WorldWideScience

Sample records for attachment network model

  1. Preferential Attachment in Online Networks: Measurement and Explanations

    NARCIS (Netherlands)

    Kunegis, J; Blattner, M; Moser, C.

    2013-01-01

    We perform an empirical study of the preferential attachment phenomenon in temporal networks and show that on the Web, networks follow a nonlinear preferential attachment model in which the exponent depends on the type of network considered. The classical preferential attachment model for networks

  2. Unified Model for Generation Complex Networks with Utility Preferential Attachment

    International Nuclear Information System (INIS)

    Wu Jianjun; Gao Ziyou; Sun Huijun

    2006-01-01

    In this paper, based on the utility preferential attachment, we propose a new unified model to generate different network topologies such as scale-free, small-world and random networks. Moreover, a new network structure named super scale network is found, which has monopoly characteristic in our simulation experiments. Finally, the characteristics of this new network are given.

  3. Attachment and social networks.

    Science.gov (United States)

    Gillath, Omri; C Karantzas, Gery; Lee, Juwon

    2018-02-21

    The current review covers two lines of research linking attachment and social networks. One focuses on attachment networks (the people who fulfill one's attachment needs), examining composition and age-related differences pertaining to these networks. The other line integrates attachment with social network analysis to investigate how individual differences in adult attachment are associated with the management and characteristics (e.g., density, multiplexity, and centrality) of people's social networks. We show that most people's attachment networks are small and hierarchical, with one figure being the primary attachment figure (often a mother or romantic partner, depending on age). Furthermore, attachment style predicts network characteristics and management, such that insecurity is associated with less closeness, multiplexity, centrality, and poorer management (less maintenance, more dissolution). Copyright © 2018 Elsevier Ltd. All rights reserved.

  4. Preferential attachment in evolutionary earthquake networks

    Science.gov (United States)

    Rezaei, Soghra; Moghaddasi, Hanieh; Darooneh, Amir Hossein

    2018-04-01

    Earthquakes as spatio-temporal complex systems have been recently studied using complex network theory. Seismic networks are dynamical networks due to addition of new seismic events over time leading to establishing new nodes and links to the network. Here we have constructed Iran and Italy seismic networks based on Hybrid Model and testified the preferential attachment hypothesis for the connection of new nodes which states that it is more probable for newly added nodes to join the highly connected nodes comparing to the less connected ones. We showed that the preferential attachment is present in the case of earthquakes network and the attachment rate has a linear relationship with node degree. We have also found the seismic passive points, the most probable points to be influenced by other seismic places, using their preferential attachment values.

  5. Fitness networks for real world systems via modified preferential attachment

    Science.gov (United States)

    Shang, Ke-ke; Small, Michael; Yan, Wei-sheng

    2017-05-01

    Complex networks are virtually ubiquitous, and the Barabási and Albert model (BA model) has became an acknowledged standard for the modelling of these systems. The so-called BA model is a kind of preferential attachment growth model based on the intuitive premise that popularity is attractive. However, preferential attachment alone is insufficient to describe the diversity of complex networks observed in the real world. In this paper we first use the accuracy of a link prediction method, as a metric for network fitness. The link prediction method predicts the occurrence of links consistent with preferential attachment, the performance of this link prediction scheme is then a natural measure of the ;preferential-attachment-likeness; of a given network. We then propose several modification methods and modified BA models to construct networks which more accurately describe the fitness properties of real networks. We find that all features assortativity, degree distribution and rich-club formation can play significant roles for the network construction and eventual structure. Moreover, link sparsity and the size of a network are key factors for network reconstruction. In addition, we find that the structure of the network which is limited by geographic location (nodes are embedded in a Euclidean space and connectivity is correlated with distances) differs from other typical networks. In social networks, we observe that the high school contact network has similar structure as the friends network and so we speculate that the contact behaviours can reflect real friendships.

  6. A Weighted Evolving Network with Community Size Preferential Attachment

    International Nuclear Information System (INIS)

    Zhuo Zhiwei; Shan Erfang

    2010-01-01

    Community structure is an important characteristic in real complex network. It is a network consists of groups of nodes within which links are dense but among which links are sparse. In this paper, the evolving network include node, link and community growth and we apply the community size preferential attachment and strength preferential attachment to a growing weighted network model and utilize weight assigning mechanism from BBV model. The resulting network reflects the intrinsic community structure with generalized power-law distributions of nodes' degrees and strengths.

  7. Distributed network generation based on preferential attachment in ABS

    NARCIS (Netherlands)

    K. Azadbakht (Keyvan); N. Bezirgiannis (Nikolaos); F.S. de Boer (Frank)

    2017-01-01

    textabstractGeneration of social networks using Preferential Attachment (PA) mechanism is proposed in the Barabasi-Albert model. In this mechanism, new nodes are introduced to the network sequentially and they attach to the existing nodes preferentially where the preference can be based on the

  8. Growing networks with mixed attachment mechanisms

    International Nuclear Information System (INIS)

    Shao Zhigang; Zou Xianwu; Tan Zhijie; Jin Zhunzhi

    2006-01-01

    Networks grow and evolve when new nodes and links are added in. There are two methods to add the links: uniform attachment and preferential attachment. We take account of the addition of links with mixed attachment between uniform attachment and preferential attachment in proportion. By using numerical simulations and analysis based on a continuum theory, we obtain that the degree distribution P(k) has an extended power-law form P(k) ∼ (k + k 0 ) -γ . When the number of edges k of a node is much larger than a certain value k 0 , the degree distribution reduces to the power-law form P(k) ∼ k -γ ; and when k is much smaller than k 0 , the degree distribution degenerates into the exponential form P(k)∼exp(-yk/k 0 ). It has been found that degree distribution possesses this extended power-law form for many real networks, such as the movie actor network, the citation network of scientific papers and diverse protein interaction networks

  9. Dismissing Attachment Characteristics Dynamically Modulate Brain Networks Subserving Social Aversion.

    Science.gov (United States)

    Krause, Anna Linda; Borchardt, Viola; Li, Meng; van Tol, Marie-José; Demenescu, Liliana Ramona; Strauss, Bernhard; Kirchmann, Helmut; Buchheim, Anna; Metzger, Coraline D; Nolte, Tobias; Walter, Martin

    2016-01-01

    Attachment patterns influence actions, thoughts and feeling through a person's "inner working model". Speech charged with attachment-dependent content was proposed to modulate the activation of cognitive-emotional schemata in listeners. We performed a 7 Tesla rest-task-rest functional magnetic resonance imaging (fMRI)-experiment, presenting auditory narratives prototypical of dismissing attachment representations to investigate their effect on 23 healthy males. We then examined effects of participants' attachment style and childhood trauma on brain state changes using seed-based functional connectivity (FC) analyses, and finally tested whether subjective differences in responsivity to narratives could be predicted by baseline network states. In comparison to a baseline state, we observed increased FC in a previously described "social aversion network" including dorsal anterior cingulated cortex (dACC) and left anterior middle temporal gyrus (aMTG) specifically after exposure to insecure-dismissing attachment narratives. Increased dACC-seeded FC within the social aversion network was positively related to the participants' avoidant attachment style and presence of a history of childhood trauma. Anxious attachment style on the other hand was positively correlated with FC between the dACC and a region outside of the "social aversion network", namely the dorsolateral prefrontal cortex, which suggests decreased network segregation as a function of anxious attachment. Finally, the extent of subjective experience of friendliness towards the dismissing narrative was predicted by low baseline FC-values between hippocampus and inferior parietal lobule (IPL). Taken together, our study demonstrates an activation of networks related to social aversion in terms of increased connectivity after listening to insecure-dismissing attachment narratives. A causal interrelation of brain state changes and subsequent changes in social reactivity was further supported by our observation of

  10. Generating Billion-Edge Scale-Free Networks in Seconds: Performance Study of a Novel GPU-based Preferential Attachment Model

    Energy Technology Data Exchange (ETDEWEB)

    Perumalla, Kalyan S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Alam, Maksudul [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-10-01

    A novel parallel algorithm is presented for generating random scale-free networks using the preferential-attachment model. The algorithm, named cuPPA, is custom-designed for single instruction multiple data (SIMD) style of parallel processing supported by modern processors such as graphical processing units (GPUs). To the best of our knowledge, our algorithm is the first to exploit GPUs, and also the fastest implementation available today, to generate scale free networks using the preferential attachment model. A detailed performance study is presented to understand the scalability and runtime characteristics of the cuPPA algorithm. In one of the best cases, when executed on an NVidia GeForce 1080 GPU, cuPPA generates a scale free network of a billion edges in less than 2 seconds.

  11. The network perspective: an integration of attachment and family systems theories.

    Science.gov (United States)

    Kozlowska, Kasia; Hanney, Lesley

    2002-01-01

    In this article we discuss the network paradigm as a useful base from which to integrate attachment and family systems theories. The network perspective refers to the application of general systems theory to living systems, and provides a framework that conceptualizes the dyadic and family systems as simultaneously distinct and interconnected. Network thinking requires that the clinician holds multiple perspectives in mind, considers each system level as both a part and a whole, and shifts the focus of attention between levels as required. Key epistemological issues that have hindered the integration of the theories are discussed. These include inconsistencies within attachment theory itself and confusion surrounding the theoretical conceptualizations of the relationship between attachment and family systems theories. Detailed information about attachment categories is provided using the Dynamic Maturational model. Case vignettes illustrating work with young children and their families explore the clinical implications of integrating attachment data into family therapy practice.

  12. Preferential attachment in the evolution of metabolic networks

    Directory of Open Access Journals (Sweden)

    Elofsson Arne

    2005-11-01

    Full Text Available Abstract Background Many biological networks show some characteristics of scale-free networks. Scale-free networks can evolve through preferential attachment where new nodes are preferentially attached to well connected nodes. In networks which have evolved through preferential attachment older nodes should have a higher average connectivity than younger nodes. Here we have investigated preferential attachment in the context of metabolic networks. Results The connectivities of the enzymes in the metabolic network of Escherichia coli were determined and representatives for these enzymes were located in 11 eukaryotes, 17 archaea and 46 bacteria. E. coli enzymes which have representatives in eukaryotes have a higher average connectivity while enzymes which are represented only in the prokaryotes, and especially the enzymes only present in βγ-proteobacteria, have lower connectivities than expected by chance. Interestingly, the enzymes which have been proposed as candidates for horizontal gene transfer have a higher average connectivity than the other enzymes. Furthermore, It was found that new edges are added to the highly connected enzymes at a faster rate than to enzymes with low connectivities which is consistent with preferential attachment. Conclusion Here, we have found indications of preferential attachment in the metabolic network of E. coli. A possible biological explanation for preferential attachment growth of metabolic networks is that novel enzymes created through gene duplication maintain some of the compounds involved in the original reaction, throughout its future evolution. In addition, we found that enzymes which are candidates for horizontal gene transfer have a higher average connectivity than other enzymes. This indicates that while new enzymes are attached preferentially to highly connected enzymes, these highly connected enzymes have sometimes been introduced into the E. coli genome by horizontal gene transfer. We speculate

  13. Dismissing attachment characteristics dynamically modulate brain networks subserving social aversion.

    Directory of Open Access Journals (Sweden)

    Anna Linda eKrause

    2016-03-01

    Full Text Available Attachment patterns influence actions, thoughts and feeling through a person’s ‘Inner Working Model’. Speech charged with attachment-dependent content was proposed to modulate the activation of cognitive-emotional schemata in listeners. We performed a 7 Tesla rest-task-rest fMRI-experiment, presenting auditory narratives prototypical of dismissing attachment representations to investigate their effect on 23 healthy males. We then examined effects of participants’ attachment style and childhood trauma on brain state changes using seed-based functional connectivity (FC analyses, and finally tested whether subjective differences in responsivity to narratives could be predicted by baseline network states. In comparison to a baseline state, we observed increased FC in a previously described ‘social aversion network’ including dorsal anterior cingulated cortex (dACC and left anterior middle temporal gyrus (aMTG specifically after exposure to insecure-dismissing attachment narratives. Increased dACC-seeded FC within the social aversion network was positively related to the participants’ avoidant attachment style and presence of a history of childhood trauma. Anxious attachment style on the other hand was positively correlated with FC between the dACC and a region outside of the ‘social aversion network’, namely the dorsolateral prefrontal cortex, which suggests decreased network segregation as a function of anxious attachment. Finally, the extent of subjective experience of friendliness towards the dismissing narrative was predicted by low baseline FC-values between hippocampus and inferior parietal lobule. Taken together, our study demonstrates an activation of networks related to social aversion in terms of increased connectivity after listening to insecure-dismissing attachment narratives. A causal interrelation of brain state changes and subsequent changes in social reactivity was further supported by our observation of direct

  14. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  15. An evolving network model with community structure

    International Nuclear Information System (INIS)

    Li Chunguang; Maini, Philip K

    2005-01-01

    Many social and biological networks consist of communities-groups of nodes within which connections are dense, but between which connections are sparser. Recently, there has been considerable interest in designing algorithms for detecting community structures in real-world complex networks. In this paper, we propose an evolving network model which exhibits community structure. The network model is based on the inner-community preferential attachment and inter-community preferential attachment mechanisms. The degree distributions of this network model are analysed based on a mean-field method. Theoretical results and numerical simulations indicate that this network model has community structure and scale-free properties

  16. A Net of Friends: Investigating Friendship by Integrating Attachment Theory and Social Network Analysis.

    Science.gov (United States)

    Gillath, Omri; Karantzas, Gery C; Selcuk, Emre

    2017-11-01

    The current article focuses on attachment style-an individual difference widely studied in the field of close relationships-and its application to the study of social networks. Specifically, we investigated whether attachment style predicts perception and management of social networks. In Study 1, we examined the associations of attachment style with perceptions of network tie strength and multiplexity. In Studies 2a and 2b, we investigated the association between attachment style and network management skills (initiating, maintaining, and dissolving ties) and whether network management skills mediated the associations of attachment style with network tie strength and multiplexity. In Study 3, experimentally enhancing attachment security made people more likely to initiate and less likely to dissolve social ties (for the latter, especially among those high on avoidance or anxiety). As for maintenance, security priming also increased maintenance; however, mainly among people high on attachment anxiety or low on attachment avoidance.

  17. Emergence of global preferential attachment from local interaction

    International Nuclear Information System (INIS)

    Li Menghui; Fan Ying; Wu Jinshan; Di Zengru; Gao Liang

    2010-01-01

    Global degree/strength-based preferential attachment is widely used as an evolution mechanism of networks. But it is hard to believe that any individual can get global information and shape the network architecture based on it. In this paper, it is found that the global preferential attachment emerges from the local interaction models, including the distance-dependent preferential attachment (DDPA) evolving model of weighted networks (Li et al 2006 New J. Phys. 8 72), the acquaintance network model (Davidsen et al 2002 Phys. Rev. Lett. 88 128701) and the connecting nearest-neighbor (CNN) model (Vazquez 2003 Phys. Rev. E 67 056104). For the DDPA model and the CNN model, the attachment rate depends linearly on the degree or vertex strength, whereas for the acquaintance network model, the dependence follows a sublinear power law. It implies that for the evolution of social networks, local contact could be more fundamental than the presumed global preferential attachment.

  18. Understanding Members’ Attachment to Social Networking Sites

    DEFF Research Database (Denmark)

    Lim, Eric T. K.; Cyr, Dianne; Tan, Chee-Wee

    2014-01-01

    Social Networking Sites (SNSs) are pervasive phenomena in today’s society. With greater connectivity and interactivity enabled through emerging technologies, SNSs provide communication platforms for individuals to bridge spatial and temporal differences when making friends, sharing experiences......, socializing with others and much more. This study therefore endeavors to shed light on this growing trend by decomposing members’ motives for participating within SNSs into identity-based, bondbased and comparison-based attachments. Each of these forms of attachment in turn affects members’ cooperative...

  19. Risk and resilience in military families experiencing deployment: the role of the family attachment network.

    Science.gov (United States)

    Riggs, Shelley A; Riggs, David S

    2011-10-01

    Deployment separation constitutes a significant stressor for U.S. military men and women and their families. Many military personnel return home struggling with physical and/or psychological injuries that challenge their ability to reintegrate and contribute to marital problems, family dysfunction, and emotional or behavioral disturbance in spouses and children. Yet research examining the psychological health and functioning of military families is scarce and rarely driven by developmental theory. The primary purpose of this theoretical paper is to describe a family attachment network model of military families during deployment and reintegration that is grounded in attachment theory and family systems theory. This integrative perspective provides a solid empirical foundation and a comprehensive account of individual and family risk and resilience during military-related separations and reunions. The proposed family attachment network model will inform future research and intervention efforts with service members and their families.

  20. Ecological Networks and Community Attachment and Support Among Recently Resettled Refugees.

    Science.gov (United States)

    Soller, Brian; Goodkind, Jessica R; Greene, R Neil; Browning, Christopher R; Shantzek, Cece

    2018-03-25

    Interventions aimed at enhancing mental health are increasingly centered around promoting community attachment and support. However, few have examined and tested the specific ecological factors that give rise to these key community processes. Drawing from insights from the ecological network perspective, we tested whether spatial and social overlap in routine activity settings (e.g., work, school, childcare) with fellow ethnic community members is associated with individuals' attachment to their ethnic communities and access to social resources embedded in their communities. Data on routine activity locations drawn from the Refugee Well-Being Project (based in a city in the Southwestern United States) were used to reconstruct the ecological networks of recently resettled refugee communities, which were two-mode networks that comprise individuals and their routine activity locations. Results indicated that respondents' community attachment and support increased with their ecological network extensity-which taps the extent to which respondents share routine activity locations with other community members. Our study highlights a key ecological process that potentially enhances individuals' ethnic community attachment that extends beyond residential neighborhoods. © Society for Community Research and Action 2018.

  1. The moderating role of attachment anxiety on social network site use intensity and social capital.

    Science.gov (United States)

    Liu, Haihua; Shi, Junqi; Liu, Yihao; Sheng, Zitong

    2013-02-01

    This study examined the moderating role of attachment anxiety on the relationship between intensity of social network site use and bridging, bonding, and maintained social capital. Data from 322 undergraduate Chinese students were collected. Hierarchical regression analyses showed positive relationships between online intensity of social network site use and the three types of social capital. Moreover, attachment anxiety moderated the effect of intensity of social network site use on social capital. Specifically, for students with lower attachment anxiety, the relationships between intensity of social network site use and bonding and bridging social capital were stronger than those with higher attachment anxiety. The result suggested that social network sites cannot improve highly anxiously attached individuals' social capital effectively; they may need more face-to-face communications.

  2. PAFit: A Statistical Method for Measuring Preferential Attachment in Temporal Complex Networks.

    Directory of Open Access Journals (Sweden)

    Thong Pham

    Full Text Available Preferential attachment is a stochastic process that has been proposed to explain certain topological features characteristic of complex networks from diverse domains. The systematic investigation of preferential attachment is an important area of research in network science, not only for the theoretical matter of verifying whether this hypothesized process is operative in real-world networks, but also for the practical insights that follow from knowledge of its functional form. Here we describe a maximum likelihood based estimation method for the measurement of preferential attachment in temporal complex networks. We call the method PAFit, and implement it in an R package of the same name. PAFit constitutes an advance over previous methods primarily because we based it on a nonparametric statistical framework that enables attachment kernel estimation free of any assumptions about its functional form. We show this results in PAFit outperforming the popular methods of Jeong and Newman in Monte Carlo simulations. What is more, we found that the application of PAFit to a publically available Flickr social network dataset yielded clear evidence for a deviation of the attachment kernel from the popularly assumed log-linear form. Independent of our main work, we provide a correction to a consequential error in Newman's original method which had evidently gone unnoticed since its publication over a decade ago.

  3. Statistical properties and attack tolerance of growing networks with algebraic preferential attachment

    International Nuclear Information System (INIS)

    Liu Zonghua; Lai Yingcheng; Ye Nong

    2002-01-01

    We consider growing networks with algebraic preferential attachment and address two questions: (1) what is the effect of temporal fluctuations in the number of new links acquired by the network? and (2) what is the network tolerance against random failures and intentional attacks? We find that the fluctuations generally have little effect on the network properties, although they lead to a plateau behavior for small degrees in the connectivity distribution. Formulas are derived for the evolution and distribution of the network connectivity, which are tested by numerical simulations. Numerical study of the effect of failures and attacks suggests that networks constructed under algebraic preferential attachment are more robust than scale-free networks

  4. Modeling online social signed networks

    Science.gov (United States)

    Li, Le; Gu, Ke; Zeng, An; Fan, Ying; Di, Zengru

    2018-04-01

    People's online rating behavior can be modeled by user-object bipartite networks directly. However, few works have been devoted to reveal the hidden relations between users, especially from the perspective of signed networks. We analyze the signed monopartite networks projected by the signed user-object bipartite networks, finding that the networks are highly clustered with obvious community structure. Interestingly, the positive clustering coefficient is remarkably higher than the negative clustering coefficient. Then, a Signed Growing Network model (SGN) based on local preferential attachment is proposed to generate a user's signed network that has community structure and high positive clustering coefficient. Other structural properties of the modeled networks are also found to be similar to the empirical networks.

  5. Social climber attachment in forming networks produces a phase transition in a measure of connectivity

    Science.gov (United States)

    Taylor, Dane; Larremore, Daniel B.

    2012-09-01

    The formation and fragmentation of networks are typically studied using percolation theory, but most previous research has been restricted to studying a phase transition in cluster size, examining the emergence of a giant component. This approach does not study the effects of evolving network structure on dynamics that occur at the nodes, such as the synchronization of oscillators and the spread of information, epidemics, and neuronal excitations. We introduce and analyze an alternative link-formation rule, called social climber (SC) attachment, that may be combined with arbitrary percolation models to produce a phase transition using the largest eigenvalue of the network adjacency matrix as the order parameter. This eigenvalue is significant in the analyses of many network-coupled dynamical systems in which it measures the quality of global coupling and is hence a natural measure of connectivity. We highlight the important self-organized properties of SC attachment and discuss implications for controlling dynamics on networks.

  6. Maximum entropy networks are more controllable than preferential attachment networks

    International Nuclear Information System (INIS)

    Hou, Lvlin; Small, Michael; Lao, Songyang

    2014-01-01

    A maximum entropy (ME) method to generate typical scale-free networks has been recently introduced. We investigate the controllability of ME networks and Barabási–Albert preferential attachment networks. Our experimental results show that ME networks are significantly more easily controlled than BA networks of the same size and the same degree distribution. Moreover, the control profiles are used to provide insight into control properties of both classes of network. We identify and classify the driver nodes and analyze the connectivity of their neighbors. We find that driver nodes in ME networks have fewer mutual neighbors and that their neighbors have lower average degree. We conclude that the properties of the neighbors of driver node sensitively affect the network controllability. Hence, subtle and important structural differences exist between BA networks and typical scale-free networks of the same degree distribution. - Highlights: • The controllability of maximum entropy (ME) and Barabási–Albert (BA) networks is investigated. • ME networks are significantly more easily controlled than BA networks of the same degree distribution. • The properties of the neighbors of driver node sensitively affect the network controllability. • Subtle and important structural differences exist between BA networks and typical scale-free networks

  7. Coevolutionary modeling in network formation

    KAUST Repository

    Al-Shyoukh, Ibrahim

    2014-12-03

    Network coevolution, the process of network topology evolution in feedback with dynamical processes over the network nodes, is a common feature of many engineered and natural networks. In such settings, the change in network topology occurs at a comparable time scale to nodal dynamics. Coevolutionary modeling offers the possibility to better understand how and why network structures emerge. For example, social networks can exhibit a variety of structures, ranging from almost uniform to scale-free degree distributions. While current models of network formation can reproduce these structures, coevolutionary modeling can offer a better understanding of the underlying dynamics. This paper presents an overview of recent work on coevolutionary models of network formation, with an emphasis on the following three settings: (i) dynamic flow of benefits and costs, (ii) transient link establishment costs, and (iii) latent preferential attachment.

  8. Coevolutionary modeling in network formation

    KAUST Repository

    Al-Shyoukh, Ibrahim; Chasparis, Georgios; Shamma, Jeff S.

    2014-01-01

    Network coevolution, the process of network topology evolution in feedback with dynamical processes over the network nodes, is a common feature of many engineered and natural networks. In such settings, the change in network topology occurs at a comparable time scale to nodal dynamics. Coevolutionary modeling offers the possibility to better understand how and why network structures emerge. For example, social networks can exhibit a variety of structures, ranging from almost uniform to scale-free degree distributions. While current models of network formation can reproduce these structures, coevolutionary modeling can offer a better understanding of the underlying dynamics. This paper presents an overview of recent work on coevolutionary models of network formation, with an emphasis on the following three settings: (i) dynamic flow of benefits and costs, (ii) transient link establishment costs, and (iii) latent preferential attachment.

  9. Complex networks as an emerging property of hierarchical preferential attachment

    Science.gov (United States)

    Hébert-Dufresne, Laurent; Laurence, Edward; Allard, Antoine; Young, Jean-Gabriel; Dubé, Louis J.

    2015-12-01

    Real complex systems are not rigidly structured; no clear rules or blueprints exist for their construction. Yet, amidst their apparent randomness, complex structural properties universally emerge. We propose that an important class of complex systems can be modeled as an organization of many embedded levels (potentially infinite in number), all of them following the same universal growth principle known as preferential attachment. We give examples of such hierarchy in real systems, for instance, in the pyramid of production entities of the film industry. More importantly, we show how real complex networks can be interpreted as a projection of our model, from which their scale independence, their clustering, their hierarchy, their fractality, and their navigability naturally emerge. Our results suggest that complex networks, viewed as growing systems, can be quite simple, and that the apparent complexity of their structure is largely a reflection of their unobserved hierarchical nature.

  10. The Relationship Between Attachment Styles, Self-Monitoring and Cybercrime in Social Network Users.

    Science.gov (United States)

    Yaghoobi, Abolghasem; Mohammadzade, Serwa; Chegini, Ali Asghar; Yarmohammadi Vasel, Mosaeib; Zoghi Paidar, Mohammad Reza

    2016-09-01

    The anonymity in the cyberspace environment, as well as the rapid advent of and improvements to online activities has increased cybercrime. The aim of this paper was to survey the relationship between attachment styles, self-monitoring and cybercrime in social network users. The Collins and Read Adult Attachment Scale, and the Snyder self-monitoring and cybercrime scales were sent to 500 social network users. Of these, 203 users (103 men and 100 women) filled out the questionnaires. The results showed that women achieved higher scores in self-monitoring and the anxious attachment style, and men achieved higher scores in cybercrime and the anxious attachment style. There was a negative correlation between self-monitoring and cybercrime, and the anxious attachment style had a positive correlation with cybercrime and a negative correlation with self-monitoring. The secure attachment style had a positive correlation with self-monitoring and a negative correlation with cybercrime. The dependent attachment style had a positive correlation with self-monitoring and a negative correlation with cybercrime. All correlations were significant. Attachment styles have significant relationships with both self-monitoring and cybercrime. Self-monitoring and attachment styles are significant predictors of cybercrimes.

  11. Networked Attached Devices at SNS

    CERN Document Server

    Blokland, W

    2003-01-01

    The Spallation Neutron Source (SNS) diagnostic instruments at Oak Ridge National Laboratory are based on the Network Attached Device (NAD) concept. Each pickup or sensor has its own resources such as timing, data acquisition and processing. NADs are individually connected to the network, thus reducing the brittleness inherent in tightly coupled systems. This architecture allows an individual device to fail or to be serviced or removed without disrupting other devices. This paper describes our implementation of the nearly 400 NADs to be deployed. The hardware consists of rack-mounted PCs with standard motherboards and PCI data-acquisition boards. The software environment is based on LabVIEW and EPICS. LabVIEW supports the agile development demanded by modern diagnostic systems. EPICS is the control system standard for the entire SNS facility. To achieve high performance, LabVIEW and EPICS communicate through shared memory. SNS diagnostics are developed by a multi-laboratory partnership including ORNL, BNL, LAN...

  12. A Binomial Modeling Approach for Upscaling Colloid Transport Under Unfavorable Attachment Conditions: Emergent Prediction of Nonmonotonic Retention Profiles

    Science.gov (United States)

    Hilpert, Markus; Johnson, William P.

    2018-01-01

    We used a recently developed simple mathematical network model to upscale pore-scale colloid transport information determined under unfavorable attachment conditions. Classical log-linear and nonmonotonic retention profiles, both well-reported under favorable and unfavorable attachment conditions, respectively, emerged from our upscaling. The primary attribute of the network is colloid transfer between bulk pore fluid, the near-surface fluid domain (NSFD), and attachment (treated as irreversible). The network model accounts for colloid transfer to the NSFD of downgradient grains and for reentrainment to bulk pore fluid via diffusion or via expulsion at rear flow stagnation zones (RFSZs). The model describes colloid transport by a sequence of random trials in a one-dimensional (1-D) network of Happel cells, which contain a grain and a pore. Using combinatorial analysis that capitalizes on the binomial coefficient, we derived from the pore-scale information the theoretical residence time distribution of colloids in the network. The transition from log-linear to nonmonotonic retention profiles occurs when the conditions underlying classical filtration theory are not fulfilled, i.e., when an NSFD colloid population is maintained. Then, nonmonotonic retention profiles result potentially both for attached and NSFD colloids. The concentration maxima shift downgradient depending on specific parameter choice. The concentration maxima were also shown to shift downgradient temporally (with continued elution) under conditions where attachment is negligible, explaining experimentally observed downgradient transport of retained concentration maxima of adhesion-deficient bacteria. For the case of zero reentrainment, we develop closed-form, analytical expressions for the shape, and the maximum of the colloid retention profile.

  13. Degree distribution of a new model for evolving networks

    Indian Academy of Sciences (India)

    on intuitive but realistic consideration that nodes are added to the network with both preferential and random attachments. The degree distribution of the model is between a power-law and an exponential decay. Motivated by the features of network evolution, we introduce a new model of evolving networks, incorporating the ...

  14. Modeling Aggregation Processes of Lennard-Jones particles Via Stochastic Networks

    Science.gov (United States)

    Forman, Yakir; Cameron, Maria

    2017-07-01

    We model an isothermal aggregation process of particles/atoms interacting according to the Lennard-Jones pair potential by mapping the energy landscapes of each cluster size N onto stochastic networks, computing transition probabilities from the network for an N-particle cluster to the one for N+1, and connecting these networks into a single joint network. The attachment rate is a control parameter. The resulting network representing the aggregation of up to 14 particles contains 6427 vertices. It is not only time-irreversible but also reducible. To analyze its transient dynamics, we introduce the sequence of the expected initial and pre-attachment distributions and compute them for a wide range of attachment rates and three values of temperature. As a result, we find the configurations most likely to be observed in the process of aggregation for each cluster size. We examine the attachment process and conduct a structural analysis of the sets of local energy minima for every cluster size. We show that both processes taking place in the network, attachment and relaxation, lead to the dominance of icosahedral packing in small (up to 14 atom) clusters.

  15. Scale-free behavior of networks with the copresence of preferential and uniform attachment rules

    Science.gov (United States)

    Pachon, Angelica; Sacerdote, Laura; Yang, Shuyi

    2018-05-01

    Complex networks in different areas exhibit degree distributions with a heavy upper tail. A preferential attachment mechanism in a growth process produces a graph with this feature. We herein investigate a variant of the simple preferential attachment model, whose modifications are interesting for two main reasons: to analyze more realistic models and to study the robustness of the scale-free behavior of the degree distribution. We introduce and study a model which takes into account two different attachment rules: a preferential attachment mechanism (with probability 1 - p) that stresses the rich get richer system, and a uniform choice (with probability p) for the most recent nodes, i.e. the nodes belonging to a window of size w to the left of the last born node. The latter highlights a trend to select one of the last added nodes when no information is available. The recent nodes can be either a given fixed number or a proportion (αn) of the total number of existing nodes. In the first case, we prove that this model exhibits an asymptotically power-law degree distribution. The same result is then illustrated through simulations in the second case. When the window of recent nodes has a constant size, we herein prove that the presence of the uniform rule delays the starting time from which the asymptotic regime starts to hold. The mean number of nodes of degree k and the asymptotic degree distribution are also determined analytically. Finally, a sensitivity analysis on the parameters of the model is performed.

  16. Modeling online social networks based on preferential linking

    International Nuclear Information System (INIS)

    Hu Hai-Bo; Chen Jun; Guo Jin-Li

    2012-01-01

    We study the phenomena of preferential linking in a large-scale evolving online social network and find that the linear preference holds for preferential creation, preferential acceptance, and preferential attachment. Based on the linear preference, we propose an analyzable model, which illustrates the mechanism of network growth and reproduces the process of network evolution. Our simulations demonstrate that the degree distribution of the network produced by the model is in good agreement with that of the real network. This work provides a possible bridge between the micro-mechanisms of network growth and the macrostructures of online social networks

  17. 'Adoption and attachment theory' the attachment models of adoptive mothers and the revision of attachment patterns of their late-adopted children.

    Science.gov (United States)

    Pace, C S; Zavattini, G C

    2011-01-01

    This study examined the attachment patterns of late-adopted children (aged 4-7) and their adoptive mothers during the first 7- to 8-month period after adoption and aimed to evaluate the effect of adoptive mothers' attachment security on the revision of the attachment patterns of their late-adopted children. We assessed attachment patterns in 20 adoptive dyads and 12 genetically related dyads at two different times: T1 (time 1) within 2 months of adoption and T2 (time 2) 6 months after T1. The children's behavioural attachment patterns were assessed using the Separation-Reunion Procedure and the children's representational (verbal) attachment patterns using the Manchester Child Attachment Story Task. The attachment models of the adoptive mothers were classified using the Adult Attachment Interview. We found that there was a significant enhancement of the late-adopted children's attachment security across the time period considered (P= 0.008). Moreover, all the late-adopted children who showed a change from insecurity to security had adoptive mothers with secure attachment models (P= 0.044). However, the matching between maternal attachment models and late-adopted children's attachment patterns (behaviours and representations) was not significant. Our data suggest that revision of the attachment patterns in the late-adopted children is possible but gradual, and that the adoptive mothers' attachment security makes it more likely to occur. © 2010 Blackwell Publishing Ltd.

  18. Constraints and entropy in a model of network evolution

    Science.gov (United States)

    Tee, Philip; Wakeman, Ian; Parisis, George; Dawes, Jonathan; Kiss, István Z.

    2017-11-01

    Barabási-Albert's "Scale Free" model is the starting point for much of the accepted theory of the evolution of real world communication networks. Careful comparison of the theory with a wide range of real world networks, however, indicates that the model is in some cases, only a rough approximation to the dynamical evolution of real networks. In particular, the exponent γ of the power law distribution of degree is predicted by the model to be exactly 3, whereas in a number of real world networks it has values between 1.2 and 2.9. In addition, the degree distributions of real networks exhibit cut offs at high node degree, which indicates the existence of maximal node degrees for these networks. In this paper we propose a simple extension to the "Scale Free" model, which offers better agreement with the experimental data. This improvement is satisfying, but the model still does not explain why the attachment probabilities should favor high degree nodes, or indeed how constraints arrive in non-physical networks. Using recent advances in the analysis of the entropy of graphs at the node level we propose a first principles derivation for the "Scale Free" and "constraints" model from thermodynamic principles, and demonstrate that both preferential attachment and constraints could arise as a natural consequence of the second law of thermodynamics.

  19. Internal Representational Models of Attachment Relationships.

    Science.gov (United States)

    Crittenden, Patricia M.

    This paper outlines several properties of internal representational models (IRMs) and offers terminology that may help to differentiate the models. Properties of IRMs include focus, memory systems, content, cognitive function, "metastructure," quality of attachment, behavioral strategies, and attitude toward attachment. An IRM focuses on…

  20. Romantic Partner Monitoring After Breakups: Attachment, Dependence, Distress, and Post-Dissolution Online Surveillance via Social Networking Sites.

    Science.gov (United States)

    Fox, Jesse; Tokunaga, Robert S

    2015-09-01

    Romantic relationship dissolution can be stressful, and social networking sites make it difficult to separate from a romantic partner online as well as offline. An online survey (N = 431) tested a model synthesizing attachment, investment model variables, and post-dissolution emotional distress as predictors of interpersonal surveillance (i.e., "Facebook stalking") of one's ex-partner on Facebook after a breakup. Results indicated that anxious attachment predicted relational investment but also seeking relationship alternatives; avoidant attachment was negatively related to investment but positively related to seeking alternatives. Investment predicted commitment, whereas seeking alternatives was negatively related to commitment. Commitment predicted emotional distress after the breakup. Distress predicted partner monitoring immediately following the breakup, particularly for those who did not initiate the breakup, as well as current partner monitoring. Given their affordances, social media are discussed as potentially unhealthy enablers for online surveillance after relationship termination.

  1. Identifying protein complex by integrating characteristic of core-attachment into dynamic PPI network.

    Directory of Open Access Journals (Sweden)

    Xianjun Shen

    Full Text Available How to identify protein complex is an important and challenging task in proteomics. It would make great contribution to our knowledge of molecular mechanism in cell life activities. However, the inherent organization and dynamic characteristic of cell system have rarely been incorporated into the existing algorithms for detecting protein complexes because of the limitation of protein-protein interaction (PPI data produced by high throughput techniques. The availability of time course gene expression profile enables us to uncover the dynamics of molecular networks and improve the detection of protein complexes. In order to achieve this goal, this paper proposes a novel algorithm DCA (Dynamic Core-Attachment. It detects protein-complex core comprising of continually expressed and highly connected proteins in dynamic PPI network, and then the protein complex is formed by including the attachments with high adhesion into the core. The integration of core-attachment feature into the dynamic PPI network is responsible for the superiority of our algorithm. DCA has been applied on two different yeast dynamic PPI networks and the experimental results show that it performs significantly better than the state-of-the-art techniques in terms of prediction accuracy, hF-measure and statistical significance in biology. In addition, the identified complexes with strong biological significance provide potential candidate complexes for biologists to validate.

  2. Dismissing Attachment Characteristics Dynamically Modulate Brain Networks Subserving Social Aversion

    NARCIS (Netherlands)

    Krause, Anna Linda; Borchardt, Viola; Li, Meng; van Tol, Marie-Jose; Demenescu, Liliana Ramona; Strauss, Bernhard; Kirchmanny, Helmut; Buchheim, Anna; Metzger, Coraline D.; Nolte, Tobias; Walter, Martin

    2016-01-01

    Attachment patterns influence actions, thoughts and feeling through a person's "inner working model". Speech charged with attachment-dependent content was proposed to modulate the activation of cognitive-emotional schemata in listeners. We performed a 7 Tesla rest-task-rest functional magnetic

  3. Attachment of Salmonella strains to a plant cell wall model is modulated by surface characteristics and not by specific carbohydrate interactions.

    Science.gov (United States)

    Tan, Michelle Sze-Fan; Moore, Sean C; Tabor, Rico F; Fegan, Narelle; Rahman, Sadequr; Dykes, Gary A

    2016-09-15

    Processing of fresh produce exposes cut surfaces of plant cell walls that then become vulnerable to human foodborne pathogen attachment and contamination, particularly by Salmonella enterica. Plant cell walls are mainly composed of the polysaccharides cellulose, pectin and hemicelluloses (predominantly xyloglucan). Our previous work used bacterial cellulose-based plant cell wall models to study the interaction between Salmonella and the various plant cell wall components. We demonstrated that Salmonella attachment was favoured in the presence of pectin while xyloglucan had no effect on its attachment. Xyloglucan significantly increased the attachment of Salmonella cells to the plant cell wall model only when it was in association with pectin. In this study, we investigate whether the plant cell wall polysaccharides mediate Salmonella attachment to the bacterial cellulose-based plant cell wall models through specific carbohydrate interactions or through the effects of carbohydrates on the physical characteristics of the attachment surface. We found that none of the monosaccharides that make up the plant cell wall polysaccharides specifically inhibit Salmonella attachment to the bacterial cellulose-based plant cell wall models. Confocal laser scanning microscopy showed that Salmonella cells can penetrate and attach within the tightly arranged bacterial cellulose network. Analysis of images obtained from atomic force microscopy revealed that the bacterial cellulose-pectin-xyloglucan composite with 0.3 % (w/v) xyloglucan, previously shown to have the highest number of Salmonella cells attached to it, had significantly thicker cellulose fibrils compared to other composites. Scanning electron microscopy images also showed that the bacterial cellulose and bacterial cellulose-xyloglucan composites were more porous when compared to the other composites containing pectin. Our study found that the attachment of Salmonella cells to cut plant cell walls was not mediated by

  4. A Complex Network Approach to Distributional Semantic Models.

    Directory of Open Access Journals (Sweden)

    Akira Utsumi

    Full Text Available A number of studies on network analysis have focused on language networks based on free word association, which reflects human lexical knowledge, and have demonstrated the small-world and scale-free properties in the word association network. Nevertheless, there have been very few attempts at applying network analysis to distributional semantic models, despite the fact that these models have been studied extensively as computational or cognitive models of human lexical knowledge. In this paper, we analyze three network properties, namely, small-world, scale-free, and hierarchical properties, of semantic networks created by distributional semantic models. We demonstrate that the created networks generally exhibit the same properties as word association networks. In particular, we show that the distribution of the number of connections in these networks follows the truncated power law, which is also observed in an association network. This indicates that distributional semantic models can provide a plausible model of lexical knowledge. Additionally, the observed differences in the network properties of various implementations of distributional semantic models are consistently explained or predicted by considering the intrinsic semantic features of a word-context matrix and the functions of matrix weighting and smoothing. Furthermore, to simulate a semantic network with the observed network properties, we propose a new growing network model based on the model of Steyvers and Tenenbaum. The idea underlying the proposed model is that both preferential and random attachments are required to reflect different types of semantic relations in network growth process. We demonstrate that this model provides a better explanation of network behaviors generated by distributional semantic models.

  5. A Cognitive Attachment Model of prolonged grief: integrating attachments, memory, and identity.

    Science.gov (United States)

    Maccallum, Fiona; Bryant, Richard A

    2013-08-01

    Prolonged grief (PG), otherwise known as complicated grief, has attracted much attention in recent years as a potentially debilitating condition that affects approximately 10% of bereaved people. We propose a model of PG that integrates processes of attachment, self-identity, and autobiographical memory. The paper commences with a discussion of the PG construct and reviews current evidence regarding the distinctiveness of PG from other bereavement related-outcomes. We then review the evidence regarding the dysfunctional attachments, appraisals, and coping styles that people with PG display. Recent evidence pertaining to the patterns of autobiographical memory in PG is described in the context of the self-memory system. This system provides a unifying framework to understand the roles of personal memories, identity, attachments, and coping responses in PG. The proposed model places emphasis on how one's sense of identity influences yearning, memories of the deceased, appraisals, and coping strategies, to maintain a focus on the loss. The model is discussed in relation to existing models of PG. The potential for shaping treatment strategies to shift perceptions of the self is then outlined. Finally, we outline future directions to test propositions stemming from the model and enhance our understanding of the mechanisms underlying PG. Copyright © 2013 Elsevier Ltd. All rights reserved.

  6. Putting up emotional (Facebook) walls? Attachment status and emerging adults' experiences of social networking sites.

    Science.gov (United States)

    Nitzburg, George C; Farber, Barry A

    2013-11-01

    Social networking sites (SNS) like Facebook can increase interpersonal connections but also intensify jealousy, envy, and surveillance behaviors. Attachment styles may help explain differences in experiencing SNS. This study investigated the role of attachment in influencing emerging adults' perceptions and feelings about SNS and their disclosures on SNS. Disorganized and anxious attachment predicted subjects' use of SNS to avoid more personal face-to-face communication, suggesting individuals with these tendencies use SNS to hold relationships at a psychological arm's distance. Anxious attachment also predicted feelings of intimacy when using SNS, perhaps reflecting online needs for comfort from others. A case narrative is presented to show how those with insecure attachment patterns may struggle to avoid interpersonal conflict when being continuously presented with ambiguous social information. © 2013 Wiley Periodicals, Inc.

  7. Model of community emergence in weighted social networks

    Science.gov (United States)

    Kumpula, J. M.; Onnela, J.-P.; Saramäki, J.; Kertész, J.; Kaski, K.

    2009-04-01

    Over the years network theory has proven to be rapidly expanding methodology to investigate various complex systems and it has turned out to give quite unparalleled insight to their structure, function, and response through data analysis, modeling, and simulation. For social systems in particular the network approach has empirically revealed a modular structure due to interplay between the network topology and link weights between network nodes or individuals. This inspired us to develop a simple network model that could catch some salient features of mesoscopic community and macroscopic topology formation during network evolution. Our model is based on two fundamental mechanisms of network sociology for individuals to find new friends, namely cyclic closure and focal closure, which are mimicked by local search-link-reinforcement and random global attachment mechanisms, respectively. In addition we included to the model a node deletion mechanism by removing all its links simultaneously, which corresponds for an individual to depart from the network. Here we describe in detail the implementation of our model algorithm, which was found to be computationally efficient and produce many empirically observed features of large-scale social networks. Thus this model opens a new perspective for studying such collective social phenomena as spreading, structure formation, and evolutionary processes.

  8. An evolving model of online bipartite networks

    Science.gov (United States)

    Zhang, Chu-Xu; Zhang, Zi-Ke; Liu, Chuang

    2013-12-01

    Understanding the structure and evolution of online bipartite networks is a significant task since they play a crucial role in various e-commerce services nowadays. Recently, various attempts have been tried to propose different models, resulting in either power-law or exponential degree distributions. However, many empirical results show that the user degree distribution actually follows a shifted power-law distribution, the so-called Mandelbrot’s law, which cannot be fully described by previous models. In this paper, we propose an evolving model, considering two different user behaviors: random and preferential attachment. Extensive empirical results on two real bipartite networks, Delicious and CiteULike, show that the theoretical model can well characterize the structure of real networks for both user and object degree distributions. In addition, we introduce a structural parameter p, to demonstrate that the hybrid user behavior leads to the shifted power-law degree distribution, and the region of power-law tail will increase with the increment of p. The proposed model might shed some lights in understanding the underlying laws governing the structure of real online bipartite networks.

  9. An evolving network model with modular growth

    International Nuclear Information System (INIS)

    Zou Zhi-Yun; Liu Peng; Lei Li; Gao Jian-Zhi

    2012-01-01

    In this paper, we propose an evolving network model growing fast in units of module, according to the analysis of the evolution characteristics in real complex networks. Each module is a small-world network containing several interconnected nodes and the nodes between the modules are linked by preferential attachment on degree of nodes. We study the modularity measure of the proposed model, which can be adjusted by changing the ratio of the number of inner-module edges and the number of inter-module edges. In view of the mean-field theory, we develop an analytical function of the degree distribution, which is verified by a numerical example and indicates that the degree distribution shows characteristics of the small-world network and the scale-free network distinctly at different segments. The clustering coefficient and the average path length of the network are simulated numerically, indicating that the network shows the small-world property and is affected little by the randomness of the new module. (interdisciplinary physics and related areas of science and technology)

  10. Filament networks attached to membranes: cytoskeletal pressure and local bilayer deformation

    International Nuclear Information System (INIS)

    Auth, Thorsten; Safran, S A; Gov, Nir S

    2007-01-01

    Several cell types, among them red blood cells, have a cortical, two-dimensional (2D) network of filaments sparsely attached to their lipid bilayer. In many mammalian cells, this 2D polymer network is connected to an underlying 3D, more rigid cytoskeleton. In this paper, we consider the pressure exerted by the thermally fluctuating, cortical network of filaments on the bilayer and predict the bilayer deformations that are induced by this pressure. We treat the filaments as flexible polymers and calculate the pressure that a network of such linear chains exerts on the bilayer; we then minimize the bilayer shape in order to predict the resulting local deformations. We compare our predictions with membrane deformations observed in electron micrographs of red blood cells. The polymer pressure along with the resulting membrane deformation can lead to compartmentalization, regulate in-plane diffusion and may influence protein sorting as well as transmit signals to the polymerization of the underlying 3D cytoskeleton

  11. Experience and Lessons learnt from running High Availability Databases on Network Attached Storage

    CERN Document Server

    Guijarro, Manuel

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department supplies the Oracle Central Database services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been setup. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS (Network File System) as shared disk space for RAC purposes and Data hosting. It is composed of two private LANs (Local Area Network), one to provide access to the NAS filers and a second to implement the Oracle RAC private interconnect, both using Network Bonding. NAS filers are configured in partnership to prevent having single points of failure and to provide automatic NAS filer fail-over.

  12. Experience and lessons learnt from running high availability databases on network attached storage

    International Nuclear Information System (INIS)

    Guijarro, M; Gaspar, R

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department supplies the Oracle Central Database services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been setup. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS (Network File System) as shared disk space for RAC purposes and Data hosting. It is composed of two private LANs (Local Area Network), one to provide access to the NAS filers and a second to implement the Oracle RAC private interconnect, both using Network Bonding. NAS filers are configured in partnership to prevent having single points of failure and to provide automatic NAS filer fail-over

  13. A network growth model based on the evolutionary ultimatum game

    International Nuclear Information System (INIS)

    Deng, L L; Zhou, G G; Cai, J H; Wang, C; Tang, W S

    2012-01-01

    In this paper, we provide a network growth model with incorporation into the ultimatum game dynamics. The network grows on the basis of the payoff-oriented preferential attachment mechanism, where a new node is added into the network and attached preferentially to nodes with higher payoffs. The interplay between the network growth and the game dynamics gives rise to quite interesting dynamical behaviors. Simulation results show the emergence of altruistic behaviors in the ultimatum game, which is affected by the growing network structure. Compared with the static counterpart case, the levels of altruistic behaviors are promoted. The corresponding strategy distributions and wealth distributions are also presented to further demonstrate the strategy evolutionary dynamics. Subsequently, we turn to the topological properties of the evolved network, by virtue of some statistics. The most studied characteristic path length and the clustering coefficient of the network are shown to indicate their small-world effect. Then the degree distributions are analyzed to clarify the interplay of structure and evolutionary dynamics. In particular, the difference between our growth network and the static counterpart is revealed. To explain clearly the evolved networks, the rich-club ordering and the assortative mixing coefficient are exploited to reveal the degree correlation. (paper)

  14. Social networking sites in romantic relationships: attachment, uncertainty, and partner surveillance on facebook.

    Science.gov (United States)

    Fox, Jesse; Warber, Katie M

    2014-01-01

    Social networking sites serve as both a source of information and a source of tension between romantic partners. Previous studies have investigated the use of Facebook for monitoring former and current romantic partners, but why certain individuals engage in this behavior has not been fully explained. College students (N=328) participated in an online survey that examined two potential explanatory variables for interpersonal electronic surveillance (IES) of romantic partners: attachment style and relational uncertainty. Attachment style predicted both uncertainty and IES, with preoccupieds and fearfuls reporting the highest levels. Uncertainty did not predict IES, however. Future directions for research on romantic relationships and online surveillance are explored.

  15. Attachment, Autonomy, and Emotional Reliance: A Multilevel Model

    Science.gov (United States)

    Lynch, Martin F.

    2013-01-01

    This article reports a test of a multilevel model investigating how attachment security and autonomy contribute to emotional reliance, or the willingness to seek interpersonal support. Participants ("N" = 247) completed online measures of attachment, autonomy, emotional reliance, and vitality with respect to several everyday…

  16. Social networking addiction, attachment style, and validation of the Italian version of the Bergen Social Media Addiction Scale.

    Science.gov (United States)

    Monacis, Lucia; de Palo, Valeria; Griffiths, Mark D; Sinatra, Maria

    2017-06-01

    Aim Research into social networking addiction has greatly increased over the last decade. However, the number of validated instruments assessing addiction to social networking sites (SNSs) remains few, and none have been validated in the Italian language. Consequently, this study tested the psychometric properties of the Italian version of the Bergen Social Media Addiction Scale (BSMAS), as well as providing empirical data concerning the relationship between attachment styles and SNS addiction. Methods A total of 769 participants were recruited to this study. Confirmatory factor analysis (CFA) and multigroup analyses were applied to assess construct validity of the Italian version of the BSMAS. Reliability analyses comprised the average variance extracted, the standard error of measurement, and the factor determinacy coefficient. Results Indices obtained from the CFA showed the Italian version of the BSMAS to have an excellent fit of the model to the data, thus confirming the single-factor structure of the instrument. Measurement invariance was established at configural, metric, and strict invariances across age groups, and at configural and metric levels across gender groups. Internal consistency was supported by several indicators. In addition, the theoretical associations between SNS addiction and attachment styles were generally supported. Conclusion This study provides evidence that the Italian version of the BSMAS is a psychometrically robust tool that can be used in future Italian research into social networking addiction.

  17. An Agent Model for a Human’s Social Support Network Tie Preference During Depression

    NARCIS (Netherlands)

    Aziz, A.A.; Klein, M.C.A.; Treur, J.; Baeza-Yates, R.; Lang, J.; Mitra, S.; Parsons, S.; Pasi, G.

    2009-01-01

    Seeking support from their environment is important for people suffering from a depression. People usually have different social networks to which they are attached with different ties. In this paper, a computational model is presented that describes the selection of network members for seeking

  18. Stochastic dynamical model of a growing citation network based on a self-exciting point process.

    Science.gov (United States)

    Golosovsky, Michael; Solomon, Sorin

    2012-08-31

    We put under experimental scrutiny the preferential attachment model that is commonly accepted as a generating mechanism of the scale-free complex networks. To this end we chose a citation network of physics papers and traced the citation history of 40,195 papers published in one year. Contrary to common belief, we find that the citation dynamics of the individual papers follows the superlinear preferential attachment, with the exponent α=1.25-1.3. Moreover, we show that the citation process cannot be described as a memoryless Markov chain since there is a substantial correlation between the present and recent citation rates of a paper. Based on our findings we construct a stochastic growth model of the citation network, perform numerical simulations based on this model and achieve an excellent agreement with the measured citation distributions.

  19. Adolescent attachment, family functioning and depressive symptoms ...

    African Journals Online (AJOL)

    The Self-Report of Family Inventory (SFI), Experiences of Close Relationships Scale (ECR), Network of Relationships Inventory (NRI), Children's Depression Inventory (CDI) and Child Behavior Checklist (CBCL) were used to assess depression, parental support and attachment. Results. Two models were examined: one ...

  20. A class of vertex-edge-growth small-world network models having scale-free, self-similar and hierarchical characters

    Science.gov (United States)

    Ma, Fei; Su, Jing; Hao, Yongxing; Yao, Bing; Yan, Guanghui

    2018-02-01

    The problem of uncovering the internal operating function of network models is intriguing, demanded and attractive in researches of complex networks. Notice that, in the past two decades, a great number of artificial models are built to try to answer the above mentioned task. Based on the different growth ways, these previous models can be divided into two categories, one type, possessing the preferential attachment, follows a power-law P(k) ∼k-γ, 2 motivated from a new attachment way, vertex-edge-growth network-operation, more precisely, the couple of both them. We report that this model is sparse, small world and hierarchical. And then, not only is scale-free feature in our model, but also lies the degree parameter γ(≈ 3 . 242) out the typical range. Note that, we suggest that the coexistence of multiple vertex growth ways will have a prominent effect on the power-law parameter γ, and the preferential attachment plays a dominate role on the development of networks over time. At the end of this paper, we obtain an exact analytical expression for the total number of spanning trees of models and also capture spanning trees entropy which we have compared with those of their corresponding component elements.

  1. Androgyny and Attachment Security: Two Related Models of Optimal Personality.

    Science.gov (United States)

    Shaver, Phillip R.; And Others

    1996-01-01

    Three studies explore similarities between attachment style typologies and sex role typologies. Both are defined by pairs of dimensions: self model and other model (attachment styles); masculinity, or agency, and femininity, or communion (sex role orientations). Discusses results. (KW)

  2. Hamiltonian dynamics of preferential attachment

    International Nuclear Information System (INIS)

    Zuev, Konstantin; Papadopoulos, Fragkiskos; Krioukov, Dmitri

    2016-01-01

    Prediction and control of network dynamics are grand-challenge problems in network science. The lack of understanding of fundamental laws driving the dynamics of networks is among the reasons why many practical problems of great significance remain unsolved for decades. Here we study the dynamics of networks evolving according to preferential attachment (PA), known to approximate well the large-scale growth dynamics of a variety of real networks. We show that this dynamics is Hamiltonian, thus casting the study of complex networks dynamics to the powerful canonical formalism, in which the time evolution of a dynamical system is described by Hamilton’s equations. We derive the explicit form of the Hamiltonian that governs network growth in PA. This Hamiltonian turns out to be nearly identical to graph energy in the configuration model, which shows that the ensemble of random graphs generated by PA is nearly identical to the ensemble of random graphs with scale-free degree distributions. In other words, PA generates nothing but random graphs with power-law degree distribution. The extension of the developed canonical formalism for network analysis to richer geometric network models with non-degenerate groups of symmetries may eventually lead to a system of equations describing network dynamics at small scales. (paper)

  3. Representing Degree Distributions, Clustering, and Homophily in Social Networks With Latent Cluster Random Effects Models.

    Science.gov (United States)

    Krivitsky, Pavel N; Handcock, Mark S; Raftery, Adrian E; Hoff, Peter D

    2009-07-01

    Social network data often involve transitivity, homophily on observed attributes, clustering, and heterogeneity of actor degrees. We propose a latent cluster random effects model to represent all of these features, and we describe a Bayesian estimation method for it. The model is applicable to both binary and non-binary network data. We illustrate the model using two real datasets. We also apply it to two simulated network datasets with the same, highly skewed, degree distribution, but very different network behavior: one unstructured and the other with transitivity and clustering. Models based on degree distributions, such as scale-free, preferential attachment and power-law models, cannot distinguish between these very different situations, but our model does.

  4. Finger muscle attachments for an OpenSim upper-extremity model.

    Directory of Open Access Journals (Sweden)

    Jong Hwa Lee

    Full Text Available We determined muscle attachment points for the index, middle, ring and little fingers in an OpenSim upper-extremity model. Attachment points were selected to match both experimentally measured locations and mechanical function (moment arms. Although experimental measurements of finger muscle attachments have been made, models differ from specimens in many respects such as bone segment ratio, joint kinematics and coordinate system. Likewise, moment arms are not available for all intrinsic finger muscles. Therefore, it was necessary to scale and translate muscle attachments from one experimental or model environment to another while preserving mechanical function. We used a two-step process. First, we estimated muscle function by calculating moment arms for all intrinsic and extrinsic muscles using the partial velocity method. Second, optimization using Simulated Annealing and Hooke-Jeeves algorithms found muscle-tendon paths that minimized root mean square (RMS differences between experimental and modeled moment arms. The partial velocity method resulted in variance accounted for (VAF between measured and calculated moment arms of 75.5% on average (range from 48.5% to 99.5% for intrinsic and extrinsic index finger muscles where measured data were available. RMS error between experimental and optimized values was within one standard deviation (S.D of measured moment arm (mean RMS error = 1.5 mm < measured S.D = 2.5 mm. Validation of both steps of the technique allowed for estimation of muscle attachment points for muscles whose moment arms have not been measured. Differences between modeled and experimentally measured muscle attachments, averaged over all finger joints, were less than 4.9 mm (within 7.1% of the average length of the muscle-tendon paths. The resulting non-proprietary musculoskeletal model of the human fingers could be useful for many applications, including better understanding of complex multi-touch and gestural movements.

  5. A Topology Evolution Model Based on Revised PageRank Algorithm and Node Importance for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaogang Qi

    2015-01-01

    Full Text Available Wireless sensor network (WSN is a classical self-organizing communication network, and its topology evolution currently becomes one of the attractive issues in this research field. Accordingly, the problem is divided into two subproblems: one is to design a new preferential attachment method and the other is to analyze the dynamics of the network topology evolution. To solve the first subproblem, a revised PageRank algorithm, called Con-rank, is proposed to evaluate the node importance upon the existing node contraction, and then a novel preferential attachment is designed based on the node importance calculated by the proposed Con-rank algorithm. To solve the second one, we firstly analyze the network topology evolution dynamics in a theoretical way and then simulate the evolution process. Theoretical analysis proves that the network topology evolution of our model agrees with power-law distribution, and simulation results are well consistent with our conclusions obtained from the theoretical analysis and simultaneously show that our topology evolution model is superior to the classic BA model in the average path length and the clustering coefficient, and the network topology is more robust and can tolerate the random attacks.

  6. Statistics of leaders and lead changes in growing networks

    International Nuclear Information System (INIS)

    Godrèche, C; Grandclaude, H; Luck, J M

    2010-01-01

    We investigate various aspects of the statistics of leaders in growing network models defined by stochastic attachment rules. The leader is the node with highest degree at a given time (or the node which reached that degree first if there are co-leaders). This comprehensive study includes the full distribution of the degree of the leader, its identity, the number of co-leaders, as well as several observables characterizing the whole history of lead changes: number of lead changes, number of distinct leaders, lead persistence probability. We successively consider the following network models: uniform attachment, linear attachment (the Barabási–Albert model), and generalized preferential attachment with initial attractiveness

  7. Attachment, Working Models of Parenting, and Expectations for Using Television in Childrearing

    Science.gov (United States)

    Nathanson, Amy I.; Manohar, Uttara

    2012-01-01

    This study used attachment theory to understand college students' working models of parenting and expectations for how they would use television in parenting. We found that secure parent-child attachment histories were related to more positive expectations of parenting and that avoidant and anxious-ambivalent parent-child attachment histories were…

  8. Stochastic Boolean networks: An efficient approach to modeling gene regulatory networks

    Directory of Open Access Journals (Sweden)

    Liang Jinghang

    2012-08-01

    network inferred from a T cell immune response dataset. An SBN can also implement the function of an asynchronous PBN and is potentially useful in a hybrid approach in combination with a continuous or single-molecule level stochastic model. Conclusions Stochastic Boolean networks (SBNs are proposed as an efficient approach to modelling gene regulatory networks (GRNs. The SBN approach is able to recover biologically-proven regulatory behaviours, such as the oscillatory dynamics of the p53-Mdm2 network and the dynamic attractors in a T cell immune response network. The proposed approach can further predict the network dynamics when the genes are under perturbation, thus providing biologically meaningful insights for a better understanding of the dynamics of GRNs. The algorithms and methods described in this paper have been implemented in Matlab packages, which are attached as Additional files.

  9. [Attachment theory and baby slings/carriers: technological network formation].

    Science.gov (United States)

    Lu, Zxy-Yann Jane; Lin, Wan-Shiuan

    2011-12-01

    Healthcare providers recognize the important role played by attachment theory in explaining the close relationship between mental health and social behavior in mothers and their children. This paper uses attachment theory in a socio-cultural context to ascertain the mechanism by which baby slings/carriers, a new technology, produced and reproduced the scientific motherhood. It further applies a social history of technology perspective to understand how baby carriers and attachment theory are socially constructed and historically contingent on three major transformations. These transformations include the use of attachment theory-based baby carriers to further scientific motherhood; the use of baby slings/carriers to further the medicalization of breastfeeding and enhance mother-infant attachment; and the use of baby slings/carriers to transform woman's identities by integrating scientific motherhood, independence and fashion. Implications for nursing clinical policy are suggested.

  10. Social networking addiction, attachment style, and validation of the Italian version of the Bergen Social Media Addiction Scale

    OpenAIRE

    Monacis, Lucia; de Palo, Valeria; Griffiths, Mark D.; Sinatra, Maria

    2017-01-01

    Aim: Research into social networking addiction has greatly increased over the last decade. However, the number of\\ud validated instruments assessing addiction to social networking sites (SNSs) remains few, and none have been\\ud validated in the Italian language. Consequently, this study tested the psychometric properties of the Italian version of\\ud the Bergen Social Media Addiction Scale (BSMAS), as well as providing empirical data concerning the relationship\\ud between attachment styles and...

  11. Integrating attachment and depression in the confluence model of sexual assault perpetration.

    Science.gov (United States)

    Nguyen, David; Parkhill, Michele R

    2014-08-01

    This study sought to extend the confluence model of sexual assault perpetration by examining attachment insecurity and depression as additional predictors of sexual aggression. Male college students (N = 193) completed an online questionnaire assessing confluence model constructs in addition to attachment and history of depression. Overall, the model fit the data well, χ(2)(11, 193) = 19.43, p = ns; root mean square error of approximation = .063; comparative fit index = .94. Attachment and depression demonstrated both direct and indirect relationships with perpetration severity. The results contribute to elucidating the process by which certain men become susceptible to perpetrating sexual assault. Implications are discussed. © The Author(s) 2014.

  12. Negative childhood experiences and adult love relationships: the role of internal working models of attachment.

    Science.gov (United States)

    McCarthy, Gerard; Maughan, Barbara

    2010-09-01

    This study investigated links between internal working models of attachment and the quality of adult love relationships in a high risk sample of women (n = 34), all of whom reported negative parenting in childhood. Half of the sample was identified as having a history of satisfying adult love relationships, while the remainder had experienced ongoing adult relationship problems. Measures of internal working models of attachment were made using the Adult Attachment Interview (AAI). A strong association was found between attachment classifications and the quality of adult love relationships. In addition, women with satisfying love relationships demonstrated significantly higher coherence of mind ratings than those with poor relationship histories. Insecure working models of attachment were associated with problems in adult love relationships. Although secure/autonomous attachment status was linked to optimal adult relationship outcomes, some women with a history of satisfying love relationships had insecure working models of attachment. These results suggest that the ways that adults process early experiences may influence later psychosocial functioning.

  13. Adolescent attachment, family functioning and depressive symptoms

    Directory of Open Access Journals (Sweden)

    Nishola Rawatlal

    2015-08-01

    Full Text Available Background. Adolescence represents a challenging transitional period where changes in biological, emotional, cognitive and social domains can increase the risk of developing internalised problems including subthreshold depression. Adolescent-parent attachment style, perceived support and family functioning may increase risk for depressive symptoms or may reduce such risk. Adolescent-parent attachment, adolescent-perceived support from parents and family functioning were examined as correlates of depressive symptom presentation within this age group. Methods. Participants included a maternal parent and an adolescent (65.5% female from each family. Adolescents were in Grade 7 (n=175 or Grade 10 (n=31. Data were collected through home interviews. The Self-Report of Family Inventory (SFI, Experiences of Close Relationships Scale (ECR, Network of Relationships Inventory (NRI, Children’s Depression Inventory (CDI and Child Behavior Checklist (CBCL were used to assess depression, parental support and attachment.  Results. Two models were examined: one with adolescent report of depressive symptoms as the outcome and a second with parent report of adolescent internalising symptoms as the outcome. The model predicting adolescent-reported depressive symptoms was significant with older age, higher levels of avoidant attachment, and higher levels of youth-reported dysfunctional family interaction associated with more depressive symptomatology. In the model predicting parent report of adolescent internalising symptoms only higher levels of dysfunctional family interaction, as reported by the parent, were associated with higher levels of internalising symptoms. Conclusion. Positive family communication, cohesion and support predictive of a secure parent-adolescent attachment relationship reduced the risk of a depressive symptom outcome. Secure adolescents were able to regulate their emotions, knowing that they could seek out secure base attachment relations

  14. A Network-Attached Storage System Supporting Guaranteed QoS

    Institute of Scientific and Technical Information of China (English)

    KONG Hua-feng; YU Sheng-sheng; LU Hong-wei

    2005-01-01

    We propose a network-attached storage system that can support guaranteed Quality of Service (QoS), called POPNet Storage. The special policy of date access and disk scheduling is enable users to access files quickly and directly with guaranteed QoS in the POPNet Storage. The POPNet Storage implements a measurement-based admission control algorithm (PSMBAC) to determine whether to admit a new data access request stream and admit as many requests as possible while meeting the QoS guarantees to its clients. The data reconstruction algorithms in the POPNet Storage also put more emphasis on data availability and guaranteed QoS, thus it is designed to complete the data recovery as soon as possible and at the same time provide the guaranteed QoS for high-priority data access. The experiment results show that the POPNet Storage can provide more significant performance, reliability, and guaranteed QoS than conventional storage systems.

  15. Following the moving and changing attachments and assemblages of 'addiction': Applying the actor network approach to autobiographies.

    Science.gov (United States)

    Törrönen, Jukka; Tigerstedt, Christoffer

    2018-04-01

    The article applies actor network theory (ANT) to autobiographical data on alcohol dependence to explore what ANT can offer to the analysis of 'addiction stories'. By defining 'addiction' as a relational achievement, as the effect of elements acting together as a configuration of human and non-human actors, the article demonstrates how the moving and changing attachments of addiction can be dynamically analyzed with concepts of 'assemblage', 'mediator', 'tendency', 'translation', 'trajectory', 'immutable mobile', 'fluid' and 'bush fire'. The article shows how the reduction of alcohol dependence simply to genetic factors, neurobiological causes, personality disorders and self-medication constitutes an inadequate explanation. As 'meta theories', they illuminate addiction one-sidedly. Instead, as ANT pays attention to multiple heterogeneous mediators, it specifies in what way the causes identified in 'meta theories' may together with other actors participate in addiction assemblages. When following the development of addiction assemblages, we focus on situational sequences of action, in which human and non-human elements are linked to each other, and we trace how the relational shape of addiction changes from one sequence to another as a transforming assemblage of heterogeneous attachments that either maintain healthy subjectivities or destabilize them. The more attachments assemblages of addiction are able to make that are flexible and durable from one event to another, the stronger also the addiction-based subjectivities. Similarly, the fewer attachments that assemblages of addiction are able to keep in their various translations, the weaker the addiction-based subjectivities also become. An ANT-inspired analysis has a number of implications for the prevention and treatment of addiction: it suggests that in the prevention and treatment of addiction, the aim should hardly be to get rid of dependencies. Rather, the ambition should be the identification of attachments

  16. Testing an Attachment Model of Latina/o College Students' Psychological Adjustment

    Science.gov (United States)

    Garriott, Patton O.; Love, Keisha M.; Tyler, Kenneth M.; Thomas, Deneia M.; Roan-Belle, Clarissa R.; Brown, Carrie L.

    2010-01-01

    The present study examined the influence of attachment relationships on the psychological adjustment of Latina/o university students (N = 80) attending predominantly White institutions of higher education. A path analysis conducted to test a hypothesized model of parent and peer attachment, self-esteem, and psychological distress indicated that…

  17. Patterns and peculiarities of romatic attachment in adults from 62 cultural regions. Are "Model of Self" and "Model of Other" pancultural constructs?

    Directory of Open Access Journals (Sweden)

    David Schmitt

    2016-02-01

    Full Text Available As a part of the International Sexuality Description Project, a total of 17,804 participants from 62 cultural regions completed the Relationship Questionnaire (RQ, a self-report measure of adult romantic attachment. Correlational analyses within each culture suggested that the “Model of Self” and “Model of Other” scales of the RQ were psychometrically valid within the most cultures. Contrary to expectations, the Model of Self and Model of Other dimensions of the RQ did not underlie the four category model of attachment in the same way across all cultures. Analyses of specific attachment styles revealed that Secure romantic attachment was normative in 79% of cultures, and Preoccupied romantic attachment was particularly prevalent in East Asian cultures. Finally, the romantic attachment profiles of individual nations were correlated with sociocultural indicators in ways that supported evolutionary theories of romantic attachment and basic human mating strategies. 

  18. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  19. Scaffold Attachment Factor B1: A Novel Chromatin Regulator of Prostate Cancer Metabolism

    Science.gov (United States)

    2016-10-01

    AWARD NUMBER: W81XWH-14-1-0152 TITLE: Scaffold Attachment Factor B1: A Novel Chromatin Regulator of Prostate Cancer Metabolism PRINCIPAL...TITLE AND SUBTITLE 5a. CONTRACT NUMBER W81XWH-14-1-0152 Scaffold Attachment Factor B1: A Novel Chromatin Regulator of Prostate Cancer Metabolism... chromatin immunoprecipitation-next generation DNA sequencing (ChIP-seq) and integrative network modeling to identify the SAFB1 cistrome and the extent of

  20. The paths leading from attachment to ageism: a structural equation model approach.

    Science.gov (United States)

    Bodner, Ehud; Cohen-Fridel, Sara

    2014-01-01

    The study introduces a model in which attachment patterns serve as predictors, empathy and fear of death as mediators, and ageism as the predicted variable. Data were collected from young adults (N = 440). Anxious attachment was directly and positively correlated with ageism, and also indirectly and positively by the mediator "fear of death." Avoidant attachment was indirectly and negatively correlated with ageism by the mediator "empathy". It is suggested that interventions for reducing ageist attitudes among younger adults would focus on existential fears, as well as on empathic ability, according to the attachment tendencies of these individuals.

  1. Adult attachment, perceived social support, cultural orientation, and depressive symptoms: A moderated mediation model.

    Science.gov (United States)

    Zhu, Wenzhen; Wang, Chiachih Dc; Chong, Chu Chian

    2016-11-01

    In the current study, we tested a moderated mediation model in which cultural orientation moderated the mediation model of adult attachment-perceived social support-depressive symptoms, using 2 comparable cross-cultural samples of college students recruited from China and the U.S. (n = 363 for each group). Results indicated that perceived social support mediated the effect of attachment anxiety on depressive symptoms as well as the link between attachment avoidance and depression in both samples. Moderated mediation analyses using PROCESS revealed that interdependent self-construal significantly buffered the indirect effect of attachment avoidance (via perceived social support) on depressive symptoms. The findings indicated significant differences in the mediation models between the U.S. and China groups and interdependent self-construal accounted for the between-country differences. Limitations, implications of the findings, and future research directions are discussed from the perspectives of cross-cultural variation of adult attachment functioning. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  2. Experience and Lessons learnt from running high availability databases on Network Attached Storage

    CERN Document Server

    Guijarro, Juan Manuel; Segura Chinchilla, Nilo

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department provides the Oracle based Central Data Base services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been set up. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS as share disk space for RAC purposes and Data hosting. It is composed of two private LAN's to provide access to the NAS file servers and Oracle RAC interconnect, both using network bonding. NAS nodes are configured in partnership to prevent having single points of failure and to provide automatic NAS fail-over. This presentation describes that infrastructure and gives some advice on how to automate its management and setup using a Fabric Management framework such as Quattor. It also covers aspects related with NAS Performance and Monitoring as well Data Backup and Archive of such facility using already existing i...

  3. Attachment and psychosis

    NARCIS (Netherlands)

    Korver, N.

    2014-01-01

    The main goal of this thesis was to further our understanding of current psychosocial models by introducing attachment as a relevant developmental framework. Firstly, attachment theory provides a psychosocial model for a developmental pathway to psychosis. Secondly, after expression of psychotic

  4. Parents' attachment histories and children's externalizing and internalizing behaviors: exploring family systems models of linkage.

    Science.gov (United States)

    Cowan, P A; Cowan, C P; Cohn, D A; Pearson, J L

    1996-02-01

    Twenty-seven mothers and 27 fathers were given the Adult Attachment Interview (M. Main & R. Goldwyn, in press) when their children were 3.5 years old. Continuous ratings of narrative coherence, probable experience quality (parents perceived as loving), and state of mind (current anger at parents) were entered as latent variables in partial least squares structural equation models that included observational measures of marital quality and parenting style. Models that include fathers' attachment histories predicted more variance in kindergarten teachers' descriptions of children's externalizing behavior, whereas models that include mothers' attachment histories predicted more variance in children's internalizing behavior. Marital data added predictive power to the equations. Discussion is focused on the importance of integrating attachment and family systems approaches, and of parents' gender and marital quality, in understanding specific links between parents' attachment histories and their young children's externalizing and internalizing behaviors.

  5. An effective fractal-tree closure model for simulating blood flow in large arterial networks.

    Science.gov (United States)

    Perdikaris, Paris; Grinberg, Leopold; Karniadakis, George Em

    2015-06-01

    The aim of the present work is to address the closure problem for hemodynamic simulations by developing a flexible and effective model that accurately distributes flow in the downstream vasculature and can stably provide a physiological pressure outflow boundary condition. To achieve this goal, we model blood flow in the sub-pixel vasculature by using a non-linear 1D model in self-similar networks of compliant arteries that mimic the structure and hierarchy of vessels in the meso-vascular regime (radii [Formula: see text]). We introduce a variable vessel length-to-radius ratio for small arteries and arterioles, while also addressing non-Newtonian blood rheology and arterial wall viscoelasticity effects in small arteries and arterioles. This methodology aims to overcome substantial cut-off radius sensitivities, typically arising in structured tree and linearized impedance models. The proposed model is not sensitive to outflow boundary conditions applied at the end points of the fractal network, and thus does not require calibration of resistance/capacitance parameters typically required for outflow conditions. The proposed model convergences to a periodic state in two cardiac cycles even when started from zero-flow initial conditions. The resulting fractal-trees typically consist of thousands to millions of arteries, posing the need for efficient parallel algorithms. To this end, we have scaled up a Discontinuous Galerkin solver that utilizes the MPI/OpenMP hybrid programming paradigm to thousands of computer cores, and can simulate blood flow in networks of millions of arterial segments at the rate of one cycle per 5 min. The proposed model has been extensively tested on a large and complex cranial network with 50 parent, patient-specific arteries and 21 outlets to which fractal trees where attached, resulting to a network of up to 4,392,484 vessels in total, and a detailed network of the arm with 276 parent arteries and 103 outlets (a total of 702,188 vessels

  6. Stability of attachment-related anxiety and avoidance and their relationships with the five-factor model and the psychobiological model of personality.

    Science.gov (United States)

    Picardi, Angelo; Caroppo, Emanuele; Toni, Alessandro; Bitetti, Daniela; Di Maria, Giuseppe

    2005-09-01

    The stability of attachment-related anxiety and avoidance and their relationship with influential personality models are issues worth further investigation. Studying discriminant validity with respect to aspects of personality deemed as prevalently heritable, such as temperament, is particularly important. Our aims were to examine the stability of attachment dimensions and to study their relationship with psychological distress, the Big Five factors, and temperament and character dimensions. The Experiences in Close Relationships (ECR) questionnaire, the State-Trait Anxiety Inventory (STAI), the Zung depression scale (ZDS), the Temperament and Character Inventory (TCI-125), and the Big Five Questionnaire (BFQ) were administered to 222 undergraduate and graduate students. After 1 month, 115 participants completed again the ECR, the STAI, and the ZDS. Attachment-related anxiety was modestly correlated with depression and anxiety, while attachment-related avoidance was modestly correlated with depression. The test-retest reliability of ECR scores was high. Changes in attachment-related anxiety were not related to changes in depression or anxiety, and changes in attachment-related avoidance were modestly correlated with changes in depression. In separate multiple regression models also including gender and age, attachment-related anxiety was correlated with harm avoidance, reward dependence, low novelty seeking, low self-directedness and low cooperativeness; low energy/extraversion and low emotional stability; attachment-related avoidance was correlated with low reward dependence and tended to be correlated with low self-directedness. These findings corroborate the reliability and the convergent and discriminant validity of the ECR, and support the notion that the attachment dimensions are only modestly related to psychological distress and are not redundant with constructs developed within influential personality models such as the five-factor model and the

  7. Complex growing networks with intrinsic vertex fitness

    International Nuclear Information System (INIS)

    Bedogne, C.; Rodgers, G. J.

    2006-01-01

    One of the major questions in complex network research is to identify the range of mechanisms by which a complex network can self organize into a scale-free state. In this paper we investigate the interplay between a fitness linking mechanism and both random and preferential attachment. In our models, each vertex is assigned a fitness x, drawn from a probability distribution ρ(x). In Model A, at each time step a vertex is added and joined to an existing vertex, selected at random, with probability p and an edge is introduced between vertices with fitnesses x and y, with a rate f(x,y), with probability 1-p. Model B differs from Model A in that, with probability p, edges are added with preferential attachment rather than randomly. The analysis of Model A shows that, for every fixed fitness x, the network's degree distribution decays exponentially. In Model B we recover instead a power-law degree distribution whose exponent depends only on p, and we show how this result can be generalized. The properties of a number of particular networks are examined

  8. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  9. Mathematical model on malicious attacks in a mobile wireless network with clustering

    International Nuclear Information System (INIS)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2015-01-01

    A mathematical model has been formulated for the analysis of a wireless epidemic on a clustered heterogeneous network. The model introduces mobility into the epidemic framework assuming that the component nodes have a tendency to be attached with a frequently visited home cluster. This underlines the inherent regularity in the mobility pattern of mobile nodes in a wireless network. The analysis focuses primarily on features that arise because of the mobility considerations compared in the larger scenario formed by the epidemic aspects. A result on the invariance of the home cluster populations with respect to time provides an important view-point of the long-term behavior of the system. The analysis also focuses on obtaining a basic threshold condition that guides the epidemic behavior of the system. Analytical as well as numerical results have also been obtained to establish the asymptotic behavior of the connected components of the network, and that of the whole network when the underlying graph turns out to be irreducible. Applications to proximity based attacks and to scenarios with high cluster density have also been outlined

  10. DNA-AuNP networks on cell membranes as a protective barrier to inhibit viral attachment, entry and budding.

    Science.gov (United States)

    Li, Chun Mei; Zheng, Lin Ling; Yang, Xiao Xi; Wan, Xiao Yan; Wu, Wen Bi; Zhen, Shu Jun; Li, Yuan Fang; Luo, Ling Fei; Huang, Cheng Zhi

    2016-01-01

    Viral infections have caused numerous diseases and deaths worldwide. Due to the emergence of new viruses and frequent virus variation, conventional antiviral strategies that directly target viral or cellular proteins are limited because of the specificity, drug resistance and rapid clearance from the human body. Therefore, developing safe and potent antiviral agents with activity against viral infection at multiple points in the viral life cycle remains a major challenge. In this report, we propose a new modality to inhibit viral infection by fabricating DNA conjugated gold nanoparticle (DNA-AuNP) networks on cell membranes as a protective barrier. The DNA-AuNPs networks were found, via a plaque formation assay and viral titers, to have potent antiviral ability and protect host cells from human respiratory syncytial virus (RSV). Confocal immunofluorescence image analysis showed 80 ± 3.8% of viral attachment, 91.1 ± 0.9% of viral entry and 87.9 ± 2.8% of viral budding were inhibited by the DNA-AuNP networks, which were further confirmed by real-time fluorescence imaging of the RSV infection process. The antiviral activity of the networks may be attributed to steric effects, the disruption of membrane glycoproteins and limited fusion of cell membrane bilayers, all of which play important roles in viral infection. Therefore, our results suggest that the DNA-AuNP networks have not only prophylactic effects to inhibit virus attachment and entry, but also therapeutic effects to inhibit viral budding and cell-to-cell spread. More importantly, this proof-of-principle study provides a pathway for the development of a universal, broad-spectrum antiviral therapy. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Attachment in medical care: A review of the interpersonal model in chronic disease management.

    Science.gov (United States)

    Jimenez, Xavier F

    2017-03-01

    Objective Patient-physician interaction is continually examined in an era prioritizing patient-centered approaches, yet elaboration beyond aspects of communication and empathy is lacking. Major chronic conditions would benefit tremendously from understanding interpersonal aspects of patient-physician encounters. This review intends to provide a concise introduction to the interpersonal model of attachment theory and how it informs both the patient-physician interaction and medical outcomes in chronic care. Methods A narrative review of the theoretical, neurobiological, epidemiological, investigational, and clinical literature on attachment theory and its impact on medical outcomes was conducted, utilizing a variety of key words as searched on PubMed database. Studies and reviews included were of a variety of sources, including textbooks and peer-reviewed journals. Reports in languages other than English were excluded. Results Measurable, discrete attachment styles and behavioral patterns correlate with poor medical outcomes, including nonadherence in insecure dismissing attachment and care overutilization in insecure preoccupied attachment. Furthermore, insecure dismissing attachment is associated with significant mortality. These variables can be easily assessed, and their effects are reversible, as evidenced by collaborative care outcome data. Discussion Attachment theory is useful a model with application in clinical and investigational aspects of chronic illness care. Implications and guidelines are explored.

  12. Attachment-based family therapy for depressed and suicidal adolescents: theory, clinical model and empirical support.

    Science.gov (United States)

    Ewing, E Stephanie Krauthamer; Diamond, Guy; Levy, Suzanne

    2015-01-01

    Attachment-Based Family Therapy (ABFT) is a manualized family-based intervention designed for working with depressed adolescents, including those at risk for suicide, and their families. It is an empirically informed and supported treatment. ABFT has its theoretical underpinnings in attachment theory and clinical roots in structural family therapy and emotion focused therapies. ABFT relies on a transactional model that aims to transform the quality of adolescent-parent attachment, as a means of providing the adolescent with a more secure relationship that can support them during challenging times generally, and the crises related to suicidal thinking and behavior, specifically. This article reviews: (1) the theoretical foundations of ABFT (attachment theory, models of emotional development); (2) the ABFT clinical model, including training and supervision factors; and (3) empirical support.

  13. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  14. The Attachment-Satisfaction Relationship On Facebook: Emotional Intelligence And Conflict

    OpenAIRE

    Caldwell, Jarred Michael

    2013-01-01

    Caldwell, J. M., Ph.D. Purdue University, February 2013. The Attachment-Satisfaction Relationship on Facebook: Emotional Intelligence and Conflict. Major Professor: M. Carole Pistole, Ph.D. Because of the unique interpersonal nature of social networking sites, as well as the vast number of people using them, this study examines how attachment differences and other factors, including social networking site romantic conflict behavior and emotional intelligence, link to romantic relationship ...

  15. A review of the evidence linking adult attachment theory and chronic pain: presenting a conceptual model.

    Science.gov (United States)

    Meredith, Pamela; Ownsworth, Tamara; Strong, Jenny

    2008-03-01

    It is now well established that pain is a multidimensional phenomenon, affected by a gamut of psychosocial and biological variables. According to diathesis-stress models of chronic pain, some individuals are more vulnerable to developing disability following acute pain because they possess particular psychosocial vulnerabilities which interact with physical pathology to impact negatively upon outcome. Attachment theory, a theory of social and personality development, has been proposed as a comprehensive developmental model of pain, implicating individual adult attachment pattern in the ontogenesis and maintenance of chronic pain. The present paper reviews and critically appraises studies which link adult attachment theory with chronic pain. Together, these papers offer support for the role of insecure attachment as a diathesis (or vulnerability) for problematic adjustment to pain. The Attachment-Diathesis Model of Chronic Pain developed from this body of literature, combines adult attachment theory with the diathesis-stress approach to chronic pain. The evidence presented in this review, and the associated model, advances our understanding of the developmental origins of chronic pain conditions, with potential application in guiding early pain intervention and prevention efforts, as well as tailoring interventions to suit specific patient needs.

  16. Attachment and Psychopathology

    Directory of Open Access Journals (Sweden)

    Mehmet Fatih Ustundag

    2011-06-01

    Full Text Available The type of attachment defined in the early stages of life and thought to be continuous, is a phenomenon that shapes the pattern of how a person makes contact with others. The clinical appearance of every type of attachment is different and each one has prospective and retrospective phenomenological reflections. In all stages of life and in close relationships, it can be observed if a person gets in close contact with someone else and if this relation bears supportive and protective qualities. According to attachment theorists, once it is defined as safe or unsafe during nursing period, it shows little change. Starting from Bowlby’s work, unsafe attachment type is considered as the determining factor of psychopathology in the later periods of life, while safe attachment is considered as in relation with healthy processes. The nature’s original model is safe attachment. Anxious/indecisive attachment, an unsafe attachment type, is associated with anxiety disorders and depressive disorder, while avoidant attachment is associated with behavior disorder and other extroverted pathologies. Disorganized/disoriented attachment is considered to be together with dissociative disorder. The aim of this paper is to review attachment theory and the relation between attachment and psychopathology.

  17. Topsector Energy. Innovation Officers Network; Topsector Energie. Innovatie Attache Netwerk

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-06-15

    The Top Sector policy of the Ministry of Economic Affairs, Agriculture and Innovation (ELI) has resulted in strongly worded plans with big ambitions for the various priority sectors. In this publication the Dutch Network of Innovation Officers gives an overview for the Top Sector Energy of developments taking place in the leading countries of the world in the field of Research, Development and Innovation. The information provides clues for the establishment and strengthening of international R and D strategy for the top sector and related options for cooperation with foreign parties [Dutch] Het topsectorenbeleid van onder meer het Ministerie van Economische zaken, Landbouw en Innovatie (ELI) heeft geresulteerd in scherp geformuleerde plannen met flinke ambities voor de diverse topsectoren. Het Netwerk van Innovatie Attachés geeft in deze publikatie een overzicht voor de Topsector Energie wat er in de meest toonaangevende landen van de wereld gebeurt op het terrein van Research and Development en Innovatie. De informatie biedt aanknopingspunten voor het opzetten en versterken van een internationale R and D strategie voor de topsector en daar toe behorende samenwerking met buitenlandse partijen.

  18. A Model of Network Porosity

    Science.gov (United States)

    2016-11-09

    Figure 1. We generally express such networks in terms of the services running in each enclave as well as the routing and firewall rules between the...compromise a server, they can compromise other devices in the same subnet or protected enclave. They probe attached firewalls and routers for open ports and...spam and malware filter would prevent this content from reaching its destination. Content filtering provides another layer of defense to other controls

  19. Benchmarking Measures of Network Controllability on Canonical Graph Models

    Science.gov (United States)

    Wu-Yan, Elena; Betzel, Richard F.; Tang, Evelyn; Gu, Shi; Pasqualetti, Fabio; Bassett, Danielle S.

    2018-03-01

    The control of networked dynamical systems opens the possibility for new discoveries and therapies in systems biology and neuroscience. Recent theoretical advances provide candidate mechanisms by which a system can be driven from one pre-specified state to another, and computational approaches provide tools to test those mechanisms in real-world systems. Despite already having been applied to study network systems in biology and neuroscience, the practical performance of these tools and associated measures on simple networks with pre-specified structure has yet to be assessed. Here, we study the behavior of four control metrics (global, average, modal, and boundary controllability) on eight canonical graphs (including Erdős-Rényi, regular, small-world, random geometric, Barábasi-Albert preferential attachment, and several modular networks) with different edge weighting schemes (Gaussian, power-law, and two nonparametric distributions from brain networks, as examples of real-world systems). We observe that differences in global controllability across graph models are more salient when edge weight distributions are heavy-tailed as opposed to normal. In contrast, differences in average, modal, and boundary controllability across graph models (as well as across nodes in the graph) are more salient when edge weight distributions are less heavy-tailed. Across graph models and edge weighting schemes, average and modal controllability are negatively correlated with one another across nodes; yet, across graph instances, the relation between average and modal controllability can be positive, negative, or nonsignificant. Collectively, these findings demonstrate that controllability statistics (and their relations) differ across graphs with different topologies and that these differences can be muted or accentuated by differences in the edge weight distributions. More generally, our numerical studies motivate future analytical efforts to better understand the mathematical

  20. Elastic Network Model of a Nuclear Transport Complex

    Science.gov (United States)

    Ryan, Patrick; Liu, Wing K.; Lee, Dockjin; Seo, Sangjae; Kim, Young-Jin; Kim, Moon K.

    2010-05-01

    The structure of Kap95p was obtained from the Protein Data Bank (www.pdb.org) and analyzed RanGTP plays an important role in both nuclear protein import and export cycles. In the nucleus, RanGTP releases macromolecular cargoes from importins and conversely facilitates cargo binding to exportins. Although the crystal structure of the nuclear import complex formed by importin Kap95p and RanGTP was recently identified, its molecular mechanism still remains unclear. To understand the relationship between structure and function of a nuclear transport complex, a structure-based mechanical model of Kap95p:RanGTP complex is introduced. In this model, a protein structure is simply modeled as an elastic network in which a set of coarse-grained point masses are connected by linear springs representing biochemical interactions at atomic level. Harmonic normal mode analysis (NMA) and anharmonic elastic network interpolation (ENI) are performed to predict the modes of vibrations and a feasible pathway between locked and unlocked conformations of Kap95p, respectively. Simulation results imply that the binding of RanGTP to Kap95p induces the release of the cargo in the nucleus as well as prevents any new cargo from attaching to the Kap95p:RanGTP complex.

  1. Structural Equation Model of Smartphone Addiction Based on Adult Attachment Theory: Mediating Effects of Loneliness and Depression.

    Science.gov (United States)

    Kim, EunYoung; Cho, Inhyo; Kim, Eun Joo

    2017-06-01

    This study investigated the mediating effects of loneliness and depression on the relationship between adult attachment and smartphone addiction in university students. A total of 200 university students participated in this study. The data was analysed using descriptive statistics, correlation analysis, and structural equation modeling. There were significant positive relationships between attachment anxiety, loneliness, depression, and smartphone addiction. However, attachment anxiety was not significantly correlated with smartphone addiction. The results also showed that loneliness did not directly mediate between attachment anxiety and smartphone addiction. In addition, loneliness and depression serially mediated between attachment anxiety and smartphone addiction. The results suggest there are mediating effects of loneliness and depression in the relationship between attachment anxiety and smartphone addiction. The hypothesized model was found to be a suitable model for predicting smartphone addiction among university students. Future study is required to find a causal path to prevent smartphone addiction among university students. Copyright © 2017. Published by Elsevier B.V.

  2. EFL Learners' Home Culture Attachment and their Attitudes towards English Language Learning: A structural equation modeling approach

    Directory of Open Access Journals (Sweden)

    Zahra Sharifi Feriz

    2017-10-01

    Full Text Available The purpose of the present study is to examine home culture attachment construct and its underlying variables among Iranian English as Foreign Language learners as well as their attitudes towards English language learning. Pearson correlation is used with a sample of 411 English major university students from different provinces in Iran, mainly Khorasan Razavi, Khoran Jonoubi and Sistan Baluchestan participated in this study. As for the quantitative phase of data collection, the study employed home culture attachment and attitude towards English language learning questionnaires. The reliability and validity of these questionnaires are reported. A home culture attachment model and an attitude model are also developed and tested using structural equation modeling. The results suggest that all three subscales of attitudes (emotional, behavioral, and cognitive are positive and significant predictors of students' western attachment. From three subscales of attitude, only behavioral attitude is negative and significant predictors of students' religious attachment. In addition, Iranian attachment is influenced by cognitive attitudes and emotional attitudes. Besides, cognitive attitude is a positive and significant predictor of students' cultural attachment. It is also found that, artistic attachment is influenced by behavioral attitudes and emotional attitudes. Finally, the pedagogical implications are discussed in light of foreign language achievement.

  3. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  4. An evolving model for the lodging-service network in a tourism destination

    Science.gov (United States)

    Hernández, Juan M.; González-Martel, Christian

    2017-09-01

    Tourism is a complex dynamic system including multiple actors which are related each other composing an evolving social network. This paper presents a growing model that explains how part of the supply components in a tourism system forms a social network. Specifically, the lodgings and services in a destination are the network nodes and a link between them appears if a representative tourist hosted in the lodging visits/consumes the service during his/her stay. The specific link between both categories are determined by a random and preferential attachment rule. The analytic results show that the long-term degree distribution of services follows a shifted power-law distribution. The numerical simulations show slight disagreements with the theoretical results in the case of the one-mode degree distribution of services, due to the low order of convergence to zero of X-motifs. The model predictions are compared with real data coming from a popular tourist destination in Gran Canaria, Spain, showing a good agreement between analytical and empirical data for the degree distribution of services. The theoretical model was validated assuming four type of perturbations in the real data.

  5. Technical Scientific Attaches and domotics. A special issue; Technisch Wetenschappelijk Attaches en domotica. Special

    Energy Technology Data Exchange (ETDEWEB)

    Kleinenberg, R.A. [Ministerie van Economische Zaken, The Hague (Netherlands); Uythof, B.H. [Invenit, Domotica Platform Nederland, Amsterdam (Netherlands); Benedetti, D [Ufficio Tecnico-Scientifico, Ambasciata del Regno dei Paesi Bassi, Rome (Italy); Van Wijngaarden, W.L. [Buero fuer Wissenschaft und Technologie, Kgl. Niederlaendische Botschaft, Bonn (Germany); Leniger, H.D.F. [Bureau du Conseiller Scientifique et Technique, Ambassade des Pays-Bas, Paris (France); Kieboom, J.P. [Office for Science and Technology, Royal Netherlands Embassy, Singapore (Singapore); Van Kooij, E.H. [Netherlands Office for Science and Technology, Royal Netherlands Embassy, Tokyo (Japan); Schuurmans, H.J.A. [Netherlands Office for Science and Technology, San Mateo, CA (United States)

    2000-04-01

    In this Dutch magazine Dutch businesses and institutes are informed about technological developments in industrialized countries (USA, Canada, Japan, South Korea, Taiwan, Singapore, Germany, France and Italy). In this special issue attaches in the different countries present information on developments and trends with respect to domotics, building automation, home networks, etc.

  6. Co-evolution of the brand effect and competitiveness in evolving networks

    Science.gov (United States)

    Guo, Jin-Li

    2014-07-01

    The principle that ‘the brand effect is attractive’ underlies the preferential attachment. Here we show that the brand effect is just one dimension of attractiveness. Another dimension is competitiveness. We firstly introduce a general framework that allows us to investigate the competitive aspect of real networks, instead of simply preferring popular nodes. Our model accurately describes the evolution of social and technological networks. The phenomenon that more competitive nodes become richer can help us to understand the evolution of many competitive systems in nature and society. In general, the paper provides an explicit analytical expression of degree distributions of the network. In particular, the model yields a nontrivial time evolution of nodes' properties and the scale-free behavior with exponents depending on the microscopic parameters characterizing the competition rules. Secondly, through theoretical analyses and numerical simulations, we reveal that our model has not only the universality for the homogeneous weighted network, but also the character for the heterogeneous weighted network. Thirdly, we also develop a model based on the profit-driven mechanism. It can better describe the observed phenomenon in enterprise cooperation networks. We show that the standard preferential attachment, the growing random graph, the initial attractiveness model, the fitness model, and weighted networks can all be seen as degenerate cases of our model.

  7. Evolution of hybrid defect networks

    International Nuclear Information System (INIS)

    Martins, C. J. A. P.

    2009-01-01

    We apply a recently developed analytic model for the evolution of monopole networks to the case of monopoles attached to one string, usually known as hybrid networks. We discuss scaling solutions for both local and global hybrid networks, and also find an interesting application for the case of vortons. Our quantitative results agree with previous estimates in indicating that the hybrid networks will usually annihilate soon after the string-forming phase transition. However, we also show that in some specific circumstances these networks can survive considerably more than a Hubble time.

  8. Within-person variation in security of attachment: a self-determination theory perspective on attachment, need fulfillment, and well-being.

    Science.gov (United States)

    La Guardia, J G; Ryan, R M; Couchman, C E; Deci, E L

    2000-09-01

    Attachment research has traditionally focused on individual differences in global patterns of attachment to important others. The current research instead focuses primarily on within-person variability in attachments across relational partners. It was predicted that within-person variability would be substantial, even among primary attachment figures of mother, father, romantic partner, and best friend. The prediction was supported in three studies. Furthermore, in line with self-determination theory, multilevel modeling and regression analyses showed that, at the relationship level, individuals' experience of fulfillment of the basic needs for autonomy, competence, and relatedness positively predicted overall attachment security, model of self, and model of other. Relations of both attachment and need satisfaction to well-being were also explored.

  9. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    Camarinha-Matos, L.M.; Afsarmanesh, H.

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  10. God attachment, mother attachment, and father attachment in early and middle adolescence.

    Science.gov (United States)

    Sim, Tick Ngee; Yow, Amanda Shixian

    2011-06-01

    The present study examined the interplay of attachment to God, attachment to mother, and attachment to father with respect to adjustment (hope, self-esteem, depression) for 130 early and 106 middle adolescents in Singapore. Results showed that the parental attachments were generally linked (in expected directions) to adjustment. God attachment, however, had unique results. At the bivariate level, God attachment was only linked to early adolescents' self-esteem. When considered together with parental attachments (including interactions), God attachment did not emerge as the key moderator in attachment interactions and yielded some unexpected results (e.g., being positively linked to depression). These results are discussed viz-a-viz the secure base and safe haven functions that God and parental attachments may play during adolescence.

  11. A study of the spreading scheme for viral marketing based on a complex network model

    Science.gov (United States)

    Yang, Jianmei; Yao, Canzhong; Ma, Weicheng; Chen, Guanrong

    2010-02-01

    Buzzword-based viral marketing, known also as digital word-of-mouth marketing, is a marketing mode attached to some carriers on the Internet, which can rapidly copy marketing information at a low cost. Viral marketing actually uses a pre-existing social network where, however, the scale of the pre-existing network is believed to be so large and so random, so that its theoretical analysis is intractable and unmanageable. There are very few reports in the literature on how to design a spreading scheme for viral marketing on real social networks according to the traditional marketing theory or the relatively new network marketing theory. Complex network theory provides a new model for the study of large-scale complex systems, using the latest developments of graph theory and computing techniques. From this perspective, the present paper extends the complex network theory and modeling into the research of general viral marketing and develops a specific spreading scheme for viral marking and an approach to design the scheme based on a real complex network on the QQ instant messaging system. This approach is shown to be rather universal and can be further extended to the design of various spreading schemes for viral marketing based on different instant messaging systems.

  12. Observational attachment theory-based parenting measures predict children's attachment narratives independently from social learning theory-based measures.

    Science.gov (United States)

    Matias, Carla; O'Connor, Thomas G; Futh, Annabel; Scott, Stephen

    2014-01-01

    Conceptually and methodologically distinct models exist for assessing quality of parent-child relationships, but few studies contrast competing models or assess their overlap in predicting developmental outcomes. Using observational methodology, the current study examined the distinctiveness of attachment theory-based and social learning theory-based measures of parenting in predicting two key measures of child adjustment: security of attachment narratives and social acceptance in peer nominations. A total of 113 5-6-year-old children from ethnically diverse families participated. Parent-child relationships were rated using standard paradigms. Measures derived from attachment theory included sensitive responding and mutuality; measures derived from social learning theory included positive attending, directives, and criticism. Child outcomes were independently-rated attachment narrative representations and peer nominations. Results indicated that Attachment theory-based and Social Learning theory-based measures were modestly correlated; nonetheless, parent-child mutuality predicted secure child attachment narratives independently of social learning theory-based measures; in contrast, criticism predicted peer-nominated fighting independently of attachment theory-based measures. In young children, there is some evidence that attachment theory-based measures may be particularly predictive of attachment narratives; however, no single model of measuring parent-child relationships is likely to best predict multiple developmental outcomes. Assessment in research and applied settings may benefit from integration of different theoretical and methodological paradigms.

  13. Measuring Patients’ Attachment Avoidance in Psychotherapy: Development of the Attachment Avoidance in Therapy Scale (AATS

    Directory of Open Access Journals (Sweden)

    András Láng

    2012-11-01

    Full Text Available A new scale measuring patient-therapist attachment avoidance was developed. Attachment Avoidance in Therapy Scale is a new measure based on the Bartholomew model of adult attachment (Bartholomew & Horowitz, 1991 and the Experience in Close Relationships Scale (Brennan, Clark, & Shaver, 1998 to measure patients’ attachment avoidance towards therapists. With 112 patient-therapist dyads participating in the study, validation of a preliminary scale – measuring both attachment anxiety and attachment avoidance in therapy – took place using therapists’ evaluations of patients’ relational behavior and patients’ self-reports about their attitude toward psychotherapy. Analysis of the data revealed six underlying scales. Results showed all six scales to be reliable. Validation of scales measuring attachment anxiety failed. The importance of Attachment Avoidance in Therapy Scale and its subscales is discussed.

  14. On Mourning and Recovery: Integrating Stages of Grief and Change Toward a Neuroscience-Based Model of Attachment Adaptation in Addiction Treatment.

    Science.gov (United States)

    Chambers, R Andrew; Wallingford, Sue C

    2017-01-01

    Interpersonal attachment and drug addiction share many attributes across their behavioral and neurobiological domains. Understanding the overlapping brain circuitry of attachment formation and addiction illuminates a deeper understanding of the pathogenesis of trauma-related mental illnesses and comorbid substance use disorders, and the extent to which ending an addiction is complicated by being a sort of mourning process. Attention to the process of addiction recovery-as a form of grieving-in which Kubler-Ross's stages of grief and Prochaska's stages of change are ultimately describing complementary viewpoints on a general process of neural network and attachment remodeling, could lead to more effective and integrative psychotherapy and medication strategies.

  15. Parent-Child Attachment Working Models and Self-Esteem in Adolescence.

    Science.gov (United States)

    McCormick, Cynthia B.; Kennedy, Janice H.

    1994-01-01

    Continuity over time in parent-child attachments and the relationship between these attachments and current self-esteem were studied for 218 nonparent college students. Results indicate continuity over time of attachment. Self-esteem is related to childhood and adolescent styles of attachment and dimensions of independence encouragement and…

  16. The Structural Model in Parenting Style, Attachment Style, Self-regulation and Self-esteem for Smartphone Addiction

    Directory of Open Access Journals (Sweden)

    Kwan Hoi Ching

    2017-08-01

    Full Text Available Excessive smartphone usage has become a highly controversial and substantial worldwide issue. This paper explores the complexities and challenges of smartphone addiction with a particular focus on parenting styles, attachment, and self-regulation. Convenience sampling was used to gather data from 211 university students in Hong Kong (138 females/74 males through their responses to four questionnaires. One structural equation model was formed successfully which indicated that parenting style (authoritative or permissive could be a reasonable predictor of attachment style (secure or dismissive and self-regulation (impulse control or goal setting for smartphone addictions (positive anticipation, withdrawal, cyberspace relationship or overuse. Parenting style was a positive correlate to predict attachment, while the attachment positive correlated to predict self-regulation. Self-regulation was a negative correlate to smartphone addiction. It was revealed that a positive parenting style and positive attachment style could form a significant model with self-regulation and smartphone addiction. Furthermore, secure attachment had higher mediation effect, while impulse control and goal setting behavior had a fair mediation power over influencing addiction tendency. This model helped explore the relationships between smartphone addiction and other constructs in educational psychology. Based on findings, educators can gain insights into how parenting and self-regulation can influence the tendency towards excessive smartphone usage. More educational programs which aim at promoting adequate parenting skills, motivating children through self-regulation and goal setting, is proposed through this study.

  17. Co-evolution of the brand effect and competitiveness in evolving networks

    International Nuclear Information System (INIS)

    Guo Jin-Li

    2014-01-01

    The principle that ‘the brand effect is attractive’ underlies the preferential attachment. Here we show that the brand effect is just one dimension of attractiveness. Another dimension is competitiveness. We firstly introduce a general framework that allows us to investigate the competitive aspect of real networks, instead of simply preferring popular nodes. Our model accurately describes the evolution of social and technological networks. The phenomenon that more competitive nodes become richer can help us to understand the evolution of many competitive systems in nature and society. In general, the paper provides an explicit analytical expression of degree distributions of the network. In particular, the model yields a nontrivial time evolution of nodes' properties and the scale-free behavior with exponents depending on the microscopic parameters characterizing the competition rules. Secondly, through theoretical analyses and numerical simulations, we reveal that our model has not only the universality for the homogeneous weighted network, but also the character for the heterogeneous weighted network. Thirdly, we also develop a model based on the profit-driven mechanism. It can better describe the observed phenomenon in enterprise cooperation networks. We show that the standard preferential attachment, the growing random graph, the initial attractiveness model, the fitness model, and weighted networks can all be seen as degenerate cases of our model. (general)

  18. The emergence of “super-groups” in dynamical networks

    International Nuclear Information System (INIS)

    Yang, Guoli

    2016-01-01

    We study a model for the generation of networks, where the number of nodes is constant and the edges are inserted into the network gradually based on non-liner preferential attachment. This model combines the ER random model with the BA scale-free networks, leading to a transition of degree distribution from homogeneity to heterogeneity. With the increase of a diversity parameter γ, the insertion of edges will give rise to some “super-groups” which are small groups of nodes with a large proportion of the edges in the network. This model has a huge application in the modelling and analyzing the emergence of “super-groups” in social, technological, and economical networks.

  19. Attachment as a Moderating Factor Between Social Support, Physical Health, and Psychological Symptoms

    Directory of Open Access Journals (Sweden)

    Kimberly A. Rapoza

    2016-12-01

    Full Text Available This study investigated the extent to which perceived social support functioned as a protective factors, and dimensions of insecure attachment (i.e., avoidant and anxious functioned as risks factors for physical and psychological health. We explored whether insecure attachment was a mechanism that modified the relationship (i.e., protect against or increases risk between social support and adult health. Participants were 155 non-traditional adult college students from demographically diverse backgrounds. Students were approached in common areas on campus or in classrooms during break and were asked to complete the questionnaire. Bartholomew and Horowitz’s Attachment Questionnaire assessed avoidant and anxious attachment dimensions, the Brief Social Support Questionnaire assessed perceived social support, and the Memorial Symptom Assessment Scale measured physical and psychological symptoms. Model results indicated that the anxious dimension of insecure attachment was more directly and positively associated with poorer general physical health and psychological symptoms, whereas greater perceived social support was linked with better reported health. However, an interesting pattern emerged with avoidant attachment through a moderated relationship with social support. The absence of a satisfying supportive network was significantly related to poorer physical and psychological health outcomes for those low in avoidant attachment, but not for those high in avoidant attachment. Results from this work suggest that insecure attachment plays a detrimental role in adult health. Perceived social support does not necessarily function as a blanket protective factor for health, as it seemed to offer less benefit to those high in attachment avoidance.

  20. Attachment, Sexual Assertiveness, and Sexual Outcomes in Women with Provoked Vestibulodynia and Their Partners: A Mediation Model.

    Science.gov (United States)

    Leclerc, Bianca; Bergeron, Sophie; Brassard, Audrey; Bélanger, Claude; Steben, Marc; Lambert, Bernard

    2015-08-01

    Provoked vestibulodynia (PVD) is a prevalent women's sexual pain disorder, which is associated with sexual function difficulties. Attachment theory has been used to understand adult sexual outcomes, providing a useful framework for examining sexual adaptation in couples confronted with PVD. Research to date indicates that anxious and avoidant attachment dimensions correlate with worse sexual outcomes in community and clinical samples. The present study examined the association between attachment, pain, sexual function, and sexual satisfaction in a sample of 101 couples in which the women presented with PVD. The actor-partner interdependence model was used in order to investigate both actor and partner effects. This study also examined the role of sexual assertiveness as a mediator of these associations via structural equation modeling. Women completed measures of pain intensity and both members of the couple completed measures of romantic attachment, sexual assertiveness, sexual function, and satisfaction. Results indicated that attachment dimensions did not predict pain intensity. Both anxious and avoidant attachment were associated with lower sexual satisfaction. Only attachment avoidance predicted lower sexual function in women. Partner effects indicated that higher sexual assertiveness in women predicted higher sexual satisfaction in men. Finally, women's sexual assertiveness was found to be a significant mediator of the relationship between their attachment dimensions, sexual function, and satisfaction. Findings highlight the importance of examining how anxious and avoidant attachment may lead to difficulties in sexual assertiveness and to less satisfying sexual interactions in couples where women suffer from PVD.

  1. Studying the Amount, Motivations and Perception of Consequences of Using the Social Networks Based on Quality of the Relationship between Attachment Styles with Perception of Parental Rejection and Control in Adolescents

    Directory of Open Access Journals (Sweden)

    پریسا سادات سیدموسوی

    2018-03-01

    Full Text Available Due to the importance of user behavior in social networks especially in adolescents, the purpose of this study was investigating the amount, motivations and perception of consequences of using the social networks based on the quality of the relationship between attachment styles with perception of parental rejection and control in adole-scents. The population of the research included all of the 15-18 years old adolescents of Tehran from which 146 students (77 girls and 69 boys were chosen by cluster sampling and completed the Inventory of Parent & Peer Attachment, Parental Acceptance-Rejection and Control, and Social Network Using Checklist. The results showed that the quality of the relationship with parents has a key role in prediction of the amount and the way of using the social networks and in addition could affect the consequences of using these networks. In addition, increasing of the parental control unexpectedly could not decrease the using of social networks. According to the results, it seems that although most of the adolescents are using the social networks, the relationship with parents can be critical in predicting the motives of using these networks.

  2. A neighbourhood evolving network model

    International Nuclear Information System (INIS)

    Cao, Y.J.; Wang, G.Z.; Jiang, Q.Y.; Han, Z.X.

    2006-01-01

    Many social, technological, biological and economical systems are best described by evolved network models. In this short Letter, we propose and study a new evolving network model. The model is based on the new concept of neighbourhood connectivity, which exists in many physical complex networks. The statistical properties and dynamics of the proposed model is analytically studied and compared with those of Barabasi-Albert scale-free model. Numerical simulations indicate that this network model yields a transition between power-law and exponential scaling, while the Barabasi-Albert scale-free model is only one of its special (limiting) cases. Particularly, this model can be used to enhance the evolving mechanism of complex networks in the real world, such as some social networks development

  3. Generating clustered scale-free networks using Poisson based localization of edges

    Science.gov (United States)

    Türker, İlker

    2018-05-01

    We introduce a variety of network models using a Poisson-based edge localization strategy, which result in clustered scale-free topologies. We first verify the success of our localization strategy by realizing a variant of the well-known Watts-Strogatz model with an inverse approach, implying a small-world regime of rewiring from a random network through a regular one. We then apply the rewiring strategy to a pure Barabasi-Albert model and successfully achieve a small-world regime, with a limited capacity of scale-free property. To imitate the high clustering property of scale-free networks with higher accuracy, we adapted the Poisson-based wiring strategy to a growing network with the ingredients of both preferential attachment and local connectivity. To achieve the collocation of these properties, we used a routine of flattening the edges array, sorting it, and applying a mixing procedure to assemble both global connections with preferential attachment and local clusters. As a result, we achieved clustered scale-free networks with a computational fashion, diverging from the recent studies by following a simple but efficient approach.

  4. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  5. Growing Homophilic Networks Are Natural Navigable Small Worlds.

    Science.gov (United States)

    Malkov, Yury A; Ponomarenko, Alexander

    2016-01-01

    Navigability, an ability to find a logarithmically short path between elements using only local information, is one of the most fascinating properties of real-life networks. However, the exact mechanism responsible for the formation of navigation properties remained unknown. We show that navigability can be achieved by using only two ingredients present in the majority of networks: network growth and local homophily, giving a persuasive answer how the navigation appears in real-life networks. A very simple algorithm produces hierarchical self-similar optimally wired navigable small world networks with exponential degree distribution by using only local information. Adding preferential attachment produces a scale-free network which has shorter greedy paths, but worse (power law) scaling of the information extraction locality (algorithmic complexity of a search). Introducing saturation of the preferential attachment leads to truncated scale-free degree distribution that offers a good tradeoff between these parameters and can be useful for practical applications. Several features of the model are observed in real-life networks, in particular in the brain neural networks, supporting the earlier suggestions that they are navigable.

  6. Growing Homophilic Networks Are Natural Navigable Small Worlds.

    Directory of Open Access Journals (Sweden)

    Yury A Malkov

    Full Text Available Navigability, an ability to find a logarithmically short path between elements using only local information, is one of the most fascinating properties of real-life networks. However, the exact mechanism responsible for the formation of navigation properties remained unknown. We show that navigability can be achieved by using only two ingredients present in the majority of networks: network growth and local homophily, giving a persuasive answer how the navigation appears in real-life networks. A very simple algorithm produces hierarchical self-similar optimally wired navigable small world networks with exponential degree distribution by using only local information. Adding preferential attachment produces a scale-free network which has shorter greedy paths, but worse (power law scaling of the information extraction locality (algorithmic complexity of a search. Introducing saturation of the preferential attachment leads to truncated scale-free degree distribution that offers a good tradeoff between these parameters and can be useful for practical applications. Several features of the model are observed in real-life networks, in particular in the brain neural networks, supporting the earlier suggestions that they are navigable.

  7. Attachment change processes in the early years of marriage.

    Science.gov (United States)

    Davila, J; Karney, B R; Bradbury, T N

    1999-05-01

    The authors examined 4 models of attachment change: a contextual model, a social-cognitive model, an individual-difference model, and a diathesis-stress model. Models were examined in a sample of newlyweds over the first 2 years of marriage, using growth curve analyses. Reciprocal processes, whereby attachment representations and interpersonal life circumstances affect one another over time, also were studied. On average, newlyweds became more secure over time. However, there was significant within-subject variability on attachment change that was predicted by intra- and interpersonal factors. Attachment representations changed in response to contextual, social-cognitive, and individual-difference factors. Reciprocal processes between attachment representations and marital variables emerged, suggesting that these factors influence one another in an ongoing way.

  8. Popularity versus similarity in growing networks

    Science.gov (United States)

    Krioukov, Dmitri; Papadopoulos, Fragkiskos; Kitsak, Maksim; Serrano, Mariangeles; Boguna, Marian

    2012-02-01

    Preferential attachment is a powerful mechanism explaining the emergence of scaling in growing networks. If new connections are established preferentially to more popular nodes in a network, then the network is scale-free. Here we show that not only popularity but also similarity is a strong force shaping the network structure and dynamics. We develop a framework where new connections, instead of preferring popular nodes, optimize certain trade-offs between popularity and similarity. The framework admits a geometric interpretation, in which preferential attachment emerges from local optimization processes. As opposed to preferential attachment, the optimization framework accurately describes large-scale evolution of technological (Internet), social (web of trust), and biological (E.coli metabolic) networks, predicting the probability of new links in them with a remarkable precision. The developed framework can thus be used for predicting new links in evolving networks, and provides a different perspective on preferential attachment as an emergent phenomenon.

  9. N-doped graphene-carbon nanotube hybrid networks attaching with gold nanoparticles for glucose non-enzymatic sensor.

    Science.gov (United States)

    Jeong, Hun; Nguyen, Dang Mao; Lee, Min Sang; Kim, Hong Gun; Ko, Sang Cheol; Kwac, Lee Ku

    2018-09-01

    Herein, we successfully developed a novel three dimensional (3D) opened networks based on nitrogen doped graphene‑carbon nanotubes attaching with gold nanoparticles (N-GR-CNTs/AuNPs) to apply for non-enzymatic glucose determination. It was demonstrated that the N-GR-CNTs/AuNPs modified electrode exhibited good behavior for glucose detection with a long linear range of 2 μM to 19.6 mM, high sensitivity of 0.9824 μA·mM -1 ·cm -2 , low detection limit of 500 nM, and negligible interference effect. The high performance of the N-GR-CNTs/AuNPs based sensor was assumed due to the outstanding catalytic activity of AuNPs well dispersing on N-GR-CNTs networks, which exhibited as a perfect supporting scaffold due to the enhanced electrical conductivity and large surface area. The obtained results indicated that the N-GR-CNTs/AuNPs hybrid is highly promising for sensitive and selective detection of glucose in sensor application. Copyright © 2018 Elsevier B.V. All rights reserved.

  10. Neuroscience of Human Social Interactions and Adult Attachment Style

    Directory of Open Access Journals (Sweden)

    Pascal eVrticka

    2012-07-01

    Full Text Available Since its first description four decades ago, attachment theory has become one of the principal developmental psychological frameworks for describing the role of individual differences in the establishment and maintenance of social bonds between people. Yet, still little is known about the neurobiological underpinnings of attachment orientations and their well-established impact on a range of social and affective behaviors. In the present review, we summarize data from recent studies using cognitive and imaging approaches to characterize attachment styles and their effect on emotion and social cognition. We propose a functional neuroanatomical framework to integrate the key brain mechanisms involved in the perception and regulation of social emotional information, and their modulation by individual differences in terms of secure versus insecure (more specifically avoidant, anxious, or resolved vs. unresolved attachment traits. This framework describes how each individual’s attachment style (built through interactions between personal relationship history and predispositions may influence the encoding of approach versus aversion tendencies (safety versus threat in social encounters, implicating the activation of a network of subcortical (amygdala, hippocampus, striatum and cortical (insula, cingulate limbic areas. These basic and automatic affective mentalization mechanisms are in turn modulated by more elaborate and voluntary cognitive mentalization processes, subserving theory of mind, cognitive control, and emotion regulation capacities, implicating a distinct network (in medial prefrontal cortex, superior temporal sulcus, and temporo-parietal junction, among others. Such research does not only help better understand the neural underpinnings of human social behavior, but also provides important insights on psychopathological conditions where attachment dysregulations is likely to play an important (causal role.

  11. Sexuality examined through the lens of attachment theory: attachment, caregiving, and sexual satisfaction.

    Science.gov (United States)

    Péloquin, Katherine; Brassard, Audrey; Lafontaine, Marie-France; Shaver, Phillip R

    2014-01-01

    Attachment researchers have proposed that the attachment, caregiving, and sexual behavioral systems are interrelated in adult love relationships (Mikulincer & Shaver, 2007 ). This study examined whether aspects of partners' caregiving (proximity, sensitivity, control, compulsive caregiving) mediated the association between their attachment insecurities (anxiety and avoidance) and each other's sexual satisfaction in two samples of committed couples (Study 1: 126 cohabiting or married couples from the general community; Study 2: 55 clinically distressed couples). Partners completed the Experiences in Close Relationships measure (Brennan, Clark, & Shaver, 1998 ), the Caregiving Questionnaire (Kunce & Shaver, 1994 ), and the Global Measure of Sexual Satisfaction (Lawrance & Byers, 1998 ). Path analyses based on the actor-partner interdependence model (APIM) revealed that caregiving proximity mediated the association between low attachment avoidance and partners' sexual satisfaction in distressed and nondistressed couples. Sensitivity mediated this association in nondistressed couples only. Control mediated the association between men's insecurities (attachment-related avoidance and anxiety) and their partners' low sexual satisfaction in nondistressed couples. Attachment anxiety predicted compulsive caregiving, but this caregiving dimension was not a significant mediator. These results are discussed in light of attachment theory and their implications for treating distressed couples.

  12. A reaction time experiment on adult attachment: The development of a measure for neurophysiological settings

    Directory of Open Access Journals (Sweden)

    Theresia Wichmann

    2016-11-01

    potential attachment conflicts.The introduced paradigm is able to contribute to an experimental approach in attachment research. The Reaction Time analysis with the narrative procedure might be of interest for a broader variety of questions in experimental and neurophysiological settings to capture unconscious processes in association to internal working models of attachment. An electrophysiological model based on preliminary research is proposed for assessing the preconscious neuronal network related to secure or insecure attachment representations.

  13. Statistical Models for Social Networks

    NARCIS (Netherlands)

    Snijders, Tom A. B.; Cook, KS; Massey, DS

    2011-01-01

    Statistical models for social networks as dependent variables must represent the typical network dependencies between tie variables such as reciprocity, homophily, transitivity, etc. This review first treats models for single (cross-sectionally observed) networks and then for network dynamics. For

  14. Agent-based modeling and network dynamics

    CERN Document Server

    Namatame, Akira

    2016-01-01

    The book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The book begins with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling’s segregation model and Axelrod’s spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The book also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. The book reviews a number of pioneering and representative models in this family. Upon the gi...

  15. Analysis of the Attachment-Aversion Model of Consumer-brand Relationships in a Different Cultural Background

    Directory of Open Access Journals (Sweden)

    Veranika Novik

    2017-09-01

    Full Text Available Originally the Attachment-Aversion model of consumer-brand relationships, elaborated by Park, Eisingerich & Park in 2013, was analyzed with the help of the sample of English speaking respondents, living in Great Britain and the USA, and focused on two brands: Manchester United Football Club and Apple iPhone. The present study tries to validate the model regarding other type of brand and in conditions of another cultural background. The focal brand for the study was chosen from a high-end beauty category (Chanel. For the purposes of this research, a questionnaire was designed and spread online within the target population: the current students and alumni of Belarusian universities that are Russian/speaking, fluent in English and had a class in branding. A total of 273 responses was analysed using structural equation modelling. The outcomes of the research have shown that the Attachment-Aversion model of consumer-brand relationships has not proven to be totally versatile, while applied in the conditions of the other cultural background as some of the relationships of the model have shown to be insignificant. The enticing determinant has no effect on brand attachment relationship and the enabling determinant has no effect on the brand prominence. The implications of the findings are discussed.

  16. Modeling Epidemic Network Failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova

    2013-01-01

    This paper presents the implementation of a failure propagation model for transport networks when multiple failures occur resulting in an epidemic. We model the Susceptible Infected Disabled (SID) epidemic model and validate it by comparing it to analytical solutions. Furthermore, we evaluate...... the SID model’s behavior and impact on the network performance, as well as the severity of the infection spreading. The simulations are carried out in OPNET Modeler. The model provides an important input to epidemic connection recovery mechanisms, and can due to its flexibility and versatility be used...... to evaluate multiple epidemic scenarios in various network types....

  17. Constitutive and life modeling of single crystal blade alloys for root attachment analysis

    Science.gov (United States)

    Meyer, T. G.; Mccarthy, G. J.; Favrow, L. H.; Anton, D. L.; Bak, Joe

    1988-01-01

    Work to develop fatigue life prediction and constitutive models for uncoated attachment regions of single crystal gas turbine blades is described. At temperatures relevant to attachment regions, deformation is dominated by slip on crystallographic planes. However, fatigue crack initiation and early crack growth are not always observed to be crystallographic. The influence of natural occurring microporosity will be investigated by testing both hot isostatically pressed and conventionally cast PWA 1480 single crystal specimens. Several differnt specimen configurations and orientations relative to the natural crystal axes are being tested to investigate the influence of notch acuity and the material's anisotropy. Global and slip system stresses in the notched regions were determined from three dimensional stress analyses and will be used to develop fatigue life prediction models consistent with the observed lives and crack characteristics.

  18. Current approaches to gene regulatory network modelling

    Directory of Open Access Journals (Sweden)

    Brazma Alvis

    2007-09-01

    Full Text Available Abstract Many different approaches have been developed to model and simulate gene regulatory networks. We proposed the following categories for gene regulatory network models: network parts lists, network topology models, network control logic models, and dynamic models. Here we will describe some examples for each of these categories. We will study the topology of gene regulatory networks in yeast in more detail, comparing a direct network derived from transcription factor binding data and an indirect network derived from genome-wide expression data in mutants. Regarding the network dynamics we briefly describe discrete and continuous approaches to network modelling, then describe a hybrid model called Finite State Linear Model and demonstrate that some simple network dynamics can be simulated in this model.

  19. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  20. Network bandwidth utilization forecast model on high bandwidth networks

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wuchert (William) [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sim, Alex [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-03-30

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2%. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  1. RMBNToolbox: random models for biochemical networks

    Directory of Open Access Journals (Sweden)

    Niemi Jari

    2007-05-01

    Full Text Available Abstract Background There is an increasing interest to model biochemical and cell biological networks, as well as to the computational analysis of these models. The development of analysis methodologies and related software is rapid in the field. However, the number of available models is still relatively small and the model sizes remain limited. The lack of kinetic information is usually the limiting factor for the construction of detailed simulation models. Results We present a computational toolbox for generating random biochemical network models which mimic real biochemical networks. The toolbox is called Random Models for Biochemical Networks. The toolbox works in the Matlab environment, and it makes it possible to generate various network structures, stoichiometries, kinetic laws for reactions, and parameters therein. The generation can be based on statistical rules and distributions, and more detailed information of real biochemical networks can be used in situations where it is known. The toolbox can be easily extended. The resulting network models can be exported in the format of Systems Biology Markup Language. Conclusion While more information is accumulating on biochemical networks, random networks can be used as an intermediate step towards their better understanding. Random networks make it possible to study the effects of various network characteristics to the overall behavior of the network. Moreover, the construction of artificial network models provides the ground truth data needed in the validation of various computational methods in the fields of parameter estimation and data analysis.

  2. Modeling Interpersonal Correlates of Condomless Anal Sex among Gay and Bisexual Men: An Application of Attachment Theory.

    Science.gov (United States)

    Starks, Tyrel J; Castro, Michael A; Castiblanco, Juan P; Millar, Brett M

    2017-05-01

    The existing literature has identified that beliefs about the interpersonal meaning of condom use are a significant predictor of condomless anal sex (CAS). Some have suggested that condom use in this context may function as a form of nonverbal communication. This study utilized attachment theory as a framework and tested a hypothesized model linking adult attachment to CAS through communication skills and condom expectancies. An online survey was completed by 122 single, HIV-negative gay and bisexual (GB) men living in the U.S. They completed measures of adult attachment (anxious and avoidant), condom expectancies regarding intimacy and pleasure interference, communication skills, self-assessed mate value, and recent CAS with casual partners. There was a significant, positive bivariate association between anxious attachment and receptive CAS. In path model analyses, two over-arching pathways emerged. In the other-oriented pathway, anxious attachment, self-perceived mate value, and emotional communication predicted the belief that condoms interfere with intimacy. In turn, intimacy interference expectancies were positively associated with the odds of receptive CAS. In the self-oriented pathway, assertive communication skills mediated a link between avoidant attachment and the belief that condoms interfere with sexual pleasure. Pleasure interference expectancies were positively associated with the odds of insertive CAS. The findings highlight the importance of relational or interpersonal concerns in sexual risk-taking among single GB men. Attachment theory may serve as a framework for organizing these interpersonal correlates of CAS. Results are consistent with the conceptualization of condom use as a form of nonverbal attachment-related behavior. Implications for sexual health and risk-reduction interventions are explored in this context.

  3. Function of Attachment Hierarchies in Young Adults Experiencing the Transition From University

    Directory of Open Access Journals (Sweden)

    Elaine Scharfe

    2017-10-01

    Full Text Available An important cornerstone of Bowlby’s attachment theory (1969/1997 is the proposal that moving away from parents and toward peers is an indication of healthy development. In this study, we explored the benefit of the shift, not the shift itself, in a sample of emerging adults experiencing a stressful life event (i.e., the transition from university. Although the shift from parents to peers is an important cornerstone of Bowlby’s theory, this study is one of the first to test the differential effects of parent and peer networks on adjustment. In this longitudinal study, 73 participants completed surveys to assess attachment, social networks, and distress one month before completing their undergraduate degree and 6 months later. We found that participants experiencing the transition from university, who chose a peer as the first person in their network, tended to report stable scores over time whereas participants who chose a family member reported more variable scores. Interestingly, the direction of change was not different for the groups, just the magnitude of change. Furthermore, the difference in adjustment was not found when we compared the groups using the percent hierarchy method highlighting that there is a benefit of exploring primary attachment relationships when examining the influence of networks on adjustment.

  4. The assessment of cyberstalking: an expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse.

    Science.gov (United States)

    Strawhun, Jenna; Adams, Natasha; Huss, Matthew T

    2013-01-01

    Because the first antistalking statute was enacted in California in 1990, stalking research has been expanded immensely, yet been largely confined to exploring traditional pursuit tactics. This study instead examined the prevalence and correlates of cyberstalking behaviors while examining the phenomenon in a more inclusive manner than previous studies focusing on cyberstalking by including social networking avenues. In addition to a measure assessing cyberstalking-related behaviors, questionnaires assessing pathological aspects of personality, including attachment style, interpersonal jealousy, interpersonal violence, and anger were also provided to participants. Results indicate that, given preliminary evidence, cyberstalking-related behaviors are related to past measures of traditional stalking and cyberstalking, although prior attachment, jealousy, and violence issues within relationships are significant predictors of cyberstalking-related behaviors. In addition, unexpected gender differences emerged. For example, women admitted greater frequencies of cyberstalking perpetration than males, signaling that further research on frequency and motivation for cyberstalking among the sexes is necessary.

  5. Biological transportation networks: Modeling and simulation

    KAUST Repository

    Albi, Giacomo

    2015-09-15

    We present a model for biological network formation originally introduced by Cai and Hu [Adaptation and optimization of biological transport networks, Phys. Rev. Lett. 111 (2013) 138701]. The modeling of fluid transportation (e.g., leaf venation and angiogenesis) and ion transportation networks (e.g., neural networks) is explained in detail and basic analytical features like the gradient flow structure of the fluid transportation network model and the impact of the model parameters on the geometry and topology of network formation are analyzed. We also present a numerical finite-element based discretization scheme and discuss sample cases of network formation simulations.

  6. Interlinkages between attachment and the Five-Factor Model of personality in middle childhood and young adulthood: a longitudinal approach.

    Science.gov (United States)

    Fransson, Mari; Granqvist, Pehr; Bohlin, Gunilla; Hagekull, Berit

    2013-01-01

    In this paper, we examine concurrent and prospective links between attachment and the Five-Factor Model (FFM) of personality from middle childhood to young adulthood (n = 66). At age 8.5 years, attachment was measured with the Separation Anxiety Test and at 21 years with the Adult Attachment Interview, whereas the personality dimensions were assessed with questionnaires at both time points. The results showed that attachment and personality dimensions are meaningfully related, concurrently and longitudinally. Attachment security in middle childhood was positively related to extraversion and openness, both concurrently and prospectively. Unresolved/disorganized (U/d) attachment was negatively related to conscientiousness and positively related to openness in young adulthood. U/d attachment showed a unique contribution to openness above the observed temporal stability of openness. As attachment security was also associated with openness, the duality of this factor is discussed together with other theoretical considerations regarding attachment theory in relation to the FFM.

  7. The investigation of social networks based on multi-component random graphs

    Science.gov (United States)

    Zadorozhnyi, V. N.; Yudin, E. B.

    2018-01-01

    The methods of non-homogeneous random graphs calibration are developed for social networks simulation. The graphs are calibrated by the degree distributions of the vertices and the edges. The mathematical foundation of the methods is formed by the theory of random graphs with the nonlinear preferential attachment rule and the theory of Erdôs-Rényi random graphs. In fact, well-calibrated network graph models and computer experiments with these models would help developers (owners) of the networks to predict their development correctly and to choose effective strategies for controlling network projects.

  8. Social power and opinion formation in complex networks

    Science.gov (United States)

    Jalili, Mahdi

    2013-02-01

    In this paper we investigate the effects of social power on the evolution of opinions in model networks as well as in a number of real social networks. A continuous opinion formation model is considered and the analysis is performed through numerical simulation. Social power is given to a proportion of agents selected either randomly or based on their degrees. As artificial network structures, we consider scale-free networks constructed through preferential attachment and Watts-Strogatz networks. Numerical simulations show that scale-free networks with degree-based social power on the hub nodes have an optimal case where the largest number of the nodes reaches a consensus. However, given power to a random selection of nodes could not improve consensus properties. Introducing social power in Watts-Strogatz networks could not significantly change the consensus profile.

  9. Emergence of complex networks from diffusion on fractal lattices. A special case of the Sierpinski gasket and tetrahedron

    International Nuclear Information System (INIS)

    Chełminiak, Przemysław

    2012-01-01

    A new approach to the assemblage of complex networks displaying the scale-free architecture is proposed. While the growth and the preferential attachment of incoming nodes assure an emergence of such networks according to the Barabási–Albert model, it is argued here that the preferential linking condition needs not to be a principal rule. To assert this statement a simple computer model based on random walks on fractal lattices is introduced. It is shown that the model successfully reproduces the degree distributions, the ultra-small-worldness and the high clustering arising from the topology of scale-free networks. -- Highlights: ► A new mechanism of evolution for scale-free complex networks is proposed. ► The preferential attachment rule is not necessary to construct such networks. ► It is shown that they reveal some basic properties of classical scale-free nets.

  10. Influence of Bundle Diameter and Attachment Point on Kinematic Behavior in Double Bundle Anterior Cruciate Ligament Reconstruction Using Computational Model

    Directory of Open Access Journals (Sweden)

    Oh Soo Kwon

    2014-01-01

    Full Text Available A protocol to choose the graft diameter attachment point of each bundle has not yet been determined since they are usually dependent on a surgeon’s preference. Therefore, the influence of bundle diameters and attachment points on the kinematics of the knee joint needs to be quantitatively analyzed. A three-dimensional knee model was reconstructed with computed tomography images of a 26-year-old man. Based on the model, models of double bundle anterior cruciate ligament (ACL reconstruction were developed. The anterior tibial translations for the anterior drawer test and the internal tibial rotation for the pivot shift test were investigated according to variation of bundle diameters and attachment points. For the model in this study, the knee kinematics after the double bundle ACL reconstruction were dependent on the attachment point and not much influenced by the bundle diameter although larger sized anterior-medial bundles provided increased stability in the knee joint. Therefore, in the clinical setting, the bundle attachment point needs to be considered prior to the bundle diameter, and the current selection method of graft diameters for both bundles appears justified.

  11. Generalized Network Psychometrics : Combining Network and Latent Variable Models

    NARCIS (Netherlands)

    Epskamp, S.; Rhemtulla, M.; Borsboom, D.

    2017-01-01

    We introduce the network model as a formal psychometric model, conceptualizing the covariance between psychometric indicators as resulting from pairwise interactions between observable variables in a network structure. This contrasts with standard psychometric models, in which the covariance between

  12. Bayesian Network Webserver: a comprehensive tool for biological network modeling.

    Science.gov (United States)

    Ziebarth, Jesse D; Bhattacharya, Anindya; Cui, Yan

    2013-11-01

    The Bayesian Network Webserver (BNW) is a platform for comprehensive network modeling of systems genetics and other biological datasets. It allows users to quickly and seamlessly upload a dataset, learn the structure of the network model that best explains the data and use the model to understand relationships between network variables. Many datasets, including those used to create genetic network models, contain both discrete (e.g. genotype) and continuous (e.g. gene expression traits) variables, and BNW allows for modeling hybrid datasets. Users of BNW can incorporate prior knowledge during structure learning through an easy-to-use structural constraint interface. After structure learning, users are immediately presented with an interactive network model, which can be used to make testable hypotheses about network relationships. BNW, including a downloadable structure learning package, is available at http://compbio.uthsc.edu/BNW. (The BNW interface for adding structural constraints uses HTML5 features that are not supported by current version of Internet Explorer. We suggest using other browsers (e.g. Google Chrome or Mozilla Firefox) when accessing BNW). ycui2@uthsc.edu. Supplementary data are available at Bioinformatics online.

  13. Eight challenges for network epidemic models

    Directory of Open Access Journals (Sweden)

    Lorenzo Pellis

    2015-03-01

    Full Text Available Networks offer a fertile framework for studying the spread of infection in human and animal populations. However, owing to the inherent high-dimensionality of networks themselves, modelling transmission through networks is mathematically and computationally challenging. Even the simplest network epidemic models present unanswered questions. Attempts to improve the practical usefulness of network models by including realistic features of contact networks and of host–pathogen biology (e.g. waning immunity have made some progress, but robust analytical results remain scarce. A more general theory is needed to understand the impact of network structure on the dynamics and control of infection. Here we identify a set of challenges that provide scope for active research in the field of network epidemic models.

  14. Complex networks-based energy-efficient evolution model for wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhu Hailin [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China)], E-mail: zhuhailin19@gmail.com; Luo Hong [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China); Peng Haipeng; Li Lixiang; Luo Qun [Information Secure Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876 (China)

    2009-08-30

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  15. Complex networks-based energy-efficient evolution model for wireless sensor networks

    International Nuclear Information System (INIS)

    Zhu Hailin; Luo Hong; Peng Haipeng; Li Lixiang; Luo Qun

    2009-01-01

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  16. Dense power-law networks and simplicial complexes

    Science.gov (United States)

    Courtney, Owen T.; Bianconi, Ginestra

    2018-05-01

    There is increasing evidence that dense networks occur in on-line social networks, recommendation networks and in the brain. In addition to being dense, these networks are often also scale-free, i.e., their degree distributions follow P (k ) ∝k-γ with γ ∈(1 ,2 ] . Models of growing networks have been successfully employed to produce scale-free networks using preferential attachment, however these models can only produce sparse networks as the numbers of links and nodes being added at each time step is constant. Here we present a modeling framework which produces networks that are both dense and scale-free. The mechanism by which the networks grow in this model is based on the Pitman-Yor process. Variations on the model are able to produce undirected scale-free networks with exponent γ =2 or directed networks with power-law out-degree distribution with tunable exponent γ ∈(1 ,2 ) . We also extend the model to that of directed two-dimensional simplicial complexes. Simplicial complexes are generalization of networks that can encode the many body interactions between the parts of a complex system and as such are becoming increasingly popular to characterize different data sets ranging from social interacting systems to the brain. Our model produces dense directed simplicial complexes with power-law distribution of the generalized out-degrees of the nodes.

  17. The application of attachment theory to a psychotherapy case

    OpenAIRE

    2012-01-01

    M.A. The purpose of this study is to illustrate the psychotherapeutic use of Attachment Theory. Attachment Theory is an interpersonal theory which refers to the way an individual internalises an emotional-cognitive model of his relationships with his various attachment figures. These models of ways of relating are reflected in the way an individual speaks. The methodology of the study entailed conducting the semi-structured Adult Attachment Interview to elicit a psychotherapy client's narr...

  18. Brand Marketing Model on Social Networks

    Directory of Open Access Journals (Sweden)

    Jolita Jezukevičiūtė

    2014-04-01

    Full Text Available The paper analyzes the brand and its marketing solutions onsocial networks. This analysis led to the creation of improvedbrand marketing model on social networks, which will contributeto the rapid and cheap organization brand recognition, increasecompetitive advantage and enhance consumer loyalty. Therefore,the brand and a variety of social networks are becoming a hotresearch area for brand marketing model on social networks.The world‘s most successful brand marketing models exploratoryanalysis of a single case study revealed a brand marketingsocial networking tools that affect consumers the most. Basedon information analysis and methodological studies, develop abrand marketing model on social networks.

  19. Triangular clustering in document networks

    Energy Technology Data Exchange (ETDEWEB)

    Cheng Xueqi; Ren Fuxin [Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190 (China); Zhou Shi [Department of Computer Science, University College London, Malet Place, London WC1E 6BT (United Kingdom); Hu Maobin [School of Engineering Science, University of Science and Technology of China, Hefei 230026 (China)], E-mail: cxq@ict.ac.cn, E-mail: renfuxin@software.ict.ac.cn, E-mail: s.zhou@adastral.ucl.ac.uk, E-mail: humaobin@ustc.edu.cn

    2009-03-15

    Document networks have the characteristic that a document node, e.g. a webpage or an article, carries meaningful content. Properties of document networks are not only affected by topological connectivity between nodes, but are also strongly influenced by the semantic relation between the content of the nodes. We observed that document networks have a large number of triangles and a high value clustering coefficient. Also there is a strong correlation between the probability of formation of a triangle and the content similarity among the three nodes involved. We propose the degree-similarity product (DSP) model, which well reproduces these properties. The model achieves this by using a preferential attachment mechanism that favours the linkage between nodes that are both popular and similar. This work is a step forward towards a better understanding of the structure and evolution of document networks.

  20. Introducing Synchronisation in Deterministic Network Models

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Jessen, Jan Jakob; Nielsen, Jens Frederik D.

    2006-01-01

    The paper addresses performance analysis for distributed real time systems through deterministic network modelling. Its main contribution is the introduction and analysis of models for synchronisation between tasks and/or network elements. Typical patterns of synchronisation are presented leading...... to the suggestion of suitable network models. An existing model for flow control is presented and an inherent weakness is revealed and remedied. Examples are given and numerically analysed through deterministic network modelling. Results are presented to highlight the properties of the suggested models...

  1. Conflict and convention in dynamic networks.

    Science.gov (United States)

    Foley, Michael; Forber, Patrick; Smead, Rory; Riedl, Christoph

    2018-03-01

    An important way to resolve games of conflict (snowdrift, hawk-dove, chicken) involves adopting a convention: a correlated equilibrium that avoids any conflict between aggressive strategies. Dynamic networks allow individuals to resolve conflict via their network connections rather than changing their strategy. Exploring how behavioural strategies coevolve with social networks reveals new dynamics that can help explain the origins and robustness of conventions. Here, we model the emergence of conventions as correlated equilibria in dynamic networks. Our results show that networks have the tendency to break the symmetry between the two conventional solutions in a strongly biased way. Rather than the correlated equilibrium associated with ownership norms (play aggressive at home, not away), we usually see the opposite host-guest norm (play aggressive away, not at home) evolve on dynamic networks, a phenomenon common to human interaction. We also show that learning to avoid conflict can produce realistic network structures in a way different than preferential attachment models. © 2017 The Author(s).

  2. Variability of femoral muscle attachments.

    Science.gov (United States)

    Duda, G N; Brand, D; Freitag, S; Lierse, W; Schneider, E

    1996-09-01

    Analytical and experimental models of the musculoskeletal system often assume single values rather than ranges for anatomical input parameters. The hypothesis of the present study was that anatomical variability significantly influences the results of biomechanical analyses, specifically regarding the moment arms of the various thigh muscles. Insertions and origins of muscles crossing or attaching to the femur were digitized in six specimens. Muscle volumes were measured; muscle attachment area and centroid location were computed. To demonstrate the influence of inter-individual anatomic variability on a mechanical modeling parameter, the corresponding range of muscle moment arms were calculated. Standard deviations, as a percentage of the mean, were about 70% for attachment area and 80% for muscle volume and attachment centroid location. The resulting moment arms of the m. gluteus maximus and m. rectus femoris were especially sensitive to anatomical variations (SD 65%). The results indicate that sensitivity to anatomical variations should be analyzed in any investigation simulating musculoskeletal interactions. To avoid misinterpretations, investigators should consider using several anatomical configurations rather than relying on a mean data set.

  3. Weighted Scaling in Non-growth Random Networks

    International Nuclear Information System (INIS)

    Chen Guang; Yang Xuhua; Xu Xinli

    2012-01-01

    We propose a weighted model to explain the self-organizing formation of scale-free phenomenon in non-growth random networks. In this model, we use multiple-edges to represent the connections between vertices and define the weight of a multiple-edge as the total weights of all single-edges within it and the strength of a vertex as the sum of weights for those multiple-edges attached to it. The network evolves according to a vertex strength preferential selection mechanism. During the evolution process, the network always holds its total number of vertices and its total number of single-edges constantly. We show analytically and numerically that a network will form steady scale-free distributions with our model. The results show that a weighted non-growth random network can evolve into scale-free state. It is interesting that the network also obtains the character of an exponential edge weight distribution. Namely, coexistence of scale-free distribution and exponential distribution emerges.

  4. Networks with fourfold connectivity in two dimensions.

    Science.gov (United States)

    Tessier, Frédéric; Boal, David H; Discher, Dennis E

    2003-01-01

    The elastic properties of planar, C4-symmetric networks under stress and at nonzero temperature are determined by simulation and mean field approximations. Attached at fourfold coordinated junction vertices, the networks are self-avoiding in that their elements (or bonds) may not intersect each other. Two different models are considered for the potential energy of the elements: either Hooke's law springs or flexible tethers (square well potential). For certain ranges of stress and temperature, the properties of the networks are captured by one of several models: at large tensions, the networks behave like a uniform system of square plaquettes, while at large compressions or high temperatures, they display many characteristics of an ideal gas. Under less severe conditions, mean field models with more general shapes (parallelograms) reproduce many essential features of both networks. Lastly, the spring network expands without limit at a two-dimensional tension equal to the force constant of the spring; however, it does not appear to collapse under compression, except at zero temperature.

  5. Reciprocity and the Emergence of Power Laws in Social Networks

    Science.gov (United States)

    Schnegg, Michael

    Research in network science has shown that many naturally occurring and technologically constructed networks are scale free, that means a power law degree distribution emerges from a growth model in which each new node attaches to the existing network with a probability proportional to its number of links (= degree). Little is known about whether the same principles of local attachment and global properties apply to societies as well. Empirical evidence from six ethnographic case studies shows that complex social networks have significantly lower scaling exponents γ ~ 1 than have been assumed in the past. Apparently humans do not only look for the most prominent players to play with. Moreover cooperation in humans is characterized through reciprocity, the tendency to give to those from whom one has received in the past. Both variables — reciprocity and the scaling exponent — are negatively correlated (r = -0.767, sig = 0.075). If we include this effect in simulations of growing networks, degree distributions emerge that are much closer to those empirically observed. While the proportion of nodes with small degrees decreases drastically as we introduce reciprocity, the scaling exponent is more robust and changes only when a relatively large proportion of attachment decisions follow this rule. If social networks are less scale free than previously assumed this has far reaching implications for policy makers, public health programs and marketing alike.

  6. Lightning attachment process to common buildings

    Science.gov (United States)

    Saba, M. M. F.; Paiva, A. R.; Schumann, C.; Ferro, M. A. S.; Naccarato, K. P.; Silva, J. C. O.; Siqueira, F. V. C.; Custódio, D. M.

    2017-05-01

    The physical mechanism of lightning attachment to grounded structures is one of the most important issues in lightning physics research, and it is the basis for the design of the lightning protection systems. Most of what is known about the attachment process comes from leader propagation models that are mostly based on laboratory observations of long electrical discharges or from observations of lightning attachment to tall structures. In this paper we use high-speed videos to analyze the attachment process of downward lightning flashes to an ordinary residential building. For the first time, we present characteristics of the attachment process to common structures that are present in almost every city (in this case, two buildings under 60 m in São Paulo City, Brazil). Parameters like striking distance and connecting leaders speed, largely used in lightning attachment models and in lightning protection standards, are revealed in this work.Plain Language SummarySince the time of Benjamin Franklin, no one has ever recorded high-speed video images of a lightning connection to a common building. It is very difficult to do it. Cameras need to be very close to the structure chosen to be observed, and long observation time is required to register one lightning strike to that particular structure. Models and theories used to determine the zone of protection of a lightning rod have been developed, but they all suffer from the lack of field data. The submitted manuscript provides results from high-speed video observations of lightning attachment to low buildings that are commonly found in almost every populated area around the world. The proximity of the camera and the high frame rate allowed us to see interesting details that will improve the understanding of the attachment process and, consequently, the models and theories used by lightning protection standards. This paper also presents spectacular images and videos of lightning flashes connecting lightning rods that

  7. Modeling Network Interdiction Tasks

    Science.gov (United States)

    2015-09-17

    118 xiii Table Page 36 Computation times for weighted, 100-node random networks for GAND Approach testing in Python ...in Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 38 Accuracy measures for weighted, 100-node random networks for GAND...networks [15:p. 1]. A common approach to modeling network interdiction is to formulate the problem in terms of a two-stage strategic game between two

  8. Exposure to family violence and attachment styles as predictors of dating violence perpetration among men and women: a mediational model.

    Science.gov (United States)

    Lee, Mary; Reese-Weber, Marla; Kahn, Jeffrey H

    2014-01-01

    This study examined a multiple mediator model explaining how sibling perpetration and one's attachment style mediate the relation between parent-to-child victimization and dating violence perpetration. A sample of undergraduate students (n = 392 women, n = 89 men) completed measures of the aforementioned variables on an Internet survey. For men, path analyses found no mediation; parent-to-child victimization had a direct association with dating violence perpetration, no association was found between sibling perpetration and dating violence perpetration, and attachment anxiety, but not attachment avoidance, was positively associated with dating violence perpetration for men. For women, the hypothesized mediation model was supported; parent-to-child victimization had a direct association with dating violence perpetration, and sibling perpetration and attachment anxiety served as mediating variables. Attachment avoidance was not associated with dating violence perpetration for women. Implications for future research and clinical practice are discussed.

  9. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  10. Complex Networks in Psychological Models

    Science.gov (United States)

    Wedemann, R. S.; Carvalho, L. S. A. V. D.; Donangelo, R.

    We develop schematic, self-organizing, neural-network models to describe mechanisms associated with mental processes, by a neurocomputational substrate. These models are examples of real world complex networks with interesting general topological structures. Considering dopaminergic signal-to-noise neuronal modulation in the central nervous system, we propose neural network models to explain development of cortical map structure and dynamics of memory access, and unify different mental processes into a single neurocomputational substrate. Based on our neural network models, neurotic behavior may be understood as an associative memory process in the brain, and the linguistic, symbolic associative process involved in psychoanalytic working-through can be mapped onto a corresponding process of reconfiguration of the neural network. The models are illustrated through computer simulations, where we varied dopaminergic modulation and observed the self-organizing emergent patterns at the resulting semantic map, interpreting them as different manifestations of mental functioning, from psychotic through to normal and neurotic behavior, and creativity.

  11. Artificial neural network modelling

    CERN Document Server

    Samarasinghe, Sandhya

    2016-01-01

    This book covers theoretical aspects as well as recent innovative applications of Artificial Neural networks (ANNs) in natural, environmental, biological, social, industrial and automated systems. It presents recent results of ANNs in modelling small, large and complex systems under three categories, namely, 1) Networks, Structure Optimisation, Robustness and Stochasticity 2) Advances in Modelling Biological and Environmental Systems and 3) Advances in Modelling Social and Economic Systems. The book aims at serving undergraduates, postgraduates and researchers in ANN computational modelling. .

  12. Paternal Attachment, Parenting Beliefs and Children's Attachment

    Science.gov (United States)

    Howard, Kimberly S.

    2010-01-01

    Relationships between fathers' romantic attachment style, parenting beliefs and father-child attachment security and dependence were examined in a diverse sample of 72 fathers of young children. Paternal romantic attachment style was coded based on fathers' endorsement of a particular style represented in the Hazan and Shaver Three-Category…

  13. Flow network QSAR for the prediction of physicochemical properties by mapping an electrical resistance network onto a chemical reaction poset.

    Science.gov (United States)

    Ivanciuc, Ovidiu; Ivanciuc, Teodora; Klein, Douglas J

    2013-06-01

    Usual quantitative structure-activity relationship (QSAR) models are computed from unstructured input data, by using a vector of molecular descriptors for each chemical in the dataset. Another alternative is to consider the structural relationships between the chemical structures, such as molecular similarity, presence of certain substructures, or chemical transformations between compounds. We defined a class of network-QSAR models based on molecular networks induced by a sequence of substitution reactions on a chemical structure that generates a partially ordered set (or poset) oriented graph that may be used to predict various molecular properties with quantitative superstructure-activity relationships (QSSAR). The network-QSAR interpolation models defined on poset graphs, namely average poset, cluster expansion, and spline poset, were tested with success for the prediction of several physicochemical properties for diverse chemicals. We introduce the flow network QSAR, a new poset regression model in which the dataset of chemicals, represented as a reaction poset, is transformed into an oriented network of electrical resistances in which the current flow results in a potential at each node. The molecular property considered in the QSSAR model is represented as the electrical potential, and the value of this potential at a particular node is determined by the electrical resistances assigned to each edge and by a system of batteries. Each node with a known value for the molecular property is attached to a battery that sets the potential on that node to the value of the respective molecular property, and no external battery is attached to nodes from the prediction set, representing chemicals for which the values of the molecular property are not known or are intended to be predicted. The flow network QSAR algorithm determines the values of the molecular property for the prediction set of molecules by applying Ohm's law and Kirchhoff's current law to the poset

  14. Gossip spread in social network Models

    Science.gov (United States)

    Johansson, Tobias

    2017-04-01

    Gossip almost inevitably arises in real social networks. In this article we investigate the relationship between the number of friends of a person and limits on how far gossip about that person can spread in the network. How far gossip travels in a network depends on two sets of factors: (a) factors determining gossip transmission from one person to the next and (b) factors determining network topology. For a simple model where gossip is spread among people who know the victim it is known that a standard scale-free network model produces a non-monotonic relationship between number of friends and expected relative spread of gossip, a pattern that is also observed in real networks (Lind et al., 2007). Here, we study gossip spread in two social network models (Toivonen et al., 2006; Vázquez, 2003) by exploring the parameter space of both models and fitting them to a real Facebook data set. Both models can produce the non-monotonic relationship of real networks more accurately than a standard scale-free model while also exhibiting more realistic variability in gossip spread. Of the two models, the one given in Vázquez (2003) best captures both the expected values and variability of gossip spread.

  15. Structural Equation Model of Smartphone Addiction Based on Adult Attachment Theory: Mediating Effects of Loneliness and Depression

    OpenAIRE

    EunYoung Kim, PhD; Inhyo Cho, PhD; Eun Joo Kim, PhD

    2017-01-01

    Purpose: This study investigated the mediating effects of loneliness and depression on the relationship between adult attachment and smartphone addiction in university students. Methods: A total of 200 university students participated in this study. The data was analysed using descriptive statistics, correlation analysis, and structural equation modeling. Results: There were significant positive relationships between attachment anxiety, loneliness, depression, and smartphone addiction. ...

  16. Spectra of random networks in the weak clustering regime

    Science.gov (United States)

    Peron, Thomas K. DM.; Ji, Peng; Kurths, Jürgen; Rodrigues, Francisco A.

    2018-03-01

    The asymptotic behavior of dynamical processes in networks can be expressed as a function of spectral properties of the corresponding adjacency and Laplacian matrices. Although many theoretical results are known for the spectra of traditional configuration models, networks generated through these models fail to describe many topological features of real-world networks, in particular non-null values of the clustering coefficient. Here we study effects of cycles of order three (triangles) in network spectra. By using recent advances in random matrix theory, we determine the spectral distribution of the network adjacency matrix as a function of the average number of triangles attached to each node for networks without modular structure and degree-degree correlations. Implications to network dynamics are discussed. Our findings can shed light in the study of how particular kinds of subgraphs influence network dynamics.

  17. The neural correlates of attachment security in typically developing children.

    Science.gov (United States)

    Choi, Eun Jung; Taylor, Margot J; Hong, Soon-Beom; Kim, Changdai; Yi, Soon-Hyung

    2018-07-01

    This study investigated neural correlates of children's attachment security using functional magnetic resonance imaging. Fifty-one boys' attachment styles (age mean = 9.5 years, SD = 0.61) were assessed with the Separation Anxiety Test (SAT). We created an fMRI version of the SAT to activate children's attachment system in fMRI environment and contrasted two conditions in which children were instructed to infer the specific feeling of the boy in the picture or to identify objects or physical activities. In the final fMRI analysis (N = 21), attachment security could be detected at the neural level corresponding to the behavioural differences in the attachment interview. Securely attached children showed greater activation in the frontal, limbic and basal ganglia area which included the dorsolateral prefrontal cortex, amygdala, cingulate cortex and striatum, compared to other children who had lower quality of attachment. These regions have a key role in socio-emotional information processing and also represent a brain network related to approach and avoidance motivation in humans. Especially the striatum, strongly linked to reward processing underpinning social approach and avoidance motivation, showed the largest effects in these differences and also positively correlated with emotional openness scores in SAT. This suggests that the quality of attachment configures the approach and avoidance motivational system in our brain mediated by the striatum. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Impact of Maternal Attachment Style on Mother to Infant Attachment

    Directory of Open Access Journals (Sweden)

    Moghaddam Hoseini V

    2011-08-01

    Full Text Available Background and Objectives: Maternal attachment has the potential to affect both child development and parenting. As such, mother-infant attachment has been considered an important topic in recent years. The aim of this study was to determine the relationship between maternal adult attachment style, the maternal obstetric and demographic characteristics and mother-infant attachment.Methods: In this descriptive-correlational study, 102 women who had referred to health centers in Mashhad in 2008 and who had inclusion criteriawere selected using stratified cluster sampling. After interview about obstetric and demographic characteristics, they were asked to complete the "Revised Adult Attachment Scale" and "Mother to Infant Attachment Inventory" for assessment of maternal attachment style and mother-infant attachment 4-5 weeks after delivery. Data were analyzed by Pearson Correlation, Kruskal-wallis and Mann-whitney statistical tests.Results: In this study, themean of mother-infant attachment was found to be 97.486.12 and the mean of secure adult attachment was higher than that of other styles (16.893.97. Although, there were negative significant relationship between maternal avoidant style and mother-infant attachment (p=0.037,r=-0/20, there were no relationship between maternal age and education, parity, type of delivery and mother-infant attachment.Conclusion: The results of this research show that maternal attachment style is one of the factors of mother -infant attachment.

  19. Brand Marketing Model on Social Networks

    OpenAIRE

    Jolita Jezukevičiūtė; Vida Davidavičienė

    2014-01-01

    The paper analyzes the brand and its marketing solutions onsocial networks. This analysis led to the creation of improvedbrand marketing model on social networks, which will contributeto the rapid and cheap organization brand recognition, increasecompetitive advantage and enhance consumer loyalty. Therefore,the brand and a variety of social networks are becoming a hotresearch area for brand marketing model on social networks.The world‘s most successful brand marketing models exploratoryanalys...

  20. Predictive fault-tolerant control of an all-thruster satellite in 6-DOF motion via neural network model updating

    Science.gov (United States)

    Tavakoli, M. M.; Assadian, N.

    2018-03-01

    The problem of controlling an all-thruster spacecraft in the coupled translational-rotational motion in presence of actuators fault and/or failure is investigated in this paper. The nonlinear model predictive control approach is used because of its ability to predict the future behavior of the system. The fault/failure of the thrusters changes the mapping between the commanded forces to the thrusters and actual force/torque generated by the thruster system. Thus, the basic six degree-of-freedom kinetic equations are separated from this mapping and a set of neural networks are trained off-line to learn the kinetic equations. Then, two neural networks are attached to these trained networks in order to learn the thruster commands to force/torque mappings on-line. Different off-nominal conditions are modeled so that neural networks can detect any failure and fault, including scale factor and misalignment of thrusters. A simple model of the spacecraft relative motion is used in MPC to decrease the computational burden. However, a precise model by the means of orbit propagation including different types of perturbation is utilized to evaluate the usefulness of the proposed approach in actual conditions. The numerical simulation shows that this method can successfully control the all-thruster spacecraft with ON-OFF thrusters in different combinations of thruster fault and/or failure.

  1. Insecure attachment behavior and partner violence: incorporating couple perceptions of insecure attachment and relational aggression.

    Science.gov (United States)

    Oka, Megan; Sandberg, Jonathan G; Bradford, Angela B; Brown, Andrew

    2014-10-01

    Intimate partner violence and insecure attachment are therapeutically relevant concepts when working with couples. The link between attachment and intimate partner violence has been examined in the literature, but an area of aggression that often goes unexamined is relational aggression, or using third parties as a means of being aggressive toward a partner. We asked how participants' attachment behaviors were related to their own and partners' relational and physical aggression. We used structural equation modeling to estimate actor-partner interdependence among these relationships in 644 heterosexual couples. Results indicated significant partner paths from attachment to relational aggression, as well as significant actor paths between relational aggression and physical aggression. Implications were discussed. Data for this study were collected from the RELATE assessment. © 2014 American Association for Marriage and Family Therapy.

  2. A model of coauthorship networks

    Science.gov (United States)

    Zhou, Guochang; Li, Jianping; Xie, Zonglin

    2017-10-01

    A natural way of representing the coauthorship of authors is to use a generalization of graphs known as hypergraphs. A random geometric hypergraph model is proposed here to model coauthorship networks, which is generated by placing nodes on a region of Euclidean space randomly and uniformly, and connecting some nodes if the nodes satisfy particular geometric conditions. Two kinds of geometric conditions are designed to model the collaboration patterns of academic authorities and basic researches respectively. The conditions give geometric expressions of two causes of coauthorship: the authority and similarity of authors. By simulation and calculus, we show that the forepart of the degree distribution of the network generated by the model is mixture Poissonian, and the tail is power-law, which are similar to these of some coauthorship networks. Further, we show more similarities between the generated network and real coauthorship networks: the distribution of cardinalities of hyperedges, high clustering coefficient, assortativity, and small-world property

  3. Brand marketing model on social networks

    OpenAIRE

    Jezukevičiūtė, Jolita; Davidavičienė, Vida

    2014-01-01

    Paper analyzes the brand and its marketing solutions on social networks. This analysis led to the creation of improved brand marketing model on social networks, which will contribute to the rapid and cheap organization brand recognition, increase competitive advantage and enhance consumer loyalty. Therefore, the brand and a variety of social networks are becoming a hot research area for brand marketing model on social networks. The world‘s most successful brand marketing models exploratory an...

  4. Target-Centric Network Modeling

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence...... reporting formats, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling......, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues by dealing with multi-layered target networks that cut across political, economic, social, technological, and military issues...

  5. QSAR modelling using combined simple competitive learning networks and RBF neural networks.

    Science.gov (United States)

    Sheikhpour, R; Sarram, M A; Rezaeian, M; Sheikhpour, E

    2018-04-01

    The aim of this study was to propose a QSAR modelling approach based on the combination of simple competitive learning (SCL) networks with radial basis function (RBF) neural networks for predicting the biological activity of chemical compounds. The proposed QSAR method consisted of two phases. In the first phase, an SCL network was applied to determine the centres of an RBF neural network. In the second phase, the RBF neural network was used to predict the biological activity of various phenols and Rho kinase (ROCK) inhibitors. The predictive ability of the proposed QSAR models was evaluated and compared with other QSAR models using external validation. The results of this study showed that the proposed QSAR modelling approach leads to better performances than other models in predicting the biological activity of chemical compounds. This indicated the efficiency of simple competitive learning networks in determining the centres of RBF neural networks.

  6. The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test.

    Science.gov (United States)

    Parra, Federico; Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan

    2017-04-06

    Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it

  7. Modeling Renewable Penertration Using a Network Economic Model

    Science.gov (United States)

    Lamont, A.

    2001-03-01

    This paper evaluates the accuracy of a network economic modeling approach in designing energy systems having renewable and conventional generators. The network approach models the system as a network of processes such as demands, generators, markets, and resources. The model reaches a solution by exchanging prices and quantity information between the nodes of the system. This formulation is very flexible and takes very little time to build and modify models. This paper reports an experiment designing a system with photovoltaic and base and peak fossil generators. The level of PV penetration as a function of its price and the capacities of the fossil generators were determined using the network approach and using an exact, analytic approach. It is found that the two methods agree very closely in terms of the optimal capacities and are nearly identical in terms of annual system costs.

  8. Emerging trends in evolving networks: Recent behaviour dominant and non-dominant model

    Science.gov (United States)

    Abbas, Khushnood; Shang, Mingsheng; Luo, Xin; Abbasi, Alireza

    2017-10-01

    Novel phenomenon receives similar attention as popular one. Therefore predicting novelty is as important as popularity. Emergence is the side effect of competition and ageing in evolving systems. Recent behaviour or recent link gain in networks plays an important role in emergence. We exploited this wisdom and came up with two models considering different scenarios and systems. Where recent behaviour dominates over total behaviour (total link gain) in the first one, and recent behaviour is as important as total behaviour for future link gain in the second one. It supposes that random walker walks on a network and can jump to any node, the probability of jumping or making a connection to other node is based on which node is recently more active or receiving more links. In our assumption, the random walker can also jump to the node which is already popular but recently not popular. We are able to predict emerging nodes which are generally suppressed under preferential attachment effect. To show the performance of our model we have conducted experiments on four real data sets namely, MovieLens, Netflix, Facebook and Arxiv High Energy Physics paper citation. For testing our model we used four information retrieval indices namely Precision, Novelty, Area Under Receiving Operating Characteristic (AUC) and Kendal's rank correlation coefficient. We have used four benchmark models for validating our proposed models. Although our model does not perform better in all the cases but, it has theoretical significance in working better for recent behaviour dominated systems.

  9. What do we know about maternal-fetal attachment?

    Science.gov (United States)

    Shieh, C; Kravitz, M; Wang, H H

    2001-09-01

    A review of the literature suggests that there are three critical attributes related to the concept of maternal-fetal attachment, including cognitive, affective, and altruistic attachment. Cognitive attachment is the desire to know the baby. Affective attachment is the pleasure associated with thoughts of or interaction with the fetus. Altruistic attachment refers to a desire to protect the unborn child. Existing measurements on maternal-fetal attachment are developed based on low-risk and white pregnant women and previous research has not yet resulted in a consistent theoretical model. Future research should focus on development of culturally sensitive instruments and combining qualitative and quantitative measures to broaden theoretical understanding of the concept. Nursing assessment of maternal-fetal attachment is an on-going process. The nurse's role is to reassure those who have developed attachment to their fetuses and to motivate those who are unaware of or unconcerned about their attachment to their fetuses. Collecting data from different attributes of attachment helps nurses identify each woman's attachment patterns and areas of concern.

  10. Consensus of Multi-Agent Systems with Prestissimo Scale-Free Networks

    International Nuclear Information System (INIS)

    Yang Hongyong; Lu Lan; Cao Kecai; Zhang Siying

    2010-01-01

    In this paper, the relations of the network topology and the moving consensus of multi-agent systems are studied. A consensus-prestissimo scale-free network model with the static preferential-consensus attachment is presented on the rewired link of the regular network. The effects of the static preferential-consensus BA network on the algebraic connectivity of the topology graph are compared with the regular network. The robustness gain to delay is analyzed for variable network topology with the same scale. The time to reach the consensus is studied for the dynamic network with and without communication delays. By applying the computer simulations, it is validated that the speed of the convergence of multi-agent systems can be greatly improved in the preferential-consensus BA network model with different configuration. (interdisciplinary physics and related areas of science and technology)

  11. Ovarian tumor attachment, invasion and vascularization reflect unique microenvironments in the peritoneum:Insights from xenograft and mathematical models

    Directory of Open Access Journals (Sweden)

    Mara P. Steinkamp

    2013-05-01

    Full Text Available Ovarian cancer relapse is often characterized by metastatic spread throughout the peritoneal cavity with tumors attached to multiple organs. In this study, interaction of ovarian tumor cells with the peritoneal tumor microenvironment was evaluated in a xenograft model based on intraperitoneal injection of fluorescent SKOV3.ip1 ovarian cancer cells. Intra-vital microscopy of mixed GFP-RFP cell populations injected into the peritoneum demonstrated that tumor cells aggregate and attach as mixed spheroids, emphasizing the importance of homotypic adhesion in tumor formation. Electron microscopy provided high resolution structural information about local attachment sites. Experimental measurements from the mouse model were used to build a three-dimensional cellular Potts ovarian tumor model (OvTM that examines ovarian tumor cell attachment, chemotaxis, growth and vascularization. OvTM simulations provide insight into the relative influence of tumor cell-cell adhesion, oxygen availability, and local architecture on tumor growth and morphology. Notably, tumors on the mesentery, omentum or spleen readily invade the open architecture, while tumors attached to the gut encounter barriers that restrict invasion and instead rapidly expand into the peritoneal space. Simulations suggest that rapid neovascularization of SKOV3.ip1 tumors is triggered by constitutive release of angiogenic factors in the absence of hypoxia. This research highlights the importance of cellular adhesion and tumor microenvironment in the seeding of secondary ovarian tumors on diverse organs within the peritoneal cavity. Results of the OvTM simulations indicate that invasion is strongly influenced by features underlying the mesothelial lining at different sites, but is also affected by local production of chemotactic factors. The integrated in vivo mouse model and computer simulations provide a unique platform for evaluating targeted therapies for ovarian cancer relapse.

  12. Effects of variable attachment shapes and aligner material on aligner retention.

    Science.gov (United States)

    Dasy, Hiltrud; Dasy, Andreas; Asatrian, Greg; Rózsa, Noémi; Lee, Hao-Fu; Kwak, Jin Hee

    2015-11-01

    To evaluate the retention of four types of aligners on a dental arch with various attachments. For this study, three casts were manufactured, two of which contained attachments (ellipsoid and beveled), and one without any attachments to serve as a control. Four types of aligners were thermoformed: Clear-Aligner (CA)-soft, CA-medium, and CA-hard, with various thicknesses, and Essix ACE. Measurements of vertical displacement force during aligner removal were performed with the Gabo Qualimeter Eplexor. Means and standard deviations were next compared between different aligner thicknesses and attachment shapes. CA-soft, CA-medium, and CA-hard did not present a significant increase in retention, except when used in the presence of attachments. Additionally, CA-medium and CA-hard required significantly more force for removal. Essix ACE demonstrated a significant decrease in retention when used with ellipsoid attachments. The force value for Essix ACE removal from the cast with beveled attachments was comparable to that of CA-medium. Forces for aligner removal from the model without attachments showed a linear trend. Essix ACE did not show a continuous increase in retention for each model. Overall, ellipsoid attachments did not present a significant change in retention. In contrast, beveled attachments improved retention. Ellipsoid attachments had no significant influence on the force required for aligner removal and hence on aligner retention. Essix ACE showed significantly less retention than CA-hard on the models with attachments. Furthermore, beveled attachments were observed to increase retention significantly, compared with ellipsoid attachments and when using no attachments.

  13. Popularity versus similarity in growing networks.

    Science.gov (United States)

    Papadopoulos, Fragkiskos; Kitsak, Maksim; Serrano, M Ángeles; Boguñá, Marián; Krioukov, Dmitri

    2012-09-27

    The principle that 'popularity is attractive' underlies preferential attachment, which is a common explanation for the emergence of scaling in growing networks. If new connections are made preferentially to more popular nodes, then the resulting distribution of the number of connections possessed by nodes follows power laws, as observed in many real networks. Preferential attachment has been directly validated for some real networks (including the Internet), and can be a consequence of different underlying processes based on node fitness, ranking, optimization, random walks or duplication. Here we show that popularity is just one dimension of attractiveness; another dimension is similarity. We develop a framework in which new connections optimize certain trade-offs between popularity and similarity, instead of simply preferring popular nodes. The framework has a geometric interpretation in which popularity preference emerges from local optimization. As opposed to preferential attachment, our optimization framework accurately describes the large-scale evolution of technological (the Internet), social (trust relationships between people) and biological (Escherichia coli metabolic) networks, predicting the probability of new links with high precision. The framework that we have developed can thus be used for predicting new links in evolving networks, and provides a different perspective on preferential attachment as an emergent phenomenon.

  14. Impact of Maternal Attachment Style on Mother to Infant Attachment

    Directory of Open Access Journals (Sweden)

    V Moghaddam Hoseini

    2012-05-01

    Full Text Available

    Background and Objectives: Maternal attachment has the potential to affect both child development and parenting. As such, mother-infant attachment has been considered an important topic in recent years. The aim of this study was to determine the relationship between maternal adult attachment style, the maternal obstetric and demographic characteristics and mother-infant attachment.

     

    Methods: In this descriptive-correlational study, 102 women who had referred to health centers in Mashhad in 2008 and who had inclusion criteriawere selected using stratified cluster sampling. After interview about obstetric and demographic characteristics, they were asked to complete the "Revised Adult Attachment Scale" and "Mother to Infant Attachment Inventory" for assessment of maternal attachment style and mother-infant attachment 4-5 weeks after delivery. Data were analyzed by Pearson Correlation, Kruskal-wallis and Mann-whitney statistical tests.

     

    Results: In this study, themean of mother-infant attachment was found to be 97.48±6.12 and the mean of secure adult attachment was higher than that of other styles (16.89±3.97. Although, there were negative significant relationship between maternal avoidant style and mother-infant attachment (p=0.037,r=-0/20, there were no relationship between maternal age and education, parity, type of delivery and mother-infant attachment.

     

    Conclusion: The results of this research show that maternal attachment style is one of the factors of mother -infant attachment.

  15. Multilevel method for modeling large-scale networks.

    Energy Technology Data Exchange (ETDEWEB)

    Safro, I. M. (Mathematics and Computer Science)

    2012-02-24

    Understanding the behavior of real complex networks is of great theoretical and practical significance. It includes developing accurate artificial models whose topological properties are similar to the real networks, generating the artificial networks at different scales under special conditions, investigating a network dynamics, reconstructing missing data, predicting network response, detecting anomalies and other tasks. Network generation, reconstruction, and prediction of its future topology are central issues of this field. In this project, we address the questions related to the understanding of the network modeling, investigating its structure and properties, and generating artificial networks. Most of the modern network generation methods are based either on various random graph models (reinforced by a set of properties such as power law distribution of node degrees, graph diameter, and number of triangles) or on the principle of replicating an existing model with elements of randomization such as R-MAT generator and Kronecker product modeling. Hierarchical models operate at different levels of network hierarchy but with the same finest elements of the network. However, in many cases the methods that include randomization and replication elements on the finest relationships between network nodes and modeling that addresses the problem of preserving a set of simplified properties do not fit accurately enough the real networks. Among the unsatisfactory features are numerically inadequate results, non-stability of algorithms on real (artificial) data, that have been tested on artificial (real) data, and incorrect behavior at different scales. One reason is that randomization and replication of existing structures can create conflicts between fine and coarse scales of the real network geometry. Moreover, the randomization and satisfying of some attribute at the same time can abolish those topological attributes that have been undefined or hidden from

  16. Research on the model of home networking

    Science.gov (United States)

    Yun, Xiang; Feng, Xiancheng

    2007-11-01

    It is the research hotspot of current broadband network to combine voice service, data service and broadband audio-video service by IP protocol to transport various real time and mutual services to terminal users (home). Home Networking is a new kind of network and application technology which can provide various services. Home networking is called as Digital Home Network. It means that PC, home entertainment equipment, home appliances, Home wirings, security, illumination system were communicated with each other by some composing network technology, constitute a networking internal home, and connect with WAN by home gateway. It is a new network technology and application technology, and can provide many kinds of services inside home or between homes. Currently, home networking can be divided into three kinds: Information equipment, Home appliances, Communication equipment. Equipment inside home networking can exchange information with outer networking by home gateway, this information communication is bidirectional, user can get information and service which provided by public networking by using home networking internal equipment through home gateway connecting public network, meantime, also can get information and resource to control the internal equipment which provided by home networking internal equipment. Based on the general network model of home networking, there are four functional entities inside home networking: HA, HB, HC, and HD. (1) HA (Home Access) - home networking connects function entity; (2) HB (Home Bridge) Home networking bridge connects function entity; (3) HC (Home Client) - Home networking client function entity; (4) HD (Home Device) - decoder function entity. There are many physical ways to implement four function entities. Based on theses four functional entities, there are reference model of physical layer, reference model of link layer, reference model of IP layer and application reference model of high layer. In the future home network

  17. Attachment style and interpersonal trauma in refugees.

    Science.gov (United States)

    Morina, Naser; Schnyder, Ulrich; Schick, Matthis; Nickerson, Angela; Bryant, Richard A

    2016-12-01

    Refugees can suffer many experiences that threaten their trust in others. Although models of refugee mental health have postulated that attachment securities may be damaged by refugee experiences, this has yet to be empirically tested. This study aimed to understand the relationship between the nature of traumatic experiences sustained by refugees and attachment styles. In a cross-sectional study, treatment-seeking refugees (N = 134) were assessed for traumatic exposure using the Harvard Trauma Questionnaire and Posttraumatic Diagnostic Scale. Attachment style was assessed using the Experiences in Close Relationship Scale. Whereas gender and severity of interpersonal traumatic events predicted avoidant attachment style (accounting for 11% of the variance), neither these factors nor non-interpersonal trauma predicted anxious attachment. Exposure to interpersonal traumatic events, including torture, is associated with enduring avoidant attachment tendencies in refugees. This finding accords with attachment theories that prior adverse interpersonal experiences can undermine secure attachment systems, and may promote avoidance of attachment seeking. This finding may point to an important process maintaining poor psychological health in refugees affected by interpersonal trauma. © The Royal Australian and New Zealand College of Psychiatrists 2016.

  18. Identification of Protein Complexes Using Weighted PageRank-Nibble Algorithm and Core-Attachment Structure.

    Science.gov (United States)

    Peng, Wei; Wang, Jianxin; Zhao, Bihai; Wang, Lusheng

    2015-01-01

    Protein complexes play a significant role in understanding the underlying mechanism of most cellular functions. Recently, many researchers have explored computational methods to identify protein complexes from protein-protein interaction (PPI) networks. One group of researchers focus on detecting local dense subgraphs which correspond to protein complexes by considering local neighbors. The drawback of this kind of approach is that the global information of the networks is ignored. Some methods such as Markov Clustering algorithm (MCL), PageRank-Nibble are proposed to find protein complexes based on random walk technique which can exploit the global structure of networks. However, these methods ignore the inherent core-attachment structure of protein complexes and treat adjacent node equally. In this paper, we design a weighted PageRank-Nibble algorithm which assigns each adjacent node with different probability, and propose a novel method named WPNCA to detect protein complex from PPI networks by using weighted PageRank-Nibble algorithm and core-attachment structure. Firstly, WPNCA partitions the PPI networks into multiple dense clusters by using weighted PageRank-Nibble algorithm. Then the cores of these clusters are detected and the rest of proteins in the clusters will be selected as attachments to form the final predicted protein complexes. The experiments on yeast data show that WPNCA outperforms the existing methods in terms of both accuracy and p-value. The software for WPNCA is available at "http://netlab.csu.edu.cn/bioinfomatics/weipeng/WPNCA/download.html".

  19. Network models in economics and finance

    CERN Document Server

    Pardalos, Panos; Rassias, Themistocles

    2014-01-01

    Using network models to investigate the interconnectivity in modern economic systems allows researchers to better understand and explain some economic phenomena. This volume presents contributions by known experts and active researchers in economic and financial network modeling. Readers are provided with an understanding of the latest advances in network analysis as applied to economics, finance, corporate governance, and investments. Moreover, recent advances in market network analysis  that focus on influential techniques for market graph analysis are also examined. Young researchers will find this volume particularly useful in facilitating their introduction to this new and fascinating field. Professionals in economics, financial management, various technologies, and network analysis, will find the network models presented in this book beneficial in analyzing the interconnectivity in modern economic systems.

  20. Attachment-based interventions for families with young children.

    Science.gov (United States)

    Woodhouse, Susan S

    2018-05-21

    Given a large body of research indicating links between child attachment and later mental health outcomes, interventions that promote children's secure attachment to their caregivers have the potential to contribute to prevention of psychopathology and promotion of well-being. A number of attachment-based interventions have been developed to support parents, enhance caregiving quality, and promote children's attachment security with the aim of improving children's mental health. There is now a growing evidence base to support the efficacy of a number of these interventions. The present literature review and introduction to the special issue on attachment-based interventions for families with young children describes key aspects of attachment theory and research that form the theoretical and empirical background for attachment-based interventions, and introduces seven case studies illustrating five different attachment-based interventions. The case studies represent a variety of attachment-based models, including both group and individual treatments, and show applications across a range of caregiver contexts. © 2018 Wiley Periodicals, Inc.

  1. Comparison of kinetic and fluid neutral models for attached and detached state

    International Nuclear Information System (INIS)

    Furubayashi, M.; Hoshino, K.; Toma, M.; Hatayama, A.; Coster, D.; Schneider, R.; Bonnin, X.; Kawashima, H.; Asakura, N.; Suzuki, Y.

    2009-01-01

    Neutral behavior has an important role in the transport simulations of the edge plasma. Most of the edge plasma transport codes treat neutral particles by a simple fluid model or a kinetic model. The fluid model allows faster calculations. However, the applicability of the fluid model is limited. In this study, simulation results of JT-60U from kinetic neutral model and fluid neutral model are compared under the attached and detached state, using the 2D edge plasma code package, SOLPS5.0. In the SOL region, no significant differences are observed in the upstream plasma profiles between kinetic and fluid neutral models. However, in the divertor region, large differences are observed in plasma and neutral profiles. Therefore, further optimization of the fluid neutral model should be performed. Otherwise kinetic neutral model should be used to analyze the divertor region.

  2. Electron attachment cross sections obtained from electron attachment spectroscopy

    International Nuclear Information System (INIS)

    Popp, P.; Baumbach, J.I.; Leonhardt, J.W.; Mothes, S.

    1988-01-01

    Electron capture detectors have a high sensitivity for substances with high thermal electron attachment cross sections. The electron attachment spectroscopy makes it possible to change the mean electron energy in such a way that the maximum for dissociative electron attachment is reached. Thus, best operation modes of the detection system as well as significant dependencies of electron attachment coefficients are available. Cross sections for electron attachment as a function of the electron energy are obtained with the knowledge of electron energy distribution functions from Boltzmann equation analysis by a special computer code. A disadvantage of this electron attachment spectroscopy is the superposition of space charge effects due to the decrease of the electron drift velocity with increasing mean electron energy. These influences are discussed. (author)

  3. Exploring the relationships among attachment, emotional intelligence and communication.

    Science.gov (United States)

    Cherry, M Gemma; Fletcher, Ian; O'Sullivan, Helen

    2013-03-01

    Attachment style has been shown to influence both emotional intelligence (EI) and the clinical communication of medical students and doctors. No research has assessed the relationships among attachment, EI and clinical communication in medical students. This study was conducted to evaluate the effect of EI on the relationship between medical students' attachment style and clinical communication. Medical students were invited to complete measures of attachment (using the Experiences in Close Relationships-Short Form [ECR-SF], a 12-item measure that provides attachment avoidance and attachment anxiety dimensional scores) and EI (using the Mayer-Salovey-Caruso Emotional Intelligence Test [MSCEIT], a 141-item measure of the perception, use, understanding and management of emotions) at the end of Year 1, prior to a summative objective structured clinical examination (OSCE). Clinical communication was assessed using OSCE scores. Structural equation modelling (SEM) was used to analyse a hypothetical model of the relationships among attachment style, EI and clinical communication. A total of 200 of 358 (55.9%) students participated. Attachment avoidance was significantly negatively correlated with total EI scores (r=-0.28, pcommunication. © Blackwell Publishing Ltd 2013.

  4. Complex networks under dynamic repair model

    Science.gov (United States)

    Chaoqi, Fu; Ying, Wang; Kun, Zhao; Yangjun, Gao

    2018-01-01

    Invulnerability is not the only factor of importance when considering complex networks' security. It is also critical to have an effective and reasonable repair strategy. Existing research on network repair is confined to the static model. The dynamic model makes better use of the redundant capacity of repaired nodes and repairs the damaged network more efficiently than the static model; however, the dynamic repair model is complex and polytropic. In this paper, we construct a dynamic repair model and systematically describe the energy-transfer relationships between nodes in the repair process of the failure network. Nodes are divided into three types, corresponding to three structures. We find that the strong coupling structure is responsible for secondary failure of the repaired nodes and propose an algorithm that can select the most suitable targets (nodes or links) to repair the failure network with minimal cost. Two types of repair strategies are identified, with different effects under the two energy-transfer rules. The research results enable a more flexible approach to network repair.

  5. Adaptive-network models of collective dynamics

    Science.gov (United States)

    Zschaler, G.

    2012-09-01

    Complex systems can often be modelled as networks, in which their basic units are represented by abstract nodes and the interactions among them by abstract links. This network of interactions is the key to understanding emergent collective phenomena in such systems. In most cases, it is an adaptive network, which is defined by a feedback loop between the local dynamics of the individual units and the dynamical changes of the network structure itself. This feedback loop gives rise to many novel phenomena. Adaptive networks are a promising concept for the investigation of collective phenomena in different systems. However, they also present a challenge to existing modelling approaches and analytical descriptions due to the tight coupling between local and topological degrees of freedom. In this work, which is essentially my PhD thesis, I present a simple rule-based framework for the investigation of adaptive networks, using which a wide range of collective phenomena can be modelled and analysed from a common perspective. In this framework, a microscopic model is defined by the local interaction rules of small network motifs, which can be implemented in stochastic simulations straightforwardly. Moreover, an approximate emergent-level description in terms of macroscopic variables can be derived from the microscopic rules, which we use to analyse the system's collective and long-term behaviour by applying tools from dynamical systems theory. We discuss three adaptive-network models for different collective phenomena within our common framework. First, we propose a novel approach to collective motion in insect swarms, in which we consider the insects' adaptive interaction network instead of explicitly tracking their positions and velocities. We capture the experimentally observed onset of collective motion qualitatively in terms of a bifurcation in this non-spatial model. We find that three-body interactions are an essential ingredient for collective motion to emerge

  6. Superego: an attachment perspective.

    Science.gov (United States)

    Holmes, Jeremy

    2011-10-01

    With the help of attachment theory and research, the paper attempts to broaden and build on classical and current views on the superego. Attachment theory's epigenetic approach and the concept of the subliminal superego are described. The superego, it is argued, is as much concerned with safety as sex. The superego is 'heir', not just to the Oedipus complex or Klein's pre-oedipal constellation, but also to the attachment relationship. Under favourable developmental conditions a 'mature superego' emerges, facilitating, in the presence of an internal secure base, maturational boundary crossings towards adult sexuality. In the light of the above, the paper reviews Lear's updating of Strachey's model of psychic change and explores the concept of transgression in relation to the 'professional superego', its development and maturation. Theoretical arguments are illustrated with clinical examples. Copyright © 2011 Institute of Psychoanalysis.

  7. Linear approximation model network and its formation via ...

    Indian Academy of Sciences (India)

    To overcome the deficiency of `local model network' (LMN) techniques, an alternative `linear approximation model' (LAM) network approach is proposed. Such a network models a nonlinear or practical system with multiple linear models fitted along operating trajectories, where individual models are simply networked ...

  8. The Dynamics of Power laws: Fitness and Aging in Preferential Attachment Trees

    Science.gov (United States)

    Garavaglia, Alessandro; van der Hofstad, Remco; Woeginger, Gerhard

    2017-09-01

    Continuous-time branching processes describe the evolution of a population whose individuals generate a random number of children according to a birth process. Such branching processes can be used to understand preferential attachment models in which the birth rates are linear functions. We are motivated by citation networks, where power-law citation counts are observed as well as aging in the citation patterns. To model this, we introduce fitness and age-dependence in these birth processes. The multiplicative fitness moderates the rate at which children are born, while the aging is integrable, so that individuals receives a finite number of children in their lifetime. We show the existence of a limiting degree distribution for such processes. In the preferential attachment case, where fitness and aging are absent, this limiting degree distribution is known to have power-law tails. We show that the limiting degree distribution has exponential tails for bounded fitnesses in the presence of integrable aging, while the power-law tail is restored when integrable aging is combined with fitness with unbounded support with at most exponential tails. In the absence of integrable aging, such processes are explosive.

  9. Modelling the structure of complex networks

    DEFF Research Database (Denmark)

    Herlau, Tue

    networks has been independently studied as mathematical objects in their own right. As such, there has been both an increased demand for statistical methods for complex networks as well as a quickly growing mathematical literature on the subject. In this dissertation we explore aspects of modelling complex....... The next chapters will treat some of the various symmetries, representer theorems and probabilistic structures often deployed in the modelling complex networks, the construction of sampling methods and various network models. The introductory chapters will serve to provide context for the included written...

  10. Parenting self-efficacy moderates linkage between partner relationship dissatisfaction and avoidant infant-mother attachment: A Dutch study

    NARCIS (Netherlands)

    Casse, J.; Oosterman, M.; Schuengel, C.

    2016-01-01

    The early infant-mother attachment relationship is part of a network of close relationships in which the relationship between parents is especially relevant. Evidence for linkages between maternal satisfaction with the partner relationship and infant-mother attachment is equivocal. The current study

  11. Spatial Epidemic Modelling in Social Networks

    Science.gov (United States)

    Simoes, Joana Margarida

    2005-06-01

    The spread of infectious diseases is highly influenced by the structure of the underlying social network. The target of this study is not the network of acquaintances, but the social mobility network: the daily movement of people between locations, in regions. It was already shown that this kind of network exhibits small world characteristics. The model developed is agent based (ABM) and comprehends a movement model and a infection model. In the movement model, some assumptions are made about its structure and the daily movement is decomposed into four types: neighborhood, intra region, inter region and random. The model is Geographical Information Systems (GIS) based, and uses real data to define its geometry. Because it is a vector model, some optimization techniques were used to increase its efficiency.

  12. Simple One-Dimensional Quantum-Mechanical Model for a Particle Attached to a Surface

    Science.gov (United States)

    Fernandez, Francisco M.

    2010-01-01

    We present a simple one-dimensional quantum-mechanical model for a particle attached to a surface. It leads to the Schrodinger equation for a harmonic oscillator bounded on one side that we solve in terms of Weber functions and discuss the behaviour of the eigenvalues and eigenfunctions. We derive the virial theorem and other exact relationships…

  13. Modeling of fluctuating reaction networks

    International Nuclear Information System (INIS)

    Lipshtat, A.; Biham, O.

    2004-01-01

    Full Text:Various dynamical systems are organized as reaction networks, where the population size of one component affects the populations of all its neighbors. Such networks can be found in interstellar surface chemistry, cell biology, thin film growth and other systems. I cases where the populations of reactive species are large, the network can be modeled by rate equations which provide all reaction rates within mean field approximation. However, in small systems that are partitioned into sub-micron size, these populations strongly fluctuate. Under these conditions rate equations fail and the master equation is needed for modeling these reactions. However, the number of equations in the master equation grows exponentially with the number of reactive species, severely limiting its feasibility for complex networks. Here we present a method which dramatically reduces the number of equations, thus enabling the incorporation of the master equation in complex reaction networks. The method is examplified in the context of reaction network on dust grains. Its applicability for genetic networks will be discussed. 1. Efficient simulations of gas-grain chemistry in interstellar clouds. Azi Lipshtat and Ofer Biham, Phys. Rev. Lett. 93 (2004), 170601. 2. Modeling of negative autoregulated genetic networks in single cells. Azi Lipshtat, Hagai B. Perets, Nathalie Q. Balaban and Ofer Biham, Gene: evolutionary genomics (2004), In press

  14. Deterministic ripple-spreading model for complex networks.

    Science.gov (United States)

    Hu, Xiao-Bing; Wang, Ming; Leeson, Mark S; Hines, Evor L; Di Paolo, Ezequiel

    2011-04-01

    This paper proposes a deterministic complex network model, which is inspired by the natural ripple-spreading phenomenon. The motivations and main advantages of the model are the following: (i) The establishment of many real-world networks is a dynamic process, where it is often observed that the influence of a few local events spreads out through nodes, and then largely determines the final network topology. Obviously, this dynamic process involves many spatial and temporal factors. By simulating the natural ripple-spreading process, this paper reports a very natural way to set up a spatial and temporal model for such complex networks. (ii) Existing relevant network models are all stochastic models, i.e., with a given input, they cannot output a unique topology. Differently, the proposed ripple-spreading model can uniquely determine the final network topology, and at the same time, the stochastic feature of complex networks is captured by randomly initializing ripple-spreading related parameters. (iii) The proposed model can use an easily manageable number of ripple-spreading related parameters to precisely describe a network topology, which is more memory efficient when compared with traditional adjacency matrix or similar memory-expensive data structures. (iv) The ripple-spreading model has a very good potential for both extensions and applications.

  15. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  16. Neural network modeling of emotion

    Science.gov (United States)

    Levine, Daniel S.

    2007-03-01

    This article reviews the history and development of computational neural network modeling of cognitive and behavioral processes that involve emotion. The exposition starts with models of classical conditioning dating from the early 1970s. Then it proceeds toward models of interactions between emotion and attention. Then models of emotional influences on decision making are reviewed, including some speculative (not and not yet simulated) models of the evolution of decision rules. Through the late 1980s, the neural networks developed to model emotional processes were mainly embodiments of significant functional principles motivated by psychological data. In the last two decades, network models of these processes have become much more detailed in their incorporation of known physiological properties of specific brain regions, while preserving many of the psychological principles from the earlier models. Most network models of emotional processes so far have dealt with positive and negative emotion in general, rather than specific emotions such as fear, joy, sadness, and anger. But a later section of this article reviews a few models relevant to specific emotions: one family of models of auditory fear conditioning in rats, and one model of induced pleasure enhancing creativity in humans. Then models of emotional disorders are reviewed. The article concludes with philosophical statements about the essential contributions of emotion to intelligent behavior and the importance of quantitative theories and models to the interdisciplinary enterprise of understanding the interactions of emotion, cognition, and behavior.

  17. An acoustical model based monitoring network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der

    2010-01-01

    In this paper the approach for an acoustical model based monitoring network is demonstrated. This network is capable of reconstructing a noise map, based on the combination of measured sound levels and an acoustic model of the area. By pre-calculating the sound attenuation within the network the

  18. Attachment, hope, and participation: Testing an expanded model of Snyder's hope theory for prediction of participation for individuals with spinal cord injury.

    Science.gov (United States)

    Blake, John; Yaghmaian, Rana; Brooks, Jessica; Fais, Connor; Chan, Fong

    2018-05-01

    The aim of the study was to test an expanded model of Snyder's hope theory for prediction of participation for individuals with spinal cord injury (SCI). Statistical model testing focused on evaluation of hope theory constructs (i.e., agency thoughts and pathways thoughts) as serial mediators of relationships between attachment and community participation. Quantitative, cross-sectional, descriptive design using multiple regression and correlational techniques. The sample comprised 108 persons with SCI recruited from spinal cord injury advocacy organizations in the United States, the United Kingdom, and Canada. Secure attachment, avoidant attachment, anxious attachment, and the hope constructs were significantly related to participation. Significant mediational effects were observed when agency thoughts and pathways thoughts were specified as mediators in series between attachment and community participation for people with SCI (i.e., agency specified as M1 and pathways specified as M2). Results provide support for Snyder's theoretical conceptualization and the use of hope-based interventions by rehabilitation practitioners for improving global participation outcomes for people with SCI who experience attachment-related difficulties. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  19. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  20. Attachment and prejudice.

    Science.gov (United States)

    Carnelley, Katherine B; Boag, Elle M

    2018-04-16

    There is a paucity of research that examines prejudice from an attachment theory perspective. Herein we make theoretical links between attachment patterns and levels of prejudice. Perceptions of outgroup threat, which activate the attachment system, are thought to lead to fear and prejudice for those high in attachment anxiety, and to distancing and prejudice for those high in attachment avoidance. We review the literature that examines the associations between attachment patterns and prejudice; evidence from attachment priming studies suggests a causal role of attachment security in reducing prejudice. We identify several mediators of these links: empathy, negative emotions, trust, social dominance orientation, romanticism, and contact quality. Future research should manipulate potential mediators and use psychophysiological assessments of threat. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. American College Football Division I Team Attachment: A Model for Sponsorship Effectiveness

    Directory of Open Access Journals (Sweden)

    Hsin-Chung Chen

    2013-10-01

    Full Text Available The purpose of this study was to examine sponsorship effectiveness at the Division I level, including the relationship between fans and sponsors. To collect the necessary data, the 13-item questionnaire was disseminated at two college football games by volunteer sampling at three Division I universities in the United States. With a total of 407 respondents, LISREL 8.52 and SPSS 17.0 were used to analyze the data for descriptive statistics, CFA, and SEM. By utilizing SEM, the variables of team attachment, sponsor image, word of mouth, and purchase intentions fit the proposed model.  Pragmatically, the significance of team attachment can be understated in its role as an initial construct to begin the sponsorship process. Considering the construct of sponsor image as a mediating variable, sponsor image played an important role to anticipate an increase in positive word of mouth or an increase in consumer purchase intentions.

  2. Discriminative topological features reveal biological network mechanisms

    Directory of Open Access Journals (Sweden)

    Levovitz Chaya

    2004-11-01

    Full Text Available Abstract Background Recent genomic and bioinformatic advances have motivated the development of numerous network models intending to describe graphs of biological, technological, and sociological origin. In most cases the success of a model has been evaluated by how well it reproduces a few key features of the real-world data, such as degree distributions, mean geodesic lengths, and clustering coefficients. Often pairs of models can reproduce these features with indistinguishable fidelity despite being generated by vastly different mechanisms. In such cases, these few target features are insufficient to distinguish which of the different models best describes real world networks of interest; moreover, it is not clear a priori that any of the presently-existing algorithms for network generation offers a predictive description of the networks inspiring them. Results We present a method to assess systematically which of a set of proposed network generation algorithms gives the most accurate description of a given biological network. To derive discriminative classifiers, we construct a mapping from the set of all graphs to a high-dimensional (in principle infinite-dimensional "word space". This map defines an input space for classification schemes which allow us to state unambiguously which models are most descriptive of a given network of interest. Our training sets include networks generated from 17 models either drawn from the literature or introduced in this work. We show that different duplication-mutation schemes best describe the E. coli genetic network, the S. cerevisiae protein interaction network, and the C. elegans neuronal network, out of a set of network models including a linear preferential attachment model and a small-world model. Conclusions Our method is a first step towards systematizing network models and assessing their predictability, and we anticipate its usefulness for a number of communities.

  3. Attachment and eating disorders: a research update.

    Science.gov (United States)

    Tasca, Giorgio A

    2018-03-16

    Prominent models of eating disorders tend to focus on cognitive and behavioral features, but tend not to consider important developmental issues related to affect regulation, interpersonal style, self concept, and mentalization-all of which are well conceptualized within attachment theory. Higher levels of attachment insecurity across diagnoses are related to greater eating disorder symptoms. Low parental care and early trauma may lead to attachment insecurity that then might lead to greater eating disorder symptoms. The association between insecure attachment and eating disorder severity is likely mediated by affect dysregulation and perfectionism. Recent research using the Adult Attachment Interview highlights the importance of reflective functioning in predicting treatment response and therapeutic processes, and on the utility of therapies that increase mentalization. Copyright © 2018 Elsevier Ltd. All rights reserved.

  4. Persistence in a single species CSTR model with suspended flocs and wall attached biofilms.

    Science.gov (United States)

    Mašić, Alma; Eberl, Hermann J

    2012-04-01

    We consider a mathematical model for a bacterial population in a continuously stirred tank reactor (CSTR) with wall attachment. This is a modification of the Freter model, in which we model the sessile bacteria as a microbial biofilm. Our analysis indicates that the results of the algebraically simpler original Freter model largely carry over. In a computational simulation study, we find that the vast majority of bacteria in the reactor will eventually be sessile. However, we also find that suspended biomass is relatively more efficient in removing substrate from the reactor than biofilm bacteria.

  5. Modeling the interdependent network based on two-mode networks

    Science.gov (United States)

    An, Feng; Gao, Xiangyun; Guan, Jianhe; Huang, Shupei; Liu, Qian

    2017-10-01

    Among heterogeneous networks, there exist obviously and closely interdependent linkages. Unlike existing research primarily focus on the theoretical research of physical interdependent network model. We propose a two-layer interdependent network model based on two-mode networks to explore the interdependent features in the reality. Specifically, we construct a two-layer interdependent loan network and develop several dependent features indices. The model is verified to enable us to capture the loan dependent features of listed companies based on loan behaviors and shared shareholders. Taking Chinese debit and credit market as case study, the main conclusions are: (1) only few listed companies shoulder the main capital transmission (20% listed companies occupy almost 70% dependent degree). (2) The control of these key listed companies will be more effective of avoiding the spreading of financial risks. (3) Identifying the companies with high betweenness centrality and controlling them could be helpful to monitor the financial risk spreading. (4) The capital transmission channel among Chinese financial listed companies and Chinese non-financial listed companies are relatively strong. However, under greater pressure of demand of capital transmission (70% edges failed), the transmission channel, which constructed by debit and credit behavior, will eventually collapse.

  6. Entropy Characterization of Random Network Models

    Directory of Open Access Journals (Sweden)

    Pedro J. Zufiria

    2017-06-01

    Full Text Available This paper elaborates on the Random Network Model (RNM as a mathematical framework for modelling and analyzing the generation of complex networks. Such framework allows the analysis of the relationship between several network characterizing features (link density, clustering coefficient, degree distribution, connectivity, etc. and entropy-based complexity measures, providing new insight on the generation and characterization of random networks. Some theoretical and computational results illustrate the utility of the proposed framework.

  7. The model of social crypto-network

    Directory of Open Access Journals (Sweden)

    Марк Миколайович Орел

    2015-06-01

    Full Text Available The article presents the theoretical model of social network with the enhanced mechanism of privacy policy. It covers the problems arising in the process of implementing the mentioned type of network. There are presented the methods of solving problems arising in the process of building the social network with privacy policy. It was built a theoretical model of social networks with enhanced information protection methods based on information and communication blocks

  8. Effects of Teacher Attachment History on Teacher-Child Relationships.

    Science.gov (United States)

    Kesner, John E.

    Attachment theory posits that intimate relationships (especially during early childhood) have an influence on future social functioning. Children construct an "internal working model" of a relationship which is influenced by the nature and quality of primary attachment relationships. This model then serves as a foundation for future…

  9. Towards reproducible descriptions of neuronal network models.

    Directory of Open Access Journals (Sweden)

    Eilen Nordlie

    2009-08-01

    Full Text Available Progress in science depends on the effective exchange of ideas among scientists. New ideas can be assessed and criticized in a meaningful manner only if they are formulated precisely. This applies to simulation studies as well as to experiments and theories. But after more than 50 years of neuronal network simulations, we still lack a clear and common understanding of the role of computational models in neuroscience as well as established practices for describing network models in publications. This hinders the critical evaluation of network models as well as their re-use. We analyze here 14 research papers proposing neuronal network models of different complexity and find widely varying approaches to model descriptions, with regard to both the means of description and the ordering and placement of material. We further observe great variation in the graphical representation of networks and the notation used in equations. Based on our observations, we propose a good model description practice, composed of guidelines for the organization of publications, a checklist for model descriptions, templates for tables presenting model structure, and guidelines for diagrams of networks. The main purpose of this good practice is to trigger a debate about the communication of neuronal network models in a manner comprehensible to humans, as opposed to machine-readable model description languages. We believe that the good model description practice proposed here, together with a number of other recent initiatives on data-, model-, and software-sharing, may lead to a deeper and more fruitful exchange of ideas among computational neuroscientists in years to come. We further hope that work on standardized ways of describing--and thinking about--complex neuronal networks will lead the scientific community to a clearer understanding of high-level concepts in network dynamics, and will thus lead to deeper insights into the function of the brain.

  10. Designing Network-based Business Model Ontology

    DEFF Research Database (Denmark)

    Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz

    2015-01-01

    Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....

  11. An Improved Car-Following Model in Vehicle Networking Based on Network Control

    Directory of Open Access Journals (Sweden)

    D. Y. Kong

    2014-01-01

    Full Text Available Vehicle networking is a system to realize information interoperability between vehicles and people, vehicles and roads, vehicles and vehicles, and cars and transport facilities, through the network information exchange, in order to achieve the effective monitoring of the vehicle and traffic flow. Realizing information interoperability between vehicles and vehicles, which can affect the traffic flow, is an important application of network control system (NCS. In this paper, a car-following model using vehicle networking theory is established, based on network control principle. The car-following model, which is an improvement of the traditional traffic model, describes the traffic in vehicle networking condition. The impact that vehicle networking has on the traffic flow is quantitatively assessed in a particular scene of one-way, no lane changing highway. The examples show that the capacity of the road is effectively enhanced by using vehicle networking.

  12. Multiplicative Attribute Graph Model of Real-World Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Myunghwan [Stanford Univ., CA (United States); Leskovec, Jure [Stanford Univ., CA (United States)

    2010-10-20

    Large scale real-world network data, such as social networks, Internet andWeb graphs, is ubiquitous in a variety of scientific domains. The study of such social and information networks commonly finds patterns and explain their emergence through tractable models. In most networks, especially in social networks, nodes also have a rich set of attributes (e.g., age, gender) associatedwith them. However, most of the existing network models focus only on modeling the network structure while ignoring the features of nodes in the network. Here we present a class of network models that we refer to as the Multiplicative Attribute Graphs (MAG), which naturally captures the interactions between the network structure and node attributes. We consider a model where each node has a vector of categorical features associated with it. The probability of an edge between a pair of nodes then depends on the product of individual attributeattribute similarities. The model yields itself to mathematical analysis as well as fit to real data. We derive thresholds for the connectivity, the emergence of the giant connected component, and show that the model gives rise to graphs with a constant diameter. Moreover, we analyze the degree distribution to show that the model can produce networks with either lognormal or power-law degree distribution depending on certain conditions.

  13. Attachment Theory and Neuroscience for Care Managers.

    Science.gov (United States)

    Blakely, Thomas J; Dziadosz, Gregory M

    2016-09-01

    This article describes a model for care managers that is based on attachment theory supplemented by knowledge from neuroscience. Together, attachment theory and basic knowledge from neuroscience provide for both an organizing conceptual framework and a scientific, measureable approach to assessment and planning interventions in a care plan.

  14. Developing Personal Network Business Models

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    2006-01-01

    The aim of the paper is to examine the issue of business modeling in relation to personal networks, PNs. The paper builds on research performed on business models in the EU 1ST MAGNET1 project (My personal Adaptive Global NET). The paper presents the Personal Network concept and briefly reports...

  15. The US nuclear reaction data network. Summary of the first meeting, March 13 ampersand 14 1996

    International Nuclear Information System (INIS)

    1996-03-01

    The first meeting of the US Nuclear Reaction Data Network (USNRDN) was held at the Colorado School of Mines, March 13-14, 1996 chaired by F. Edward Cecil. The Agenda of the meeting is attached. The Network, its mission, products and services; related nuclear data and data networks, members, and organization are described in Attachment 1. The following progress reports from the members of the USNRDN were distributed prior to the meeting and are given as Attachment 2. (1) Measurements and Development of Analytic Techniques for Basic Nuclear Physics and Nuclear Applications; (2) Nuclear Reaction Data Activities at the National Nuclear Data Center; (3) Studies of nuclear reactions at very low energies; (4) Nuclear Reaction Data Activities, Nuclear Data Group; (5) Progress in Neutron Physics at Los Alamos - Experiments; (6) Nuclear Reaction Data Activities in Group T2; (7) Progress Report for the US Nuclear Reaction Data Network Meeting; (8) Nuclear Astrophysics Research Group (ORNL); (9) Progress Report from Ohio University; (10) Exciton Model Phenomenology; and (11) Progress Report for Coordination Meeting USNRDN

  16. A novel Direct Small World network model

    Directory of Open Access Journals (Sweden)

    LIN Tao

    2016-10-01

    Full Text Available There is a certain degree of redundancy and low efficiency of existing computer networks.This paper presents a novel Direct Small World network model in order to optimize networks.In this model,several nodes construct a regular network.Then,randomly choose and replot some nodes to generate Direct Small World network iteratively.There is no change in average distance and clustering coefficient.However,the network performance,such as hops,is improved.The experiments prove that compared to traditional small world network,the degree,average of degree centrality and average of closeness centrality are lower in Direct Small World network.This illustrates that the nodes in Direct Small World networks are closer than Watts-Strogatz small world network model.The Direct Small World can be used not only in the communication of the community information,but also in the research of epidemics.

  17. Generating random networks and graphs

    CERN Document Server

    Coolen, Ton; Roberts, Ekaterina

    2017-01-01

    This book supports researchers who need to generate random networks, or who are interested in the theoretical study of random graphs. The coverage includes exponential random graphs (where the targeted probability of each network appearing in the ensemble is specified), growth algorithms (i.e. preferential attachment and the stub-joining configuration model), special constructions (e.g. geometric graphs and Watts Strogatz models) and graphs on structured spaces (e.g. multiplex networks). The presentation aims to be a complete starting point, including details of both theory and implementation, as well as discussions of the main strengths and weaknesses of each approach. It includes extensive references for readers wishing to go further. The material is carefully structured to be accessible to researchers from all disciplines while also containing rigorous mathematical analysis (largely based on the techniques of statistical mechanics) to support those wishing to further develop or implement the theory of rand...

  18. Non-consensus Opinion Models on Complex Networks

    Science.gov (United States)

    Li, Qian; Braunstein, Lidia A.; Wang, Huijuan; Shao, Jia; Stanley, H. Eugene; Havlin, Shlomo

    2013-04-01

    Social dynamic opinion models have been widely studied to understand how interactions among individuals cause opinions to evolve. Most opinion models that utilize spin interaction models usually produce a consensus steady state in which only one opinion exists. Because in reality different opinions usually coexist, we focus on non-consensus opinion models in which above a certain threshold two opinions coexist in a stable relationship. We revisit and extend the non-consensus opinion (NCO) model introduced by Shao et al. (Phys. Rev. Lett. 103:01870, 2009). The NCO model in random networks displays a second order phase transition that belongs to regular mean field percolation and is characterized by the appearance (above a certain threshold) of a large spanning cluster of the minority opinion. We generalize the NCO model by adding a weight factor W to each individual's original opinion when determining their future opinion (NCO W model). We find that as W increases the minority opinion holders tend to form stable clusters with a smaller initial minority fraction than in the NCO model. We also revisit another non-consensus opinion model based on the NCO model, the inflexible contrarian opinion (ICO) model (Li et al. in Phys. Rev. E 84:066101, 2011), which introduces inflexible contrarians to model the competition between two opinions in a steady state. Inflexible contrarians are individuals that never change their original opinion but may influence the opinions of others. To place the inflexible contrarians in the ICO model we use two different strategies, random placement and one in which high-degree nodes are targeted. The inflexible contrarians effectively decrease the size of the largest rival-opinion cluster in both strategies, but the effect is more pronounced under the targeted method. All of the above models have previously been explored in terms of a single network, but human communities are usually interconnected, not isolated. Because opinions propagate not

  19. Attachment of Salmonella spp. to pork meat

    DEFF Research Database (Denmark)

    Hansen, Trine; Riber, Leise; Löfström, Charlotta

    2011-01-01

    Five strains of Salmonella, one wildtype and four knock-out mutants (the prg, flhDC, yhjH and fliC genes) were investigated based on their probability to attach and subsequently detach from a surface of pork fillet. The attachment followed by detachment was measured and modelled for two different...

  20. Exploring attachment to the "homeland" and its association with heritage culture identification.

    Directory of Open Access Journals (Sweden)

    Nelli Ferenczi

    Full Text Available Conceptualisations of attachment to one's nation of origin reflecting a symbolic caregiver can be found cross-culturally in literature, art, and language. Despite its prevalence, the relationship with one's nation has not been investigated empirically in terms of an attachment theory framework. Two studies employed an attachment theory approach to investigate the construct validity of symbolic attachment to one's nation of origin, and its association with acculturation (operationalized as heritage and mainstream culture identification. Results for Study 1 indicated a three-factor structure of nation attachment; the factors were labelled secure-preoccupied, fearful, and dismissive nation attachment. Hierarchical linear modelling was employed to control for differing cultures across participants. Secure-preoccupied nation attachment was a significant predictor of increased heritage culture identification for participants residing in their country of birth, whilst dismissive nation attachment was a significant predictor of decreased heritage culture identification for international migrants. Secure-preoccupied nation attachment was also associated with higher levels of subjective-wellbeing. Study 2 further confirmed the validity of the nation attachment construct through confirmatory factor analysis; the three-factor model adequately fit the data. Similar to the results of Study 1, secure-preoccupied nation attachment was associated with increased levels of heritage culture identification and psychological well-being. Implications of the tripartite model of nation attachment for identity and well-being will be discussed.

  1. A comprehensive probabilistic analysis model of oil pipelines network based on Bayesian network

    Science.gov (United States)

    Zhang, C.; Qin, T. X.; Jiang, B.; Huang, C.

    2018-02-01

    Oil pipelines network is one of the most important facilities of energy transportation. But oil pipelines network accident may result in serious disasters. Some analysis models for these accidents have been established mainly based on three methods, including event-tree, accident simulation and Bayesian network. Among these methods, Bayesian network is suitable for probabilistic analysis. But not all the important influencing factors are considered and the deployment rule of the factors has not been established. This paper proposed a probabilistic analysis model of oil pipelines network based on Bayesian network. Most of the important influencing factors, including the key environment condition and emergency response are considered in this model. Moreover, the paper also introduces a deployment rule for these factors. The model can be used in probabilistic analysis and sensitive analysis of oil pipelines network accident.

  2. Network structure exploration via Bayesian nonparametric models

    International Nuclear Information System (INIS)

    Chen, Y; Wang, X L; Xiang, X; Tang, B Z; Bu, J Z

    2015-01-01

    Complex networks provide a powerful mathematical representation of complex systems in nature and society. To understand complex networks, it is crucial to explore their internal structures, also called structural regularities. The task of network structure exploration is to determine how many groups there are in a complex network and how to group the nodes of the network. Most existing structure exploration methods need to specify either a group number or a certain type of structure when they are applied to a network. In the real world, however, the group number and also the certain type of structure that a network has are usually unknown in advance. To explore structural regularities in complex networks automatically, without any prior knowledge of the group number or the certain type of structure, we extend a probabilistic mixture model that can handle networks with any type of structure but needs to specify a group number using Bayesian nonparametric theory. We also propose a novel Bayesian nonparametric model, called the Bayesian nonparametric mixture (BNPM) model. Experiments conducted on a large number of networks with different structures show that the BNPM model is able to explore structural regularities in networks automatically with a stable, state-of-the-art performance. (paper)

  3. The value of less connected agents in Boolean networks

    Science.gov (United States)

    Epstein, Daniel; Bazzan, Ana L. C.

    2013-11-01

    In multiagent systems, agents often face binary decisions where one seeks to take either the minority or the majority side. Examples are minority and congestion games in general, i.e., situations that require coordination among the agents in order to depict efficient decisions. In minority games such as the El Farol Bar Problem, previous works have shown that agents may reach appropriate levels of coordination, mostly by looking at the history of past decisions. Not many works consider any kind of structure of the social network, i.e., how agents are connected. Moreover, when structure is indeed considered, it assumes some kind of random network with a given, fixed connectivity degree. The present paper departs from the conventional approach in some ways. First, it considers more realistic network topologies, based on preferential attachments. This is especially useful in social networks. Second, the formalism of random Boolean networks is used to help agents to make decisions given their attachments (for example acquaintances). This is coupled with a reinforcement learning mechanism that allows agents to select strategies that are locally and globally efficient. Third, we use agent-based modeling and simulation, a microscopic approach, which allows us to draw conclusions about individuals and/or classes of individuals. Finally, for the sake of illustration we use two different scenarios, namely the El Farol Bar Problem and a binary route choice scenario. With this approach we target systems that adapt dynamically to changes in the environment, including other adaptive decision-makers. Our results using preferential attachments and random Boolean networks are threefold. First we show that an efficient equilibrium can be achieved, provided agents do experimentation. Second, microscopic analysis show that influential agents tend to consider few inputs in their Boolean functions. Third, we have also conducted measurements related to network clustering and centrality

  4. Homophyly/Kinship Model: Naturally Evolving Networks

    Science.gov (United States)

    Li, Angsheng; Li, Jiankou; Pan, Yicheng; Yin, Xianchen; Yong, Xi

    2015-10-01

    It has been a challenge to understand the formation and roles of social groups or natural communities in the evolution of species, societies and real world networks. Here, we propose the hypothesis that homophyly/kinship is the intrinsic mechanism of natural communities, introduce the notion of the affinity exponent and propose the homophyly/kinship model of networks. We demonstrate that the networks of our model satisfy a number of topological, probabilistic and combinatorial properties and, in particular, that the robustness and stability of natural communities increase as the affinity exponent increases and that the reciprocity of the networks in our model decreases as the affinity exponent increases. We show that both homophyly/kinship and reciprocity are essential to the emergence of cooperation in evolutionary games and that the homophyly/kinship and reciprocity determined by the appropriate affinity exponent guarantee the emergence of cooperation in evolutionary games, verifying Darwin’s proposal that kinship and reciprocity are the means of individual fitness. We propose the new principle of structure entropy minimisation for detecting natural communities of networks and verify the functional module property and characteristic properties by a healthy tissue cell network, a citation network, some metabolic networks and a protein interaction network.

  5. Modeling, robust and distributed model predictive control for freeway networks

    NARCIS (Netherlands)

    Liu, S.

    2016-01-01

    In Model Predictive Control (MPC) for traffic networks, traffic models are crucial since they are used as prediction models for determining the optimal control actions. In order to reduce the computational complexity of MPC for traffic networks, macroscopic traffic models are often used instead of

  6. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  7. Tool wear modeling using abductive networks

    Science.gov (United States)

    Masory, Oren

    1992-09-01

    A tool wear model based on Abductive Networks, which consists of a network of `polynomial' nodes, is described. The model relates the cutting parameters, components of the cutting force, and machining time to flank wear. Thus real time measurements of the cutting force can be used to monitor the machining process. The model is obtained by a training process in which the connectivity between the network's nodes and the polynomial coefficients of each node are determined by optimizing a performance criteria. Actual wear measurements of coated and uncoated carbide inserts were used for training and evaluating the established model.

  8. Biological transportation networks: Modeling and simulation

    KAUST Repository

    Albi, Giacomo; Artina, Marco; Foransier, Massimo; Markowich, Peter A.

    2015-01-01

    We present a model for biological network formation originally introduced by Cai and Hu [Adaptation and optimization of biological transport networks, Phys. Rev. Lett. 111 (2013) 138701]. The modeling of fluid transportation (e.g., leaf venation

  9. Synergistic effects in threshold models on networks

    Science.gov (United States)

    Juul, Jonas S.; Porter, Mason A.

    2018-01-01

    Network structure can have a significant impact on the propagation of diseases, memes, and information on social networks. Different types of spreading processes (and other dynamical processes) are affected by network architecture in different ways, and it is important to develop tractable models of spreading processes on networks to explore such issues. In this paper, we incorporate the idea of synergy into a two-state ("active" or "passive") threshold model of social influence on networks. Our model's update rule is deterministic, and the influence of each meme-carrying (i.e., active) neighbor can—depending on a parameter—either be enhanced or inhibited by an amount that depends on the number of active neighbors of a node. Such a synergistic system models social behavior in which the willingness to adopt either accelerates or saturates in a way that depends on the number of neighbors who have adopted that behavior. We illustrate that our model's synergy parameter has a crucial effect on system dynamics, as it determines whether degree-k nodes are possible or impossible to activate. We simulate synergistic meme spreading on both random-graph models and networks constructed from empirical data. Using a heterogeneous mean-field approximation, which we derive under the assumption that a network is locally tree-like, we are able to determine which synergy-parameter values allow degree-k nodes to be activated for many networks and for a broad family of synergistic models.

  10. Modeling geomagnetic induced currents in Australian power networks

    Science.gov (United States)

    Marshall, R. A.; Kelly, A.; Van Der Walt, T.; Honecker, A.; Ong, C.; Mikkelsen, D.; Spierings, A.; Ivanovich, G.; Yoshikawa, A.

    2017-07-01

    Geomagnetic induced currents (GICs) have been considered an issue for high-latitude power networks for some decades. More recently, GICs have been observed and studied in power networks located in lower latitude regions. This paper presents the results of a model aimed at predicting and understanding the impact of geomagnetic storms on power networks in Australia, with particular focus on the Queensland and Tasmanian networks. The model incorporates a "geoelectric field" determined using a plane wave magnetic field incident on a uniform conducting Earth, and the network model developed by Lehtinen and Pirjola (1985). Model results for two intense geomagnetic storms of solar cycle 24 are compared with transformer neutral monitors at three locations within the Queensland network and one location within the Tasmanian network. The model is then used to assess the impacts of the superintense geomagnetic storm of 29-31 October 2003 on the flow of GICs within these networks. The model results show good correlation with the observations with coefficients ranging from 0.73 to 0.96 across the observing sites. For Queensland, modeled GIC magnitudes during the superstorm of 29-31 October 2003 exceed 40 A with the larger GICs occurring in the south-east section of the network. Modeled GICs in Tasmania for the same storm do not exceed 30 A. The larger distance spans and general east-west alignment of the southern section of the Queensland network, in conjunction with some relatively low branch resistance values, result in larger modeled GICs despite Queensland being a lower latitude network than Tasmania.

  11. The role of attachment styles in team functioning

    OpenAIRE

    Pheiffer, Gary

    2016-01-01

    This research explored the potential influences on team functioning, from the perspective of adult attachment theory. Attachment styles are seen to reflect internal working models of self, others, and relationships, and influence individuals’ motivations, abilities, and perceptions as regards relationships. The research question explored what the role and influence of an individual’s global and team attachment style may have upon an individual’s experience of a work team. It sought to explain...

  12. Relational trauma: using play therapy to treat a disrupted attachment.

    Science.gov (United States)

    Anderson, Sarah M; Gedo, Paul M

    2013-01-01

    Caregiver-child attachment results in a cognitive-emotional schema of self, other, and self-other relationships. Significantly disrupted attachments may lead to pathogenic internal working models, which may have deleterious consequences; this indicates the need for early attachment intervention. The authors consider the therapy of a 3-year-old boy with aggressive behaviors who had lacked consistent caregiving. Attachment theory can account for the child's psychotherapeutic gains, despite his insecure attachment style. The authors discuss discrepancies between treatment and current research trends.

  13. A Managerial Perspective on Common Identity-based and Common Bond-based Groups in Non-governmental Organizations. Patterns of Interaction, Attachment and Social Network Configuration

    Directory of Open Access Journals (Sweden)

    Elena - Mădălina VĂTĂMĂNESCU

    2014-10-01

    Full Text Available The paper approaches the common identity and common bond theories in analyzing the group patterns of interaction, their causes, processes and outcomes from a managerial perspective. The distinction between identity and bond referred to people’s different reasons for being in a group, stressing out whether they like the group as a whole — identity-based attachment, or they like individuals in the group — bond-based attachment.  While members of the common identity groups reported feeling more attached to their group as a whole than to their fellow group members and tended to perceive others in the group as interchangeable, in bond-based attachment, people felt connected to each other and less to the group as a whole, loyalty or attraction to the group stemming from their attraction primarily to certain members in the group. At this level, the main question concerned with the particularities of common identity-based or common bond-based groups regarding social interaction, the participatory architecture of the group, the levels of personal and work engagement in acting like a cohesive group. In order to address pertinently this issue, the current work was focused on a qualitative research which comprised in-depth (semi-structured interviews with several project coordinators from non-governmental organizations (NGOs. Also, to make the investigation more complex and clear, the research relied on the social network analysis which was indicative of the group dynamics and configuration, highlighting the differences between common identity-based and common bond-based groups.

  14. Modeling Distillation Column Using ARX Model Structure and Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Reza Pirmoradi

    2012-04-01

    Full Text Available Distillation is a complex and highly nonlinear industrial process. In general it is not always possible to obtain accurate first principles models for high-purity distillation columns. On the other hand the development of first principles models is usually time consuming and expensive. To overcome these problems, empirical models such as neural networks can be used. One major drawback of empirical models is that the prediction is valid only inside the data domain that is sufficiently covered by measurement data. Modeling distillation columns by means of neural networks is reported in literature by using recursive networks. The recursive networks are proper for modeling purpose, but such models have the problems of high complexity and high computational cost. The objective of this paper is to propose a simple and reliable model for distillation column. The proposed model uses feed forward neural networks which results in a simple model with less parameters and faster training time. Simulation results demonstrate that predictions of the proposed model in all regions are close to outputs of the dynamic model and the error in negligible. This implies that the model is reliable in all regions.

  15. Attachment-Focused Psychotherapy and the Wounded Self.

    Science.gov (United States)

    Spiegel, Eric B

    2016-07-01

    The concept of the "wounded self" (Wolfe, 2005) offers an integrative theoretical framework for self-wounds and their developmental origins. Alladin (2013, 2014, 2016) integrated hypnotherapy into this model to comprehensively address the unconscious protective mechanisms and maladaptive conscious cognitive strategies of the wounded self. The purpose of this article is to propose how an attachment-focused psychotherapy could be utilized in working with the wounded self. With its emphasis on developmental maturation through the frame of the attachment relationship, attachment theory is well-positioned to offer conceptual and treatment insights in treating the wounded self. E. B. Spiegel's (2016) attunement, representation, and mentalization approach to attachment-focused psychotherapy described how hypnosis can be utilized across attachment processes of attunement, representation, and mentalization toward structural maturation and developmental repair of patients with histories of complex relational trauma. In this article, the attunement, representation, and mentalization attachment approach and associated interventions are further explicated in the treatment of self-wounds in the borderline and narcissistic spectrums of personality organization. These principles of conceptualization and treatment interventions are then applied in a case example.

  16. Feature network models for proximity data : statistical inference, model selection, network representations and links with related models

    NARCIS (Netherlands)

    Frank, Laurence Emmanuelle

    2006-01-01

    Feature Network Models (FNM) are graphical structures that represent proximity data in a discrete space with the use of features. A statistical inference theory is introduced, based on the additivity properties of networks and the linear regression framework. Considering features as predictor

  17. The attachment system in fledgling relationships: an activating role for attachment anxiety.

    Science.gov (United States)

    Eastwick, Paul W; Finkel, Eli J

    2008-09-01

    Is it sensible to study attachment dynamics between potential romantic partners before they share a full-fledged attachment bond? The present data indicate that such an approach may reveal novel insights about initial attraction processes. Four studies suggest that the state-like experience of attachment anxiety has functional implications within fledgling (i.e., desired or undeveloped) romantic relationships, well before the formation of an attachment bond. Studies 1 and 3 reveal that attachment anxiety directed toward a particular romantic interest is elevated before (in comparison with after) participants report being in an established relationship. Studies 2 and 3 demonstrate that such partner-specific attachment anxiety predicts attachment-relevant outcomes in fledgling relationships, including proximity seeking, safe haven, secure base, passionate love, and other approach behaviors. These associations were reliable above and beyond (and were typically as strong as or stronger than) the effect of sexual desire. Finally, Study 4 presents evidence that partner-specific attachment anxiety may cause several of these attachment-relevant outcomes. Attachment anxiety seems to be a normative experience and may signal the activation of the attachment system during the earliest stages of romantic relationships.

  18. Blade attachment assembly

    Science.gov (United States)

    Garcia-Crespo, Andres Jose; Delvaux, John McConnell; Miller, Diane Patricia

    2016-05-03

    An assembly and method for affixing a turbomachine rotor blade to a rotor wheel are disclosed. In an embodiment, an adaptor member is provided disposed between the blade and the rotor wheel, the adaptor member including an adaptor attachment slot that is complementary to the blade attachment member, and an adaptor attachment member that is complementary to the rotor wheel attachment slot. A coverplate is provided, having a coverplate attachment member that is complementary to the rotor wheel attachment slot, and a hook for engaging the adaptor member. When assembled, the coverplate member matingly engages with the adaptor member, and retains the blade in the adaptor member, and the assembly in the rotor wheel.

  19. Effect of Attachment Type on Implant Strain in Maxillary Implant Overdentures: Comparison of Ball, Locator, and Magnet Attachments. Part 1. Overdenture with Palate.

    Science.gov (United States)

    Takahashi, Toshihito; Gonda, Tomoya; Maeda, Yoshinobu

    Implant overdentures with attachments have been used in clinical practice and the effect of attachments on implant strain has been frequently reported. However, most studies have focused on mandibular overdentures; there are few reports on maxillary overdentures. The purpose of this study was to examine the influence of attachment type on implant strain in maxillary overdentures under various implant configurations. A maxillary edentulous model with implants and experimental overdentures were fabricated. Four strain gauges were attached to each implant, positioned in anterior, premolar, and molar areas. Three types of unsplinted attachments-ball, locator, and magnet-were set on the implants under various implant configurations. A vertical occlusal load of 98 N was applied through the mandibular complete denture, and implant strain was compared using the Kruskal-Wallis test. Ball attachments caused the greatest amount of strain, while magnet attachments caused the least amount under all conditions. For all attachments, two anterior implants caused significantly more strain than four implants (P magnet attachments are recommended to reduce implant stress. Using only two implants, especially two anterior implants, is not recommended regardless of attachment type.

  20. Nonparametric Bayesian Modeling of Complex Networks

    DEFF Research Database (Denmark)

    Schmidt, Mikkel Nørgaard; Mørup, Morten

    2013-01-01

    an infinite mixture model as running example, we go through the steps of deriving the model as an infinite limit of a finite parametric model, inferring the model parameters by Markov chain Monte Carlo, and checking the model?s fit and predictive performance. We explain how advanced nonparametric models......Modeling structure in complex networks using Bayesian nonparametrics makes it possible to specify flexible model structures and infer the adequate model complexity from the observed data. This article provides a gentle introduction to nonparametric Bayesian modeling of complex networks: Using...

  1. A Comprehensive Review of New Attachment Therapy.

    Science.gov (United States)

    1981-01-01

    277. Steadman, S. R.: Resum4 of the literature on root resorption . Angle Orthodont 12: 28, 1942. 278. Held, A-J.: Cementogenesis and the normal and...maintain the attachment in health. 26 9-2 7 3 Sometimes part of the epithelial network of the former root sheath may be seen. 274 Resorptions of the root ...cells produce resorption and ankylosis of the root . 296 ,304- 3 08 Cementogenesis When new cementum forms following surgical detachment, it can form

  2. Attachment in Middle Childhood: Associations with Information Processing

    Science.gov (United States)

    Zimmermann, Peter; Iwanski, Alexandra

    2015-01-01

    Attachment theory suggests that internal working models of self and significant others influence adjustment during development by controlling information processing and self-regulation. We provide a conceptual overview on possible mechanisms linking attachment and information processing and review the current literature in middle childhood.…

  3. Modelling and designing electric energy networks

    International Nuclear Information System (INIS)

    Retiere, N.

    2003-11-01

    The author gives an overview of his research works in the field of electric network modelling. After a brief overview of technological evolutions from the telegraph to the all-electric fly-by-wire aircraft, he reports and describes various works dealing with a simplified modelling of electric systems and with fractal simulation. Then, he outlines the challenges for the design of electric networks, proposes a design process, gives an overview of various design models, methods and tools, and reports an application in the design of electric networks for future jumbo jets

  4. Modelling Facebook Usage among University Students in Thailand: The Role of Emotional Attachment in an Extended Technology Acceptance Model

    Science.gov (United States)

    Teo, Timothy

    2016-01-01

    The aim of this study is to examine the factors that influenced the use of Facebook among university students. Using an extended technology acceptance model (TAM) with emotional attachment (EA) as an external variable, a sample of 498 students from a public-funded Thailand university were surveyed on their responses to five variables hypothesized…

  5. Building a Social Network One Choice at a Time.

    Directory of Open Access Journals (Sweden)

    Jordan W Suchow

    Full Text Available Newcomers to a social network show preferential attachment, a tendency to befriend those with many friends. Here, we show that preferential attachment is equivalent to a form of 'probability matching' commonly found in studies of decision-making. This equivalence, whereby newcomers probability match to a social signal akin to popularity, marries network science to the study of decision-making and raises new questions about how individual psychology impacts the social structure of groups. We asked people to view a visualization of a social network and to select group members whom they would like to meet and befriend. People varied in how strongly they weighed popularity and this was mildly correlated with aspects of their personality. Individual differences in preferential attachment affect the structure and connectivity of the network that emerges.

  6. Attachment and selective attention: disorganization and emotional Stroop reaction time.

    Science.gov (United States)

    Atkinson, Leslie; Leung, Eman; Goldberg, Susan; Benoit, Diane; Poulton, Lori; Myhal, Natalie; Blokland, Kirsten; Kerr, Sheila

    2009-01-01

    Although central to attachment theory, internal working models remain a useful heuristic in need of concretization. We compared the selective attention of organized and disorganized mothers using the emotional Stroop task. Both disorganized attachment and emotional Stroop response involve the coordination of strongly conflicting motivations under conditions of emotional arousal. Furthermore, much is known about the cognitive and neuromodulatory correlates of the Stroop that may inform attempts to substantiate the internal working model construct. We assessed 47 community mothers with the Adult Attachment Interview and the Working Model of the Child Interview in the third trimester of pregnancy. At 6 and 12 months postpartum, we assessed mothers with emotional Stroop tasks involving neutral, attachment, and emotion conditions. At 12 months, we observed their infants in the Strange Situation. Results showed that: disorganized attachment is related to relative Stroop reaction time, that is, unlike organized mothers, disorganized mothers respond to negative attachment/emotion stimuli more slowly than to neutral stimuli; relative speed of response is positively related to number of times the dyad was classified disorganized, and change in relative Stroop response time from 6 to 12 months is related to the match-mismatch status of mother and infant attachment classifications. We discuss implications in terms of automatic and controlled processing and, more specifically, cognitive threat tags, parallel distributed processing, and neuromodulation through norepinephrine and dopamine.

  7. The role of attachment style in Facebook use and social capital: evidence from university students and a national sample.

    Science.gov (United States)

    Lin, Jih-Hsuan

    2015-03-01

    Social networking sites (SNSs) can be beneficial tools for users to gain social capital. Although social capital consists of emotional and informational resources accumulated through interactions with strong or weak social network ties, the existing literature largely ignores attachment style in this context. This study employed attachment theory to explore individuals' attachment orientations toward Facebook usage and toward online and offline social capital. A university student sample (study 1) and a representative national sample (study 2) showed consistent results. Secure attachment was positively associated with online bonding and bridging capital and offline bridging capital. Additionally, secure attachment had an indirect effect on all capital through Facebook time. Avoidant attachment was negatively associated with online bonding capital. Anxious-ambivalent attachment had a direct association with online bonding capital and an indirect effect on all capital through Facebook. Interaction frequency with good friends on Facebook positively predicted all online and offline capital, whereas interaction frequency with average friends on Facebook positively predicted online bridging capital. Interaction frequency with acquaintances on Facebook was negatively associated with offline bonding capital. The study concludes that attachment style is a significant factor in guiding social orientation toward Facebook connections with different ties and influences online social capital. The study extends attachment theory among university students to a national sample to provide more generalizable evidence for the current literature. Additionally, this study extends attachment theory to the SNS setting with a nuanced examination of types of Facebook friends after controlling extraversion. Implications for future research are discussed.

  8. The Role of Attachment Style in Facebook Use and Social Capital: Evidence from University Students and a National Sample

    Science.gov (United States)

    2015-01-01

    Abstract Social networking sites (SNSs) can be beneficial tools for users to gain social capital. Although social capital consists of emotional and informational resources accumulated through interactions with strong or weak social network ties, the existing literature largely ignores attachment style in this context. This study employed attachment theory to explore individuals' attachment orientations toward Facebook usage and toward online and offline social capital. A university student sample (study 1) and a representative national sample (study 2) showed consistent results. Secure attachment was positively associated with online bonding and bridging capital and offline bridging capital. Additionally, secure attachment had an indirect effect on all capital through Facebook time. Avoidant attachment was negatively associated with online bonding capital. Anxious–ambivalent attachment had a direct association with online bonding capital and an indirect effect on all capital through Facebook. Interaction frequency with good friends on Facebook positively predicted all online and offline capital, whereas interaction frequency with average friends on Facebook positively predicted online bridging capital. Interaction frequency with acquaintances on Facebook was negatively associated with offline bonding capital. The study concludes that attachment style is a significant factor in guiding social orientation toward Facebook connections with different ties and influences online social capital. The study extends attachment theory among university students to a national sample to provide more generalizable evidence for the current literature. Additionally, this study extends attachment theory to the SNS setting with a nuanced examination of types of Facebook friends after controlling extraversion. Implications for future research are discussed. PMID:25751049

  9. Modelling traffic congestion using queuing networks

    Indian Academy of Sciences (India)

    Flow-density curves; uninterrupted traffic; Jackson networks. ... ness - also suffer from a big handicap vis-a-vis the Indian scenario: most of these models do .... more well-known queuing network models and onsite data, a more exact Road Cell ...

  10. Recurrent neural network based hybrid model for reconstructing gene regulatory network.

    Science.gov (United States)

    Raza, Khalid; Alam, Mansaf

    2016-10-01

    One of the exciting problems in systems biology research is to decipher how genome controls the development of complex biological system. The gene regulatory networks (GRNs) help in the identification of regulatory interactions between genes and offer fruitful information related to functional role of individual gene in a cellular system. Discovering GRNs lead to a wide range of applications, including identification of disease related pathways providing novel tentative drug targets, helps to predict disease response, and also assists in diagnosing various diseases including cancer. Reconstruction of GRNs from available biological data is still an open problem. This paper proposes a recurrent neural network (RNN) based model of GRN, hybridized with generalized extended Kalman filter for weight update in backpropagation through time training algorithm. The RNN is a complex neural network that gives a better settlement between biological closeness and mathematical flexibility to model GRN; and is also able to capture complex, non-linear and dynamic relationships among variables. Gene expression data are inherently noisy and Kalman filter performs well for estimation problem even in noisy data. Hence, we applied non-linear version of Kalman filter, known as generalized extended Kalman filter, for weight update during RNN training. The developed model has been tested on four benchmark networks such as DNA SOS repair network, IRMA network, and two synthetic networks from DREAM Challenge. We performed a comparison of our results with other state-of-the-art techniques which shows superiority of our proposed model. Further, 5% Gaussian noise has been induced in the dataset and result of the proposed model shows negligible effect of noise on results, demonstrating the noise tolerance capability of the model. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Modeling, Optimization & Control of Hydraulic Networks

    DEFF Research Database (Denmark)

    Tahavori, Maryamsadat

    2014-01-01

    . The nonlinear network model is derived based on the circuit theory. A suitable projection is used to reduce the state vector and to express the model in standard state-space form. Then, the controllability of nonlinear nonaffine hydraulic networks is studied. The Lie algebra-based controllability matrix is used......Water supply systems consist of a number of pumping stations, which deliver water to the customers via pipeline networks and elevated reservoirs. A huge amount of drinking water is lost before it reaches to end-users due to the leakage in pipe networks. A cost effective solution to reduce leakage...... in water network is pressure management. By reducing the pressure in the water network, the leakage can be reduced significantly. Also it reduces the amount of energy consumption in water networks. The primary purpose of this work is to develop control algorithms for pressure control in water supply...

  12. Role of Fimbriae, Flagella and Cellulose on the Attachment of Salmonella Typhimurium ATCC 14028 to Plant Cell Wall Models.

    Directory of Open Access Journals (Sweden)

    Michelle S F Tan

    Full Text Available Cases of foodborne disease caused by Salmonella are frequently associated with the consumption of minimally processed produce. Bacterial cell surface components are known to be important for the attachment of bacterial pathogens to fresh produce. The role of these extracellular structures in Salmonella attachment to plant cell walls has not been investigated in detail. We investigated the role of flagella, fimbriae and cellulose on the attachment of Salmonella Typhimurium ATCC 14028 and a range of isogenic deletion mutants (ΔfliC fljB, ΔbcsA, ΔcsgA, ΔcsgA bcsA and ΔcsgD to bacterial cellulose (BC-based plant cell wall models [BC-Pectin (BCP, BC-Xyloglucan (BCX and BC-Pectin-Xyloglucan (BCPX] after growth at different temperatures (28°C and 37°C. We found that all three cell surface components were produced at 28°C but only the flagella was produced at 37°C. Flagella appeared to be most important for attachment (reduction of up to 1.5 log CFU/cm2 although both cellulose and fimbriae also aided in attachment. The csgD deletion mutant, which lacks both cellulose and fimbriae, showed significantly higher attachment as compared to wild type cells at 37°C. This may be due to the increased expression of flagella-related genes which are also indirectly regulated by the csgD gene. Our study suggests that bacterial attachment to plant cell walls is a complex process involving many factors. Although flagella, cellulose and fimbriae all aid in attachment, these structures are not the only mechanism as no strain was completely defective in its attachment.

  13. A random spatial network model based on elementary postulates

    Science.gov (United States)

    Karlinger, Michael R.; Troutman, Brent M.

    1989-01-01

    A model for generating random spatial networks that is based on elementary postulates comparable to those of the random topology model is proposed. In contrast to the random topology model, this model ascribes a unique spatial specification to generated drainage networks, a distinguishing property of some network growth models. The simplicity of the postulates creates an opportunity for potential analytic investigations of the probabilistic structure of the drainage networks, while the spatial specification enables analyses of spatially dependent network properties. In the random topology model all drainage networks, conditioned on magnitude (number of first-order streams), are equally likely, whereas in this model all spanning trees of a grid, conditioned on area and drainage density, are equally likely. As a result, link lengths in the generated networks are not independent, as usually assumed in the random topology model. For a preliminary model evaluation, scale-dependent network characteristics, such as geometric diameter and link length properties, and topologic characteristics, such as bifurcation ratio, are computed for sets of drainage networks generated on square and rectangular grids. Statistics of the bifurcation and length ratios fall within the range of values reported for natural drainage networks, but geometric diameters tend to be relatively longer than those for natural networks.

  14. Childhood sexual abuse and attachment: An intergenerational perspective.

    Science.gov (United States)

    Kwako, Laura E; Noll, Jennie G; Putnam, Frank W; Trickett, Penelope K

    2010-07-01

    Childhood sexual abuse (CSA) is a recognized risk factor for various negative outcomes in adult survivors and their offspring. We used the Dynamic-Maturational Model of attachment theory as a framework for exploring the impact of maternal CSA on children's attachment relationships in the context of a longitudinal sample of adult survivors of CSA and non-abused comparison mothers and their children. Results indicated that children of CSA survivors were more likely to have extreme strategies of attachment than the children of non-abused mothers. However, because both groups were at socioeconomic risk, both were typified by anxious attachment. Explanations for findings and implications for children's development are explored.

  15. Modeling Network Traffic in Wavelet Domain

    Directory of Open Access Journals (Sweden)

    Sheng Ma

    2004-12-01

    Full Text Available This work discovers that although network traffic has the complicated short- and long-range temporal dependence, the corresponding wavelet coefficients are no longer long-range dependent. Therefore, a "short-range" dependent process can be used to model network traffic in the wavelet domain. Both independent and Markov models are investigated. Theoretical analysis shows that the independent wavelet model is sufficiently accurate in terms of the buffer overflow probability for Fractional Gaussian Noise traffic. Any model, which captures additional correlations in the wavelet domain, only improves the performance marginally. The independent wavelet model is then used as a unified approach to model network traffic including VBR MPEG video and Ethernet data. The computational complexity is O(N for developing such wavelet models and generating synthesized traffic of length N, which is among the lowest attained.

  16. Implementing network constraints in the EMPS model

    Energy Technology Data Exchange (ETDEWEB)

    Helseth, Arild; Warland, Geir; Mo, Birger; Fosso, Olav B.

    2010-02-15

    This report concerns the coupling of detailed market and network models for long-term hydro-thermal scheduling. Currently, the EPF model (Samlast) is the only tool available for this task for actors in the Nordic market. A new prototype for solving the coupled market and network problem has been developed. The prototype is based on the EMPS model (Samkjoeringsmodellen). Results from the market model are distributed to a detailed network model, where a DC load flow detects if there are overloads on monitored lines or intersections. In case of overloads, network constraints are generated and added to the market problem. Theoretical and implementation details for the new prototype are elaborated in this report. The performance of the prototype is tested against the EPF model on a 20-area Nordic dataset. (Author)

  17. Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Lan Liu

    2017-01-01

    Full Text Available As the adoption of Software Defined Networks (SDNs grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the nodes between subnets. We also find that there exists a mobility rate threshold qc. The network malware will spread in the SDN when the mobility rate q>qc. The malware will survive when q>qc and perish when qmodel is effective, and the results may help to decide the SDN control strategy to defend against network malware and provide a theoretical basis to reduce and prevent network security incidents.

  18. Creating, generating and comparing random network models with NetworkRandomizer.

    Science.gov (United States)

    Tosadori, Gabriele; Bestvina, Ivan; Spoto, Fausto; Laudanna, Carlo; Scardoni, Giovanni

    2016-01-01

    Biological networks are becoming a fundamental tool for the investigation of high-throughput data in several fields of biology and biotechnology. With the increasing amount of information, network-based models are gaining more and more interest and new techniques are required in order to mine the information and to validate the results. To fill the validation gap we present an app, for the Cytoscape platform, which aims at creating randomised networks and randomising existing, real networks. Since there is a lack of tools that allow performing such operations, our app aims at enabling researchers to exploit different, well known random network models that could be used as a benchmark for validating real, biological datasets. We also propose a novel methodology for creating random weighted networks, i.e. the multiplication algorithm, starting from real, quantitative data. Finally, the app provides a statistical tool that compares real versus randomly computed attributes, in order to validate the numerical findings. In summary, our app aims at creating a standardised methodology for the validation of the results in the context of the Cytoscape platform.

  19. Electron-attachment processes

    International Nuclear Information System (INIS)

    Christophorou, L.G.; McCorkle, D.L.; Christodoulides, A.A.

    1982-01-01

    Topics covered include: (1) modes of production of negative ions, (2) techniques for the study of electron attachment processes, (3) dissociative electron attachment to ground-state molecules, (4) dissociative electron attachment to hot molecules (effects of temperature on dissociative electron attachment), (5) molecular parent negative ions, and (6) negative ions formed by ion-pair processes and by collisions of molecules with ground state and Rydberg atoms

  20. Validating relationships among attachment, emotional intelligence and clinical communication.

    Science.gov (United States)

    Cherry, M Gemma; Fletcher, Ian; O'Sullivan, Helen

    2014-10-01

    In a previous study, we found that emotional intelligence (EI) mediates the negative influences of Year 1 medical students' attachment styles on their provider-patient communication (PPC). However, in that study, students were examined on a relatively straightforward PPC skill set and were not assessed on their abilities to elicit relevant clinical information from standardised patients. The influence of these psychological variables in more demanding and realistic clinical scenarios warrants investigation. This study aimed to validate previous research findings by exploring the mediating effect of EI on the relationship between medical students' attachment styles and their PPC across an ecologically valid PPC objective structured clinical examination (OSCE). Year 2 medical students completed measures of attachment (the Experiences in Close Relationships-Short Form [ECR-SF], a 12-item measure which provides attachment avoidance and attachment anxiety dimensional scores) and EI (the Mayer-Salovey-Caruso Emotional Intelligence Test [MSCEIT], a 141-item measure on the perception, use, understanding and management of emotions), prior to their summative PPC OSCE. Provider-patient communication was assessed using OSCE scores. Structural equation modelling (SEM) was used to validate our earlier model of the relationships between attachment style, EI and PPC. A total of 296 of 382 (77.5%) students participated. Attachment avoidance was significantly negatively correlated with total EI scores (r = -0.23, p < 0.01); total EI was significantly positively correlated with OSCE scores (r = 0.32, p < 0.01). Parsimonious SEM confirmed that EI mediated the negative influence of attachment avoidance on OSCE scores. It significantly predicted 14% of the variance in OSCE scores, twice as much as the 7% observed in the previous study. In more demanding and realistic clinical scenarios, EI makes a greater contribution towards effective PPC. Attachment is perceived to be stable

  1. Network interconnections: an architectural reference model

    NARCIS (Netherlands)

    Butscher, B.; Lenzini, L.; Morling, R.; Vissers, C.A.; Popescu-Zeletin, R.; van Sinderen, Marten J.; Heger, D.; Krueger, G.; Spaniol, O.; Zorn, W.

    1985-01-01

    One of the major problems in understanding the different approaches in interconnecting networks of different technologies is the lack of reference to a general model. The paper develops the rationales for a reference model of network interconnection and focuses on the architectural implications for

  2. Influence of self-esteem on adult attachment and depressiveness interaction

    OpenAIRE

    Balsevičienė, Birutė; Šinkariova, Liuda

    2010-01-01

    Recently there has been more and more research examining adult attachment. It is important to notice that secure attachment is likely to be some kind of prevention of psychopathology and insecure attachment has increasingly been utilized as a powerful explanatory model for psychopathology. However, recently there is more research on the associations between attachment styles and depression to investigate related potential mediation in order to increase our understanding of the underlying proc...

  3. A general evolving model for growing bipartite networks

    International Nuclear Information System (INIS)

    Tian, Lixin; He, Yinghuan; Liu, Haijun; Du, Ruijin

    2012-01-01

    In this Letter, we propose and study an inner evolving bipartite network model. Significantly, we prove that the degree distribution of two different kinds of nodes both obey power-law form with adjustable exponents. Furthermore, the joint degree distribution of any two nodes for bipartite networks model is calculated analytically by the mean-field method. The result displays that such bipartite networks are nearly uncorrelated networks, which is different from one-mode networks. Numerical simulations and empirical results are given to verify the theoretical results. -- Highlights: ► We proposed a general evolving bipartite network model which was based on priority connection, reconnection and breaking edges. ► We prove that the degree distribution of two different kinds of nodes both obey power-law form with adjustable exponents. ► The joint degree distribution of any two nodes for bipartite networks model is calculated analytically by the mean-field method. ► The result displays that such bipartite networks are nearly uncorrelated networks, which is different from one-mode networks.

  4. [Influence of attachment type on stress distribution of implant-supported removable partial dentures].

    Science.gov (United States)

    Yang, Xue; Rong, Qi-guo; Yang, Ya-dong

    2015-02-18

    To compare influences of different retention attachments on stress among supporting structures. By 3-dimensional laser scanner and reverse engineering computer aided design (CAD) software, a basic partially edentulous digital model with mandibular premolar and molar missing was established. Implant attachment and removable partial dentures (RPD) were added into the basic model to build three kinds of models: RPD only, RPD + implant + Locator attachment, and RPD + implant + Magfit attachment. Vertical and inclined loads were put on artificial teeth unilaterally. By means of 3-dimensional finite element analysis, the stress distribution and displacement of the main supportive structures were compared. A complete 3-dimensional finite element model was established, which contained tooth structure, and periodontal structures. The displacement of the denture was smaller in Locator (9.38 μm vertically, 45.48 μm obliquely) and Magfit models (9.54 μm vertically, 39.45 μm obliquely) compared with non-implant RPD model (95.27 μm vertically, 155.70 μm obliquely). Compared with the two different attachments, cortical bone stress value was higher in Locator model (Locator model 10.850 MPa vertically, 43.760 MPa obliquely; Magfit model 7.100 MPa vertically, 19.260 MPa obliquely).The stress value of abutment periodontal ligamentin Magfit model (0.420 MPa vertically) was lower than that in Locator model (0.520 MPa vertically). The existence of implant could reduce maximum von Mises value of each supportive structure when Kennedy I partially edentulous mandible was restored. Comparing the structure of Magfit and Locator attachment, the contact of Magfit attachment was rigid, while Locator was resilient. Locator attachment could improve stability of the denture dramatically. Locator had stronger effect on defending horizontal movement of the denture.

  5. Effects of dynamic coupling between freestanding steel containment and attached piping

    International Nuclear Information System (INIS)

    Kennedy, R.P.; Kincaid, R.H.; Short, S.A.

    1981-01-01

    This paper presents an accurate, practical method of converting uncoupled response time history results obtained from an uncoupled structure model into coupled response time histories using a post-processor routine. The method is rigorous and only requires the modal properties of the uncoupled structure model, the modal properties of the uncoupled attached equipment model, and the uncoupled time histories of the attachment points on the structure. Coupled response spectra or time histories for use as input to an uncoupled equipment model are obtained. Comparisons of coupled versus uncoupled analysis results are presented for representative piping systems attached to a typical BWR Mark III steel containment subjected to vibration from safety relief valve discharge with a fundamental frequency of 12 Hz. It is shown that the coupled response spectra at piping attachment points are reduced by a factor between 2 and 5 from the amplified uncoupled spectra at each significant piping modal frequency above 20 Hz for representative major piping systems attached to the unstiffened portion of the steel shell. Responses at lower frequencies are not generally reduced and may increase by coupling effects for the input loading and shell model studied. Peak accerations are generally significantly reduced while peak displacements may be decreased or increased. Rules are presented for estimating the coupling effects between freestanding steel shells and attached equipment. (orig./HP)

  6. Predicting Preschoolers' Attachment Security from Fathers' Involvement, Internal Working Models, and Use of Social Support

    Science.gov (United States)

    Newland, Lisa A.; Coyl, Diana D.; Freeman, Harry

    2008-01-01

    Associations between preschoolers' attachment security, fathers' involvement (i.e. parenting behaviors and consistency) and fathering context (i.e. fathers' internal working models (IWMs) and use of social support) were examined in a subsample of 102 fathers, taken from a larger sample of 235 culturally diverse US families. The authors predicted…

  7. Triadic closure dynamics drives scaling laws in social multiplex networks

    International Nuclear Information System (INIS)

    Klimek, Peter; Thurner, Stefan

    2013-01-01

    Social networks exhibit scaling laws for several structural characteristics, such as degree distribution, scaling of the attachment kernel and clustering coefficients as a function of node degree. A detailed understanding if and how these scaling laws are inter-related is missing so far, let alone whether they can be understood through a common, dynamical principle. We propose a simple model for stationary network formation and show that the three mentioned scaling relations follow as natural consequences of triadic closure. The validity of the model is tested on multiplex data from a well-studied massive multiplayer online game. We find that the three scaling exponents observed in the multiplex data for the friendship, communication and trading networks can simultaneously be explained by the model. These results suggest that triadic closure could be identified as one of the fundamental dynamical principles in social multiplex network formation. (paper)

  8. A quantum-implementable neural network model

    Science.gov (United States)

    Chen, Jialin; Wang, Lingli; Charbon, Edoardo

    2017-10-01

    A quantum-implementable neural network, namely quantum probability neural network (QPNN) model, is proposed in this paper. QPNN can use quantum parallelism to trace all possible network states to improve the result. Due to its unique quantum nature, this model is robust to several quantum noises under certain conditions, which can be efficiently implemented by the qubus quantum computer. Another advantage is that QPNN can be used as memory to retrieve the most relevant data and even to generate new data. The MATLAB experimental results of Iris data classification and MNIST handwriting recognition show that much less neuron resources are required in QPNN to obtain a good result than the classical feedforward neural network. The proposed QPNN model indicates that quantum effects are useful for real-life classification tasks.

  9. Activating attachment representations impact how we retrieve autobiographical memories.

    Science.gov (United States)

    Bryant, Richard A; Bali, Agnes

    2018-04-01

    Although much research indicates that proximity to attachment figures confers many psychological benefits, there is little evidence pertaining to how attachment activation may impact autobiographical memory retrieval. Following a negative mood induction to elicit overgeneral autobiographical retrieval, participants (N = 70) were administered an induction in which they imagined a person who is a strong attachment figure or an acquaintance. Participants then completed an autobiographical memory task to retrieve memories in response to neutral and negative cue words. Attachment priming resulted in less distress, increased retrieval of specific memories, and reduced retrieval of categoric memories. These findings indicate that activation of mental representations of attachment figures can impact on the specificity of autobiographical memory retrieval, and extends prevailing models of autobiographical memory by integrating them with attachment theory.

  10. Modeling acquaintance networks based on balance theory

    Directory of Open Access Journals (Sweden)

    Vukašinović Vida

    2014-09-01

    Full Text Available An acquaintance network is a social structure made up of a set of actors and the ties between them. These ties change dynamically as a consequence of incessant interactions between the actors. In this paper we introduce a social network model called the Interaction-Based (IB model that involves well-known sociological principles. The connections between the actors and the strength of the connections are influenced by the continuous positive and negative interactions between the actors and, vice versa, the future interactions are more likely to happen between the actors that are connected with stronger ties. The model is also inspired by the social behavior of animal species, particularly that of ants in their colony. A model evaluation showed that the IB model turned out to be sparse. The model has a small diameter and an average path length that grows in proportion to the logarithm of the number of vertices. The clustering coefficient is relatively high, and its value stabilizes in larger networks. The degree distributions are slightly right-skewed. In the mature phase of the IB model, i.e., when the number of edges does not change significantly, most of the network properties do not change significantly either. The IB model was found to be the best of all the compared models in simulating the e-mail URV (University Rovira i Virgili of Tarragona network because the properties of the IB model more closely matched those of the e-mail URV network than the other models

  11. Factors and Interventions Associated with Parental Attachment during Pregnancy in Iran: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Kobra Salehi

    2018-01-01

    Full Text Available Introduction: Parents' attachment to the child is an intimate,warm and continuous relationship which is the basis of the natural development of the child. Attachment starts long before birth, and is affected by a variety of factors that are not definitively recognized. Also, several interventions have been proposed for improving it that their effectiveness has not yet been determined. Given the evidence about the role of cultural and national differences, it is necessary to review existing studies in order to identify these factors and interventions in Iran.Methods and Materials: In this review, Web of Science, Scopous, Proquest,Psycinfo, CINAHL and Pubmed databases and SID, Magiran, Irondoc, Barakat Knowledge Network System as Iranian databases were searched using English and Persian keywords such as prenatal attachment, relationship, maternal attachment between 2000 and 2017, to find articles related to prenatal attachment. The full text of the articles was studied by two reviewer and their main findings were extracted and categorized.Results: Factors and interventions associated with parental attachment summarized into 12 themes: parent education, culture, anxiety, family, planning for pregnancy, history of fetal loss, substance abuse, postpartum attachment, fetal anomaly, paternal attachment, attachment measurement tools, and effectiveness of education on prenatal attachment .Conclusion: the effect of education and counseling on prenatal attachment in Iranian parents suggests the use of these methods in prenatal care. Parent’s education, social support and marital satisfaction were significant associated factors with increasing maternal attachment. History of fetal loss, anxiety and smoking was associated with the poor prenatal attachment

  12. Mathematical Modelling Plant Signalling Networks

    KAUST Repository

    Muraro, D.

    2013-01-01

    During the last two decades, molecular genetic studies and the completion of the sequencing of the Arabidopsis thaliana genome have increased knowledge of hormonal regulation in plants. These signal transduction pathways act in concert through gene regulatory and signalling networks whose main components have begun to be elucidated. Our understanding of the resulting cellular processes is hindered by the complex, and sometimes counter-intuitive, dynamics of the networks, which may be interconnected through feedback controls and cross-regulation. Mathematical modelling provides a valuable tool to investigate such dynamics and to perform in silico experiments that may not be easily carried out in a laboratory. In this article, we firstly review general methods for modelling gene and signalling networks and their application in plants. We then describe specific models of hormonal perception and cross-talk in plants. This mathematical analysis of sub-cellular molecular mechanisms paves the way for more comprehensive modelling studies of hormonal transport and signalling in a multi-scale setting. © EDP Sciences, 2013.

  13. Ripple-Spreading Network Model Optimization by Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Xiao-Bing Hu

    2013-01-01

    Full Text Available Small-world and scale-free properties are widely acknowledged in many real-world complex network systems, and many network models have been developed to capture these network properties. The ripple-spreading network model (RSNM is a newly reported complex network model, which is inspired by the natural ripple-spreading phenomenon on clam water surface. The RSNM exhibits good potential for describing both spatial and temporal features in the development of many real-world networks where the influence of a few local events spreads out through nodes and then largely determines the final network topology. However, the relationships between ripple-spreading related parameters (RSRPs of RSNM and small-world and scale-free topologies are not as obvious or straightforward as in many other network models. This paper attempts to apply genetic algorithm (GA to tune the values of RSRPs, so that the RSNM may generate these two most important network topologies. The study demonstrates that, once RSRPs are properly tuned by GA, the RSNM is capable of generating both network topologies and therefore has a great flexibility to study many real-world complex network systems.

  14. A Neural Network Approach for Building An Obstacle Detection Model by Fusion of Proximity Sensors Data

    Science.gov (United States)

    Peralta, Emmanuel; Vargas, Héctor; Hermosilla, Gabriel

    2018-01-01

    Proximity sensors are broadly used in mobile robots for obstacle detection. The traditional calibration process of this kind of sensor could be a time-consuming task because it is usually done by identification in a manual and repetitive way. The resulting obstacles detection models are usually nonlinear functions that can be different for each proximity sensor attached to the robot. In addition, the model is highly dependent on the type of sensor (e.g., ultrasonic or infrared), on changes in light intensity, and on the properties of the obstacle such as shape, colour, and surface texture, among others. That is why in some situations it could be useful to gather all the measurements provided by different kinds of sensor in order to build a unique model that estimates the distances to the obstacles around the robot. This paper presents a novel approach to get an obstacles detection model based on the fusion of sensors data and automatic calibration by using artificial neural networks. PMID:29495338

  15. Epidemic outbreaks in growing scale-free networks with local structure

    Science.gov (United States)

    Ni, Shunjiang; Weng, Wenguo; Shen, Shifei; Fan, Weicheng

    2008-09-01

    The class of generative models has already attracted considerable interest from researchers in recent years and much expanded the original ideas described in BA model. Most of these models assume that only one node per time step joins the network. In this paper, we grow the network by adding n interconnected nodes as a local structure into the network at each time step with each new node emanating m new edges linking the node to the preexisting network by preferential attachment. This successfully generates key features observed in social networks. These include power-law degree distribution pk∼k, where μ=(n-1)/m is a tuning parameter defined as the modularity strength of the network, nontrivial clustering, assortative mixing, and modular structure. Moreover, all these features are dependent in a similar way on the parameter μ. We then study the susceptible-infected epidemics on this network with identical infectivity, and find that the initial epidemic behavior is governed by both of the infection scheme and the network structure, especially the modularity strength. The modularity of the network makes the spreading velocity much lower than that of the BA model. On the other hand, increasing the modularity strength will accelerate the propagation velocity.

  16. Constitutive modelling of composite biopolymer networks.

    Science.gov (United States)

    Fallqvist, B; Kroon, M

    2016-04-21

    The mechanical behaviour of biopolymer networks is to a large extent determined at a microstructural level where the characteristics of individual filaments and the interactions between them determine the response at a macroscopic level. Phenomena such as viscoelasticity and strain-hardening followed by strain-softening are observed experimentally in these networks, often due to microstructural changes (such as filament sliding, rupture and cross-link debonding). Further, composite structures can also be formed with vastly different mechanical properties as compared to the individual networks. In this present paper, we present a constitutive model presented in a continuum framework aimed at capturing these effects. Special care is taken to formulate thermodynamically consistent evolution laws for dissipative effects. This model, incorporating possible anisotropic network properties, is based on a strain energy function, split into an isochoric and a volumetric part. Generalisation to three dimensions is performed by numerical integration over the unit sphere. Model predictions indicate that the constitutive model is well able to predict the elastic and viscoelastic response of biological networks, and to an extent also composite structures. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. Attachment-related mental representations: introduction to the special issue.

    Science.gov (United States)

    Thompson, Ross A

    2008-12-01

    Bowlby's concept of mental working models of self, attachment figures, and the social world has been theoretically generative as a bridge between early relational experience and the beliefs and expectations that color later relationships. Contemporary attachment researchers, following his example, are applying new knowledge of children's conceptual development to their study of attachment-related mental representations in children and adults. The contributors to this special issue highlight recent advances in how the mental representations arising from attachment security should be conceptualized and studied, and identify a number of important directions for future work. This paper introduces the special issue by summarizing the major ideas of Bowlby and his followers concerning the nature and development of mental working models, points of theoretical clarity and uncertainty, and challenges in assessing these representations, as well as profiling each of the contributions to this issue.

  18. Bayesian latent feature modeling for modeling bipartite networks with overlapping groups

    DEFF Research Database (Denmark)

    Jørgensen, Philip H.; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2016-01-01

    Bi-partite networks are commonly modelled using latent class or latent feature models. Whereas the existing latent class models admit marginalization of parameters specifying the strength of interaction between groups, existing latent feature models do not admit analytical marginalization...... by the notion of community structure such that the edge density within groups is higher than between groups. Our model further assumes that entities can have different propensities of generating links in one of the modes. The proposed framework is contrasted on both synthetic and real bi-partite networks...... feature representations in bipartite networks provides a new framework for accounting for structure in bi-partite networks using binary latent feature representations providing interpretable representations that well characterize structure as quantified by link prediction....

  19. Attachment, self-esteem, worldviews, and terror management: evidence for a tripartite security system.

    Science.gov (United States)

    Hart, Joshua; Shaver, Phillip R; Goldenberg, Jamie L

    2005-06-01

    On the basis of prior work integrating attachment theory and terror management theory, the authors propose a model of a tripartite security system consisting of dynamically interrelated attachment, self-esteem, and worldview processes. Four studies are presented that, combined with existing evidence, support the prediction derived from the model that threats to one component of the security system result in compensatory defensive activation of other components. Further, the authors predicted and found that individual differences in attachment style moderate the defenses. In Studies 1 and 2, attachment threats motivated worldview defense among anxiously attached participants and motivated self-enhancement (especially among avoidant participants), effects similar to those caused by mortality salience. In Studies 3 and 4, a worldview threat and a self-esteem threat caused attachment-related proximity seeking among fearful participants and avoidance of proximity among dismissing participants. The authors' model provides an overarching framework within which to study attachment, self-esteem, and worldviews.

  20. A Search Model with a Quasi-Network

    DEFF Research Database (Denmark)

    Ejarque, Joao Miguel

    This paper adds a quasi-network to a search model of the labor market. Fitting the model to an average unemployment rate and to other moments in the data implies the presence of the network is not noticeable in the basic properties of the unemployment and job finding rates. However, the network...

  1. Relationships between attachment and marital satisfaction in married couples

    Directory of Open Access Journals (Sweden)

    Patrícia Gallerová

    2016-01-01

    Full Text Available Theory of attachment strongly influences exploring of close relationships in childhood and in adulthood as well. According Bowlby attachment is "lasting relationship bond characterized by need of seeking and maintaining proximity with a person in stressful situations especially (Bowbly, 2010. Hazan a Shaver (1987 applied theory of early attachment in romantic relationships of adults. Behavior of adult human in relationships is more or less predictable by style of attachment in childhood (Feeney, 1999. Brennan, Clark a Shaver (1998 created four-dimensional model of attachment which was based on Ainsworth´s theory as well. The model was formed of two dimensions - anxiety and avoidance. The authors identified four types of attachment: secure, fearful, dismissive and preoccupied style of attachment (Brennan, Clark, & Shaver, 1998. Satisfaction in romantic relationship can be explained as a degree in which is relationship for a human enojyable. Attachment influences satisfaction in relationship in terms of meeting need of proximity and safety (Mikulincer, Florian, Cowan, & Cowan, 2002. Several researches show that safe attachment is associated with higher satisfaction in marriage and on the other hand people with insecure style of attachment show lower degree of satisfaction in relationship (Alexandrov, Cowan, & Cowan, 2005; Treboux, Crowell, & Waters, 2004. At the same time style of attachment of the partner also influences individual a lot, satisfaction does not depend only on his own style of attachment but also on attachment of his partner (Farinelli, & McEwan, 2009. The study examined relations between the relationship attachment and marital satisfaction. The goal was to explain the relationship between the adult attachment and marital satisfaction of the individual and her/his husband/wife. The research examined relationship between adult attachment and marital satisfaction as well. Quantitative questionnaire survey: The battery consisted of

  2. A local adaptive algorithm for emerging scale-free hierarchical networks

    International Nuclear Information System (INIS)

    Gomez Portillo, I J; Gleiser, P M

    2010-01-01

    In this work we study a growing network model with chaotic dynamical units that evolves using a local adaptive rewiring algorithm. Using numerical simulations we show that the model allows for the emergence of hierarchical networks. First, we show that the networks that emerge with the algorithm present a wide degree distribution that can be fitted by a power law function, and thus are scale-free networks. Using the LaNet-vi visualization tool we present a graphical representation that reveals a central core formed only by hubs, and also show the presence of a preferential attachment mechanism. In order to present a quantitative analysis of the hierarchical structure we analyze the clustering coefficient. In particular, we show that as the network grows the clustering becomes independent of system size, and also presents a power law decay as a function of the degree. Finally, we compare our results with a similar version of the model that has continuous non-linear phase oscillators as dynamical units. The results show that local interactions play a fundamental role in the emergence of hierarchical networks.

  3. Attachment orientations as mediators in the intergenerational transmission of marital satisfaction.

    Science.gov (United States)

    Jarnecke, Amber M; South, Susan C

    2013-08-01

    Previous research suggests that there is an intergenerational transmission of marital satisfaction, such that parents' marital satisfaction predicts their adult child's marital satisfaction. The mechanisms that explain this phenomenon remain relatively unknown. In the current study, we examined the role of parent-child attachment orientations and romantic relationship attachment orientations as mediators in the intergenerational transmission of marital satisfaction. Participants (N = 199) were cohabiting newlywed couples who had been married for 12 months or less. All participants separately completed measures of own marital satisfaction, attachment orientations to romantic partners, attachment orientations to rearing parents, and perceptions of parents' marital satisfaction. Data was analyzed using the actor-partner interdependence model in a structural equation modeling framework to account for the nonindependent nature of the data. This allowed for examination of gender differences across husbands and wives and provided overall fit of the hypothesized model. Results supported a partially mediating effect of parent-child attachment and romantic partner attachment on the intergenerational transmission of marital satisfaction, although effects differed by gender. For husbands, the direct effect from parents' marital satisfaction to own satisfaction was partially mediated through anxious attachment styles. There was no direct effect from parents to own marital satisfaction for wives; however, there were significant links from parent's satisfaction to attachment orientations in childhood and adulthood, which in turn impacted wives satisfaction. Findings from this study provide an integrated look at the implications that attachment has on the intergenerational transmission of marital functioning. © 2013 American Psychological Association

  4. Mathematical model for spreading dynamics of social network worms

    International Nuclear Information System (INIS)

    Sun, Xin; Liu, Yan-Heng; Han, Jia-Wei; Liu, Xue-Jie; Li, Bin; Li, Jin

    2012-01-01

    In this paper, a mathematical model for social network worm spreading is presented from the viewpoint of social engineering. This model consists of two submodels. Firstly, a human behavior model based on game theory is suggested for modeling and predicting the expected behaviors of a network user encountering malicious messages. The game situation models the actions of a user under the condition that the system may be infected at the time of opening a malicious message. Secondly, a social network accessing model is proposed to characterize the dynamics of network users, by which the number of online susceptible users can be determined at each time step. Several simulation experiments are carried out on artificial social networks. The results show that (1) the proposed mathematical model can well describe the spreading dynamics of social network worms; (2) weighted network topology greatly affects the spread of worms; (3) worms spread even faster on hybrid social networks

  5. A comprehensive multi-local-world model for complex networks

    International Nuclear Information System (INIS)

    Fan Zhengping; Chen Guanrong; Zhang Yunong

    2009-01-01

    The nodes in a community within a network are much more connected to each other than to the others outside the community in the same network. This phenomenon has been commonly observed from many real-world networks, ranging from social to biological even to technical networks. Meanwhile, the number of communities in some real-world networks, such as the Internet and most social networks, are evolving with time. To model this kind of networks, the present Letter proposes a multi-local-world (MLW) model to capture and describe their essential topological properties. Based on the mean-field theory, the degree distribution of this model is obtained analytically, showing that the generated network has a novel topological feature as being not completely random nor completely scale-free but behaving somewhere between them. As a typical application, the MLW model is applied to characterize the Internet against some other models such as the BA, GBA, Fitness and HOT models, demonstrating the superiority of the new model.

  6. Agent based modeling of energy networks

    International Nuclear Information System (INIS)

    Gonzalez de Durana, José María; Barambones, Oscar; Kremers, Enrique; Varga, Liz

    2014-01-01

    Highlights: • A new approach for energy network modeling is designed and tested. • The agent-based approach is general and no technology dependent. • The models can be easily extended. • The range of applications encompasses from small to large energy infrastructures. - Abstract: Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed

  7. Efficacy of an Attachment-Based Intervention Model on Health Indices in Children with Chronic Disease and Their Mothers.

    Science.gov (United States)

    Dehghani-Arani, Fateme; Besharat, Mohammad Ali; Fitton, Victoria A; Aghamohammadi, Asghar

    2018-05-07

    Studies have shown significant relationship between health conditions and attachment. This study aimed to examine an attachment-based intervention model named mother-child-disease triangle (MCDT) on health indices in children with chronic disease and their mothers. This randomized trial study included 22 volunteer children aged 12-18 years undergoing medical treatment for a chronic disease and their mothers. After evaluation by 28-form General Health Questionnaire (GHQ-28), inventory of parent and peer attachment (IPPA), 28-form Child Health Questionnaire (CHQ-28) and Illness Perception Questionnaire (IPQ), the mother-child dyads were paired on the basis of IPPA scores. These pairs were then randomly assigned to an experimental or control group. The experimental group received ten 90-min sessions of MCDT over a 7-week period. Meanwhile, the control group received ten simple conversational sessions as a dummy intervention. In accordance with this study's pre-test/post-test design, both groups were evaluated once again after completing their respective treatment. Multivariate analysis of covariance (MANCOVA) showed members of the experimental group to have significantly stronger attachment and better physiological and psychosocial health than those in the control group. These findings suggest that attachment-based interventions can be used to improve the effectiveness of treatment among children with chronic disease and their mothers.

  8. Do the rich get richer? An empirical analysis of the Bitcoin transaction network.

    Directory of Open Access Journals (Sweden)

    Dániel Kondor

    Full Text Available The possibility to analyze everyday monetary transactions is limited by the scarcity of available data, as this kind of information is usually considered highly sensitive. Present econophysics models are usually employed on presumed random networks of interacting agents, and only some macroscopic properties (e.g. the resulting wealth distribution are compared to real-world data. In this paper, we analyze Bitcoin, which is a novel digital currency system, where the complete list of transactions is publicly available. Using this dataset, we reconstruct the network of transactions and extract the time and amount of each payment. We analyze the structure of the transaction network by measuring network characteristics over time, such as the degree distribution, degree correlations and clustering. We find that linear preferential attachment drives the growth of the network. We also study the dynamics taking place on the transaction network, i.e. the flow of money. We measure temporal patterns and the wealth accumulation. Investigating the microscopic statistics of money movement, we find that sublinear preferential attachment governs the evolution of the wealth distribution. We report a scaling law between the degree and wealth associated to individual nodes.

  9. Do the rich get richer? An empirical analysis of the Bitcoin transaction network.

    Science.gov (United States)

    Kondor, Dániel; Pósfai, Márton; Csabai, István; Vattay, Gábor

    2014-01-01

    The possibility to analyze everyday monetary transactions is limited by the scarcity of available data, as this kind of information is usually considered highly sensitive. Present econophysics models are usually employed on presumed random networks of interacting agents, and only some macroscopic properties (e.g. the resulting wealth distribution) are compared to real-world data. In this paper, we analyze Bitcoin, which is a novel digital currency system, where the complete list of transactions is publicly available. Using this dataset, we reconstruct the network of transactions and extract the time and amount of each payment. We analyze the structure of the transaction network by measuring network characteristics over time, such as the degree distribution, degree correlations and clustering. We find that linear preferential attachment drives the growth of the network. We also study the dynamics taking place on the transaction network, i.e. the flow of money. We measure temporal patterns and the wealth accumulation. Investigating the microscopic statistics of money movement, we find that sublinear preferential attachment governs the evolution of the wealth distribution. We report a scaling law between the degree and wealth associated to individual nodes.

  10. Do the Rich Get Richer? An Empirical Analysis of the Bitcoin Transaction Network

    Science.gov (United States)

    Kondor, Dániel; Pósfai, Márton; Csabai, István; Vattay, Gábor

    2014-01-01

    The possibility to analyze everyday monetary transactions is limited by the scarcity of available data, as this kind of information is usually considered highly sensitive. Present econophysics models are usually employed on presumed random networks of interacting agents, and only some macroscopic properties (e.g. the resulting wealth distribution) are compared to real-world data. In this paper, we analyze Bitcoin, which is a novel digital currency system, where the complete list of transactions is publicly available. Using this dataset, we reconstruct the network of transactions and extract the time and amount of each payment. We analyze the structure of the transaction network by measuring network characteristics over time, such as the degree distribution, degree correlations and clustering. We find that linear preferential attachment drives the growth of the network. We also study the dynamics taking place on the transaction network, i.e. the flow of money. We measure temporal patterns and the wealth accumulation. Investigating the microscopic statistics of money movement, we find that sublinear preferential attachment governs the evolution of the wealth distribution. We report a scaling law between the degree and wealth associated to individual nodes. PMID:24505257

  11. Different perspectives on the sex-attachment link: towards an emotion-motivational account.

    Science.gov (United States)

    Dewitte, Marieke

    2012-01-01

    Although the link between sex and attachment was made decades ago (Hazan & Shaver, 1987), theories on sexual and attachment functioning have been developed in relative isolation. Recent efforts to integrate both literatures have been complicated by the fact that the sex-attachment link has been approached from very different perspectives, including biological, evolutionary, developmental, cognitive, and social psychology approaches. Also, at the empirical level, research on sex and attachment lacks overarching synthesis. This article gives an overview of the most important theoretical ideas and empirical insights on sex and attachment. It starts with describing general models that approach the sex-attachment link from an evolutionary and neurobiological perspective. Then, it summarizes theoretical and empirical ideas of attachment theory and describes how attachment style differences are manifested in intimate and sexual relationships. Research so far has been limited to studying the predicted link between sex and attachment in terms of broad descriptives, and it would benefit the literature to specify the processes and pathways that mediate the sex-attachment link. After a short discussion of the functional similarities between the sexual and the attachment systems, the article describes some specific--dynamical--models that focus on the emotional and cognitive-motivational processes through which attachment schemas influence sexual experiences. Such an emotion-motivational perspective on sex and attachment can help to organize theoretical ideas and empirical findings and eventually promote an integrative view on how attachment dynamics can interact with sexual experiences.

  12. Thermal conductivity model for nanofiber networks

    Science.gov (United States)

    Zhao, Xinpeng; Huang, Congliang; Liu, Qingkun; Smalyukh, Ivan I.; Yang, Ronggui

    2018-02-01

    Understanding thermal transport in nanofiber networks is essential for their applications in thermal management, which are used extensively as mechanically sturdy thermal insulation or high thermal conductivity materials. In this study, using the statistical theory and Fourier's law of heat conduction while accounting for both the inter-fiber contact thermal resistance and the intrinsic thermal resistance of nanofibers, an analytical model is developed to predict the thermal conductivity of nanofiber networks as a function of their geometric and thermal properties. A scaling relation between the thermal conductivity and the geometric properties including volume fraction and nanofiber length of the network is revealed. This model agrees well with both numerical simulations and experimental measurements found in the literature. This model may prove useful in analyzing the experimental results and designing nanofiber networks for both high and low thermal conductivity applications.

  13. Thermal conductivity model for nanofiber networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhao, Xinpeng [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309, USA; Huang, Congliang [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309, USA; School of Electrical and Power Engineering, China University of Mining and Technology, Xuzhou 221116, China; Liu, Qingkun [Department of Physics, University of Colorado, Boulder, Colorado 80309, USA; Smalyukh, Ivan I. [Department of Physics, University of Colorado, Boulder, Colorado 80309, USA; Materials Science and Engineering Program, University of Colorado, Boulder, Colorado 80309, USA; Yang, Ronggui [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309, USA; Materials Science and Engineering Program, University of Colorado, Boulder, Colorado 80309, USA; Buildings and Thermal Systems Center, National Renewable Energy Laboratory, Golden, Colorado 80401, USA

    2018-02-28

    Understanding thermal transport in nanofiber networks is essential for their applications in thermal management, which are used extensively as mechanically sturdy thermal insulation or high thermal conductivity materials. In this study, using the statistical theory and Fourier's law of heat conduction while accounting for both the inter-fiber contact thermal resistance and the intrinsic thermal resistance of nanofibers, an analytical model is developed to predict the thermal conductivity of nanofiber networks as a function of their geometric and thermal properties. A scaling relation between the thermal conductivity and the geometric properties including volume fraction and nanofiber length of the network is revealed. This model agrees well with both numerical simulations and experimental measurements found in the literature. This model may prove useful in analyzing the experimental results and designing nanofiber networks for both high and low thermal conductivity applications.

  14. Structural Equation Model of Smartphone Addiction Based on Adult Attachment Theory: Mediating Effects of Loneliness and Depression

    Directory of Open Access Journals (Sweden)

    EunYoung Kim, PhD

    2017-06-01

    Conclusion: The results suggest there are mediating effects of loneliness and depression in the relationship between attachment anxiety and smartphone addiction. The hypothesized model was found to be a suitable model for predicting smartphone addiction among university students. Future study is required to find a causal path to prevent smartphone addiction among university students.

  15. Infinite Multiple Membership Relational Modeling for Complex Networks

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard; Hansen, Lars Kai

    Learning latent structure in complex networks has become an important problem fueled by many types of networked data originating from practically all fields of science. In this paper, we propose a new non-parametric Bayesian multiplemembership latent feature model for networks. Contrary to existing...... multiplemembership models that scale quadratically in the number of vertices the proposedmodel scales linearly in the number of links admittingmultiple-membership analysis in large scale networks. We demonstrate a connection between the single membership relational model and multiple membership models and show...

  16. Modeling Epidemics Spreading on Social Contact Networks.

    Science.gov (United States)

    Zhang, Zhaoyang; Wang, Honggang; Wang, Chonggang; Fang, Hua

    2015-09-01

    Social contact networks and the way people interact with each other are the key factors that impact on epidemics spreading. However, it is challenging to model the behavior of epidemics based on social contact networks due to their high dynamics. Traditional models such as susceptible-infected-recovered (SIR) model ignore the crowding or protection effect and thus has some unrealistic assumption. In this paper, we consider the crowding or protection effect and develop a novel model called improved SIR model. Then, we use both deterministic and stochastic models to characterize the dynamics of epidemics on social contact networks. The results from both simulations and real data set conclude that the epidemics are more likely to outbreak on social contact networks with higher average degree. We also present some potential immunization strategies, such as random set immunization, dominating set immunization, and high degree set immunization to further prove the conclusion.

  17. Port Hamiltonian modeling of Power Networks

    NARCIS (Netherlands)

    van Schaik, F.; van der Schaft, Abraham; Scherpen, Jacquelien M.A.; Zonetti, Daniele; Ortega, R

    2012-01-01

    In this talk a full nonlinear model for the power network in port–Hamiltonian framework is derived to study its stability properties. For this we use the modularity approach i.e., we first derive the models of individual components in power network as port-Hamiltonian systems and then we combine all

  18. Viii. Attachment and sleep among toddlers: disentangling attachment security and dependency.

    Science.gov (United States)

    Bélanger, Marie-Ève; Bernier, Annie; Simard, Valérie; Bordeleau, Stéphanie; Carrier, Julie

    2015-03-01

    Many scholars have proposed that parent-child attachment security should favor child sleep. Research has yet, however, to provide convincing support for this hypothesis. The current study used objective measures of sleep and attachment to assess the longitudinal links between mother-child attachment security and subsequent sleep, controlling for child dependency. Sixty-two middle-class families (30 girls) were met twice, when children were 15 months (Wave 1; W1) and 2 years of age (Wave 2; W2). At W1, mother-child attachment was assessed with the observer version of the Attachment Q-Sort. At W2, children wore an actigraph monitor for 72 hr. Results indicated that children more securely attached to their mothers subsequently slept more at night and had higher sleep efficiency, and these predictions were not confounded by child dependency. These findings suggest a unique role for secure attachment relationships in the development of young children's sleep regulation, while addressing methodological issues that have long precluded consensus in this literature. © 2015 The Society for Research in Child Development, Inc.

  19. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Davis, William B.

    2002-01-01

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  20. A Simplified Network Model for Travel Time Reliability Analysis in a Road Network

    Directory of Open Access Journals (Sweden)

    Kenetsu Uchida

    2017-01-01

    Full Text Available This paper proposes a simplified network model which analyzes travel time reliability in a road network. A risk-averse driver is assumed in the simplified model. The risk-averse driver chooses a path by taking into account both a path travel time variance and a mean path travel time. The uncertainty addressed in this model is that of traffic flows (i.e., stochastic demand flows. In the simplified network model, the path travel time variance is not calculated by considering all travel time covariance between two links in the network. The path travel time variance is calculated by considering all travel time covariance between two adjacent links in the network. Numerical experiments are carried out to illustrate the applicability and validity of the proposed model. The experiments introduce the path choice behavior of a risk-neutral driver and several types of risk-averse drivers. It is shown that the mean link flows calculated by introducing the risk-neutral driver differ as a whole from those calculated by introducing several types of risk-averse drivers. It is also shown that the mean link flows calculated by the simplified network model are almost the same as the flows calculated by using the exact path travel time variance.

  1. Emotional Availability and Attachment Representations in Kibbutz Infants and Their Mothers.

    Science.gov (United States)

    Aviezer, Ora; Sagi, Abraham; Joels, Tirtsa; Ziv, Yair

    1999-01-01

    Examined three components of the attachment-transmission model in 48 kibbutz dyads from communal and home-based sleeping arrangements. Found that security of infants' attachment relations and autonomy of mothers' attachment representations were associated with higher emotional availability scores. Poorer emotional availability was found in dyads…

  2. Stochastic actor-oriented models for network change

    NARCIS (Netherlands)

    Snijders, T.A.B.

    1996-01-01

    A class of models is proposed for longitudinal network data. These models are along the lines of methodological individualism: actors use heuristics to try to achieve their individual goals, subject to constraints. The current network structure is among these constraints. The models are continuous

  3. Hybrid neural network bushing model for vehicle dynamics simulation

    International Nuclear Information System (INIS)

    Sohn, Jeong Hyun; Lee, Seung Kyu; Yoo, Wan Suk

    2008-01-01

    Although the linear model was widely used for the bushing model in vehicle suspension systems, it could not express the nonlinear characteristics of bushing in terms of the amplitude and the frequency. An artificial neural network model was suggested to consider the hysteretic responses of bushings. This model, however, often diverges due to the uncertainties of the neural network under the unexpected excitation inputs. In this paper, a hybrid neural network bushing model combining linear and neural network is suggested. A linear model was employed to represent linear stiffness and damping effects, and the artificial neural network algorithm was adopted to take into account the hysteretic responses. A rubber test was performed to capture bushing characteristics, where sine excitation with different frequencies and amplitudes is applied. Random test results were used to update the weighting factors of the neural network model. It is proven that the proposed model has more robust characteristics than a simple neural network model under step excitation input. A full car simulation was carried out to verify the proposed bushing models. It was shown that the hybrid model results are almost identical to the linear model under several maneuvers

  4. Functional grading of mineral and collagen in the attachment of tendon to bone.

    Science.gov (United States)

    Genin, Guy M; Kent, Alistair; Birman, Victor; Wopenka, Brigitte; Pasteris, Jill D; Marquez, Pablo J; Thomopoulos, Stavros

    2009-08-19

    Attachment of dissimilar materials is a major challenge because high levels of localized stress may develop at their interfaces. An effective biologic solution to this problem exists at one of nature's most extreme interfaces: the attachment of tendon (a compliant, structural "soft tissue") to bone (a stiff, structural "hard tissue"). The goal of our study was to develop biomechanical models to describe how the tendon-to-bone insertion derives its mechanical properties. We examined the tendon-to-bone insertion and found two factors that give the tendon-to-bone transition a unique grading in mechanical properties: 1), a gradation in mineral concentration, measured by Raman spectroscopy; and 2), a gradation in collagen fiber orientation, measured by polarized light microscopy. Our measurements motivate a new physiological picture of the tissue that achieves this transition, the tendon-to-bone insertion, as a continuous, functionally graded material. Our biomechanical model suggests that the experimentally observed increase in mineral accumulation within collagen fibers can provide significant stiffening of the partially mineralized fibers, but only for concentrations of mineral above a "percolation threshold" corresponding to formation of a mechanically continuous mineral network within each collagen fiber (e.g., the case of mineral connectivity extending from one end of the fiber to the other). Increasing dispersion in the orientation distribution of collagen fibers from tendon to bone is a second major determinant of tissue stiffness. The combination of these two factors may explain the nonmonotonic variation of stiffness over the length of the tendon-to-bone insertion reported previously. Our models explain how tendon-to-bone attachment is achieved through a functionally graded material composition, and provide targets for tissue engineered surgical interventions and biomimetic material interfaces.

  5. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks

    Directory of Open Access Journals (Sweden)

    Kirrilly Thompson

    2014-05-01

    Full Text Available Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc. and those who own pets (not to mention pets themselves. The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general. Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.

  6. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks.

    Science.gov (United States)

    Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua

    2014-05-07

    Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or 'piggybacking' disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.

  7. Application of Attachment Theory in Clinical Social Work.

    Science.gov (United States)

    Blakely, Thomas Joseph; Dziadosz, Gregory M

    2015-11-01

    This article proposes the use of attachment theory in clinical social work practice. This theory is very appropriate in this context because of its fit with social work concepts of person-in-situation, the significance of developmental history in the emergence of psychosocial problems, and the content of human behavior in the social environment. A literature review supports the significance of the theory. Included are ideas about how attachment styles and working models may be used in assessment and treatment to help clients achieve a secure attachment style.

  8. An experimental evaluation of the State Adult Attachment Measure: The Influence of Attachment Primes on the Content of State Attachment Representations

    OpenAIRE

    Bosmans, Guy; Bowles, David, P.; Dewitte, Marieke; De Winter, Simon; Braet, Caroline

    2014-01-01

    Attachment theory predicts cross-contextual stability of attachment representations, but research findings are rather mixed. Recently, it has been suggested that these mixed findings reflect the existence of both state and trait attachment components. The development of the State Adult Attachment Measure (SAAM) has enabled an investigation of this hypothesis. The current study aimed to evaluate the extent to which the SAAM is a useful instrument for studying such state attachment hypotheses. ...

  9. Attachment over Time.

    Science.gov (United States)

    Lewis, Michael; Feiring, Candice; Rosenthal, Saul

    2000-01-01

    Examined continuity in attachment classification from infancy through adolescence and related it to autobiographical memories of childhood, divorce, and maladjustment in white middle-class children. Found no continuity in attachment classification from 1 to 18 years and no relation between infant attachment status and adolescent adjustment.…

  10. Mathematical model of highways network optimization

    Science.gov (United States)

    Sakhapov, R. L.; Nikolaeva, R. V.; Gatiyatullin, M. H.; Makhmutov, M. M.

    2017-12-01

    The article deals with the issue of highways network design. Studies show that the main requirement from road transport for the road network is to ensure the realization of all the transport links served by it, with the least possible cost. The goal of optimizing the network of highways is to increase the efficiency of transport. It is necessary to take into account a large number of factors that make it difficult to quantify and qualify their impact on the road network. In this paper, we propose building an optimal variant for locating the road network on the basis of a mathematical model. The article defines the criteria for optimality and objective functions that reflect the requirements for the road network. The most fully satisfying condition for optimality is the minimization of road and transport costs. We adopted this indicator as a criterion of optimality in the economic-mathematical model of a network of highways. Studies have shown that each offset point in the optimal binding road network is associated with all other corresponding points in the directions providing the least financial costs necessary to move passengers and cargo from this point to the other corresponding points. The article presents general principles for constructing an optimal network of roads.

  11. Neural network modeling of associative memory: Beyond the Hopfield model

    Science.gov (United States)

    Dasgupta, Chandan

    1992-07-01

    A number of neural network models, in which fixed-point and limit-cycle attractors of the underlying dynamics are used to store and associatively recall information, are described. In the first class of models, a hierarchical structure is used to store an exponentially large number of strongly correlated memories. The second class of models uses limit cycles to store and retrieve individual memories. A neurobiologically plausible network that generates low-amplitude periodic variations of activity, similar to the oscillations observed in electroencephalographic recordings, is also described. Results obtained from analytic and numerical studies of the properties of these networks are discussed.

  12. Sparsity in Model Gene Regulatory Networks

    International Nuclear Information System (INIS)

    Zagorski, M.

    2011-01-01

    We propose a gene regulatory network model which incorporates the microscopic interactions between genes and transcription factors. In particular the gene's expression level is determined by deterministic synchronous dynamics with contribution from excitatory interactions. We study the structure of networks that have a particular '' function '' and are subject to the natural selection pressure. The question of network robustness against point mutations is addressed, and we conclude that only a small part of connections defined as '' essential '' for cell's existence is fragile. Additionally, the obtained networks are sparse with narrow in-degree and broad out-degree, properties well known from experimental study of biological regulatory networks. Furthermore, during sampling procedure we observe that significantly different genotypes can emerge under mutation-selection balance. All the preceding features hold for the model parameters which lay in the experimentally relevant range. (author)

  13. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  14. Longitudinal associations between maternal disrupted representations, maternal interactive behavior and infant attachment: a comparison between full-term and preterm dyads.

    Science.gov (United States)

    Hall, R A S; Hoffenkamp, H N; Tooten, A; Braeken, J; Vingerhoets, A J J M; van Bakel, H J A

    2015-04-01

    This prospective study examined whether or not a mother's representations of her infant were more often disrupted after premature childbirth. Furthermore, the study examined if different components of maternal interactive behavior mediated the relation between maternal disrupted representations and infant attachment. The participants were mothers of full-term (n = 75), moderately preterm (n = 68) and very preterm infants (n = 67). Maternal representations were assessed by the Working Model of the Child Interview at 6 months post-partum. Maternal interactive behavior was evaluated at 6 and 24 months post-partum, using the National Institute of Child Health and Human Development Early Care Research Network mother-infant observation scales. Infant attachment was observed at 24 months post-partum and was coded by the Attachment Q-Set. The results reveal that a premature childbirth does not necessarily generate disrupted maternal representations of the infant. Furthermore, maternal interactive behavior appears to be an important mechanism through which maternal representations influence the development of infant attachment in full-term and preterm infants. Early assessment of maternal representations can identify mother-infant dyads at risk, in full-term and preterm samples.

  15. [Effects of an implicit internal working model on attachment in information processing assessed using Go/No-Go Association Task].

    Science.gov (United States)

    Fujii, Tsutomu; Uebuchi, Hisashi; Yamada, Kotono; Saito, Masahiro; Ito, Eriko; Tonegawa, Akiko; Uebuchi, Marie

    2015-06-01

    The purposes of the present study were (a) to use both a relational-anxiety Go/No-Go Association Task (GNAT) and an avoidance-of-intimacy GNAT in order to assess an implicit Internal Working Model (IWM) of attachment; (b) to verify the effects of both measured implicit relational anxiety and implicit avoidance of intimacy on information processing. The implicit IWM measured by GNAT differed from the explicit IWM measured by questionnaires in terms of the effects on information processing. In particular, in subliminal priming tasks involving with others, implicit avoidance of intimacy predicted accelerated response times with negative stimulus words about attachment. Moreover, after subliminally priming stimulus words about self, implicit relational anxiety predicted delayed response times with negative stimulus words about attachment.

  16. A framework for the analysis of vibrations of structures with uncertain attachments

    International Nuclear Information System (INIS)

    Li, Shuo; Mace, Brian R.; Halkyard, Roger; Ferguson, Neil S.

    2016-01-01

    Attachments affect the dynamic response of an assembled structure. When engineers are modelling structures, small attachments will often not be included in the “bare” model, especially in the initial design stages. The location of these attachments might be poorly known, yet they affect the response of the structure. This paper considers how attachments jointed to the structure at uncertain points, can be included in the dynamic model of a structure. Two approaches are proposed. In the time domain, a combination of component mode synthesis, characteristic constraint modes and modal analysis gives a computationally efficient basis for subsequent analysis using, for example, Monte Carlo simulation. The frequency domain approach is based on assembly of frequency response functions of bare structure and attachment. Numerical examples of a beam and a plate with a point mass added at an uncertain location are considered and predictions compared with experiment results. (paper)

  17. Optimal transportation networks models and theory

    CERN Document Server

    Bernot, Marc; Morel, Jean-Michel

    2009-01-01

    The transportation problem can be formalized as the problem of finding the optimal way to transport a given measure into another with the same mass. In contrast to the Monge-Kantorovitch problem, recent approaches model the branched structure of such supply networks as minima of an energy functional whose essential feature is to favour wide roads. Such a branched structure is observable in ground transportation networks, in draining and irrigation systems, in electrical power supply systems and in natural counterparts such as blood vessels or the branches of trees. These lectures provide mathematical proof of several existence, structure and regularity properties empirically observed in transportation networks. The link with previous discrete physical models of irrigation and erosion models in geomorphology and with discrete telecommunication and transportation models is discussed. It will be mathematically proven that the majority fit in the simple model sketched in this volume.

  18. Northern emporia and maritime networks. Modelling past communication using archaeological network analysis

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2015-01-01

    preserve patterns of thisinteraction. Formal network analysis and modelling holds the potential to identify anddemonstrate such patterns, where traditional methods often prove inadequate. Thearchaeological study of communication networks in the past, however, calls for radically different analytical...... this is not a problem of network analysis, but network synthesis: theclassic problem of cracking codes or reconstructing black-box circuits. It is proposedthat archaeological approaches to network synthesis must involve a contextualreading of network data: observations arising from individual contexts, morphologies...

  19. Road network safety evaluation using Bayesian hierarchical joint model.

    Science.gov (United States)

    Wang, Jie; Huang, Helai

    2016-05-01

    Safety and efficiency are commonly regarded as two significant performance indicators of transportation systems. In practice, road network planning has focused on road capacity and transport efficiency whereas the safety level of a road network has received little attention in the planning stage. This study develops a Bayesian hierarchical joint model for road network safety evaluation to help planners take traffic safety into account when planning a road network. The proposed model establishes relationships between road network risk and micro-level variables related to road entities and traffic volume, as well as socioeconomic, trip generation and network density variables at macro level which are generally used for long term transportation plans. In addition, network spatial correlation between intersections and their connected road segments is also considered in the model. A road network is elaborately selected in order to compare the proposed hierarchical joint model with a previous joint model and a negative binomial model. According to the results of the model comparison, the hierarchical joint model outperforms the joint model and negative binomial model in terms of the goodness-of-fit and predictive performance, which indicates the reasonableness of considering the hierarchical data structure in crash prediction and analysis. Moreover, both random effects at the TAZ level and the spatial correlation between intersections and their adjacent segments are found to be significant, supporting the employment of the hierarchical joint model as an alternative in road-network-level safety modeling as well. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Adult attachment security and college student substance use.

    Science.gov (United States)

    Kassel, Jon D; Wardle, Margaret; Roberts, John E

    2007-06-01

    Previous research has demonstrated strong links between quality of adult attachment styles and various forms of psychological distress. A burgeoning literature further points to a relationship between insecure attachment and drug use, particularly alcohol consumption. In the present study, we expanded upon the existing literature by examining the relationship between adult attachment style and use of cigarettes, alcohol, and marijuana in a sample of 212 college students. Moreover, based on our previous work [Hankin, B.L., Kassel, J.D., and Abela, J.R.Z. (2005). Adult attachment dimensions and specificity of emotional distress symptoms: prospective investigations of cognitive risk and interpersonal stress generation as mediating mechanisms. Personality and Social Psychology Bulletin, 31, 136-151.], we proposed a conceptual model positing that adult attachment style influences both frequency of drug use and stress-motivated drug use through its impact on dysfunctional attitudes and self-esteem. Initial correlational analyses indicated significant (positive) associations between anxious attachment (tapping neediness and fear of abandonment) and both drug use frequency and stress-motivated drug use. Simultaneous regression analyses revealed that, for drug use frequency, the influence of anxious attachment operated primarily through its effect on dysfunctional attitudes and self-esteem. Regarding drug use attributable to negative affect reduction, anxious attachment demonstrated direct, independent effects on both cigarette smoking and alcohol use. These findings highlight the potential importance of adult attachment styles as a risk factor for drug use among college students.

  1. Inside the Mechanics of Network Development: How Competition and Strategy Reorganize European Air Traffic

    Science.gov (United States)

    Huber, Hans

    2006-01-01

    Air transport forms complex networks that can be measured in order to understand its structural characteristics and functional properties. Recent models for network growth (i.e., preferential attachment, etc.) remain stochastic and do not seek to understand other network-specific mechanisms that may account for their development in a more microscopic way. Air traffic is made up of many constituent airlines that are either privately or publicly owned and that operate their own networks. They follow more or less similar business policies each. The way these airline networks organize among themselves into distinct traffic distributions reveals complex interaction among them, which in turn can be aggregated into larger (macro-) traffic distributions. Our approach allows for a more deterministic methodology that will assess the impact of airline strategies on the distinct distributions for air traffic, particularly inside Europe. One key question this paper is seeking to answer is whether there are distinct patterns of preferential attachment for given classes of airline networks to distinct types of European airports. Conclusions about the advancing degree of concentration in this industry and the airline operators that accelerate this process can be drawn.

  2. Stabilization of model-based networked control systems

    Energy Technology Data Exchange (ETDEWEB)

    Miranda, Francisco [CIDMA, Universidade de Aveiro, Aveiro (Portugal); Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); Abreu, Carlos [Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); CMEMS-UMINHO, Universidade do Minho, Braga (Portugal); Mendes, Paulo M. [CMEMS-UMINHO, Universidade do Minho, Braga (Portugal)

    2016-06-08

    A class of networked control systems called Model-Based Networked Control Systems (MB-NCSs) is considered. Stabilization of MB-NCSs is studied using feedback controls and simulation of stabilization for different feedbacks is made with the purpose to reduce the network trafic. The feedback control input is applied in a compensated model of the plant that approximates the plant dynamics and stabilizes the plant even under slow network conditions. Conditions for global exponential stabilizability and for the choosing of a feedback control input for a given constant time between the information moments of the network are derived. An optimal control problem to obtain an optimal feedback control is also presented.

  3. Discrete dynamic modeling of cellular signaling networks.

    Science.gov (United States)

    Albert, Réka; Wang, Rui-Sheng

    2009-01-01

    Understanding signal transduction in cellular systems is a central issue in systems biology. Numerous experiments from different laboratories generate an abundance of individual components and causal interactions mediating environmental and developmental signals. However, for many signal transduction systems there is insufficient information on the overall structure and the molecular mechanisms involved in the signaling network. Moreover, lack of kinetic and temporal information makes it difficult to construct quantitative models of signal transduction pathways. Discrete dynamic modeling, combined with network analysis, provides an effective way to integrate fragmentary knowledge of regulatory interactions into a predictive mathematical model which is able to describe the time evolution of the system without the requirement for kinetic parameters. This chapter introduces the fundamental concepts of discrete dynamic modeling, particularly focusing on Boolean dynamic models. We describe this method step-by-step in the context of cellular signaling networks. Several variants of Boolean dynamic models including threshold Boolean networks and piecewise linear systems are also covered, followed by two examples of successful application of discrete dynamic modeling in cell biology.

  4. Similarities and differences regarding changes in attachment preferences and attachment styles in relation to romantic relationship length: longitudinal and concurrent analyses.

    Science.gov (United States)

    Umemura, Tomotaka; Lacinová, Lenka; Kotrčová, Kristína; Fraley, R Chris

    2018-04-01

    This study examines whether attachment preferences and attachment styles with different figures (mother, father, romantic partner, and friends) change over the course of a romantic relationship. Study 1 employed a three-wave longitudinal sample of Czech young adults who were currently in a romantic relationship (N = 870; mean age = 21.57; SD = 1.51; 81% females). Multilevel modeling analyses revealed that, as romantic relationships progressed, attachment preferences for romantic partners increased and preferences for friends decreased. However, preferences for the mother or for the father did not change over time. The parallel pattern was found for attachment avoidance; as romantic relationships progressed, attachment avoidance with romantic partners decreased and avoidance with the best friend increased. Avoidance with mother or with father, however, did not change over time. Study 2 employed a cross-sectional international sample (n = 2,593; mean age = 31.99; SD = 12.13; 79% females). Multiple regression analyses replicated the findings of attachment avoidance in the longitudinal data.

  5. Neural network tagging in a toy model

    International Nuclear Information System (INIS)

    Milek, Marko; Patel, Popat

    1999-01-01

    The purpose of this study is a comparison of Artificial Neural Network approach to HEP analysis against the traditional methods. A toy model used in this analysis consists of two types of particles defined by four generic properties. A number of 'events' was created according to the model using standard Monte Carlo techniques. Several fully connected, feed forward multi layered Artificial Neural Networks were trained to tag the model events. The performance of each network was compared to the standard analysis mechanisms and significant improvement was observed

  6. The DSM-5 alternative model of personality disorders from the perspective of adult attachment: a study in community-dwelling adults.

    Science.gov (United States)

    Fossati, Andrea; Krueger, Robert F; Markon, Kristian E; Borroni, Serena; Maffei, Cesare; Somma, Antonella

    2015-04-01

    To assess how the maladaptive personality domains and facets that were included in the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) Alternative Model of Personality Disorders relate to adult attachment styles, 480 Italian nonclinical adults were administered the Personality Inventory for DSM-5 (PID-5) and the Attachment Style Questionnaire (ASQ). To evaluate the uniqueness of the associations between the PID-5 scales and the ASQ scales, the participants were also administered the Big Five Inventory (BFI). Multiple regression analyses showed that the ASQ scales significantly predicted both PID-5 domain scales and BFI scales; however, the relationships were different both qualitatively and quantitatively. With the exception of the PID-5 risk taking scale (adjusted R(2) = 0.02), all other PID-5 trait scales were significantly predicted by the ASQ scales, median adjusted R(2) value = 0.25, all ps personality domains and traits listed in the DSM-5 Alternative Model of Personality Disorders show meaningful associations with adult attachment styles.

  7. Parenting self-efficacy moderates linkage between partner relationship dissatisfaction and avoidant infant-mother attachment: A Dutch study.

    Science.gov (United States)

    Cassé, Julie F H; Oosterman, Mirjam; Schuengel, Carlo

    2016-12-01

    The early infant-mother attachment relationship is part of a network of close relationships in which the relationship between parents is especially relevant. Evidence for linkages between maternal satisfaction with the partner relationship and infant-mother attachment is equivocal. The current study tested whether associations between partner relationship dissatisfaction and infant-mother attachment quality might be conditional on mothers' parenting self-efficacy. The bivariate effect of partner relationship dissatisfaction on infant-mother attachment as well as moderation of this effect by parenting self-efficacy was tested in a sample of 260 infant-mother dyads 1 year after birth. There was no direct effect of partner dissatisfaction on attachment. Unexpectedly, for high parenting self-efficacy, greater partner dissatisfaction increased the odds of an avoidant infant attachment (compared with a disorganized) whereas, for low parenting self-efficacy, greater partner dissatisfaction decreased the odds of an avoidant infant attachment (compared with secure and disorganized). Findings underline the importance of parenting cognitions for understanding contextual factors of infant-mother attachment quality. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  8. Modeling Temporal Behavior in Large Networks: A Dynamic Mixed-Membership Model

    Energy Technology Data Exchange (ETDEWEB)

    Rossi, R; Gallagher, B; Neville, J; Henderson, K

    2011-11-11

    Given a large time-evolving network, how can we model and characterize the temporal behaviors of individual nodes (and network states)? How can we model the behavioral transition patterns of nodes? We propose a temporal behavior model that captures the 'roles' of nodes in the graph and how they evolve over time. The proposed dynamic behavioral mixed-membership model (DBMM) is scalable, fully automatic (no user-defined parameters), non-parametric/data-driven (no specific functional form or parameterization), interpretable (identifies explainable patterns), and flexible (applicable to dynamic and streaming networks). Moreover, the interpretable behavioral roles are generalizable, computationally efficient, and natively supports attributes. We applied our model for (a) identifying patterns and trends of nodes and network states based on the temporal behavior, (b) predicting future structural changes, and (c) detecting unusual temporal behavior transitions. We use eight large real-world datasets from different time-evolving settings (dynamic and streaming). In particular, we model the evolving mixed-memberships and the corresponding behavioral transitions of Twitter, Facebook, IP-Traces, Email (University), Internet AS, Enron, Reality, and IMDB. The experiments demonstrate the scalability, flexibility, and effectiveness of our model for identifying interesting patterns, detecting unusual structural transitions, and predicting the future structural changes of the network and individual nodes.

  9. Influence of extracellular matrix proteins on human keratinocyte attachment, proliferation and transfer to a dermal wound model.

    Science.gov (United States)

    Dawson, R A; Goberdhan, N J; Freedlander, E; MacNeil, S

    1996-03-01

    The aim of this study was to investigate whether prior culture of cells on ECM proteins might positively influence the performance of keratinocytes when cells are transferred to a dermal in vitro wound bed model. Keratinocytes were cultured using a method for producing cultured epithelial autografts for severely burned patients (essentially using Green's medium, a mitogen-rich medium containing fetal calf serum, cholera toxin, EGF, insulin, transferrin and triiodothyronine). Cells were cultured either on irradiated 3T3 fibroblasts (as in the standard Rheinwald and Green technique) or, alternatively, on collagen I, collagen IV, matrigel, RGD, vitronectin or fibronectin. Under these conditions matrigel, collagen I and IV enhanced initial attachment, RGD, vitronectin, fibronectin and irradiated 3T3 fibroblasts did not. Proliferation of cells was positively influenced by matrigel, collagen I and IV and irradiated 3T3 fibroblasts; of these, however, only matrigel and 3T3 fibroblasts had sustained significant effects on keratinocyte proliferation over 4 days. Cells on fibronectin showed significantly reduced proliferation. An acellular non-viable dermis was then used to mimic the homograft allodermis onto which cultured epithelial autograft sheets are grafted clinically and cells cultured on the various ECM proteins for 96 h were transferred to this in vitro wound model. None of the substrates enhanced keratinocyte performance on this model. It was concluded that under these conditions some ECM proteins can significantly affect keratinocyte attachment and, to a lesser extent, proliferation but that the culture of keratinocytes on these ECM proteins does not appear to confer any lasting benefit to the attachment of these keratinocytes to an in vitro wound-bed model.

  10. Pet in the therapy room: an attachment perspective on Animal-Assisted Therapy.

    Science.gov (United States)

    Zilcha-Mano, Sigal; Mikulincer, Mario; Shaver, Phillip R

    2011-11-01

    John Bowlby's ( 1973, 1980, 1982) attachment theory is one of the most influential theories in personality and developmental psychology and provides insights into adjustment and psychopathology across the lifespan. The theory is also helpful in defining the target of change in psychotherapy, understanding the processes by which change occurs, and conceptualizing cases and planning treatment (Daniel, 2006; Obegi & Berant, 2008; Sable, 2004 ; Wallin, 2007). Here, we propose a model of Animal-Assisted Therapy (AAT) based on attachment theory and on the unique characteristics of human-pet relationships. The model includes clients' unmet attachment needs, individual differences in attachment insecurity, coping, and responsiveness to therapy. It also suggests ways to foster the development of more adaptive patterns of attachment and healthier modes of relating to others.

  11. Systemic therapy and attachment narratives: Attachment Narrative Therapy.

    Science.gov (United States)

    Dallos, Rudi; Vetere, Arlene

    2014-10-01

    This article outlines an integration of attachment theory with narrative theory and systemic theory and practice: Attachment Narrative Therapy (ANT). This integration offers a more powerful explanatory formulation of the development and maintenance of human distress in relationships, families and communities, and gives direction to psychotherapeutic intervention. © The Author(s) 2014.

  12. Improved Maximum Parsimony Models for Phylogenetic Networks.

    Science.gov (United States)

    Van Iersel, Leo; Jones, Mark; Scornavacca, Celine

    2018-05-01

    Phylogenetic networks are well suited to represent evolutionary histories comprising reticulate evolution. Several methods aiming at reconstructing explicit phylogenetic networks have been developed in the last two decades. In this article, we propose a new definition of maximum parsimony for phylogenetic networks that permits to model biological scenarios that cannot be modeled by the definitions currently present in the literature (namely, the "hardwired" and "softwired" parsimony). Building on this new definition, we provide several algorithmic results that lay the foundations for new parsimony-based methods for phylogenetic network reconstruction.

  13. Its ovr b/n u n me: technology use, attachment styles, and gender roles in relationship dissolution.

    Science.gov (United States)

    Weisskirch, Robert S; Delevi, Raquel

    2012-09-01

    Relationship dissolution now occurs through technologies like text messaging, e-mail, and social networking sites (SNS). Individuals who experience relationship dissolution via technology may differ in their attachment pattern and gender role attitudes from those who have not had that experience. One hundred five college students (males=21 and females=84) completed an online questionnaire about technology-mediated breakups, attachment style, and gender role attitudes. More than a quarter of the sample had experienced relationship dissolution via technology. Attachment anxiety predicted those subject to technology-mediated breakups. Attachment avoidance and less traditional gender roles were associated with increased likelihood of technology use in relationship dissolution. Implications are discussed in regards to future research and practice.

  14. Equity venture capital platform model based on complex network

    Science.gov (United States)

    Guo, Dongwei; Zhang, Lanshu; Liu, Miao

    2018-05-01

    This paper uses the small-world network and the random-network to simulate the relationship among the investors, construct the network model of the equity venture capital platform to explore the impact of the fraud rate and the bankruptcy rate on the robustness of the network model while observing the impact of the average path length and the average agglomeration coefficient of the investor relationship network on the income of the network model. The study found that the fraud rate and bankruptcy rate exceeded a certain threshold will lead to network collapse; The bankruptcy rate has a great influence on the income of the platform; The risk premium exists, and the average return is better under a certain range of bankruptcy risk; The structure of the investor relationship network has no effect on the income of the investment model.

  15. Resolving structural variability in network models and the brain.

    Directory of Open Access Journals (Sweden)

    Florian Klimm

    2014-03-01

    Full Text Available Large-scale white matter pathways crisscrossing the cortex create a complex pattern of connectivity that underlies human cognitive function. Generative mechanisms for this architecture have been difficult to identify in part because little is known in general about mechanistic drivers of structured networks. Here we contrast network properties derived from diffusion spectrum imaging data of the human brain with 13 synthetic network models chosen to probe the roles of physical network embedding and temporal network growth. We characterize both the empirical and synthetic networks using familiar graph metrics, but presented here in a more complete statistical form, as scatter plots and distributions, to reveal the full range of variability of each measure across scales in the network. We focus specifically on the degree distribution, degree assortativity, hierarchy, topological Rentian scaling, and topological fractal scaling--in addition to several summary statistics, including the mean clustering coefficient, the shortest path-length, and the network diameter. The models are investigated in a progressive, branching sequence, aimed at capturing different elements thought to be important in the brain, and range from simple random and regular networks, to models that incorporate specific growth rules and constraints. We find that synthetic models that constrain the network nodes to be physically embedded in anatomical brain regions tend to produce distributions that are most similar to the corresponding measurements for the brain. We also find that network models hardcoded to display one network property (e.g., assortativity do not in general simultaneously display a second (e.g., hierarchy. This relative independence of network properties suggests that multiple neurobiological mechanisms might be at play in the development of human brain network architecture. Together, the network models that we develop and employ provide a potentially useful

  16. A Network Contention Model for the Extreme-scale Simulator

    Energy Technology Data Exchange (ETDEWEB)

    Engelmann, Christian [ORNL; Naughton III, Thomas J [ORNL

    2015-01-01

    The Extreme-scale Simulator (xSim) is a performance investigation toolkit for high-performance computing (HPC) hardware/software co-design. It permits running a HPC application with millions of concurrent execution threads, while observing its performance in a simulated extreme-scale system. This paper details a newly developed network modeling feature for xSim, eliminating the shortcomings of the existing network modeling capabilities. The approach takes a different path for implementing network contention and bandwidth capacity modeling using a less synchronous and accurate enough model design. With the new network modeling feature, xSim is able to simulate on-chip and on-node networks with reasonable accuracy and overheads.

  17. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  18. Building functional networks of spiking model neurons.

    Science.gov (United States)

    Abbott, L F; DePasquale, Brian; Memmesheimer, Raoul-Martin

    2016-03-01

    Most of the networks used by computer scientists and many of those studied by modelers in neuroscience represent unit activities as continuous variables. Neurons, however, communicate primarily through discontinuous spiking. We review methods for transferring our ability to construct interesting networks that perform relevant tasks from the artificial continuous domain to more realistic spiking network models. These methods raise a number of issues that warrant further theoretical and experimental study.

  19. Interdependence of attachment styles and relationship quality in parent-adolescent dyads.

    Science.gov (United States)

    Chow, Chong Man; Hart, Ellen; Ellis, Lillian; Tan, Cin Cin

    2017-12-01

    The current study examined how attachment styles of parents and adolescents may jointly influence the quality of their relationship. Parent-adolescent (N dyads  = 77) pairs were recruited from a Midwestern town in the United States. The mean of adolescents' age was 16.25. Both members reported their attachment styles, relationship closeness, and relationship discord. The Actor-Partner Interdependence Model (APIM) showed that both members' attachment avoidance was associated with self-report lower levels of closeness. Parents' attachment anxiety was related to relationship discord. Parents with higher avoidant attachment reported lower closeness when adolescents were higher in avoidant attachment. Higher parents' anxious attachment was related to higher relationship closeness when adolescents were higher on anxious attachment. Such an association was negative when adolescents had lower anxious attachment. Higher parents' anxious attachment was related to greater discord when adolescents were lower on anxiety attachment. This study reveals the complex dyadic dynamics of relationship quality in parent-adolescent pairs. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  20. The Relationship of Adult Attachment Theory and Affect Regulation Strategies to Depression

    Directory of Open Access Journals (Sweden)

    Manolya Calisir

    2009-09-01

    Full Text Available According to the attachment theory which is also known as an affect regulation theory, internal working models that are constituted by the interaction between primary care giver and infant in the early period of life. These working models plays an important role how the infant gives a meaning to the world and himself/ herself and it determines the individual’s personality development and by the way the probable psychopathologies that can be observed in the future like depression. In relation with this, many of the empirical studies in the adult literature states on how internal models and cognitive representations have an influence on emotional reactions. According to various studies, reporting different attachment styles and individuals who has probably different internal models, differs in each others’ emotional reactions and how they behave according to these reactions. In view of attachment literature, individual makes a decision in terms of making affect regulation for maintaining proximity seeking and this process evokes the activation of secondary attachment strategies which are named as hyper and deactivating strategies. From the framework of this review, the relationship between major depression and adult attachment styles, affect regulation strategies is examined. Firstly, Bowlby’s attachment theory is mentioned shortly and adult attachment styles are introduced. Secondly, affect regulation strategies, which are thought to be related with major depression as a mood disorder are identified and finally, the empirical research findings relevant to the topic are represented.

  1. SPLAI: Computational Finite Element Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ruzana Ishak

    2006-01-01

    Full Text Available Wireless sensor network refers to a group of sensors, linked by a wireless medium to perform distributed sensing task. The primary interest is their capability in monitoring the physical environment through the deployment of numerous tiny, intelligent, wireless networked sensor nodes. Our interest consists of a sensor network, which includes a few specialized nodes called processing elements that can perform some limited computational capabilities. In this paper, we propose a model called SPLAI that allows the network to compute a finite element problem where the processing elements are modeled as the nodes in the linear triangular approximation problem. Our model also considers the case of some failures of the sensors. A simulation model to visualize this network has been developed using C++ on the Windows environment.

  2. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  3. Infant attachment, adult attachment, and maternal sensitivity: revisiting the intergenerational transmission gap.

    Science.gov (United States)

    Behrens, Kazuko Y; Haltigan, John D; Bahm, Naomi I Gribneau

    2016-08-01

    This study investigated the intergenerational transmission of attachment, utilizing the Adult Attachment Interview (AAI), the Strange Situation Procedure (SSP), and the Maternal Behavioral Q-Set (MBQS). We revisited fundamental questions in attachment theory and research by examining: (1) the level of intergenerational agreement between maternal attachment representations and infant attachment security, and (2) whether maternal sensitivity serves as an intergenerational mediator between adult and infant attachment security. Significant categorical matches between the AAI and the SSP as well as mean differences for MBQS scores between adult attachment secure-insecure groups were found. Consistent with earlier intergenerational research, maternal sensitivity only partially mediated the AAI-SSP link, indicating the transmission gap remains. Consistent with recent mediation studies, using more contemporary analytical techniques, it was confirmed that maternal sensitivity did mediate the direct pathway between AAI security and SSP security. Thus, the transmission gap appears somewhat different depending on the statistical method used to measure mediation. Post hoc analyses considered mothers' childhood experiences of separation/divorce and this helped make sense of intergenerational mismatches.

  4. Comparison of Brain Activity Correlating with Self-Report versus Narrative Attachment Measures during Conscious Appraisal of an Attachment Figure

    Science.gov (United States)

    Yaseen, Zimri S.; Zhang, Xian; Muran, J. Christopher; Winston, Arnold; Galynker, Igor I.

    2016-01-01

    Objectives: The Adult Attachment Interview (AAI) has been the gold standard of attachment assessment, but requires special training. The Relationship Scales Questionnaire (RSQ) is a widely used self-report measure. We investigate how each correlates with brain activity during appraisal of subjects’ mothers. Methods: Twenty-eight women were scored on the AAI, RSQ, and mood measures. During functional magnetic resonance imaging, subjects viewed their mothers in neutral-, valence-, and salience-rating conditions. We identified regions where contrasts in brain activity between appraisal and neutral viewing conditions correlated with each measure of attachment after covarying for mood. AAI and RSQ measures were then compared in terms of the extent to which regions of correlating brain activity overlapped with “default mode network” (DMN) vs. executive frontal network (EFN) masks and cortical vs. subcortical masks. Additionally, interactions with mood were examined. Results: Salience and valence processing associated with increased thalamo-striatal, posterior cingulate, and visual cortex activity. Salience processing decreased PFC activity, whereas valence processing increased left insula activity. Activity correlating with AAI vs. RSQ measures demonstrated significantly more DMN and subcortical involvement. Interactions with mood were observed in the middle temporal gyrus and precuneus for both measures. Conclusion: The AAI appears to disproportionately correlate with conscious appraisal associated activity in DMN and subcortical structures, while the RSQ appears to tap EFN structures more extensively. Thus, the AAI may assess more interoceptive, ‘core-self’-related processes, while the RSQ captures higher-order cognitions involved in attachment. Shared interaction effects between mood and AAI and RSQ-measures may suggest that processes tapped by each belong to a common system. PMID:27014022

  5. Attachment and children's biased attentional processing: evidence for the exclusion of attachment-related information.

    Directory of Open Access Journals (Sweden)

    Eva Vandevivere

    Full Text Available Research in both infants and adults demonstrated that attachment expectations are associated with the attentional processing of attachment-related information. However, this research suffered from methodological issues and has not been validated across ages. Employing a more ecologically valid paradigm to measure attentional processes by virtue of eye tracking, the current study tested the defensive exclusion hypothesis in late childhood. According to this hypothesis, insecurely attached children are assumed to defensively exclude attachment-related information. We hypothesized that securely attached children process attachment- related neutral and emotional information in a more open manner compared to insecurely attached children. Sixty-two children (59.7% girls, 8-12 years completed two different tasks, while eye movements were recorded: task one presented an array of neutral faces including mother and unfamiliar women and task two presented the same with happy and angry faces. Results indicated that more securely attached children looked longer at mother's face regardless of the emotional expression. Also, they tend to have more maintained attention to mother's neutral face. Furthermore, more attachment avoidance was related to a reduced total viewing time of mother's neutral, happy, and angry face. Attachment anxiety was not consistently related to the processing of mother's face. Findings support the theoretical assumption that securely attached children have an open manner of processing all attachment-related information.

  6. A longitudinal study of maternal attachment and infant developmental outcomes.

    Science.gov (United States)

    Alhusen, Jeanne L; Hayat, Matthew J; Gross, Deborah

    2013-12-01

    Extant research has demonstrated that compared to adults with insecure attachment styles, more securely attached parents tend to be more responsive, sensitive, and involved parents, resulting in improved outcomes for their children. Less studied is the influence of a mother's attachment style on her attachment to her unborn child during pregnancy and the consequent developmental outcomes of the child during early childhood. Thus, the aim of this prospective longitudinal study was to examine the relationship between maternal-fetal attachment (MFA) during pregnancy and infant and toddler outcomes and the role of mothers' attachment style on early childhood developmental outcomes in an economically disadvantaged sample of women and their children. Gamma regression modeling demonstrated that an avoidant maternal attachment style (b = .98, 95 % CI [.97, .98], p attachment styles and greater depressive symptomatology were more likely to have children demonstrating early childhood developmental delays than those women with less avoidant attachment styles and less depressive symptomatology. Furthermore, women reporting higher MFA during pregnancy had more secure attachment styles, and their children had more optimal early childhood development than those women reporting lower MFA and less secure attachment styles. Findings have implications for enhancing early intervention programs aimed at improving maternal and childhood outcomes. An earlier identification of disruptions in attachment may be beneficial in tailoring interventions focused on the mother-child dyad.

  7. Functional model of biological neural networks.

    Science.gov (United States)

    Lo, James Ting-Ho

    2010-12-01

    A functional model of biological neural networks, called temporal hierarchical probabilistic associative memory (THPAM), is proposed in this paper. THPAM comprises functional models of dendritic trees for encoding inputs to neurons, a first type of neuron for generating spike trains, a second type of neuron for generating graded signals to modulate neurons of the first type, supervised and unsupervised Hebbian learning mechanisms for easy learning and retrieving, an arrangement of dendritic trees for maximizing generalization, hardwiring for rotation-translation-scaling invariance, and feedback connections with different delay durations for neurons to make full use of present and past informations generated by neurons in the same and higher layers. These functional models and their processing operations have many functions of biological neural networks that have not been achieved by other models in the open literature and provide logically coherent answers to many long-standing neuroscientific questions. However, biological justifications of these functional models and their processing operations are required for THPAM to qualify as a macroscopic model (or low-order approximate) of biological neural networks.

  8. Stability of a neural network model with small-world connections

    International Nuclear Information System (INIS)

    Li Chunguang; Chen Guanrong

    2003-01-01

    Small-world networks are highly clustered networks with small distances among the nodes. There are many biological neural networks that present this kind of connection. There are no special weightings in the connections of most existing small-world network models. However, this kind of simply connected model cannot characterize biological neural networks, in which there are different weights in synaptic connections. In this paper, we present a neural network model with weighted small-world connections and further investigate the stability of this model

  9. Combinatorial explosion in model gene networks

    Science.gov (United States)

    Edwards, R.; Glass, L.

    2000-09-01

    The explosive growth in knowledge of the genome of humans and other organisms leaves open the question of how the functioning of genes in interacting networks is coordinated for orderly activity. One approach to this problem is to study mathematical properties of abstract network models that capture the logical structures of gene networks. The principal issue is to understand how particular patterns of activity can result from particular network structures, and what types of behavior are possible. We study idealized models in which the logical structure of the network is explicitly represented by Boolean functions that can be represented by directed graphs on n-cubes, but which are continuous in time and described by differential equations, rather than being updated synchronously via a discrete clock. The equations are piecewise linear, which allows significant analysis and facilitates rapid integration along trajectories. We first give a combinatorial solution to the question of how many distinct logical structures exist for n-dimensional networks, showing that the number increases very rapidly with n. We then outline analytic methods that can be used to establish the existence, stability and periods of periodic orbits corresponding to particular cycles on the n-cube. We use these methods to confirm the existence of limit cycles discovered in a sample of a million randomly generated structures of networks of 4 genes. Even with only 4 genes, at least several hundred different patterns of stable periodic behavior are possible, many of them surprisingly complex. We discuss ways of further classifying these periodic behaviors, showing that small mutations (reversal of one or a few edges on the n-cube) need not destroy the stability of a limit cycle. Although these networks are very simple as models of gene networks, their mathematical transparency reveals relationships between structure and behavior, they suggest that the possibilities for orderly dynamics in such

  10. Continuum Modeling of Biological Network Formation

    KAUST Repository

    Albi, Giacomo

    2017-04-10

    We present an overview of recent analytical and numerical results for the elliptic–parabolic system of partial differential equations proposed by Hu and Cai, which models the formation of biological transportation networks. The model describes the pressure field using a Darcy type equation and the dynamics of the conductance network under pressure force effects. Randomness in the material structure is represented by a linear diffusion term and conductance relaxation by an algebraic decay term. We first introduce micro- and mesoscopic models and show how they are connected to the macroscopic PDE system. Then, we provide an overview of analytical results for the PDE model, focusing mainly on the existence of weak and mild solutions and analysis of the steady states. The analytical part is complemented by extensive numerical simulations. We propose a discretization based on finite elements and study the qualitative properties of network structures for various parameter values.

  11. Partially ordered sets in complex networks

    International Nuclear Information System (INIS)

    Xuan Qi; Du Fang; Wu Tiejun

    2010-01-01

    In this paper, a partial-order relation is defined among vertices of a network to describe which vertex is more important than another on its contribution to the connectivity of the network. A maximum linearly ordered subset of vertices is defined as a chain and the chains sharing the same end-vertex are grouped as a family. Through combining the same vertices appearing in different chains, a directed chain graph is obtained. Based on these definitions, a series of new network measurements, such as chain length distribution, family diversity distribution, as well as the centrality of families, are proposed. By studying the partially ordered sets in three kinds of real-world networks, many interesting results are revealed. For instance, the similar approximately power-law chain length distribution may be attributed to a chain-based positive feedback mechanism, i.e. new vertices prefer to participate in longer chains, which can be inferred by combining the notable preferential attachment rule with a well-ordered recommendation manner. Moreover, the relatively large average incoming degree of the chain graphs may indicate an efficient substitution mechanism in these networks. Most of the partially ordered set-based properties cannot be explained by the current well-known scale-free network models; therefore, we are required to propose more appropriate network models in the future.

  12. Modelling the impact of social network on energy savings

    International Nuclear Information System (INIS)

    Du, Feng; Zhang, Jiangfeng; Li, Hailong; Yan, Jinyue; Galloway, Stuart; Lo, Kwok L.

    2016-01-01

    Highlights: • Energy saving propagation along a social network is modelled. • This model consists of a time evolving weighted directed network. • Network weights and information decay are applied in savings calculation. - Abstract: It is noted that human behaviour changes can have a significant impact on energy consumption, however, qualitative study on such an impact is still very limited, and it is necessary to develop the corresponding mathematical models to describe how much energy savings can be achieved through human engagement. In this paper a mathematical model of human behavioural dynamic interactions on a social network is derived to calculate energy savings. This model consists of a weighted directed network with time evolving information on each node. Energy savings from the whole network is expressed as mathematical expectation from probability theory. This expected energy savings model includes both direct and indirect energy savings of individuals in the network. The savings model is obtained by network weights and modified by the decay of information. Expected energy savings are calculated for cases where individuals in the social network are treated as a single information source or multiple sources. This model is tested on a social network consisting of 40 people. The results show that the strength of relations between individuals is more important to information diffusion than the number of connections individuals have. The expected energy savings of optimally chosen node can be 25.32% more than randomly chosen nodes at the end of the second month for the case of single information source in the network, and 16.96% more than random nodes for the case of multiple information sources. This illustrates that the model presented in this paper can be used to determine which individuals will have the most influence on the social network, which in turn provides a useful guide to identify targeted customers in energy efficiency technology rollout

  13. The Attachment Imperative

    DEFF Research Database (Denmark)

    Navne, Laura Emdal; Svendsen, Mette Nordahl; Gammeltoft, Tine

    2017-01-01

    on social relations and point to the productive aspects of practices of distance and detachment. We show that while the NICU upholds an imperative of attachment independently of the infant's chances of survival, for parents, attachment is contingent on certain hesitations in relation to their infant. We...... argue that there are nuances in practices of relationmaking in need of more attention (i.e., the nexus of attachment and detachment). Refraining from touching, holding, and feeding their infants during critical periods, the parents enact detachment as integral to their practices of attachment....... Such “cuts” in parent–infant relations become steps on the way to securing the infant's survival and making kin(ship). We conclude that although infants may be articulated as “maybe‐lives” by staff, in the NICU as well as in Danish society, the ideal of attachment appears to leave little room for “maybe‐parents.”...

  14. Settings in Social Networks : a Measurement Model

    NARCIS (Netherlands)

    Schweinberger, Michael; Snijders, Tom A.B.

    2003-01-01

    A class of statistical models is proposed that aims to recover latent settings structures in social networks. Settings may be regarded as clusters of vertices. The measurement model is based on two assumptions. (1) The observed network is generated by hierarchically nested latent transitive

  15. ANTENATAL DETERMINANTS OF PARENTAL ATTACHMENT AND PARENTING ALLIANCE: HOW DO MOTHERS AND FATHERS DIFFER?

    Science.gov (United States)

    Luz, Rita; George, Astrid; Vieux, Rachel; Spitz, Elisabeth

    2017-03-01

    Parental (parent-to-infant) attachment and parenting alliance are defined as two important components of psychoaffective adjustment to the parental role. This study aimed to build a predictive model of parental attachment and parenting alliance for mothers and fathers using partial least squares-structural equation modeling. Specifically, we were interested in assessing how adult romantic attachment, marital quality, and psychological distress influenced parental attachment (parent-to-infant) and parenting alliance. Forty heterosexual couples completed questionnaires during the third trimester of pregnancy and 2 months after childbirth. Results showed that adult romantic attachment, marital quality, and psychological distress were important antenatal determinants of parental attachment and parenting alliance, although they behaved differently for mothers and fathers. Hence, different predictive models were therefore proposed for mothers and fathers. Mothers' attachment to the child was influenced by internal factors as adult attachment dimensions; for fathers, it also depended on mothers' antenatal attachment to the child and on marital quality. Concerning parenting alliance, both mothers and fathers depended on own and partner's variables. Antenatal variables are important for what occurs during the transition to parenthood in terms of parenting adjustment and act differently for mothers and fathers. It thus is important to assess the psychological functioning of both mothers and fathers. © 2017 Michigan Association for Infant Mental Health.

  16. An endogenous model of the credit network

    Science.gov (United States)

    He, Jianmin; Sui, Xin; Li, Shouwei

    2016-01-01

    In this paper, an endogenous credit network model of firm-bank agents is constructed. The model describes the endogenous formation of firm-firm, firm-bank and bank-bank credit relationships. By means of simulations, the model is capable of showing some obvious similarities with empirical evidence found by other scholars: the upper-tail of firm size distribution can be well fitted with a power-law; the bank size distribution can be lognormally distributed with a power-law tail; the bank in-degrees of the interbank credit network as well as the firm-bank credit network fall into two-power-law distributions.

  17. A last updating evolution model for online social networks

    Science.gov (United States)

    Bu, Zhan; Xia, Zhengyou; Wang, Jiandong; Zhang, Chengcui

    2013-05-01

    As information technology has advanced, people are turning to electronic media more frequently for communication, and social relationships are increasingly found on online channels. However, there is very limited knowledge about the actual evolution of the online social networks. In this paper, we propose and study a novel evolution network model with the new concept of “last updating time”, which exists in many real-life online social networks. The last updating evolution network model can maintain the robustness of scale-free networks and can improve the network reliance against intentional attacks. What is more, we also found that it has the “small-world effect”, which is the inherent property of most social networks. Simulation experiment based on this model show that the results and the real-life data are consistent, which means that our model is valid.

  18. Mathematical modelling of complex contagion on clustered networks

    Science.gov (United States)

    O'sullivan, David J.; O'Keeffe, Gary; Fennell, Peter; Gleeson, James

    2015-09-01

    The spreading of behavior, such as the adoption of a new innovation, is influenced bythe structure of social networks that interconnect the population. In the experiments of Centola (Science, 2010), adoption of new behavior was shown to spread further and faster across clustered-lattice networks than across corresponding random networks. This implies that the “complex contagion” effects of social reinforcement are important in such diffusion, in contrast to “simple” contagion models of disease-spread which predict that epidemics would grow more efficiently on random networks than on clustered networks. To accurately model complex contagion on clustered networks remains a challenge because the usual assumptions (e.g. of mean-field theory) regarding tree-like networks are invalidated by the presence of triangles in the network; the triangles are, however, crucial to the social reinforcement mechanism, which posits an increased probability of a person adopting behavior that has been adopted by two or more neighbors. In this paper we modify the analytical approach that was introduced by Hebert-Dufresne et al. (Phys. Rev. E, 2010), to study disease-spread on clustered networks. We show how the approximation method can be adapted to a complex contagion model, and confirm the accuracy of the method with numerical simulations. The analytical results of the model enable us to quantify the level of social reinforcement that is required to observe—as in Centola’s experiments—faster diffusion on clustered topologies than on random networks.

  19. Mathematical modelling of complex contagion on clustered networks

    Directory of Open Access Journals (Sweden)

    David J. P. O'Sullivan

    2015-09-01

    Full Text Available The spreading of behavior, such as the adoption of a new innovation, is influenced bythe structure of social networks that interconnect the population. In the experiments of Centola (Science, 2010, adoption of new behavior was shown to spread further and faster across clustered-lattice networks than across corresponding random networks. This implies that the complex contagion effects of social reinforcement are important in such diffusion, in contrast to simple contagion models of disease-spread which predict that epidemics would grow more efficiently on random networks than on clustered networks. To accurately model complex contagion on clustered networks remains a challenge because the usual assumptions (e.g. of mean-field theory regarding tree-like networks are invalidated by the presence of triangles in the network; the triangles are, however, crucial to the social reinforcement mechanism, which posits an increased probability of a person adopting behavior that has been adopted by two or more neighbors. In this paper we modify the analytical approach that was introduced by Hebert-Dufresne et al. (Phys. Rev. E, 2010, to study disease-spread on clustered networks. We show how the approximation method can be adapted to a complex contagion model, and confirm the accuracy of the method with numerical simulations. The analytical results of the model enable us to quantify the level of social reinforcement that is required to observe—as in Centola’s experiments—faster diffusion on clustered topologies than on random networks.

  20. Phenomenological network models: Lessons for epilepsy surgery.

    Science.gov (United States)

    Hebbink, Jurgen; Meijer, Hil; Huiskamp, Geertjan; van Gils, Stephan; Leijten, Frans

    2017-10-01

    The current opinion in epilepsy surgery is that successful surgery is about removing pathological cortex in the anatomic sense. This contrasts with recent developments in epilepsy research, where epilepsy is seen as a network disease. Computational models offer a framework to investigate the influence of networks, as well as local tissue properties, and to explore alternative resection strategies. Here we study, using such a model, the influence of connections on seizures and how this might change our traditional views of epilepsy surgery. We use a simple network model consisting of four interconnected neuronal populations. One of these populations can be made hyperexcitable, modeling a pathological region of cortex. Using model simulations, the effect of surgery on the seizure rate is studied. We find that removal of the hyperexcitable population is, in most cases, not the best approach to reduce the seizure rate. Removal of normal populations located at a crucial spot in the network, the "driver," is typically more effective in reducing seizure rate. This work strengthens the idea that network structure and connections may be more important than localizing the pathological node. This can explain why lesionectomy may not always be sufficient. © 2017 The Authors. Epilepsia published by Wiley Periodicals, Inc. on behalf of International League Against Epilepsy.

  1. Network geometry with flavor: From complexity to quantum geometry

    Science.gov (United States)

    Bianconi, Ginestra; Rahmede, Christoph

    2016-03-01

    Network geometry is attracting increasing attention because it has a wide range of applications, ranging from data mining to routing protocols in the Internet. At the same time advances in the understanding of the geometrical properties of networks are essential for further progress in quantum gravity. In network geometry, simplicial complexes describing the interaction between two or more nodes play a special role. In fact these structures can be used to discretize a geometrical d -dimensional space, and for this reason they have already been widely used in quantum gravity. Here we introduce the network geometry with flavor s =-1 ,0 ,1 (NGF) describing simplicial complexes defined in arbitrary dimension d and evolving by a nonequilibrium dynamics. The NGF can generate discrete geometries of different natures, ranging from chains and higher-dimensional manifolds to scale-free networks with small-world properties, scale-free degree distribution, and nontrivial community structure. The NGF admits as limiting cases both the Bianconi-Barabási models for complex networks, the stochastic Apollonian network, and the recently introduced model for complex quantum network manifolds. The thermodynamic properties of NGF reveal that NGF obeys a generalized area law opening a new scenario for formulating its coarse-grained limit. The structure of NGF is strongly dependent on the dimensionality d . In d =1 NGFs grow complex networks for which the preferential attachment mechanism is necessary in order to obtain a scale-free degree distribution. Instead, for NGF with dimension d >1 it is not necessary to have an explicit preferential attachment rule to generate scale-free topologies. We also show that NGF admits a quantum mechanical description in terms of associated quantum network states. Quantum network states evolve by a Markovian dynamics and a quantum network state at time t encodes all possible NGF evolutions up to time t . Interestingly the NGF remains fully classical but

  2. Interpersonal trauma, attachment insecurity and anxiety in an inpatient psychiatric population.

    Science.gov (United States)

    Wiltgen, Anika; Arbona, Consuelo; Frankel, Leslie; Frueh, B Christopher

    2015-10-01

    Current research suggests that interpersonal trauma has an impact on insecure attachment and anxiety. Some research further suggests that attachment may play a mediating role between traumatic events and psychopathology. The purpose of this study was to examine the relationship between the experience of interpersonal trauma, attachment anxiety, attachment avoidance and clinical anxiety severity among adult psychiatric inpatients who reported having experienced interpersonal trauma after the age of 16. It was hypothesized that attachment anxiety and attachment avoidance would mediate the relationship between interpersonal trauma and clinical anxiety level. This study used archival data on 414 adult psychiatric inpatients in a large city in the Southwest U.S. Results suggest that interpersonal trauma was correlated to attachment avoidance but not to attachment anxiety and that attachment avoidance partially mediated the relation of interpersonal trauma to anxiety. The attachment framework appositely explains how a negative model of other contributes to the relation between experiences of interpersonal trauma and anxiety in adulthood. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Dynamic thermo-hydraulic model of district cooling networks

    International Nuclear Information System (INIS)

    Oppelt, Thomas; Urbaneck, Thorsten; Gross, Ulrich; Platzer, Bernd

    2016-01-01

    Highlights: • A dynamic thermo-hydraulic model for district cooling networks is presented. • The thermal modelling is based on water segment tracking (Lagrangian approach). • Thus, numerical errors and balance inaccuracies are avoided. • Verification and validation studies proved the reliability of the model. - Abstract: In the present paper, the dynamic thermo-hydraulic model ISENA is presented which can be applied for answering different questions occurring in design and operation of district cooling networks—e.g. related to economic and energy efficiency. The network model consists of a quasistatic hydraulic model and a transient thermal model based on tracking water segments through the whole network (Lagrangian method). Applying this approach, numerical errors and balance inaccuracies can be avoided which leads to a higher quality of results compared to other network models. Verification and validation calculations are presented in order to show that ISENA provides reliable results and is suitable for practical application.

  4. Attachment Versus Differentiation: The Contemporary Couple Therapy Debate.

    Science.gov (United States)

    Hardy, Nathan R; Fisher, Adam R

    2018-01-24

    This paper reviews the current debate between differentiation and attachment in treating couples through exploring the tenets of crucible therapy (Schnarch, 1991) and emotionally focused couple therapy (Johnson, 2004). We provide a review of the two theories-as well as the two "pure form" example models-and explore the debate in light of the integrative movement in couple and family therapy (Lebow, 2014). We also examine points of convergence of the two theories and models, and provide clinicians and researchers with an enhanced understanding of their divergent positions. Both differentiation and attachment are developmental theories that highlight the human experience of balancing individuality and connection in adulthood. The two models converge in terms of metaconcepts that pervade their respective theories and approach. Both models capitalize on the depth and importance of the therapeutic relationship, and provide rich case conceptualization and processes of therapy. However, they substantially differ in terms of how they view the fundamental aspects of adult development, have vastly divergent approaches to how a therapist intervenes in the room, and different ideas of how a healthy couple should function. In light of the deep polarization of the two models, points of integration-particularly between the broader theories of attachment and differentiation-are offered for therapists to consider. © 2018 Family Process Institute.

  5. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  6. The process of developing and changing of infant-teacher attachment : A study on an infant whose attachment to the first attachment figure is insecure

    OpenAIRE

    上田, 七生

    2003-01-01

    Toward infants whose attachment to their first attachment figures (mainly their mothers) is insecure, how can we intervene in them? To reveal it, an observation was carried out regularly once a week, over a period of 9 months. The subjects were an infant who has insecure attachment and comparative one who has secure attachment. And the attachment behaviors they exhibited toward nursery school teachers, strangers, and an observer were counted. The amount of the attachment behaviors of the infa...

  7. Employees' responses to an organizational merger: Intraindividual change in organizational identification, attachment, and turnover.

    Science.gov (United States)

    Sung, Wookje; Woehler, Meredith L; Fagan, Jesse M; Grosser, Travis J; Floyd, Theresa M; Labianca, Giuseppe Joe

    2017-06-01

    The authors used pre-post merger data from 599 employees experiencing a major corporate merger to compare 3 conceptual models based on the logic of social identity theory (SIT) and exchange theory to explain employees' merger responses. At issue is how perceived change in employees' own jobs and roles (i.e., personal valence) and perceived change in their organization's status and merger appropriateness (i.e., organizational valence) affect their changing organizational identification, attachment attitudes, and voluntary turnover. The first model suggests that organizational identification and organizational attachment develop independently and have distinct antecedents. The second model posits that organizational identification mediates the relationships between change in organizational and personal valence and change in attachment and turnover. The third model posits that change in personal valence moderates the relationship between changes in organizational valence and in organizational identification and attachment. Using latent difference score (LDS) modeling in an SEM framework and survival analysis, the results suggest an emergent fourth model that integrates the first and second models: Although change in organizational identification during the merger mediates the relationship between change in personal status and organizational valence and change in attachment, there is a direct and unmediated relationship between change in personal valence and attachment. This integrated model has implications for M&A theory and practice. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  9. Associations between Adult Attachment Dimensions And Attitudes Toward Pain Behaviour

    Directory of Open Access Journals (Sweden)

    Lachlan A McWilliams

    2010-01-01

    Full Text Available BACKGROUND: Despite the important role positive reinforcement of pain behaviour is believed to play in chronic pain, there is a paucity of research regarding factors that influence the provision of such reinforcement. Attachment theory suggests that individuals high in attachment avoidance view the pain behaviour of others in a negative manner and would, therefore, provide little reinforcement of pain behaviour. As an initial step in evaluating this model, relationships between attachment dimensions and attitudes toward pain behaviour were examined. Attachment avoidance was hypothesized to be negatively associated with accepting attitudes toward pain behaviour.

  10. An encounter between 4e cognition and attachment theory

    Science.gov (United States)

    Petters, Dean

    2016-10-01

    This paper explores a constructive revision of the conceptual underpinnings of Attachment Theory through an encounter with the diverse elements of 4e cognition. Attachment relationships involve the development of preference for one or a few carers and expectations about their availability and responsiveness as a haven of safety and a base from which to explore. In attachment theory, mental representations have been assigned a central organising role in explaining attachment phenomena. The 4e cognition approaches in cognitive science raise a number of questions about the development and interplay of attachment and cognition. These include: (1) the nature of what Bowlby called 'internal working models of attachment'; (2) the extent to which the infant-carer dyad functions as an extension of the infant's mind; and (3) whether Bowlby's attachment control system concept can be usefully re-framed in enactive terms where traditional cognitivist representations are: (3i) substituted for sensorimotor skill-focused mediating representations; (3ii) viewed as arising from autopoietic living organisms; and/or (3iii) mostly composed from the non-contentful mechanisms of basic minds? A theme that cross-cuts these research questions is how representations for capturing meaning, and structures for adaptive control, are both required to explain the full range of behaviour of interest to Attachment Theory researchers.

  11. Joint Modelling of Structural and Functional Brain Networks

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther; Herlau, Tue; Mørup, Morten

    -parametric Bayesian network model which allows for joint modelling and integration of multiple networks. We demonstrate the model’s ability to detect vertices that share structure across networks jointly in functional MRI (fMRI) and diffusion MRI (dMRI) data. Using two fMRI and dMRI scans per subject, we establish...

  12. Performance modeling of network data services

    Energy Technology Data Exchange (ETDEWEB)

    Haynes, R.A.; Pierson, L.G.

    1997-01-01

    Networks at major computational organizations are becoming increasingly complex. The introduction of large massively parallel computers and supercomputers with gigabyte memories are requiring greater and greater bandwidth for network data transfers to widely dispersed clients. For networks to provide adequate data transfer services to high performance computers and remote users connected to them, the networking components must be optimized from a combination of internal and external performance criteria. This paper describes research done at Sandia National Laboratories to model network data services and to visualize the flow of data from source to sink when using the data services.

  13. Is social attachment an addictive disorder?

    Science.gov (United States)

    Insel, Thomas R

    2003-08-01

    There is a considerable literature on the neurobiology of reward, based largely on studies of addiction or substance abuse. This review considers the possibility that the neural circuits that mediate reward evolved for ethologically relevant cues, such as social attachment. Specifically, mesocorticolimbic dopamine appears important for maternal behavior in rats and pair bonding in monogamous voles. It is not yet clear that dopamine in this pathway mediates the hedonic properties of social bond formation or whether dopamine's role is more relevant to developing associative networks or assigning salience to social stimuli. The neuropeptides oxytocin (OT) and vasopressin (AVP) appear to be critical for linking social signals to the mesocorticolimbic circuit.

  14. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  15. The relation of infant attachment to attachment and cognitive and behavioural outcomes in early childhood.

    Science.gov (United States)

    Ding, Yan-hua; Xu, Xiu; Wang, Zheng-yan; Li, Hui-rong; Wang, Wei-ping

    2014-09-01

    In China, research on the relation of mother-infant attachment to children's development is scarce. This study sought to investigate the relation of mother-infant attachment to attachment, cognitive and behavioural development in young children. This study used a longitudinal study design. The subjects included healthy infants (n=160) aged 12 to 18 months. Ainsworth's "Strange Situation Procedure" was used to evaluate mother-infant attachment types. The attachment Q-set (AQS) was used to evaluate the attachment between young children and their mothers. The Bayley scale of infant development-second edition (BSID-II) was used to evaluate cognitive developmental level in early childhood. Achenbach's child behaviour checklist (CBCL) for 2- to 3-year-olds was used to investigate behavioural problems. In total, 118 young children (73.8%) completed the follow-up; 89.7% of infants with secure attachment and 85.0% of infants with insecure attachment still demonstrated this type of attachment in early childhood (κ=0.738, pInfants with insecure attachment collectively exhibited a significantly lower mental development index (MDI) in early childhood than did infants with secure attachment, especially the resistant type. In addition, resistant infants were reported to have greater social withdrawal, sleep problems and aggressive behaviour in early childhood. There is a high consistency in attachment development from infancy to early childhood. Secure mother-infant attachment predicts a better cognitive and behavioural outcome; whereas insecure attachment, especially the resistant attachment, may lead to a lower cognitive level and greater behavioural problems in early childhood. Copyright © 2014 Elsevier Ltd. All rights reserved.

  16. A three-dimensional finite element analysis for overdenture attachments supported by teeth and/or mini dental implants.

    Science.gov (United States)

    Fatalla, Abdalbseet A; Song, Ke; Du, Tianfeng; Cao, Yingguang

    2012-12-01

    The aim of this study was to establish the optimum design and attachment combination to support an overdenture with minimal stress and flexing produced in the alveolar bone surrounding any natural teeth and/or mini dental implants. Twelve models were included in the study: the six main models (A, B, C, D, E, and F) were categorized according to the support designs of the overdenture prosthesis, and each model was further subdivided according to the attachment combinations into model 1: with Dalbo elliptic and/or O-ring attachments only and model 2: with flexible acrylic attachments. Vertical loads (35 N) and 17.5 N lateral loads under static conditions were applied to the models to simulate the occlusal forces following the concept of lingualized occlusion. All conditions were created using a finite element software program. Maximum von Mises stress at the level of the attachments and at the bone support foundation interfaces were compared in all 12 models. The flexing of the mandible and the attachments were also compared qualitatively. Stress on these models was analyzed after the given loading condition. The results showed that the model with three freestanding mini dental implants and flexible acrylic attachments showed the lowest von Mises stress and flexing, while the models with four freestanding mini dental implants and O-ring attachments showed the highest von Mises stress. Three freestanding mini dental implants with flexible acrylic attachment systems supporting an overdenture were better choices than four mini dental implants with O-ring attachment systems, which showed the maximum flexing and stress values in this qualitative comparison. © 2012 by the American College of Prosthodontists.

  17. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks

    Science.gov (United States)

    Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua

    2014-01-01

    Simple Summary The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to members of the community who are already considered vulnerable? This article addresses this important question by synthesizing information about what makes seven particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. It concludes that animal attachment could provide a novel conduit for accessing, communicating with and motivating vulnerable people to engage in resilience building behaviors that promote survival and facilitate recovery. Abstract Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required

  18. Sonication reduces the attachment of Salmonella Typhimurium ATCC 14028 cells to bacterial cellulose-based plant cell wall models and cut plant material.

    Science.gov (United States)

    Tan, Michelle S F; Rahman, Sadequr; Dykes, Gary A

    2017-04-01

    This study investigated the removal of bacterial surface structures, particularly flagella, using sonication, and examined its effect on the attachment of Salmonella Typhimurium ATCC 14028 cells to plant cell walls. S. Typhimurium ATCC 14028 cells were subjected to sonication at 20 kHz to remove surface structures without affecting cell viability. Effective removal of flagella was determined by staining flagella of sonicated cells with Ryu's stain and enumerating the flagella remaining by direct microscopic counting. The attachment of sonicated S. Typhimurium cells to bacterial cellulose-based plant cell wall models and cut plant material (potato, apple, lettuce) was then evaluated. Varying concentrations of pectin and/or xyloglucan were used to produce a range of bacterial cellulose-based plant cell wall models. As compared to the non-sonicated controls, sonicated S. Typhimurium cells attached in significantly lower numbers (between 0.5 and 1.0 log CFU/cm 2 ) to all surfaces except to the bacterial cellulose-only composite without pectin and xyloglucan. Since attachment of S. Typhimurium to the bacterial cellulose-only composite was not affected by sonication, this suggests that bacterial surface structures, particularly flagella, could have specific interactions with pectin and xyloglucan. This study indicates that sonication may have potential applications for reducing Salmonella attachment during the processing of fresh produce. Copyright © 2016 Elsevier Ltd. All rights reserved.

  19. Assessing attachment in school-aged children: Do the School-Age Assessment of Attachment and Family Drawings work together as complementary tools?

    Science.gov (United States)

    Carr-Hopkins, Rebecca; De Burca, Calem; Aldridge, Felicity A

    2017-07-01

    Our goal was to identify an assessment package that could improve treatment planning for troubled children and their families. To assess the validity of our tools, we tested the relations among the School-Age Assessment of Attachment, the Family Drawing and children's risk status. We used the Dynamic-Maturational Model of Attachment and Adaptation to interpret the assessments in the hope of identifying a gradient of risk, and explore whether a new coding method improved the validity of Family Drawings and their utility as a tool to complement the School-Age Assessment of Attachment. The participants were 89 children, aged between 5 and 12 years; 32 children were involved with mental health services or child protection. Each child completed a School-Age Assessment of Attachment and a Family Drawing. Both assessments differentiated between clinical and normative referrals with moderate effect sizes when dichotomizing risk versus non-risk attachment. When the analysis incorporated a gradient of six attachment classifications, the effect sizes decreased, but specificity of risk increased. The School-Age Assessment of Attachment had greater validity for discriminating risk, and type of risk, than the Family Drawings. With a School-Age Assessment of Attachment and family history, the Family Drawing can provide information about distress that some children do not provide verbally. Integration of the two assessment tools alongside information about parental and family functioning appears to be the key to formulating children's problems.

  20. Sentence-Level Attachment Prediction

    Science.gov (United States)

    Albakour, M.-Dyaa; Kruschwitz, Udo; Lucas, Simon

    Attachment prediction is the task of automatically identifying email messages that should contain an attachment. This can be useful to tackle the problem of sending out emails but forgetting to include the relevant attachment (something that happens all too often). A common Information Retrieval (IR) approach in analyzing documents such as emails is to treat the entire document as a bag of words. Here we propose a finer-grained analysis to address the problem. We aim at identifying individual sentences within an email that refer to an attachment. If we detect any such sentence, we predict that the email should have an attachment. Using part of the Enron corpus for evaluation we find that our finer-grained approach outperforms previously reported document-level attachment prediction in similar evaluation settings.

  1. Models as Tools of Analysis of a Network Organisation

    Directory of Open Access Journals (Sweden)

    Wojciech Pająk

    2013-06-01

    Full Text Available The paper presents models which may be applied as tools of analysis of a network organisation. The starting point of the discussion is defining the following terms: supply chain and network organisation. Further parts of the paper present basic assumptions analysis of a network organisation. Then the study characterises the best known models utilised in analysis of a network organisation. The purpose of the article is to define the notion and the essence of network organizations and to present the models used for their analysis.

  2. Determinants of Child Attachment in the Years Postpartum in a High-Risk Sample of Immigrant Women.

    Science.gov (United States)

    Lecompte, Vanessa; Rousseau, Cécile

    2017-10-07

    Our goal was to examine maternal mental health and associated stresses in a sample of high-risk immigrant mothers, and its association with child insecure attachment in the years following childbirth. Mothers and their child (Mage = 37 months) were recruited through a Health and Social Service organization in the Parc-Extension neighborhood in Montreal, Quebec. Mothers completed the Hopkins Symptoms Checklist (HSCL-25), the Multidimensional Scale of Perceived Social Support (MPSS) and a sociodemographic questionnaire that included questions on premature delivery and birth weight. Attachment behaviors were coded out of a videotaped free play sequence using the Preschool and Early School-Age Attachment Rating Scales (PARS). Analysis revealed high levels of clinical anxiety and depression, low social support and low attachment security. Significant mean differences and associations were found between anxiety, depression, social support, preterm delivery and child attachment. These results underscore the importance of screening for anxiety and depression early in the postnatal years, in order to prevent associated consequences such as child insecure attachment. Results also highlight the importance of building positive social networks, especially with immigrant populations.

  3. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  4. Creating the networking enterprises - logistics determinants

    Directory of Open Access Journals (Sweden)

    Ewa Kulińska

    2014-06-01

    Full Text Available Background: The article describes the determinants of creating network enterprises with peculiar consideration of logistic factors which are conditioning the organization of processes, exchange of resources and competences. On the basis of literature analysis, there is proposed a model of creating network enterprises. A model is verified in the application part of the thesis. Methods: Within the publication a literature review of submitted scope of the interest was presented, as well as the empirical research. A research substance attaches the enterprises created on the basis of the reactivation of organizations which has collapsed due to bankruptcy proceeding. The research was based upon direct interviews with employees of the net-forming entities. Results and conclusions: Results of the research shows that taking up the cooperation and net-cooperation was the only possibility for new entities to come into existence, that were  based upon old assets and human resources liquidated during bankruptcy proceeding. There was indentified many determinants of enterprises network cooperation, however due to the research a conclusion draws, that basic factors of creating network cooperation are those which are profit-achieving oriented.

  5. Modeling and optimization of an electric power distribution network ...

    African Journals Online (AJOL)

    Modeling and optimization of an electric power distribution network planning system using ... of the network was modelled with non-linear mathematical expressions. ... given feasible locations, re-conductoring of existing feeders in the network, ...

  6. A network security situation prediction model based on wavelet neural network with optimized parameters

    Directory of Open Access Journals (Sweden)

    Haibo Zhang

    2016-08-01

    Full Text Available The security incidents ion networks are sudden and uncertain, it is very hard to precisely predict the network security situation by traditional methods. In order to improve the prediction accuracy of the network security situation, we build a network security situation prediction model based on Wavelet Neural Network (WNN with optimized parameters by the Improved Niche Genetic Algorithm (INGA. The proposed model adopts WNN which has strong nonlinear ability and fault-tolerance performance. Also, the parameters for WNN are optimized through the adaptive genetic algorithm (GA so that WNN searches more effectively. Considering the problem that the adaptive GA converges slowly and easily turns to the premature problem, we introduce a novel niche technology with a dynamic fuzzy clustering and elimination mechanism to solve the premature convergence of the GA. Our final simulation results show that the proposed INGA-WNN prediction model is more reliable and effective, and it achieves faster convergence-speed and higher prediction accuracy than the Genetic Algorithm-Wavelet Neural Network (GA-WNN, Genetic Algorithm-Back Propagation Neural Network (GA-BPNN and WNN.

  7. Belt attachment and system

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Abraham D.; Davidson, Erick M.

    2018-03-06

    Disclosed herein is a belt assembly including a flexible belt with an improved belt attachment. The belt attachment includes two crossbars spaced along the length of the belt. The crossbars retain bearings that allow predetermined movement in six degrees of freedom. The crossbars are connected by a rigid body that attaches to the bearings. Implements that are attached to the rigid body are simply supported but restrained in pitching rotation.

  8. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  9. Modeling Temporal Evolution and Multiscale Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2013-01-01

    Many real-world networks exhibit both temporal evolution and multiscale structure. We propose a model for temporally correlated multifurcating hierarchies in complex networks which jointly capture both effects. We use the Gibbs fragmentation tree as prior over multifurcating trees and a change......-point model to account for the temporal evolution of each vertex. We demonstrate that our model is able to infer time-varying multiscale structure in synthetic as well as three real world time-evolving complex networks. Our modeling of the temporal evolution of hierarchies brings new insights...

  10. Organization of growing random networks

    International Nuclear Information System (INIS)

    Krapivsky, P. L.; Redner, S.

    2001-01-01

    The organizational development of growing random networks is investigated. These growing networks are built by adding nodes successively, and linking each to an earlier node of degree k with an attachment probability A k . When A k grows more slowly than linearly with k, the number of nodes with k links, N k (t), decays faster than a power law in k, while for A k growing faster than linearly in k, a single node emerges which connects to nearly all other nodes. When A k is asymptotically linear, N k (t)∼tk -ν , with ν dependent on details of the attachment probability, but in the range 2 -2 power-law tail, where s is the component size. The out component has a typical size of order lnt, and it provides basic insights into the genealogy of the network

  11. The inter-relations of mother and father attachment, self-esteem and aggression during late adolescence.

    Science.gov (United States)

    Gomez, Rapson; McLaren, Suzanne

    2007-01-01

    This study examined three models depicting the relations between mother and father attachment, self-esteem and aggression. A total of 385 participants (173 males and 212 females), aged from 18 to 20 years, completed self-rating questionnaires covering mother and father attachment, self-esteem and aggression. Results showed that self-esteem had additive and mediation effects on both the father attachment-aggression and mother attachment-aggression relationships, and also moderated the mother attachment-aggression relation. These findings are discussed in terms of different models for the inter-relations of mother and father attachment, self-esteem and aggression in late adolescence. Copyright 2006 Wiley-Liss, Inc.

  12. Clinical decision - making review on magnetic attachments versus mechanical attachments in dental prosthetics

    Directory of Open Access Journals (Sweden)

    Francesca Fabiano

    2017-11-01

    Full Text Available Background Conventional dentures in edentulous patients show some limitations due to the lack of retention, support and stability thus resulting in difficulty to chew. The modern implantology allows to use different implant overdentures and different attachment systems. The selection of the attachment by practitioners is mainly influenced by the clinical experience or technical preferences. Aims The aim of the present review is to provide an adequate background to the clinicians, in order to select the prosthetic attachments according to the current literature. The mechanical attachments have been compared to the magnetic devices, with the aim to guide the decision of the practitioners. Methods Articles topics selection was based on the use of magnetic attachments in dentistry and the comparison between them and mechanical connectors. The databases used were PubMed/MEDLINE, Google Scholar and ISI Web of Science. A critical evaluation of the selected paper has been made to choose the ones that matched the inclusion criteria. Results Nowadays, few studies have compared different attachments in a manner useful for clinical decision-making. The main problem limiting long-term durability of magnetic attachments in the oral fluid is the poor corrosion resistance of permanent magnets and the consequent leaching of cytotoxic ions. Conclusion Magnetic attachments in comparison with other attaching systems can be useful in patients with special needs, in patients with limited interocclusal space, or in patients with neuromuscular limitations, thanks to the automatic reseating properties. However, it’s important to highlight that the mechanical attachments still represent the best choice in common conditions requiring dental prostheses.

  13. Attachment, Acculturation, and Psychosomatic Complaints among Hispanic American University Students

    Science.gov (United States)

    Wang, Chiachih D. C.; Scalise, Dominick A.; Barajas-Munoz, I. Alejandro; Julio, Kathy; Gomez, Ayleen

    2016-01-01

    This study investigated adult attachment and acculturation frameworks of reported psychosomatic complaints related to perceived discrimination among a sample of Latino/Hispanic university students (N = 160). The model supported by the data suggests that attachment anxiety, acculturation toward the dominant cultural norms, and adherence to…

  14. The Kuramoto model in complex networks

    Science.gov (United States)

    Rodrigues, Francisco A.; Peron, Thomas K. DM.; Ji, Peng; Kurths, Jürgen

    2016-01-01

    Synchronization of an ensemble of oscillators is an emergent phenomenon present in several complex systems, ranging from social and physical to biological and technological systems. The most successful approach to describe how coherent behavior emerges in these complex systems is given by the paradigmatic Kuramoto model. This model has been traditionally studied in complete graphs. However, besides being intrinsically dynamical, complex systems present very heterogeneous structure, which can be represented as complex networks. This report is dedicated to review main contributions in the field of synchronization in networks of Kuramoto oscillators. In particular, we provide an overview of the impact of network patterns on the local and global dynamics of coupled phase oscillators. We cover many relevant topics, which encompass a description of the most used analytical approaches and the analysis of several numerical results. Furthermore, we discuss recent developments on variations of the Kuramoto model in networks, including the presence of noise and inertia. The rich potential for applications is discussed for special fields in engineering, neuroscience, physics and Earth science. Finally, we conclude by discussing problems that remain open after the last decade of intensive research on the Kuramoto model and point out some promising directions for future research.

  15. Adoptive parenting and attachment: association of the Internal Working Models between adoptive mothers and their late-adopted children during adolescence

    Directory of Open Access Journals (Sweden)

    Cecilia Serena ePace

    2015-09-01

    Full Text Available Introduction. Recent literature has shown that the good outcome of adoption would mostly depend on the quality of adoptive parenting, which is strongly associated with the security of parental internal working models (IWMs of attachment. Specifically, attachment states-of-mind of adoptive mothers classified as free and autonomous and without lack of resolution of loss or trauma could represent a good protective factor for adopted children previously maltreated and neglected. While most research on adoptive families has focused on pre-school and school-aged children, the aim of this study was to assess the concordance of IWMs of attachment in adoptive dyads during adolescence.Method. Our pilot-study involved 76 participants: 30 adoptive mothers (mean age=51.5±4.3, and their 46 late-adopted adolescents (mean age = 13.9 ± 1.6, who were all aged four to nine years old at time of adoption (M = 6.3 ± 1.5. Attachment representations of adopted adolescents were assessed by the Friend and Family Interview (FFI, while adoptive mothers’ state-of-mind with respect to attachment was classified by the Adult Attachment Interview (AAI. Adolescents’ verbal intelligence was controlled.Results. Late-adopted adolescents were classified as follows: 67% secure, 26% dismissing and 7% preoccupied in the FFI, while their adoptive mothers’ AAI classifications were 70% free-autonomous, 7% dismissing, and 23% unresolved. We found a significant concordance of 70% (32 dyads between the secure-insecure FFI and AAI classifications. Specifically adoptive mothers with high coherence of transcript and low unresolved loss tend to have late-adopted children with high secure attachment, even if the adolescents’ verbal intelligence made a significant contribution to this prediction.Discussion. Our results provides an empirical contribution to the literature concerning the concordance of attachment in adoptive dyads, highlighting the beneficial impact of highly coherent

  16. Evolution of the social network of scientific collaborations

    Science.gov (United States)

    Barabási, A. L.; Jeong, H.; Néda, Z.; Ravasz, E.; Schubert, A.; Vicsek, T.

    2002-08-01

    The co-authorship network of scientists represents a prototype of complex evolving networks. In addition, it offers one of the most extensive database to date on social networks. By mapping the electronic database containing all relevant journals in mathematics and neuro-science for an 8-year period (1991-98), we infer the dynamic and the structural mechanisms that govern the evolution and topology of this complex system. Three complementary approaches allow us to obtain a detailed characterization. First, empirical measurements allow us to uncover the topological measures that characterize the network at a given moment, as well as the time evolution of these quantities. The results indicate that the network is scale-free, and that the network evolution is governed by preferential attachment, affecting both internal and external links. However, in contrast with most model predictions the average degree increases in time, and the node separation decreases. Second, we propose a simple model that captures the network's time evolution. In some limits the model can be solved analytically, predicting a two-regime scaling in agreement with the measurements. Third, numerical simulations are used to uncover the behavior of quantities that could not be predicted analytically. The combined numerical and analytical results underline the important role internal links play in determining the observed scaling behavior and network topology. The results and methodologies developed in the context of the co-authorship network could be useful for a systematic study of other complex evolving networks as well, such as the world wide web, Internet, or other social networks.

  17. The study of Relation between Cultural Components and National Attachment among Citizens of Yazd city.

    Directory of Open Access Journals (Sweden)

    M. Farahmand

    2017-03-01

    Full Text Available National attachment sense as one of the components of social Property is a key word in national culture. Any definition of society is Occurred by accepting attachment and commitment sense and the society is existed to some extent because people have positive sense about that. National attachment sense is considered as one the important affairs of any society and its proper recognition and full knowledge of authorities and affair operators about the effective social factors on that can be an effective step in recognizing the existent problems in society. The present research reviewed the relation between cultural components and national attachment among the Yazd citizens. The research statistical society was all of the Yazd’s 15 to 65 years old citizens that 384 people were selected as sample by Cochran formula. The tool of data gathering was researcher-made questionnaire that had appropriate validity and reliability. Sampling method has been multi-stage clustered. Results showed that there was a meaningful relationship between secularization, consumerism and virtual social networks with national attachment has been reverse and meaningful, but the relationship between age and values preferences with national attachment has been direct and meaningful. Independent variables in regression equation managed to explain 39 percent of national attachment variable changes. The greatest impact on dependent variable (national attachment has belonged to the variables of secularization, age, values preferences and consumerism.

  18. Transmission network expansion planning based on hybridization model of neural networks and harmony search algorithm

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Ameli

    2012-01-01

    Full Text Available Transmission Network Expansion Planning (TNEP is a basic part of power network planning that determines where, when and how many new transmission lines should be added to the network. So, the TNEP is an optimization problem in which the expansion purposes are optimized. Artificial Intelligence (AI tools such as Genetic Algorithm (GA, Simulated Annealing (SA, Tabu Search (TS and Artificial Neural Networks (ANNs are methods used for solving the TNEP problem. Today, by using the hybridization models of AI tools, we can solve the TNEP problem for large-scale systems, which shows the effectiveness of utilizing such models. In this paper, a new approach to the hybridization model of Probabilistic Neural Networks (PNNs and Harmony Search Algorithm (HSA was used to solve the TNEP problem. Finally, by considering the uncertain role of the load based on a scenario technique, this proposed model was tested on the Garver’s 6-bus network.

  19. Thickness Measurement of Surface Attachment on Plate with Lamb Wave

    Science.gov (United States)

    Ma, Xianglong; Zhang, Yinghong; Wen, Lichao; He, Yehu

    2017-12-01

    Aiming at the thickness detection of the plate surface attachment, a nondestructive testing method based on the Lamb wave is presented. This method utilizes Lamb wave propagation characteristics of signals in a bi-layer medium to measure the surface attachment plate thickness. Propagation of Lamb wave in bi-layer elastic is modeled and analyzed. The two-dimensional simulation model of electromagnetic ultrasonic plate - scale is established. The simulation is conducted by software COMSOL for simulation analysis under different boiler scale thickness wave form curve. Through this study, the thickness of the attached material can be judged by analyzing the characteristics of the received signal when the thickness of the surface of the plate is measured.

  20. Mathematical Modelling Plant Signalling Networks

    KAUST Repository

    Muraro, D.; Byrne, H.M.; King, J.R.; Bennett, M.J.

    2013-01-01

    methods for modelling gene and signalling networks and their application in plants. We then describe specific models of hormonal perception and cross-talk in plants. This mathematical analysis of sub-cellular molecular mechanisms paves the way for more

  1. ATTACHMENT AND TRANSFER

    OpenAIRE

    Pasare, Daniela

    2011-01-01

    Bowlby's concept of attachment and Freud's concept of transference are two of the most influential theories of how we construct mental representations of human relationships. The attachment’s theory offers one more strategy for the therapeutic approach. Factors that lead to a secure attachment between mother and child may also be applied to the relationship between patient and psychotherapist. Psychotherapy may help a patient create himself new attachment and relationship patterns. Creating a...

  2. Evaluation of EOR Processes Using Network Models

    DEFF Research Database (Denmark)

    Winter, Anatol; Larsen, Jens Kjell; Krogsbøll, Anette

    1998-01-01

    The report consists of the following parts: 1) Studies of wetting properties of model fluids and fluid mixtures aimed at an optimal selection of candidates for micromodel experiments. 2) Experimental studies of multiphase transport properties using physical models of porous networks (micromodels......) including estimation of their "petrophysical" properties (e.g. absolute permeability). 3) Mathematical modelling and computer studies of multiphase transport through pore space using mathematical network models. 4) Investigation of link between pore-scale and macroscopic recovery mechanisms....

  3. Modeling Insurgent Network Structure and Dynamics

    Science.gov (United States)

    Gabbay, Michael; Thirkill-Mackelprang, Ashley

    2010-03-01

    We present a methodology for mapping insurgent network structure based on their public rhetoric. Indicators of cooperative links between insurgent groups at both the leadership and rank-and-file levels are used, such as joint policy statements or joint operations claims. In addition, a targeting policy measure is constructed on the basis of insurgent targeting claims. Network diagrams which integrate these measures of insurgent cooperation and ideology are generated for different periods of the Iraqi and Afghan insurgencies. The network diagrams exhibit meaningful changes which track the evolution of the strategic environment faced by insurgent groups. Correlations between targeting policy and network structure indicate that insurgent targeting claims are aimed at establishing a group identity among the spectrum of rank-and-file insurgency supporters. A dynamical systems model of insurgent alliance formation and factionalism is presented which evolves the relationship between insurgent group dyads as a function of their ideological differences and their current relationships. The ability of the model to qualitatively and quantitatively capture insurgent network dynamics observed in the data is discussed.

  4. The mediating role of mentalizing capacity between parents and peer attachment and adolescent borderline personality disorder

    DEFF Research Database (Denmark)

    Beck, Emma; Sharp, Carla; Poulsen, Stig

    2017-01-01

    Background: Insecure attachment is a precursor and correlate of borderline personality disorder. According to the mentalization-based theory of borderline personality disorder, the presence of insecure attachment derails the development of the capacity to mentalize, potentially resulting in borde......Background: Insecure attachment is a precursor and correlate of borderline personality disorder. According to the mentalization-based theory of borderline personality disorder, the presence of insecure attachment derails the development of the capacity to mentalize, potentially resulting...... personality features. Our findings suggest that in a simple mediational model, mentalizing capacity mediated the relation between attachment to peers and borderline features. In the case of attachment to parents, the mediational model was not significant. Conclusions: The current study is the first...... to evaluate this mediational model with parent and peer attachment as separate concepts and the first to do so in a sample of adolescents who meet full or sub-threshold criteria for borderline personality disorder. Findings incrementally support that mentalizing capacity and attachment insecurity, also...

  5. Attachment representation as predictor of internalizing problems in middle childhood

    Directory of Open Access Journals (Sweden)

    Mária Halamová

    2015-01-01

    Full Text Available Problem: The current study examines the relationship between the representation of attachment relationship with mother and internalizing problems in the developmental period of middle childhood. The purpose of the study was to analyze whether the quality of attachment predicts the intensity and seriousness of internalizing problems in middle childhood; and to examine whether the models are gender-specific. Methods: Participants in this study were 151 children aged 9-12 (M = 11.21, 77 boys and 74 girls, recruited from elementary schools in Nitra region. Children completed measures assessing the quality of attachment representation of the relationship with mother (selfreport questionnaire Security Scale, the tendency to react anxiously (self-report questionnaire Childen´s Manifest Anxiety Scale – CMAS, social anxiety (self-report questionnaire Scale of Classical Social Situational Anxiety – KSAT and depression (self-report questionnaire Children´s Depression Inventory – CDI. Results: Regression analysis indicated that secure attachment representation is a significant negative predictor of children's internalizing problems – manifest anxiety (ß = -.324, p 0.05 and ß = -.194, p > 0.05, respectively, but in the sample of girls, secure attachment representation was a significant negative predictor of both depressive symptoms (ß = -.296, p < .05 for Negative Mood; and ß = -.285, p < .05 for Anhedony. Other models, except for social anxiety, were statistically significant for both samples. In the sample of girls, the predictor accounted for 26.3% of variance in Negative Self Esteem (ß = -.512; p < .001, 18.9% of variance of the total of depression symptoms (ß = -.435; p < .001, 10.9% of variance in Ineffectiveness (ß = -.331; p < .05 and 10.5% of variance in manifest anxiety (ß = -.324; p < .05. The results were similar for the sample of boys. Attachment security accounted for 17.4% of variance in Negative Self Esteem (ß = -.435; p

  6. Attachment is a dynamic system

    Directory of Open Access Journals (Sweden)

    Zlatka Cugmas

    2003-04-01

    Full Text Available On the basis of the study of recent scientific literature about the development of attachment, the author answers the following questions: which are the postulates the theory of attachment has about the stability of the patterns of attachment, which level of stability in the patterns of attachment from infancy to adulthood these studies illuminate and which factors significantly influence the (instability of the patterns of attachment in time. The theory of attachment assumes that normal circumstances elicit stability. Changes, however, can be the result of important events influencing the sensitivity of the object of attachment. Agreement has not yet been reached regarding the percentage of stability in the patterns of attachment. There is more agreement regarding attachment in adulthood than that in childhood. The results depend on the size and characteristics of the subjects of the research, the measuring instruments, type of data analysis etc. The author concludes that attachment is a dynamic system influenced by significant changes in life (the cognitive development of the child, external care, parents' divorce, different stressful situations. As the influence of stressful events on the individual person' s quality of attachment is examined, it is necessary to consider also his/her temperamental characteristics, role of other people in their lives, etc.

  7. A sample movie of the tracer transport analysis using the three-dimensional fracture network model. Set of data

    International Nuclear Information System (INIS)

    Shobu, Nobuhiro; Kashiwazaki, Hiroshi

    2003-02-01

    There have been a few thousands of short term visitors to Geological Isolation Basic Research Facility of Tokai works in Japan Nuclear Cycle Development Institutes in every year. From the viewpoint of promotion of the visitor's understanding and smooth communication between researchers and visitors, the explanation of the technical information on geological disposal should be carried out in a more easily understandable manner, as well as conventional tour to engineering-scale test facility. Here is a sample movie of the tracer transport analysis using the three-dimensional fracture network model attached to this report with the CD-ROM. It has been being practically used as one of the explanation tools to support visitor's understanding. (author)

  8. Adoptive parenting and attachment: association of the internal working models between adoptive mothers and their late-adopted children during adolescence.

    Science.gov (United States)

    Pace, Cecilia S; Di Folco, Simona; Guerriero, Viviana; Santona, Alessandra; Terrone, Grazia

    2015-01-01

    Recent literature has shown that the good outcome of adoption would mostly depend on the quality of adoptive parenting, which is strongly associated with the security of parental internal working models (IWMs) of attachment. Specifically, attachment states-of-mind of adoptive mothers classified as free and autonomous and without lack of resolution of loss or trauma could represent a good protective factor for adopted children, previously maltreated and neglected. While most research on adoptive families focused on pre-school and school-aged children, the aim of this study was to assess the concordance of IWMs of attachment in adoptive dyads during adolescence. Our pilot-study involved 76 participants: 30 adoptive mothers (mean age = 51.5 ± 4.3), and their 46 late-adopted adolescents (mean age = 13.9 ± 1.6), who were all aged 4-9 years old at time of adoption (mean age = 6.3 ± 1.5). Attachment representations of adopted adolescents were assessed by the Friend and Family Interview (FFI), while adoptive mothers' state-of-mind with respect to attachment was classified by the Adult Attachment Interview (AAI). Adolescents' verbal intelligence was controlled for. Late-adopted adolescents were classified as follows: 67% secure, 26% dismissing, and 7% preoccupied in the FFI, while their adoptive mothers' AAI classifications were 70% free-autonomous, 7% dismissing, and 23% unresolved. We found a significant concordance of 70% (32 dyads) between the secure-insecure FFI and AAI classifications. Specifically adoptive mothers with high coherence of transcript and low unresolved loss tend to have late-adopted children with high secure attachment, even if the adolescents' verbal intelligence made a significant contribution to this prediction. Our results provides an empirical contribution to the literature concerning the concordance of attachment in adoptive dyads, highlighting the beneficial impact of highly coherent states-of-mind of adoptive mothers on the attachment

  9. Modelling fragmentations of amino-acids after resonant electron attachment: quantum evidence of possible direct -OH detachment

    Energy Technology Data Exchange (ETDEWEB)

    Panosetti, C.; Sebastianelli, F.; Gianturco, F.A. [Department of Chemistry and CNISM, University of Rome -La Sapienza-, Roma (Italy); Baccarelli, I. [CASPUR, Supercomputing Consortium for University and Research, Roma (Italy)

    2010-10-15

    We investigate some aspects of the radiation damage mechanisms in biomolecules, focusing on the modelling of resonant fragmentation caused by the attachment of low-energy electrons (LEEs) initially ejected by biological tissues when exposed to ionizing radiation. Scattering equations are formulated within a symmetry-adapted, single-center expansion of both continuum and bound electrons, and the interaction forces are obtained from a combination of ab initio calculations and a nonempirical model of exchange and correlation effects developed in our group. We present total elastic scattering cross-sections and resonance features obtained for the equilibrium geometries of glycine, alanine, proline and valine. Our results at those geometries of the target molecules are briefly shown to qualitatively explain some of the fragmentation patterns obtained in experiments. We further carry out a one-dimensional (1D) modeling for the dynamics of intramolecular energy transfers mediated by the vibrational activation of selected bonds: our calculations indicate that resonant electron attachment to glycine can trigger direct, dissociative evolution of the complex into (Gly-OH)- and -OH losses, while they also find that the same process does not occur via a direct, 1D dissociative path in the larger amino acids of the present study. (authors)

  10. Spatial-temporal modeling of malware propagation in networks.

    Science.gov (United States)

    Chen, Zesheng; Ji, Chuanyi

    2005-09-01

    Network security is an important task of network management. One threat to network security is malware (malicious software) propagation. One type of malware is called topological scanning that spreads based on topology information. The focus of this work is on modeling the spread of topological malwares, which is important for understanding their potential damages, and for developing countermeasures to protect the network infrastructure. Our model is motivated by probabilistic graphs, which have been widely investigated in machine learning. We first use a graphical representation to abstract the propagation of malwares that employ different scanning methods. We then use a spatial-temporal random process to describe the statistical dependence of malware propagation in arbitrary topologies. As the spatial dependence is particularly difficult to characterize, the problem becomes how to use simple (i.e., biased) models to approximate the spatially dependent process. In particular, we propose the independent model and the Markov model as simple approximations. We conduct both theoretical analysis and extensive simulations on large networks using both real measurements and synthesized topologies to test the performance of the proposed models. Our results show that the independent model can capture temporal dependence and detailed topology information and, thus, outperforms the previous models, whereas the Markov model incorporates a certain spatial dependence and, thus, achieves a greater accuracy in characterizing both transient and equilibrium behaviors of malware propagation.

  11. Flood routing modelling with Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    R. Peters

    2006-01-01

    Full Text Available For the modelling of the flood routing in the lower reaches of the Freiberger Mulde river and its tributaries the one-dimensional hydrodynamic modelling system HEC-RAS has been applied. Furthermore, this model was used to generate a database to train multilayer feedforward networks. To guarantee numerical stability for the hydrodynamic modelling of some 60 km of streamcourse an adequate resolution in space requires very small calculation time steps, which are some two orders of magnitude smaller than the input data resolution. This leads to quite high computation requirements seriously restricting the application – especially when dealing with real time operations such as online flood forecasting. In order to solve this problem we tested the application of Artificial Neural Networks (ANN. First studies show the ability of adequately trained multilayer feedforward networks (MLFN to reproduce the model performance.

  12. Experiential avoidance mediates the link between maternal attachment style and theory of mind.

    Science.gov (United States)

    Vanwoerden, Salome; Kalpakci, Allison H; Sharp, Carla

    2015-02-01

    Theoretical and empirical models suggest a relation between attachment style and theory of mind (ToM) in childhood and adulthood; however, this link has not been evaluated to the same extent in adolescence. Additionally, these models typically fail to consider mechanisms by which attachment style affects ToM abilities. The present study sought to test a mediational model in which experiential avoidance mediates the relation between maternal attachment style and ToM. A sample of 282 adolescents (Mage=15.42years, SD=1.44, 62.8% female) was recruited from an inpatient psychiatric hospital. Findings revealed that maternal attachment style in females was related to ToM, through experiential avoidance. Specifically, those with a disorganized maternal attachment were most likely to engage in experiential avoidant cognitive and emotional strategies, which in turn related to lower levels of ToM ability. Implications and areas for future research are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. A fusion networking model for smart grid power distribution backbone communication network based on PTN

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available In current communication network for distribution in Chinese power grid systems, the fiber communication backbone network for distribution and TD-LTE power private wireless backhaul network of power grid are both bearing by the SDH optical transmission network, which also carries the communication network of transformer substation and main electric. As the data traffic of the distribution communication and TD-LTE power private wireless network grow rapidly in recent years, it will have a big impact with the SDH network’s bearing capacity which is mainly used for main electric communication in high security level. This paper presents a fusion networking model which use a multiple-layer PTN network as the unified bearing of the TD-LTE power private wireless backhaul network and fiber communication backbone network for distribution. Network dataflow analysis shows that this model can greatly reduce the capacity pressure of the traditional SDH network as well as ensure the reliability of the transmission of the communication network for distribution and TD-LTE power private wireless network.

  14. UAV Trajectory Modeling Using Neural Networks

    Science.gov (United States)

    Xue, Min

    2017-01-01

    Massive small unmanned aerial vehicles are envisioned to operate in the near future. While there are lots of research problems need to be addressed before dense operations can happen, trajectory modeling remains as one of the keys to understand and develop policies, regulations, and requirements for safe and efficient unmanned aerial vehicle operations. The fidelity requirement of a small unmanned vehicle trajectory model is high because these vehicles are sensitive to winds due to their small size and low operational altitude. Both vehicle control systems and dynamic models are needed for trajectory modeling, which makes the modeling a great challenge, especially considering the fact that manufactures are not willing to share their control systems. This work proposed to use a neural network approach for modelling small unmanned vehicle's trajectory without knowing its control system and bypassing exhaustive efforts for aerodynamic parameter identification. As a proof of concept, instead of collecting data from flight tests, this work used the trajectory data generated by a mathematical vehicle model for training and testing the neural network. The results showed great promise because the trained neural network can predict 4D trajectories accurately, and prediction errors were less than 2:0 meters in both temporal and spatial dimensions.

  15. Modeling Evolution on Nearly Neutral Network Fitness Landscapes

    Science.gov (United States)

    Yakushkina, Tatiana; Saakian, David B.

    2017-08-01

    To describe virus evolution, it is necessary to define a fitness landscape. In this article, we consider the microscopic models with the advanced version of neutral network fitness landscapes. In this problem setting, we suppose a fitness difference between one-point mutation neighbors to be small. We construct a modification of the Wright-Fisher model, which is related to ordinary infinite population models with nearly neutral network fitness landscape at the large population limit. From the microscopic models in the realistic sequence space, we derive two versions of nearly neutral network models: with sinks and without sinks. We claim that the suggested model describes the evolutionary dynamics of RNA viruses better than the traditional Wright-Fisher model with few sequences.

  16. The relevance of security: A latent domain of attachment relationships.

    Science.gov (United States)

    Mannarini, Stefania; Boffo, Marilisa

    2014-02-01

    In the present study an adult attachment dimension, latent to the constructs of security, anxiety, and avoidance, was hypothesized, wherein security was expected to occupy the most relevant position. Furthermore, the reciprocal functioning of attachment constructs and their interactions with self-esteem were explored. Four hundreds and thirty-four Italian university students responded to two adult attachment questionnaires (Attachment Style Questionnaire and Adult Attachment Questionnaire) and to the Rosenberg Self-esteem scale. A Many-Facet Rasch Measurement modeling approach was adopted. The main results can be summarized as follows: (a) security, anxiety, and avoidance are nested under one latent attachment dimension; (b) security occupies the most prominent position on the dimension; (c) security is positively associated with a moderate level of attachment anxiety and negatively related to avoidance; and (d) a positive interaction between self-esteem and security, and a negative relation between self-esteem and anxiety, were detected. Theoretical, clinical, and empirical implications of the results are further discussed. © 2013 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  17. Childhood attachment, childhood sexual abuse, and onset of masturbation among adult sexual offenders.

    Science.gov (United States)

    Smallbone, Stephen W; McCabe, Billee-Anne

    2003-01-01

    Written autobiographies of 48 incarcerated adult male sexual offenders (22 rapists, 13 intrafamilial child molesters, and 13 extrafamilial child molesters) were used to generate retrospective self-report measures of their childhood maternal and paternal attachment, childhood sexual abuse experiences, and onset of masturbation. Contrary to expectation, the offenders as a combined group more often reported secure than they did insecure childhood maternal and paternal attachment. There were no differences between the three offender subgroups with respect to maternal attachment; however the rapists and the intrafamilial child molesters were more likely to report insecure paternal attachment than were the extrafamilial child molesters. There were no differences between these offender subgroups in the frequency with which childhood sexual abuse was reported. However, offenders with insecure paternal attachment were more likely to report having been sexually abused than were those with secure paternal attachment. Sexually abused offenders in turn reported earlier onset of masturbation than did those who were not sexually abused. These results are consistent with contemporary attachment models linking insecure childhood attachment to childhood sexual abuse, and with traditional conditioning models linking childhood sexual abuse, early masturbation, and sexual offending.

  18. Model for the growth of the world airline network

    Science.gov (United States)

    Verma, T.; Araújo, N. A. M.; Nagler, J.; Andrade, J. S.; Herrmann, H. J.

    2016-06-01

    We propose a probabilistic growth model for transport networks which employs a balance between popularity of nodes and the physical distance between nodes. By comparing the degree of each node in the model network and the World Airline Network (WAN), we observe that the difference between the two is minimized for α≈2. Interestingly, this is the value obtained for the node-node correlation function in the WAN. This suggests that our model explains quite well the growth of airline networks.

  19. Security Modeling on the Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.

  20. Modeling the propagation of mobile malware on complex networks

    Science.gov (United States)

    Liu, Wanping; Liu, Chao; Yang, Zheng; Liu, Xiaoyang; Zhang, Yihao; Wei, Zuxue

    2016-08-01

    In this paper, the spreading behavior of malware across mobile devices is addressed. By introducing complex networks to model mobile networks, which follows the power-law degree distribution, a novel epidemic model for mobile malware propagation is proposed. The spreading threshold that guarantees the dynamics of the model is calculated. Theoretically, the asymptotic stability of the malware-free equilibrium is confirmed when the threshold is below the unity, and the global stability is further proved under some sufficient conditions. The influences of different model parameters as well as the network topology on malware propagation are also analyzed. Our theoretical studies and numerical simulations show that networks with higher heterogeneity conduce to the diffusion of malware, and complex networks with lower power-law exponents benefit malware spreading.

  1. Quebec mental health services networks: models and implementation

    Directory of Open Access Journals (Sweden)

    Marie-Josée Fleury

    2005-06-01

    Full Text Available Purpose: In the transformation of health care systems, the introduction of integrated service networks is considered to be one of the main solutions for enhancing efficiency. In the last few years, a wealth of literature has emerged on the topic of services integration. However, the question of how integrated service networks should be modelled to suit different implementation contexts has barely been touched. To fill that gap, this article presents four models for the organization of mental health integrated networks. Data sources: The proposed models are drawn from three recently published studies on mental health integrated services in the province of Quebec (Canada with the author as principal investigator. Description: Following an explanation of the concept of integrated service network and a description of the Quebec context for mental health networks, the models, applicable in all settings: rural, urban or semi-urban, and metropolitan, and summarized in four figures, are presented. Discussion and conclusion: To apply the models successfully, the necessity of rallying all the actors of a system, from the strategic, tactical and operational levels, according to the type of integration involved: functional/administrative, clinical and physician-system is highlighted. The importance of formalizing activities among organizations and actors in a network and reinforcing the governing mechanisms at the local level is also underlined. Finally, a number of integration strategies and key conditions of success to operationalize integrated service networks are suggested.

  2. Fast sparsely synchronized brain rhythms in a scale-free neural network.

    Science.gov (United States)

    Kim, Sang-Yoon; Lim, Woochang

    2015-08-01

    We consider a directed version of the Barabási-Albert scale-free network model with symmetric preferential attachment with the same in- and out-degrees and study the emergence of sparsely synchronized rhythms for a fixed attachment degree in an inhibitory population of fast-spiking Izhikevich interneurons. Fast sparsely synchronized rhythms with stochastic and intermittent neuronal discharges are found to appear for large values of J (synaptic inhibition strength) and D (noise intensity). For an intensive study we fix J at a sufficiently large value and investigate the population states by increasing D. For small D, full synchronization with the same population-rhythm frequency fp and mean firing rate (MFR) fi of individual neurons occurs, while for large D partial synchronization with fp>〈fi〉 (〈fi〉: ensemble-averaged MFR) appears due to intermittent discharge of individual neurons; in particular, the case of fp>4〈fi〉 is referred to as sparse synchronization. For the case of partial and sparse synchronization, MFRs of individual neurons vary depending on their degrees. As D passes a critical value D* (which is determined by employing an order parameter), a transition to unsynchronization occurs due to the destructive role of noise to spoil the pacing between sparse spikes. For Dnetwork structure for the case of partial and sparse synchronization, which is in contrast to the case of

  3. Fast sparsely synchronized brain rhythms in a scale-free neural network

    Science.gov (United States)

    Kim, Sang-Yoon; Lim, Woochang

    2015-08-01

    We consider a directed version of the Barabási-Albert scale-free network model with symmetric preferential attachment with the same in- and out-degrees and study the emergence of sparsely synchronized rhythms for a fixed attachment degree in an inhibitory population of fast-spiking Izhikevich interneurons. Fast sparsely synchronized rhythms with stochastic and intermittent neuronal discharges are found to appear for large values of J (synaptic inhibition strength) and D (noise intensity). For an intensive study we fix J at a sufficiently large value and investigate the population states by increasing D . For small D , full synchronization with the same population-rhythm frequency fp and mean firing rate (MFR) fi of individual neurons occurs, while for large D partial synchronization with fp> ( : ensemble-averaged MFR) appears due to intermittent discharge of individual neurons; in particular, the case of fp>4 is referred to as sparse synchronization. For the case of partial and sparse synchronization, MFRs of individual neurons vary depending on their degrees. As D passes a critical value D* (which is determined by employing an order parameter), a transition to unsynchronization occurs due to the destructive role of noise to spoil the pacing between sparse spikes. For D network structure for the case of partial and sparse synchronization, which is in contrast to the case of statistically homogeneous

  4. Network Design Models for Container Shipping

    DEFF Research Database (Denmark)

    Reinhardt, Line Blander; Kallehauge, Brian; Nielsen, Anders Nørrelund

    This paper presents a study of the network design problem in container shipping. The paper combines the network design and fleet assignment problem into a mixed integer linear programming model minimizing the overall cost. The major contributions of this paper is that the time of a vessel route...... is included in the calculation of the capacity and that a inhomogeneous fleet is modeled. The model also includes the cost of transshipment which is one of the major cost for the shipping companies. The concept of pseudo simple routes is introduced to expand the set of feasible routes. The linearization...

  5. Dynamic Evolution Model Based on Social Network Services

    Science.gov (United States)

    Xiong, Xi; Gou, Zhi-Jian; Zhang, Shi-Bin; Zhao, Wen

    2013-11-01

    Based on the analysis of evolutionary characteristics of public opinion in social networking services (SNS), in the paper we propose a dynamic evolution model, in which opinions are coupled with topology. This model shows the clustering phenomenon of opinions in dynamic network evolution. The simulation results show that the model can fit the data from a social network site. The dynamic evolution of networks accelerates the opinion, separation and aggregation. The scale and the number of clusters are influenced by confidence limit and rewiring probability. Dynamic changes of the topology reduce the number of isolated nodes, while the increased confidence limit allows nodes to communicate more sufficiently. The two effects make the distribution of opinion more neutral. The dynamic evolution of networks generates central clusters with high connectivity and high betweenness, which make it difficult to control public opinions in SNS.

  6. A growing social network model in geographical space

    Science.gov (United States)

    Antonioni, Alberto; Tomassini, Marco

    2017-09-01

    In this work we propose a new model for the generation of social networks that includes their often ignored spatial aspects. The model is a growing one and links are created either taking space into account, or disregarding space and only considering the degree of target nodes. These two effects can be mixed linearly in arbitrary proportions through a parameter. We numerically show that for a given range of the combination parameter, and for given mean degree, the generated network class shares many important statistical features with those observed in actual social networks, including the spatial dependence of connections. Moreover, we show that the model provides a good qualitative fit to some measured social networks.

  7. Temperamental precursors of infant attachment with mothers and fathers.

    Science.gov (United States)

    Planalp, Elizabeth M; Braungart-Rieker, Julia M

    2013-12-01

    The degree to which parent sensitivity and infant temperament distinguish attachment classification was examined. Multilevel modeling was used to assess the effect of parent sensitivity and infant temperament on infant-mother and infant-father attachment. Data were collected from mothers, fathers, and their infants (N = 135) when the infant was 3-, 5-, 7-, 12-, and 14-months old. Temperament was measured using the Infant Behavior Questionnaire-Revised (Gartstein & Rothbart, 2003); parent sensitivity was coded during the Still Face Paradigm (Tronick, Als, Adamson, Wise, & Brazelton, 1978); attachment was coded using the Strange Situation (Ainsworth, Blehar, Waters, & Wall, 1978). Results indicate that mothers and fathers were less sensitive with insecure-avoidant infants. Whereas only one difference was found for infant-mother attachment groups and temperament, five significant differences emerged for infant-father attachment groups, with the majority involving insecure-ambivalent attachment. Infants classified as ambivalent with fathers were higher in perceptual sensitivity and cuddliness and these infants also showed a greater increase in low-intensity pleasure over time compared with other infants. Results indicate the importance of both parent sensitivity and infant temperament, though operating in somewhat different ways, in the development of the infant-mother and infant-father attachment relationship. Copyright © 2013 Elsevier Inc. All rights reserved.

  8. Temperamental precursors of infant attachment with mothers and fathers☆

    Science.gov (United States)

    Planalp, Elizabeth M.; Braungart-Rieker, Julia M.

    2013-01-01

    The degree to which parent sensitivity and infant temperament distinguish attachment classification was examined. Multilevel modeling was used to assess the effect of parent sensitivity and infant temperament on infant–mother and infant–father attachment. Data were collected from mothers, fathers, and their infants (N = 135) when the infant was 3-, 5-, 7-, 12-, and 14-months old. Temperament was measured using the Infant Behavior Questionnaire-Revised (Gartstein & Rothbart, 2003); parent sensitivity was coded during the Still Face Paradigm (Tronick, Als, Adamson, Wise, & Brazelton, 1978); attachment was coded using the Strange Situation (Ainsworth, Blehar, Waters, & Wall, 1978). Results indicate that mothers and fathers were less sensitive with insecure-avoidant infants. Whereas only one difference was found for infant–mother attachment groups and temperament, five significant differences emerged for infant–father attachment groups, with the majority involving insecure-ambivalent attachment. Infants classified as ambivalent with fathers were higher in perceptual sensitivity and cuddliness and these infants also showed a greater increase in low-intensity pleasure over time compared with other infants. Results indicate the importance of both parent sensitivity and infant temperament, though operating in somewhat different ways, in the development of the infant–mother and infant–father attachment relationship. PMID:24103401

  9. Special Attachments. Module 19.

    Science.gov (United States)

    South Carolina State Dept. of Education, Columbia. Office of Vocational Education.

    This module on special attachments, one in a series dealing with industrial sewing machines, their attachments, and operation, covers four topics: gauges; cording attachment; zipper foot; and hemming, shirring, and binding. For each topic these components are provided: an introduction, directions, an objective, learning activities, student…

  10. Passive Control of Attachment in Legged Space Robots

    Directory of Open Access Journals (Sweden)

    Alessandro Gasparetto

    2010-01-01

    Full Text Available In the space environment the absence of gravity calls for constant safe attachment of any loose object, but the low-pressure conditions prohibit the use of glue-type adhesives. The attachment system of freely hunting spiders, e.g. Evarcha arcuata, employs van der Waals forces and mechanical interlocking. Furthermore, detachment is achieved passively and requires little force. Hence, the spider serves as a model for a versatile legged robot for space applications, e.g. on the outer surface of a space station. In this paper, we analyse the dry attachment systems of E. arcuata and geckos as well as the kinematics of freely hunting spiders. We generalise the results of biological studies on spider locomotion and mobility, including the major movement and the position constraints set by the dry adhesion system. From these results, we define a simplified spider model and study the overall kinematics of the legs both in flight and in contact with the surface. The kinematic model, the data on spider gait characteristics and the adhesion constraints are implemented in a kinematic simulator. The simulator results confirm the principal functionality of our concept.

  11. Modeling and dynamical topology properties of VANET based on complex networks theory

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Hong; Li, Jie, E-mail: prof.li@foxmail.com [School of Civil Engineering and Mechanics, Huazhong University of Science and Technology, Wuhan, 430074 (China)

    2015-01-15

    Vehicular Ad hoc Network (VANET) is a special subset of multi-hop Mobile Ad hoc Networks in which vehicles can not only communicate with each other but also with the fixed equipments along the roads through wireless interfaces. Recently, it has been discovered that essential systems in real world share similar properties. When they are regarded as networks, among which the dynamic topology structure of VANET system is an important issue. Many real world networks are actually growing with preferential attachment like Internet, transportation system and telephone network. Those phenomena have brought great possibility in finding a strategy to calibrate and control the topology parameters which can help find VANET topology change regulation to relieve traffic jam, prevent traffic accident and improve traffic safety. VANET is a typical complex network which has its basic characteristics. In this paper, we focus on the macroscopic Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) inter-vehicle communication network with complex network theory. In particular, this paper is the first one to propose a method analyzing the topological structure and performance of VANET and present the communications in VANET from a new perspective. Accordingly, we propose degree distribution, clustering coefficient and the short path length of complex network to implement our strategy by numerical example and simulation. All the results demonstrate that VANET shows small world network features and is characterized by a truncated scale-free degree distribution with power-law degree distribution. The average path length of the network is simulated numerically, which indicates that the network shows small-world property and is rarely affected by the randomness. What’s more, we carry out extensive simulations of information propagation and mathematically prove the power law property when γ > 2. The results of this study provide useful information for VANET optimization from a

  12. From security to attachment : Mary Ainsworth's contribution to attachment theory

    NARCIS (Netherlands)

    Rosmalen, Lenette (Lenny) van

    2015-01-01

    Even though John Bowlby (1907-1990) is generally regarded as the founder of attachment theory, Mary Ainsworth’s (1913-1999) contribution is considerable and goes beyond the design of the Strange Situation Procedure and the introduction of maternal sensitivity as decisive for a secure attachment

  13. Attachment relationships shape pain-signaling behavior.

    Science.gov (United States)

    Kozlowska, Kasia

    2009-10-01

    Attachment relationships shape the manner in which children signal pain to others. Open communication of pain affect, inhibition of pain affect, and exaggeration of pain affect, reflect adaptations to different relationship contexts. The open and direct signaling of pain is adaptive in sensitive relationship contexts where caregivers respond to the distressed child with behaviors that facilitate protection, recovery, and healing. Inhibition of pain signals has survival advantages in situations where the open expressions of pain elicit negative parental responses (absence of caregiving, withdrawal from the child, or frank displeasure or anger). Exaggerated pain signaling functions as a means to elicit a caregiving response from preoccupied, inattentive, or neglectful attachment figures. This paper considers how a child's developmental experiences-specifically, the repeating person-specific experiences which make up attachment relationships-produce individual differences in the manner in which pain is experienced and signaled. This article reviews recent advances in our understanding of child development as articulated by contemporary attachment theory-in particular, the dynamic-maturational model (DMM)-and discusses their implications for interpreting human pain, pain-signaling behavior, and medically unexplained pain. The development of the experience of pain, along with ways of signaling pain, is tied to familial relationships generally and, in particular, to the manner in which attachment relationships shape the infant's behavior and physiology, thereby regulating the experience of pain. In explaining how the child's early attachment relationships produce individual differences in the way that she learns to experience and signal pain, the article provides an innovative perspective that is helpful in understanding the wide variations in patients' experience and presentation of pain, in elaborating formulations of medically unexplained pain, and in planning

  14. Hybrid simulation models of production networks

    CERN Document Server

    Kouikoglou, Vassilis S

    2001-01-01

    This book is concerned with a most important area of industrial production, that of analysis and optimization of production lines and networks using discrete-event models and simulation. The book introduces a novel approach that combines analytic models and discrete-event simulation. Unlike conventional piece-by-piece simulation, this method observes a reduced number of events between which the evolution of the system is tracked analytically. Using this hybrid approach, several models are developed for the analysis of production lines and networks. The hybrid approach combines speed and accuracy for exceptional analysis of most practical situations. A number of optimization problems, involving buffer design, workforce planning, and production control, are solved through the use of hybrid models.

  15. Network Modeling and Simulation A Practical Perspective

    CERN Document Server

    Guizani, Mohsen; Khan, Bilal

    2010-01-01

    Network Modeling and Simulation is a practical guide to using modeling and simulation to solve real-life problems. The authors give a comprehensive exposition of the core concepts in modeling and simulation, and then systematically address the many practical considerations faced by developers in modeling complex large-scale systems. The authors provide examples from computer and telecommunication networks and use these to illustrate the process of mapping generic simulation concepts to domain-specific problems in different industries and disciplines. Key features: Provides the tools and strate

  16. Performance modeling, stochastic networks, and statistical multiplexing

    CERN Document Server

    Mazumdar, Ravi R

    2013-01-01

    This monograph presents a concise mathematical approach for modeling and analyzing the performance of communication networks with the aim of introducing an appropriate mathematical framework for modeling and analysis as well as understanding the phenomenon of statistical multiplexing. The models, techniques, and results presented form the core of traffic engineering methods used to design, control and allocate resources in communication networks.The novelty of the monograph is the fresh approach and insights provided by a sample-path methodology for queueing models that highlights the importan

  17. Switching performance of OBS network model under prefetched real traffic

    Science.gov (United States)

    Huang, Zhenhua; Xu, Du; Lei, Wen

    2005-11-01

    Optical Burst Switching (OBS) [1] is now widely considered as an efficient switching technique in building the next generation optical Internet .So it's very important to precisely evaluate the performance of the OBS network model. The performance of the OBS network model is variable in different condition, but the most important thing is that how it works under real traffic load. In the traditional simulation models, uniform traffics are usually generated by simulation software to imitate the data source of the edge node in the OBS network model, and through which the performance of the OBS network is evaluated. Unfortunately, without being simulated by real traffic, the traditional simulation models have several problems and their results are doubtable. To deal with this problem, we present a new simulation model for analysis and performance evaluation of the OBS network, which uses prefetched IP traffic to be data source of the OBS network model. The prefetched IP traffic can be considered as real IP source of the OBS edge node and the OBS network model has the same clock rate with a real OBS system. So it's easy to conclude that this model is closer to the real OBS system than the traditional ones. The simulation results also indicate that this model is more accurate to evaluate the performance of the OBS network system and the results of this model are closer to the actual situation.

  18. Modeling and control of magnetorheological fluid dampers using neural networks

    Science.gov (United States)

    Wang, D. H.; Liao, W. H.

    2005-02-01

    Due to the inherent nonlinear nature of magnetorheological (MR) fluid dampers, one of the challenging aspects for utilizing these devices to achieve high system performance is the development of accurate models and control algorithms that can take advantage of their unique characteristics. In this paper, the direct identification and inverse dynamic modeling for MR fluid dampers using feedforward and recurrent neural networks are studied. The trained direct identification neural network model can be used to predict the damping force of the MR fluid damper on line, on the basis of the dynamic responses across the MR fluid damper and the command voltage, and the inverse dynamic neural network model can be used to generate the command voltage according to the desired damping force through supervised learning. The architectures and the learning methods of the dynamic neural network models and inverse neural network models for MR fluid dampers are presented, and some simulation results are discussed. Finally, the trained neural network models are applied to predict and control the damping force of the MR fluid damper. Moreover, validation methods for the neural network models developed are proposed and used to evaluate their performance. Validation results with different data sets indicate that the proposed direct identification dynamic model using the recurrent neural network can be used to predict the damping force accurately and the inverse identification dynamic model using the recurrent neural network can act as a damper controller to generate the command voltage when the MR fluid damper is used in a semi-active mode.

  19. Analysis and logical modeling of biological signaling transduction networks

    Science.gov (United States)

    Sun, Zhongyao

    The study of network theory and its application span across a multitude of seemingly disparate fields of science and technology: computer science, biology, social science, linguistics, etc. It is the intrinsic similarities embedded in the entities and the way they interact with one another in these systems that link them together. In this dissertation, I present from both the aspect of theoretical analysis and the aspect of application three projects, which primarily focus on signal transduction networks in biology. In these projects, I assembled a network model through extensively perusing literature, performed model-based simulations and validation, analyzed network topology, and proposed a novel network measure. The application of network modeling to the system of stomatal opening in plants revealed a fundamental question about the process that has been left unanswered in decades. The novel measure of the redundancy of signal transduction networks with Boolean dynamics by calculating its maximum node-independent elementary signaling mode set accurately predicts the effect of single node knockout in such signaling processes. The three projects as an organic whole advance the understanding of a real system as well as the behavior of such network models, giving me an opportunity to take a glimpse at the dazzling facets of the immense world of network science.

  20. UAV Trajectory Modeling Using Neural Networks

    Science.gov (United States)

    Xue, Min

    2017-01-01

    Large amount of small Unmanned Aerial Vehicles (sUAVs) are projected to operate in the near future. Potential sUAV applications include, but not limited to, search and rescue, inspection and surveillance, aerial photography and video, precision agriculture, and parcel delivery. sUAVs are expected to operate in the uncontrolled Class G airspace, which is at or below 500 feet above ground level (AGL), where many static and dynamic constraints exist, such as ground properties and terrains, restricted areas, various winds, manned helicopters, and conflict avoidance among sUAVs. How to enable safe, efficient, and massive sUAV operations at the low altitude airspace remains a great challenge. NASA's Unmanned aircraft system Traffic Management (UTM) research initiative works on establishing infrastructure and developing policies, requirement, and rules to enable safe and efficient sUAVs' operations. To achieve this goal, it is important to gain insights of future UTM traffic operations through simulations, where the accurate trajectory model plays an extremely important role. On the other hand, like what happens in current aviation development, trajectory modeling should also serve as the foundation for any advanced concepts and tools in UTM. Accurate models of sUAV dynamics and control systems are very important considering the requirement of the meter level precision in UTM operations. The vehicle dynamics are relatively easy to derive and model, however, vehicle control systems remain unknown as they are usually kept by manufactures as a part of intellectual properties. That brings challenges to trajectory modeling for sUAVs. How to model the vehicle's trajectories with unknown control system? This work proposes to use a neural network to model a vehicle's trajectory. The neural network is first trained to learn the vehicle's responses at numerous conditions. Once being fully trained, given current vehicle states, winds, and desired future trajectory, the neural

  1. Attachment Theory and Theory of Planned Behavior: An Integrative Model Predicting Underage Drinking

    Science.gov (United States)

    Lac, Andrew; Crano, William D.; Berger, Dale E.; Alvaro, Eusebio M.

    2013-01-01

    Research indicates that peer and maternal bonds play important but sometimes contrasting roles in the outcomes of children. Less is known about attachment bonds to these 2 reference groups in young adults. Using a sample of 351 participants (18 to 20 years of age), the research integrated two theoretical traditions: attachment theory and theory of…

  2. Modeling GMPLS and Optical MPLS Networks

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann; Wessing, Henrik

    2003-01-01

    . The MPLS concept is attractive because it can work as a unifying control structure. covering all technologies. This paper describes how a novel scheme for optical MPLS and circuit switched GMPLS based networks can incorporated in such multi-domain, MPLS-based scenarios and how it could be modeled. Network...

  3. Steady state analysis of Boolean molecular network models via model reduction and computational algebra.

    Science.gov (United States)

    Veliz-Cuba, Alan; Aguilar, Boris; Hinkelmann, Franziska; Laubenbacher, Reinhard

    2014-06-26

    A key problem in the analysis of mathematical models of molecular networks is the determination of their steady states. The present paper addresses this problem for Boolean network models, an increasingly popular modeling paradigm for networks lacking detailed kinetic information. For small models, the problem can be solved by exhaustive enumeration of all state transitions. But for larger models this is not feasible, since the size of the phase space grows exponentially with the dimension of the network. The dimension of published models is growing to over 100, so that efficient methods for steady state determination are essential. Several methods have been proposed for large networks, some of them heuristic. While these methods represent a substantial improvement in scalability over exhaustive enumeration, the problem for large networks is still unsolved in general. This paper presents an algorithm that consists of two main parts. The first is a graph theoretic reduction of the wiring diagram of the network, while preserving all information about steady states. The second part formulates the determination of all steady states of a Boolean network as a problem of finding all solutions to a system of polynomial equations over the finite number system with two elements. This problem can be solved with existing computer algebra software. This algorithm compares favorably with several existing algorithms for steady state determination. One advantage is that it is not heuristic or reliant on sampling, but rather determines algorithmically and exactly all steady states of a Boolean network. The code for the algorithm, as well as the test suite of benchmark networks, is available upon request from the corresponding author. The algorithm presented in this paper reliably determines all steady states of sparse Boolean networks with up to 1000 nodes. The algorithm is effective at analyzing virtually all published models even those of moderate connectivity. The problem for

  4. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  5. PROJECT ACTIVITY ANALYSIS WITHOUT THE NETWORK MODEL

    Directory of Open Access Journals (Sweden)

    S. Munapo

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper presents a new procedure for analysing and managing activity sequences in projects. The new procedure determines critical activities, critical path, start times, free floats, crash limits, and other useful information without the use of the network model. Even though network models have been successfully used in project management so far, there are weaknesses associated with the use. A network is not easy to generate, and dummies that are usually associated with it make the network diagram complex – and dummy activities have no meaning in the original project management problem. The network model for projects can be avoided while still obtaining all the useful information that is required for project management. What are required are the activities, their accurate durations, and their predecessors.

    AFRIKAANSE OPSOMMING: Die navorsing beskryf ’n nuwerwetse metode vir die ontleding en bestuur van die sekwensiële aktiwiteite van projekte. Die voorgestelde metode bepaal kritiese aktiwiteite, die kritieke pad, aanvangstye, speling, verhasing, en ander groothede sonder die gebruik van ’n netwerkmodel. Die metode funksioneer bevredigend in die praktyk, en omseil die administratiewe rompslomp van die tradisionele netwerkmodelle.

  6. Multiple attachments and group psychotherapy: implications for college counseling centers.

    Science.gov (United States)

    Marmarosh, Cheri L

    2009-10-01

    A large body of literature has supported the application of attachment theory to the understanding of college student development and the process of individual psychotherapy. Despite group treatment being one of the major methods of intervention in college counseling centers, there has been very little research guided by attachment theory that has been applied to the area of group psychotherapy. Many current assessment instruments used in college counseling centers can be supported with attachment theory, and many group therapy interventions are aimed at facilitating secure working models of self, other, and groups. This paper explores the importance of personal and group attachments in group psychotherapy and specifically addresses implications for clinical training and research in university counseling centers.

  7. Attachment, Neurobiology, and Mentalizing along the Psychosis Continuum.

    Science.gov (United States)

    Debbané, Martin; Salaminios, George; Luyten, Patrick; Badoud, Deborah; Armando, Marco; Solida Tozzi, Alessandra; Fonagy, Peter; Brent, Benjamin K

    2016-01-01

    In this review article, we outline the evidence linking attachment adversity to psychosis, from the premorbid stages of the disorder to its clinical forms. To better understand the neurobiological mechanisms through which insecure attachment may contribute to psychosis, we identify at least five neurobiological pathways linking attachment to risk for developing psychosis. Besides its well documented influence on the hypothalamic-pituary-adrenal (HPA) axis, insecure attachment may also contribute to neurodevelopmental risk through the dopaminergic and oxytonergic systems, as well as bear influence on neuroinflammation and oxidative stress responses. We further consider the neuroscientific and behavioral studies that underpin mentalization as a suite of processes potentially moderating the risk to transition to psychotic disorders. In particular, mentalization may help the individual compensate for endophenotypical impairments in the integration of sensory and metacognitive information. We propose a model where embodied mentalization would lie at the core of a protective, resilience response mitigating the adverse and potentially pathological influence of the neurodevelopmental cascade of risk for psychosis.

  8. Attachment, Neurobiology, and Mentalizing along the Psychosis Continuum

    Science.gov (United States)

    Debbané, Martin; Salaminios, George; Luyten, Patrick; Badoud, Deborah; Armando, Marco; Solida Tozzi, Alessandra; Fonagy, Peter; Brent, Benjamin K.

    2016-01-01

    In this review article, we outline the evidence linking attachment adversity to psychosis, from the premorbid stages of the disorder to its clinical forms. To better understand the neurobiological mechanisms through which insecure attachment may contribute to psychosis, we identify at least five neurobiological pathways linking attachment to risk for developing psychosis. Besides its well documented influence on the hypothalamic-pituary-adrenal (HPA) axis, insecure attachment may also contribute to neurodevelopmental risk through the dopaminergic and oxytonergic systems, as well as bear influence on neuroinflammation and oxidative stress responses. We further consider the neuroscientific and behavioral studies that underpin mentalization as a suite of processes potentially moderating the risk to transition to psychotic disorders. In particular, mentalization may help the individual compensate for endophenotypical impairments in the integration of sensory and metacognitive information. We propose a model where embodied mentalization would lie at the core of a protective, resilience response mitigating the adverse and potentially pathological influence of the neurodevelopmental cascade of risk for psychosis. PMID:27597820

  9. Modelling, Synthesis, and Configuration of Networks-on-Chips

    DEFF Research Database (Denmark)

    Stuart, Matthias Bo

    This thesis presents three contributions in two different areas of network-on-chip and system-on-chip research: Application modelling and identifying and solving different optimization problems related to two specific network-on-chip architectures. The contribution related to application modelling...... is an analytical method for deriving the worst-case traffic pattern caused by an application and the cache-coherence protocol in a cache-coherent shared-memory system. The contributions related to network-on-chip optimization problems consist of two parts: The development and evaluation of six heuristics...... for solving the network synthesis problem in the MANGO network-on-chip, and the identification and formalization of the ReNoC configuration problem together with three heuristics for solving it....

  10. Artificial Neural Network Modeling of an Inverse Fluidized Bed ...

    African Journals Online (AJOL)

    A Radial Basis Function neural network has been successfully employed for the modeling of the inverse fluidized bed reactor. In the proposed model, the trained neural network represents the kinetics of biological decomposition of pollutants in the reactor. The neural network has been trained with experimental data ...

  11. Chlorine stress mediates microbial surface attachment in drinking water systems.

    Science.gov (United States)

    Liu, Li; Le, Yang; Jin, Juliang; Zhou, Yuliang; Chen, Guowei

    2015-03-01

    Microbial attachment to drinking water pipe surfaces facilitates pathogen survival and deteriorates disinfection performance, directly threatening the safety of drinking water. Notwithstanding that the formation of biofilm has been studied for decades, the underlying mechanisms for the origins of microbial surface attachment in biofilm development in drinking water pipelines remain largely elusive. We combined experimental and mathematical methods to investigate the role of environmental stress-mediated cell motility on microbial surface attachment in chlorination-stressed drinking water distribution systems. Results show that at low levels of disinfectant (0.0-1.0 mg/L), the presence of chlorine promotes initiation of microbial surface attachment, while higher amounts of disinfectant (>1.0 mg/L) inhibit microbial attachment. The proposed mathematical model further demonstrates that chlorination stress (0.0-5.0 mg/L)-mediated microbial cell motility regulates the frequency of cell-wall collision and thereby controls initial microbial surface attachment. The results reveal that transport processes and decay patterns of chlorine in drinking water pipelines regulate microbial cell motility and, thus, control initial surface cell attachment. It provides a mechanistic understanding of microbial attachment shaped by environmental disinfection stress and leads to new insights into microbial safety protocols in water distribution systems.

  12. Childhood sexual abuse and attachment: An intergenerational perspective

    OpenAIRE

    Kwako, Laura E.; Noll, Jennie G.; Putnam, Frank W.; Trickett, Penelope K.

    2010-01-01

    Childhood sexual abuse (CSA) is a recognized risk factor for various negative outcomes in adult survivors and their offspring. We used the Dynamic-Maturational Model of attachment theory as a framework for exploring the impact of maternal CSA on children’s attachment relationships in the context of a longitudinal sample of adult survivors of CSA and non-abused comparison mothers and their children. Results indicated that children of CSA survivors were more likely to have extreme strategies of...

  13. A source-controlled data center network model.

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  14. A source-controlled data center network model

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS. PMID:28328925

  15. Modeling integrated cellular machinery using hybrid Petri-Boolean networks.

    Directory of Open Access Journals (Sweden)

    Natalie Berestovsky

    Full Text Available The behavior and phenotypic changes of cells are governed by a cellular circuitry that represents a set of biochemical reactions. Based on biological functions, this circuitry is divided into three types of networks, each encoding for a major biological process: signal transduction, transcription regulation, and metabolism. This division has generally enabled taming computational complexity dealing with the entire system, allowed for using modeling techniques that are specific to each of the components, and achieved separation of the different time scales at which reactions in each of the three networks occur. Nonetheless, with this division comes loss of information and power needed to elucidate certain cellular phenomena. Within the cell, these three types of networks work in tandem, and each produces signals and/or substances that are used by the others to process information and operate normally. Therefore, computational techniques for modeling integrated cellular machinery are needed. In this work, we propose an integrated hybrid model (IHM that combines Petri nets and Boolean networks to model integrated cellular networks. Coupled with a stochastic simulation mechanism, the model simulates the dynamics of the integrated network, and can be perturbed to generate testable hypotheses. Our model is qualitative and is mostly built upon knowledge from the literature and requires fine-tuning of very few parameters. We validated our model on two systems: the transcriptional regulation of glucose metabolism in human cells, and cellular osmoregulation in S. cerevisiae. The model produced results that are in very good agreement with experimental data, and produces valid hypotheses. The abstract nature of our model and the ease of its construction makes it a very good candidate for modeling integrated networks from qualitative data. The results it produces can guide the practitioner to zoom into components and interconnections and investigate them

  16. Structural Interfaces and Attachments in Biology

    CERN Document Server

    Birman, Victor; Genin, Guy

    2013-01-01

    Attachment of dissimilar materials in engineering and surgical practice is a perennial challenge. Bimaterial attachment sites are common locations for injury, repeated injury, and mechanical failure. Nature presents several highly effective solutions to the challenge of bimaterial attachment that differ from those found in engineering practice. Structural Interfaces and Attachments in Biology describes the attachment of dissimilar materials from multiple perspectives. The text will simultaneously elucidate natural bimaterial attachments and outline engineering principles underlying successful attachments to the communities of tissue engineers and surgeons. Included an in-depth analysis of the biology of attachments in the body and mechanisms by which robust attachments are formed, a review of current concepts of attaching dissimilar materials in surgical practice and a discussion of bioengineering approaches that are currently being developed. This book also: Provides the first comprehensive treatment of phys...

  17. A Model for Telestrok Network Evaluation

    DEFF Research Database (Denmark)

    Storm, Anna; Günzel, Franziska; Theiss, Stephan

    2011-01-01

    analysis lacking, current telestroke reimbursement by third-party payers is limited to special contracts and not included in the regular billing system. Based on a systematic literature review and expert interviews with health care economists, third-party payers and neurologists, a Markov model...... was developed from the third-party payer perspective. In principle, it enables telestroke networks to conduct cost-effectiveness studies, because the majority of the required data can be extracted from health insurance companies’ databases and the telestroke network itself. The model presents a basis...

  18. Mixture models with entropy regularization for community detection in networks

    Science.gov (United States)

    Chang, Zhenhai; Yin, Xianjun; Jia, Caiyan; Wang, Xiaoyang

    2018-04-01

    Community detection is a key exploratory tool in network analysis and has received much attention in recent years. NMM (Newman's mixture model) is one of the best models for exploring a range of network structures including community structure, bipartite and core-periphery structures, etc. However, NMM needs to know the number of communities in advance. Therefore, in this study, we have proposed an entropy regularized mixture model (called EMM), which is capable of inferring the number of communities and identifying network structure contained in a network, simultaneously. In the model, by minimizing the entropy of mixing coefficients of NMM using EM (expectation-maximization) solution, the small clusters contained little information can be discarded step by step. The empirical study on both synthetic networks and real networks has shown that the proposed model EMM is superior to the state-of-the-art methods.

  19. The International Trade Network: weighted network analysis and modelling

    International Nuclear Information System (INIS)

    Bhattacharya, K; Mukherjee, G; Manna, S S; Saramäki, J; Kaski, K

    2008-01-01

    Tools of the theory of critical phenomena, namely the scaling analysis and universality, are argued to be applicable to large complex web-like network structures. Using a detailed analysis of the real data of the International Trade Network we argue that the scaled link weight distribution has an approximate log-normal distribution which remains robust over a period of 53 years. Another universal feature is observed in the power-law growth of the trade strength with gross domestic product, the exponent being similar for all countries. Using the 'rich-club' coefficient measure of the weighted networks it has been shown that the size of the rich-club controlling half of the world's trade is actually shrinking. While the gravity law is known to describe well the social interactions in the static networks of population migration, international trade, etc, here for the first time we studied a non-conservative dynamical model based on the gravity law which excellently reproduced many empirical features of the ITN

  20. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  1. Modelling and predicting biogeographical patterns in river networks

    Directory of Open Access Journals (Sweden)

    Sabela Lois

    2016-04-01

    Full Text Available Statistical analysis and interpretation of biogeographical phenomena in rivers is now possible using a spatially explicit modelling framework, which has seen significant developments in the past decade. I used this approach to identify a spatial extent (geostatistical range in which the abundance of the parasitic freshwater pearl mussel (Margaritifera margaritifera L. is spatially autocorrelated in river networks. I show that biomass and abundance of host fish are a likely explanation for the autocorrelation in mussel abundance within a 15-km spatial extent. The application of universal kriging with the empirical model enabled precise prediction of mussel abundance within segments of river networks, something that has the potential to inform conservation biogeography. Although I used a variety of modelling approaches in my thesis, I focus here on the details of this relatively new spatial stream network model, thus advancing the study of biogeographical patterns in river networks.

  2. Modeling polyvinyl chloride Plasma Modification by Neural Networks

    Science.gov (United States)

    Wang, Changquan

    2018-03-01

    Neural networks model were constructed to analyze the connection between dielectric barrier discharge parameters and surface properties of material. The experiment data were generated from polyvinyl chloride plasma modification by using uniform design. Discharge voltage, discharge gas gap and treatment time were as neural network input layer parameters. The measured values of contact angle were as the output layer parameters. A nonlinear mathematical model of the surface modification for polyvinyl chloride was developed based upon the neural networks. The optimum model parameters were obtained by the simulation evaluation and error analysis. The results of the optimal model show that the predicted value is very close to the actual test value. The prediction model obtained here are useful for discharge plasma surface modification analysis.

  3. Lukasiewicz-Topos Models of Neural Networks, Cell Genome and Interactome Nonlinear Dynamic Models

    CERN Document Server

    Baianu, I C

    2004-01-01

    A categorical and Lukasiewicz-Topos framework for Lukasiewicz Algebraic Logic models of nonlinear dynamics in complex functional systems such as neural networks, genomes and cell interactomes is proposed. Lukasiewicz Algebraic Logic models of genetic networks and signaling pathways in cells are formulated in terms of nonlinear dynamic systems with n-state components that allow for the generalization of previous logical models of both genetic activities and neural networks. An algebraic formulation of variable 'next-state functions' is extended to a Lukasiewicz Topos with an n-valued Lukasiewicz Algebraic Logic subobject classifier description that represents non-random and nonlinear network activities as well as their transformations in developmental processes and carcinogenesis.

  4. Bayes and Networks

    NARCIS (Netherlands)

    Gao, F.

    2017-01-01

    The dissertation consists of research in three subjects in two themes—Bayes and networks: The first studies the posterior contraction rates for the Dirichlet-Laplace mixtures in a deconvolution setting (Chapter 1). The second subject regards the statistical inference in preferential attachment

  5. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  6. Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery

    International Nuclear Information System (INIS)

    Ramirez-Marquez, Jose Emmanuel; Rocco S, Claudio M.

    2009-01-01

    This paper introduces an evolutionary optimization approach that can be readily applied to solve stochastic network interdiction problems (SNIP). The network interdiction problem solved considers the minimization of the cost associated with an interdiction strategy such that the maximum flow that can be transmitted between a source node and a sink node for a fixed network design is greater than or equal to a given reliability requirement. Furthermore, the model assumes that the nominal capacity of each network link and the cost associated with their interdiction can change from link to link and that such interdiction has a probability of being successful. This version of the SNIP is for the first time modeled as a capacitated network reliability problem allowing for the implementation of computation and solution techniques previously unavailable. The solution process is based on an evolutionary algorithm that implements: (1) Monte-Carlo simulation, to generate potential network interdiction strategies, (2) capacitated network reliability techniques to analyze strategies' source-sink flow reliability and, (3) an evolutionary optimization technique to define, in probabilistic terms, how likely a link is to appear in the final interdiction strategy. Examples for different sizes of networks are used throughout the paper to illustrate the approach

  7. Effect of Attachment-Based Therapy on Behavioral Disorders in Girls with Attachment Problems

    Directory of Open Access Journals (Sweden)

    Marzieh Jahanbakhsh

    2014-09-01

    Full Text Available Background: Multidimensional and complex nature of children`s behavioral disorders requires assessment and usage of modern treatments. The present study investigated the effects of attachment-based therapy on behavioral disorders (depression, over anxiety and oppositional defiant in girl students of primary school who had attachment problems. Materials and Methods: This study is an empirical plan with pretest-posttest and control group. The target samples were 34 individuals of 388 second and fourth grade students of primary school that had highest scores on attachment problems and behavioral disorders (depression, over anxiety and oppositional defiant. Evaluation implemented using Randolph attachment disorder questionnaire (RADQ and Ontario mental health test. Mothers were presented in 10 group sessions of attachment-based intervention and its effects investigated in their girl`s behavioral disorders (depression, over anxiety and oppositional defiant. Results: Reduction rate of behavioral disorders general scores (depression, over anxiety and oppositional defiant of experimental group compared with control group showed significant decreases in posttest and three months follow up. Conclusion: The attachment based therapy offered for mothers of the girls with attachment problems was effective to reduction of behavioral disorders (depression, over anxiety and oppositional defiant symptoms in their children and the mother`s continues attention to interventional methods showed more improvement in follow up evaluation.

  8. Generalized Tavis-Cummings models and quantum networks

    Science.gov (United States)

    Gorokhov, A. V.

    2018-04-01

    The properties of quantum networks based on generalized Tavis-Cummings models are theoretically investigated. We have calculated the information transfer success rate from one node to another in a simple model of a quantum network realized with two-level atoms placed in the cavities and interacting with an external laser field and cavity photons. The method of dynamical group of the Hamiltonian and technique of corresponding coherent states were used for investigation of the temporal dynamics of the two nodes model.

  9. The 5’cap of Tobacco Mosaic Virus (TMV) is required for virion attachment to the actin/ER network during early infection

    DEFF Research Database (Denmark)

    Christensen, Nynne Meyn; Tilsner, Jens; Bell, Karen

    to the motile cortical actin/ER network within minutes of injection. Granule movement on actin/ER was arrested by actin inhibitors indicating actindependent RNA movement. The 5’ methylguanosine TMV cap was shown to be required for vRNA anchoring to the ER. TMV vRNA lacking the 5’cap failed to form granules...... the fluorescent vRNA pool nor co-injected GFP left the injected trichome, indicating that the synthesis of unlabelled progeny viral (v)RNA is required to initiate cell-cell movement, and that virus movement is not accompanied by passive plasmodesmatal gating. Cy3-vRNA formed granules that became anchored...... on the same ER-bound granules, indicating that TMV virions may become attached to the ER prior to uncoating of the viral genome....

  10. Using structural equation modeling for network meta-analysis.

    Science.gov (United States)

    Tu, Yu-Kang; Wu, Yun-Chun

    2017-07-14

    Network meta-analysis overcomes the limitations of traditional pair-wise meta-analysis by incorporating all available evidence into a general statistical framework for simultaneous comparisons of several treatments. Currently, network meta-analyses are undertaken either within the Bayesian hierarchical linear models or frequentist generalized linear mixed models. Structural equation modeling (SEM) is a statistical method originally developed for modeling causal relations among observed and latent variables. As random effect is explicitly modeled as a latent variable in SEM, it is very flexible for analysts to specify complex random effect structure and to make linear and nonlinear constraints on parameters. The aim of this article is to show how to undertake a network meta-analysis within the statistical framework of SEM. We used an example dataset to demonstrate the standard fixed and random effect network meta-analysis models can be easily implemented in SEM. It contains results of 26 studies that directly compared three treatment groups A, B and C for prevention of first bleeding in patients with liver cirrhosis. We also showed that a new approach to network meta-analysis based on the technique of unrestricted weighted least squares (UWLS) method can also be undertaken using SEM. For both the fixed and random effect network meta-analysis, SEM yielded similar coefficients and confidence intervals to those reported in the previous literature. The point estimates of two UWLS models were identical to those in the fixed effect model but the confidence intervals were greater. This is consistent with results from the traditional pairwise meta-analyses. Comparing to UWLS model with common variance adjusted factor, UWLS model with unique variance adjusted factor has greater confidence intervals when the heterogeneity was larger in the pairwise comparison. The UWLS model with unique variance adjusted factor reflects the difference in heterogeneity within each comparison

  11. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  12. Vortex network community based reduced-order force model

    Science.gov (United States)

    Gopalakrishnan Meena, Muralikrishnan; Nair, Aditya; Taira, Kunihiko

    2017-11-01

    We characterize the vortical wake interactions by utilizing network theory and cluster-based approaches, and develop a data-inspired unsteady force model. In the present work, the vortical interaction network is defined by nodes representing vortical elements and the edges quantified by induced velocity measures amongst the vortices. The full vorticity field is reduced to a finite number of vortical clusters based on network community detection algorithm, which serves as a basis for a skeleton network that captures the essence of the wake dynamics. We use this reduced representation of the wake to develop a data-inspired reduced-order force model that can predict unsteady fluid forces on the body. The overall formulation is demonstrated for laminar flows around canonical bluff body wake and stalled flow over an airfoil. We also show the robustness of the present network-based model against noisy data, which motivates applications towards turbulent flows and experimental measurements. Supported by the National Science Foundation (Grant 1632003).

  13. Social network models predict movement and connectivity in ecological landscapes

    Science.gov (United States)

    Fletcher, Robert J.; Acevedo, M.A.; Reichert, Brian E.; Pias, Kyle E.; Kitchens, Wiley M.

    2011-01-01

    Network analysis is on the rise across scientific disciplines because of its ability to reveal complex, and often emergent, patterns and dynamics. Nonetheless, a growing concern in network analysis is the use of limited data for constructing networks. This concern is strikingly relevant to ecology and conservation biology, where network analysis is used to infer connectivity across landscapes. In this context, movement among patches is the crucial parameter for interpreting connectivity but because of the difficulty of collecting reliable movement data, most network analysis proceeds with only indirect information on movement across landscapes rather than using observed movement to construct networks. Statistical models developed for social networks provide promising alternatives for landscape network construction because they can leverage limited movement information to predict linkages. Using two mark-recapture datasets on individual movement and connectivity across landscapes, we test whether commonly used network constructions for interpreting connectivity can predict actual linkages and network structure, and we contrast these approaches to social network models. We find that currently applied network constructions for assessing connectivity consistently, and substantially, overpredict actual connectivity, resulting in considerable overestimation of metapopulation lifetime. Furthermore, social network models provide accurate predictions of network structure, and can do so with remarkably limited data on movement. Social network models offer a flexible and powerful way for not only understanding the factors influencing connectivity but also for providing more reliable estimates of connectivity and metapopulation persistence in the face of limited data.

  14. Social network models predict movement and connectivity in ecological landscapes.

    Science.gov (United States)

    Fletcher, Robert J; Acevedo, Miguel A; Reichert, Brian E; Pias, Kyle E; Kitchens, Wiley M

    2011-11-29

    Network analysis is on the rise across scientific disciplines because of its ability to reveal complex, and often emergent, patterns and dynamics. Nonetheless, a growing concern in network analysis is the use of limited data for constructing networks. This concern is strikingly relevant to ecology and conservation biology, where network analysis is used to infer connectivity across landscapes. In this context, movement among patches is the crucial parameter for interpreting connectivity but because of the difficulty of collecting reliable movement data, most network analysis proceeds with only indirect information on movement across landscapes rather than using observed movement to construct networks. Statistical models developed for social networks provide promising alternatives for landscape network construction because they can leverage limited movement information to predict linkages. Using two mark-recapture datasets on individual movement and connectivity across landscapes, we test whether commonly used network constructions for interpreting connectivity can predict actual linkages and network structure, and we contrast these approaches to social network models. We find that currently applied network constructions for assessing connectivity consistently, and substantially, overpredict actual connectivity, resulting in considerable overestimation of metapopulation lifetime. Furthermore, social network models provide accurate predictions of network structure, and can do so with remarkably limited data on movement. Social network models offer a flexible and powerful way for not only understanding the factors influencing connectivity but also for providing more reliable estimates of connectivity and metapopulation persistence in the face of limited data.

  15. Dynamic Pathloss Model for Place and Time Itinerant Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena; Prasad, Ramjee

    2018-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......t Future mobile communication networks are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network planning...... depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  16. ASE-BAN, a Wireless Body Area Network Testbed

    DEFF Research Database (Denmark)

    Madsen, Jens Kargaard; Karstoft, Henrik; Toftegaard, Thomas Skjødeberg

    2010-01-01

    /actuators attached to the body and a host server application. The gateway uses the BlackFin BF533 processor from Analog Devices, and uses Bluetooth for wireless communication. Two types of sensors are attached to the network: an electro-cardio-gram sensor and an oximeter sensor. The testbed has been successfully...

  17. A complex network based model for detecting isolated communities in water distribution networks

    Science.gov (United States)

    Sheng, Nan; Jia, Youwei; Xu, Zhao; Ho, Siu-Lau; Wai Kan, Chi

    2013-12-01

    Water distribution network (WDN) is a typical real-world complex network of major infrastructure that plays an important role in human's daily life. In this paper, we explore the formation of isolated communities in WDN based on complex network theory. A graph-algebraic model is proposed to effectively detect the potential communities due to pipeline failures. This model can properly illustrate the connectivity and evolution of WDN during different stages of contingency events, and identify the emerging isolated communities through spectral analysis on Laplacian matrix. A case study on a practical urban WDN in China is conducted, and the consistency between the simulation results and the historical data are reported to showcase the feasibility and effectiveness of the proposed model.

  18. Infection dynamics on spatial small-world network models

    Science.gov (United States)

    Iotti, Bryan; Antonioni, Alberto; Bullock, Seth; Darabos, Christian; Tomassini, Marco; Giacobini, Mario

    2017-11-01

    The study of complex networks, and in particular of social networks, has mostly concentrated on relational networks, abstracting the distance between nodes. Spatial networks are, however, extremely relevant in our daily lives, and a large body of research exists to show that the distances between nodes greatly influence the cost and probability of establishing and maintaining a link. A random geometric graph (RGG) is the main type of synthetic network model used to mimic the statistical properties and behavior of many social networks. We propose a model, called REDS, that extends energy-constrained RGGs to account for the synergic effect of sharing the cost of a link with our neighbors, as is observed in real relational networks. We apply both the standard Watts-Strogatz rewiring procedure and another method that conserves the degree distribution of the network. The second technique was developed to eliminate unwanted forms of spatial correlation between the degree of nodes that are affected by rewiring, limiting the effect on other properties such as clustering and assortativity. We analyze both the statistical properties of these two network types and their epidemiological behavior when used as a substrate for a standard susceptible-infected-susceptible compartmental model. We consider and discuss the differences in properties and behavior between RGGs and REDS as rewiring increases and as infection parameters are changed. We report considerable differences both between the network types and, in the case of REDS, between the two rewiring schemes. We conclude that REDS represent, with the application of these rewiring mechanisms, extremely useful and interesting tools in the study of social and epidemiological phenomena in synthetic complex networks.

  19. Associations among Adult Attachment Presentations, Maternal Sensitivity, and Infant-Mother Attachment in a Sample of Adolescent Mothers.

    Science.gov (United States)

    Ward, Mary J.; Carlson, Elizabeth A.

    1995-01-01

    Associations among adolescent attachment organization, maternal sensitivity, and infant attachment organization were examined prospectively in 72 teenaged mother-infant dyads. Pregnant teenagers' attachment organizations predicted both sensitivity and infant-mother attachments. Associations between maternal sensitivity and infant attachment were…

  20. Efficient Neural Network Modeling for Flight and Space Dynamics Simulation

    Directory of Open Access Journals (Sweden)

    Ayman Hamdy Kassem

    2011-01-01

    Full Text Available This paper represents an efficient technique for neural network modeling of flight and space dynamics simulation. The technique will free the neural network designer from guessing the size and structure for the required neural network model and will help to minimize the number of neurons. For linear flight/space dynamics systems, the technique can find the network weights and biases directly by solving a system of linear equations without the need for training. Nonlinear flight dynamic systems can be easily modeled by training its linearized models keeping the same network structure. The training is fast, as it uses the linear system knowledge to speed up the training process. The technique is tested on different flight/space dynamic models and showed promising results.