generated whenever hop count of an ordinary node crosses a certain specified value. The virtual sink node acts as a recipient node for data of all neighboring nodes. This virtual sink helps in reducing routing overhead, especially when the sensor network is scaled to a larger network. The advantages with this scheme are less energy consumption, reduced congestion in the network and longevity of the network. The above algorithm is suitable for event based or interval based monitoring systems in nuclear plants. This paper describes the working of the proposed algorithm and provides its implementation details. (author)

  5. Real-time Monitoring Network to Characterize Anthropogenic and Natural Events Affecting the Hudson River, NY

    Science.gov (United States)

    Islam, M. S.; Bonner, J. S.; Fuller, C.; Kirkey, W.; Ojo, T.

    2011-12-01

    The Hudson River watershed spans 34,700 km2 predominantly in New York State, including agricultural, wilderness, and urban areas. The Hudson River supports many activities including shipping, supplies water for municipal, commercial, and agricultural uses, and is an important recreational resource. As the population increases within this watershed, so does the anthropogenic impact on this natural system. To address the impacts of anthropogenic and natural activities on this ecosystem, the River and Estuary Observatory Network (REON) is being developed through a joint venture between the Beacon Institute, Clarkson University, General Electric Inc. and IBM Inc. to monitor New York's Hudson and Mohawk Rivers in real-time. REON uses four sensor platform types with multiple nodes within the network to capture environmentally relevant episodic events. Sensor platform types include: 1) fixed robotic vertical profiler (FRVP); 2) mobile robotic undulating platform (MRUP); 3) fixed acoustic Doppler current profiler (FADCP) and 4) Autonomous Underwater Vehicle (AUV). The FRVP periodically generates a vertical profile with respect to water temperature, salinity, dissolved oxygen, particle concentration and size distribution, and fluorescence. The MRUP utilizes an undulating tow-body tethered behind a research vessel to measure the same set of water parameters as the FRVP, but does so 'synchronically' over a highly-resolved spatial regime. The fixed ADCP provides continuous water current profiles. The AUV maps four-dimensional (time, latitude, longitude, depth) variation of water quality, water currents and bathymetry along a pre-determined transect route. REON data can be used to identify episodic events, both anthropogenic and natural, that impact the Hudson River. For example, a strong heat signature associated with cooling water discharge from the Indian Point nuclear power plant was detected with the MRUP. The FRVP monitoring platform at Beacon, NY, located in the

  6. Application of Parallel Discrete Event Simulation to the Space Surveillance Network

    Science.gov (United States)

    Jefferson, D.; Leek, J.

    2010-09-01

    In this paper we describe how and why we chose parallel discrete event simulation (PDES) as the paradigm for modeling the Space Surveillance Network (SSN) in our modeling framework, TESSA (Testbed Environment for Space Situational Awareness). DES is a simulation paradigm appropriate for systems dominated by discontinuous state changes at times that must be calculated dynamically. It is used primarily for complex man-made systems like telecommunications, vehicular traffic, computer networks, economic models etc., although it is also useful for natural systems that are not described by equations, such as particle systems, population dynamics, epidemics, and combat models. It is much less well known than simple time-stepped simulation methods, but has the great advantage of being time scale independent, so that one can freely mix processes that operate at time scales over many orders of magnitude with no runtime performance penalty. In simulating the SSN we model in some detail: (a) the orbital dynamics of up to 105 objects, (b) their reflective properties, (c) the ground- and space-based sensor systems in the SSN, (d) the recognition of orbiting objects and determination of their orbits, (e) the cueing and scheduling of sensor observations, (f) the 3-d structure of satellites, and (g) the generation of collision debris. TESSA is thus a mixed continuous-discrete model. But because many different types of discrete objects are involved with such a wide variation in time scale (milliseconds for collisions, hours for orbital periods) it is suitably described using discrete events. The PDES paradigm is surprising and unusual. In any instantaneous runtime snapshot some parts my be far ahead in simulation time while others lag behind, yet the required causal relationships are always maintained and synchronized correctly, exactly as if the simulation were executed sequentially. The TESSA simulator is custom-built, conservatively synchronized, and designed to scale to

  7. A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Hsiao-Chien Tsai

    2009-01-01

    Full Text Available Traffic safety applications on vehicular ad hoc networks (VANETs have drawn a lot of attention in recent years with their promising functions on car accident reduction, real-time traffic information support, and enhancement of comfortable driving experience on roadways. However, an inaccurate traffic warning message will impact drivers' decisions, waste drivers' time and fuel in their vehicles, and even invoke serious car accidents. To enable eco-friendly driving VANET environments, that is, to save fuel and time in this context, we proposed an event-based reputation system to prevent the spread of false traffic warning messages. In this system, a dynamic reputation evaluation mechanism is introduced to determine whether an incoming traffic message is significant and trustworthy to the driver. The proposed system is characterized and evaluated through experimental simulations. The simulation results show that, with a proper reputation adaptation mechanism and appropriate threshold settings, our proposed system can effectively prevent false messages spread on various VANET environments.

  8. Adaptive Multi-Path Routing with Guaranteed Target-Delivery Ratio of Critical Events in Wireless Sensor Networks

    Science.gov (United States)

    Baek, Jang Woon; Nam, Young Jin; Seo, Dae-Wha

    Wireless sensor networks are subject to node and link failures for a variety of reasons. This paper proposes a k-disjoint-path routing algorithm that varies the number of disjoint paths (k) in order to meet a target-delivery ratio of critical events and to reduce energy consumption. The proposed algorithm sends packets to the base station through a single path without the occurrence of critical events, however, it sends packets to the base station through k disjoint paths (k > 1) under the occurrence of critical events, where k is computed from a well-defined fault model. The proposed algorithm detects the occurrence of critical events by monitoring collected data patterns. The simulation results reveal that the proposed algorithm is more resilient to random node failure and patterned failure than other routing algorithms, and it also decreases energy consumption much more than the multi-path and path-repair algorithms.

  9. The “MuseumWeek” Event : Analyzing Social Network Interactions in Cultural Fields

    OpenAIRE

    Courtin, Antoine; Juanals, Brigitte; Minel, Jean-Luc; De Saint Léger, Mathilde

    2014-01-01

    International audience The goal of this paper is to analyze messages sent on the Twitter socialnetwork during the MuseumWeek event. This analysis relies on quantitative and qualitative studies, which were benchmarked with the “MuseumWeek” event.

  10. Onset and Offset of Aversive Events Establish Distinct Memories Requiring Fear and Reward Networks

    Science.gov (United States)

    Andreatta, Marta; Fendt, Markus; Muhlberger, Andreas; Wieser, Matthias J.; Imobersteg, Stefan; Yarali, Ayse; Gerber, Bertram; Pauli, Paul

    2012-01-01

    Two things are worth remembering about an aversive event: What made it happen? What made it cease? If a stimulus precedes an aversive event, it becomes a signal for threat and will later elicit behavior indicating conditioned fear. However, if the stimulus is presented upon cessation of the aversive event, it elicits behavior indicating…

  11. Modeling the Energy Performance of Event-Driven Wireless Sensor Network by Using Static Sink and Mobile Sink

    OpenAIRE

    Mitsuji Matsumoto; Jiehui Chen; Salim, Mariam B.

    2010-01-01

    Wireless Sensor Networks (WSNs) designed for mission-critical applications suffer from limited sensing capacities, particularly fast energy depletion. Regarding this, mobile sinks can be used to balance the energy consumption in WSNs, but the frequent location updates of the mobile sinks can lead to data collisions and rapid energy consumption for some specific sensors. This paper explores an optimal barrier coverage based sensor deployment for event driven WSNs where a dual-sink model was de...

  12. 网络事件营销应用策略研究%Research on Network Event Marketing Application Strategy

    Institute of Scientific and Technical Information of China (English)

    卢智慧

    2013-01-01

      With the development of network technology, the Internet has now become an important tool for enterprises to carry out marketing activities. Network event marketing is a branch of event marketing, and is very popular at home and abroad in recent years as a means of marketing. The communication strategies of network event marketing mainly include the emotional contagion law, Caochuanjiejian law, Netizen participation act, concept-driven law, and super-girl marketing law.%  随着网络技术的发展,互联网现在已经成为企业开展市场营销活动的一个重要工具。网络事件营销是事件营销的一个分支,是近年来国内外比较流行的一种市场营销手段。网络事件营销的传播策略主要有:情绪感染法、草船借箭法、网民参与法、概念带动法、超女营销法。

  13. Adaptive and context-aware detection and classification of potential QoS degradation events in biomedical wireless sensor networks

    Science.gov (United States)

    Abreu, Carlos; Miranda, Francisco; Mendes, Paulo M.

    2016-06-01

    The use of wireless sensor networks in healthcare has the potential to enhance the services provided to citizens. In particular, they play an important role in the development of state-of-the-art patient monitoring applications. Nevertheless, due to the critical nature of the data conveyed by such patient monitoring applications, they have to fulfil high standards of quality of service in order to obtain the confidence of all players in the healthcare industry. In such context, vis-à-vis the quality of service being provided by the wireless sensor network, this work presents an adaptive and context-aware method to detect and classify performance degradation events. The proposed method has the ability to catch the most significant and damaging variations on the metrics being used to quantify the quality of service provided by the network without overreacting to small and innocuous variations on the metric's value.

  14. Decentralized Event-Triggered Control Over Wireless Sensor/Actuator Networks

    NARCIS (Netherlands)

    Mazo, Manuel; Tabuada, Paulo

    2011-01-01

    Event-triggered control has been recently proposed as an alternative to the more traditional periodic execution of control tasks. In a typical event-triggered implementation, the control signals are kept constant until the violation of a condition on the state of the plant triggers the recomputation

  15. Fast alarm broadcasting in critical event monitoring using wireless sensor networks

    NARCIS (Netherlands)

    Zhang, Kui; Meratnia, Nirvana; Havinga, Paul; Guo, Peng; Beutel, Jan

    2010-01-01

    In mission-critical applications such as battlefield reconnaissance or industrial safety and security, a large number of sensor nodes are deployed in a large area to detect and report event related information to the end-users. When a critical event in the monitoring region is detected by a node, al

  16. Robust Event-Triggered Energy-to-Peak Filtering for Polytopic Uncertain Systems over Lossy Network with Quantized Measurements

    Directory of Open Access Journals (Sweden)

    Jidong Wang

    2016-01-01

    Full Text Available The event-triggered energy-to-peak filtering for polytopic discrete-time linear systems is studied with the consideration of lossy network and quantization error. Because of the communication imperfections from the packet dropout of lossy link, the event-triggered condition used to determine the data release instant at the event generator (EG can not be directly applied to update the filter input at the zero order holder (ZOH when performing filter performance analysis and synthesis. In order to balance such nonuniform time series between the triggered instant of EG and the updated instant of ZOH, two event-triggered conditions are defined, respectively, whereafter a worst-case bound on the number of consecutive packet losses of the transmitted data from EG is given, which marginally guarantees the effectiveness of the filter that will be designed based on the event-triggered updating condition of ZOH. Then, the filter performance analysis conditions are obtained under the assumption that the maximum number of packet losses is allowable for the worst-case bound. In what follows, a two-stage LMI-based alternative optimization approach is proposed to separately design the filter, which reduces the conservatism of the traditional linearization method of filter analysis conditions. Subsequently a codesign algorithm is developed to determine the communication and filter parameters simultaneously. Finally, an illustrative example is provided to verify the validity of the obtained results.

  17. Detecting and mitigating abnormal events in large scale networks: budget constrained placement on smart grids

    Energy Technology Data Exchange (ETDEWEB)

    Santhi, Nandakishore [Los Alamos National Laboratory; Pan, Feng [Los Alamos National Laboratory

    2010-10-19

    Several scenarios exist in the modern interconnected world which call for an efficient network interdiction algorithm. Applications are varied, including various monitoring and load shedding applications on large smart energy grids, computer network security, preventing the spread of Internet worms and malware, policing international smuggling networks, and controlling the spread of diseases. In this paper we consider some natural network optimization questions related to the budget constrained interdiction problem over general graphs, specifically focusing on the sensor/switch placement problem for large-scale energy grids. Many of these questions turn out to be computationally hard to tackle. We present a particular form of the interdiction question which is practically relevant and which we show as computationally tractable. A polynomial-time algorithm will be presented for solving this problem.

  18. Artificial neural network based pulse shape analysis in cryogenic detectors for rare event searches

    International Nuclear Information System (INIS)

    We present a method based on an Artificial Neural Network for a pulse shape analysis in cryogenic detectors. To train the neural network a huge amount of pulses with known properties are necessary. Therefore, a data-driven simulation used to generate these sets is explained. Furthermore, these simulations allow detailed studies, especially of the cut efficiency and the signal purity of the developed cut. First results are presented and compared with the performance of alternative algorithms.

  19. Artificial neural network based pulse shape analysis in cryogenic detectors for rare event searches

    Energy Technology Data Exchange (ETDEWEB)

    Zoeller, Andreas [Physik Department E15, Technische Universitaet Muenchen, 85748 Garching (Germany); Collaboration: CRESST-Collaboration

    2015-07-01

    We present a method based on an Artificial Neural Network for a pulse shape analysis in cryogenic detectors. To train the neural network a huge amount of pulses with known properties are necessary. Therefore, a data-driven simulation used to generate these sets is explained. Furthermore, these simulations allow detailed studies, especially of the cut efficiency and the signal purity of the developed cut. First results are presented and compared with the performance of alternative algorithms.

  20. Complex network analysis of high rainfall events during the northeast monsoon over south peninsular India and Sri Lanka

    Science.gov (United States)

    Martin, P.; Malik, N.; Marwan, N.; Kurths, J.

    2012-04-01

    The Indian Summer monsoon (ISM) accounts for a large part of the annual rainfall budget across most of the Indian peninsula; however, the coastal regions along the southeast Indian peninsula, as well as Sri Lanka, receive 50% or more of their annual rainfall budget during the northeast monsoon (NEM), or winter monsoon, during the months from October through December. In this study, we investigate the behavior of the NEM over the last 60 years using complex network theory. The network is constructed according to a method previously developed for the ISM, using event synchronization of extreme rainfall events as a correlation measure to create directed and undirected links between geographical locations, which represent potential pathways of moisture transport. Network measures, such as degree centrality and closeness centrality, are then used to illuminate the dynamics of the NEM rainfall over the relevant regions, and to examine the spatial distribution and temporal evolution of the rainfall. Understanding the circulation of the monsoon cycle as a whole, i.e. the NEM together with the ISM, is vital for the agricultural industry and thus the population of the affected areas.

  1. Event-Triggered State Estimation for a Class of Delayed Recurrent Neural Networks with Sampled-Data Information

    Directory of Open Access Journals (Sweden)

    Hongjie Li

    2012-01-01

    Full Text Available The paper investigates the state estimation problem for a class of recurrent neural networks with sampled-data information and time-varying delays. The main purpose is to estimate the neuron states through output sampled measurement; a novel event-triggered scheme is proposed, which can lead to a significant reduction of the information communication burden in the network; the feature of this scheme is that whether or not the sampled data should be transmitted is determined by the current sampled data and the error between the current sampled data and the latest transmitted data. By using a delayed-input approach, the error dynamic system is equivalent to a dynamic system with two different time-varying delays. Based on the Lyapunov-krasovskii functional approach, a state estimator of the considered neural networks can be achieved by solving some linear matrix inequalities, which can be easily facilitated by using the standard numerical software. Finally, a numerical example is provided to show the effectiveness of the proposed event-triggered scheme.

  2. DETERMINATION OF THE FOREST ROAD NETWORK INFLUENCE ON THE SUPPLY CHAIN FOR FIREWOOD PRODUCTION BY DISCRETE EVENT SIMULATION

    Directory of Open Access Journals (Sweden)

    Raffaele Cavalli

    2012-06-01

    Full Text Available In this study a Discrete-event simulation (D-es has been developed to analyze the wood supply chain for firewood production in a mountain area in North-eastern Italy. The D-es is applied in the modeling of extraction (Full Tree System, processing of roundwood into wood assortments (cross-cut and sorting, offroad and on-road transport. In order to estimate the productivity functions and parameters, field studies were conducted to gather data about the different operations linked in the model. Also a GIS network analysis was developed to integrate the spatial information onthe covered distance to the D-es model for each of the supposed Scenarios. The results indicats that an increment of 5 m ha-1 of the forest road network could significantly increase the productivity of the wood supply chain up to 2%.

  3. Aeolian dust event in Korea observed by an EZ Lidar in the frame of global lidar networks.

    Science.gov (United States)

    Lolli, Simone

    2010-05-01

    Duststorms and sandstorms regularly devastate Northeast Asia and cause considerable damage to transportation system and public health; further, these events are conceived to be one of the very important indices for estimating the global warming and desertification. Previously, yellow sand events were considered natural phenomena that originate in deserts and arid areas. However, the greater scale and frequency of these events in recent years are considered to be the result of human activities such as overgrazing and over-cultivation. Japan, Korea, Cina and Mongolia are directly concerned to prevent and control these storms and have been able to some extent to provide forecasts and early warnings. In this framework, to improve the accuracy of forecasting , a compact and rugged eye safe lidar, the EZ LIDAR™, developed together by Laboratoire des Sciences du Climat et l'Environnement (LSCE) (CEA-CNRS) and LEOSPHERE (France) to study and investigate structural and optical properties of clouds and aerosols, thanks to the strong know-how of CEA and CNRS in the field of air quality measurements and cloud observation and analysis, was deployed in Seoul, Korea in order to detect and study yellow sand events, thanks to its depolarization channel and scan capabilities. The preliminary results, showed in this paper, of this measurement campaign put in evidence that EZ Lidar, for its capabilities of operating unattended day and night under each atmospheric condition, is mature to be deployed in a global network to study long-range transport, crucial in the forecasting model.

  4. Age differences in the Attention Network Test: Evidence from behavior and event-related potentials.

    Science.gov (United States)

    Williams, Ryan S; Biel, Anna Lena; Wegier, Pete; Lapp, Leann K; Dyson, Benjamin J; Spaniol, Julia

    2016-02-01

    The Attention Network Test (ANT) is widely used to capture group and individual differences in selective attention. Prior behavioral studies with younger and older adults have yielded mixed findings with respect to age differences in three putative attention networks (alerting, orienting, and executive control). To overcome the limitations of behavioral data, the current study combined behavioral and electrophysiological measures. Twenty-four healthy younger adults (aged 18-29years) and 24 healthy older adults (aged 60-76years) completed the ANT while EEG data were recorded. Behaviorally, older adults showed reduced alerting, but did not differ from younger adults in orienting or executive control. Electrophysiological components related to alerting and orienting (P1, N1, and CNV) were similar in both age groups, whereas components related to executive control (N2 and P3) showed age-related differences. Together these results suggest that comparisons of network effects between age groups using behavioral data alone may not offer a complete picture of age differences in selective attention, especially for alerting and executive control networks.

  5. Social Network Changes and Life Events across the Life Span: A Meta-Analysis

    Science.gov (United States)

    Wrzus, Cornelia; Hanel, Martha; Wagner, Jenny; Neyer, Franz J.

    2013-01-01

    For researchers and practitioners interested in social relationships, the question remains as to how large social networks typically are, and how their size and composition change across adulthood. On the basis of predictions of socioemotional selectivity theory and social convoy theory, we conducted a meta-analysis on age-related social network…

  6. Efficient Fault-Tolerant Event Query Algorithm in Distributed Wireless Sensor Networks

    OpenAIRE

    Rongbo Zhu

    2010-01-01

    To overcome the faulty data query problem to improve the accuracy of data query, an efficient fault-tolerant event query algorithm (FTEQ) is proposed, which takes the short-term and long-term spatial and temporal similarities between sensors and environment into considerations. An imprecise and missing data correction algorithm based on Kalman filter is proposed to correct fault sensing data, and a score rank algorithm also is proposed to assign each sensor an appropriate value to reflect the...

  7. Bidirectional Recurrent Neural Networks for Medical Event Detection in Electronic Health Records

    OpenAIRE

    Jagannatha, Abhyuday; Hong YU

    2016-01-01

    Sequence labeling for extraction of medical events and their attributes from unstructured text in Electronic Health Record (EHR) notes is a key step towards semantic understanding of EHRs. It has important applications in health informatics including pharmacovigilance and drug surveillance. The state of the art supervised machine learning models in this domain are based on Conditional Random Fields (CRFs) with features calculated from fixed context windows. In this application, we explored va...

  8. Enriched encoding: reward motivation organizes cortical networks for hippocampal detection of unexpected events.

    Science.gov (United States)

    Murty, Vishnu P; Adcock, R Alison

    2014-08-01

    Learning how to obtain rewards requires learning about their contexts and likely causes. How do long-term memory mechanisms balance the need to represent potential determinants of reward outcomes with the computational burden of an over-inclusive memory? One solution would be to enhance memory for salient events that occur during reward anticipation, because all such events are potential determinants of reward. We tested whether reward motivation enhances encoding of salient events like expectancy violations. During functional magnetic resonance imaging, participants performed a reaction-time task in which goal-irrelevant expectancy violations were encountered during states of high- or low-reward motivation. Motivation amplified hippocampal activation to and declarative memory for expectancy violations. Connectivity of the ventral tegmental area (VTA) with medial prefrontal, ventrolateral prefrontal, and visual cortices preceded and predicted this increase in hippocampal sensitivity. These findings elucidate a novel mechanism whereby reward motivation can enhance hippocampus-dependent memory: anticipatory VTA-cortical-hippocampal interactions. Further, the findings integrate literatures on dopaminergic neuromodulation of prefrontal function and hippocampus-dependent memory. We conclude that during reward motivation, VTA modulation induces distributed neural changes that amplify hippocampal signals and records of expectancy violations to improve predictions-a potentially unique contribution of the hippocampus to reward learning.

  9. TRANSFORMATIONS OF THE JOURNALISM EVENT IN SOCIAL NETWORKS: FROM THE MOBILIZATIONS AGAINST HOMOPHOBIA TO THE CRISIS OF A COUNTRY MUSIC DUO

    Directory of Open Access Journals (Sweden)

    Kellen Mendes Höehr

    2012-06-01

    Full Text Available This paper presents the preliminary results of a research that investigates the creation of events through social networking sites on the Internet. There is already a specific type of event that serves the logic of these networks, especially those whose production and distribution take place based on online platforms and digital tools. This paper investigates two cases: the first concerns the duo of Brazilian country music singers, Zezé di Camargo and Luciano, who, after an argument that occurred in a concert in the city of Curitiba, announced the end of the partnership. The video was posted on YouTube and was immediately spread through the social networks, which generated intense conversation about the episode until it became a journalistic event in the traditional media. This paper also examines the organization of a protest against the attack on a homoaffective couple in a street of São Paulo in 2011, completely worked on by Facebook. Based on Charles Sanders Peirce’s concept of semiosis, a map of the construction of these events is drawn with its various ramifications, from the articulations within the network to the production of meanings that they develop. The events studied have as an element in common the leading role that social networks had in their constitution. They possess the nature of the network and are framed in what is understood now as cyberevents, a category that poses new challenges to the practice of journalism.

  10. Differential Network Analyses of Alzheimer’s Disease Identify Early Events in Alzheimer’s Disease Pathology

    Directory of Open Access Journals (Sweden)

    Jing Xia

    2014-01-01

    Full Text Available In late-onset Alzheimer’s disease (AD, multiple brain regions are not affected simultaneously. Comparing the gene expression of the affected regions to identify the differences in the biological processes perturbed can lead to greater insight into AD pathogenesis and early characteristics. We identified differentially expressed (DE genes from single cell microarray data of four AD affected brain regions: entorhinal cortex (EC, hippocampus (HIP, posterior cingulate cortex (PCC, and middle temporal gyrus (MTG. We organized the DE genes in the four brain regions into region-specific gene coexpression networks. Differential neighborhood analyses in the coexpression networks were performed to identify genes with low topological overlap (TO of their direct neighbors. The low TO genes were used to characterize the biological differences between two regions. Our analyses show that increased oxidative stress, along with alterations in lipid metabolism in neurons, may be some of the very early events occurring in AD pathology. Cellular defense mechanisms try to intervene but fail, finally resulting in AD pathology as the disease progresses. Furthermore, disease annotation of the low TO genes in two independent protein interaction networks has resulted in association between cancer, diabetes, renal diseases, and cardiovascular diseases.

  11. Dig-event: let's socialize around events

    OpenAIRE

    Zhao, Zhenzhen; Liu, Ji; Crespi, Noel

    2012-01-01

    International audience Traditional social networks socialize around the contents that have uploaded to these sites and discover interesting contents uploaded by others. In this demo we aim to explore the idea of activity-oriented social networks. We design a novel social networking site called Dig-Event (Do-it-together Event), where people are able to share events through calendar, while discover interesting events shared by others. Our demo has been inspired by previous research on calend...

  12. Automatic detection of epileptiform events in EEG by a three-stage procedure based on artificial neural networks.

    Science.gov (United States)

    Acir, Nurettin; Oztura, Ibrahim; Kuntalp, Mehmet; Baklan, Bariş; Güzeliş, Cüneyt

    2005-01-01

    This paper introduces a three-stage procedure based on artificial neural networks for the automatic detection of epileptiform events (EVs) in a multichannel electroencephalogram (EEG) signal. In the first stage, two discrete perceptrons fed by six features are used to classify EEG peaks into three subgroups: 1) definite epileptiform transients (ETs); 2) definite non-ETs; and 3) possible ETs and possible non-ETs. The pre-classification done in the first stage not only reduces the computation time but also increases the overall detection performance of the procedure. In the second stage, the peaks falling into the third group are aimed to be separated from each other by a nonlinear artificial neural network that would function as a postclassifier whose input is a vector of 41 consecutive sample values obtained from each peak. Different networks, i.e., a backpropagation multilayer perceptron and two radial basis function networks trained by a hybrid method and a support vector method, respectively, are constructed as the postclassifier and then compared in terms of their classification performances. In the third stage, multichannel information is integrated into the system for contributing to the process of identifying an EV by the electroencephalographers (EEGers). After the integration of multichannel information, the overall performance of the system is determined with respect to EVs. Visual evaluation, by two EEGers, of 19 channel EEG records of 10 epileptic patients showed that the best performance is obtained with a radial basis support vector machine providing an average sensitivity of 89.1%, an average selectivity of 85.9%, and a false detection rate (per hour) of 7.5.

  13. A twenty-first century California observing network for monitoring extreme weather events

    Science.gov (United States)

    White, A.B.; Anderson, M.L.; Dettinger, M.D.; Ralph, F.M.; Hinojosa, A.; Cayan, D.R.; Hartman, R.K.; Reynolds, D.W.; Johnson, L.E.; Schneider, T.L.; Cifelli, R.; Toth, Z.; Gutman, S.I.; King, C.W.; Gehrke, F.; Johnston, P.E.; Walls, C.; Mann, Dorte; Gottas, D.J.; Coleman, T.

    2013-01-01

    During Northern Hemisphere winters, the West Coast of North America is battered by extratropical storms. The impact of these storms is of paramount concern to California, where aging water supply and flood protection infrastructures are challenged by increased standards for urban flood protection, an unusually variable weather regime, and projections of climate change. Additionally, there are inherent conflicts between releasing water to provide flood protection and storing water to meet requirements for water supply, water quality, hydropower generation, water temperature and flow for at-risk species, and recreation. In order to improve reservoir management and meet the increasing demands on water, improved forecasts of precipitation, especially during extreme events, is required. Here we describe how California is addressing their most important and costliest environmental issue – water management – in part, by installing a state-of-the-art observing system to better track the area’s most severe wintertime storms.

  14. Search for supersymmetry in events with opposite-sign dileptons and missing transverse energy using an artificial neural network

    CERN Document Server

    Chatrchyan, Serguei; Sirunyan, Albert M; Tumasyan, Armen; Adam, Wolfgang; Aguilo, Ernest; Bergauer, Thomas; Dragicevic, Marko; Erö, Janos; Fabjan, Christian; Friedl, Markus; Fruehwirth, Rudolf; Ghete, Vasile Mihai; Hörmann, Natascha; Hrubec, Josef; Jeitler, Manfred; Kiesenhofer, Wolfgang; Knünz, Valentin; Krammer, Manfred; Krätschmer, Ilse; Liko, Dietrich; Mikulec, Ivan; Pernicka, Manfred; Rabady, Dinyar; Rahbaran, Babak; Rohringer, Christine; Rohringer, Herbert; Schöfbeck, Robert; Strauss, Josef; Taurok, Anton; Waltenberger, Wolfgang; Wulz, Claudia-Elisabeth; Mossolov, Vladimir; Shumeiko, Nikolai; Suarez Gonzalez, Juan; Bansal, Monika; Bansal, Sunil; Cornelis, Tom; De Wolf, Eddi A; Janssen, Xavier; Luyckx, Sten; Mucibello, Luca; Ochesanu, Silvia; Roland, Benoit; Rougny, Romain; Selvaggi, Michele; Van Haevermaet, Hans; Van Mechelen, Pierre; Van Remortel, Nick; Van Spilbeeck, Alex; Blekman, Freya; Blyweert, Stijn; D'Hondt, Jorgen; Gonzalez Suarez, Rebeca; Kalogeropoulos, Alexis; Maes, Michael; Olbrechts, Annik; Van Doninck, Walter; Van Mulders, Petra; Van Onsem, Gerrit Patrick; Villella, Ilaria; Clerbaux, Barbara; De Lentdecker, Gilles; Dero, Vincent; Gay, Arnaud; Hreus, Tomas; Léonard, Alexandre; Marage, Pierre Edouard; Mohammadi, Abdollah; Reis, Thomas; Thomas, Laurent; Vander Velde, Catherine; Vanlaer, Pascal; Wang, Jian; Adler, Volker; Beernaert, Kelly; Cimmino, Anna; Costantini, Silvia; Garcia, Guillaume; Grunewald, Martin; Klein, Benjamin; Lellouch, Jérémie; Marinov, Andrey; Mccartin, Joseph; Ocampo Rios, Alberto Andres; Ryckbosch, Dirk; Strobbe, Nadja; Thyssen, Filip; Tytgat, Michael; Walsh, Sinead; Yazgan, Efe; Zaganidis, Nicolas; Basegmez, Suzan; Bruno, Giacomo; Castello, Roberto; Ceard, Ludivine; Delaere, Christophe; Du Pree, Tristan; Favart, Denis; Forthomme, Laurent; Giammanco, Andrea; Hollar, Jonathan; Lemaitre, Vincent; Liao, Junhui; Militaru, Otilia; Nuttens, Claude; Pagano, Davide; Pin, Arnaud; Piotrzkowski, Krzysztof; Vizan Garcia, Jesus Manuel; Beliy, Nikita; Caebergs, Thierry; Daubie, Evelyne; Hammad, Gregory Habib; Alves, Gilvan; Correa Martins Junior, Marcos; Martins, Thiago; Pol, Maria Elena; Henrique Gomes E Souza, Moacyr; Aldá Júnior, Walter Luiz; Carvalho, Wagner; Custódio, Analu; Da Costa, Eliza Melo; De Jesus Damiao, Dilson; De Oliveira Martins, Carley; Fonseca De Souza, Sandro; Malbouisson, Helena; Malek, Magdalena; Matos Figueiredo, Diego; Mundim, Luiz; Nogima, Helio; Prado Da Silva, Wanda Lucia; Santoro, Alberto; Soares Jorge, Luana; Sznajder, Andre; Vilela Pereira, Antonio; Souza Dos Anjos, Tiago; Bernardes, Cesar Augusto; De Almeida Dias, Flavia; Tomei, Thiago; De Moraes Gregores, Eduardo; Lagana, Caio; Da Cunha Marinho, Franciole; Mercadante, Pedro G; Novaes, Sergio F; Padula, Sandra; Genchev, Vladimir; Iaydjiev, Plamen; Piperov, Stefan; Rodozov, Mircho; Stoykova, Stefka; Sultanov, Georgi; Tcholakov, Vanio; Trayanov, Rumen; Vutova, Mariana; Dimitrov, Anton; Hadjiiska, Roumyana; Kozhuharov, Venelin; Litov, Leander; Pavlov, Borislav; Petkov, Peicho; Bian, Jian-Guo; Chen, Guo-Ming; Chen, He-Sheng; Jiang, Chun-Hua; Liang, Dong; Liang, Song; Meng, Xiangwei; Tao, Junquan; Wang, Jian; Wang, Xianyou; Wang, Zheng; Xiao, Hong; Xu, Ming; Zang, Jingjing; Zhang, Zhen; Asawatangtrakuldee, Chayanit; Ban, Yong; Guo, Yifei; Li, Wenbo; Liu, Shuai; Mao, Yajun; Qian, Si-Jin; Teng, Haiyun; Wang, Dayong; Zhang, Linlin; Zou, Wei; Avila, Carlos; Gomez, Juan Pablo; Gomez Moreno, Bernardo; Osorio Oliveros, Andres Felipe; Sanabria, Juan Carlos; Godinovic, Nikola; Lelas, Damir; Plestina, Roko; Polic, Dunja; Puljak, Ivica; Antunovic, Zeljko; Kovac, Marko; Brigljevic, Vuko; Duric, Senka; Kadija, Kreso; Luetic, Jelena; Mekterovic, Darko; Morovic, Srecko; Attikis, Alexandros; Galanti, Mario; Mavromanolakis, Georgios; Mousa, Jehad; Nicolaou, Charalambos; Ptochos, Fotios; Razis, Panos A; Finger, Miroslav; Finger Jr, Michael; Assran, Yasser; Elgammal, Sherif; Ellithi Kamel, Ali; Mahmoud, Mohammed; Mahrous, Ayman; Radi, Amr; Kadastik, Mario; Müntel, Mait; Murumaa, Marion; Raidal, Martti; Rebane, Liis; Tiko, Andres; Eerola, Paula; Fedi, Giacomo; Voutilainen, Mikko; Härkönen, Jaakko; Heikkinen, Mika Aatos; Karimäki, Veikko; Kinnunen, Ritva; Kortelainen, Matti J; Lampén, Tapio; Lassila-Perini, Kati; Lehti, Sami; Lindén, Tomas; Luukka, Panja-Riina; Mäenpää, Teppo; Peltola, Timo; Tuominen, Eija; Tuominiemi, Jorma; Tuovinen, Esa; Ungaro, Donatella; Wendland, Lauri; Banzuzi, Kukka; Karjalainen, Ahti; Korpela, Arja; Tuuva, Tuure; Besancon, Marc; Choudhury, Somnath; Dejardin, Marc; Denegri, Daniel; Fabbro, Bernard; Faure, Jean-Louis; Ferri, Federico; Ganjour, Serguei; Givernaud, Alain; Gras, Philippe; Hamel de Monchenault, Gautier; Jarry, Patrick; Locci, Elizabeth; Malcles, Julie; Millischer, Laurent; Nayak, Aruna; Rander, John; Rosowsky, André; Titov, Maksym; Baffioni, Stephanie; Beaudette, Florian; Benhabib, Lamia; Bianchini, Lorenzo; Bluj, Michal; Busson, Philippe; Charlot, Claude; Daci, Nadir; Dahms, Torsten; Dalchenko, Mykhailo; Dobrzynski, Ludwik; Florent, Alice; Granier de Cassagnac, Raphael; Haguenauer, Maurice; Miné, Philippe; Mironov, Camelia; Naranjo, Ivo Nicolas; Nguyen, Matthew; Ochando, Christophe; Paganini, Pascal; Sabes, David; Salerno, Roberto; Sirois, Yves; Veelken, Christian; Zabi, Alexandre; Agram, Jean-Laurent; Andrea, Jeremy; Bloch, Daniel; Bodin, David; Brom, Jean-Marie; Cardaci, Marco; Chabert, Eric Christian; Collard, Caroline; Conte, Eric; Drouhin, Frédéric; Fontaine, Jean-Charles; Gelé, Denis; Goerlach, Ulrich; Juillot, Pierre; Le Bihan, Anne-Catherine; Van Hove, Pierre; Fassi, Farida; Mercier, Damien; Beauceron, Stephanie; Beaupere, Nicolas; Bondu, Olivier; Boudoul, Gaelle; Brochet, Sébastien; Chasserat, Julien; Chierici, Roberto; Contardo, Didier; Depasse, Pierre; El Mamouni, Houmani; Fay, Jean; Gascon, Susan; Gouzevitch, Maxime; Ille, Bernard; Kurca, Tibor; Lethuillier, Morgan; Mirabito, Laurent; Perries, Stephane; Sgandurra, Louis; Sordini, Viola; Tschudi, Yohann; Verdier, Patrice; Viret, Sébastien; Tsamalaidze, Zviad; Autermann, Christian; Beranek, Sarah; Calpas, Betty; Edelhoff, Matthias; Feld, Lutz; Heracleous, Natalie; Hindrichs, Otto; Jussen, Ruediger; Klein, Katja; Merz, Jennifer; Ostapchuk, Andrey; Perieanu, Adrian; Raupach, Frank; Sammet, Jan; Schael, Stefan; Sprenger, Daniel; Weber, Hendrik; Wittmer, Bruno; Zhukov, Valery; Ata, Metin; Caudron, Julien; Dietz-Laursonn, Erik; Duchardt, Deborah; Erdmann, Martin; Fischer, Robert; Güth, Andreas; Hebbeker, Thomas; Heidemann, Carsten; Hoepfner, Kerstin; Klingebiel, Dennis; Kreuzer, Peter; Merschmeyer, Markus; Meyer, Arnd; Olschewski, Mark; Papacz, Paul; Pieta, Holger; Reithler, Hans; Schmitz, Stefan Antonius; Sonnenschein, Lars; Steggemann, Jan; Teyssier, Daniel; Thüer, Sebastian; Weber, Martin; Bontenackels, Michael; Cherepanov, Vladimir; Erdogan, Yusuf; Flügge, Günter; Geenen, Heiko; Geisler, Matthias; Haj Ahmad, Wael; Hoehle, Felix; Kargoll, Bastian; Kress, Thomas; Kuessel, Yvonne; Lingemann, Joschka; Nowack, Andreas; Perchalla, Lars; Pooth, Oliver; Sauerland, Philip; Stahl, Achim; Aldaya Martin, Maria; Behr, Joerg; Behrenhoff, Wolf; Behrens, Ulf; Bergholz, Matthias; Bethani, Agni; Borras, Kerstin; Burgmeier, Armin; Cakir, Altan; Calligaris, Luigi; Campbell, Alan; Castro, Elena; Costanza, Francesco; Dammann, Dirk; Diez Pardos, Carmen; Eckerlin, Guenter; Eckstein, Doris; Flucke, Gero; Geiser, Achim; Glushkov, Ivan; Gunnellini, Paolo; Habib, Shiraz; Hauk, Johannes; Hellwig, Gregor; Jung, Hannes; Kasemann, Matthias; Katsas, Panagiotis; Kleinwort, Claus; Kluge, Hannelies; Knutsson, Albert; Krämer, Mira; Krücker, Dirk; Kuznetsova, Ekaterina; Lange, Wolfgang; Leonard, Jessica; Lohmann, Wolfgang; Lutz, Benjamin; Mankel, Rainer; Marfin, Ihar; Marienfeld, Markus; Melzer-Pellmann, Isabell-Alissandra; Meyer, Andreas Bernhard; Mnich, Joachim; Mussgiller, Andreas; Naumann-Emme, Sebastian; Novgorodova, Olga; Olzem, Jan; Perrey, Hanno; Petrukhin, Alexey; Pitzl, Daniel; Raspereza, Alexei; Ribeiro Cipriano, Pedro M; Riedl, Caroline; Ron, Elias; Rosin, Michele; Salfeld-Nebgen, Jakob; Schmidt, Ringo; Schoerner-Sadenius, Thomas; Sen, Niladri; Spiridonov, Alexander; Stein, Matthias; Walsh, Roberval; Wissing, Christoph; Blobel, Volker; Enderle, Holger; Erfle, Joachim; Gebbert, Ulla; Görner, Martin; Gosselink, Martijn; Haller, Johannes; Hermanns, Thomas; Höing, Rebekka Sophie; Kaschube, Kolja; Kaussen, Gordon; Kirschenmann, Henning; Klanner, Robert; Lange, Jörn; Nowak, Friederike; Peiffer, Thomas; Pietsch, Niklas; Rathjens, Denis; Sander, Christian; Schettler, Hannes; Schleper, Peter; Schlieckau, Eike; Schmidt, Alexander; Schröder, Matthias; Schum, Torben; Seidel, Markus; Sibille, Jennifer; Sola, Valentina; Stadie, Hartmut; Steinbrück, Georg; Thomsen, Jan; Vanelderen, Lukas; Barth, Christian; Berger, Joram; Böser, Christian; Chwalek, Thorsten; De Boer, Wim; Descroix, Alexis; Dierlamm, Alexander; Feindt, Michael; Guthoff, Moritz; Hackstein, Christoph; Hartmann, Frank; Hauth, Thomas; Heinrich, Michael; Held, Hauke; Hoffmann, Karl-Heinz; Husemann, Ulrich; Katkov, Igor; Komaragiri, Jyothsna Rani; Lobelle Pardo, Patricia; Martschei, Daniel; Mueller, Steffen; Müller, Thomas; Niegel, Martin; Nürnberg, Andreas; Oberst, Oliver; Oehler, Andreas; Ott, Jochen; Quast, Gunter; Rabbertz, Klaus; Ratnikov, Fedor; Ratnikova, Natalia; Röcker, Steffen; Schilling, Frank-Peter; Schott, Gregory; Simonis, Hans-Jürgen; Stober, Fred-Markus Helmut; Troendle, Daniel; Ulrich, Ralf; Wagner-Kuhr, Jeannine; Wayand, Stefan; Weiler, Thomas; Zeise, Manuel; Anagnostou, Georgios; Daskalakis, Georgios; Geralis, Theodoros; Kesisoglou, Stilianos; Kyriakis, Aristotelis; Loukas, Demetrios; Manolakos, Ioannis; Markou, Athanasios; Markou, Christos; Ntomari, Eleni; Gouskos, Loukas; Mertzimekis, Theodoros; Panagiotou, Apostolos; Saoulidou, Niki; Evangelou, Ioannis; Foudas, Costas; Kokkas, Panagiotis; Manthos, Nikolaos; Papadopoulos, Ioannis; Patras, Vaios; Bencze, Gyorgy; Hajdu, Csaba; Hidas, Pàl; Horvath, Dezso; Sikler, Ferenc; Veszpremi, Viktor; Vesztergombi, Gyorgy; Beni, Noemi; Czellar, Sandor; Molnar, Jozsef; Palinkas, Jozsef; Szillasi, Zoltan; Karancsi, János; Raics, Peter; Trocsanyi, Zoltan Laszlo; Ujvari, Balazs; Beri, Suman Bala; Bhatnagar, Vipin; Dhingra, Nitish; Gupta, Ruchi; Kaur, Manjit; Mehta, Manuk Zubin; Nishu, Nishu; Saini, Lovedeep Kaur; Sharma, Archana; Singh, Jasbir; Kumar, Ashok; Kumar, Arun; Ahuja, Sudha; Bhardwaj, Ashutosh; Choudhary, Brajesh C; Malhotra, Shivali; Naimuddin, Md; Ranjan, Kirti; Sharma, Varun; Shivpuri, Ram Krishen; Banerjee, Sunanda; Bhattacharya, Satyaki; Dutta, Suchandra; Gomber, Bhawna; Jain, Sandhya; Jain, Shilpi; Khurana, Raman; Sarkar, Subir; Sharan, Manoj; Abdulsalam, Abdulla; Dutta, Dipanwita; Kailas, Swaminathan; Kumar, Vineet; Mohanty, Ajit Kumar; Pant, Lalit Mohan; Shukla, Prashant; Aziz, Tariq; Ganguly, Sanmay; Guchait, Monoranjan; Gurtu, Atul; Maity, Manas; Majumder, Gobinda; Mazumdar, Kajari; Mohanty, Gagan Bihari; Parida, Bibhuti; Sudhakar, Katta; Wickramage, Nadeesha; Banerjee, Sudeshna; Dugad, Shashikant; Arfaei, Hessamaddin; Bakhshiansohi, Hamed; Etesami, Seyed Mohsen; Fahim, Ali; Hashemi, Majid; Hesari, Hoda; Jafari, Abideh; Khakzad, Mohsen; Mohammadi Najafabadi, Mojtaba; Paktinat Mehdiabadi, Saeid; Safarzadeh, Batool; Zeinali, Maryam; Abbrescia, Marcello; Barbone, Lucia; Calabria, Cesare; Chhibra, Simranjit Singh; Colaleo, Anna; Creanza, Donato; De Filippis, Nicola; De Palma, Mauro; Fiore, Luigi; Iaselli, Giuseppe; Maggi, Giorgio; Maggi, Marcello; Marangelli, Bartolomeo; My, Salvatore; Nuzzo, Salvatore; Pacifico, Nicola; Pompili, Alexis; Pugliese, Gabriella; Selvaggi, Giovanna; Silvestris, Lucia; Singh, Gurpreet; Venditti, Rosamaria; Verwilligen, Piet; Zito, Giuseppe; Abbiendi, Giovanni; Benvenuti, Alberto; Bonacorsi, Daniele; Braibant-Giacomelli, Sylvie; Brigliadori, Luca; Capiluppi, Paolo; Castro, Andrea; Cavallo, Francesca Romana; Cuffiani, Marco; Dallavalle, Gaetano-Marco; Fabbri, Fabrizio; Fanfani, Alessandra; Fasanella, Daniele; Giacomelli, Paolo; Grandi, Claudio; Guiducci, Luigi; Marcellini, Stefano; Masetti, Gianni; Meneghelli, Marco; Montanari, Alessandro; Navarria, Francesco; Odorici, Fabrizio; Perrotta, Andrea; Primavera, Federica; Rossi, Antonio; Rovelli, Tiziano; Siroli, Gian Piero; Tosi, Nicolò; Travaglini, Riccardo; Albergo, Sebastiano; Cappello, Gigi; Chiorboli, Massimiliano; Costa, Salvatore; Potenza, Renato; Tricomi, Alessia; Tuve, Cristina; Barbagli, Giuseppe; Ciulli, Vitaliano; Civinini, Carlo; D'Alessandro, Raffaello; Focardi, Ettore; Frosali, Simone; Gallo, Elisabetta; Gonzi, Sandro; Meschini, Marco; Paoletti, Simone; Sguazzoni, Giacomo; Tropiano, Antonio; Benussi, Luigi; Bianco, Stefano; Colafranceschi, Stefano; Fabbri, Franco; Piccolo, Davide; Fabbricatore, Pasquale; Musenich, Riccardo; Tosi, Silvano; Benaglia, Andrea; De Guio, Federico; Di Matteo, Leonardo; Fiorendi, Sara; Gennai, Simone; Ghezzi, Alessio; Malvezzi, Sandra; Manzoni, Riccardo Andrea; Martelli, Arabella; Massironi, Andrea; Menasce, Dario; Moroni, Luigi; Paganoni, Marco; Pedrini, Daniele; Ragazzi, Stefano; Redaelli, Nicola; Sala, Silvano; Tabarelli de Fatis, Tommaso; Buontempo, Salvatore; Carrillo Montoya, Camilo Andres; Cavallo, Nicola; De Cosa, Annapaola; Dogangun, Oktay; Fabozzi, Francesco; Iorio, Alberto Orso Maria; Lista, Luca; Meola, Sabino; Merola, Mario; Paolucci, Pierluigi; Azzi, Patrizia; Bacchetta, Nicola; Bisello, Dario; Branca, Antonio; Carlin, Roberto; Checchia, Paolo; Dorigo, Tommaso; Gasparini, Fabrizio; Gasparini, Ugo; Gozzelino, Andrea; Kanishchev, Konstantin; Lacaprara, Stefano; Lazzizzera, Ignazio; Margoni, Martino; Meneguzzo, Anna Teresa; Pazzini, Jacopo; Pozzobon, Nicola; Ronchese, Paolo; Simonetto, Franco; Torassa, Ezio; Tosi, Mia; Vanini, Sara; Zotto, Pierluigi; Zucchetta, Alberto; Zumerle, Gianni; Gabusi, Michele; Ratti, Sergio P; Riccardi, Cristina; Torre, Paola; Vitulo, Paolo; Biasini, Maurizio; Bilei, Gian Mario; Fanò, Livio; Lariccia, Paolo; Mantovani, Giancarlo; Menichelli, Mauro; Nappi, Aniello; Romeo, Francesco; Saha, Anirban; Santocchia, Attilio; Spiezia, Aniello; Taroni, Silvia; Azzurri, Paolo; Bagliesi, Giuseppe; Bernardini, Jacopo; Boccali, Tommaso; Broccolo, Giuseppe; Castaldi, Rino; D'Agnolo, Raffaele Tito; Dell'Orso, Roberto; Fiori, Francesco; Foà, Lorenzo; Giassi, Alessandro; Kraan, Aafke; Ligabue, Franco; Lomtadze, Teimuraz; Martini, Luca; Messineo, Alberto; Palla, Fabrizio; Rizzi, Andrea; Serban, Alin Titus; Spagnolo, Paolo; Squillacioti, Paola; Tenchini, Roberto; Tonelli, Guido; Venturi, Andrea; Verdini, Piero Giorgio; Barone, Luciano; Cavallari, Francesca; Del Re, Daniele; Diemoz, Marcella; Fanelli, Cristiano; Grassi, Marco; Longo, Egidio; Meridiani, Paolo; Micheli, Francesco; Nourbakhsh, Shervin; Organtini, Giovanni; Paramatti, Riccardo; Rahatlou, Shahram; Sigamani, Michael; Soffi, Livia; Amapane, Nicola; Arcidiacono, Roberta; Argiro, Stefano; Arneodo, Michele; Biino, Cristina; Cartiglia, Nicolo; Casasso, Stefano; Costa, Marco; Demaria, Natale; Mariotti, Chiara; Maselli, Silvia; Migliore, Ernesto; Monaco, Vincenzo; Musich, Marco; Obertino, Maria Margherita; Pastrone, Nadia; Pelliccioni, Mario; Potenza, Alberto; Romero, Alessandra; Ruspa, Marta; Sacchi, Roberto; Solano, Ada; Staiano, Amedeo; Belforte, Stefano; Candelise, Vieri; Casarsa, Massimo; Cossutti, Fabio; Della Ricca, Giuseppe; Gobbo, Benigno; Marone, Matteo; Montanino, Damiana; Penzo, Aldo; Schizzi, Andrea; Kim, Tae Yeon; Nam, Soon-Kwon; Chang, Sunghyun; Kim, Dong Hee; Kim, Gui Nyun; Kong, Dae Jung; Park, Hyangkyu; Son, Dong-Chul; Son, Taejin; Kim, Jae Yool; Kim, Zero Jaeho; Song, Sanghyeon; Choi, Suyong; Gyun, Dooyeon; Hong, Byung-Sik; Jo, Mihee; Kim, Hyunchul; Kim, Tae Jeong; Lee, Kyong Sei; Moon, Dong Ho; Park, Sung Keun; Roh, Youn; Choi, Minkyoo; Kim, Ji Hyun; Park, Chawon; Park, Inkyu; Park, Sangnam; Ryu, Geonmo; Choi, Young-Il; Choi, Young Kyu; Goh, Junghwan; Kim, Min Suk; Kwon, Eunhyang; Lee, Byounghoon; Lee, Jongseok; Lee, Sungeun; Seo, Hyunkwan; Yu, Intae; Bilinskas, Mykolas Jurgis; Grigelionis, Ignas; Janulis, Mindaugas; Juodagalvis, Andrius; Castilla-Valdez, Heriberto; De La Cruz-Burelo, Eduard; Heredia-de La Cruz, Ivan; Lopez-Fernandez, Ricardo; Martínez-Ortega, Jorge; Sánchez Hernández, Alberto; Villasenor-Cendejas, Luis Manuel; Carrillo Moreno, Salvador; Vazquez Valencia, Fabiola; Salazar Ibarguen, Humberto Antonio; Casimiro Linares, Edgar; Morelos Pineda, Antonio; Reyes-Santos, Marco A; Krofcheck, David; Bell, Alan James; Butler, Philip H; Doesburg, Robert; Reucroft, Steve; Silverwood, Hamish; Ahmad, Muhammad; Asghar, Muhammad Irfan; Butt, Jamila; Hoorani, Hafeez R; Khalid, Shoaib; Khan, Wajid Ali; Khurshid, Taimoor; Qazi, Shamona; Shah, Mehar Ali; Shoaib, Muhammad; Bialkowska, Helena; Boimska, Bozena; Frueboes, Tomasz; Górski, Maciej; Kazana, Malgorzata; Nawrocki, Krzysztof; Romanowska-Rybinska, Katarzyna; Szleper, Michal; Wrochna, Grzegorz; Zalewski, Piotr; Brona, Grzegorz; Bunkowski, Karol; Cwiok, Mikolaj; Dominik, Wojciech; Doroba, Krzysztof; Kalinowski, Artur; Konecki, Marcin; Krolikowski, Jan; Misiura, Maciej; Almeida, Nuno; Bargassa, Pedrame; David Tinoco Mendes, Andre; Faccioli, Pietro; Ferreira Parracho, Pedro Guilherme; Gallinaro, Michele; Seixas, Joao; Varela, Joao; Vischia, Pietro; Belotelov, Ivan; Bunin, Pavel; Golutvin, Igor; Gorbunov, Ilya; Kamenev, Alexey; Karjavin, Vladimir; Kozlov, Guennady; Lanev, Alexander; Malakhov, Alexander; Moisenz, Petr; Palichik, Vladimir; Perelygin, Victor; Savina, Maria; Shmatov, Sergey; Smirnov, Vitaly; Volodko, Anton; Zarubin, Anatoli; Evstyukhin, Sergey; Golovtsov, Victor; Ivanov, Yury; Kim, Victor; Levchenko, Petr; Murzin, Victor; Oreshkin, Vadim; Smirnov, Igor; Sulimov, Valentin; Uvarov, Lev; Vavilov, Sergey; Vorobyev, Alexey; Vorobyev, Andrey; Andreev, Yuri; Dermenev, Alexander; Gninenko, Sergei; Golubev, Nikolai; Kirsanov, Mikhail; Krasnikov, Nikolai; Matveev, Viktor; Pashenkov, Anatoli; Tlisov, Danila; Toropin, Alexander; Epshteyn, Vladimir; Erofeeva, Maria; Gavrilov, Vladimir; Kossov, Mikhail; Lychkovskaya, Natalia; Popov, Vladimir; Safronov, Grigory; Semenov, Sergey; Shreyber, Irina; Stolin, Viatcheslav; Vlasov, Evgueni; Zhokin, Alexander; Belyaev, Andrey; Boos, Edouard; Dubinin, Mikhail; Dudko, Lev; Ershov, Alexander; Gribushin, Andrey; Klyukhin, Vyacheslav; Kodolova, Olga; Lokhtin, Igor; Markina, Anastasia; Obraztsov, Stepan; Perfilov, Maxim; Petrushanko, Sergey; Popov, Andrey; Sarycheva, Ludmila; Savrin, Viktor; Snigirev, Alexander; Andreev, Vladimir; Azarkin, Maksim; Dremin, Igor; Kirakosyan, Martin; Leonidov, Andrey; Mesyats, Gennady; Rusakov, Sergey V; Vinogradov, Alexey; Azhgirey, Igor; Bayshev, Igor; Bitioukov, Sergei; Grishin, Viatcheslav; Kachanov, Vassili; Konstantinov, Dmitri; Krychkine, Victor; Petrov, Vladimir; Ryutin, Roman; Sobol, Andrei; Tourtchanovitch, Leonid; Troshin, Sergey; Tyurin, Nikolay; Uzunian, Andrey; Volkov, Alexey; Adzic, Petar; Djordjevic, Milos; Ekmedzic, Marko; Krpic, Dragomir; Milosevic, Jovan; Aguilar-Benitez, Manuel; Alcaraz Maestre, Juan; Arce, Pedro; Battilana, Carlo; Calvo, Enrique; Cerrada, Marcos; Chamizo Llatas, Maria; Colino, Nicanor; De La Cruz, Begona; Delgado Peris, Antonio; Domínguez Vázquez, Daniel; Fernandez Bedoya, Cristina; Fernández Ramos, Juan Pablo; Ferrando, Antonio; Flix, Jose; Fouz, Maria Cruz; Garcia-Abia, Pablo; Gonzalez Lopez, Oscar; Goy Lopez, Silvia; Hernandez, Jose M; Josa, Maria Isabel; Merino, Gonzalo; Puerta Pelayo, Jesus; Quintario Olmeda, Adrián; Redondo, Ignacio; Romero, Luciano; Santaolalla, Javier; Soares, Mara Senghi; Willmott, Carlos; Albajar, Carmen; Codispoti, Giuseppe; de Trocóniz, Jorge F; Brun, Hugues; Cuevas, Javier; Fernandez Menendez, Javier; Folgueras, Santiago; Gonzalez Caballero, Isidro; Lloret Iglesias, Lara; Piedra Gomez, Jonatan; Brochero Cifuentes, Javier Andres; Cabrillo, Iban Jose; Calderon, Alicia; Chuang, Shan-Huei; Duarte Campderros, Jordi; Felcini, Marta; Fernandez, Marcos; Gomez, Gervasio; Gonzalez Sanchez, Javier; Graziano, Alberto; Jorda, Clara; Lopez Virto, Amparo; Marco, Jesus; Marco, Rafael; Martinez Rivero, Celso; Matorras, Francisco; Munoz Sanchez, Francisca Javiela; Rodrigo, Teresa; Rodríguez-Marrero, Ana Yaiza; Ruiz-Jimeno, Alberto; Scodellaro, Luca; Vila, Ivan; Vilar Cortabitarte, Rocio; Abbaneo, Duccio; Auffray, Etiennette; Auzinger, Georg; Bachtis, Michail; Baillon, Paul; Ball, Austin; Barney, David; Benitez, Jose F; Bernet, Colin; Bianchi, Giovanni; Bloch, Philippe; Bocci, Andrea; Bonato, Alessio; Botta, Cristina; Breuker, Horst; Camporesi, Tiziano; Cerminara, Gianluca; Christiansen, Tim; Coarasa Perez, Jose Antonio; D'Enterria, David; Dabrowski, Anne; De Roeck, Albert; Di Guida, Salvatore; Dobson, Marc; Dupont-Sagorin, Niels; Elliott-Peisert, Anna; Frisch, Benjamin; Funk, Wolfgang; Georgiou, Georgios; Giffels, Manuel; Gigi, Dominique; Gill, Karl; Giordano, Domenico; Girone, Maria; Giunta, Marina; Glege, Frank; Gomez-Reino Garrido, Robert; Govoni, Pietro; Gowdy, Stephen; Guida, Roberto; Gundacker, Stefan; Hammer, Josef; Hansen, Magnus; Harris, Philip; Hartl, Christian; Harvey, John; Hegner, Benedikt; Hinzmann, Andreas; Innocente, Vincenzo; Janot, Patrick; Kaadze, Ketino; Karavakis, Edward; Kousouris, Konstantinos; Lecoq, Paul; Lee, Yen-Jie; Lenzi, Piergiulio; Lourenco, Carlos; Magini, Nicolo; Maki, Tuula; Malberti, Martina; Malgeri, Luca; Mannelli, Marcello; Masetti, Lorenzo; Meijers, Frans; Mersi, Stefano; Meschi, Emilio; Moser, Roland; Mozer, Matthias Ulrich; Mulders, Martijn; Musella, Pasquale; Nesvold, Erik; Orsini, Luciano; Palencia Cortezon, Enrique; Perez, Emmanuelle; Perrozzi, Luca; Petrilli, Achille; Pfeiffer, Andreas; Pierini, Maurizio; Pimiä, Martti; Piparo, Danilo; Polese, Giovanni; Quertenmont, Loic; Racz, Attila; Reece, William; Rodrigues Antunes, Joao; Rolandi, Gigi; Rovelli, Chiara; Rovere, Marco; Sakulin, Hannes; Santanastasio, Francesco; Schäfer, Christoph; Schwick, Christoph; Segoni, Ilaria; Sekmen, Sezen; Sharma, Archana; Siegrist, Patrice; Silva, Pedro; Simon, Michal; Sphicas, Paraskevas; Spiga, Daniele; Tsirou, Andromachi; Veres, Gabor Istvan; Vlimant, Jean-Roch; Wöhri, Hermine Katharina; Worm, Steven; Zeuner, Wolfram Dietrich; Bertl, Willi; Deiters, Konrad; Erdmann, Wolfram; Gabathuler, Kurt; Horisberger, Roland; Ingram, Quentin; Kaestli, Hans-Christian; König, Stefan; Kotlinski, Danek; Langenegger, Urs; Meier, Frank; Renker, Dieter; Rohe, Tilman; Bäni, Lukas; Bortignon, Pierluigi; Buchmann, Marco-Andrea; Casal, Bruno; Chanon, Nicolas; Deisher, Amanda; Dissertori, Günther; Dittmar, Michael; Donegà, Mauro; Dünser, Marc; Eller, Philipp; Eugster, Jürg; Freudenreich, Klaus; Grab, Christoph; Hits, Dmitry; Lecomte, Pierre; Lustermann, Werner; Marini, Andrea Carlo; Martinez Ruiz del Arbol, Pablo; Mohr, Niklas; Moortgat, Filip; Nägeli, Christoph; Nef, Pascal; Nessi-Tedaldi, Francesca; Pandolfi, Francesco; Pape, Luc; Pauss, Felicitas; Peruzzi, Marco; Ronga, Frederic Jean; Rossini, Marco; Sala, Leonardo; Sanchez, Ann - Karin; Starodumov, Andrei; Stieger, Benjamin; Takahashi, Maiko; Tauscher, Ludwig; Thea, Alessandro; Theofilatos, Konstantinos; Treille, Daniel; Urscheler, Christina; Wallny, Rainer; Weber, Hannsjoerg Artur; Wehrli, Lukas; Amsler, Claude; Chiochia, Vincenzo; De Visscher, Simon; Favaro, Carlotta; Ivova Rikova, Mirena; Kilminster, Benjamin; Millan Mejias, Barbara; Otiougova, Polina; Robmann, Peter; Snoek, Hella; Tupputi, Salvatore; Verzetti, Mauro; Chang, Yuan-Hann; Chen, Kuan-Hsin; Ferro, Cristina; Kuo, Chia-Ming; Li, Syue-Wei; Lin, Willis; Lu, Yun-Ju; Singh, Anil; Volpe, Roberta; Yu, Shin-Shan; Bartalini, Paolo; Chang, Paoti; Chang, You-Hao; Chang, Yu-Wei; Chao, Yuan; Chen, Kai-Feng; Dietz, Charles; Grundler, Ulysses; Hou, George Wei-Shu; Hsiung, Yee; Kao, Kai-Yi; Lei, Yeong-Jyi; Lu, Rong-Shyang; Majumder, Devdatta; Petrakou, Eleni; Shi, Xin; Shiu, Jing-Ge; Tzeng, Yeng-Ming; Wan, Xia; Wang, Minzu; Asavapibhop, Burin; Srimanobhas, Norraphat; Adiguzel, Aytul; Bakirci, Mustafa Numan; Cerci, Salim; Dozen, Candan; Dumanoglu, Isa; Eskut, Eda; Girgis, Semiray; Gokbulut, Gul; Gurpinar, Emine; Hos, Ilknur; Kangal, Evrim Ersin; Karaman, Turker; Karapinar, Guler; Kayis Topaksu, Aysel; Onengut, Gulsen; Ozdemir, Kadri; Ozturk, Sertac; Polatoz, Ayse; Sogut, Kenan; Sunar Cerci, Deniz; Tali, Bayram; Topakli, Huseyin; Vergili, Latife Nukhet; Vergili, Mehmet; Akin, Ilina Vasileva; Aliev, Takhmasib; Bilin, Bugra; Bilmis, Selcuk; Deniz, Muhammed; Gamsizkan, Halil; Guler, Ali Murat; Ocalan, Kadir; Ozpineci, Altug; Serin, Meltem; Sever, Ramazan; Surat, Ugur Emrah; Yalvac, Metin; Yildirim, Eda; Zeyrek, Mehmet; Gülmez, Erhan; Isildak, Bora; Kaya, Mithat; Kaya, Ozlem; Ozkorucuklu, Suat; Sonmez, Nasuf; Cankocak, Kerem; Levchuk, Leonid; Brooke, James John; Clement, Emyr; Cussans, David; Flacher, Henning; Frazier, Robert; Goldstein, Joel; Grimes, Mark; Heath, Greg P; Heath, Helen F; Kreczko, Lukasz; Metson, Simon; Newbold, Dave M; Nirunpong, Kachanon; Poll, Anthony; Senkin, Sergey; Smith, Vincent J; Williams, Thomas; Basso, Lorenzo; Bell, Ken W; Belyaev, Alexander; Brew, Christopher; Brown, Robert M; Cockerill, David JA; Coughlan, John A; Harder, Kristian; Harper, Sam; Jackson, James; Kennedy, Bruce W; Olaiya, Emmanuel; Petyt, David; Radburn-Smith, Benjamin Charles; Shepherd-Themistocleous, Claire; Tomalin, Ian R; Womersley, William John; Bainbridge, Robert; Ball, Gordon; Beuselinck, Raymond; Buchmuller, Oliver; Colling, David; Cripps, Nicholas; Cutajar, Michael; Dauncey, Paul; Davies, Gavin; Della Negra, Michel; Ferguson, William; Fulcher, Jonathan; Futyan, David; Gilbert, Andrew; Guneratne Bryer, Arlo; Hall, Geoffrey; Hatherell, Zoe; Hays, Jonathan; Iles, Gregory; Jarvis, Martyn; Karapostoli, Georgia; Lyons, Louis; Magnan, Anne-Marie; Marrouche, Jad; Mathias, Bryn; Nandi, Robin; Nash, Jordan; Nikitenko, Alexander; Pela, Joao; Pesaresi, Mark; Petridis, Konstantinos; Pioppi, Michele; Raymond, David Mark; Rogerson, Samuel; Rose, Andrew; Ryan, Matthew John; Seez, Christopher; Sharp, Peter; Sparrow, Alex; Stoye, Markus; Tapper, Alexander; Vazquez Acosta, Monica; Virdee, Tejinder; Wakefield, Stuart; Wardle, Nicholas; Whyntie, Tom; Chadwick, Matthew; Cole, Joanne; Hobson, Peter R; Khan, Akram; Kyberd, Paul; Leggat, Duncan; Leslie, Dawn; Martin, William; Reid, Ivan; Symonds, Philip; Teodorescu, Liliana; Turner, Mark; Hatakeyama, Kenichi; Liu, Hongxuan; Scarborough, Tara; Charaf, Otman; Henderson, Conor; Rumerio, Paolo; Avetisyan, Aram; Bose, Tulika; Fantasia, Cory; Heister, Arno; St John, Jason; Lawson, Philip; Lazic, Dragoslav; Rohlf, James; Sperka, David; Sulak, Lawrence; Alimena, Juliette; Bhattacharya, Saptaparna; Christopher, Grant; Cutts, David; Demiragli, Zeynep; Ferapontov, Alexey; Garabedian, Alex; Heintz, Ulrich; Jabeen, Shabnam; Kukartsev, Gennadiy; Laird, Edward; Landsberg, Greg; Luk, Michael; Narain, Meenakshi; Nguyen, Duong; Segala, Michael; Sinthuprasith, Tutanon; Speer, Thomas; Breedon, Richard; Breto, Guillermo; Calderon De La Barca Sanchez, Manuel; Chauhan, Sushil; Chertok, Maxwell; Conway, John; Conway, Rylan; Cox, Peter Timothy; Dolen, James; Erbacher, Robin; Gardner, Michael; Houtz, Rachel; Ko, Winston; Kopecky, Alexandra; Lander, Richard; Mall, Orpheus; Miceli, Tia; Pellett, Dave; Ricci-Tam, Francesca; Rutherford, Britney; Searle, Matthew; Smith, John; Squires, Michael; Tripathi, Mani; Vasquez Sierra, Ricardo; Yohay, Rachel; Andreev, Valeri; Cline, David; Cousins, Robert; Duris, Joseph; Erhan, Samim; Everaerts, Pieter; Farrell, Chris; Hauser, Jay; Ignatenko, Mikhail; Jarvis, Chad; Rakness, Gregory; Schlein, Peter; Traczyk, Piotr; Valuev, Vyacheslav; Weber, Matthias; Babb, John; Clare, Robert; Dinardo, Mauro Emanuele; Ellison, John Anthony; Gary, J William; Giordano, Ferdinando; Hanson, Gail; Liu, Hongliang; Long, Owen Rosser; Luthra, Arun; Nguyen, Harold; Paramesvaran, Sudarshan; Sturdy, Jared; Sumowidagdo, Suharyo; Wilken, Rachel; Wimpenny, Stephen; Andrews, Warren; Branson, James G; Cerati, Giuseppe Benedetto; Cittolin, Sergio; Evans, David; Holzner, André; Kelley, Ryan; Lebourgeois, Matthew; Letts, James; Macneill, Ian; Mangano, Boris; Padhi, Sanjay; Palmer, Christopher; Petrucciani, Giovanni; Pieri, Marco; Sani, Matteo; Sharma, Vivek; Simon, Sean; Sudano, Elizabeth; Tadel, Matevz; Tu, Yanjun; Vartak, Adish; Wasserbaech, Steven; Würthwein, Frank; Yagil, Avraham; Yoo, Jaehyeok; Barge, Derek; Bellan, Riccardo; Campagnari, Claudio; D'Alfonso, Mariarosaria; Danielson, Thomas; Flowers, Kristen; Geffert, Paul; Golf, Frank; Incandela, Joe; Justus, Christopher; Kalavase, Puneeth; Kovalskyi, Dmytro; Krutelyov, Vyacheslav; Lowette, Steven; Magaña Villalba, Ricardo; Mccoll, Nickolas; Pavlunin, Viktor; Ribnik, Jacob; Richman, Jeffrey; Rossin, Roberto; Stuart, David; To, Wing; West, Christopher; Apresyan, Artur; Bornheim, Adolf; Chen, Yi; Di Marco, Emanuele; Duarte, Javier; Gataullin, Marat; Ma, Yousi; Mott, Alexander; Newman, Harvey B; Rogan, Christopher; Spiropulu, Maria; Timciuc, Vladlen; Veverka, Jan; Wilkinson, Richard; Xie, Si; Yang, Yong; Zhu, Ren-Yuan; Azzolini, Virginia; Calamba, Aristotle; Carroll, Ryan; Ferguson, Thomas; Iiyama, Yutaro; Jang, Dong Wook; Liu, Yueh-Feng; Paulini, Manfred; Vogel, Helmut; Vorobiev, Igor; Cumalat, John Perry; Drell, Brian Robert; Ford, William T; Gaz, Alessandro; Luiggi Lopez, Eduardo; Smith, James; Stenson, Kevin; Ulmer, Keith; Wagner, Stephen Robert; Alexander, James; Chatterjee, Avishek; Eggert, Nicholas; Gibbons, Lawrence Kent; Heltsley, Brian; Hopkins, Walter; Khukhunaishvili, Aleko; Kreis, Benjamin; Mirman, Nathan; Nicolas Kaufman, Gala; Patterson, Juliet Ritchie; Ryd, Anders; Salvati, Emmanuele; Sun, Werner; Teo, Wee Don; Thom, Julia; Thompson, Joshua; Tucker, Jordan; Vaughan, Jennifer; Weng, Yao; Winstrom, Lucas; Wittich, Peter; Winn, Dave; Abdullin, Salavat; Albrow, Michael; Anderson, Jacob; Bauerdick, Lothar AT; Beretvas, Andrew; Berryhill, Jeffrey; Bhat, Pushpalatha C; Burkett, Kevin; Butler, Joel Nathan; Chetluru, Vasundhara; Cheung, Harry; Chlebana, Frank; Elvira, Victor Daniel; Fisk, Ian; Freeman, Jim; Gao, Yanyan; Green, Dan; Gutsche, Oliver; Hanlon, Jim; Harris, Robert M; Hirschauer, James; Hooberman, Benjamin; Jindariani, Sergo; Johnson, Marvin; Joshi, Umesh; Klima, Boaz; Kunori, Shuichi; Kwan, Simon; Leonidopoulos, Christos; Linacre, Jacob; Lincoln, Don; Lipton, Ron; Lykken, Joseph; Maeshima, Kaori; Marraffino, John Michael; Maruyama, Sho; Mason, David; McBride, Patricia; Mishra, Kalanand; Mrenna, Stephen; Musienko, Yuri; Newman-Holmes, Catherine; O'Dell, Vivian; Prokofyev, Oleg; Sexton-Kennedy, Elizabeth; Sharma, Seema; Spalding, William J; Spiegel, Leonard; Taylor, Lucas; Tkaczyk, Slawek; Tran, Nhan Viet; Uplegger, Lorenzo; Vaandering, Eric Wayne; Vidal, Richard; Whitmore, Juliana; Wu, Weimin; Yang, Fan; Yun, Jae Chul; Acosta, Darin; Avery, Paul; Bourilkov, Dimitri; Chen, Mingshui; Cheng, Tongguang; Das, Souvik; De Gruttola, Michele; Di Giovanni, Gian Piero; Dobur, Didar; Drozdetskiy, Alexey; Field, Richard D; Fisher, Matthew; Fu, Yu; Furic, Ivan-Kresimir; Gartner, Joseph; Hugon, Justin; Kim, Bockjoo; Konigsberg, Jacobo; Korytov, Andrey; Kropivnitskaya, Anna; Kypreos, Theodore; Low, Jia Fu; Matchev, Konstantin; Milenovic, Predrag; Mitselmakher, Guenakh; Muniz, Lana; Park, Myeonghun; Remington, Ronald; Rinkevicius, Aurelijus; Sellers, Paul; Skhirtladze, Nikoloz; Snowball, Matthew; Yelton, John; Zakaria, Mohammed; Gaultney, Vanessa; Hewamanage, Samantha; Lebolo, Luis Miguel; Linn, Stephan; Markowitz, Pete; Martinez, German; Rodriguez, Jorge Luis; Adams, Todd; Askew, Andrew; Bochenek, Joseph; Chen, Jie; Diamond, Brendan; Gleyzer, Sergei V; Haas, Jeff; Hagopian, Sharon; Hagopian, Vasken; Jenkins, Merrill; Johnson, Kurtis F; Prosper, Harrison; Veeraraghavan, Venkatesh; Weinberg, Marc; Baarmand, Marc M; Dorney, Brian; Hohlmann, Marcus; Kalakhety, Himali; Vodopiyanov, Igor; Yumiceva, Francisco; Adams, Mark Raymond; Anghel, Ioana Maria; Apanasevich, Leonard; Bai, Yuting; Bazterra, Victor Eduardo; Betts, Russell Richard; Bucinskaite, Inga; Callner, Jeremy; Cavanaugh, Richard; Evdokimov, Olga; Gauthier, Lucie; Gerber, Cecilia Elena; Hofman, David Jonathan; Khalatyan, Samvel; Lacroix, Florent; O'Brien, Christine; Silkworth, Christopher; Strom, Derek; Turner, Paul; Varelas, Nikos; Akgun, Ugur; Albayrak, Elif Asli; Bilki, Burak; Clarida, Warren; Duru, Firdevs; Griffiths, Scott; Merlo, Jean-Pierre; Mermerkaya, Hamit; Mestvirishvili, Alexi; Moeller, Anthony; Nachtman, Jane; Newsom, Charles Ray; Norbeck, Edwin; Onel, Yasar; Ozok, Ferhat; Sen, Sercan; Tan, Ping; Tiras, Emrah; Wetzel, James; Yetkin, Taylan; Yi, Kai; Barnett, Bruce Arnold; Blumenfeld, Barry; Bolognesi, Sara; Fehling, David; Giurgiu, Gavril; Gritsan, Andrei; Guo, Zijin; Hu, Guofan; Maksimovic, Petar; Swartz, Morris; Whitbeck, Andrew; Baringer, Philip; Bean, Alice; Benelli, Gabriele; Kenny Iii, Raymond Patrick; Murray, Michael; Noonan, Daniel; Sanders, Stephen; Stringer, Robert; Tinti, Gemma; Wood, Jeffrey Scott; Barfuss, Anne-Fleur; Bolton, Tim; Chakaberia, Irakli; Ivanov, Andrew; Khalil, Sadia; Makouski, Mikhail; Maravin, Yurii; Shrestha, Shruti; Svintradze, Irakli; Gronberg, Jeffrey; Lange, David; Rebassoo, Finn; Wright, Douglas; Baden, Drew; Calvert, Brian; Eno, Sarah Catherine; Gomez, Jaime; Hadley, Nicholas John; Kellogg, Richard G; Kirn, Malina; Kolberg, Ted; Lu, Ying; Marionneau, Matthieu; Mignerey, Alice; Pedro, Kevin; Peterman, Alison; Skuja, Andris; Temple, Jeffrey; Tonjes, Marguerite; Tonwar, Suresh C; Apyan, Aram; Bauer, Gerry; Bendavid, Joshua; Busza, Wit; Butz, Erik; Cali, Ivan Amos; Chan, Matthew; Dutta, Valentina; Gomez Ceballos, Guillelmo; Goncharov, Maxim; Kim, Yongsun; Klute, Markus; Krajczar, Krisztian; Levin, Andrew; Luckey, Paul David; Ma, Teng; Nahn, Steve; Paus, Christoph; Ralph, Duncan; Roland, Christof; Roland, Gunther; Rudolph, Matthew; Stephans, George; Stöckli, Fabian; Sumorok, Konstanty; Sung, Kevin; Velicanu, Dragos; Wenger, Edward Allen; Wolf, Roger; Wyslouch, Bolek; Yang, Mingming; Yilmaz, Yetkin; Yoon, Sungho; Zanetti, Marco; Zhukova, Victoria; Cooper, Seth; Dahmes, Bryan; De Benedetti, Abraham; Franzoni, Giovanni; Gude, Alexander; Kao, Shih-Chuan; Klapoetke, Kevin; Kubota, Yuichi; Mans, Jeremy; Pastika, Nathaniel; Rusack, Roger; Sasseville, Michael; Singovsky, Alexander; Tambe, Norbert; Turkewitz, Jared; Cremaldi, Lucien Marcus; Kroeger, Rob; Perera, Lalith; Rahmat, Rahmat; Sanders, David A; Avdeeva, Ekaterina; Bloom, Kenneth; Bose, Suvadeep; Claes, Daniel R; Dominguez, Aaron; Eads, Michael; Keller, Jason; Kravchenko, Ilya; Lazo-Flores, Jose; Malik, Sudhir; Snow, Gregory R; Godshalk, Andrew; Iashvili, Ia; Jain, Supriya; Kharchilava, Avto; Kumar, Ashish; Rappoccio, Salvatore; Alverson, George; Barberis, Emanuela; Baumgartel, Darin; Chasco, Matthew; Haley, Joseph; Nash, David; Orimoto, Toyoko; Trocino, Daniele; Wood, Darien; Zhang, Jinzhong; Anastassov, Anton; Hahn, Kristan Allan; Kubik, Andrew; Lusito, Letizia; Mucia, Nicholas; Odell, Nathaniel; Ofierzynski, Radoslaw Adrian; Pollack, Brian; Pozdnyakov, Andrey; Schmitt, Michael; Stoynev, Stoyan; Velasco, Mayda; Won, Steven; Antonelli, Louis; Berry, Douglas; Brinkerhoff, Andrew; Chan, Kwok Ming; Hildreth, Michael; Jessop, Colin; Karmgard, Daniel John; Kolb, Jeff; Lannon, Kevin; Luo, Wuming; Lynch, Sean; Marinelli, Nancy; Morse, David Michael; Pearson, Tessa; Planer, Michael; Ruchti, Randy; Slaunwhite, Jason; Valls, Nil; Wayne, Mitchell; Wolf, Matthias; Bylsma, Ben; Durkin, Lloyd Stanley; Hill, Christopher; Hughes, Richard; Kotov, Khristian; Ling, Ta-Yung; Puigh, Darren; Rodenburg, Marissa; Vuosalo, Carl; Williams, Grayson; Winer, Brian L; Berry, Edmund; Elmer, Peter; Halyo, Valerie; Hebda, Philip; Hegeman, Jeroen; Hunt, Adam; Jindal, Pratima; Koay, Sue Ann; Lopes Pegna, David; Lujan, Paul; Marlow, Daniel; Medvedeva, Tatiana; Mooney, Michael; Olsen, James; Piroué, Pierre; Quan, Xiaohang; Raval, Amita; Saka, Halil; Stickland, David; Tully, Christopher; Werner, Jeremy Scott; Zuranski, Andrzej; Brownson, Eric; Lopez, Angel; Mendez, Hector; Ramirez Vargas, Juan Eduardo; Alagoz, Enver; Barnes, Virgil E; Benedetti, Daniele; Bolla, Gino; Bortoletto, Daniela; De Mattia, Marco; Everett, Adam; Hu, Zhen; Jones, Matthew; Koybasi, Ozhan; Kress, Matthew; Laasanen, Alvin T; Leonardo, Nuno; Maroussov, Vassili; Merkel, Petra; Miller, David Harry; Neumeister, Norbert; Shipsey, Ian; Silvers, David; Svyatkovskiy, Alexey; Vidal Marono, Miguel; Yoo, Hwi Dong; Zablocki, Jakub; Zheng, Yu; Guragain, Samir; Parashar, Neeti; Adair, Antony; Akgun, Bora; Boulahouache, Chaouki; Ecklund, Karl Matthew; Geurts, Frank JM; Li, Wei; Padley, Brian Paul; Redjimi, Radia; Roberts, Jay; Zabel, James; Betchart, Burton; Bodek, Arie; Chung, Yeon Sei; Covarelli, Roberto; de Barbaro, Pawel; Demina, Regina; Eshaq, Yossof; Ferbel, Thomas; Garcia-Bellido, Aran; Goldenzweig, Pablo; Han, Jiyeon; Harel, Amnon; Miner, Daniel Carl; Vishnevskiy, Dmitry; Zielinski, Marek; Bhatti, Anwar; Ciesielski, Robert; Demortier, Luc; Goulianos, Konstantin; Lungu, Gheorghe; Malik, Sarah; Mesropian, Christina; Arora, Sanjay; Barker, Anthony; Chou, John Paul; Contreras-Campana, Christian; Contreras-Campana, Emmanuel; Duggan, Daniel; Ferencek, Dinko; Gershtein, Yuri; Gray, Richard; Halkiadakis, Eva; Hidas, Dean; Lath, Amitabh; Panwalkar, Shruti; Park, Michael; Patel, Rishi; Rekovic, Vladimir; Robles, Jorge; Rose, Keith; Salur, Sevil; Schnetzer, Steve; Seitz, Claudia; Somalwar, Sunil; Stone, Robert; Thomas, Scott; Walker, Matthew; Cerizza, Giordano; Hollingsworth, Matthew; Spanier, Stefan; Yang, Zong-Chang; York, Andrew; Eusebi, Ricardo; Flanagan, Will; Gilmore, Jason; Kamon, Teruki; Khotilovich, Vadim; Montalvo, Roy; Osipenkov, Ilya; Pakhotin, Yuriy; Perloff, Alexx; Roe, Jeffrey; Safonov, Alexei; Sakuma, Tai; Sengupta, Sinjini; Suarez, Indara; Tatarinov, Aysen; Toback, David; Akchurin, Nural; Damgov, Jordan; Dragoiu, Cosmin; Dudero, Phillip Russell; Jeong, Chiyoung; Kovitanggoon, Kittikul; Lee, Sung Won; Libeiro, Terence; Volobouev, Igor; Appelt, Eric; Delannoy, Andrés G; Florez, Carlos; Greene, Senta; Gurrola, Alfredo; Johns, Willard; Kurt, Pelin; Maguire, Charles; Melo, Andrew; Sharma, Monika; Sheldon, Paul; Snook, Benjamin; Tuo, Shengquan; Velkovska, Julia; Arenton, Michael Wayne; Balazs, Michael; Boutle, Sarah; Cox, Bradley; Francis, Brian; Goodell, Joseph; Hirosky, Robert; Ledovskoy, Alexander; Lin, Chuanzhe; Neu, Christopher; Wood, John; Gollapinni, Sowjanya; Harr, Robert; Karchin, Paul Edmund; Kottachchi Kankanamge Don, Chamath; Lamichhane, Pramod; Sakharov, Alexandre; Anderson, Michael; Belknap, Donald; Borrello, Laura; Carlsmith, Duncan; Cepeda, Maria; Dasu, Sridhara; Friis, Evan; Gray, Lindsey; Grogg, Kira Suzanne; Grothe, Monika; Hall-Wilton, Richard; Herndon, Matthew; Hervé, Alain; Klabbers, Pamela; Klukas, Jeffrey; Lanaro, Armando; Lazaridis, Christos; Loveless, Richard; Mohapatra, Ajit; Ojalvo, Isabel; Palmonari, Francesco; Pierro, Giuseppe Antonio; Ross, Ian; Savin, Alexander; Smith, Wesley H; Swanson, Joshua

    2013-01-01

    In this paper, a search for supersymmetry (SUSY) is presented in events with two opposite-sign isolated leptons in the final state, accompanied by hadronic jets and missing transverse energy. An artificial neural network is employed to discriminate possible SUSY signals from standard model background. The analysis uses a data sample collected with the CMS detector during the 2011 LHC run, corresponding to an integrated luminosity of 4.98 inverse femtobarns of proton-proton collisions at the center of mass energy of 7 TeV. Compared to other CMS analyses, this one uses relaxed criteria on missing transverse energy (missing ET > 40 GeV) and total hadronic transverse energy (HT > 120 GeV), thus probing different regions of parameter space. Agreement is found between standard model expectation and observation, yielding limits in the context of the constrained mininal supersymmetric standard model and on a set of simplified models.

  15. Modeling the Energy Performance of Event-Driven Wireless Sensor Network by Using Static Sink and Mobile Sink

    Directory of Open Access Journals (Sweden)

    Mitsuji Matsumoto

    2010-12-01

    Full Text Available Wireless Sensor Networks (WSNs designed for mission-critical applications suffer from limited sensing capacities, particularly fast energy depletion. Regarding this, mobile sinks can be used to balance the energy consumption in WSNs, but the frequent location updates of the mobile sinks can lead to data collisions and rapid energy consumption for some specific sensors. This paper explores an optimal barrier coverage based sensor deployment for event driven WSNs where a dual-sink model was designed to evaluate the energy performance of not only static sensors, but Static Sink (SS and Mobile Sinks (MSs simultaneously, based on parameters such as sensor transmission range r and the velocity of the mobile sink v, etc. Moreover, a MS mobility model was developed to enable SS and MSs to effectively collaborate, while achieving spatiotemporal energy performance efficiency by using the knowledge of the cumulative density function (cdf, Poisson process and M/G/1 queue. The simulation results verified that the improved energy performance of the whole network was demonstrated clearly and our eDSA algorithm is more efficient than the static-sink model, reducing energy consumption approximately in half. Moreover, we demonstrate that our results are robust to realistic sensing models and also validate the correctness of our results through extensive simulations.

  16. Optimum Sleep-Wake Scheduling of Sensors for Quickest Event Detection in Small Extent Wireless Sensor Networks

    CERN Document Server

    Karumbu, Premkumar

    2011-01-01

    We consider the problem of quickest event detection with sleep-wake scheduling in small extent wireless sensor networks in which, at each time slot, each sensor node in the awake state observes a sample and communicates the information to the fusion centre. The sensor nodes in the sleep state do not sample or communicate any information to the fusion centre (FC), thereby conserving energy. At each time slot, the FC, after having received the samples from the sensor nodes in the wake state, makes a decision to stop (and thus declare that the event has occurred) or to continue observing. If it decides to continue, the FC also makes the decision of choosing the number of sensor nodes to be in the wake state in the next time slot. We consider three alternative approaches to the problem of choosing the number of sensor nodes to be in the wake state in time slot k+1, based on the information available at time slot k, namely, 1. optimal control of M_{k+1}, the number of sensor nodes to be in the awake state in time ...

  17. Adaptive Neural Network-Based Event-Triggered Control of Single-Input Single-Output Nonlinear Discrete-Time Systems.

    Science.gov (United States)

    Sahoo, Avimanyu; Xu, Hao; Jagannathan, Sarangapani

    2016-01-01

    This paper presents a novel adaptive neural network (NN) control of single-input and single-output uncertain nonlinear discrete-time systems under event sampled NN inputs. In this control scheme, the feedback signals are transmitted, and the NN weights are tuned in an aperiodic manner at the event sampled instants. After reviewing the NN approximation property with event sampled inputs, an adaptive state estimator (SE), consisting of linearly parameterized NNs, is utilized to approximate the unknown system dynamics in an event sampled context. The SE is viewed as a model and its approximated dynamics and the state vector, during any two events, are utilized for the event-triggered controller design. An adaptive event-trigger condition is derived by using both the estimated NN weights and a dead-zone operator to determine the event sampling instants. This condition both facilitates the NN approximation and reduces the transmission of feedback signals. The ultimate boundedness of both the NN weight estimation error and the system state vector is demonstrated through the Lyapunov approach. As expected, during an initial online learning phase, events are observed more frequently. Over time with the convergence of the NN weights, the inter-event times increase, thereby lowering the number of triggered events. These claims are illustrated through the simulation results.

  18. A study of epileptogenic network structures in rat hippocampal cultures using first spike latencies during synchronization events

    International Nuclear Information System (INIS)

    Study of hypersynchronous activity is of prime importance for combating epilepsy. Studies on network structure typically reconstruct the network by measuring various aspects of the interaction between neurons and subsequently measure the properties of the reconstructed network. In sub-sampled networks such methods lead to significant errors in reconstruction. Using rat hippocampal neurons cultured on a multi-electrode array dish and a glutamate injury model of epilepsy in vitro, we studied synchronous activity in neuronal networks. Using the first spike latencies in various neurons during a network burst, we extract various recurring spatio-temporal onset patterns in the networks. Comparing the patterns seen in control and injured networks, we observe that injured networks express a wide diversity in their foci (origin) and activation pattern, while control networks show limited diversity. Furthermore, we note that onset patterns in glutamate injured networks show a positive correlation between synchronization delay and physical distance between neurons, while control networks do not. (paper)

  19. Research on the Antiflaming Effect of Network Group Event%群体性事件网络助燃作用研究

    Institute of Scientific and Technical Information of China (English)

    胡圣方

    2015-01-01

    the complicated relations, the flattered media,the extreme Internet users are the main factors fule the network group events fire;the number logic, the witness logic the damage logic are the main logic of network group events for combustion;“inverted” type,“explosion” type,“mashup” type are the main modes of network group events for combustion. It is the possible mechanism of gover⁃ning Internet rumors by law,reshaping media respowsibility,guiding public opinion on line to improve the antiflaming of network group events.%关系复杂化、媒体迎合化、网民偏激化是群体性事件网络助燃的主要因素;数量逻辑、见证逻辑、损害逻辑是群体性事件网络助燃的主要逻辑;“倒置”式、“闪爆”式、“混搭”式是群体性事件网络助燃的主要模式。依法治理网络谣言、重塑媒体责任担当、引导网络舆论推进改革是群体性事件网络阻燃的可行机制。

  20. Topic Discovery of Network Group Events Based on Ontology%基于本体的网络群体性事件主题发现研究

    Institute of Scientific and Technical Information of China (English)

    黄炜; 程宝生; 杨青

    2012-01-01

    In the environment of network information which is incompleteness and colloquial style, the diversity and complexity of Chinese semanteme are more prominent. The existing Web information analysis method is based on key word matching and traditional statistics, its topic discovery rate can not reach the requirement of network group events' warning. As network information topic's cognitive extent is large, the current improved text cluster's description of semanteme is also imperfect. So this paper introduces the relative technology of ontology and semantic computation to network group events' topic discovery research and produces empirical research by establishing a domain ontology of food safety. The results show that the method can obtain topic information effectively and it is helpful to the topic discovery of network group events.%将本体论和语义计算的相关技术引入到网络群体性事件的主题发现研究中,并通过构建食品安全领域本体进行实证研究。实验结果表明,该方法能够有效地获取主题信息,有助于实现网络群体性事件的主题发现。

  1. Neural network approach to the prediction of seismic events based on low-frequency signal monitoring of the Kuril-Kamchatka and Japanese regions

    Directory of Open Access Journals (Sweden)

    Irina Popova

    2013-08-01

    Full Text Available Very-low-frequency/ low-frequency (VLF/LF sub-ionospheric radiowave monitoring has been widely used in recent years to analyze earthquake preparatory processes. The connection between earthquakes with M ≥5.5 and nighttime disturbances of signal amplitude and phase has been established. Thus, it is possible to use nighttime anomalies of VLF/LF signals as earthquake precursors. Here, we propose a method for estimation of the VLF/LF signal sensitivity to seismic processes using a neural network approach. We apply the error back-propagation technique based on a three-level perceptron to predict a seismic event. The back-propagation technique involves two main stages to solve the problem; namely, network training, and recognition (the prediction itself. To train a neural network, we first create a so-called ‘training set’. The ‘teacher’ specifies the correspondence between the chosen input and the output data. In the present case, a representative database includes both the LF data received over three years of monitoring at the station in Petropavlovsk-Kamchatsky (2005-2007, and the seismicity parameters of the Kuril-Kamchatka and Japanese regions. At the first stage, the neural network established the relationship between the characteristic features of the LF signal (the mean and dispersion of a phase and an amplitude at nighttime for a few days before a seismic event and the corresponding level of correlation with a seismic event, or the absence of a seismic event. For the second stage, the trained neural network was applied to predict seismic events from the LF data using twelve time intervals in 2004, 2005, 2006 and 2007. The results of the prediction are discussed.

  2. Fault-Tolerant Event Monitoring in Wireless Sensor Networks%无线传感器网络中可容错的事件监测算法

    Institute of Scientific and Technical Information of China (English)

    任倩倩; 李建中; 程思瑶

    2012-01-01

    Event monitoring is an important issue in wireless sensor networks, however, the limits of sensor networks and the uncertainty existed in sensed data propose challenges for it. This paper analyzes the uncertainty existed in sensor networks and presents fault-tolerant event monitoring mechanism. We first introduce the fault-tolerant event detection and monitoring nodes choosing algorithms, and then estimate the event appearing area under the condition of static sensor nodes and moving sensor nodes. Finally, we evaluate our algorithms via a serial of simulations. The experimental results show that the proposed algorithms can obtain optimal performance in event monitoring.%事件监测是传感器网络研究中的一个重要问题,传感器网络自身的局限性以及感知数据的非确定性向事件监测技术提出了挑战.文中分析了传感器网络中存在的各种非确定性,引入可容错的事件监测机制.文中首先提出可容错的事件发现和参与事件监测节点选择算法.在此基础上,提出可容错的事件发生区域估算算法.算法对于动态传感器网络具有较好监测效果.最后通过大量模拟实验验证了所提出算法的性能.

  3. EEULA: AN ENERGY-AWARE EVENT-DRIVEN UNICAST ALGORITHM FOR WIRELESS SENSOR NETWORK BY LEARNING AUTOMATA

    OpenAIRE

    Ali Azimi Kashani; Ali Mohamad Monjezi Noori

    2016-01-01

    Energy consumption is one of the major challenges in wireless sensor networks, thus necessitating an approach for its minimization and for load balancing data. The network lifetime ends with the death of one of its nodes, which, in turn, causes energy depletion in and partition of the network. Furthermore, the total energy consumption of nodes depends on their location; that is, because of the loaded data, energy discharge in the nodes close to the base station occurs faster than other nodes,...

  4. Reliable Maintanace of Wireless Sensor Networks for Event-detection Applications%事件检测型传感器网络的可靠性维护

    Institute of Scientific and Technical Information of China (English)

    胡四泉; 杨金阳; 王俊峰

    2011-01-01

    The reliability maintannace of the wireless sensor network is a key point to keep the alarm messages delivered reliably to the monitor center on time in a event-detection application. Based on the unreliable links in the wireless sensor network and the network charateristics of an event detection application,MPRRM,a multiple path redundant reliability maintanace algoritm was proposed in this paper. Both analytical and simulation results show that the MPRRM algorithm is superior to the previous published solutions in the metrics of reliability, false positive rate, latency and message overhead.%传感器网络(Wireless Sensor Networks,WSN)的事件检测型应用中,如何通过可靠性维护来保证在检测到事件时报警信息能及时、可靠地传输到监控主机至关重要.通过对不可靠的无线链路和网络传输的分析,提出多路冗余可靠性维护算法MPRRM.通过解析方法和仿真分析证明,该算法在可靠性、误报率、延迟和消息开销量上比同类算法具有优势.

  5. STRATEGIES FOCUSING ON VALUE NETWORK: AN ANALYSIS OF EVENT PRODUCTION COMPANIEShttp://dx.doi.org/10.5585/riae.v9i1.1658

    Directory of Open Access Journals (Sweden)

    Marcos Roberto Piscopo

    2010-07-01

    Full Text Available The purpose of this article was to demonstrate that companies which compete within dynamic industries do not only adopt a single strategy. Instead, they pursue a number of strategies focusing on the value net rather than on the value chain. We carried out a survey with 47 event-planning firms based in the City of Sao Paulo and we have discovered five distinct groups of firms pursuing different strategies. Our findings support our hypothesis for the searched companies and also demonstrate how the Delta Model by Hax and Wilde II (2001 is useful to explain companies’ strategic configuration. Particularly within the event industry, we have observed that companies are migrating to strategies based upon the value net. This study contributes to managing approaches concerning the challenges faced by event firms when learning how to adopt different strategic positions based upon both the value network and the value chain, in order to obtain and sustain competitive advantages in dynamic markets.

  6. News CPD Event: Teaching day gives new perspectives Workshop: IOP network devolops its ideas Conference: Conference offers much to teachers Event: Physics is made easy in Liverpool Communication: IOSTE debates the complexities of STE Conference: Teaching event excites in Exeter Meeting Invitation: Wales physics meeting invites bookings CPD Event: Science teachers get hands on with development Research: Conference highlights liquid crytstal research in teaching Education: Teachers give positive feedback Science Fair: Science fair brings physics to students Teaching: Conference explores trends in teaching Forthcoming events

    Science.gov (United States)

    2010-09-01

    CPD Event: Teaching day gives new perspectives Workshop: IOP network devolops its ideas Conference: Conference offers much to teachers Event: Physics is made easy in Liverpool Communication: IOSTE debates the complexities of STE Conference: Teaching event excites in Exeter Meeting Invitation: Wales physics meeting invites bookings CPD Event: Science teachers get hands on with development Research: Conference highlights liquid crytstal research in teaching Education: Teachers give positive feedback Science Fair: Science fair brings physics to students Teaching: Conference explores trends in teaching Forthcoming events

  7. Report related to the mitigation of the impact of major climate events on the operation of electricity distribution networks

    International Nuclear Information System (INIS)

    After a presentation of the main characteristics of the French electricity distribution network, this report discusses the lessons learnt from recent tempests which occurred in 1999, 2008, 2009 and 2010. It identifies measures and technologies to be implemented to improve the network security. Then, it shows that the present institutional context does not lend itself to an optimisation of investment choices in terms of security. The last part discusses the security plan sizing which needs a better assessment of tempest-related risks

  8. Source Mechanism of Long Period events recorded by a high density seismic network during the 2008 eruption on Mt Etna

    CERN Document Server

    De Barros, Louis; Bean, C J; O'Brien, Gareth; Saccorotti, Gilberto; Métaxian, J -P; Zucarello, Luciano; Patanè, Domenico; 10.1029/2010JB007629

    2010-01-01

    129 Long Period (LP) events, divided into two families of similar events, were recorded by the 50 stations deployed on Mount Etna in the second half of June 2008. During this period lava was flowing from a lateral fracture after a summit strombolian eruption. In order to understand the mechanisms of these events, we perform moment tensor inversions. Inversions are initially kept unconstrained to estimate the most likely mechanism. Numerical tests show that unconstrained inversion leads to reliable moment tensor solutions because of the close proximity of numerous stations to the source positions. However, single forces cannot be accurately determined as they are very sensitive to uncertainties in the velocity model. Constrained inversions for a crack, a pipe or an explosion then allow us to accurately determine the structural orientations of the source mechanisms. Both numerical tests and LP event inversions emphasise the importance of using stations located as close as possible to the source. Inversions for ...

  9. On the impact of RN network coverage on event selection and data fusion during the 2009 National Data Centres Preparedness Exercise

    Science.gov (United States)

    Becker, Andreas; Krysta, Monika; Auer, Matthias; Brachet, Nicolas; Ceranna, Lars; Gestermann, Nicolai; Nikkinen, Mika; Zähringer, Matthias

    2010-05-01

    The so-called National Data Centres (NDCs) to the Provisional Technical Secretariat of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty (CTBT) Organization are in charge to provide for the final judgement on the CTBT relevance of explosion events encountered in the PTS International Monitoring System (IMS). The latter is a 321 stations network set-up by the PTS (to date completion level: 80%) in order to globally monitor for occurrence of CTBT relevant seismo-acoustic and radionuclide signals. In doing so, NDCs learn about any seismo-acoustic or radionuclide event by active retrieval or subscription to corresponding event lists and products provided by the International Data Centre (IDC) to the PTS. To prepare for their instrumental role in case of a CTBT relevant event, the NDCs jointly conduct annually so-called NDC Preparedness Exercises. In 2009, NDC Germany was in charge to lead the exercise and to choose a seismo-acoustic event out of the list of events provided by the PTS (Gestermann et al., EGU2010-13067). The novelty in this procedure was that also the infrasound readings and the monitoring coverage of existing (certified) radionuclide stations into the area of consideration were taken into account during the event selection process (Coyne et al., EGU2010-12660). Hence, the event finally chosen and examined took place near Kara-Zhyra mine in Eastern Kazakhstan on 28 November 2009 around 07:20:31 UTC (Event-ID 5727516). NDC Austria performed forward atmospheric transport modelling in order to predict RN measurements that should have occurred in the radionuclide IMS. In doing so the fictitious case that there would have been a release of radionuclides taking place at the same location (Wotawa and Schraik, 2010; EGU2010-4907) in a strength being typical for a non-contained nuclear explosion is examined. The stations indicated should then be analysed for their actual radionuclide readings in order to confirm the non nuclear character of

  10. Asian Dust Storm Events of 2001 and Associated Pollution Observed in New England by the AIRMAP Monitoring Network

    Science.gov (United States)

    Debell, L. J.; Vozzella, M. E.; Talbot, R. W.; Dibb, J. E.

    2002-12-01

    The Atmospheric Investigation, Regional Modeling, Analysis and Prediction (AIRMAP) program is operating 4 monitoring sites in New Hampshire, located at Fort Constitution (FC)(43.07oN, 70.71oW, 5m elevation), Thompson Farm (TF) (43.11oN, 70.95oW, 21m elevation), Castle Springs (CS) (43.75oN,71.35oW, 406m elevation) and Mount Washington (MW)(44.267oN, 71.30oW, 1909m elevation). Three chemically distinct, statistically extreme, regional scale dust aerosol events were observed at all four AIRMAP monitoring stations in NH between 4/18/01 and 5/13/01 (UTC). All three events, at all four sites, had days where the 24 hr bulk aerosol samples had Ca2+ concentrations that exceeded at least the 95th percentile of the site-specific, multi-year datasets. NO3- and SO42- were also enhanced above typical levels, ranging from above the 75th to above the 99th percentile. During all three events, mixing ratios of the gas phase pollutants O3 and CO were compared to mixing ratios on either side of the events. During event 1,enhancements above background levels were approximately 130 ppbv for CO and 30 ppbv for O3, very similar to the CO values in apparent Asian dust plumes sampled over Colorado at 6-7 km by aircraft measurements (http://www.cmdl.noaa.gov/info/asiandust.html); enhancements during events 2 and 3 were similar to event 1. The maximum elemental carbon value ever observed at TF, 0.97 μg/m3, occurred during the peak day of event 1. Elemental carbon was not substantially elevated during event 2 and no data were collected during event 3. Elemental ratios, determined by PIXE, on filters from events 1 and 3 were compared pairwise to each other and to published samples attributed to Asian dust storms. The AIRMAP samples collected on the same date at different sites showed good statistical agreement whereas samples collected at the same site on different dates show only moderate correlation. Of 17 published samples of Asian dust storm aerosol, collected well outside of the major

  11. Effect of densifying the GNSS GBAS network on monitoring the troposphere zenith total delay and precipitable water vapour content during severe weather events

    Science.gov (United States)

    Kapłon, Jan; Stankunavicius, Gintautas

    2016-04-01

    The dense ground based augmentation networks can provide the important information for monitoring the state of neutral atmosphere. The GNSS&METEO research group at Wroclaw University of Environmental and Life Sciences (WUELS) is operating the self-developed near real-time service estimating the troposphere parameters from GNSS data for the area of Poland. The service is operational since December 2012 and it's results calculated from ASG-EUPOS GBAS network (120 stations) data are supporting the EGVAP (http://egvap.dmi.dk) project. At first the zenith troposphere delays (ZTD) were calculated in hourly intervals, but since September 2015 the service was upgraded to include SmartNet GBAS network (Leica Geosystems Polska - 150 stations). The upgrade included as well: increasing the result interval to 30 minutes, upgrade from Bernese GPS Software v. 5.0 to Bernese GNSS Software v. 5.2 and estimation of the ZTD and it's horizontal gradients. Processing includes nowadays 270 stations. The densification of network from 70 km of mean distance between stations to 40 km created the opportunity to investigate on it's impact on resolution of estimated ZTD and integrated water vapour content (IWV) fields during the weather events of high intensity. Increase in density of ZTD measurements allows to define better the meso-scale features within different synoptic systems (e.g. frontal waves, meso-scale convective systems, squall lines etc). These meso-scale structures, as a rule are short living but fast developing and hardly predictable by numerical models. Even so, such limited size systems can produce very hazardous phenomena - like widespread squalls and thunderstorms, tornadoes, heavy rains, snowfalls, hail etc. because of prevalence of Cb clouds with high concentration of IWV. Study deals with two meteorological events: 2015-09-01 with the devastating squalls and rainfall bringing 2M Euro loss of property in northern Poland and 2015-10-12 with the very active front bringing

  12. NEBULAS A High Performance Data-Driven Event-Building Architecture based on an Asynchronous Self-Routing Packet-Switching Network

    CERN Multimedia

    Costa, M; Letheren, M; Djidi, K; Gustafsson, L; Lazraq, T; Minerskjold, M; Tenhunen, H; Manabe, A; Nomachi, M; Watase, Y

    2002-01-01

    RD31 : The project is evaluating a new approach to event building for level-two and level-three processor farms at high rate experiments. It is based on the use of commercial switching fabrics to replace the traditional bus-based architectures used in most previous data acquisition sytems. Switching fabrics permit the construction of parallel, expandable, hardware-driven event builders that can deliver higher aggregate throughput than the bus-based architectures. A standard industrial switching fabric technology is being evaluated. It is based on Asynchronous Transfer Mode (ATM) packet-switching network technology. Commercial, expandable ATM switching fabrics and processor interfaces, now being developed for the future Broadband ISDN infrastructure, could form the basis of an implementation. The goals of the project are to demonstrate the viability of this approach, to evaluate the trade-offs involved in make versus buy options, to study the interfacing of the physics frontend data buffers to such a fabric, a...

  13. Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects

    Science.gov (United States)

    Wei, Guoliang; Liu, Shuai; Wang, Licheng; Wang, Yongxiong

    2016-07-01

    In this paper, based on the event-triggered mechanism, the problem of distributed set-membership filtering is concerned for a class of time-varying non-linear systems over sensor networks subject to saturation effects. Different from the traditional periodic sample-data approach, the filter is updated only when the predefined event is satisfied, which the event is defined according to the measurement output. For each node, the proposed novel event-triggered mechanism can reduce the unnecessary information transmission between sensors and filters. The purpose of the addressed problem is to design a series of distributed set-membership filters, for all the admissible unknown but bounded noises, non-linearities and sensor saturation, such that the set of all possible states can be determined. The desired filter parameters are obtained by solving a recursive linear matrix inequality that can be computed recursively using the available MATLAB toolbox. Finally, a simulation example is exploited to show the effectiveness of the proposed design approach in this paper.

  14. Modulation of a Fronto-Parietal Network in Event-Based Prospective Memory: An rTMS Study

    Science.gov (United States)

    Bisiacchi, P. S.; Cona, G.; Schiff, S.; Basso, D.

    2011-01-01

    Event-based prospective memory (PM) is a multi-component process that requires remembering the delayed execution of an intended action in response to a pre-specified PM cue, while being actively engaged in an ongoing task. Some neuroimaging studies have suggested that both prefrontal and parietal areas are involved in the maintenance and…

  15. News Competition: Physics Olympiad hits Thailand Report: Institute carries out survey into maths in physics at university Event: A day for everyone teaching physics Conference: Welsh conference celebrates birthday Schools: Researchers in Residence scheme set to close Teachers: A day for new physics teachers Social: Network combines fun and physics Forthcoming events

    Science.gov (United States)

    2011-09-01

    Competition: Physics Olympiad hits Thailand Report: Institute carries out survey into maths in physics at university Event: A day for everyone teaching physics Conference: Welsh conference celebrates birthday Schools: Researchers in Residence scheme set to close Teachers: A day for new physics teachers Social: Network combines fun and physics Forthcoming events

  16. 媒体事件中的网络意见领袖研究%Research on Network Opinion Leaders in Media Events

    Institute of Scientific and Technical Information of China (English)

    刘明娜

    2013-01-01

    当危机事件转化成媒体事件的时候,新闻和媒体帮助建构了一种共享的社会危机现象,网络意见领袖“脱颖而出”。并呈现阶段性特征。网络意见领袖的产生需有客观的媒体环境。在媒体事件中,网络意见领袖呈现阶段性的特征,并有自身独特的网络媒介能力和媒价策略。%When a crisis event changed into a media one, the news and media could generate a shared social crisis phenomenon, then the network leader "stands out". His occurrence needs to have objective media environment. In Media event, the network opinion leader has the periodic characteristics and the unique ability and media strategy.

  17. Prevalence of potentially traumatic events, depression, alcohol use, and social network supports among Chinese migrants: an epidemiological study in Guangzhou, China

    Directory of Open Access Journals (Sweden)

    Brian J. Hall

    2014-12-01

    Full Text Available Background: Addressing the health needs of Chinese migrants is a critical public health concern. Epidemiological studies are needed to establish the prevalence of potentially traumatic events (PTEs and common mental disorders among Chinese migrants and identify protective community and social resources. Method: Utilizing random household sampling, we are in the process of recruiting a representative sample of Chinese adults (N=1,000 in two districts home to a large number of internal migrants. Data are collected using face-to-face interviews and participant self-report methods. Chinese versions of the Life Events Checklist, Alcohol Use Disorders Identification Test, Patient Health Questionnaire and the Social Support Rating Scale measured exposure to PTEs, alcohol use disorder, depression, and social support networks. Results: Preliminary results indicate a high proportion (68% of the sample was exposed directly or indirectly to at least one PTE. The most commonly reported events were transportation accidents (43%, natural disasters (39%, and physical assault (26%. A total of 17% of the sample reported drinking consistent with having an alcohol use disorder. Moderate or severe depression was reported by 9% of the sample. The majority (75% reported having three or more people to rely on for support, and 41% reported active participation in civic groups. Despite these strengths, only half the sample reported having trust in their community. Conclusion: Preliminary evidence from this population-level survey indicates high exposure to PTEs and a high potential burden of alcohol use disorders. The role of social networks will be explored as potentially useful for community-based intervention development.

  18. EVENT DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS WITH WEAK SPARSITY%弱稀疏性下的无线传感器网络事件检测算法

    Institute of Scientific and Technical Information of China (English)

    赵秀兰; 李克清

    2014-01-01

    In order to improve the reliability and effectiveness of event detection for wireless sensor networks (WSN)with weak sparsity based on compressed sensing (CS),an iterative convex optimization network event detection algorithm is proposed.The method detects events for networks with weak sparsity by multiple convex optimizations algorithm.Once a convex optimization algorithm finishes running,the detected network event is down-weighted so that other network events can be detected during the next convex optimization.Compared with previous wireless sensor network event detection algorithms,the iterative convex optimization detection algorithm can ensure the probability of successful detection for network events with weak sparsity.Simulation experiments validate the proposed algorithm.%为提高弱稀疏性条件下基于压缩感知的无线传感器网络事件检测的可靠性和有效性,提出一种迭代凸优化网络事件检测算法。该方法利用多次凸优化算法共同对弱稀疏性网络事件进行检测,在每次运行凸优化算法后,对已检测出的网络事件进行加权以降低权值,从而有利于其他网络事件在下次凸优化中得到检测。与以往的无线传感器网络事件检测算法相比,迭代凸优化检测算法可在网络事件稀疏性较弱的情况下保证成功检测概率。仿真实验验证了所提算法的正确性。

  19. Improving short-term forecasting during ramp events by means of Regime-Switching Artificial Neural Networks

    Science.gov (United States)

    Gallego, C.; Costa, A.; Cuerva, A.

    2010-09-01

    Since nowadays wind energy can't be neither scheduled nor large-scale storaged, wind power forecasting has been useful to minimize the impact of wind fluctuations. In particular, short-term forecasting (characterised by prediction horizons from minutes to a few days) is currently required by energy producers (in a daily electricity market context) and the TSO's (in order to keep the stability/balance of an electrical system). Within the short-term background, time-series based models (i.e., statistical models) have shown a better performance than NWP models for horizons up to few hours. These models try to learn and replicate the dynamic shown by the time series of a certain variable. When considering the power output of wind farms, ramp events are usually observed, being characterized by a large positive gradient in the time series (ramp-up) or negative (ramp-down) during relatively short time periods (few hours). Ramp events may be motivated by many different causes, involving generally several spatial scales, since the large scale (fronts, low pressure systems) up to the local scale (wind turbine shut-down due to high wind speed, yaw misalignment due to fast changes of wind direction). Hence, the output power may show unexpected dynamics during ramp events depending on the underlying processes; consequently, traditional statistical models considering only one dynamic for the hole power time series may be inappropriate. This work proposes a Regime Switching (RS) model based on Artificial Neural Nets (ANN). The RS-ANN model gathers as many ANN's as different dynamics considered (called regimes); a certain ANN is selected so as to predict the output power, depending on the current regime. The current regime is on-line updated based on a gradient criteria, regarding the past two values of the output power. 3 Regimes are established, concerning ramp events: ramp-up, ramp-down and no-ramp regime. In order to assess the skillness of the proposed RS-ANN model, a single

  20. Adaptive Wireless Ad-hoc Sensor Networks for Long-term and Event-oriented Environmental Monitoring

    Science.gov (United States)

    Bumberger, Jan; Mollenhauer, Hannes; Remmler, Paul; Chirila, Andrei Marian; Mollenhauer, Olaf; Hutschenreuther, Tino; Toepfer, Hannes; Dietrich, Peter

    2016-04-01

    Ecosystems are often characterized by their high heterogeneity, complexity and dynamic. Hence, single point measurements are often not sufficient for their complete representation. The application of wireless sensor networks in terrestrial and aquatic environmental systems offer significant benefits as a better consideration to the local test conditions, due to the simple adjustment of the sensor distribution, the sensor types and the sample rate. Another advantage of wireless ad-hoc sensor networks is their self-organizing behavior, resulting in a major reduction in installation and operation costs and time. In addition, individual point measurements with a sensor are significantly improved by measuring at several points continuously. In this work a concept and realization for Long-term ecosystem research is given in the field monitoring of micrometeorology and soil parameters for the interaction of biotic and abiotic processes. This long term analyses are part of the Global Change Experimental Facility (GCEF), a large field-based experimental platform to assess the effects of climate change on ecosystem functions and processes under different land-use scenarios. Regarding to the adaptive behavior of the network, also a mobile version was developed to overcome the lack of information of temporally and spatially fixed measurements for the detection and recording of highly dynamic or time limited processes. First results of different field campaigns are given to present the potentials and limitations of this application in environmental science, especially for the monitoring of the interaction of biotic and abiotic processes, soil-atmosphere interaction and the validation of remote sensing data.

  1. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; de Fries, Louise Skovlund

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social...

  2. Regional transportation network blocked by snowdrifts: assessment of risk reduction strategies by the example of the wind event of February 2015 in the Canton of Vaud, Switzerland

    Science.gov (United States)

    Voumard, Jérémie; Jaboyedoff, Michel; Derron, Marc-Henri

    2016-04-01

    where an accessibility is crucial to be maintained. We analyze then the road network to highlight the roads vulnerability from snowdrifts with topographic and meteorological indicators. We also assess the ratio cost/benefit of different measures limiting snowdrifts. We finally discuss strategies to reduce the risk of this winter meteorological event.

  3. Analysis of Modern Techniques for Nuclear-test Yield Determination of NTS Events Using Data From the Leo Brady Seismic Network

    Science.gov (United States)

    Schramm, K. A.; Bilek, S. L.; Abbott, R. E.

    2007-12-01

    Nuclear test detection is a challenging, but important task for treaty verification. Many techniques have been developed to discriminate between an explosion and an earthquake and if an explosion is detected, to determine its yield. Sandia National Laboratories (SNL) has maintained the Leo Brady Seismic Network (LBSN) since 1960 to record nuclear tests at the Nevada Test Site (NTS), providing a unique data set for yield determination. The LBSN is comprised of five permanent stations surrounding the NTS at regional distances, and data (in digital from post 1983) exists for almost all tests. Modern seismic data processing techniques can be used with this data to apply new methods to better determine the seismic yield. Using mb(Lg) we found that, when compared to published yields, our estimates were low for events over 100 kilotons (kt) and near the published value for events under 40 kt. We are currently measuring seismic-phase amplitudes, examining body- and surface-wave spectra and using seismic waveform modeling techniques to determine the seismic yield of NTS explosions using the waveforms from the LBSN.

  4. 基于特征提取的网络热点事件挖掘算法%Network Hot Event Mining Algorithm Based on Feature Extraction

    Institute of Scientific and Technical Information of China (English)

    李玮瑶; 赵凯

    2015-01-01

    为有效从网络中挖掘出民众关注的热点事件和话题,提高数据分类能力、热点追踪和检测正确率,在分析目前采用非结构化传统挖掘算法所存在问题的基础上,提出一种基于结构化分割的挖掘算法。首先通过分析热点事件挖掘处理流程,设计一种对热点事件数据挖掘的半结构化特征提取算法,对半结构化数据进行特征分割,生成大量请求,进而得到热点事件数据的分配因子,从而提高挖掘性能。仿真结果表明,该算法运行效率较高,精度较好,具有较高的稳健性。%For effectively mining the hot issues and topics concerned by people in network , improving the capabilities of data classification and the correct rate of hot tracking and detection , basing on analyzing the problems existing in the traditional un-structured mining algorithms used currently , we proposed a mining algorithm based on structured segmentation .First, by analy-zing the hot events mining process , we designed a semi-structured features extraction algorithm for hot events data mining , in or-der to make feature segmentation for semi-structured data , generate a lot of requests , and then get hot event data allocation fac-tors, thereby improve mining properties .Simulation results show that the algorithm is running with high efficiency , good accuracy and high robustness .

  5. Quantitative Analysis Method for Long-Term Network Public Opinion Events%基于E-Divisive的网络舆情演化分析

    Institute of Scientific and Technical Information of China (English)

    陈福集; 张燕

    2016-01-01

    Purpose/Significance] Existing network cycle theory of public ignores the researchabout the public opinion stage divid-ing, hence this paper builds public opinion phasing quantitative models, and analyzes the spread of internet public opinion. It’ s the evolu-tion of public opinion in favor of deep-level mining and it can extend the public opinion cycle theory. [ Method/process] This paper con-ducts a quantitative research idea based on E-Divisive method to analyze the network pubic events, and puts forward a new research idea about the division of the development stage of Internet public opinion stage, taking the haze event on internet as an example to carry through the research idea. [ Result/Conclusion] The conclusion describes the rules about the public opinion event, and the study deepens the theory of periodic public opinion, so the paper has signification values in practical aspects.%[目的/意义]现有的网络舆情周期理论的舆情阶段间界定模糊,因此提出舆情阶段划分的定量模型,划分舆情演化阶段。有利于舆情演化的规律深层次挖掘,拓展了舆情周期理论。[方法/过程]该模型通过E-Divisive算法对网络舆情事件演化阶段的划分,提出一种新的分析网络舆情事件演化的研究思路。[结果/结论]最后,以“北京雾霾”事件为例进行实证研究,对该事件的生命周期进行定量研究,总结舆情事件的各阶段演化规律。

  6. The Transmission Disseminator Research of Network Hot Event Based on Social Network Analysis%基于社会网络分析的网络热点事件传播主体研究

    Institute of Scientific and Technical Information of China (English)

    胡改丽; 陈婷; 陈福集

    2015-01-01

    Based on the Tianya BBS, this paper puts the child abuse event in Wenling of Zhejiang as the research object and introduces the Social Network Analysis method into the study. It gives the contrastive analysis from the point centrality, betweenness centrality, closeness centrality, network density, clustering coefficient and network diameter of different evolution stages, finding that in different evolution stage it will emerge important subject who can promote the information flow. But it also concludes that the information network presents complicated, omnidirectional and scale-free characters.%以天涯论坛为平台,以浙江温岭虐童事件为研究对象,采用社会网络分析方法,通过对该热点事件不同演化阶段的度数中心度、中间中心度、接近中心度、网络密度、群聚系数、网络直径等指标进行对比分析。研究发现在不同的演化阶段都会涌现出一些占据重要地位的参与主体,他们在一定程度上能够推动信息的流动;各信息节点之间没有形成长期稳定的联系,一定程度上信息的传播呈现出复杂化、无方向化和无标度网络特性。

  7. The Infinite Latent Events Model

    CERN Document Server

    Wingate, David; Roy, Daniel; Tenenbaum, Joshua

    2012-01-01

    We present the Infinite Latent Events Model, a nonparametric hierarchical Bayesian distribution over infinite dimensional Dynamic Bayesian Networks with binary state representations and noisy-OR-like transitions. The distribution can be used to learn structure in discrete timeseries data by simultaneously inferring a set of latent events, which events fired at each timestep, and how those events are causally linked. We illustrate the model on a sound factorization task, a network topology identification task, and a video game task.

  8. News Report: The career paths of physics graduates Education: Network day to hold workshops for teaching ideas Experiments: PhysHOME brings innovators together Meeting: Physics Education Networks collaborate at WCPE Workshop: World experts in physics education meet Training: Something for everyone at SPEED 2012 Conference: Sun, cocktails and physics create a buzz at WCPE Students: The physics paralympian 2012 Forthcoming events

    Science.gov (United States)

    2012-09-01

    Report: The career paths of physics graduates Education: Network day to hold workshops for teaching ideas Experiments: PhysHOME brings innovators together Meeting: Physics Education Networks collaborate at WCPE Workshop: World experts in physics education meet Training: Something for everyone at SPEED 2012 Conference: Sun, cocktails and physics create a buzz at WCPE Students: The physics paralympian 2012 Forthcoming events

  9. 网络公共事件对社会管理负面效应的成因及对策%Causes and Countermeasures of Negative Effects of Network Public Events on Social Management

    Institute of Scientific and Technical Information of China (English)

    林恬伊

    2012-01-01

    网络公共事件是一把双刃剑,在促进社会管理进步的同时,也会带来负面效应,清醒认识网络公共事件负面效应的成因,并采取相应的对策,对于提高政府和民众理性认识网络公共事件,提升对网络公共事件的管理水平具有重大的现实意义。%network public event is an important and integral part of social management and also a double-edged sword. It may bring some negative effects while promoting the progress of social management. It is of great realistic significance for improving rational knowledge of the government and the public on network public event and raising the management level of network public events to clearly understand the causes of the negative effects of network public events and carry out corresponding measures.

  10. Advance Liquid Metal Reactor Discrete Dynamic Event Tree/Bayesian Network Analysis and Incident Management Guidelines (Risk Management for Sodium Fast Reactors)

    Energy Technology Data Exchange (ETDEWEB)

    Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Groth, Katrina M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Cardoni, Jeffrey N. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Accident management is an important component to maintaining risk at acceptable levels for all complex systems, such as nuclear power plants. With the introduction of self-correcting, or inherently safe, reactor designs the focus has shifted from management by operators to allowing the system's design to manage the accident. Inherently and passively safe designs are laudable, but nonetheless extreme boundary conditions can interfere with the design attributes which facilitate inherent safety, thus resulting in unanticipated and undesirable end states. This report examines an inherently safe and small sodium fast reactor experiencing a beyond design basis seismic event with the intend of exploring two issues : (1) can human intervention either improve or worsen the potential end states and (2) can a Bayesian Network be constructed to infer the state of the reactor to inform (1). ACKNOWLEDGEMENTS The authors would like to acknowledge the U.S. Department of Energy's Office of Nuclear Energy for funding this research through Work Package SR-14SN100303 under the Advanced Reactor Concepts program. The authors also acknowledge the PRA teams at Argonne National Laboratory, Oak Ridge National Laboratory, and Idaho National Laboratory for their continue d contributions to the advanced reactor PRA mission area.

  11. Seafloor spreading event in western Gulf of Aden during the November 2010-March 2011 period captured by regional seismic networks: evidence for diking events and interactions with a nascent transform zone

    Science.gov (United States)

    Ahmed, Abdulhakim; Doubre, Cécile; Leroy, Sylvie; Kassim, Mohamed; Keir, Derek; Abayazid, Ahmadine; Julie, Perrot; Laurence, Audin; Vergne, Jérome; Alexandre, Nercessian; Jacques, Eric; Khanbari, Khaled; Sholan, Jamal; Rolandone, Frédérique; Al-Ganad, Ismael

    2016-05-01

    In November 2010, intense seismic activity including 29 events with a magnitude above 5.0, started in the western part of the Gulf of Aden, where the structure of the oceanic spreading ridge is characterized by a series of N115°-trending slow-spreading segments set within an EW-trending rift. Using signals recorded by permanent and temporary networks in Djibouti and Yemen, we located 1122 earthquakes, with a magnitude ranging from 2.1 to 5.6 from 2010 November 1 to 2011 March 31. By looking in detail at the space-time distribution of the overall seismicity, and both the frequency and the moment tensor of large earthquakes, we re-examine the chronology of this episode. In addition, we also interpret the origin of the activity using high-resolution bathymetric data, as well as from observations of seafloor cable damage caused by high temperatures and lava flows. The analysis allows us to identify distinct active areas. First, we interpret that this episode is mainly related to a diking event along a specific ridge segment, located at E044°. In light of previous diking episodes in nearby subaerial rift segments, for which field constraints and both seismic and geodetic data exist, we interpret the space-time evolution of the seismicity of the first few days. Migration of earthquakes suggests initial magma ascent below the segment centre. This is followed by a southeastward dike propagation below the rift immediately followed by a northwestward dike propagation below the rift ending below the northern ridge wall. The cumulative seismic moment associated with this sequence reaches 9.1 × 1017 Nm, and taking into account a very low seismic versus geodetic moment, we estimate a horizontal opening of ˜0.58-2.9 m. The seismic activity that followed occurred through several bursts of earthquakes aligned along the segment axis, which are interpreted as short dike intrusions implying fast replenishment of the crustal magma reservoir feeding the dikes. Over the whole period

  12. Event management

    OpenAIRE

    Urban, Zdeněk

    2013-01-01

    The thesis deals with event management and is formally divided into three sections. The first section provides the theoretical basis for the practical part. It primarily defines the terms event, event management and event marketing. The theoretical part proceeds from the general introduction to more detailed examination of the issue, which includes the classification of event marketing within the marketing and communication mix of the company, the typology of events and explanation of various...

  13. Event management

    OpenAIRE

    Jandová, Dita

    2011-01-01

    The thesis deal with event management. For better insight into this field event management is described on case of management of conference. The thesis has three main parts. In the theoretical part there are definitions of terms like event management, conference and other related terms. Further chapters are concerned with the position of event management in the communication mix, typologies of events and mostly with the crucial aspects of event management. In the second part of the thesis the...

  14. Event management

    OpenAIRE

    Šubrtová, Veronika

    2013-01-01

    This bachelor thesis on the topic event management develops this concept, focuses mainly on the creation of the event and its application in practice. Management, event and event management are described in the theoretical section. The importace of event management in the marketing communications mix is shown subsequently and especially the creation of the event is more detailed described. This is then reflected in the practical part of the thesis, in which the awards gala is planed and orga...

  15. Event management

    OpenAIRE

    Grebíková, Kristýna

    2014-01-01

    The thesis in theoretical part focuses on the concepts of event management and their interaction. The theoretical part focuses on the creation of event planning and marketing strategies, typology of events, and provides a situational analysis, objectives events, defines the target group, plan the resources, establish a budget and will focus on event controlling. The practical part carries theory into practice and deals with the organization of the event in the company TON in Chile. Based on a...

  16. The effects of high-frequency oscillations in hippocampal electrical activities on the classification of epileptiform events using artificial neural networks

    Science.gov (United States)

    Chiu, Alan W. L.; Jahromi, Shokrollah S.; Khosravani, Houman; Carlen, Peter L.; Bardakjian, Berj L.

    2006-03-01

    The existence of hippocampal high-frequency electrical activities (greater than 100 Hz) during the progression of seizure episodes in both human and animal experimental models of epilepsy has been well documented (Bragin A, Engel J, Wilson C L, Fried I and Buzsáki G 1999 Hippocampus 9 137-42 Khosravani H, Pinnegar C R, Mitchell J R, Bardakjian B L, Federico P and Carlen P L 2005 Epilepsia 46 1-10). However, this information has not been studied between successive seizure episodes or utilized in the application of seizure classification. In this study, we examine the dynamical changes of an in vitro low Mg2+ rat hippocampal slice model of epilepsy at different frequency bands using wavelet transforms and artificial neural networks. By dividing the time-frequency spectrum of each seizure-like event (SLE) into frequency bins, we can analyze their burst-to-burst variations within individual SLEs as well as between successive SLE episodes. Wavelet energy and wavelet entropy are estimated for intracellular and extracellular electrical recordings using sufficiently high sampling rates (10 kHz). We demonstrate that the activities of high-frequency oscillations in the 100-400 Hz range increase as the slice approaches SLE onsets and in later episodes of SLEs. Utilizing the time-dependent relationship between different frequency bands, we can achieve frequency-dependent state classification. We demonstrate that activities in the frequency range 100-400 Hz are critical for the accurate classification of the different states of electrographic seizure-like episodes (containing interictal, preictal and ictal states) in brain slices undergoing recurrent spontaneous SLEs. While preictal activities can be classified with an average accuracy of 77.4 ± 6.7% utilizing the frequency spectrum in the range 0-400 Hz, we can also achieve a similar level of accuracy by using a nonlinear relationship between 100-400 Hz and <4 Hz frequency bands only.

  17. A Study on Network Group Events from the Conflict Theory Perspective%冲突理论视阈下的网络群体事件探析

    Institute of Scientific and Technical Information of China (English)

    胡圣方

    2011-01-01

    网络群体事件从冲突的成因看,是冲突主体在社会进程中安全感的剥离,信任感的丧失和受挫感的增强使然。从冲突的类型看,主要存在现实性和非现实性冲突。从冲突的性质看,这种冲突具有积极和消极两面。从;中突的应对看,第一,无论对于现实性冲突和非现实性7中突都应积极响应。第二,媒体应扩大正面舆论的宣传面,秉着客观、公平的理念进行舆论监督和舆论引导。第三,政府应从韧性管治的角度,强调司法调解,并秉着公开透明、公正的原则处理冲突,以此重建信任关系。、%The causes of the conflict of network group events are the sense of stripped security, the loss of trust and the enhanced sense of frustration of conflict main body in the social process. It is mainly shown as reality conflict and non-reality conflict, which have both positive and negative sides. The response of the conflict should be to respond active- ly both to the reality conflict and non-reality conflict. The media should enhance the positive publicity and the government should emnhasize judicial mediation and solve the conflict based on openness and fairness principles to rebuild trust.

  18. 护理不良事件网络直报系统的动态管理与应用%Dynamic Management and Application of Nursing Adverse Events Network Direct Report System

    Institute of Scientific and Technical Information of China (English)

    刘伟; 刘丽; 朱玲玲

    2015-01-01

    目的:探讨护理不良事件网络直报系统在临床安全管理中的动态应用效果。方法:依托医院护理综合信息系统,开发护理不良事件网络直报模块,建立规范化的不良事件分类体系;在科室和护理部层面及时有效地对上报的不良事件汇总分析,实施动态的干预与安全管理。结果:护理不良事件网络直报系统操作简便、快捷,提高了医护人员对不良事件的认知度和风险防范意识;护理不良事件上报率呈逐年上升趋势,有效提高了临床安全管理水平。结论:护理不良事件网络直报系统与护理安全动态管理有效结合在一起,减少了护理缺陷事件的发生,确保了病人安全,进而提升了护理质量。%Objective:To survey the dynamic effects of nursing adverse events network direct report system applied to clinical safety management. Methods: Based on nursing comprehensive information system in our hospital, we develop the nursing adverse events network straight reporting module, and establish standardized adverse events classification system; in the department and nursing department level, we can summary analysis adverse events timely and effective, then implement dynamic intervention and safety management. Results: The operation of nursing adverse events network direct report system is simple and fast, it can improve the awareness and consciousness of risk prevention of adverse events for medical staff;the reporting rate of nursing adverse events showed an upward trend year by year, it can improve the level of clinical safety management effectively. Conclusion: The nursing adverse events network direct report system and dynamic management of nursing security hang together effectively, they reduce tne happening of nursing defects and secured the safety of patients, so improve the quality of nursing further.

  19. Event marketing

    OpenAIRE

    Pham, Quynh Trang

    2008-01-01

    This study aims to analyze event-marketing activities of the small firm and propose new events. At first the theoretical part describes marketing and communication mix and then especially planning and development of event marketing campaign. Research data were collected by the method of survey to propose the new events. Randomly selected customers were asked to fill the questionnaire. Its results were integrated into the proposal of the new events. The interview was realized with the owner of...

  20. Event management

    OpenAIRE

    Pavléková, Markéta

    2013-01-01

    The main theme of the work is event management, which deals with the social events of various types. Event as a mean of communication is a common part of business strategy today and the organization became a separate industry. Procedures how to implement successful event are the essential part of the work. Organizationally demanding activity of event managers, which includes planning, organizing, staffing, leadership and control is supported by marketing activities, which are described in the...

  1. Event management

    OpenAIRE

    Michňa, Michal

    2011-01-01

    The theoretical part of this thesis deals with event management in general. The stress of its theoretical part is put on relation between event management and the other communication channels usually used by marketing experts in a firm. There is also described a confrontation of event management with processes which are basically used in project management. The theoretical part is mainly concerned with event management and organisation of events. There is a deep description of its prepara...

  2. Event management

    OpenAIRE

    Vomáčková, Kateřina

    2013-01-01

    This thesis deals with event management from theory to practice. First part of the thesis consists of literature review of this topic – from definition of basic terms, through event management’s classification in marketing of a company, to description of different stages of event management process. The second part of the thesis is based on practice – an agency that organized for the third year an event focusing on children and sport, is presented here. Last year of this event including...

  3. Network based on statistical multiplexing for event selection and event builder systems in high energy physics experiments; Reseau a multiplexage statistique pour les systemes de selection et de reconstruction d'evenements dans les experiences de physique des hautes energies

    Energy Technology Data Exchange (ETDEWEB)

    Calvet, D

    2000-03-01

    Systems for on-line event selection in future high energy physics experiments will use advanced distributed computing techniques and will need high speed networks. After a brief description of projects at the Large Hadron Collider, the architectures initially proposed for the Trigger and Data AcQuisition (TD/DAQ) systems of ATLAS and CMS experiments are presented and analyzed. A new architecture for the ATLAS T/DAQ is introduced. Candidate network technologies for this system are described. This thesis focuses on ATM. A variety of network structures and topologies suited to partial and full event building are investigated. The need for efficient networking is shown. Optimization techniques for high speed messaging and their implementation on ATM components are described. Small scale demonstrator systems consisting of up to 48 computers ({approx}1:20 of the final level 2 trigger) connected via ATM are described. Performance results are presented. Extrapolation of measurements and evaluation of needs lead to a proposal of implementation for the main network of the ATLAS T/DAQ system. (author)

  4. Event management

    OpenAIRE

    Palkosková, Barbora

    2011-01-01

    The diploma thesis deals with a term of event management and its connection to the event marketing. First part of the work focuses on terms that are superior to event management and those are marketing and marketing mix of 4P´s. Communication mix is than separated into smaller parts, defining the position of event marketing and management among them. Accent is put on the current possibilities of typology and separation of event and its practical use. Issue of events is connected to the...

  5. Quantifying the spatio-temporal pattern of the ground impact of space weather events using dynamical networks formed from the SuperMAG database of ground based magnetometer stations.

    Science.gov (United States)

    Dods, Joe; Chapman, Sandra; Gjerloev, Jesper

    2016-04-01

    Quantitative understanding of the full spatial-temporal pattern of space weather is important in order to estimate the ground impact. Geomagnetic indices such as AE track the peak of a geomagnetic storm or substorm, but cannot capture the full spatial-temporal pattern. Observations by the ~100 ground based magnetometers in the northern hemisphere have the potential to capture the detailed evolution of a given space weather event. We present the first analysis of the full available set of ground based magnetometer observations of substorms using dynamical networks. SuperMAG offers a database containing ground station magnetometer data at a cadence of 1min from 100s stations situated across the globe. We use this data to form dynamic networks which capture spatial dynamics on timescales from the fast reconfiguration seen in the aurora, to that of the substorm cycle. Windowed linear cross-correlation between pairs of magnetometer time series along with a threshold is used to determine which stations are correlated and hence connected in the network. Variations in ground conductivity and differences in the response functions of magnetometers at individual stations are overcome by normalizing to long term averages of the cross-correlation. These results are tested against surrogate data in which phases have been randomised. The network is then a collection of connected points (ground stations); the structure of the network and its variation as a function of time quantify the detailed dynamical processes of the substorm. The network properties can be captured quantitatively in time dependent dimensionless network parameters and we will discuss their behaviour for examples of 'typical' substorms and storms. The network parameters provide a detailed benchmark to compare data with models of substorm dynamics, and can provide new insights on the similarities and differences between substorms and how they correlate with external driving and the internal state of the

  6. Event management

    OpenAIRE

    Štefl, Petr

    2011-01-01

    This bachelor thesis on the topic of event management deals with planning, organizing, managing, monitoring and implementation of special social events, termed event. It explains what they mean by this term we can imagine and as you can in terms of typology to distinguish events. Literature review consists of the acquired theoretical knowledge in management, project management and marketing. It describes the principles and procedure in place, we should keep the successful organization of ...

  7. Event management

    OpenAIRE

    Strýhalová, Veronika

    2013-01-01

    The Diploma thesis is focused on the Event management company, which organizes a big family minded sport day and describes its activity plan. The thesis consists three main parts, the first – the teoretic part specifices proffesional terms about an event management. This part also describes different event forms which are focused on the right selection and final strategy, the following control of financial situation and event overall what is in general a part of marketing mixture. The second ...

  8. Event management

    OpenAIRE

    Stružková, Tereza

    2014-01-01

    The main objective of this thesis is based on theoretical knowledge and analysis of the actual implementation event action in congress centre of 4*hotel. Asesment of importance, correctnesand effectivess of the vatious procedures of organizin events and create new complete schematic principle of organizin events Implementation actions will be considered from two sides – from side of the company organizer and from the side of event managment coordinator. All the outputs of these two aspect ...

  9. Event Modeling

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    2001-01-01

    The purpose of this chapter is to discuss conceptual event modeling within a context of information modeling. Traditionally, information modeling has been concerned with the modeling of a universe of discourse in terms of information structures. However, most interesting universes of discourse...... are dynamic and we present a modeling approach that can be used to model such dynamics. We characterize events as both information objects and change agents (Bækgaard 1997). When viewed as information objects events are phenomena that can be observed and described. For example, borrow events in a library can...

  10. Event Modeling

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    2001-01-01

    The purpose of this chapter is to discuss conceptual event modeling within a context of information modeling. Traditionally, information modeling has been concerned with the modeling of a universe of discourse in terms of information structures. However, most interesting universes of discourse...... are dynamic and we present a modeling approach that can be used to model such dynamics.We characterize events as both information objects and change agents (Bækgaard 1997). When viewed as information objects events are phenomena that can be observed and described. For example, borrow events in a library can...

  11. On propagation of sports public events based on social networK structure%基于社会网络分析的体育赛事舆情传播实证研究

    Institute of Scientific and Technical Information of China (English)

    蒲毕文

    2014-01-01

    In today′s society public events happened frequently which often bring adverse effect to social events. As for the sports events with high degree of attention,public opinion emergency often bring irreversible effects on the sporting events. Using social network analysis method,this paper studied the sports public opinion transmission characteristics and paths,analyzing the characteristics of the spread of public opinion. Taking 2012 Guangzhou marathon event as the research object,an empirical research was done. Results show that in the marathon event propagation,the verall density of network is higher,the traditional media and the self-mediaed information interacted frequently;all the actor information interchange distance is shorter,information transmission speed quickly. Ac-tors in the whole network are in relatively independent status and role,despite the existence of struc-tural holes,but the binding force is relatively small,the information transmission has little con-straints and most are transimitted in a direct way.%运用社会网络分析法,研究体育赛事舆情传播特征和路径,分析舆情传播特征,并以2012年广州马拉松舆情事件为研究对象,进行实证研究。研究结果显示:广马舆情事件传播网络中整体密度较高,传统媒体和自媒体信息互动传播频繁;各行动者信息互换距离短,信息传播速度迅速。行动者在整体网络中地位和角色相对独立,虽有结构洞的存在,但约束力相对较小,对信息传播制约有限,信息以直接传播较多。广马舆情事件广泛存在凝聚的子网络,子网络的存在加速了信息在行动者中的共享和交换,从而促生多中心的传播网络结构。

  12. On event based state estimation

    NARCIS (Netherlands)

    Sijs, J.; Lazar, M.

    2009-01-01

    To reduce the amount of data transfer in networked control systems and wireless sensor networks, measurements are usually taken only when an event occurs, rather than at each synchronous sampling instant. However, this complicates estimation and control problems considerably. The goal of this paper

  13. 非常规突发事件中在线社会网络用户信息共享动机研究*%The Research of Motivation for Information Sharing of Online Social Network Users in Emergency Event

    Institute of Scientific and Technical Information of China (English)

    王冰冰; 夏志杰; 于丽萍

    2013-01-01

    In order to understand the motivation for information sharing of online social network users in emergency event, the model of motivation for information sharing of online social network users in emergency event is built on the basis of the Uses and Gratification theo-ry, then a number of assumptions are made. At last this paper carries out questionnaire survey and statistical analysis with Lushan Earth-quake among Sina MicroBlog users, and finds out that cognitive uses, affective uses, gratification, altruism and perceiving of ethics will have a positive effect on information sharing of online social network;image and reputation, civic responsibility have no direct links with information sharing. These conclusions will benefit for developing the information sharing mechanism in emergency event.%为了理解非常规突发事件背景下在线社会网络用户进行信息共享的动机,基于使用与满足理论,构建在线社会网络用户信息共享的动机模型,并提出若干研究假设,最后以芦山地震为背景,对新浪微博用户为对象进行问卷调查,统计分析结果表明:易用性和有用性感知、在线用户的满意度、利他主义、道德感知影响微博用户的信息共享行为,形象声望和对微博用户共享行为影响不显著。

  14. DER 83: outstanding events

    International Nuclear Information System (INIS)

    The DER's activity is presented through 82 ''outstanding events''. Each one is a stage in the effort of research and development of the DER. These events concern the following fields: new applications of electric power for customers; environment protection and new energy sources; improvements of electric power production units; electrical materials; electric network planning and control; computer codes. In the production field, one deals more particularly with nuclear reactor safety studies: analysis of the behaviour of different components; reactor safety experiments; reliability of different systems (safety, communications...)

  15. A study on the use of imputation methods for experimentation with Radial Basis Function Network classifiers handling missing attribute values: the good synergy between RBFNs and EventCovering method.

    Science.gov (United States)

    Luengo, Julián; García, Salvador; Herrera, Francisco

    2010-04-01

    The presence of Missing Values in a data set can affect the performance of a classifier constructed using that data set as a training sample. Several methods have been proposed to treat missing data and the one used more frequently is the imputation of the Missing Values of an instance. In this paper, we analyze the improvement of performance on Radial Basis Function Networks by means of the use of several imputation methods in the classification task with missing values. The study has been conducted using data sets with real Missing Values, and data sets with artificial Missing Values. The results obtained show that EventCovering offers a very good synergy with Radial Basis Function Networks. It allows us to overcome the negative impact of the presence of Missing Values to a certain degree.

  16. Robust network topologies for generating switch-like cellular responses.

    Directory of Open Access Journals (Sweden)

    Najaf A Shah

    2011-06-01

    Full Text Available Signaling networks that convert graded stimuli into binary, all-or-none cellular responses are critical in processes ranging from cell-cycle control to lineage commitment. To exhaustively enumerate topologies that exhibit this switch-like behavior, we simulated all possible two- and three-component networks on random parameter sets, and assessed the resulting response profiles for both steepness (ultrasensitivity and extent of memory (bistability. Simulations were used to study purely enzymatic networks, purely transcriptional networks, and hybrid enzymatic/transcriptional networks, and the topologies in each class were rank ordered by parametric robustness (i.e., the percentage of applied parameter sets exhibiting ultrasensitivity or bistability. Results reveal that the distribution of network robustness is highly skewed, with the most robust topologies clustering into a small number of motifs. Hybrid networks are the most robust in generating ultrasensitivity (up to 28% and bistability (up to 18%; strikingly, a purely transcriptional framework is the most fragile in generating either ultrasensitive (up to 3% or bistable (up to 1% responses. The disparity in robustness among the network classes is due in part to zero-order ultrasensitivity, an enzyme-specific phenomenon, which repeatedly emerges as a particularly robust mechanism for generating nonlinearity and can act as a building block for switch-like responses. We also highlight experimentally studied examples of topologies enabling switching behavior, in both native and synthetic systems, that rank highly in our simulations. This unbiased approach for identifying topologies capable of a given response may be useful in discovering new natural motifs and in designing robust synthetic gene networks.

  17. Event management

    OpenAIRE

    Plechatý, Josef

    2012-01-01

    This theses focused on Event management is divided into two parts. First part includes theoretical knowledge while the second part is strictly practical. The first part is focused on marketing, its importance and basic terms. The chapter about marketing is followed by marketing mix, which is shortly characterized and divided into advertisement, sales promotion, public relations and other elements of the communication mix. The last part is a detailed study of Event marketing which includes th...

  18. Detection of anomalous events

    Science.gov (United States)

    Ferragut, Erik M.; Laska, Jason A.; Bridges, Robert A.

    2016-06-07

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The system can include a plurality of anomaly detectors that together implement an algorithm to identify low-probability events and detect atypical traffic patterns. The anomaly detector provides for comparability of disparate sources of data (e.g., network flow data and firewall logs.) Additionally, the anomaly detector allows for regulatability, meaning that the algorithm can be user configurable to adjust a number of false alerts. The anomaly detector can be used for a variety of probability density functions, including normal Gaussian distributions, irregular distributions, as well as functions associated with continuous or discrete variables.

  19. Geothermal heat - The second stream for geothermal sectors; Electricity production: industries are facing the geological unexpected events; Heat networks: a new boom in France

    International Nuclear Information System (INIS)

    A first article proposes an overview of recent development in the field of geothermal power (individual heat pumps, urban heating networks, electricity production in volcanic context, and possibility of non conventional fields). These developments are notably interesting in a context of an evolving energy mix. Some benefits of geothermal power are outlined: a reliable and predictable production, and a low footprint. An installation of deep geothermal power in Alsace is presented. By evoking the construction of three high-energy geothermal power stations by GDF Suez in Sumatra, a second article outlines the high costs associated with exploration drilling which can face geological difficulties. It indicates and comments the distribution of costs among exploration, confirmation, authorizations, drilling, steam collection, electric plant, and connection to the grid. The third and last article comments the development of heat networks in France, and more particularly in the Parisian Basin which has the highest concentration of low-energy geothermal exploitations

  20. 无线网络安全事件溯源系统的设计与实现%DESIGN AND IMPLEMENTATION OF SECURITY EVENT TRACEABILITY SYSTEM FOR WIRELESS NETWORK

    Institute of Scientific and Technical Information of China (English)

    梅晓晴; 王劲松; 童峥嵘; 石凯

    2014-01-01

    With the popularisation and development of wireless technology,security issues of wireless network become more serious.Espe-cially when the wireless terminals can freely access and randomly move,many security events easily occur,such as mobile users’identity theft,intrusion and attack,Trojans,etc.At present the systems developed mainly focus on billing issues and the attacks against the servers, but there are few contributing to the management of the whole network,to realising users’behaviour monitoring,as well as to how to trace the source of the events when the security incidents occur in network and the targeted processing countermeasures.The system presented in the paper provides authentication for wireless network users through PORTAL+RADIUS authentication technology,and uses WLAN positioning technology to track and locate the malicious mobile terminal position,so as to ensure to trace back to the source of the security events.The system achieves that the mobile users can be authorised and the double traceability management is imposed on the suspicious users in both identity and location.%随着无线技术的普及和发展,无线网络的安全问题愈加严重,尤其是当无线终端本身可以自由接入并随机移动时,许多安全事件如移动用户身份窃取、攻击入侵、木马等很容易发生。目前开发的系统主要针对的是计费问题及对服务器的攻击,而对整个网络的管理,实现用户的行为监控,以及当网络中发生安全事件时,如何追溯事件的源头以进行有针对的处理等方面所做的工作较少。系统通过PORTAL+RADIUS认证对无线网络用户进行身份认证,并且利用WLAN 定位技术对恶意的移动终端位置进行追踪和定位,确保追溯到安全事件的源头,实现对移动用户可授权、对可疑用户进行身份与位置的双重溯源管理。

  1. Design and development of self-powered sensors on wireless sensor network for standalone plant critical data management during SBO and beyond design basis events

    International Nuclear Information System (INIS)

    Advanced reactors are designed with an aim of maximum safety, optimized fuel utilization and effective system design. Safety aspects in reactor designs are being viewed for all possible vulnerabilities, and as a result, robust self-regulating passive safety features have been favored in Gen IV and advanced reactor designs. In addition to passive systems, the accidents scenarios at Fukushima indicate the dire need of reliable and stand-alone self-powered sensors, for monitoring plant critical parameters for effective damage control actions. There is a strong need for plant critical data management and situation awareness during the unavailability of all conventional power sources in a nuclear power plant, during extended station blackout (SBO) conditions. These self-powered sensors would assist the operators in managing events like SBO and help in containing any Beyond Design Basis Events (BDBE) conditions, well away from the public domain

  2. A fault-tolerant scheme for event detection in virtual sensor networks%一种虚拟传感器网络中事件监测的容错机制

    Institute of Scientific and Technical Information of China (English)

    孙智彦

    2015-01-01

    事件监测是无线传感器网络中的重要应用之一,而准确检测出故障节点是提高事件监测效率的前提。为了实现多应用目标传感器网络中较高的节点故障识别率,在基于簇状树的虚拟传感网架构上,提出一种基于节点邻域中值的事件监测容错算法。该算法充分利用了无线传感网节点之间的空间相关性,融合邻域各节点的测量值,通过节点的数值与邻域中值之间的差值来判断节点状态。仿真实验结果表明,即使是在节点故障概率比较高的情况下,该算法依然具有优越的容错性能。%The event detection is one of the most significant applications of wireless sensor networks. While the premise of improving the efficiency of event detection is to detect the node fault accurately. In order to realize high fault sensor nodes recognition rate of multi-target monitoring sensor networks,a fault-tolerant algorithm based on median information on the cluster tree based virtual sensor networks is presented. The algorithm fully exploits the spatial correlation among the nodes, collects their data, and judges the state of the node by the difference value of nodes′ data and their median. Simulation experimental results show that the algorithm has good performance even in the conditions of high fault probabilities.

  3. Wireless Sensor Networks for Event Monitoring Burstiness-data Congestion Control Protocol%面向事件监测的无线传感器网络突发数据拥塞控制协议

    Institute of Scientific and Technical Information of China (English)

    何建新; 汪彦; 贾丽媛

    2015-01-01

    To deal with the serious temporary network area congestion due to the previous CSMA/CA-based media access scheme is not suitable under the heavy network, due to the serious collision and the occurrence of event, a burstiness-data congestion control protocol(BCCP) is proposed for event monitoring in wireless sensor networks. In this thesis, the congestion detection is based on the node backoff delay due to competition, and TDMA is suitable under the heavy network. A TDMA-based media access scheme is used around the congestion area to avoid disorder contention when congestion occurs. As soon as the congestion is alleviated, the previous CSMA/CA-based scheme is active again. The experiment results show that BCCP has a characteristics of simple and low cost, can alleviate wireless sensor network congestion caused by burstiness-data, and reduce the data transmission delay and packet loss rate, and improve the reliability of data transmission.%针对基于竞争的CSMA/CA信道接入方式无法适应高负载网络下数据流传输,容易形成较为严重的短时区域拥塞问题,提出了一种面向事件监测无线传感器网络突发数据拥塞控制协议BCCP,将节点由于竞争退避引起的时延作为拥塞检测的依据, 利用TDMA适用于高负载的优点, 在拥塞区域节点嵌入TDMA调度算法, 拥塞减轻或消除后恢复CSMA/CA机制.BCCP实现简单、开销小.仿真测试结果表明,BCCP能够很好的解决突发数据造成的网络拥塞,降低数据传输时延及丢包率,提高数据传输的可靠性.

  4. WSN中基于事件驱动的簇型时间同步协议%Clustering Time Synchronization Protocol Based on Event Driven for Wireless Sensor Network

    Institute of Scientific and Technical Information of China (English)

    徐世武; 王平

    2016-01-01

    针对事件驱动的无线传感器网络,提出一种K覆盖的簇型时间同步算法(K-CTSA).当节点检测到事件发生时,广播事件信息,邻居节点收到广播信息后,从休眠转为激活状态.为了保证监测事件的准确性,必须保证在监测区域的K覆盖.结合模糊逻辑在事件发生区域选举K个节点协同完成任务,并选举一个簇首节点.为了保证监测任务的可靠性,处于激活的节点必须保证时间的同步,簇首与成员节点之间采用最小线性二乘法估算时钟偏移与漂移.实验仿真表明,K-CTSA在保证同步精度的前提下,网络节点生存时间与稳定期都明显优于TPSN协议.%In this paper, we propose a K cover clustering time synchronization algorithm(K-CTSA) based on event driven for wireless sensor networks. When events are detected by a node, the node broadcasts event message. The neighbor nodes switch from dormancy to activation after they receive the broadcast message. In order to ensure the accuracy of the monitoring event, K coverage must be guaranteed in the monitoring area. In this paper, we election K nodes in the event area based on fuzzy logic and the K nodes cooperate to complete the task. The K-CTSA algorithm can select a cluster head from the K nodes. In order to ensure the reliability of monitoring tasks, the clock in the active nodes must be synchronized. Clock offset and drift are estimated by using the minimum linear two multiplication between cluster head and intra cluster nodes. Experimental simulation shows that the network node survival time and stability of K-CTSA are obviously better than the TPSN, which under the premise of ensuring the synchronization accuracy.

  5. Study on Large-scale Sports Event Logistics Warehouse Management Systems Based on ZigBee Network%基于ZigBee网络的大型体育赛事物流仓储管理研究

    Institute of Scientific and Technical Information of China (English)

    符万忠

    2014-01-01

    针对大型体育赛事对物流作业的“爆发性”、“时效性”要求,设计了一种基于ZigBee网络技术的大型体育赛事物资仓储自动管理系统,运用ZigBee射频识别和嵌入式计算机技术设计了系统的软硬件平台。该系统可以很好地满足大型体育赛事举办过程中的物流仓储高效管理需求,显著提高物资的入库、出库和存储管理效率,实现大型赛事的物流仓储操作的智能化自动管理。%In this paper, in view of the requirements of large-scale sports events for logistics activities, we designed a large-scale sports event automatic warehouse management system based on the ZigBee network technology, designed the software and hardware platforms of the system and at the end, introduced the strength of the system in realizing the intelligent automatic management of the logistics warehouses in large-scale sports events.

  6. Event management

    OpenAIRE

    Myslivcová, Hana Bc.

    2007-01-01

    V práci je popsán teoretický postup při pořádání eventů, který vychází ze zásad projektového řízení. Tyto postupy jsou také aplikovány v praktické realizaci eventu. Následuje výzkum aktuálních trendů v event managementu a výzkum cílových skupin s pomocí dat MML/TGI.

  7. Topography's event

    DEFF Research Database (Denmark)

    Munck Petersen, Rikke

    The aim of the paper is first to discuss how horizon and scale can be understood, secondly how they differ and what they might have in common? If topography can be seen as a way of working with these relations experiences, creations and latencies? Thirdly if diagrams and diagrammatology can bring...... space formation - to stimulate and elaborate the event of conception and topological thinking....

  8. Rate-synchrony relationship between input and output of spike trains in neuronal networks

    Science.gov (United States)

    Wang, Sentao; Zhou, Changsong

    2010-01-01

    Neuronal networks interact via spike trains. How the spike trains are transformed by neuronal networks is critical for understanding the underlying mechanism of information processing in the nervous system. Both the rate and synchrony of the spikes can affect the transmission, while the relationship between them has not been fully understood. Here we investigate the mapping between input and output spike trains of a neuronal network in terms of firing rate and synchrony. With large enough input rate, the working mode of the neurons is gradually changed from temporal integrators into coincidence detectors when the synchrony degree of input spike trains increases. Since the membrane potentials of the neurons can be depolarized to near the firing threshold by uncorrelated input spikes, small input synchrony can cause great output synchrony. On the other hand, the synchrony in the output may be reduced when the input rate is too small. The case of the feedforward network can be regarded as iterative process of such an input-output relationship. The activity in deep layers of the feedforward network is in an all-or-none manner depending on the input rate and synchrony.

  9. A Tentative Study on Double Values of Network Language--- Based on the observation of network events/cases%网络言论的双重价值探析--基于网络事件/案件的考察

    Institute of Scientific and Technical Information of China (English)

    潘登

    2014-01-01

    Network language is a speech which is expressed by the Internet. In modern society,it is an important form of citizens' speeches. As a new thing,with the authenticity and false features coexistence,network language has positive and negative values. In the field of private rights,the network language enables citizens to take better advantage of their freedom of speech,while the disorder of network remarks will cause great damages to citizens' legal rights. On the Referees of judi-cature,the network language is the positive factor in promoting and safeguarding judicial justice. However,the huge force of public opinion will occasionally hinder the independent exercise and authority of judicial power.%网络言论是公民以网络为媒介所表达的一种言论,它是现代社会公民言论的重要表现形式。网络言论作为一种新兴事物,由于其真实性与虚假性并存的特征,因而具有积极与消极、正面与负面的双重价值。在个人权利领域,网络言论的自由表达有利于公民言论自由权利的行使,而网络言论的不当表达则极易导致对其他公民合法权利的侵害。在司法权力领域,网络言论的自由表达是促使司法公正的积极因素,而其不当表达则会侵犯司法权,损害司法独立和司法权威。

  10. Anomaly Event Detection Scheme Based on Compressive Sensing in Wireless Sensor Network%WSN中基于压缩感知的异常事件检测方案

    Institute of Scientific and Technical Information of China (English)

    姜参; 马荣娟

    2014-01-01

    异常事件检测问题是无线传感器网络中的研究热点之一。为提高检测效率,提出一种基于压缩感知的异常事件检测方案。通过压缩采样得到各个节点感知数据的测量值,将异常事件检测问题建模为带权的 l1范数最小化问题,采用正交匹配追踪算法进行迭代求解,根据检测函数对求解结果进行判断,并依据判断结果更新权值,开始下一轮迭代,直到检测出无线传感器网络中存在的所有异常事件。仿真实验结果表明,该方案的漏检率和误警率较低,与 CCM和 GEP-ADS方案相比,分别能节省约4.1%和5.8%的能耗。%The anomaly event detection problem in Wireless Sensor Network(WSN) is currently a hot topic. In order to improve the detection efficiency, this paper proposes an anomaly event detection scheme based on compressive sensing. The measurements of the sensed data are obtained based on the compressive sampling, and the anomaly event detection problem is modeled as the reweighted l1 minimization problem, which is iteratively solved by the Orthogonal Matching Pursuit(OMP) algorithm. Furthermore, the solution is judged by the detection function. The weight is refreshed in the next iteration according to the judgments, until all abnormal events are detected in Wireless Sensor Network(WSN). Experimental results show that the proposed scheme can obtain the lower probability of missed detection and false alarm in different noise environments. Compared with the CCM and GEP-ADS scheme, the energy consumption of this scheme id saved by approximately 4.1%and 5.8%.

  11. The Research of Network Public Opinion of Individual Extreme Violence Event---Taking the Event of "Being Beat of Chengdu Female Driver Because of Her Change of Lanes" for Instance%个人极端暴力事件的网络舆情传播研究*--以“成都女司机变道被暴打”事件为例

    Institute of Scientific and Technical Information of China (English)

    张武桥; 黄永林

    2015-01-01

    The event that " Chengdu female driver was beat because she changes lanes" was spread broadly, became the focus of public o-pinion of every kind of news media public,and attracted the attention of network public opinion to the problem of individual extreme vio-lence in a society. The study of network transmission through the event of " being beat of the Chengdu female driver because of her change of lanes" found that: the mainstream network media played a dominant role in the report guidance of the social public security issues, and showed clear positive effects in the public opinion guidance and the support against violence and uncivilized phenomena. However, the media was in a passive position on the agenda setting, was insufficient in the guidance of public opinion and the netizen emotions. It will be the trend to enhance the sense of responsibility of the mainstream network media on social responsibility, raise the degree of media cred-ibility, improve the media's information accuracy, and give full play to the advantages of the platform.%“成都女司机变道被暴打”事件满城风雨,成为各新闻媒体舆论聚集的焦点,并引起网络舆论对社会个人极端暴力事件的高度关注。通过对“成都女司机变道被暴打”事件的网络传播研究发现:主流网络媒体在社会公共安全问题报道议题引导上占主导地位,在舆论引导、声援反暴力、反不文明现象作用明显。但是在议程设置上处于被动地位、引导舆论上仍存发力不足、网民情绪引导上缺乏力度,而增强主流网络媒体的社会责任意识、提高媒体公信力、提高信息准确性、发挥平台优势将是大势所趋。

  12. 个人极端暴力事件的网络舆情传播研究*--以“成都女司机变道被暴打”事件为例%The Research of Network Public Opinion of Individual Extreme Violence Event---Taking the Event of "Being Beat of Chengdu Female Driver Because of Her Change of Lanes" for Instance

    Institute of Scientific and Technical Information of China (English)

    张武桥; 黄永林

    2015-01-01

    The event that " Chengdu female driver was beat because she changes lanes" was spread broadly, became the focus of public o-pinion of every kind of news media public,and attracted the attention of network public opinion to the problem of individual extreme vio-lence in a society. The study of network transmission through the event of " being beat of the Chengdu female driver because of her change of lanes" found that: the mainstream network media played a dominant role in the report guidance of the social public security issues, and showed clear positive effects in the public opinion guidance and the support against violence and uncivilized phenomena. However, the media was in a passive position on the agenda setting, was insufficient in the guidance of public opinion and the netizen emotions. It will be the trend to enhance the sense of responsibility of the mainstream network media on social responsibility, raise the degree of media cred-ibility, improve the media's information accuracy, and give full play to the advantages of the platform.%“成都女司机变道被暴打”事件满城风雨,成为各新闻媒体舆论聚集的焦点,并引起网络舆论对社会个人极端暴力事件的高度关注。通过对“成都女司机变道被暴打”事件的网络传播研究发现:主流网络媒体在社会公共安全问题报道议题引导上占主导地位,在舆论引导、声援反暴力、反不文明现象作用明显。但是在议程设置上处于被动地位、引导舆论上仍存发力不足、网民情绪引导上缺乏力度,而增强主流网络媒体的社会责任意识、提高媒体公信力、提高信息准确性、发挥平台优势将是大势所趋。

  13. Response Behavior of Local Government:A Research Based on Opinion Events from Public Opinion Channel of Renmin Network%地方政府网络舆情回应行为研究--以人民网为例

    Institute of Scientific and Technical Information of China (English)

    刘泽照; 张厚鼎

    2013-01-01

    The objective of this paper is to explore an explanation on response behavior of local government and the related dynamic process in facing network public opinion events. Based on political agenda theory, a quantitative research is conducted by using the data of selected 83 samples from Renmin Network. The results show that degree of harmfulness, media attention degree, superior intervention, administra-tive hierarchical level, information transparency, and attention distribution of local government have significant impact on response behav-iors, while the event type has no significant influence.%以风险问责和注意力为关键解释变量建构理论模型,探讨地方政府对网络舆情事件的回应,以人民网舆情频道83个案例事件为数据来源对研究假设进行检验。结果显示,网络舆情事件危害程度、媒体关注度、上级是否介入、行政层级、信息透明度、注意力分配显著影响地方政府网络舆情事件响应度,而舆情事件类型对其影响不显著。研究为地方政府舆情回应问题提供了理论解释,一定程度反映出现实地方政府回应行为的动态作用机制。

  14. Probabilistic Forecasting of Drought Events Using Markov Chain- and Bayesian Network-Based Models: A Case Study of an Andean Regulated River Basin

    Directory of Open Access Journals (Sweden)

    Alex Avilés

    2016-01-01

    Full Text Available The scarcity of water resources in mountain areas can distort normal water application patterns with among other effects, a negative impact on water supply and river ecosystems. Knowing the probability of droughts might help to optimize a priori the planning and management of the water resources in general and of the Andean watersheds in particular. This study compares Markov chain- (MC and Bayesian network- (BN based models in drought forecasting using a recently developed drought index with respect to their capability to characterize different drought severity states. The copula functions were used to solve the BNs and the ranked probability skill score (RPSS to evaluate the performance of the models. Monthly rainfall and streamflow data of the Chulco River basin, located in Southern Ecuador, were used to assess the performance of both approaches. Global evaluation results revealed that the MC-based models predict better wet and dry periods, and BN-based models generate slightly more accurately forecasts of the most severe droughts. However, evaluation of monthly results reveals that, for each month of the hydrological year, either the MC- or BN-based model provides better forecasts. The presented approach could be of assistance to water managers to ensure that timely decision-making on drought response is undertaken.

  15. [Adverse events prevention ability].

    Science.gov (United States)

    Aparo, Ugo Luigi; Aparo, Andrea

    2007-03-01

    The issue of how to address medical errors is the key to improve the health care system performances. Operational evidence collected in the last five years shows that the solution is only partially linked to future technological developments. Cultural and organisational changes are mandatory to help to manage and drastically reduce the adverse events in health care organisations. Classical management, merely based on coordination and control, is inadequate. Proactive, self-organising network based structures must be put in place and managed using adaptive, fast evolving management tools. PMID:17484160

  16. Event Index - a LHCb Event Search System

    CERN Document Server

    Ustyuzhanin, Andrey; Kazeev, Nikita; Redkin, Artem

    2015-01-01

    LHC experiments generate up to $10^{12}$ events per year. This paper describes Event Index - an event search system. Event Index's primary function is quickly selecting subsets of events from a combination of conditions, such as the estimated decay channel or stripping lines output. Event Index is essentially Apache Lucene optimized for read-only indexes distributed over independent shards on independent nodes.

  17. Simulating events

    Energy Technology Data Exchange (ETDEWEB)

    Ferretti, C.; Bruzzone, L. [Techint Italimpianti, Milan (Italy)

    2000-06-01

    The Petacalco Marine terminal on the Pacific coast in the harbour of Lazaro Carclenas (Michoacan) in Mexico, provides coal to the thermoelectric power plant at Pdte Plutarco Elias Calles in the port area. The plant is being converted from oil to burn coal to generate 2100 MW of power. The article describes the layout of the terminal and equipment employed in the unloading, coal stacking, coal handling areas and the receiving area at the power plant. The contractor Techint Italimpianti has developed a software system, MHATIS, for marine terminal management which is nearly complete. The discrete event simulator with its graphic interface provides a real-type decision support system for simulating changes to the terminal operations and evaluating impacts. The article describes how MHATIS is used. 7 figs.

  18. A Bi-feedback System of Wireless Sensor Network Event Detection in the Internet of Things%面向物联网传感器事件监测的双向反馈系统

    Institute of Scientific and Technical Information of China (English)

    杨静; 辛宇; 谢志强

    2013-01-01

    Aiming at general wireless sensor networks event detection algorithms hasn't allowed for the issues of the multidimensional dynamic uncertain data in Internet of Things, this paper proposes a bi-feedback system of wireless sensor networks event detection in the Internet of Things. The bi-feedback system consists of BS(Base Station Subsystem) and NSC Wireless Sensor Nodes Subsystem) , the BS devises the BS-DFTS (Dynamic Fault Tolerant Strategy) , which calculates the fault-tolerant threshold by factor analysis and feeds the fault-tolerant threshold back to the NS, to update the dynamic uncertain data detective parameters of NS; the NS devises the NS-DFTS (Dynamic Fault Tolerant Strategy) , which utilizes the fault-tolerant efficiency of ANN to minimize the communication cost, implements the event detection by the ANN event detective framework with the fault-tolerant threshold as argument, and feeds the result back to the BS to calculate the new fault-tolerant threshold, and implements the feedback loop between the BS and NS, to implement the event detection of the multidimensional dynamic uncertain data in Internet of Things. Finally, the effectiveness of BFS is proved by a serial of simulations.%针对一般无线传感器网络事件监测算法没有考虑物联网数据的动态不确定性问题,提出面向物联网多维动态不确定数据的事件监测双向反馈系统.该系统分为基站和无线传感器节点2个子系统,其中基站子系统(Base Station Subsystem,BS)采用BS动态容错训练策略,利用因子分析法计算容错阈值并将其反馈到无线传感器节点子系统(Wireless Sensor Nodes Subsystem,NS),以调整无线传感器节点子系统的动态不确定数据事件监测参数;其中无线传感器节点子系统采用NS动态容错训练策略,在利用人工神经网络的动态容错能力减少事件监测通信损耗的同时,通过所建立的以容错阈值为参数的人工神经网络事件监测模型进行事

  19. Events diary

    Science.gov (United States)

    2000-01-01

    as Imperial College, the Royal Albert Hall, the Royal College of Art, the Natural History and Science Museums and the Royal Geographical Society. Under the heading `Shaping the future together' BA2000 will explore science, engineering and technology in their wider cultural context. Further information about this event on 6 - 12 September may be obtained from Sandra Koura, BA2000 Festival Manager, British Association for the Advancement of Science, 23 Savile Row, London W1X 2NB (tel: 0171 973 3075, e-mail: sandra.koura@britassoc.org.uk ). Details of the creating SPARKS events may be obtained from creating.sparks@britassoc.org.uk or from the website www.britassoc.org.uk . Other events 3 - 7 July, Porto Alegre, Brazil VII Interamerican conference on physics education: The preparation of physicists and physics teachers in contemporary society. Info: IACPE7@if.ufrgs.br or cabbat1.cnea.gov.ar/iacpe/iacpei.htm 27 August - 1 September, Barcelona, Spain GIREP conference: Physics teacher education beyond 2000. Info: www.blues.uab.es/phyteb/index.html

  20. 基于事件关联网络的用户兴趣话题发现算法%Algorithm to find topics that users are interested based on network associated with events

    Institute of Scientific and Technical Information of China (English)

    乌吉斯古愣; 刘晓影; 鄢楚平

    2015-01-01

    面对海量的网络新闻信息,为了能更加准确与全面地从中发现用户感兴趣的话题,提出一种基于事件关联网络的用户兴趣话题发现算法。该算法建立了代表事件之间关联关系的事件关联网络,基于该事件关联网络,采用链接分析技术度量用户对不同新闻事件感兴趣的程度,从而采用针对新闻特定语义架构的改进Single⁃pass聚类算法发现用户感兴趣的话题。此外,采用Bootstrapping算法,实现对相关兴趣领域词汇的语义扩展。实验表明,该算法能够更加准确而全面地获取用户感兴趣的话题。%Being faced of massive Internet news information,to improve the accuracy of detecting the topics that the users are interested,a topic detection algorithm based on the network associated with the events is proposed for users’interest. The algorithm established an event⁃related network representative of relevance relationship among news events. The link analysis tech⁃nique is used to measure the degree of user interest in the news,so as to identify the topics that the users are interested by using an improved Single⁃pass clustering algorithm based on news specific semantic structure. In addition,Bootstrapping algo⁃rithm is adopted to achieve the related interest words’semantic extensions. The experiment result shows that the algorithm can more accurately and comprehensively get the topics that the users are interested.

  1. HS-streamCube: Real-time multi-dimensional analysis system on network security event stream%HS-StreamCube:网络安全事件流实时多维分析系统

    Institute of Scientific and Technical Information of China (English)

    甘亮; 李润恒; 贾焰; 刘健

    2013-01-01

    大规模网络安全监控应用中,决策者应用数据流联机在线分析(Stream OLAP)技术对网络安全事件流建立流数据方(Stream Cube)进行实时分析,以了解当前网络安全状况并动态评估当前网络安全态势.由于内存容量有限,Stream Cube只关注当前时间窗口内的数据,而对于时间窗口外的过期数据则采用近似存储或简单地丢弃,所以不支持超出时间窗口范围的大时间窗口查询.针对以上缺陷,提出一种多维多层安全事件流实时分析框架HS-StreamCube,采用内存和外存两层混合存储模式实现任意时间窗口的精确查询;然后根据数据流特点重点研究两层混合存储模式下HS-StreamCube的模型、构建、存储管理和查询等;最后通过实验验证该系统的可用性和高效性.%In the applications of large-scale network security monitoring, data stream of security e-vents is analysised real-timely to acquire the characteristic of current security in the network and to assess dynamically the current security situation with Stream OLAP by building Stream Cube. Because of the limited memory capacity, Stream Cube only concerned about the current data within the time window, but expired data is stored approximately or simply discarded, so it do not support the query with time beyond the scope of current time window. We propose a real-time StreamCube-based multi-dimensional and multi-level analysis framework on security event stream, Hybrid StorageStreamCube, which is implemented by a two-tier (memory and disk) storage model. On the basis of characteristics of data stream,we focus on the modeling,building,storing and querying of HS-StreamCube within the two-tier storage model. Efficient experiments verify the availability and efficiency of the system.

  2. Training-Based Management of Network Public Opinions on Tourist Events%基于教育培训的旅游网络舆情管理研究

    Institute of Scientific and Technical Information of China (English)

    雷春; 付业勤

    2014-01-01

    文章从教育培训视角下,对包括旅游者在内的公民信息素养教育、旅游企业和政府管理部门专业人员的舆情应对培训问题进行了探索性研究。首先,介绍了信息素养的概念和教育意义,分析了信息素养的主要构成,提出了信息素养教育的相关对策;第二,针对旅游企业和政府旅游管理部门的专业人员,介绍了网络舆情应对培训的内涵,总结了网络舆情应对培训的目标和方案。%This paper ,taking the perspective of education and training ,explores the training of citizens'informa-tion literacy and of staff's crisis handling in tourism businesses and the government .The paper starts with an a-nalysis of the definition ,significance and components of information literacy as well as strategies for information literacy education .Targeting the staff in tourism businesses and tourism authorities ,the paper then gives an in-troduction to the training on crisis handling of network public opinions ,summarizes the plan and goal for such training in the hope of providing reference for management of network public opinions on tourism events .

  3. Deterministic event-based simulation of quantum interference

    OpenAIRE

    De Raedt, K.; De Raedt, H.; Michielsen, K.

    2004-01-01

    We propose and analyse simple deterministic algorithms that can be used to construct machines that have primitive learning capabilities. We demonstrate that locally connected networks of these machines can be used to perform blind classification on an event-by-event basis, without storing the information of the individual events. We also demonstrate that properly designed networks of these machines exhibit behavior that is usually only attributed to quantum systems. We present networks that s...

  4. Deterministic event-based simulation of quantum phenomena

    OpenAIRE

    De Raedt, K.; De Raedt, H.; Michielsen, K.

    2005-01-01

    We propose and analyse simple deterministic algorithms that can be used to construct machines that have primitive learning capabilities. We demonstrate that locally connected networks of these machines can be used to perform blind classification on an event-by-event basis, without storing the information of the individual events. We also demonstrate that properly designed networks of these machines exhibit behavior that is usually only attributed to quantum systems. We present networks that s...

  5. News Conference: Bloodhound races into history Competition: School launches weather balloon Course: Update weekends inspire teachers Conference: Finland hosts GIREP conference Astronomy: AstroSchools sets up schools network to share astronomy knowledge Teaching: Delegates praise science events in Wales Resources: ELI goes from strength to strength International: South Sudan teachers receive training Workshop: Delegates experience universality

    Science.gov (United States)

    2011-11-01

    Conference: Bloodhound races into history Competition: School launches weather balloon Course: Update weekends inspire teachers Conference: Finland hosts GIREP conference Astronomy: AstroSchools sets up schools network to share astronomy knowledge Teaching: Delegates praise science events in Wales Resources: ELI goes from strength to strength International: South Sudan teachers receive training Workshop: Delegates experience universality

  6. Neural networks in seismic discrimination

    Energy Technology Data Exchange (ETDEWEB)

    Dowla, F.U.

    1995-01-01

    Neural networks are powerful and elegant computational tools that can be used in the analysis of geophysical signals. At Lawrence Livermore National Laboratory, we have developed neural networks to solve problems in seismic discrimination, event classification, and seismic and hydrodynamic yield estimation. Other researchers have used neural networks for seismic phase identification. We are currently developing neural networks to estimate depths of seismic events using regional seismograms. In this paper different types of network architecture and representation techniques are discussed. We address the important problem of designing neural networks with good generalization capabilities. Examples of neural networks for treaty verification applications are also described.

  7. Hierarchical Routing Algorithm in Event-Driven Wireless Sensor Networks%一种事件驱动型无线传感器网络的分层路由算法

    Institute of Scientific and Technical Information of China (English)

    沈永增; 陈宣扬; 贾莲莲

    2011-01-01

    Based on researches on TEEN protocol and combined the characteristic of monitoring emergences system, an event-driven hierarchical routing algorithm (TEEN-PE) has been proposed to reduce the energy consumption in the monitoring system of emergences and prolong the lifetime of the wireless sensor networks (WSN). TEEN-PE has solved the problems of the difficulty in determining the initial number of the optimal clusters and the asymmetrical distribution of cluster in TEEN protocol. And to improve the communication balance of the networks on times and space, the algorithm is taken into accounts the factor of the residual energy of the nodes and the distance of the node to the base station during the phase of cluster formation and communicates among clusters. The algorithm can effectively reduce energy consumption and prolong the lifetime of the networks. It is proved by simulated in NS-2, and the simulation results show that TEEN-PE has an advantage over TEEN protocol on nodes survival and energy consumption.%为了降低无线传感器网络在突发事件监测系统中的能量消耗,延长网络生存周期,结合突发事件监测系统的特点,在TEEN协议的基础上进行改进,设计实现了一种基于事件驱动的分层路由算法——TEEN-PE算法.该算法采用先分区再建簇的方式解决了TEEN协议中最优簇首个数难以确定、簇首分布不均匀等问题.同时,在簇形成阶段和簇间通信阶段,综合考虑节点剩余能量以及节点到基站的距离因素,以提高网络在时间上和空间上的通信平衡.该算法能有效降低节点能耗、延长网络生存周期.最后通过NS-2进行仿真,仿真结果显示,TEEN-PE算法在节点存活率以及能耗上要明显优于TEEN协议.

  8. Econometrics Network Information Society

    Directory of Open Access Journals (Sweden)

    Aleksandr Bogomolov

    2014-04-01

    Full Text Available The paper proposes to overcome the shortcomings of classical econometrics , noted economists and practitioners, scientists , using the capabilities of modern computer and information technology, network approach to the description of models and methodology agent - based modeling . The authors propose to introduce the concept of a network and the network of natural economic agent , the latter is a random event , the probability of which can be determined based on Bayesian belief networks .

  9. Synchronous changes in the seismicity rate and ocean-bottom hydrostatic pressures along the Nankai trough: A possible slow slip event detected by the Dense Oceanfloor Network system for Earthquakes and Tsunamis (DONET)

    Science.gov (United States)

    Suzuki, Kensuke; Nakano, Masaru; Takahashi, Narumi; Hori, Takane; Kamiya, Shinichiro; Araki, Eiichiro; Nakata, Ryoko; Kaneda, Yoshiyuki

    2016-06-01

    We detected long-term hydrostatic pressure changes at ocean-bottom stations of the Dense Oceanfloor Network system for Earthquakes and Tsunamis (DONET) along the Nankai trough, off southwestern Japan. We detected these changes after removing the contributions of ocean mass variations and sensor drift from the records. In addition, we detected a decrease in the background seismicity rate of a nearby earthquake cluster that was synchronous with the hydrostatic pressure changes. We interpreted these observed hydrostatic pressure changes to reflect vertical deformation of the ocean floor of 3-8 cm, and we consider the cause of the seafloor crustal deformation to be a slow slip event (SSE) beneath the stations. Because the pressure changes were observed at stations with distances less than 20 km to each other, we inferred that the SSE occurred in the shallow part of the sedimentary wedge, such as on a splay fault system. The synchronous observation of an SSE and a seismicity rate change suggests that both were triggered by a change in the regional stress that may be associated with stress accumulation and release processes occurring along the Nankai trough. These data show that continuous and careful monitoring of crustal activities by DONET stations provides an effective way to detect seismic and geodetic signals related to the occurrence of megathrust or other types of large earthquakes.

  10. Functional Connectivity in MRI Is Driven by Spontaneous BOLD Events.

    Directory of Open Access Journals (Sweden)

    Thomas W Allan

    Full Text Available Functional brain signals are frequently decomposed into a relatively small set of large scale, distributed cortical networks that are associated with different cognitive functions. It is generally assumed that the connectivity of these networks is static in time and constant over the whole network, although there is increasing evidence that this view is too simplistic. This work proposes novel techniques to investigate the contribution of spontaneous BOLD events to the temporal dynamics of functional connectivity as assessed by ultra-high field functional magnetic resonance imaging (fMRI. The results show that: 1 spontaneous events in recognised brain networks contribute significantly to network connectivity estimates; 2 these spontaneous events do not necessarily involve whole networks or nodes, but clusters of voxels which act in concert, forming transiently synchronising sub-networks and 3 a task can significantly alter the number of localised spontaneous events that are detected within a single network. These findings support the notion that spontaneous events are the main driver of the large scale networks that are commonly detected by seed-based correlation and ICA. Furthermore, we found that large scale networks are manifestations of smaller, transiently synchronising sub-networks acting dynamically in concert, corresponding to spontaneous events, and which do not necessarily involve all voxels within the network nodes oscillating in unison.

  11. Caregiving as a Family Network Event.

    Science.gov (United States)

    Mellins, Claude A.; And Others

    Caregiving studies often focus on the impaired elder who is the care receiver and the one family member who is perceived as the primary caregiver. Such studies fail to consider all members of the family, whether or not they are involved in providing care. This study was conducted to explore the effects of an elder's health-related dependency on…

  12. Event Index - an LHCb Event Search System

    CERN Document Server

    Ustyuzhanin, Andrey

    2015-01-01

    During LHC Run 1, the LHCb experiment recorded around 1011 collision events. This paper describes Event Index | an event search system. Its primary function is to quickly select subsets of events from a combination of conditions, such as the estimated decay channel or number of hits in a subdetector. Event Index is essentially Apache Lucene [1] optimized for read-only indexes distributed over independent shards on independent nodes.

  13. Event Index - an LHCb Event Search System

    OpenAIRE

    Ustyuzhanin, Andrey; Artemov, Alexey; Kazeev, Nikita; Redkin, Artem

    2015-01-01

    During LHC Run 1, the LHCb experiment recorded around $10^{11}$ collision events. This paper describes Event Index - an event search system. Its primary function is to quickly select subsets of events from a combination of conditions, such as the estimated decay channel or number of hits in a subdetector. Event Index is essentially Apache Lucene optimized for read-only indexes distributed over independent shards on independent nodes.

  14. Extracting Event Dynamics from Event-by-Event Analysis

    OpenAIRE

    Fu, Jinghua; Liu, Lianshou

    2003-01-01

    The problem of eliminating the statistical fluctuations and extracting the event dynamics from event-by-event analysis is discussed. New moments $G_p$ (for continuous distribution), and $G_{q,p}$ (for anomalous distribution) are proposed, which are experimentally measurable and can eliminate the Poissonian type statistical fluctuations to recover the dynamical moments $C_p$ and $C_{q,p}$. In this way, the dynamical distribution of the event-averaged transverse momentum $\\bar{\\pt}$ can be extr...

  15. Gastrointestinal events with clopidogrel

    DEFF Research Database (Denmark)

    Grove, Erik Lerkevang; Würtz, Morten; Schwarz, Peter;

    2013-01-01

    Clopidogrel prevents cardiovascular events, but has been linked with adverse gastrointestinal (GI) complications, particularly bleeding events.......Clopidogrel prevents cardiovascular events, but has been linked with adverse gastrointestinal (GI) complications, particularly bleeding events....

  16. Creating Special Events

    Science.gov (United States)

    deLisle, Lee

    2009-01-01

    "Creating Special Events" is organized as a systematic approach to festivals and events for students who seek a career in event management. This book looks at the evolution and history of festivals and events and proceeds to the nuts and bolts of event management. The book presents event management as the means of planning, organizing, directing,…

  17. AN SVM-BASED ABNORMAL EVENTS DETECTION SCHEME IN WIRELESS SENSOR NETWORKS%无线传感网中一种基于支持向量机的异常事件检测方案

    Institute of Scientific and Technical Information of China (English)

    李力

    2015-01-01

    异常事件检测问题是无线传感器网络中的研究热点之一。针对现有检测方案的不足,设计一种新的时间-空间-属性单类超球面支持向量机来建模异常事件检测问题,然后提出无线传感器网络在线和部分在线离群点检测算法。该算法根据节点间的时间-空间和属性关联度确定超球面的半径,最后以在线方式鉴别到达节点的每一个新的测量值是正常数据还是异常数据。仿真实验结果表明,与基于时空关联度的超球面支持向量机相比,新算法的检测率大大上升,虚警率明显下降。同时,部分在线算法与在线算法的效率相当,大大降低了计算和通信复杂度。%Abnormal events detection is one of the research focuses in wireless sensor networks.Aiming at the disadvantages of existing detection schemes,we design a new spatiotemporal-attribute one-class hypersphere SVM (STA-HS-SVM)to model the abnormal events detection problem,and present the online and partial-online outlier detection algorithms for WSNs as well.The algorithms determine the radius of hypersphere according to the spatiotemporal and attribute correlations between the nodes,and finally identify in the way of online whether every new measurement arriving at the nodes is the normal data or the abnormal data.Simulation experimental results indicate that the new algorithms have significant increase in outlier detection rates and remarkable reduction in false positive rates than the spatiotemporal correlation-based hypersphere SVM.Meanwhile,the partial-online algorithm has similar efficiency as the online algorithm,thereby the computational and communication complexities are significantly decreased.

  18. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  19. Events Triggered by two Network Database Concurrency Control Thinking%由两个网络事件引发的数据库并发控制的思考

    Institute of Scientific and Technical Information of China (English)

    俞席忠

    2012-01-01

      This paper analyzes the two network standstill database concurrency control efficiency of the system plays a vital role, optimistic locking and pessimistic locking, indicating high concurrent network environment, database concurrency control op⁃tions.

  20. The ATLAS Event Service: A New Approach to Event Processing

    CERN Document Server

    Calafiura, Paolo; The ATLAS collaboration; Guan, Wen; Maeno, Tadashi; Nilsson, Paul; Oleynik, Danila; Panitkin, Sergey; Tsulaia, Vakhtang; van Gemmeren, Peter; Wenaus, Torre

    2015-01-01

    The ATLAS Event Service (ES) implements a new fine grained approach to HEP event processing, designed to be agile and efficient in exploiting transient, short-lived resources such as HPC hole-filling, spot market commercial clouds, and volunteer computing. Input and output control and data flows, bookkeeping, monitoring, and data storage are all managed at the event level in an implementation capable of supporting ATLAS-scale distributed processing throughputs (about 4M CPU-hours/day). Input data flows utilize remote data repositories with no data locality or pre­staging requirements, minimizing the use of costly storage in favor of strongly leveraging powerful networks. Object stores provide a highly scalable means of remotely storing the quasi-continuous, fine grained outputs that give ES based applications a very light data footprint on a processing resource, and ensure negligible losses should the resource suddenly vanish. We will describe the motivations for the ES system, its unique features and capabi...

  1. A Multievent Congestion Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Shah GhalibA; Hussain FaisalB; Cebi Yalcin

    2008-01-01

    Abstract Wireless sensor networks are application-dependent networks. An application may require general event region information, per-node event region information, or prioritized event information in case of multiple events. All event flows are subject to congestion in wireless sensor networks. This is due to the sudden impulse of information flow from a number of event nodes to a single destination. Congestion degrades system throughput and results in energy loss of nodes. In this paper, w...

  2. AOP event manager in open service gateway

    Institute of Scientific and Technical Information of China (English)

    Intae Kim; Unkee Kim; Keewook Rim; Junghyun Lee

    2007-01-01

    The Open Service Gateway Initiative (OSGi) has played an important role in ubiquitous environments that support interoperability among embedded devices, such as home appliances and network devices. However, the OSGi does not have a common event mechanism yet, and it is difficult to communicate among services asynchronously. In the present work, a common event manager, Aspect-Oriented Event Manager (AOEM), was designed on an OSGi framework. AOEM supports services to generate and provide notification of events. This paper presents the implementation of AOEM as an OSGi bundle with AspectJ. The experiment on transferring between device service and application service demonstrate that AOEM provides good abstraction of the services and convenience.

  3. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  4. Keterlibatan Event Stakeholders pada Keberhasilan Event PR

    Directory of Open Access Journals (Sweden)

    Lidya Wati Evelina

    2013-03-01

    Full Text Available The objective of this article is to determine how event organizers collaborate with stakeholders including the media, particular community, sponsors, participants, venue providers, accommodation providers, carteres, legal and finance personnel, production, local trade, transportation providers, government and associations for implementation Public Relations event. This paper discusses about the things that must be done for the cooperation and the benefits of cooperation undertaken. The method used in this paper is qualitative research method based on observations, literature and case studies. The results of this research note that the event organizers or companies can together with the stakeholders (the other party make an event as mutually beneficial Public Relations. This means that all parties can achieve through the event. At the conclusion of an event Public Relations, all stakeholders involved for their own purposes. Event organizer must ensure that all stakeholders work together effectively in accordance with the agreed schedule and budget. One important feature of the agreement is to maintain a good flow of communication according to the needs of its stakeholders. All information is documented to avoid misunderstandings. Collaboration between stakeholders continuously until the event is completed. Discussion of issues that arise during the event takes place between the committee with various stakeholders is an important thing for the evaluation and response to the events that occurred.

  5. A wireless time synchronized event control system

    Science.gov (United States)

    Klug, Robert; Williams, Jonathan; Scheffel, Peter

    2014-05-01

    McQ has developed a wireless, time-synchronized, event control system to control, monitor, and record events with precise timing over large test sites for applications such as high speed rocket sled payload testing. Events of interest may include firing rocket motors and launch sleds, initiating flares, ejecting bombs, ejecting seats, triggering high speed cameras, measuring sled velocity, and triggering events based on a velocity window or other criteria. The system consists of Event Controllers, a Launch Controller, and a wireless network. The Event Controllers can be easily deployed at areas of interest within the test site and maintain sub-microsecond timing accuracy for monitoring sensors, electronically triggering other equipment and events, and providing timing signals to other test equipment. Recorded data and status information is reported over the wireless network to a server and user interface. Over the wireless network, the user interface configures the system based on a user specified mission plan and provides real time command, control, and monitoring of the devices and data. An overview of the system, its features, performance, and potential uses is presented.

  6. Comparative Efficacy and Safety of Different Antiplatelet Agents for Prevention of Major Cardiovascular Events and Leg Amputations in Patients with Peripheral Arterial Disease: A Systematic Review and Network Meta-Analysis

    Science.gov (United States)

    Katsanos, Konstantinos; Spiliopoulos, Stavros; Saha, Prakash; Diamantopoulos, Athanasios; Karunanithy, Narayan; Krokidis, Miltiadis; Modarai, Bijan; Karnabatidis, Dimitris

    2015-01-01

    There is a lack of consensus regarding which type of antiplatelet agent should be used in patients with peripheral arterial disease (PAD) and little is known on the advantages and disadvantages of dual antiplatelet therapy. We conducted a systematic review and network meta-analysis of available randomized controlled trials (RCT) comparing different antiplatelet drugs (Aspirin, Ticlopidine, Clopidogrel, Ticagrelor, Cilostazol, Picotamide and Vorapaxar as monotherapies or in combination with aspirin) in PAD patients (PROSPERO public database; CRD42014010299).We collated evidence from previous relevant meta-analyses and searched online databases. Primary efficacy endpoints were: (1) the composite rate of major adverse cardiovascular events (MACE; including vascular deaths, non-fatal myocardial infarction and non-fatal stroke), and (2) the rate of major leg amputations. The primary safety endpoint was the rate of severe bleeding events. Bayesian models were employed for multiple treatment comparisons and risk-stratified hierarchies of comparative efficacy were produced to aid medical decision making. Number-Needed-to-Treat (NNT) and Number-Needed-to-Harm (NNH) are reported in case of significant results. We analyzed 49 RCTs comprising 34,518 patients with 88,358 person-years of follow-up with placebo as reference treatment. Aspirin, Cilostazol, Vorapaxar and Picotamide were ineffective in reducing MACE. A significant MACE reduction was noted with Ticagrelor plus aspirin (RR: 0.67; 95%CrI: 0.46–0.96, NNT = 66), Clopidogrel (RR: 0.72; 95%CrI: 0.58–0.91, NNT = 80), Ticlopidine (RR: 0.75; 95%CrI: 0.58–0.96, NNT = 87), and Clopidogrel plus aspirin (RR: 0.78; 95%CrI: 0.61–0.99, NNT = 98). Dual antiplatelet therapy with Clopidogrel plus aspirin significantly reduced major amputations following leg revascularization (RR: 0.68; 95%CrI: 0.46–0.99 compared to aspirin, NNT = 94). The risk of severe bleeding was significantly higher with Ticlopidine (RR: 5.03; 95%CrI: 1

  7. Bilinear Mixed-Effects Models for Affiliation Networks

    OpenAIRE

    Jia, Yanan; Calder, Catherine A.; Christopher R. Browning

    2014-01-01

    An affiliation network is a particular type of two-mode social network that consists of a set of `actors' and a set of `events' where ties indicate an actor's participation in an event. Although networks describe a variety of consequential social structures, statistical methods for studying affiliation networks are less well developed than methods for studying one-mode, or actor-actor, networks. One way to analyze affiliation networks is to consider one-mode network matrices that are derived ...

  8. Seismic-event location in regional distances

    Energy Technology Data Exchange (ETDEWEB)

    Thurber, C.

    1991-03-22

    Three-component data from regional seismic events recorded by the former NRDC-Soviet Academy of Sciences regional seismic network in Kazakhstan, USSR, have been analyzed with the primary goal of improving regional seismic event location capability. Data from these events were used in the investigation of the following problems related to regional event location: (1) determination of wave arrival azimuth; (2) observability and value of secondary phase arrivals; (3) evaluation and improvement of regional event location algorithms; (4) independent determination of master event locations. Starting with very little prior information, the authors have demonstrated the potential for a sparse seismic network of three 3-component stations to locate events over a wide region with reasonable accuracy and precision, both for epicenter and depth. Their basic findings are: that arrival azimuth can be determined with reasonable precision, but the data provide little in the way of location constraint in most cases; secondary phase arrivals are routinely observable over a wide distance range, and they provide important location constraints; existing location algorithms perform well and provide appropriate estimates of location uncertainty, but must be modified for far-regional applications. Numerous master events have been identified and used to improve their location capability.

  9. Reactive Processing of RDF Streams of Events

    OpenAIRE

    Calbimonte, Jean-Paul; Aberer, Karl

    2015-01-01

    Events on the Web are increasingly being produced in the form of data streams, and are present in many different scenarios and applications such as health monitoring, environmental sensing or social networks. The heterogeneity of event streams has raised the challenges of integrating, interpreting and processing them coherently. Semantic technologies have shown to provide both a formal and practical framework to address some of these challenges, producing standards for representation and quer...

  10. Keterlibatan Event Stakeholders pada Keberhasilan Event PR

    OpenAIRE

    Lidya Wati Evelina

    2013-01-01

    The objective of this article is to determine how event organizers collaborate with stakeholders including the media, particular community, sponsors, participants, venue providers, accommodation providers, carteres, legal and finance personnel, production, local trade, transportation providers, government and associations for implementation Public Relations event. This paper discusses about the things that must be done for the cooperation and the benefits of cooperation undertaken. The method...

  11. Neural Networks

    Directory of Open Access Journals (Sweden)

    Schwindling Jerome

    2010-04-01

    Full Text Available This course presents an overview of the concepts of the neural networks and their aplication in the framework of High energy physics analyses. After a brief introduction on the concept of neural networks, the concept is explained in the frame of neuro-biology, introducing the concept of multi-layer perceptron, learning and their use as data classifer. The concept is then presented in a second part using in more details the mathematical approach focussing on typical use cases faced in particle physics. Finally, the last part presents the best way to use such statistical tools in view of event classifers, putting the emphasis on the setup of the multi-layer perceptron. The full article (15 p. corresponding to this lecture is written in french and is provided in the proceedings of the book SOS 2008.

  12. Complex Aperture Networks

    CERN Document Server

    Owladeghaffari, Hamed

    2009-01-01

    A complex network approach on a rough fracture is developed. In this manner, some hidden metric spaces (similarity measurements) between apertures profiles are set up and a general evolutionary network in two directions (in parallel and perpendicular to the shear direction) is constructed. Evaluation of the emerged network shows the connectivity degree (distribution) of network, after a transition step; fall in to the stable states which are coincided with the Gaussian distribution. Based on this event and real observations of the complex network changes, an algorithm (COmplex Networks on Apertures: CONA) is proposed in which evolving of a network is accomplished using preferential detachments and attachments of edges (based on a competition and game manner) while the number of nodes is fixed. Also, evolving of clustering coefficients and number of edges display similar patterns as well as are appeared in shear stress, hydraulic conductivity and dilation changes, which can be engaged to estimate shear strengt...

  13. VAFLE: visual analytics of firewall log events

    Science.gov (United States)

    Ghoniem, Mohammad; Shurkhovetskyy, Georgiy; Bahey, Ahmed; Otjacques, Benoît.

    2013-12-01

    In this work, we present VAFLE, an interactive network security visualization prototype for the analysis of firewall log events. Keeping it simple yet effective for analysts, we provide multiple coordinated interactive visualizations augmented with clustering capabilities customized to support anomaly detection and cyber situation awareness. We evaluate the usefulness of the prototype in a use case with network traffic datasets from previous VAST Challenges, illustrating its effectiveness at promoting fast and well-informed decisions. We explain how a security analyst may spot suspicious traffic using VAFLE. We further assess its usefulness through a qualitative evaluation involving network security experts, whose feedback is reported and discussed.

  14. Using Bayesian Belief Networks and event trees for volcanic hazard assessment and decision support : reconstruction of past eruptions of La Soufrière volcano, Guadeloupe and retrospective analysis of 1975-77 unrest.

    Science.gov (United States)

    Komorowski, Jean-Christophe; Hincks, Thea; Sparks, Steve; Aspinall, Willy; Legendre, Yoann; Boudon, Georges

    2013-04-01

    Since 1992, mild but persistent seismic and fumarolic unrest at La Soufrière de Guadeloupe volcano has prompted renewed concern about hazards and risks, crisis response planning, and has rejuvenated interest in geological studies. Scientists monitoring active volcanoes frequently have to provide science-based decision support to civil authorities during such periods of unrest. In these circumstances, the Bayesian Belief Network (BBN) offers a formalized evidence analysis tool for making inferences about the state of the volcano from different strands of data, allowing associated uncertainties to be treated in a rational and auditable manner, to the extent warranted by the strength of the evidence. To illustrate the principles of the BBN approach, a retrospective analysis is undertaken of the 1975-77 crisis, providing an inferential assessment of the evolving state of the magmatic system and the probability of subsequent eruption. Conditional dependencies and parameters in the BBN are characterized quantitatively by structured expert elicitation. Revisiting data available in 1976 suggests the probability of magmatic intrusion would have been evaluated high at the time, according with subsequent thinking about the volcanological nature of the episode. The corresponding probability of a magmatic eruption therefore would have been elevated in July and August 1976; however, collective uncertainty about the future course of the crisis was great at the time, even if some individual opinions were certain. From this BBN analysis, while the more likely appraised outcome - based on observational trends at 31 August 1976 - might have been 'no eruption' (mean probability 0.5; 5-95 percentile range 0.8), an imminent magmatic eruption (or blast) could have had a probability of about 0.4, almost as substantial. Thus, there was no real scientific basis to assert one scenario was more likely than the other. This retrospective evaluation adds objective probabilistic expression to

  15. The global event system

    Energy Technology Data Exchange (ETDEWEB)

    Winans, J.

    1994-03-02

    The support for the global event system has been designed to allow an application developer to control the APS event generator and receiver boards. This is done by the use of four new record types. These records are customized and are only supported by the device support modules for the APS event generator and receiver boards. The use of the global event system and its associated records should not be confused with the vanilla EPICS events and the associated event records. They are very different.

  16. Creating Reality: How TV News Distorts Events.

    Science.gov (United States)

    Altheide, David L.

    A three-year research project, including more than one year in a network affiliate station, provided the material for an analysis of current practices in television news programming. Based on the thesis that the organization of news encourages the oversimplification of events, this analysis traces the foundation of the bias called the "news…

  17. Analysis hierarchical model for discrete event systems

    Science.gov (United States)

    Ciortea, E. M.

    2015-11-01

    The This paper presents the hierarchical model based on discrete event network for robotic systems. Based on the hierarchical approach, Petri network is analysed as a network of the highest conceptual level and the lowest level of local control. For modelling and control of complex robotic systems using extended Petri nets. Such a system is structured, controlled and analysed in this paper by using Visual Object Net ++ package that is relatively simple and easy to use, and the results are shown as representations easy to interpret. The hierarchical structure of the robotic system is implemented on computers analysed using specialized programs. Implementation of hierarchical model discrete event systems, as a real-time operating system on a computer network connected via a serial bus is possible, where each computer is dedicated to local and Petri model of a subsystem global robotic system. Since Petri models are simplified to apply general computers, analysis, modelling, complex manufacturing systems control can be achieved using Petri nets. Discrete event systems is a pragmatic tool for modelling industrial systems. For system modelling using Petri nets because we have our system where discrete event. To highlight the auxiliary time Petri model using transport stream divided into hierarchical levels and sections are analysed successively. Proposed robotic system simulation using timed Petri, offers the opportunity to view the robotic time. Application of goods or robotic and transmission times obtained by measuring spot is obtained graphics showing the average time for transport activity, using the parameters sets of finished products. individually.

  18. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  19. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter

    2011-01-01

    Sloep, P. B. (2011). Learning Networks, Networked Learning. Presentation at Annual Assembly of the European Society for the Systemic Innovation of Education - ESSIE. May, 27, 2011, Leuven, Belgium: Open University in the Netherlands.

  20. Advertising Effectiveness In Events

    OpenAIRE

    Jain, Sushilkumar

    2012-01-01

    Confronted with decreasing effectiveness of the classic marketing communications, events have become an increasingly popular alternative for marketers. Events constitute one of the most exciting and fastest growing forms of leisure and business. With time, the decreasing effectiveness of classical marketing communications boosted the use of events for marketing and making brand awareness. Event marketing is seen as the unique opportunity to integrate the firm’s communication activities like p...

  1. Event Normalization Through Dynamic Log Format Detection

    Institute of Scientific and Technical Information of China (English)

    Christoph Meinel

    2014-01-01

    The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format.

  2. Event matrix system

    International Nuclear Information System (INIS)

    The number of background events in nuclear and particle physics experiments which use multiwire proportional chambers can be extremely high. Using a computer to resolve these events results in a high deadtime for the experiment. A fast matrix system for decreasing the number of background events is described in this report. 4 figures

  3. Event generators at BESⅢ

    Institute of Scientific and Technical Information of China (English)

    PING Rong-Gang

    2008-01-01

    We present a brief remark and introduction to event generators for tau-charm physics currently used at BESⅢ,including KKMC,BesEvtGen,Bhlumi,Bhwide,Babayaga and inclusive Monte-Carlo event generators.This paper provides basic information on event generators for BESⅢ users.

  4. Event studies in Turkey

    Directory of Open Access Journals (Sweden)

    Ulkem Basdas

    2014-09-01

    Full Text Available The primary goal of this paper is to review the event studies conducted for Turkey to in order to identify the common components in their designs. This paper contributes to the existing literature by reviewing all event studies for Turkey for the first time, but more importantly; this review leads to the upcoming event studies on Turkey by highlighting main components of a proper design. Based on the review of 75 studies, it is observed that event studies generally choose BIST-100 (formerly, ISE-100 market index and market adjusted returns with the parametric tests. In general, the studies prefer to rely on one type of model to calculate abnormal returns without discussing the selection of the underlying model. Especially for the event studies focusing on the impact of political events or macroeconomic announcements in Turkey, there is a risk of clustering due to the application of same event date for all observations.

  5. Optimalization of Distributed Classification of the Convergence Event

    OpenAIRE

    Kenyeres, M.

    2015-01-01

    The goal of this paper is to optimize the convergence process in distributed computing. We performed two experiments for five networks and according to the obtained results derived theoretical conclusions to optimize the classification of the convergence event.

  6. Real-time event classification in field sport videos

    OpenAIRE

    Kapela, Rafal; Świetlicka, Aleksandra; Rybarczyk, Andrzej; Kolanowski, Krzysztof; O''Connor, Noel E.

    2015-01-01

    The paper presents a novel approach to real-time event detection in sports broadcasts. We present how the same underlying audio-visual feature extraction algorithm based on new global image descriptors is robust across a range of different sports alleviating the need to tailor it to a particular sport. In addition, we propose and evaluate three different classifiers in order to detect events using these features: a feed-forward neural network, an Elman neural network and a decision tree. Each...

  7. Network Potentials

    OpenAIRE

    Chakrabarti, Subhadip; Gilles, Robert Paul

    2005-01-01

    A network payoff function assigns a utility to all participants in a (social) network. In this paper we discuss properties of such network payoff functions that guarantee the existence of certain types of pairwise stable networks and the convergence of certain network formation processes. In particular we investigate network payoff functions that admit an exact network potential or an ordinal network potential. We relate these network potentials to exact and ordinal potentials of a non-cooper...

  8. Quartets and unrooted phylogenetic networks.

    Science.gov (United States)

    Gambette, Philippe; Berry, Vincent; Paul, Christophe

    2012-08-01

    Phylogenetic networks were introduced to describe evolution in the presence of exchanges of genetic material between coexisting species or individuals. Split networks in particular were introduced as a special kind of abstract network to visualize conflicts between phylogenetic trees which may correspond to such exchanges. More recently, methods were designed to reconstruct explicit phylogenetic networks (whose vertices can be interpreted as biological events) from triplet data. In this article, we link abstract and explicit networks through their combinatorial properties, by introducing the unrooted analog of level-k networks. In particular, we give an equivalence theorem between circular split systems and unrooted level-1 networks. We also show how to adapt to quartets some existing results on triplets, in order to reconstruct unrooted level-k phylogenetic networks. These results give an interesting perspective on the combinatorics of phylogenetic networks and also raise algorithmic and combinatorial questions.

  9. Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern

    OpenAIRE

    Ravisankar.A; Swetha.G

    2014-01-01

    This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broadcast an alarm message to the entire network. To increase lifetime of the network, sleeping methods are always implemented in WSNs, it increases the delay of alarm message broadcasting. In this paper, we propose a novel sleep scheduling method to reduce the delay of ala...

  10. Networks model of the East Turkistan terrorism

    Science.gov (United States)

    Li, Ben-xian; Zhu, Jun-fang; Wang, Shun-guo

    2015-02-01

    The presence of the East Turkistan terrorist network in China can be traced back to the rebellions on the BAREN region in Xinjiang in April 1990. This article intends to research the East Turkistan networks in China and offer a panoramic view. The events, terrorists and their relationship are described using matrices. Then social network analysis is adopted to reveal the network type and the network structure characteristics. We also find the crucial terrorist leader. Ultimately, some results show that the East Turkistan network has big hub nodes and small shortest path, and that the network follows a pattern of small world network with hierarchical structure.

  11. Event sponsorship in China

    OpenAIRE

    Y. Fan; Pfitzenmaier, N

    2002-01-01

    Event marketing is currently at the infant stage in China, but holds a great potential in future. This is concluded from an Internet-based survey. The respondents believe that event marketing provides international companies with a viable alternative to the increasingly cluttered mass media, and plays a key role in the integrated marketing communications (IMC). Sponsoring sports and music events is found particularly effective in reaching the opinion leaders and innovators, and establishing f...

  12. LIFE EVENTS AND DEPRESSION

    OpenAIRE

    R N Chatterjee; Mukherjee, S. P.; Nandi, D.N.

    1981-01-01

    SUMMARY The life events occurring in a 6 month period preceding onset of illness in 50 OPD primary depressives were inquired into by a Life Events Inventory and compared with those in a corresponding time period of 50 matched controls. The relation between life events and the depth of depression at initial interview was also studied. The results are analysed and the probable pitfalls discussed.

  13. Event Detection in Tweets

    Directory of Open Access Journals (Sweden)

    Houssem Eddine Dridi

    Full Text Available We present a system for finding, from Twitter data, events that raised the interest of users within a given time period and the important dates for each event. An event is represented by many terms whose frequency increases suddenly at one or more moments during the analysed period. In order to determine the terms (especially the hashtags dealing with a topic, we propose methods to cluster similar terms: phonetic methods adapted to the writing mode used by users and some statistical methods. In order to select the set of events, we used three main criteria: frequency, variation and Tf*Idf.

  14. Network Competition with Local Network

    OpenAIRE

    Oystein Fjeldstad; Moen, Espen R; Christian Riis

    2007-01-01

    Local network externalities are present when the network externalities associated with entering a certain network depends not only on the total number of agents in the network, but on the identity of the agents in the network. We explore the consequences of local network externalities within a framework where two networks compete on the Hotelling circle. We first show that local network externalities, in contrast to global network externalities, do not sharpen competition. Then we show that t...

  15. Global Seismic Event Detection Using Surface Waves: 15 Possible Antarctic Glacial Sliding Events

    Science.gov (United States)

    Chen, X.; Shearer, P. M.; Walker, K. T.; Fricker, H. A.

    2008-12-01

    To identify overlooked or anomalous seismic events not listed in standard catalogs, we have developed an algorithm to detect and locate global seismic events using intermediate-period (35-70s) surface waves. We apply our method to continuous vertical-component seismograms from the global seismic networks as archived in the IRIS UV FARM database from 1997 to 2007. We first bandpass filter the seismograms, apply automatic gain control, and compute envelope functions. We then examine 1654 target event locations defined at 5 degree intervals and stack the seismogram envelopes along the predicted Rayleigh-wave travel times. The resulting function has spatial and temporal peaks that indicate possible seismic events. We visually check these peaks using a graphical user interface to eliminate artifacts and assign an overall reliability grade (A, B or C) to the new events. We detect 78% of events in the Global Centroid Moment Tensor (CMT) catalog. However, we also find 840 new events not listed in the PDE, ISC and REB catalogs. Many of these new events were previously identified by Ekstrom (2006) using a different Rayleigh-wave detection scheme. Most of these new events are located along oceanic ridges and transform faults. Some new events can be associated with volcanic eruptions such as the 2000 Miyakejima sequence near Japan and others with apparent glacial sliding events in Greenland (Ekstrom et al., 2003). We focus our attention on 15 events detected from near the Antarctic coastline and relocate them using a cross-correlation approach. The events occur in 3 groups which are well-separated from areas of cataloged earthquake activity. We speculate that these are iceberg calving and/or glacial sliding events, and hope to test this by inverting for their source mechanisms and examining remote sensing data from their source regions.

  16. Safeguards summary event list (SSEL)

    International Nuclear Information System (INIS)

    The List contains nine categories of events involving NRC licensed material or licensees. It is deliberately broad in scope for two main reasons. First, the list is designed to serve as a reference document. It is as complete and accurate as possible. Second, the list is intended to provide as broad a perspective of the nature of licensee-related events as possible. The nine categories of events are as follows: bomb-related events; intrusion events; missing and/or allegedly stolen events; transportation-related events; vandalism events; arson events; firearms-related events; sabotage events; and miscellaneous events

  17. In Whom Do We Trust - Sharing Security Events

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2016-01-01

    Security event sharing is deemed of critical importance to counteract large-scale attacks at Internet service provider (ISP) networks as these attacks have become larger, more sophisticated and frequent. On the one hand, security event sharing is regarded to speed up organization's mitigation and re

  18. Deterministic event-based simulation of quantum phenomena

    NARCIS (Netherlands)

    De Raedt, K; De Raedt, H; Michielsen, K

    2005-01-01

    We propose and analyse simple deterministic algorithms that can be used to construct machines that have primitive learning capabilities. We demonstrate that locally connected networks of these machines can be used to perform blind classification on an event-by-event basis, without storing the inform

  19. Seeding Event: Creating and Developing Spaces of Entrepreneurial Freedom

    Directory of Open Access Journals (Sweden)

    Gaëtan Mourmant

    2012-12-01

    Full Text Available This paper addresses the question of initiating, fostering and growing a vibrant economy by developing Spaces of Entrepreneurial Freedom (SoEF. Establishing and developing the SoEF is explained by a seeding event which is the core category of this grounded theory. In short, a seeding event leads to the patching of a potential, structural “hole”, which may prove valuable to an entrepreneurial network. Seeding events are started by an initiator who will recognize a network opportunity and exploit it. After event designing, the initiators implement the event through bold experimentation and using an adaptive structure. If the event is considered successful, the next stages are refining, growing, templating and finally replicating; these stages may occur one after the other or simultaneously. Through the development of SoEF, we suggest that entrepreneurs, governments, universities, large companies, and other players in the business world can improve the development of entrepreneurship at their respective levels.

  20. Features, Events, and Processes: Disruptive Events

    International Nuclear Information System (INIS)

    The primary purpose of this analysis is to evaluate seismic- and igneous-related features, events, and processes (FEPs). These FEPs represent areas of natural system processes that have the potential to produce disruptive events (DE) that could impact repository performance and are related to the geologic processes of tectonism, structural deformation, seismicity, and igneous activity. Collectively, they are referred to as the DE FEPs. This evaluation determines which of the DE FEPs are excluded from modeling used to support the total system performance assessment for license application (TSPA-LA). The evaluation is based on the data and results presented in supporting analysis reports, model reports, technical information, or corroborative documents that are cited in the individual FEP discussions in Section 6.2 of this analysis report

  1. Features, Events, and Processes: Disruptive Events

    Energy Technology Data Exchange (ETDEWEB)

    J. King

    2004-03-31

    The primary purpose of this analysis is to evaluate seismic- and igneous-related features, events, and processes (FEPs). These FEPs represent areas of natural system processes that have the potential to produce disruptive events (DE) that could impact repository performance and are related to the geologic processes of tectonism, structural deformation, seismicity, and igneous activity. Collectively, they are referred to as the DE FEPs. This evaluation determines which of the DE FEPs are excluded from modeling used to support the total system performance assessment for license application (TSPA-LA). The evaluation is based on the data and results presented in supporting analysis reports, model reports, technical information, or corroborative documents that are cited in the individual FEP discussions in Section 6.2 of this analysis report.

  2. Features, Events, and Processes: Disruptive Events

    Energy Technology Data Exchange (ETDEWEB)

    P. Sanchez

    2004-11-08

    The purpose of this analysis report is to evaluate and document the inclusion or exclusion of the disruptive events features, events, and processes (FEPs) with respect to modeling used to support the total system performance assessment for license application (TSPA-LA). A screening decision, either ''Included'' or ''Excluded,'' is given for each FEP, along with the technical basis for screening decisions. This information is required by the U.S. Nuclear Regulatory Commission (NRC) at 10 CFR 63.114 (d), (e), and (f) [DIRS 156605]. The FEPs addressed in this report deal with both seismic and igneous disruptive events, such as fault displacements through the repository and an igneous intrusion into the repository. For included FEPs, this analysis summarizes the implementation of the FEP in TSPA-LA (i.e., how the FEP is included). For excluded FEPs, this analysis provides the technical basis for exclusion from TSPA-LA (i.e., why the FEP is excluded). Previous versions of this report were developed to support the total system performance assessments (TSPA) for various prior repository designs. This revision addresses the repository design for the license application (LA).

  3. The ATLAS Event Builder

    CERN Document Server

    Vandelli, W; Battaglia, A; Beck, H P; Blair, R; Bogaerts, A; Bosman, M; Ciobotaru, M; Cranfield, R; Crone, G; Dawson, J; Dobinson, Robert W; Dobson, M; Dos Anjos, A; Drake, G; Ermoline, Y; Ferrari, R; Ferrer, M L; Francis, D; Gadomski, S; Gameiro, S; Gorini, B; Green, B; Haberichter, W; Haberli, C; Hauser, R; Hinkelbein, C; Hughes-Jones, R; Joos, M; Kieft, G; Klous, S; Korcyl, K; Kordas, K; Kugel, A; Leahu, L; Lehmann, G; Martin, B; Mapelli, L; Meessen, C; Meirosu, C; Misiejuk, A; Mornacchi, G; Müller, M; Nagasaka, Y; Negri, A; Pasqualucci, E; Pauly, T; Petersen, J; Pope, B; Schlereth, J L; Spiwoks, R; Stancu, S; Strong, J; Sushkov, S; Szymocha, T; Tremblet, L; Ünel, G; Vermeulen, J; Werner, P; Wheeler-Ellis, S; Wickens, F; Wiedenmann, W; Yu, M; Yasu, Y; Zhang, J; Zobernig, H; 2007 IEEE Nuclear Science Symposium and Medical Imaging Conference

    2008-01-01

    Event data from proton-proton collisions at the LHC will be selected by the ATLAS experiment in a three-level trigger system, which, at its first two trigger levels (LVL1+LVL2), reduces the initial bunch crossing rate of 40~MHz to $sim$3~kHz. At this rate, the Event Builder collects the data from the readout system PCs (ROSs) and provides fully assembled events to the Event Filter (EF). The EF is the third trigger level and its aim is to achieve a further rate reduction to $sim$200~Hz on the permanent storage. The Event Builder is based on a farm of O(100) PCs, interconnected via a Gigabit Ethernet to O(150) ROSs. These PCs run Linux and multi-threaded software applications implemented in C++. All the ROSs, and substantial fractions of the Event Builder and Event Filter PCs have been installed and commissioned. We report on performance tests on this initial system, which is capable of going beyond the required data rates and bandwidths for Event Building for the ATLAS experiment.

  4. Introduction to neural networks

    International Nuclear Information System (INIS)

    This lecture is a presentation of today's research in neural computation. Neural computation is inspired by knowledge from neuro-science. It draws its methods in large degree from statistical physics and its potential applications lie mainly in computer science and engineering. Neural networks models are algorithms for cognitive tasks, such as learning and optimization, which are based on concepts derived from research into the nature of the brain. The lecture first gives an historical presentation of neural networks development and interest in performing complex tasks. Then, an exhaustive overview of data management and networks computation methods is given: the supervised learning and the associative memory problem, the capacity of networks, the Perceptron networks, the functional link networks, the Madaline (Multiple Adalines) networks, the back-propagation networks, the reduced coulomb energy (RCE) networks, the unsupervised learning and the competitive learning and vector quantization. An example of application in high energy physics is given with the trigger systems and track recognition system (track parametrization, event selection and particle identification) developed for the CPLEAR experiment detectors from the LEAR at CERN. (J.S.). 56 refs., 20 figs., 1 tab., 1 appendix

  5. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  6. The ATLAS Event Service: A new approach to event processing

    Science.gov (United States)

    Calafiura, P.; De, K.; Guan, W.; Maeno, T.; Nilsson, P.; Oleynik, D.; Panitkin, S.; Tsulaia, V.; Van Gemmeren, P.; Wenaus, T.

    2015-12-01

    The ATLAS Event Service (ES) implements a new fine grained approach to HEP event processing, designed to be agile and efficient in exploiting transient, short-lived resources such as HPC hole-filling, spot market commercial clouds, and volunteer computing. Input and output control and data flows, bookkeeping, monitoring, and data storage are all managed at the event level in an implementation capable of supporting ATLAS-scale distributed processing throughputs (about 4M CPU-hours/day). Input data flows utilize remote data repositories with no data locality or pre-staging requirements, minimizing the use of costly storage in favor of strongly leveraging powerful networks. Object stores provide a highly scalable means of remotely storing the quasi-continuous, fine grained outputs that give ES based applications a very light data footprint on a processing resource, and ensure negligible losses should the resource suddenly vanish. We will describe the motivations for the ES system, its unique features and capabilities, its architecture and the highly scalable tools and technologies employed in its implementation, and its applications in ATLAS processing on HPCs, commercial cloud resources, volunteer computing, and grid resources. Notice: This manuscript has been authored by employees of Brookhaven Science Associates, LLC under Contract No. DE-AC02-98CH10886 with the U.S. Department of Energy. The publisher by accepting the manuscript for publication acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do so, for United States Government purposes.

  7. Statistical language analysis for automatic exfiltration event detection.

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, David Gerald

    2010-04-01

    This paper discusses the recent development a statistical approach for the automatic identification of anomalous network activity that is characteristic of exfiltration events. This approach is based on the language processing method eferred to as latent dirichlet allocation (LDA). Cyber security experts currently depend heavily on a rule-based framework for initial detection of suspect network events. The application of the rule set typically results in an extensive list of uspect network events that are then further explored manually for suspicious activity. The ability to identify anomalous network events is heavily dependent on the experience of the security personnel wading through the network log. Limitations f this approach are clear: rule-based systems only apply to exfiltration behavior that has previously been observed, and experienced cyber security personnel are rare commodities. Since the new methodology is not a discrete rule-based pproach, it is more difficult for an insider to disguise the exfiltration events. A further benefit is that the methodology provides a risk-based approach that can be implemented in a continuous, dynamic or evolutionary fashion. This permits uspect network activity to be identified early with a quantifiable risk associated with decision making when responding to suspicious activity.

  8. Forecasting Turbine Icing Events

    DEFF Research Database (Denmark)

    Davis, Neil; Hahmann, Andrea N.; Clausen, Niels-Erik;

    2012-01-01

    In this study, we present a method for forecasting icing events. The method is validated at two European wind farms in with known icing events. The icing model used was developed using current ice accretion methods, and newly developed ablation algorithms. The model is driven by inputs from the WRF...... accumulations, which have not been seen in observations. In addition to the model evaluation we were able to investigate the potential occurrence of ice induced power loss at two wind parks in Europe using observed data. We found that the potential loss during an icing event is large even when the turbine...

  9. Forecasting Turbine Icing Events

    DEFF Research Database (Denmark)

    Davis, Neil; Hahmann, Andrea N.; Clausen, Niels-Erik;

    In this study, we present a method for forecasting icing events. The method is validated at two European wind farms in with known icing events. The icing model used was developed using current ice accretion methods, and newly developed ablation algorithms. The model is driven by inputs from the WRF...... accumulations, which have not been seen in observations. In addition to the model evaluation we were able to investigate the potential occurrence of ice induced power loss at two wind parks in Europe using observed data. We found that the potential loss during an icing event is large even when the turbine...

  10. Selective Expansion of Local Politics: Local Events and Local Government in the Network%地方政治的被选择性扩大——网络环境下的地方性事件和地方政府

    Institute of Scientific and Technical Information of China (English)

    梁津伟

    2011-01-01

    某些具有独特性质的地方性事件在经过网民激烈讨论形成网络舆论的过程中被选择性扩大了,而地方性事件从某些方面来说就是地方政治的一个缩影,所以地方性事件的被选择性扩大就意味着地方政治的被选择性扩大,而事件的性质、传统媒体的报道、网络平台的讨论以及地方政府在处理这些地方性事件时所采取的策略都是地方政治被选择性扩大的重要因素。地方政治的被选择性扩大使地方政府改变了处理这些地方性事件的方式。%In the process of the forming of cyber public opinion, some typical local events with particular characteristics are selectively expanded after the extensive dispute from netizens. And in some aspects, local events are the epitomes of the local politics, in another word, the local politics is selectively expanded as well. The important factors contributing to this phenomenon include the nature of the events, the reports from traditional media, the discussions on the network platform and the problem - solving strategies that the local governments resort to. As to the local governments, the selective expansion of local politics changed their ways to deal with these local events.

  11. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  12. UbiBroker:event-based communication middleware

    OpenAIRE

    Luojus, P. (Petri)

    2013-01-01

    This thesis presents the UbiBroker, an event-based communication middleware for ubiquitous computing environments. The experimental computing environment used in the thesis is provided by the UBI-hotspots, a network of pervasive displays deployed around Oulu. The functional requirements for the UbiBroker are elicited from the long-term experience in developing and maintaining the middleware software layer for the UBI-hotspots, including support for distributed ad hoc applications triggered by...

  13. "Universe" event at AIMS

    Science.gov (United States)

    2008-06-01

    Report of event of 11 May 2008 held at the African Institute of Mathematical Sciences (Muizenberg, Cape), with speakers Michael Griffin (Administrator of NASA), Stephen Hawking (Cambridge), David Gross (Kavli Institute, Santa Barbara) and George Smoot (Berkeley).

  14. CCG - News & Events

    Science.gov (United States)

    NCI's Center for Cancer Genomics (CCG) has been widely recognized for its research efforts to facilitiate advances in cancer genomic research and improve patient outcomes. Find the latest news about and events featuring CCG.

  15. RAS Initiative - Events

    Science.gov (United States)

    The NCI RAS Initiative has organized multiple events with outside experts to discuss how the latest scientific and technological breakthroughs can be applied to discover vulnerabilities in RAS-driven cancers.

  16. 2005-2010年浙江省网络直报食物中毒事件分析%Food-poisoning events reported through network directly in Zhejiang province, 2005 -2010

    Institute of Scientific and Technical Information of China (English)

    刘碧瑶; 徐旭卿; 王臻; 陈慧萍; 赵艳荣; 蒋庭魁

    2012-01-01

    Objective To understand the epidemiological characteristics of food poisoning in Zhejiang from 2005 to 2010 and provide evidences for the prevention and control of food poisoning. Methods Descriptive epidemiological analysis was conducted on the incidence data of food poisoning events reported through national public health emergency reporting information system during this period to understand their causal agents, time distribution and responsible units Results A total of 134 food poisoning events were reported, involving 3703 cases (7 deaths). The majority of food poisoning occurred during summer-autumn. Both the event number and case number of microorganism poisoning were far more than other type of poisoning. The deaths were mainly caused by globefish, poisonous mushroom and nitrite poisonings. Food service including school canteens and restaurants were main responsible units, homes were the main places. Conclusion It is necessary to strengthen the management of sea food circulation, improve the food safety management in schools, conduct health education about food safety and increase food inspection/detection level to reduce the incidence of food poisoning.%目的 对2005 - 2010年浙江省通过国家“突发公共卫生事件报告管理信息系统”报告的食物中毒事件进行分析,为预防和控制食物中毒提供依据.方法 对食物中毒事件的基本情况、致病因素、时间分布、责任单位等进行统计分析.结果 2005-2010年浙江省网络直报食物中毒事件134起,发病3703例,死亡7例,事件以夏秋季高发.微生物类食物中毒事件数和发病数远远超过其余类别.造成死亡的中毒原因主要为河豚鱼、毒蘑菇及亚硝酸盐.学校食堂、饮食服务单位和家庭是食物中毒高发的主要场所或责任单位.结论 需加强海产品的流通环节管理,做好学校食品卫生管理工作,落实食品安全知识健康教育,提高检验检测水平.

  17. Solar extreme events

    OpenAIRE

    Hudson, Hugh S.

    2015-01-01

    Solar flares and CMEs have a broad range of magnitudes. This review discusses the possibility of "extreme events," defined as those with magnitudes greater than have been seen in the existing historical record. For most quantitative measures, this direct information does not extend more than a century and a half into the recent past. The magnitude distributions (occurrence frequencies) of solar events (flares/CMEs) typically decrease with the parameter measured or inferred (peak flux, mass, e...

  18. Gargamelle: neutral current event

    CERN Multimedia

    1973-01-01

    This event shows real tracks of particles from the 1200 litre Gargamelle bubble chamber that ran on the PS from 1970 to 1976 and on the SPS from 1976 to 1979. In this image a neutrino passes close to a nucleon and reemerges as a neutrino. Such events are called neutral curent, as they are mediated by the Z0 boson which has no electric charge.

  19. Infrasound Event Analysis into the IDC Operations

    Science.gov (United States)

    Mialle, Pierrick; Bittner, Paulina; Brachet, Nicolas; Brown, David; Given, Jeffrey; Le Bras, Ronan; Coyne, John

    2010-05-01

    The first atmospheric event built only from infrasound arrivals was reported in the Reviewed Event Bulletin (REB) of the International Data Centre (IDC) of the Comprehensive Nuclear Test Ban Treaty Organization (CTBTO) in 2003. In the last decade, 42 infrasound stations from the International Monitoring System (IMS) have been installed and are transmitting data to the IDC. The growing amount of infrasound data and detections produced by the automatic system challenged the station and network processing at the IDC, which required the Organization to redesign the way infrasound data are processed. Each infrasound array is processed separately for signal detection using a progressive multi-channel correlation method (DFX-PMCC). For each detection, signal features - onset time, amplitude, frequency, duration, azimuth, phase velocity, F-statistics - are measured and used to identify a detection as infrasonic, seismic, or noise (including clutter). Infrasonic signals along with seismic and hydroacoustic signals are subsequently associated with Global Association software (GA) between stations to locate events. During detection and association phases, criteria are applied to eliminate clutter, identify signals of interest, and keep the number of automatic events containing infrasound detections to a manageable level for analyst review. The IDC has developed analysis and visualization tools specifically for infrasound review (e.g. Geotool-PMCC). The IDC has continued to build the Infrasound Reference Event Database (IRED) from observations on the IMS network. This database assists both the routine IDC infrasound analysis and analyst training as it reflects the global detection capability of the network, illustrates the spatial and temporal variability of the observed phenomena, and demonstrates the various origins of infragenic sources. Since 2007, the IDC has introduced new analyst procedures to review and add selected infrasound events to the REB. In early 2010, the IDC

  20. Abnormal Event Detection Scheme Based on Compressive Sensing and GM (1,1) in Wireless Sensor Networks%无线传感器网络中基于压缩感知和GM(1,1)的异常检测方案

    Institute of Scientific and Technical Information of China (English)

    李鹏; 王建新; 曹建农

    2015-01-01

    In order to solve the problems of the low accuracy and the high energy cost by the existing abnormal event detection algorithm in Wireless Sensor Networks (WSN), this paper proposes an abnormal event detection algorithm based on Compressive Sensing (CS) and Grey Model(1,1) ( GM(1,1) ). Firstly, the network is divided into the clusters, and the data are sampled based on compressive sensing and are forwarded to the Sink. According to the characteristics of the unknown data sparsity in WSN, this paper proposes a block-sparse signal reconstruction algorithm based on the adaptive step. Then the abnormal event is predicted based on the GM(1,1) at the Sink node, and the work status of the node is adaptively adjusted. The simulation results show that, compared with the other anomaly detection algorithms, the proposed algorithm has lower probability of false detection and missed detection, and effectively saves the energy of nodes, with assurance the reliability of abnormal event detection at the same time.%针对现有的异常事件检测算法准确率低和能量开销较大等问题,该文提出一种基于压缩感知(CS)和GM(1,1)的异常事件检测方案。首先,基于分簇的思想将传感器节点的数据进行压缩采样后传输至Sink,针对传感器网络中数据稀疏度未知的特点,提出一种基于步长自适应的块稀疏信号重构算法。然后,Sink基于GM(1,1)对节点发生的异常进行预测,并对节点的工作状态进行自适应调整。仿真实验结果表明,相比于其它异常检测算法,该算法的误警率和漏检率较低,在保证异常事件检测可靠性的同时,有效地节省了节点能量。

  1. Introduction to Network Simulator NS2

    CERN Document Server

    Issariyakul, Teerawat

    2008-01-01

    A beginners' guide for network simulator NS2, an open-source discrete event simulator designed mainly for networking research. It presents two fundamental NS2 concepts: how objects are assembled to create a network and how a packet flows from one object to another

  2. Detecting Priming News Events

    CERN Document Server

    Wu, Di; Yu, Jeffrey Xu; Liu, Zheng

    2012-01-01

    We study a problem of detecting priming events based on a time series index and an evolving document stream. We define a priming event as an event which triggers abnormal movements of the time series index, i.e., the Iraq war with respect to the president approval index of President Bush. Existing solutions either focus on organizing coherent keywords from a document stream into events or identifying correlated movements between keyword frequency trajectories and the time series index. In this paper, we tackle the problem in two major steps. (1) We identify the elements that form a priming event. The element identified is called influential topic which consists of a set of coherent keywords. And we extract them by looking at the correlation between keyword trajectories and the interested time series index at a global level. (2) We extract priming events by detecting and organizing the bursty influential topics at a micro level. We evaluate our algorithms on a real-world dataset and the result confirms that ou...

  3. 1997: notifiable events

    International Nuclear Information System (INIS)

    In May 1998, the German Federal Ministry for the Environment, Nature Conservation, and Rector Safety (BMU) presented the 1997 survey of 'Notifiable events in plants for nuclear fuel fission - nuclear power and research reactors whose maximum power exceeds 50 kW of continuous thermal power - in the Federal Republic of Germany'. Since 1975, the operators of nuclear power plants in the Federal Republic of Germany have been required to report to the nuclear supervisory authorities all notifiable events in accordance with standard national reporting criteria. This official reporting system serves for monitoring the safety status of notifiable plants and use the findings derived from the events reported to improve the safety status of plants within the supervisory procedures where necessary. The reports constitute an important base for the early detection of defects and for preventing the occurrence of similar defects in other plants. In 1997, there were 117 notifiable events in nuclear power plants in the Federal Republic of Germany. None of these events is to be classified as an accident, and in none of the events were dose limits under the German Radiation Protection Ordinance exceeded. (orig.)

  4. Rare event simulation using Monte Carlo methods

    CERN Document Server

    Rubino, Gerardo

    2009-01-01

    In a probabilistic model, a rare event is an event with a very small probability of occurrence. The forecasting of rare events is a formidable task but is important in many areas. For instance a catastrophic failure in a transport system or in a nuclear power plant, the failure of an information processing system in a bank, or in the communication network of a group of banks, leading to financial losses. Being able to evaluate the probability of rare events is therefore a critical issue. Monte Carlo Methods, the simulation of corresponding models, are used to analyze rare events. This book sets out to present the mathematical tools available for the efficient simulation of rare events. Importance sampling and splitting are presented along with an exposition of how to apply these tools to a variety of fields ranging from performance and dependability evaluation of complex systems, typically in computer science or in telecommunications, to chemical reaction analysis in biology or particle transport in physics. ...

  5. A Framework For An Event Driven Video Surveillance System

    Directory of Open Access Journals (Sweden)

    Declan Kieran

    2011-02-01

    Full Text Available In this paper we present an event driven surveillance system that uses multiple cameras. The purpose of this system is to enable thorough exploration of surveillance events. The system uses a client-server web architecture as this provides scalability for further development of the system infrastructure. The system is designed to be accessed by surveillance operators who can review and comment on events generated by our event detection processing modules. We do not just focus on event detection, but are working towards the optimization of event detection. A multiple camera network system that tracks a moving object (or person and decides if this is an event of interest is also examined. Dynamic switching of the cameras is implemented to aid in human monitoring of the network. The camera displayed in the main view should be the camera with the most interesting activity occurring. Unusual activity is defined as activity occurring that is not of the norm. Normal activity is considered to be everyday repeated activity. Further thought will be given to the extension of this system into a distributed system that would effectively create an event web system. Our contributions are to the development of automated real-time switching of camera views to aid camera operators in the effort of effective video surveillance, and also the detection of events of interest within a surveillance environment, with appropriate alerts and storage of these events. To the best of our knowledge this system provides a novel approach to the technological surveillance paradigm.

  6. Concepts of event-by-event analysis

    Energy Technology Data Exchange (ETDEWEB)

    Stroebele, H. [Universitaet Frankfurt (Germany)

    1995-07-15

    The particles observed in the final state of nuclear collisions can be divided into two classes: those which are susceptible to strong interactions and those which are not, like leptons and the photon. The bulk properties of the {open_quotes}matter{close_quotes} in the reaction zone may be read-off the kinematical characteristics of the particles observable in the final state. These characteristics are strongly dependent on the last interaction these particles have undergone. In a densly populated reaction zone strongly interacting particles will experience many collisions after they have been formed and before they emerge into the asymptotic final state. For the particles which are not sensitive to strong interactions their formation is also their last interaction. Thus photons and leptons probe the period during which they are produced whereas hadrons reflect the so called freeze-out processes, which occur during the late stage in the evolution of the reaction when the population density becomes small and the mean free paths long. The disadvantage of the leptons and photons is their small production cross section; they cannot be used in an analysis of the characteristics of individual collision events, because the number of particles produced per event is too small. The hadrons, on the other hand, stem from the freeze-out period. Information from earlier periods requires multiparticle observables in the most general sense. It is one of the challenges of present day high energy nuclear physics to establish and understand global observables which differentiate between mere hadronic scenarios, i.e superposition of hadronic interactions, and the formation of a partonic (short duration) steady state which can be considered a new state of matter, the Quark-Gluon Plasma.

  7. “牛奶黄曲霉毒素超标”事件网络传播过程和内容分析%Analysis of network communication and content “aflatoxin contamination contamination in milk” event

    Institute of Scientific and Technical Information of China (English)

    梅风格; 张莹; 李可基

    2012-01-01

    Objective To analyze the process of a media event concerning aflatoxin contamination in milk in 2011, and the scientific reasonability of relevant health hazard information. Methods All relevant news and Sina Blogs were collected, and their contents and characteristics of the health hazard information were analyzed by the framework method. The scientific information in media and blogs was compared with the evidences reviewed by the official reports of the international authorities. Results Late in December 2011, the event was broke out and ended by the end of January 2012.The news focused on the event itself initially and then moved to the causes, influences and treatments of the contamination; the headlines of 56. 1% news and 91. 9% Blogs contained the word "carcinogenic" ; the contents of 97. 9% news emphasized on the unconditional carcinogenic effect of aflatoxin, without describing its dose-effect relationship; the 90% sources of the information were unprofessional and the possibility of the health damages and impacts described was not consistent with the scientific consensus. Conclusion It was the message that " carcinogenic milk" attracted high attention of public; the sources of information of the media coverage were unreliable and the contents were repetitive, and were not well science-based.%目的 分析2011年末“牛奶黄曲霉毒素超标”媒介事件中,网络媒体报道和信息的传播过程及传播内容的科学性.方法 收集事件期间所有网络新闻报道和博客文章,用多层框架分析有关健康信息的传播过程、内容与特征,根据国际权威机构给出的证据和结论对有关信息的科学性进行半定量评价.结果 事件起于2011年12月下旬,2012年1月接近平息,随时间的变化媒体关注点从事件本身逐渐转移到事件的原因、影响和处理;56.1%的媒体新闻与91.9%的博文标题中均含有“致癌”词语,97.9%的新闻在内容上均强调黄曲霉毒素“无条

  8. RETRIEVAL EVENTS EVALUATION

    International Nuclear Information System (INIS)

    The purpose of this analysis is to evaluate impacts to the retrieval concept presented in the Design Analysis ''Retrieval Equipment and Strategy'' (Reference 6), from abnormal events based on Design Basis Events (DBE) and Beyond Design Basis Events (BDBE) as defined in two recent analyses: (1) DBE/Scenario Analysis for Preclosure Repository Subsurface Facilities (Reference 4); and (2) Preliminary Preclosure Design Basis Event Calculations for the Monitored Geologic Repository (Reference 5) The objective of this task is to determine what impacts the DBEs and BDBEs have on the equipment developed for retrieval. The analysis lists potential impacts and recommends changes to be analyzed in subsequent design analyses for developed equipment, or recommend where additional equipment may be needed, to allow retrieval to be performed in all DBE or BDBE situations. This analysis supports License Application design and therefore complies with the requirements of Systems Description Document input criteria comparison as presented in Section 7, Conclusions. In addition, the analysis discusses the impacts associated with not using concrete inverts in the emplacement drifts. The ''Retrieval Equipment and Strategy'' analysis was based on a concrete invert configuration in the emplacement drift. The scope of the analysis, as presented in ''Development Plan for Retrieval Events Evaluation'' (Reference 3) includes evaluation and criteria of the following: Impacts to retrieval from the emplacement drift based on DBE/BDBEs, and changes to the invert configuration for the preclosure period. Impacts to retrieval from the main drifts based on DBE/BDBEs for the preclosure period

  9. Statistically Bounding Detection Latency in Low-Duty-Cycled Sensor Networks

    OpenAIRE

    Yanmin Zhu

    2012-01-01

    Detecting abnormal events represents an important family of applications for wireless sensor networks. To achieve high performance of event detection, a sensor network should stay active most of the time, which is energy inefficient for battery driven sensor networks. This paper studies the fundamental problem of bounding detection delays when the sensor network is low duty cycled. We propose a novel approach for statistically bounding detection latency for event detection in sensor networks....

  10. 影响性司法事件的网络舆论民粹主义倾向的根源与消解--基于基尼系数的视角%The Trend and Digestion of Network Populism in the Influncial Judicial event-From the Perspective of Gini Coefficient

    Institute of Scientific and Technical Information of China (English)

    刘李明

    2014-01-01

    影响性司法事件中的网络舆论已出现民粹主义的倾向。网络民粹主义倾向的非理性特征主要表现为冲动、盲目、暴力和易被利用,容易走向极端的民粹主义。在司法领域,这种危险主要表现为破坏司法独立和程序正义。民粹主义的产生有着社会根源和土壤,以基尼系数为视角,通过对我国2003年以来的基尼系数的数据分析,挖掘我国网络民粹主义倾向产生的社会成因,进而找出了消解网络民粹主义倾向的策略。加强收入分配制度改革,降低我国的基尼系数以减小贫富分化;加强反腐力度和制度监督,杜绝黑色及灰色收入;加强司法改革,促进司法公开;通过理性化疏导策略来使网络民粹主义逐渐克服某些非理性表现。%This paper analyzes the characteristics and causes of the trend of the network populism in influencial judicial events ,compared with the general network public opinion populist similarities and differences,and puts forward the network populism strategies,namely,from the radically reduce social injustice,dissolve public dissatisfaction.Specific to the field of justice,judicial departments should do the judicial openness,justice,to prevent judicial corruption,rational communication and di-alogue in the framework of range of the law and social public opinion,it will gradually win people's re-spect and trust,and gradually establish a judicial authority.Network public opinion in the influence ju-dicial event has occurred populism trend.Non rational network populism are mainly of blind,impul-sive,violent and is easy to use.These are the dangerous to go to extremly populism.In the judicial field,the risk is mainly to undermine judicial independence and justice of procedure.Populism has its social roots and soil.From the Gene coefficient perspective,through the Gene coefficient since 2003 on China's data analysis,the social causes of mining the Chinese Internet

  11. 影响性司法事件的网络舆论民粹主义倾向的根源与消解--基于基尼系数的视角%The Trend and Digestion of Network Populism in the Influncial Judicial event-From the Perspective of Gini Coefficient

    Institute of Scientific and Technical Information of China (English)

    刘李明

    2014-01-01

    This paper analyzes the characteristics and causes of the trend of the network populism in influencial judicial events ,compared with the general network public opinion populist similarities and differences,and puts forward the network populism strategies,namely,from the radically reduce social injustice,dissolve public dissatisfaction.Specific to the field of justice,judicial departments should do the judicial openness,justice,to prevent judicial corruption,rational communication and di-alogue in the framework of range of the law and social public opinion,it will gradually win people's re-spect and trust,and gradually establish a judicial authority.Network public opinion in the influence ju-dicial event has occurred populism trend.Non rational network populism are mainly of blind,impul-sive,violent and is easy to use.These are the dangerous to go to extremly populism.In the judicial field,the risk is mainly to undermine judicial independence and justice of procedure.Populism has its social roots and soil.From the Gene coefficient perspective,through the Gene coefficient since 2003 on China's data analysis,the social causes of mining the Chinese Internet populism tendency to produce, then find out the digestion network populism strategy.First,strengthen the reform of the income dis-tribution system,reduce China's Gini coefficient to reduce the gap between the rich and the poor.Sec-ondly,strengthen supervision and anti-corruption system,put an end to the gray income.Third, strengthen the judicial reform,promote judicial openness.Finally,through rational persuasion strate-gy to gradually overcome the non internet populism something rational.%影响性司法事件中的网络舆论已出现民粹主义的倾向。网络民粹主义倾向的非理性特征主要表现为冲动、盲目、暴力和易被利用,容易走向极端的民粹主义。在司法领域,这种危险主要表现为破坏司法独立和程序正义。民粹主义的产生有着社会根源和

  12. A Comprehensive Experimental Comparison of Event Driven and Multi-Threaded Sensor Node Operating Systems

    Directory of Open Access Journals (Sweden)

    Cormac Duffy

    2008-03-01

    Full Text Available The capabilities of a sensor network are strongly influenced by the operating system used on the sensor nodes. In general, two different sensor network operating system types are currently considered: event driven and multi-threaded. It is commonly assumed that event driven operating systems are more suited to sensor networks as they use less memory and processing resources. However, if factors other than resource usage are considered important, a multi-threaded system might be preferred. This paper compares the resource needs of multi-threaded and event driven sensor network operating systems. The resources considered are memory usage and power consumption. Additionally, the event handling capabilities of event driven and multi-threaded operating systems are analyzed and compared. The results presented in this paper show that for a number of application areas a thread-based sensor network operating system is feasible and preferable.

  13. Reporting of safeguards events

    International Nuclear Information System (INIS)

    On June 9, 1987, the Commission published in the Federal Register a final rule revising the reporting requirements for safeguards events. Safeguards events include actual or attempted theft of special nuclear material (SNM); actual or attempted acts or events which interrupt normal operations at power reactors due to unauthorized use of or tampering with machinery, components, or controls; certain threats made against facilities possessing SNM; and safeguards system failures impacting the effectiveness of the system. The revised rule was effective October 8, 1987. On September 14, 1987, the NRC held a workshop in Bethesda, MD, to answer affected licensees' questions on the final rule. This report documents questions discussed at the September 14 meeting, reflects a completed staff review of the answers, and supersedes previous oral comment on the topics covered

  14. Discrete-Event Simulation

    Directory of Open Access Journals (Sweden)

    Prateek Sharma

    2015-04-01

    Full Text Available Abstract Simulation can be regarded as the emulation of the behavior of a real-world system over an interval of time. The process of simulation relies upon the generation of the history of a system and then analyzing that history to predict the outcome and improve the working of real systems. Simulations can be of various kinds but the topic of interest here is one of the most important kind of simulation which is Discrete-Event Simulation which models the system as a discrete sequence of events in time. So this paper aims at introducing about Discrete-Event Simulation and analyzing how it is beneficial to the real world systems.

  15. Event Marketing : En Begreppsutredning

    OpenAIRE

    Linge, Johan; Skantze Carlsson, Johanna

    2004-01-01

    Event marketing har allt sedan begreppet instiftades runt tiden för OS i Los Angeles 1984 varit starkt praktikerdrivet, vilket även återspeglas i den litteratur som skrivits om fenomenet. Den största delen av denna är av normativ karaktär och antar skepnaden av handböcker snarare än av akademisk litteratur. Bland författarna råder dessutom stor oenighet angående vad som faktiskt innefattas av begreppet event marketing. För den person som försöker förstå vad event marketing handlar om utgör de...

  16. First Indico Virtual Event

    CERN Document Server

    CERN. Geneva

    2014-01-01

    The first Indico virtual event will take place on February 4th 15:00 and will focus on two main topics The release of Indico v1.2 The migration of the OO Indico backend database (ZODB) to a more standard DBMS It will be fully virtual using the CERN Vidyo service and will foster discussions between developers and administrators of Indico servers worldwide. Connections to the virtual room will be open, but attendees are encouraged to register to the event, in order to be informed of any changes in the organisation if any. If you would like to add a topic of discussion or propose yourself a contribution, please let us know at indico-team@cern.ch. Connection to Vidyo Vidyo connection details are available here CERN Vidyo service documentation can be found here First-time users are encouraged to try the service before connecting to the real event

  17. Electrocardiogram events detection

    OpenAIRE

    Teixeira, João Paulo; Lopes, Vanda

    2011-01-01

    This work aims to create a system of medical diagnosis of the Electrocardiogram (ECG). The events of the ECG are related with the functioning of the heart and different disorders of the heart functioning have their own ECG pattern allowing the connection between ECG patterns and cardiac disorders. For this purpose, we present here an algorithm that detects the P, QRS and T events of the ECG under MATLAB environment. The algorithm is based in two techniques. The search for picks and valleys an...

  18. Blogimarkkinointi : Case: Laurea Events

    OpenAIRE

    Kronberg, Anna

    2014-01-01

    Tämän opinnäytetyön toimeksiantaja oli Laurea Events. Työn aiheena oli blogimarkkinointi. Opinnäytetyön tavoitteena oli tuoda esiin blogimarkkinoinnin käytettävyyteen vaikuttavia tekijöitä ja kehittää sisältöideoita blogiin, jolla Laurea Eventsin palveluita ja Laureaammattikorkeakoulun restonomikoulutusta voidaan markkinoida mielekkäämmin perinteisen markkinoinnin ohella. Opinnäytetyön tarkoituksena oli se, että toimeksiantaja Laurea Events voi hyödyntää saatuja tuloksia blogim...

  19. Events and Effects

    DEFF Research Database (Denmark)

    Rytter, Mikkel

    2010-01-01

    Analyzing the period of ‘intensive transnationalism’ among Pakistani migrants in Denmark precipitated by the 2005 earthquake in Kashmir, this article explores the relationship between events and effects on a global scale. One significant initiative after the disaster was the founding of an ad hoc......, and national identity politics in Denmark. Despite the medical doctors’ efforts and intentions, the out- come was framed by 9/11, which has become the major critical event of the decade—one that has supported a developing cleavage between the Danish majority and Denmark’s Muslim immigrant minority....

  20. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter;

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  1. LHCb DAQ network upgrade tests

    CERN Document Server

    Pisani, Flavio

    2013-01-01

    My project concerned the evaluation of new technologies for the DAQ network upgrade of LHCb. The first part consisted in developing and Open Flow-based Clos network. This new technology is very interesting and powerful but, as shown by the results, it still needs further improvements. The second part consisted in testing and benchmarking 40GbE network equipment: Mellanox MT27500, Chelsio T580 and Huawei Cloud Engine 12804. An event-building simulation is currently been performed in order to check the feasibility of the DAQ network upgrade in LS2. The first results are promising.

  2. 结构化P2P网络上语义发布/订阅事件路由算法%Event routing algorithms of semantic publish/subscribe over structured P2P networks

    Institute of Scientific and Technical Information of China (English)

    尹建伟; 施冬材; 钱剑锋; 董金祥; 熊乃学

    2008-01-01

    为解决结构化P2P网络上语义发布/订阅系统上基于内容的高性能语义事件路由问题,提出一种基于集结点的语义事件路由算法(rendezvous-based semantic event routing,RSER),该算法根据订阅和事件的域标识、属性个数以及属性名映射订阅和事件到集结点,在支持语义路由的同时,避免了分布式哈希表(distributed hash ta-ble,DHT)映射精确性与语义数据模型复杂性之间的矛盾;通过属性个数限制事件发布目的地,减少事件发布流量;采用P2P的内在路由机制和聚合优化措施分发事件,充分利用PZP网络容错性的同时,降低事件路由流量.实验结果表明,在大规模的发布/订阅下,RSER算法在性能上优于基于逆向路径转发的路由算法,并在路由效率、网络资源消耗、订阅维护效率和扩展性等方面取得了良好的平衡效果.

  3. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  4. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  5. Security and privacy issues in some special-puropse networks

    OpenAIRE

    Viejo Galicia, Alexandre

    2008-01-01

    This thesis is about providing security and privacy to new emergent applications which are based on special-purpose networks. More precisely, we study different aspects regarding security and privacy issues related to sensor networks, mobile ad hoc networks, vehicular ad hoc networks and social networks.Sensor networks consist of resource-constrained wireless devices with sensor capabilities. This emerging technology has a wide variety of applications related to event surveillance like emerge...

  6. NEVESIM: Event-Driven Neural Simulation Framework with a Python Interface

    OpenAIRE

    Dejan ePecevski; David eKappel; Zeno eJonke

    2014-01-01

    NEVESIM is a software package for event-driven simulation of networks of spiking neurons with a fast simulation core in C++, and a scripting user interface in the Python programming language. It supports simulation of heterogeneous networks with different types of neurons and synapses, and can be easily extended by the user with new neuron and synapse types. To enable heterogeneous networks and extensibility, NEVESIM is designed to decouple the simulation logic of communicating events (spikes...

  7. NEVESIM: event-driven neural simulation framework with a Python interface

    OpenAIRE

    Pecevski, Dejan; Kappel, David; Jonke, Zeno

    2014-01-01

    NEVESIM is a software package for event-driven simulation of networks of spiking neurons with a fast simulation core in C++, and a scripting user interface in the Python programming language. It supports simulation of heterogeneous networks with different types of neurons and synapses, and can be easily extended by the user with new neuron and synapse types. To enable heterogeneous networks and extensibility, NEVESIM is designed to decouple the simulation logic of communicating events (spikes...

  8. Language As Social Event.

    Science.gov (United States)

    Harste, Jerome C.

    A taxonomy developed for the study of the growth and development of written language from the perspective of social event was tested with a group of 68 children, aged three to six years. The subjects were presented with a wide variety of environmental print messages (road signs, toys, fast food signs, and household products) and were questioned…

  9. Event-as-participation

    DEFF Research Database (Denmark)

    Kjeldsen, Lena

    2016-01-01

    herved skabe en ny begivenhed- en begivenhed der gennem artiklen konceptualiseres som ”event-as-participation”. Omdrejningspunktet i denne artikel er således de ændrede dynamikker forårsaget af samspillet mellem transmitterede politiske begivenheder og sociale netværkssider. Praksissen skaber nye...

  10. On Objects and Events

    DEFF Research Database (Denmark)

    Eugster, Patrick Thomas; Guerraoui, Rachid; Damm, Christian Heide

    2001-01-01

    This paper presents linguistic primitives for publish/subscribe programming using events and objects. We integrate our primitives into a strongly typed object-oriented language through four mechanisms: (1) serialization, (2) multiple sub typing, (3) closures, and (4) deferred code evaluation. We...

  11. ATLAS "Splash event" 2008

    CERN Multimedia

    ATLAS, Experiment

    2014-01-01

    "Splash events": As the LHC was being tuned up on 10 September 2008, beam was initially directed at beam collimators just outside the detector, so that a splash of particles would fill much of the detector allowing ATLAS experimenters to prepare the detector for actual running.

  12. It Doesn't Break Just on Twitter. Characterizing Facebook content During Real World Events

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2014-01-01

    Multiple studies in the past have analyzed the role and dynamics of the Twitter social network during real world events. However, little work has explored the content of other social media services, or compared content across two networks during real world events. We believe that social media platforms like Facebook also play a vital role in disseminating information on the Internet during real world events. In this work, we study and characterize the content posted on the world's biggest soc...

  13. Efficient, Decentralized Detection of Qualitative Spatial Events in a Dynamic Scalar Field

    OpenAIRE

    Myeong-Hun Jeong; Matt Duckham

    2015-01-01

    This paper describes an efficient, decentralized algorithm to monitor qualitative spatial events in a dynamic scalar field. The events of interest involve changes to the critical points (i.e., peak, pits and passes) and edges of the surface network derived from the field. Four fundamental types of event (appearance, disappearance, movement and switch) are defined. Our algorithm is designed to rely purely on qualitative information about the neighborhoods of nodes in the sensor network and doe...

  14. Interictal networks in magnetoencephalography.

    Science.gov (United States)

    Malinowska, Urszula; Badier, Jean-Michel; Gavaret, Martine; Bartolomei, Fabrice; Chauvel, Patrick; Bénar, Christian-George

    2014-06-01

    Epileptic networks involve complex relationships across several brain areas. Such networks have been shown on intracerebral EEG (stereotaxic EEG, SEEG), an invasive technique. Magnetoencephalography (MEG) is a noninvasive tool, which was recently proven to be efficient for localizing the generators of epileptiform discharges. However, despite the importance of characterizing non-invasively network aspects in partial epilepsies, only few studies have attempted to retrieve fine spatiotemporal dynamics of interictal discharges with MEG. Our goal was to assess the relevance of magnetoencephalography for detecting and characterizing the brain networks involved in interictal epileptic discharges. We propose here a semi-automatic method based on independent component analysis (ICA) and on co-occurrence of events across components. The method was evaluated in a series of seven patients by comparing its results with networks identified in SEEG. On both MEG and SEEG, we found that interictal discharges can involve remote regions which are acting in synchrony. More regions were identified in SEEG (38 in total) than in MEG (20). All MEG regions were confirmed by SEEG when an electrode was present in the vicinity. In all patients, at least one region could be identified as leading according to our criteria. A majority (71%) of MEG leaders were confirmed by SEEG. We have therefore shown that MEG measurements can extract a significant proportion of the networks visible in SEEG. This suggests that MEG can be a useful tool for defining noninvasively interictal epileptic networks, in terms of regions and patterns of connectivity, in search for a "primary irritative zone".

  15. RETRIEVAL EVENTS EVALUATION

    Energy Technology Data Exchange (ETDEWEB)

    T. Wilson

    1999-11-12

    The purpose of this analysis is to evaluate impacts to the retrieval concept presented in the Design Analysis ''Retrieval Equipment and Strategy'' (Reference 6), from abnormal events based on Design Basis Events (DBE) and Beyond Design Basis Events (BDBE) as defined in two recent analyses: (1) DBE/Scenario Analysis for Preclosure Repository Subsurface Facilities (Reference 4); and (2) Preliminary Preclosure Design Basis Event Calculations for the Monitored Geologic Repository (Reference 5) The objective of this task is to determine what impacts the DBEs and BDBEs have on the equipment developed for retrieval. The analysis lists potential impacts and recommends changes to be analyzed in subsequent design analyses for developed equipment, or recommend where additional equipment may be needed, to allow retrieval to be performed in all DBE or BDBE situations. This analysis supports License Application design and therefore complies with the requirements of Systems Description Document input criteria comparison as presented in Section 7, Conclusions. In addition, the analysis discusses the impacts associated with not using concrete inverts in the emplacement drifts. The ''Retrieval Equipment and Strategy'' analysis was based on a concrete invert configuration in the emplacement drift. The scope of the analysis, as presented in ''Development Plan for Retrieval Events Evaluation'' (Reference 3) includes evaluation and criteria of the following: Impacts to retrieval from the emplacement drift based on DBE/BDBEs, and changes to the invert configuration for the preclosure period. Impacts to retrieval from the main drifts based on DBE/BDBEs for the preclosure period.

  16. Army Air and Missile Defense Network Design Facility (AAMDNDF)

    Data.gov (United States)

    Federal Laboratory Consortium — This facility provides JTIDS network designs and platform initialization load files for all Joint and Army-only tests, exercises, operations, and contingency events...

  17. Green networking

    CERN Document Server

    Krief, Francine

    2012-01-01

    This book focuses on green networking, which is an important topic for the scientific community composed of engineers, academics, researchers and industrialists working in the networking field. Reducing the environmental impact of the communications infrastructure has become essential with the ever increasing cost of energy and the need for reducing global CO2 emissions to protect our environment.Recent advances and future directions in green networking are presented in this book, including energy efficient networks (wired networks, wireless networks, mobile networks), adaptive networ

  18. Event boundaries and anaphoric reference.

    Science.gov (United States)

    Thompson, Alexis N; Radvansky, Gabriel A

    2016-06-01

    The current study explored the finding that parsing a narrative into separate events impairs anaphor resolution. According to the Event Horizon Model, when a narrative event boundary is encountered, a new event model is created. Information associated with the prior event model is removed from working memory. So long as the event model containing the anaphor referent is currently being processed, this information should still be available when there is no narrative event boundary, even if reading has been disrupted by a working-memory-clearing distractor task. In those cases, readers may reactivate their prior event model, and anaphor resolution would not be affected. Alternatively, comprehension may not be as event oriented as this account suggests. Instead, any disruption of the contents of working memory during comprehension, event related or not, may be sufficient to disrupt anaphor resolution. In this case, reading comprehension would be more strongly guided by other, more basic language processing mechanisms and the event structure of the described events would play a more minor role. In the current experiments, participants were given stories to read in which we included, between the anaphor and its referent, either the presence of a narrative event boundary (Experiment 1) or a narrative event boundary along with a working-memory-clearing distractor task (Experiment 2). The results showed that anaphor resolution was affected by narrative event boundaries but not by a working-memory-clearing distractor task. This is interpreted as being consistent with the Event Horizon Model of event cognition. PMID:26452376

  19. A language, server and C++ class library for event sequencing

    International Nuclear Information System (INIS)

    Many accelerator control tasks are well specified as a sequence of operations, each step of which is contingent upon the status of other operations or sequences. To enable the rapid creation and modification of such sequences we have devised the 'Glish' language. Sequences are described in Glish in terms of asynchronous hardware and software 'events', where an event is the notification that a particular thing has happened and the value associated with that notification. Events are produced and consumed by UNIX processes. One uses Glish to write expressions which specify how events associated with the processes depend on combinations of other events. We describe the Glish server, which manages Glish events distributed across a network, a C++ class library for Glish clients, and operational experience gained in using Glish to control an accelerator physics experiment on the Fermilab Tevatron. (orig.)

  20. The CMS event builder demonstrator and results with Myrinet

    CERN Document Server

    Antchev, G; Cittolin, Sergio; Erhan, S; Faure, B; Gigi, D; Gutleber, J; Jacobs, C; Meijers, F; Meschi, E; Ninane, A; Orsini, L; Pollet, Lucien; Rácz, A; Samyn, D; Schleifer, W; Sinanis, N; Sphicas, Paris

    2001-01-01

    The data acquisition system for the CMS experiment at the Large Hadron Collider (LHC) will require a large and high performance event building network. Several switch technologies are currently being evaluated in order to compare different architectures for the event builder. One candidate is Myrinet. This paper describes the demonstrator which has been setup to study a small-scale (16*16) event builder based on PCs running Linux connected to Myrinet and Ethernet switches. A detailed study of the Myrinet switch performance has been performed for various traffic conditions, including the behaviour of composite switches. Results from event building studies are presented, including measurements on throughput, overhead and scaling. Traffic shaping techniques have been implemented and the effect on the event building performance has been investigated. The paper reports on performances and maximum event rate obtainable using custom software, not described, for the Myrinet control program and the low-level communica...

  1. Estimating the historical and future probabilities of large terrorist events

    CERN Document Server

    Clauset, Aaron

    2012-01-01

    Quantities with right-skewed distributions are ubiquitous in complex social systems, including political conflict, economics and social networks, and these systems sometimes produce extremely large events. For instance, the 9/11 terrorist events produced nearly 3000 fatalities, nearly six times more than the next largest event. But, was this enormous loss of life statistically unlikely given modern terrorism's historical record? Accurately estimating the probability of such an event is complicated by the large fluctuations in the empirical distribution's upper tail. We present a generic statistical algorithm for making such estimates, which combines semi-parametric models of tail behavior and a non-parametric bootstrap. Applied to a global database of terrorist events, we estimate the worldwide historical probability of observing at least one 9/11-sized or larger event since 1968 to be 11-35%. These results are robust to conditioning on global variations in economic development, domestic versus international ...

  2. Performance testing open source products for the TMT event service

    Science.gov (United States)

    Gillies, K.; Bhate, Yogesh

    2014-07-01

    The software system for TMT is a distributed system with many components on many computers. Each component integrates with the overall system using a set of software services. The Event Service is a publish-subscribe message system that allows the distribution of demands and other events. The performance requirements for the Event Service are demanding with a goal of over 60 thousand events/second. This service is critical to the success of the TMT software architecture; therefore, a project was started to survey the open source and commercial market for viable software products. A trade study led to the selection of five products for thorough testing using a specially constructed computer/network configuration and test suite. The best performing product was chosen as the basis of a prototype Event Service implementation. This paper describes the process and performance tests conducted by Persistent Systems that led to the selection of the product for the prototype Event Service.

  3. A simple method for solar energetic particle event dose forecasting

    International Nuclear Information System (INIS)

    Bayesian, non-linear regression models or artificial neural networks are used to make predictions of dose and dose rate time profiles using calculated dose and/or dose rates soon after event onset. Both methods match a new event to similar historical events before making predictions for the new events. The currently developed Bayesian method categorizes a new event based on calculated dose rates up to 5 h (categorization window) after event onset. Categories are determined using ranges of dose rates from previously observed SEP events. These categories provide a range of predicted asymptotic dose for the new event. The model then goes on to make predictions of dose and dose rate time profiles out to 120 h beyond event onset. We know of no physical significance to our 5 h categorization window. In this paper, we focus on the efficacy of a simple method for SEP event asymptotic dose forecasting. Instead of making temporal predictions of dose and dose rate, we investigate making predictions of ranges of asymptotic dose using only dose rates at times prior to 5 h after event onset. A range of doses may provide sufficient information to make operational decisions such as taking emergency shelter or commencing/canceling extra-vehicular operations. Specifically, predicted ranges of doses that are found to be insignificant for the effect of interest would be ignored or put on a watch list while predicted ranges of greater significance would be used in the operational decision making progress

  4. Microscopic quantitative analysis of traffic network behavior under influence of unexpected event related information%突发交通事件信息影响下交通网络行为微观计量分析

    Institute of Scientific and Technical Information of China (English)

    干宏程

    2011-01-01

    研究了突发交通事件下地面道路可变情报板(SVMS)同时提供高架和地面道路行程时间条件下的驾驶员择路行为.采用意向行为调查获取择路行为数据,运用微观计量经济学中的离散选择分析方法对影响路径选择的因素进行了多变量分析,建立了描述择路概率的二元Logit模型.研究发现,SVMS信息对择路决策有显著影响,影响大小与驾驶员属性、信息内容及地面道路属性有关;驾龄越长、年龄越大的男性驾驶员,接收SVMS信息后选择地面道路的可能性更大;经常使用高架、认为高架可变情报板对其择路决策很有用的驾驶员,选择地面道路的可能性更小;高架延误越大、地面道路信号灯路口越少、延误原因为事故时,选择地面道路可能性更大.研究成果为交通突发事件下交通诱导策略优化提供理论依据和政策启示.%Route choice corresponding to shorter street and urban freeway travel time displayed by street variable message signs (SVMS) was investigated. Stated preference survey was conducted to collect behavioral data,and a binary Logit model was established to identify the factors influencing drivers' route choice decisions. The results show that,SVMS has significant impact on route choice and the impact depends on driver attribute,street characteristics,and SVMS messages. Specifically, older male drivers with longer years of driving experience are more likely to choose local streets in response to freeway delay information indicated by SVMS; frequent freeway users,having high acceptance of freeway VMS,are less likely to choose local streets; longer freeway delay as well as freeway incident-induced delay and fewer signalized intersections on local streets serve as positive factors for choosing local streets. The study aims to give theoretical and policy implications for better design of unexpected events oriented traffic guidance strategy.

  5. Event-by-event fluctuations in collective quantities

    OpenAIRE

    S.A. Voloshin; Koch, V; Ritter, H. G.

    1999-01-01

    We discuss an event-by-event fluctuation analysis of particle production in heavy ion collisions. We compare different approaches to the evaluation of the event-by-event dynamical fluctuations in quantities defined on groups of particles, such quantities as mean transverse momentum, transverse momentum spectra slope, strength of anisotropic flow, etc.. The direct computation of the dynamical fluctuations and the sub-event method are discussed in more detail. We also show how the fluctuation i...

  6. Using Event Studies to Assess the Impact of Unexpected Events

    OpenAIRE

    James V Koch; Robert N Fenili

    2013-01-01

    The quantitative assessment of the financial impact of unexpected events is the realm of the “event study.” We examine how CEOs, boards, and public policymakers can utilize event studies to inform and improve their decision making. The breadth of application of event studies is surprisingly broad and ranges from situations involving the death of a CEO to emergency product recalls. We present illustrative event studies for two Steve Jobs-related announcements concerning his health in order to ...

  7. Event Index — an LHCb Event Search System

    Science.gov (United States)

    Ustyuzhanin, A.; Artemov, A.; Kazeev, N.; Redkin, A.

    2015-12-01

    During LHC Run 1, the LHCb experiment recorded around 1011 collision events. This paper describes Event Index — an event search system. Its primary function is to quickly select subsets of events from a combination of conditions, such as the estimated decay channel or number of hits in a subdetector. Event Index is essentially Apache Lucene [1] optimized for read-only indexes distributed over independent shards on independent nodes.

  8. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  9. The Colombia Seismological Network

    Science.gov (United States)

    Blanco Chia, J. F.; Poveda, E.; Pedraza, P.

    2013-05-01

    The latest seismological equipment and data processing instrumentation installed at the Colombia Seismological Network (RSNC) are described. System configuration, network operation, and data management are discussed. The data quality and the new seismological products are analyzed. The main purpose of the network is to monitor local seismicity with a special emphasis on seismic activity surrounding the Colombian Pacific and Caribbean oceans, for early warning in case a Tsunami is produced by an earthquake. The Colombian territory is located at the South America northwestern corner, here three tectonic plates converge: Nazca, Caribbean and the South American. The dynamics of these plates, when resulting in earthquakes, is continuously monitored by the network. In 2012, the RSNC registered in 2012 an average of 67 events per day; from this number, a mean of 36 earthquakes were possible to be located well. In 2010 the network was also able to register an average of 67 events, but it was only possible to locate a mean of 28 earthquakes daily. This difference is due to the expansion of the network. The network is made up of 84 stations equipped with different kind of broadband 40s, 120s seismometers, accelerometers and short period 1s sensors. The signal is transmitted continuously in real-time to the Central Recording Center located at Bogotá, using satellite, telemetry, and Internet. Moreover, there are some other stations which are required to collect the information in situ. Data is recorded and processed digitally using two different systems, EARTHWORM and SEISAN, which are able to process and share the information between them. The RSNC has designed and implemented a web system to share the seismological data. This innovative system uses tools like Java Script, Oracle and programming languages like PHP to allow the users to access the seismicity registered by the network almost in real time as well as to download the waveform and technical details. The coverage

  10. Contingency Analysis of Cascading Line Outage Events

    Energy Technology Data Exchange (ETDEWEB)

    Thomas L Baldwin; Magdy S Tawfik; Miles McQueen

    2011-03-01

    As the US power systems continue to increase in size and complexity, including the growth of smart grids, larger blackouts due to cascading outages become more likely. Grid congestion is often associated with a cascading collapse leading to a major blackout. Such a collapse is characterized by a self-sustaining sequence of line outages followed by a topology breakup of the network. This paper addresses the implementation and testing of a process for N-k contingency analysis and sequential cascading outage simulation in order to identify potential cascading modes. A modeling approach described in this paper offers a unique capability to identify initiating events that may lead to cascading outages. It predicts the development of cascading events by identifying and visualizing potential cascading tiers. The proposed approach was implemented using a 328-bus simplified SERC power system network. The results of the study indicate that initiating events and possible cascading chains may be identified, ranked and visualized. This approach may be used to improve the reliability of a transmission grid and reduce its vulnerability to cascading outages.

  11. A New Event Builder for CMS Run II

    Energy Technology Data Exchange (ETDEWEB)

    Albertsson, K.; et al.

    2015-12-23

    The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider (LHC) assembles events at a rate of 100 kHz, transporting event data at an aggregate throughput of 100 GB/s to the high-level trigger (HLT) farm. The DAQ system has been redesigned during the LHC shutdown in 2013/14. The new DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40 Gbps Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56 Gbps Inniband FDR CLOS network has been chosen for the event builder. This paper discusses the software design, protocols, and optimizations for exploiting the hardware capabilities. We present performance measurements from small-scale prototypes and from the full-scale production system.

  12. A New Event Builder for CMS Run II

    CERN Document Server

    Albertsson, Kim; Andronidis, Anastasios; Behrens, Ulf; Branson, James; Chaze, Olivier; Cittolin, Sergio; Darlea, Georgiana Lavinia; Deldicque, Christian; Dobson, Marc; Dupont, Aymeric; Erhan, Samim; Gigi, Dominique; Glege, Frank; Gomez Ceballos, Guillelmo; Hegeman, Jeroen Guido; Holzner, Andre Georg; Jimenez Estupinan, Raul; Masetti, Lorenzo; Meijers, Franciscus; Meschi, Emilio; Mommsen, Remigius; Morovic, Srecko; Nunez Barranco Fernandez, Carlos; O'Dell, Vivian; Orsini, Luciano; Paus, Christoph Maria Ernst; Petrucci, Andrea; Pieri, Marco; Racz, Attila; Roberts, Penelope Amelia; Sakulin, Hannes; Schwick, Christoph; Stieger, Benjamin Bastian; Sumorok, Konstanty; Veverka, Jan; Zaza, Salvatore; Zejdl, Petr

    2015-01-01

    The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider (LHC) assembles events at a rate of 100kHz, transporting event data at an aggregate throughput of 100GB/s to the high-level trigger (HLT) farm. The DAQ system has been redesigned during the LHC shutdown in 2013/14. The new DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40Gbps Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56Gbps Infiniband FDR CLOS network has been chosen for the event builder. This paper discusses the software design, protocols, and optimizations for exploiting the hardware capabilities. We present performance measurements from small-scale prototypes and from the full-scale production system.

  13. A New Event Builder for CMS Run II

    Science.gov (United States)

    Albertsson, K.; Andre, J.-M.; Andronidis, A.; Behrens, U.; Branson, J.; Chaze, O.; Cittolin, S.; Darlea, G.-L.; Deldicque, C.; Dobson, M.; Dupont, A.; Erhan, S.; Gigi, D.; Glege, F.; Gomez-Ceballos, G.; Hegeman, J.; Holzner, A.; Jimenez-Estupiñán, R.; Masetti, L.; Meijers, F.; Meschi, E.; Mommsen, R. K.; Morovic, S.; Nunez-Barranco-Fernandez, C.; O'Dell, V.; Orsini, L.; Paus, C.; Petrucci, A.; Pieri, M.; Racz, A.; Roberts, P.; Sakulin, H.; Schwick, C.; Stieger, B.; Sumorok, K.; Veverka, J.; Zaza, S.; Zejdl, P.

    2015-12-01

    The data acquisition system (DAQ) of the CMS experiment at the CERN Large Hadron Collider (LHC) assembles events at a rate of 100 kHz, transporting event data at an aggregate throughput of 100GB/s to the high-level trigger (HLT) farm. The DAQ system has been redesigned during the LHC shutdown in 2013/14. The new DAQ architecture is based on state-of-the-art network technologies for the event building. For the data concentration, 10/40 Gbps Ethernet technologies are used together with a reduced TCP/IP protocol implemented in FPGA for a reliable transport between custom electronics and commercial computing hardware. A 56 Gbps Infiniband FDR CLOS network has been chosen for the event builder. This paper discusses the software design, protocols, and optimizations for exploiting the hardware capabilities. We present performance measurements from small-scale prototypes and from the full-scale production system.

  14. Single event mass spectrometry

    Science.gov (United States)

    Conzemius, Robert J.

    1990-01-16

    A means and method for single event time of flight mass spectrometry for analysis of specimen materials. The method of the invention includes pulsing an ion source imposing at least one pulsed ion onto the specimen to produce a corresponding emission of at least one electrically charged particle. The emitted particle is then dissociated into a charged ion component and an uncharged neutral component. The ion and neutral components are then detected. The time of flight of the components are recorded and can be used to analyze the predecessor of the components, and therefore the specimen material. When more than one ion particle is emitted from the specimen per single ion impact, the single event time of flight mass spectrometer described here furnis This invention was made with Government support under Contract No. W-7405-ENG82 awarded by the Department of Energy. The Government has certain rights in the invention.

  15. Terrorism as Media Event

    Directory of Open Access Journals (Sweden)

    2012-07-01

    Full Text Available Proving that terrorism should be seen as a media event (as defined by Dayan and Katzafter 9/11 and treated accordingly. We have turned to the work of Dayan and Katz and GeorgeGerbner’s for a definition of media events and of violence in the mass media. This paper is ahermeneutical interpretation of the concept of terrorism and its relation to communication. We haveput forward a better understanding of the complex concept of terrorism and its definitions in the massmedia context. Terrorism nowadays should always be defined within its inherent relation with themedia. The article is the first to define terrorism as media evenit in Dayan and Katz’s terms.

  16. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  17. Solar extreme events

    CERN Document Server

    Hudson, Hugh S

    2015-01-01

    Solar flares and CMEs have a broad range of magnitudes. This review discusses the possibility of "extreme events," defined as those with magnitudes greater than have been seen in the existing historical record. For most quantitative measures, this direct information does not extend more than a century and a half into the recent past. The magnitude distributions (occurrence frequencies) of solar events (flares/CMEs) typically decrease with the parameter measured or inferred (peak flux, mass, energy etc. Flare radiation fluxes tend to follow a power law slightly flatter than $S^{-2}$, where S represents a peak flux; solar particle events (SPEs) follow a still flatter power law up to a limiting magnitude, and then appear to roll over to a steeper distribution, which may take an exponential form or follow a broken power law. This inference comes from the terrestrial $^{14}$C record and from the depth dependence of various radioisotope proxies in the lunar regolith and in meteorites. Recently major new observation...

  18. LHCb Event display

    CERN Document Server

    Trisovic, Ana

    2014-01-01

    The LHCb Event Display was made for educational purposes at the European Organization for Nuclear Research, CERN in Geneva, Switzerland. The project was implemented as a stand-alone application using C++ and ROOT, a framework developed by CERN for data analysis. This paper outlines the development and architecture of the application in detail, as well as the motivation for the development and the goals of the exercise. The application focuses on the visualization of events recorded by the LHCb detector, where an event represents a set of charged particle tracks in one proton-proton collision. Every particle track is coloured by its type and can be selected to see its essential information such as mass and momentum. The application allows students to save this information and calculate the invariant mass for any pair of particles. Furthermore, the students can use additional calculating tools in the application and build up a histogram of these invariant masses. The goal for the students is to find a $D^0$ par...

  19. PREVENTABLE ERRORS: NEVER EVENTS

    Directory of Open Access Journals (Sweden)

    Narra Gopal

    2014-07-01

    Full Text Available Operation or any invasive procedure is a stressful event involving risks and complications. We should be able to offer a guarantee that the right procedure will be done on right person in the right place on their body. “Never events” are definable. These are the avoidable and preventable events. The people affected from consequences of surgical mistakes ranged from temporary injury in 60%, permanent injury in 33% and death in 7%”.World Health Organization (WHO [1] has earlier said that over seven million people across the globe suffer from preventable surgical injuries every year, a million of them even dying during or immediately after the surgery? The UN body quantified the number of surgeries taking place every year globally 234 million. It said surgeries had become common, with one in every 25 people undergoing it at any given time. 50% never events are preventable. Evidence suggests up to one in ten hospital admissions results in an adverse incident. This incident rate is not acceptable in other industries. In order to move towards a more acceptable level of safety, we need to understand how and why things go wrong and have to build a reliable system of working. With this system even though complete prevention may not be possible but we can reduce the error percentage2. To change present concept towards patient, first we have to change and replace the word patient with medical customer. Then our outlook also changes, we will be more careful towards our customers.

  20. Development of Memory for Events.

    Science.gov (United States)

    Ratner, Hilary Horn; And Others

    1986-01-01

    Examines development of event memory by determining how personally experienced events with two types of structure were reported by kindergartners and adults. Events in making and playing with clay were organized causally and temporally. Results show that adults and children used a goal-based hierarchical structure to remember events, although use…

  1. The International Nuclear Event Scale (INES) user's manual. 2001 edition

    International Nuclear Information System (INIS)

    The International Nuclear Event Scale (INES) was introduced in March 1990 jointly by the International Atomic Energy Agency (IAEA) and the Nuclear Energy Agency of the Organisation for Economic Co-operation and Development (OECD/NEA). Its primary purpose is to facilitate communication and understanding between the nuclear community, the media and the public on the safety significance of events occurring at nuclear installations. The scale was refined in 1992 in the light of experience gained and extended to be applicable to any event associated with radioactive material and/or radiation, including the transport of radioactive materials.This edition of the INES User's Manual incorporates experience gained from applying the 1992 version of the scale and the document entitled 'Clarification of Issues Raised'. As such, it replaces those earlier publications. It does not amend the technical basis of the INES rating procedure but is expected to facilitate the task of those who are required to rate the safety significance of events using the INES scale. The INES communication network currently receives and disseminates event information to the INES National Officers of 60 Member States on special Event Rating Forms which represent official information on the events, including the rating. The INES communication process has led each participating country to set up an internal network which ensures that all events are promptly communicated and rated whenever they have to be reported outside or inside the country. The IAEA provides training services on the use of INES on request

  2. Distributed event-based systems

    CERN Document Server

    Fiege, Ludger; Pietzuch, Peter R

    2006-01-01

    This book provides an in-depth description of event-based systems, covering topics ranging from local event matching and distributed event forwarding algorithms, through a practical discussion of software engineering issues raised by the event-based style, to state-of-the-art research in event-based systems like composite event detection and security. The authors offer a comprehensive overview, and show the power of event-based architectures in modern system design, encouraging professionals to exploit this technique in next generation large-scale distributed applications like information diss

  3. Postdocs Attend Special Events during Postdoc Appreciation Week | Poster

    Science.gov (United States)

    NCI at Frederick postdocs were treated to special events by the Fellows and Young Investigators Committee during National Postdoc Appreciation Week, September 15–19. At the first Frederick fellows seminar of the fall on September 17, postdocs were invited to hear their colleagues present highlights of their research and stay for pizza and ice cream, compliments of the committee. Postdocs are also invited to a special networking event at Barley and Hops on September 24.

  4. Event-Based Conceptual Modeling

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    2009-01-01

    The purpose of the paper is to obtain insight into and provide practical advice for event-based conceptual modeling. We analyze a set of event concepts and use the results to formulate a conceptual event model that is used to identify guidelines for creation of dynamic process models and static...... information models. We characterize events as short-duration processes that have participants, consequences, and properties, and that may be modeled in terms of information structures. The conceptual event model is used to characterize a variety of event concepts and it is used to illustrate how events can...... be used to integrate dynamic modeling of processes and static modeling of information structures. The results are unique in the sense that no other general event concept has been used to unify a similar broad variety of seemingly incompatible event concepts. The general event concept can be used...

  5. Single Event Kinetic Modelling without Explicit Generation of Large Networks: Application to Hydrocracking of Long Paraffins Modélisation cinétique par événements constitutifs sans génération explicite de grands réseaux : application à l’hydrocraquage des paraffines longues

    Directory of Open Access Journals (Sweden)

    Guillaume D.

    2011-08-01

    Full Text Available The single event modelling concept allows developing kinetic models for the simulation of refinery processes. For reaction networks with several hundreds of thousands of species, as is the case for catalytic reforming, rigorous relumping by carbon atom number and branching degree were efficiently employed by assuming chemical equilibrium in each lump. This relumping technique yields a compact lumped model without any loss of information, but requires the full detail of an explicitly generated reaction network. Classic network generation techniques become impractical when the hydrocarbon species contain more than approximately 20 carbon atoms, because of the extremely rapid growth of reaction network. Hence, implicit relumping techniques were developed in order to compute lumping coefficients without generating the detailed reaction network. Two alternative and equivalent approaches are presented, based either on structural classes or on lateral chain decomposition. These two methods are discussed and the lateral chain decomposition method is applied to the kinetic modelling of long chain paraffin hydroisomerization and hydrocracking. The lateral chain decomposition technique is exactly equivalent to the original calculation method based on the explicitly generated detailed reaction network, as long as Benson’s group contribution method is used to calculate the necessary thermodynamic data in both approaches. Le concept de modélisation par événements constitutifs permet de développer des modèles cinétiques pour la simulation des procédés de raffinage. Pour des réseaux réactionnels de centaines de milliers d'espèces, comme cela est le cas pour le reformage catalytique, le regroupement rigoureux par nombre d'atomes de carbone et degré de ramification a été utilisé efficacement en faisant l'hypothèse de l'équilibre chimique dans chaque groupe. Cette technique de regroupement conduit à un modèle regroupé compact sans perte d

  6. Sample Spaces and Events(2)

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Definition: An event is a subset E of the sample space S. The impossible event is the subset E = φ (empty set). The certain event is the subset E = S (sample space).Note that any subset of S represents an event, according to this defintion. Thus, in rolling a die the subset E={1,2,5} represents an event, which we can describe in words as "the die comes up 1,2, or 5. "

  7. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  8. Event selection services in ATLAS

    International Nuclear Information System (INIS)

    ATLAS has developed and deployed event-level selection services based upon event metadata records (''TAGS'') and supporting file and database technology. These services allow physicists to extract events that satisfy their selection predicates from any stage of data processing and use them as input to later analyses. One component of these services is a web-based Event-Level Selection Service Interface (ELSSI). ELSSI supports event selection by integrating run-level metadata, luminosity-block-level metadata (e.g., detector status and quality information), and event-by-event information (e.g., triggers passed and physics content). The list of events that survive after some selection criterion is returned in a form that can be used directly as input to local or distributed analysis; indeed, it is possible to submit a skimming job directly from the ELSSI interface using grid proxy credential delegation. ELSSI allows physicists to explore ATLAS event metadata as a means to understand, qualitatively and quantitatively, the distributional characteristics of ATLAS data. In fact, the ELSSI service provides an easy interface to see the highest missing ET events or the events with the most leptons, to count how many events passed a given set of triggers, or to find events that failed a given trigger but nonetheless look relevant to an analysis based upon the results of offline reconstruction, and more. This work provides an overview of ATLAS event-level selection services, with an emphasis upon the interactive Event-Level Selection Service Interface.

  9. Efficient, Decentralized Detection of Qualitative Spatial Events in a Dynamic Scalar Field

    Directory of Open Access Journals (Sweden)

    Myeong-Hun Jeong

    2015-08-01

    Full Text Available This paper describes an efficient, decentralized algorithm to monitor qualitative spatial events in a dynamic scalar field. The events of interest involve changes to the critical points (i.e., peak, pits and passes and edges of the surface network derived from the field. Four fundamental types of event (appearance, disappearance, movement and switch are defined. Our algorithm is designed to rely purely on qualitative information about the neighborhoods of nodes in the sensor network and does not require information about nodes’ coordinate positions. Experimental investigations confirm that our algorithm is efficient, with O(n overall communication complexity (where n is the number of nodes in the sensor network, an even load balance and low operational latency. The accuracy of event detection is comparable to established centralized algorithms for the identification of critical points of a surface network. Our algorithm is relevant to a broad range of environmental monitoring applications of sensor networks.

  10. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  11. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  12. Terrorism Event Classification Using Fuzzy Inference Systems

    CERN Document Server

    Inyaem, Uraiwan; Meesad, Phayung; Tran, Dat

    2010-01-01

    Terrorism has led to many problems in Thai societies, not only property damage but also civilian casualties. Predicting terrorism activities in advance can help prepare and manage risk from sabotage by these activities. This paper proposes a framework focusing on event classification in terrorism domain using fuzzy inference systems (FISs). Each FIS is a decision-making model combining fuzzy logic and approximate reasoning. It is generated in five main parts: the input interface, the fuzzification interface, knowledge base unit, decision making unit and output defuzzification interface. Adaptive neuro-fuzzy inference system (ANFIS) is a FIS model adapted by combining the fuzzy logic and neural network. The ANFIS utilizes automatic identification of fuzzy logic rules and adjustment of membership function (MF). Moreover, neural network can directly learn from data set to construct fuzzy logic rules and MF implemented in various applications. FIS settings are evaluated based on two comparisons. The first evaluat...

  13. Real Time Network Traffic Monitoring

    OpenAIRE

    Tripp, Gerald

    1999-01-01

    This paper looks at the problems of real time network traffic monitoring. Some of the existing approaches are reviewed, looking at both simple filtering systems and also systems based on the use of finite state machines that can report specific events or capture data only when in particular states. Finally, some existing implementation techniques are examined and an outline proposal made for the design of a network monitoring system that uses finite state machines implemented using associativ...

  14. Tensor Network and Black Hole

    CERN Document Server

    Matsueda, Hiroaki; Hashizume, Yoichiro

    2012-01-01

    A tensor network formalism of thermofield dynamics is introduced. The formalism relates the original Hilbert space with its tilde space by a product of two copies of a tensor network. Then, their interface becomes an event horizon, and the logarithm of the tensor rank corresponds to the black hole entropy. Eventually, multiscale entanglement renormalization anzats (MERA) reproduces an AdS black hole at finite temperature. Our finding shows rich functionalities of MERA as efficient graphical representation of AdS/CFT correspondence.

  15. Epidemic and Cascading Survivability of Complex Networks

    CERN Document Server

    Manzano, Marc; Ripoll, Jordi; Fagertun, Anna Manolova; Torres-Padrosa, Victor; Pahwa, Sakshi; Scoglio, Caterina

    2014-01-01

    Our society nowadays is governed by complex networks, examples being the power grids, telecommunication networks, biological networks, and social networks. It has become of paramount importance to understand and characterize the dynamic events (e.g. failures) that might happen in these complex networks. For this reason, in this paper, we propose two measures to evaluate the vulnerability of complex networks in two different dynamic multiple failure scenarios: epidemic-like and cascading failures. Firstly, we present \\emph{epidemic survivability} ($ES$), a new network measure that describes the vulnerability of each node of a network under a specific epidemic intensity. Secondly, we propose \\emph{cascading survivability} ($CS$), which characterizes how potentially injurious a node is according to a cascading failure scenario. Then, we show that by using the distribution of values obtained from $ES$ and $CS$ it is possible to describe the vulnerability of a given network. We consider a set of 17 different compl...

  16. Discovering general partial orders in event streams

    CERN Document Server

    Achar, Avinash; Raajay, V; Sastry, P S

    2009-01-01

    Sequence of time-ordered events arise in a variety of applications like customer transaction databases, alarm sequences in telecommunication networks, fault logs in manufacturing plant data, web interaction logs, etc. A popular framework for temporal pattern extraction from such data is the frequent episode discovery paradigm. An episode is a set of nodes with a partial order prescribed on it, with each node associated with an event type. Efficient algorithms exist for episode discovery when the associated partial order is total(serial episode) or trivial(parallel episode). In this paper, we propose efficient algorithms for discovering frequent episodes with general partial orders. The algorithms generalize the existing apriori-based discovery algorithms for serial and parallel episodes. There is an inherent combinatorial explosion in frequent partial order mining. We point out that frequency alone is not a sufficient measure of interestingness for general episodes. We present post-processing techniques to pr...

  17. Orbital Motion During Gravitational Lensing Events

    CERN Document Server

    Di Stefano, Rosanne

    2014-01-01

    Gravitational lensing events provide unique opportunities to discover and study planetary systems and binaries. Here we build on previous work to explore the role that orbital motion can play in both identifying and learning more about multiple-mass systems that serve as gravitational lenses. We find that a significant fraction of planet-lens and binary-lens light curves are influenced by orbital motion. Furthermore, the effects of orbital motion extend the range of binaries for which lens multiplicity can be discovered and studied. Orbital motion will play an increasingly important role as observations with sensitive photometry, such as those made by the space missions Kepler, Transiting Exoplanet Survey Satellite, (TESS), and WFIRST discover gravitational lensing events. Similarly, the excellent astrometric measurements made possible by GAIA will allow it to study the effects of orbital motion. Frequent observations, such as those made possible with the Korean Microlensing Telescope Network, KMTNet, will al...

  18. Vaccine adverse events.

    Science.gov (United States)

    Follows, Jill

    2012-01-01

    Millions of adults are vaccinated annually against the seasonal influenza virus. An undetermined number of individuals will develop adverse events to the influenza vaccination. Those who suffer substantiated vaccine injuries, disabilities, and aggravated conditions may file a timely, no-fault and no-cost petition for financial compensation under the National Vaccine Act in the Vaccine Court. The elements of a successful vaccine injury claim are described in the context of a claim showing the seasonal influenza vaccination was the cause of Guillain-Barré syndrome.

  19. LIU 2011 event

    CERN Multimedia

    BE Department

    2011-01-01

    The LHC injectors upgrade (LIU) project was launched at the end of 2010 to coordinate the preparation of the CERN accelerator complex to meet the needs of the High Luminosity LHC (HL-LHC) until at least 2030. It should be completed by the end of the second long LHC shutdown, presently scheduled for 2018.   The goal of the LIU-2011 event is to present the status and plans of the LIU project, describing the needs and the actions foreseen in the different accelerators, from Linac4 to the PSB, PS and SPS.  

  20. CATASTROPHIC EVENTS MODELING

    Directory of Open Access Journals (Sweden)

    Ciumas Cristina

    2013-07-01

    Full Text Available This paper presents the emergence and evolution of catastrophe models (cat models. Starting with the present context of extreme weather events and features of catastrophic risk (cat risk we’ll make a chronological illustration from a theoretical point of view of the main steps taken for building such models. In this way the importance of interdisciplinary can be observed. The first cat model considered contains three modules. For each of these indentified modules: hazard, vulnerability and financial losses a detailed overview and also an exemplification of a potential case of an earthquake that measures more than 7 on Richter scale occurring nowadays in Bucharest will be provided. The key areas exposed to earthquake in Romania will be identified. Then, based on past catastrophe data and taking into account present conditions of housing stock, insurance coverage and the population of Bucharest the impact will be quantified by determining potential losses. In order to accomplish this work we consider a scenario with data representing average values for: dwelling’s surface, location, finishing works. On each step we’ll make a reference to the earthquake on March 4 1977 to see what would happen today if a similar event occurred. The value of Bucharest housing stock will be determined taking firstly the market value, then the replacement value and ultimately the real value to quantify potential damages. Through this approach we can find the insurance coverage of potential losses and also the uncovered gap. A solution that may be taken into account by public authorities, for example by Bucharest City Hall will be offered: in case such an event occurs the impossibility of paying compensations to insured people, rebuilding infrastructure and public buildings and helping the suffering persons should be avoided. An actively public-private partnership should be created between government authorities, the Natural Disaster Insurance Pool, private

  1. Alaistaitokartoitus, Red Events Oy

    OpenAIRE

    Latva, Mariikka

    2013-01-01

    Tämän tutkimuksellisen opinnäytetyön tarkoituksena oli kartoittaa tapahtuma-alan yrityksen Red Events Oy:n vuokratyöntekijöiden mielipiteitä heidän omista alaistaidoistaan. Työn tavoitteena oli saada kartoituksen tulosten pohjalta mahdollisia kehittämisehdotuksia. Opinnäytetyön tietoperusta muodostui alaistaidoista ja psykologisesta sopimuksesta. Psykologisen sopimuksen osa-alueista esiteltiin työn kannalta merkittävimmät, joita olivat vuorovaikutus, palautteen antaminen ja vastaanottam...

  2. Detection of solar events

    Science.gov (United States)

    Fischbach, Ephraim; Jenkins, Jere

    2013-08-27

    A flux detection apparatus can include a radioactive sample having a decay rate capable of changing in response to interaction with a first particle or a field, and a detector associated with the radioactive sample. The detector is responsive to a second particle or radiation formed by decay of the radioactive sample. The rate of decay of the radioactive sample can be correlated to flux of the first particle or the field. Detection of the first particle or the field can provide an early warning for an impending solar event.

  3. Temporal motifs in time-dependent networks

    International Nuclear Information System (INIS)

    Temporal networks are commonly used to represent systems where connections between elements are active only for restricted periods of time, such as telecommunication, neural signal processing, biochemical reaction and human social interaction networks. We introduce the framework of temporal motifs to study the mesoscale topological–temporal structure of temporal networks in which the events of nodes do not overlap in time. Temporal motifs are classes of similar event sequences, where the similarity refers not only to topology but also to the temporal order of the events. We provide a mapping from event sequences to coloured directed graphs that enables an efficient algorithm for identifying temporal motifs. We discuss some aspects of temporal motifs, including causality and null models, and present basic statistics of temporal motifs in a large mobile call network

  4. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  5. Fermionic networks

    Science.gov (United States)

    Javarone, Marco Alberto

    2016-08-01

    We study the structure of fermionic networks, i.e. a model of networks based on the behavior of fermionic gases, and we analyze dynamical processes over them. In this model, particle dynamics have been mapped to the domain of networks, hence a parameter representing the temperature controls the evolution of the system. In doing so, it is possible to generate adaptive networks, i.e. networks whose structure varies over time. As shown in previous works, networks generated by quantum statistics can undergo critical phenomena as phase transitions and, moreover, they can be considered as thermodynamic systems. In this study, we analyze fermionic networks and opinion dynamics processes over them, framing this network model as a computational model useful to represent complex and adaptive systems. Results highlight that a strong relation holds between the gas temperature and the structure of the achieved networks. Notably, both the degree distribution and the assortativity vary as the temperature varies, hence we can state that fermionic networks behave as adaptive networks. On the other hand, it is worth to highlight that we did not finding relation between outcomes of opinion dynamics processes and the gas temperature. Therefore, although the latter plays a fundamental role in gas dynamics, on the network domain, its importance is related only to structural properties of fermionic networks.

  6. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani;

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage...... buffering, scheduling, and processing over the network. On the other hand, NC has shown great potential for increasing robustness and performance when deployed on intermediate nodes in the network. This new paradigm changes the dynamics of network protocols, requiring new designs that exploit its potential....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  7. Heat Exchanger System Piping Design for a Tube Rupture Event

    OpenAIRE

    Wakim, Fadi Antoine; Kavcar, Pinar Cakir; Samad, Mustafa

    2012-01-01

    ABSTRACT: Tube-rupture events in shell and tube heat exchangers can result in significantly high surge pressures. Steady state and dynamic methods can be used to assess the impacts of these events on heat exchanger system piping networks. This paper presents the findings of a set of dynamic surge simulations on the impacts of tube-rupture events in a Propane-Feed Gas Heat Exchanger System. Once adjacent piping design is considered, the Joukowsky formulation-based method is not always appropri...

  8. Fibrations of financial events

    CERN Document Server

    Carf\\i, David

    2011-01-01

    In this paper we shall prove that the plane of financial events, introduced and applied to financial problems by the author himself (see [2], [3] and [4]) can be considered as a fibration in two different ways. The first one, the natural one, reveals itself to be isomorphic to the tangent- bundle of the real line, when the last one is considered as a differentiable manifold in the natural way; the second one is a fibration induced by the status of compound interest capitalization at a given rate i in the interval ] - 1, \\rightarrow [. Moreover, in the paper we define on the first fibration an affine connection, also in this case induced by the status of compound interest at a given rate i. The final goal of this paper is the awareness that all the effects determined by the status of compound interest are nothing but the consequences of the fact that the space of financial events is a fibration endowed with a particular affine connection, so they are consequences of purely geometric properties, at last, depend...

  9. Relativistic tidal disruption events

    Directory of Open Access Journals (Sweden)

    Levan A.

    2012-12-01

    Full Text Available In March 2011 Swift detected an extremely luminous and long-lived outburst from the nucleus of an otherwise quiescent, low luminosity (LMC-like galaxy. Named Swift J1644+57, its combination of high-energy luminosity (1048 ergs s−1 at peak, rapid X-ray variability (factors of >100 on timescales of 100 seconds and luminous, rising radio emission suggested that we were witnessing the birth of a moderately relativistic jet (Γ ∼ 2 − 5, created when a star is tidally disrupted by the supermassive black hole in the centre of the galaxy. A second event, Swift J2058+0516, detected two months later, with broadly similar properties lends further weight to this interpretation. Taken together this suggests that a fraction of tidal disruption events do indeed create relativistic outflows, demonstrates their detectability, and also implies that low mass galaxies can host massive black holes. Here, I briefly outline the observational properties of these relativistic tidal flares observed last year, and their evolution over the first year since their discovery.

  10. Talking about Causing Events

    Directory of Open Access Journals (Sweden)

    Christopher A. Vogel

    2014-12-01

    Full Text Available Questions about the nature of the relationship between language and extralinguistic cognition are old, but only recently has a new view emerged that allows for the systematic investigation of claims about linguistic structure, based on how it is understood or utilized outside of the language system. Our paper represents a case study for this interaction in the domain of event semantics. We adopt a transparency thesis about the relationship between linguistic structure and extralinguistic cognition, investigating whether different lexico-syntactic structures can differentially recruit the visual causal percept. A prominent analysis of causative verbs like move suggests reference to two distinct events and a causal relationship between them, whereas non-causative verbs like push do not so refer. In our study, we present English speakers with simple scenes that either do or do not support the perception of a causal link, and manipulate (between subjects a one-sentence instruction for the evaluation of the scene. Preliminary results suggest that competent speakers of English are more likely to judge causative constructions than non-causative constructions as true of a scene where causal features are present in the scene. Implications for a new approach to the investigation of linguistic meanings and future directions are discussed.

  11. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  12. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  13. Solar Eruptive Events

    Science.gov (United States)

    Holman, Gordon D.

    2012-01-01

    It s long been known that the Sun plays host to the most energetic explosions in the solar system. But key insights into the forms that energy takes have only recently become available. Solar flares have been phenomena of both academic and practical interest since their discovery in 1859. From the academic point of view, they are the nearest events for studying the explosive release of energy in astrophysical magnetized plasmas. From the practical point of view, they disrupt communication channels on Earth, from telegraph communications in 1859 to radio and television signals today. Flares also wreak havoc on the electrical power grid, satellite operations, and GPS signals, and energetic charged particles and radiation are dangerous to passengers on high-altitude polar flights and to astronauts. Flares are not the only explosive phenomena on the Sun. More difficult to observe but equally energetic are the large coronal mass ejections (CMEs), the ejection of up to ten billion tons of magnetized plasma into the solar wind at speeds that can exceed 1000 km/s. CMEs are primarily observed from the side, with coronagraphs that block out the bright disk of the Sun and lower solar atmosphere so that light scattered from the ejected mass can be seen. Major geomagnetic storms are now known to arise from the interaction of CMEs with Earth's magnetosphere. Solar flares are observed without CMEs, and CMEs are observed without flares. The two phenomena often occur together, however, and almost always do in the case of large flares and fast CMEs. The term solar eruptive event refers to the combination of a flare and a CME. Solar eruptive events generate a lot of heat: They can heat plasma to temperatures as high at 50 million Kelvin, producing radiation across the electromagnetic spectrum. But that s not all. A fascinating aspect of solar eruptive events is the acceleration of electrons and ions to suprathermal often relativistic energies. The accelerated particles are primarily

  14. On Event-by-Event Fluctuations in Nuclear Collisions

    OpenAIRE

    Gazdzicki, Marek; Leonidov, Andrei; Roland, Gunther

    1997-01-01

    We demonstrate that a new type of analysis in heavy-ion collisions, based on an event-by-event analysis of the transverse momentum distribution, allows us to obtain information on secondary interactions and collective behaviour that is not available from the inclusive spectra. Using a random walk model as a simple phenomenological description of initial state scattering in collisions with heavy nuclei, we show that the event-by-event measurement allows a quantitative determination of this eff...

  15. Event display of a H -> 4mu candidate event

    CERN Multimedia

    ATLAS, Collaboration

    2012-01-01

    Event display of a H -> 4mu candidate event with m(4l) = 124.1 (125.1) GeV without (with) Z mass constraint. The masses of the lepton pairs are 86.3 GeV and 31.6 GeV. The event was recorded by ATLAS on 10-Jun-2012, 13:24:31 CEST in run number 204769 as event number 71902630. Zoom into the tracking detector. Muon tracks are colored red.

  16. Event display of a H -> 4mu candidate event

    CERN Multimedia

    ATLAS, Collaboration

    2012-01-01

    Event display of a H -> 4mu candidate event with m(4l) = 124.1 (125.1) GeV without (with) Z mass constraint. The masses of the lepton pairs are 86.3 GeV and 31.6 GeV. The event was recorded by ATLAS on 10-Jun-2012, 13:24:31 CEST in run number 204769 as event number 71902630. Muon tracks are colored red.

  17. Analysis of Future Event Set Algorithms for Discrete Event Simulation

    OpenAIRE

    McCormack, William M.; Robert G. Sargent

    1980-01-01

    This work reports on new analytical and empirical results on the performance of algorithms for handling the future event set in discrete event simulation. These results provide a clear insight to the factors affecting algorithm performance; evaluate the "hold" model, often used to study future event set algorithms; and determine the best algorithm(s) to use.

  18. 浅析微博舆论监督的特点及影响——以网络群体性事件为例%Analysis of features and impact of microblogging supervision by public opinion --Taking the network public events as an examp]e

    Institute of Scientific and Technical Information of China (English)

    刘宪

    2012-01-01

    Microblogging supervision by public opinion has the characteristics including everyone is the subject of super- vision, supervision is whenever and wherever possible, and the supervision content is everything. Microblogging supervi- sion by public opinion requires government information disclosure is timely, accurate, and highly reliable. It asked the decision - making of government is scientific, democratic and legitimate. At the same time, the government staff should he honest in performing official duties, work according to law, serve the people diligently, and improve the coping ability of network public events.%微博舆论监督具有人人都是监督主体、随时随地地实施监督、监督一切能够监督的事项的特点。微博舆论监督要求政务信息公开及时、准确无误、可信度高;要求政府科学决策、民主决策、依法决策;要求政府工作人员依法行政、廉洁奉公、勤政为民;要求政府及其工作人员提高网络时代应对舆论事件的能力。

  19. "Selfish" algorithm for optimizing the network survivability analysis

    CERN Document Server

    Poroseva, Svetlana V

    2012-01-01

    In Nature, the primary goal of any network is to survive. This is less obvious for engineering networks (electric power, gas, water, transportation systems etc.) that are expected to operate under normal conditions most of time. As a result, the ability of a network to withstand massive sudden damage caused by adverse events (or survivability) has not been among traditional goals in the network design. Reality, however, calls for the adjustment of design priorities. As modern networks develop toward increasing their size, complexity, and integration, the likelihood of adverse events increases too due to technological development, climate change, and activities in the political arena among other factors. Under such circumstances, a network failure has an unprecedented effect on lives and economy. To mitigate the impact of adverse events on the network operability, the survivability analysis must be conducted at the early stage of the network design. Such analysis requires the development of new analytical and ...

  20. Uncovering undetected hypoglycemic events

    Directory of Open Access Journals (Sweden)

    Unger J

    2012-03-01

    Full Text Available Jeff UngerCatalina Research Institute, Chino, CA, USAAbstract: Hypoglycemia is the rate-limiting factor that often prevents patients with diabetes from safely and effectively achieving their glycemic goals. Recent studies have reported that severe hypoglycemia is associated with a significant increase in the adjusted risks of major macrovascular events, major microvascular events, and mortality. Minor hypoglycemic episodes can also have serious implications for patient health, psychological well being, and adherence to treatment regimens. Hypoglycemic events can impact the health economics of the patient, their employer, and third-party payers. Insulin treatment is a key predictor of hypoglycemia, with one large population-based study reporting an overall prevalence of 7.1% (type 1 diabetes mellitus and 7.3% (type 2 diabetes mellitus in insulin-treated patients, compared with 0.8% in patients with type 2 diabetes treated with an oral sulfonylurea. Patients with type 1 diabetes typically experience symptomatic hypoglycemia on average twice weekly and severe hypoglycemia once annually. The progressive loss of islet cell function in patients with type 2 diabetes results in a higher risk of both symptomatic and unrecognized hypoglycemia over time. Patients with diabetes who become hypoglycemic are also more susceptible to developing defective counter-regulation, also known as hypoglycemia awareness autonomic failure, which is life-threatening and must be aggressively addressed. In patients unable to recognize hypoglycemia symptoms, frequent home monitoring or use of continuous glucose sensors are critical. Primary care physicians play a key role in the prevention and management of hypoglycemia in patients with diabetes, particularly in those requiring intensive insulin therapy, yet physicians are often unaware of the multitude of consequences of hypoglycemia or how to deal with them. Careful monitoring, adherence to guidelines, and use of optimal

  1. Deploying temporary networks for upscaling of sparse network stations

    Science.gov (United States)

    Coopersmith, Evan J.; Cosh, Michael H.; Bell, Jesse E.; Kelly, Victoria; Hall, Mark; Palecki, Michael A.; Temimi, Marouane

    2016-10-01

    Soil observations networks at the national scale play an integral role in hydrologic modeling, drought assessment, agricultural decision support, and our ability to understand climate change. Understanding soil moisture variability is necessary to apply these measurements to model calibration, business and consumer applications, or even human health issues. The installation of soil moisture sensors as sparse, national networks is necessitated by limited financial resources. However, this results in the incomplete sampling of the local heterogeneity of soil type, vegetation cover, topography, and the fine spatial distribution of precipitation events. To this end, temporary networks can be installed in the areas surrounding a permanent installation within a sparse network. The temporary networks deployed in this study provide a more representative average at the 3 km and 9 km scales, localized about the permanent gauge. The value of such temporary networks is demonstrated at test sites in Millbrook, New York and Crossville, Tennessee. The capacity of a single U.S. Climate Reference Network (USCRN) sensor set to approximate the average of a temporary network at the 3 km and 9 km scales using a simple linear scaling function is tested. The capacity of a temporary network to provide reliable estimates with diminishing numbers of sensors, the temporal stability of those networks, and ultimately, the relationship of the variability of those networks to soil moisture conditions at the permanent sensor are investigated. In this manner, this work demonstrates the single-season installation of a temporary network as a mechanism to characterize the soil moisture variability at a permanent gauge within a sparse network.

  2. Event-Based Conceptual Modeling

    DEFF Research Database (Denmark)

    Bækgaard, Lars

    The paper demonstrates that a wide variety of event-based modeling approaches are based on special cases of the same general event concept, and that the general event concept can be used to unify the otherwise unrelated fields of information modeling and process modeling. A set of event......-based modeling approaches are analyzed and the results are used to formulate a general event concept that can be used for unifying the seemingly unrelated event concepts. Events are characterized as short-duration processes that have participants, consequences, and properties, and that may be modeled in terms...... of information structures. The general event concept can be used to guide systems analysis and design and to improve modeling approaches....

  3. Cells anticipate periodic events

    Science.gov (United States)

    Nakagaki, Toshiyuki

    2009-03-01

    We show that an amoeboid organism can anticipate the timing of periodic events. The plasmodium of the true slime mold Physarum polycephalum moves rapidly under favourable conditions, but stops moving when transferred to less-favourable conditions. Plasmodia exposed to unfavourable conditions, presented in three consecutive pulses at constant intervals, reduced their locomotive speed in response to each episode. When subsequently subjected to favourable conditions, the plasmodia spontaneously reduced their locomotive speed at the time point when the next unfavourable episode would have occurred. This implied anticipation of impending environmental change. After this behaviour had been evoked several times, the locomotion of the plasmodia returned to normal; however, the anticipatory response could subsequently be induced by a single unfavourable pulse, implying recall of the memorized periodicity. We explored the mechanisms underlying these behaviours from a dynamical systems perspective. Our results hint at the cellular origins of primitive intelligence and imply that simple dynamics might be sufficient to explain its emergence.

  4. Simulation of Quantum Computation : A Deterministic Event-Based Approach

    NARCIS (Netherlands)

    Michielsen, K.; Raedt, K. De; Raedt, H. De

    2005-01-01

    We demonstrate that locally connected networks of machines that have primitive learning capabilities can be used to perform a deterministic, event-based simulation of quantum computation. We present simulation results for basic quantum operations such as the Hadamard and the controlled-NOT gate, and

  5. Simulation of quantum computation : A deterministic event-based approach

    NARCIS (Netherlands)

    Michielsen, K; De Raedt, K; De Raedt, H

    2005-01-01

    We demonstrate that locally connected networks of machines that have primitive learning capabilities can be used to perform a deterministic, event-based simulation of quantum computation. We present simulation results for basic quantum operations such as the Hadamard and the controlled-NOT gate, and

  6. Event based state estimation with time synchronous updates

    NARCIS (Netherlands)

    Sijs, J.; Lazar, M.

    2012-01-01

    To reduce the amount of data transfer in networked systems, measurements are usually taken only when an event occurs rather than at each synchronous sample instant. However, this complicates estimation problems considerably, especially in the situation when no measurement is received anymore. The go

  7. Communication and control for networked complex systems

    CERN Document Server

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  8. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...

  9. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  10. Safeguards Summary Event List (SSEL)

    International Nuclear Information System (INIS)

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, vandalism, arson, firearms, sabotage and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels

  11. Safeguards Summary Event List (SSEL)

    International Nuclear Information System (INIS)

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the U.S. Nuclear Regulatory Commission (NRC). Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, tampering/vandalism, arson, firearms, radiological sabotage and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels

  12. Safeguards Summary Event List (SSEL)

    International Nuclear Information System (INIS)

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, vandalism, arson, firearms, radiological sabotage and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels

  13. Events Classification in Log Audit

    OpenAIRE

    Sabah Al-Fedaghi; Fahad Mahdi

    2010-01-01

    Information security audit is a monitoring/logging mechanism to ensure compliance with regulations and to detect abnormalities, security breaches, and privacy violations; however, auditing too many events causes overwhelming use of system resources and impacts performance. Consequently, a classification of events is used to prioritize events and configure the log system. Rules can be applied according to this classification to make decisions about events to be archived and types of actions in...

  14. Quick Search for Rare Events

    OpenAIRE

    Tajer, Ali; Poor, H. Vincent

    2012-01-01

    Rare events can potentially occur in many applications. When manifested as opportunities to be exploited, risks to be ameliorated, or certain features to be extracted, such events become of paramount significance. Due to their sporadic nature, the information-bearing signals associated with rare events often lie in a large set of irrelevant signals and are not easily accessible. This paper provides a statistical framework for detecting such events so that an optimal balance between detection ...

  15. Real-time detection and classification of anomalous events in streaming data

    Science.gov (United States)

    Ferragut, Erik M.; Goodall, John R.; Iannacone, Michael D.; Laska, Jason A.; Harrison, Lane T.

    2016-04-19

    A system is described for receiving a stream of events and scoring the events based on anomalousness and maliciousness (or other classification). The events can be displayed to a user in user-defined groupings in an animated fashion. The system can include a plurality of anomaly detectors that together implement an algorithm to identify low probability events and detect atypical traffic patterns. The atypical traffic patterns can then be classified as being of interest or not. In one particular example, in a network environment, the classification can be whether the network traffic is malicious or not.

  16. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  17. Integrity & sport events: Position paper

    NARCIS (Netherlands)

    Hover, P.; Dijk, B.; Breedveld, K.; Eekeren, F. van

    2016-01-01

    Sport events are appreciated as important sources of inspiration and positive energy. Yet, for a growing number of people, the negative aspects of sport events have come to cast a shadow over sport events as a positive experience. Questions and doubts have been raised about the transparency and good

  18. Sudden Event Recognition: A Survey

    Directory of Open Access Journals (Sweden)

    Mohd Asyraf Zulkifley

    2013-08-01

    Full Text Available Event recognition is one of the most active research areas in video surveillance fields. Advancement in event recognition systems mainly aims to provide convenience, safety and an efficient lifestyle for humanity. A precise, accurate and robust approach is necessary to enable event recognition systems to respond to sudden changes in various uncontrolled environments, such as the case of an emergency, physical threat and a fire or bomb alert. The performance of sudden event recognition systems depends heavily on the accuracy of low level processing, like detection, recognition, tracking and machine learning algorithms. This survey aims to detect and characterize a sudden event, which is a subset of an abnormal event in several video surveillance applications. This paper discusses the following in detail: (1 the importance of a sudden event over a general anomalous event; (2 frameworks used in sudden event recognition; (3 the requirements and comparative studies of a sudden event recognition system and (4 various decision-making approaches for sudden event recognition. The advantages and drawbacks of using 3D images from multiple cameras for real-time application are also discussed. The paper concludes with suggestions for future research directions in sudden event recognition.

  19. Event boundaries and memory improvement.

    Science.gov (United States)

    Pettijohn, Kyle A; Thompson, Alexis N; Tamplin, Andrea K; Krawietz, Sabine A; Radvansky, Gabriel A

    2016-03-01

    The structure of events can influence later memory for information that is embedded in them, with evidence indicating that event boundaries can both impair and enhance memory. The current study explored whether the presence of event boundaries during encoding can structure information to improve memory. In Experiment 1, memory for a list of words was tested in which event structure was manipulated by having participants walk through a doorway, or not, halfway through the word list. In Experiment 2, memory for lists of words was tested in which event structure was manipulated using computer windows. Finally, in Experiments 3 and 4, event structure was manipulated by having event shifts described in narrative texts. The consistent finding across all of these methods and materials was that memory was better when the information was distributed across two events rather than combined into a single event. Moreover, Experiment 4 demonstrated that increasing the number of event boundaries from one to two increased the memory benefit. These results are interpreted in the context of the Event Horizon Model of event cognition.

  20. Extreme Energy Events Monitoring report

    CERN Document Server

    Baimukhamedova, Nigina

    2015-01-01

    Following paper reflects the progress I made on Summer Student Program within Extreme Energy Events Monitor project I was working on. During 8 week period I managed to build a simple detector system that is capable of triggering events similar to explosions (sudden change in sound levels) and measuring approximate location of the event. Source codes are available upon request and settings described further.

  1. Event Structure and Cognitive Control

    Science.gov (United States)

    Reimer, Jason F.; Radvansky, Gabriel A.; Lorsbach, Thomas C.; Armendarez, Joseph J.

    2015-01-01

    Recently, a great deal of research has demonstrated that although everyday experience is continuous in nature, it is parsed into separate events. The aim of the present study was to examine whether event structure can influence the effectiveness of cognitive control. Across 5 experiments we varied the structure of events within the AX-CPT by…

  2. Statistical analysis of geodetic networks for detecting regional events

    Science.gov (United States)

    Granat, Robert

    2004-01-01

    We present an application of hidden Markov models (HMMs) to analysis of geodetic time series in Southern California. Our model fitting method uses a regularized version of the deterministic annealing expectation-maximization algorithm to ensure that model solutions are both robust and of high quality.

  3. PARNEM-A PARALLEL DISCRETE EVENT NETWORK EMULATION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    During the development of new net work pro-tocols and control algorithms,it is necessaryto vali-date and evaluate the proposed newtechnology priorto its deployment in live condition.As Internet ischaracterized as a uncontrollable,variable and un-predictable infrastructure,this brings the difficultyof developing,debugging and evaluating net workprotocols.Net work emulation system constructs avirtual net work environment which has the charac-teristics of controllable and repeatable net work con-ditions,and th...

  4. Detection of Incidents and Events in Urban Networks

    NARCIS (Netherlands)

    Thomas, T.; Berkum, van E.C.

    2008-01-01

    Although there is a large variation in traffic flow patterns, we can distinguish two main types: recurrent and non-recurrent patterns. A recurrent pattern repeats itself with a known period and is therefore predictable. An example is the rush hour peak, but also the peak in travel demand which is ca

  5. Network Television Evening News Coverage of Infectious Disease Events.

    Science.gov (United States)

    Greenberg, Michael; Wartenberg, Daniel

    1990-01-01

    Examines coverage of several infectious diseases and teenage suicide to see whether television news favors covering illness where it clusters or when it occurs near major news centers where it is easier to cover. Finds that television news did go to where the illness broke out but tended to favor reporting urban over rural suicides. (RS)

  6. Real-Time GPS Network Monitors Bayou Corne Sinkhole Event

    Science.gov (United States)

    Kent, Joshua D.; Dunaway, Larry

    2013-10-01

    In August 2012 a sinkhole developed in the swampy marshland near the rural community of Bayou Corne in Assumption Parish (i.e., county), Louisiana. The area was evacuated, and some residents have still not been able to return. The sinkhole—which now measures about 450 meters wide and is continuing to grow—is being monitored by multiple systems, including four rapid-response GPS continuously operating reference stations (CORS) called CORS911. The real-time data provided by this system are used by scientists and decision makers to help ensure public safety.

  7. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  8. Network regularizability

    CERN Document Server

    Franceschet, Massimo

    2016-01-01

    A network is regularizable if it is possible to assign weights to its edges so that all nodes have the same degree. We define a hierarchy of four network classes in terms of their regularization properties. For the classes of the hierarchy, we investigate structural conditions on both the network and the corresponding adjacency matrix that are necessary and sufficient for the inclusion of a network in the class. Moreover, we provide an algorithmic solution for the problem of positioning a network in the hierarchy. We argue that the regularization solution is useful to build an egalitarian, friction-free network in which all actors of the network has the same centrality (and power).

  9. Phase-Space Detection of Cyber Events

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez Jimenez, Jarilyn M [ORNL; Ferber, Aaron E [ORNL; Prowell, Stacy J [ORNL; Hively, Lee M [ORNL

    2015-01-01

    Energy Delivery Systems (EDS) are a network of processes that produce, transfer and distribute energy. EDS are increasingly dependent on networked computing assets, as are many Industrial Control Systems. Consequently, cyber-attacks pose a real and pertinent threat, as evidenced by Stuxnet, Shamoon and Dragonfly. Hence, there is a critical need for novel methods to detect, prevent, and mitigate effects of such attacks. To detect cyber-attacks in EDS, we developed a framework for gathering and analyzing timing data that involves establishing a baseline execution profile and then capturing the effect of perturbations in the state from injecting various malware. The data analysis was based on nonlinear dynamics and graph theory to improve detection of anomalous events in cyber applications. The goal was the extraction of changing dynamics or anomalous activity in the underlying computer system. Takens' theorem in nonlinear dynamics allows reconstruction of topologically invariant, time-delay-embedding states from the computer data in a sufficiently high-dimensional space. The resultant dynamical states were nodes, and the state-to-state transitions were links in a mathematical graph. Alternatively, sequential tabulation of executing instructions provides the nodes with corresponding instruction-to-instruction links. Graph theorems guarantee graph-invariant measures to quantify the dynamical changes in the running applications. Results showed a successful detection of cyber events.

  10. Concurrent Bursty Behavior of Social Sensors in Sporting Events

    CERN Document Server

    Takeichi, Yuki; Suzuki, Reji; Arita, Takaya

    2014-01-01

    The advent of social media expands our ability to transmit information and connect with others instantly, which enables us to behave as "social sensors." Here, we studied concurrent bursty behavior of Twitter users during major sporting events to determine their function as social sensors. We show that the degree of concurrent bursts in tweets (posts) and retweets (re-posts) works as a good indicator of winning or losing a game. More specifically, our tweet analysis of Japanese professional baseball games in 2013 revealed that social sensors can immediately show reactions to positive and negative events through bursts of tweets, but that positive events are more likely to induce a subsequent burst of retweets. These findings were also confirmed in an analysis of the 2014 FIFA World Cup final. We further showed active interactions among social sensors by constructing retweet networks during a baseball game. The resulting networks commonly exhibited user clusters depending on the baseball team, with a scale-fre...

  11. Addressing concerns related to geologic hazards at the site of the proposed Transuranic Waste Facility , TA-63, Los Alamos National Laboratory: focus on the current Los Alamos Seismic Network earthquake catalog, proximity of identified seismic events to the proposed facility , and evaluation of prev

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, Peter M. [Los Alamos National Laboratory; Schultz-Fellenz, Emily S. [Los Alamos National Laboratory; Kelley, Richard E. [Los Alamos National Laboratory

    2012-04-02

    . Understanding the subtle differences between Tshirege Member cooling units and the nature of the contacts between cooling units is critical to identifying the presence or absence of faults associated with the Pajarito fault system on the Pajarito Plateau. The Los Alamos Seismic Network (LASN) continuously monitors local earthquake activity in the Los Alamos area in support of LANL's Seismic Hazards program. Seismic monitoring of LANL facilities is a requirement of DOE Order 420.1B (Facility Safety). LASN currently consists of nine permanent seismic instrument field stations that telemeter real-time sensitive ground motion data to a central recording facility. Four of these stations are located on LANL property, with three of those within 2.5 miles of TA-63. The other five stations are in remote locations in the Jemez Mountains, Valles Caldera, St Peters Dome, and the Caja del Rio plateau across the Rio Grande from the Los Alamos area. Local earthquakes are defined as those with locations within roughly 100 miles of Los Alamos. Plate 1 shows the current LASN station locations and all local earthquakes recorded from 1973 through 2011. During this time period, LASN has detected and recorded over 850 local earthquakes in north-central New Mexico. Over 650 of these were located within about 50 miles of Los Alamos, and roughly 60 were within 10 miles. The apparent higher density of earthquakes close to Los Alamos, relative to the rest of north-central New Mexico, is due largely to the fact that LASN is a sensitive local seismic network, recording many very small nearby events (magnitude less than 1.0) that are undetectable at greater distances.

  12. Safeguards Summary Event List (SSEL)

    International Nuclear Information System (INIS)

    The Safeguards Summary Event List provides brief summaries of hundreds of safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission. Events are described under the categories: Bomb-related, Intrusion, Missing/Allegedly Stolen, Transportation-related, Tampering/Vandalism, Arson, Firearms-related, Radiological Sabotage, Non-radiological Sabotage, and Miscellaneous. Because of the public interest, the Miscellaneous category also includes events reported involving source material, byproduct material, and natural uranium, which are exempt from safeguards requirements. Information in the event descriptions was obtained from official NRC sources

  13. Safeguards summary event list (SSEL)

    International Nuclear Information System (INIS)

    The Safeguards Summary Event List (SSEL) provides brief summaries of several hundred safeguards-related events involving nuclear material or facilities regulated by the US Nuclear Regulatory Commission (NRC). Because of public interest, also included are events reported involving byproduct material which is exempt from safeguards requirements. Events are described under the categories of bomb-related, intrusion, missing and/or allegedly stolen, transportation, tampering/vandalism, arson, firearms, radiological sabotage, nonradiological sabotage, alcohol and drugs, and miscellaneous. The information contained in the event descriptions is derived primarily from official NRC reporting channels

  14. EVENT PLANNING USING FUNCTION ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    Lori Braase; Jodi Grgich

    2011-06-01

    Event planning is expensive and resource intensive. Function analysis provides a solid foundation for comprehensive event planning (e.g., workshops, conferences, symposiums, or meetings). It has been used at Idaho National Laboratory (INL) to successfully plan events and capture lessons learned, and played a significant role in the development and implementation of the “INL Guide for Hosting an Event.” Using a guide and a functional approach to planning utilizes resources more efficiently and reduces errors that could be distracting or detrimental to an event. This integrated approach to logistics and program planning – with the primary focus on the participant – gives us the edge.

  15. The NASA Fireball Network Database

    Science.gov (United States)

    Moser, Danielle E.

    2011-01-01

    The NASA Meteoroid Environment Office (MEO) has been operating an automated video fireball network since late-2008. Since that time, over 1,700 multi-station fireballs have been observed. A database containing orbital data and trajectory information on all these events has recently been compiled and is currently being mined for information. Preliminary results are presented here.

  16. International Symposium on Ubiquitous Networking

    CERN Document Server

    Medromi, Hicham; Sadik, Mohamed

    2016-01-01

    This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet’15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.

  17. Simplistic pathways or complex networks?

    DEFF Research Database (Denmark)

    Jørgensen, Claus; Linding, Rune

    2010-01-01

    Signaling events are frequently described in textbooks as linear cascades. However, in reality, input cues are processed by dynamic and context-specific networks, which are assembled from numerous signaling molecules. Diseases, such as cancer, are typically associated with multiple genomic altera...

  18. PERSON IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Андрей Борисович Шалимов

    2013-11-01

    Full Text Available Purpose: Our scientific purpose is creation of practical model of person’s representation in social networks (Facebook, Twitter, Classmates. As user of social networks, person is made conditional not only upon its own identity, but also upon the information about himself, which he is ready to share with his friends in contact list. Goal-setting and practical activities for their achievement mean that you should apply force, it can completely eliminates systemic factors, the system of power relations, which overwhelms human being in social networks.Methodology: The reconstruction of the model of human in the popularity of social networksResults: There is descripton of practical model of person's representation in social networks, it includes the management of own identity and the audience (the list of contacts. When person manages own identity, he answers the question, «Whom I can dare to be?». Person perceives himself in social networks' being, he understands himself and his place in the world, he identifies.Managing the way in social media means that you answer the question «What I want to tell?». Person in social media looks at events in the field of culture, economy, politics, social relations through the prism of his own attitudes, he forms and formulates his own agenda and he is going to tell about himself through them.Practical implications: Everyday people’s life, practical activities, including marketing in social networks.DOI: http://dx.doi.org/10.12731/2218-7405-2013-9-51

  19. Computer Networks As Social Networks

    Science.gov (United States)

    Wellman, Barry

    2001-09-01

    Computer networks are inherently social networks, linking people, organizations, and knowledge. They are social institutions that should not be studied in isolation but as integrated into everyday lives. The proliferation of computer networks has facilitated a deemphasis on group solidarities at work and in the community and afforded a turn to networked societies that are loosely bounded and sparsely knit. The Internet increases people's social capital, increasing contact with friends and relatives who live nearby and far away. New tools must be developed to help people navigate and find knowledge in complex, fragmented, networked societies.

  20. The Chelyabinsk event

    Science.gov (United States)

    Borovička, Jiri

    2015-08-01

    On February 15, 2013, 3:20 UT, an asteroid of the size of about 19 meters and mass of 12,000 metric tons entered the Earth's atmosphere unexpectedly near the border of Kazakhstan and Russia. It was the largest confirmed Earth impactor since the Tunguska event in 1908. The body moved approximately westwards with a speed of 19 km/s, on a trajectory inclined 18 degrees to the surface, creating a fireball of steadily increasing brightness. Eleven seconds after the first sightings, the fireball reached its maximum brightness. At that point, it was located less than 40 km south from Chelyabinsk, a Russian city of population more than one million, at an altitude of 30 km. For people directly underneath, the fireball was 30 times brighter than the Sun. The cosmic body disrupted into fragments; the largest of them was visible for another five seconds before it disappeared at an altitude of 12.5 km, when it was decelerated to 3 km/s. Fifty six second later, that ~ 600 kg fragment landed in Lake Chebarkul and created an 8 m wide hole in the ice. More material remained, however, in the atmosphere forming a dust trail up to 2 km wide and extending along the fireball trajectory from altitude 18 to 70 km. People observing the dust trail from Chelyabinsk and other places were surprised by the arrival of a very strong blast wave 90 - 150 s after the fireball passage (depending on location). The wave, produced by the supersonic flight of the body, broke ~10% of windows in Chelyabinsk (~40% of buildings were affected). More than 1600 people were injured, mostly from broken glass. Small meteorites landed in an area 60 km long and several km wide and caused no damage. The meteorites were classified as LL ordinary chondrites and were interesting by the presence of two phases, light and dark. The dust left in the atmosphere circled the Earth within few days and formed a ring around the northern hemisphere.The whole event was well documented by video cameras, seismic and infrasonic