WorldWideScience

Sample records for complex dynamic security

  1. Design tools for complex dynamic security systems.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson; Laguna, Glenn A.; Robinett, Rush D. III (.; ); Groom, Kenneth Neal; Wilson, David Gerald; Bickerstaff, Robert J.; Harrington, John J.

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systems are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.

  2. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    This paper presents a perspective in the study of complex networks by focusing on how dynamics may affect network security under attacks. ... Department of Mathematics and Statistics, Arizona State University, Tempe, Arizona 85287, USA; Institute of Mathematics and Computer Science, University of Sao Paulo, Brazil ...

  3. Analysis of Dynamic Complexity of the Cyber Security Ecosystem of Colombia

    Directory of Open Access Journals (Sweden)

    Angélica Flórez

    2016-07-01

    Full Text Available This paper presents two proposals for the analysis of the complexity of the Cyber security Ecosystem of Colombia (CEC. This analysis shows the available knowledge about entities engaged in cyber security in Colombia and the relationships between them, which allow an understanding of the synergy between the different existing components. The complexity of the CEC is detailed from the view of the Influence Diagram of System Dynamics and the Domain Diagram of Software Engineering. The resulting model makes cyber security evident as a strategic component of national security.

  4. Household Food Security Policy Analysis A System Dynamics Perspective

    Directory of Open Access Journals (Sweden)

    Isdore Paterson Guma

    2015-08-01

    Full Text Available Household food security FS is complex and requires multiple stakeholder intervention. Systemic approach aids stakeholders to understand the mechanisms and feedback between complexities in food security providing effective decision making as global resource consumption continues to grow. The study investigated food security challenges and a system dynamics model was developed for evaluating policies and intervention strategies for better livelihood at household level. Dynamic synthesis methodology questionnaires and interview guide were used to unearth food security challenges faced by households. A causal loop diagram was drawn. The model demonstrates a balance between food stock seeds preserved seeds for sale and consumption from crop harvest throughout the food cycles. This research makes contribution to the literature by evaluating dynamic synthesis methodology and FS policy discussions from a feedback point of view.

  5. Dynamic secrets in communication security

    CERN Document Server

    Xiao, Sheng; Towsley, Donald

    2013-01-01

    Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. 'Dynamic Secrets in Communication Security' presents unique security properties and application studies for this technology. Password theft and key theft no longer pose serious security threats when parties frequently use dynamic secrets. This book also illustrates that a dynamic

  6. Adaptative synchronization in multi-output fractional-order complex dynamical networks and secure communications

    Science.gov (United States)

    Mata-Machuca, Juan L.; Aguilar-López, Ricardo

    2018-01-01

    This work deals with the adaptative synchronization of complex dynamical networks with fractional-order nodes and its application in secure communications employing chaotic parameter modulation. The complex network is composed of multiple fractional-order systems with mismatch parameters and the coupling functions are given to realize the network synchronization. We introduce a fractional algebraic synchronizability condition (FASC) and a fractional algebraic identifiability condition (FAIC) which are used to know if the synchronization and parameters estimation problems can be solved. To overcome these problems, an adaptative synchronization methodology is designed; the strategy consists in proposing multiple receiver systems which tend to follow asymptotically the uncertain transmitters systems. The coupling functions and parameters of the receiver systems are adjusted continually according to a convenient sigmoid-like adaptative controller (SLAC), until the measurable output errors converge to zero, hence, synchronization between transmitter and receivers is achieved and message signals are recovered. Indeed, the stability analysis of the synchronization error is based on the fractional Lyapunov direct method. Finally, numerical results corroborate the satisfactory performance of the proposed scheme by means of the synchronization of a complex network consisting of several fractional-order unified chaotic systems.

  7. Using VO Concept for Managing Dynamic Security Associations

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; de Laat, C.T.A.M.

    2006-01-01

    This research paper presents results of the analysis how the Virtual Organisation (VO) concept can be used for managing dynamic security associations in collaborative applications and for complex resource provisioning. The paper provides an overview of the current practice in VO management at the

  8. Modeling and complexity of stochastic interacting Lévy type financial price dynamics

    Science.gov (United States)

    Wang, Yiduan; Zheng, Shenzhou; Zhang, Wei; Wang, Jun; Wang, Guochao

    2018-06-01

    In attempt to reproduce and investigate nonlinear dynamics of security markets, a novel nonlinear random interacting price dynamics, which is considered as a Lévy type process, is developed and investigated by the combination of lattice oriented percolation and Potts dynamics, which concerns with the instinctive random fluctuation and the fluctuation caused by the spread of the investors' trading attitudes, respectively. To better understand the fluctuation complexity properties of the proposed model, the complexity analyses of random logarithmic price return and corresponding volatility series are preformed, including power-law distribution, Lempel-Ziv complexity and fractional sample entropy. In order to verify the rationality of the proposed model, the corresponding studies of actual security market datasets are also implemented for comparison. The empirical results reveal that this financial price model can reproduce some important complexity features of actual security markets to some extent. The complexity of returns decreases with the increase of parameters γ1 and β respectively, furthermore, the volatility series exhibit lower complexity than the return series

  9. Nonlinear stochastic interacting dynamics and complexity of financial gasket fractal-like lattice percolation

    Science.gov (United States)

    Zhang, Wei; Wang, Jun

    2018-05-01

    A novel nonlinear stochastic interacting price dynamics is proposed and investigated by the bond percolation on Sierpinski gasket fractal-like lattice, aim to make a new approach to reproduce and study the complexity dynamics of real security markets. Fractal-like lattices correspond to finite graphs with vertices and edges, which are similar to fractals, and Sierpinski gasket is a well-known example of fractals. Fractional ordinal array entropy and fractional ordinal array complexity are introduced to analyze the complexity behaviors of financial signals. To deeper comprehend the fluctuation characteristics of the stochastic price evolution, the complexity analysis of random logarithmic returns and volatility are preformed, including power-law distribution, fractional sample entropy and fractional ordinal array complexity. For further verifying the rationality and validity of the developed stochastic price evolution, the actual security market dataset are also studied with the same statistical methods for comparison. The empirical results show that this stochastic price dynamics can reconstruct complexity behaviors of the actual security markets to some extent.

  10. The complexity of an investment competition dynamical model with imperfect information in a security market

    International Nuclear Information System (INIS)

    Xin Baogui; Ma Junhai; Gao Qin

    2009-01-01

    We present a nonlinear discrete dynamical model of investment competition with imperfect information for N heterogeneous oligopolists in a security market. In this paper, our focus is on a given three-dimensional model which exhibits highly rich dynamical behaviors. Based on Wen's Hopf bifurcation criterion [Wen GL. Criterion to identify Hopf bifurcations in maps of arbitrary dimension. Phys Rev E 2005;72:026201-3; Wen GL, Xu DL, Han X. On creation of Hopf bifurcations in discrete-time nonlinear systems. Chaos 2002;12(2):350-5] and Kuznetsov's normal form theory [Kuznetsov YA. Elements of applied bifurcation theory. New York: Springer-Verlag; 1998. p. 125-37], we study the model's stability, criterion and direction of Neimark-Sacker bifurcation. Moreover, we numerically simulate a complexity evolution route: fixed point, closed invariant curve, double closed invariant curves, fourfold closed invariant curves, strange attractor, period-3 closed invariant curve, period-3 2-tours, period-4 closed invariant curve, period-4 2-tours.

  11. Improving the Complexity of the Lorenz Dynamics

    Directory of Open Access Journals (Sweden)

    María Pilar Mareca

    2017-01-01

    Full Text Available A new four-dimensional, hyperchaotic dynamic system, based on Lorenz dynamics, is presented. Besides, the most representative dynamics which may be found in this new system are located in the phase space and are analyzed here. The new system is especially designed to improve the complexity of Lorenz dynamics, which, despite being a paradigm to understand the chaotic dissipative flows, is a very simple example and shows great vulnerability when used in secure communications. Here, we demonstrate the vulnerability of the Lorenz system in a general way. The proposed 4D system increases the complexity of the Lorenz dynamics. The trajectories of the novel system include structures going from chaos to hyperchaos and chaotic-transient solutions. The symmetry and the stability of the proposed system are also studied. First return maps, Poincaré sections, and bifurcation diagrams allow characterizing the global system behavior and locating some coexisting structures. Numerical results about the first return maps, Poincaré cross sections, Lyapunov spectrum, and Kaplan-Yorke dimension demonstrate the complexity of the proposed equations.

  12. Effective software-oriented cryptosystem in complex PC security software

    Directory of Open Access Journals (Sweden)

    A. Moldovyan

    1995-02-01

    Full Text Available To ensure high encryption rate and good data security, an organization of an encipherement program in the form of two modules was proposed. The first module is used for customizing the second one, the latter being the resident of the program, which maintains all application calls about encryption procedures. This approach is shown to be perspective for the elaboration of the cryptosystems with indefinite cryptalgorithm. Several typical software-oriented cryptoschemes are considered. The developed cryptomodules have high encipherement rate (2-10 Mbps for Intel 386 and secure high information protection level Organization of a new computer security software complex COBRA is considered. High enciphering rate and good data protection are provided by the resident cryptomodule using less than 1 kbyte of the main memory and working in dynamic encryption mode.

  13. An energy security management model using quality function deployment and system dynamics

    International Nuclear Information System (INIS)

    Shin, Juneseuk; Shin, Wan-Seon; Lee, Changyong

    2013-01-01

    An energy security management model using quality function deployment (QFD) and system dynamics (SD) is suggested for application in public policymaking in developing economies. Through QFD, experts are guided toward identifying key energy security components, including indicators and policies, and in making these components consistent, focused, and customized for a particular country. Using these components as inputs, we construct an intermediate complex system dynamics model with a minimal number of crucial interactions. Key policies are simulated and evaluated in terms of the improvement of key indicators. Even with little data, our approach provides a coherent, useful, and customized energy security management model to help policymakers more effectively manage national energy security. To demonstrate its advantages, the model is applied to the Korean gas sector as an example. - Highlights: ► We suggest an energy security management model for developing economies. ► We identify a consistent set of key components, indicators and policies by using QFD. ► A coherent and practical system dynamics model based on QFD's output is constructed. ► The model is applied to the Korean gas sector as an example

  14. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  15. Framework for optimal power flow incorporating dynamic system security

    International Nuclear Information System (INIS)

    El-Kady, M.A.; Owayedh, M.S.

    2006-01-01

    This paper introduces a novel framework and methodologies which are capable of tackling the complex issue of power system economy versus security in a practical and effective manner. At heart of achieving such a challenging and far-reaching objective is the incorporation of the Dyanamic Security Assessment (DSA) into production optimization techniques using the Transient Energy Function (TEF) method. In addition, and in parallel with the already well established concept of the system security, two new concepts pertaining to power system performance will be introduced in this paper, namely the concept of system dynamic susceptibility, which measures the level of systems weakness to a particular contingency and the concept of system consequent restorability, which measures the extent of contingency severity in terms of the required subsequent system restoration work should a particular contingency occur. (author)

  16. Complex networks under dynamic repair model

    Science.gov (United States)

    Chaoqi, Fu; Ying, Wang; Kun, Zhao; Yangjun, Gao

    2018-01-01

    Invulnerability is not the only factor of importance when considering complex networks' security. It is also critical to have an effective and reasonable repair strategy. Existing research on network repair is confined to the static model. The dynamic model makes better use of the redundant capacity of repaired nodes and repairs the damaged network more efficiently than the static model; however, the dynamic repair model is complex and polytropic. In this paper, we construct a dynamic repair model and systematically describe the energy-transfer relationships between nodes in the repair process of the failure network. Nodes are divided into three types, corresponding to three structures. We find that the strong coupling structure is responsible for secondary failure of the repaired nodes and propose an algorithm that can select the most suitable targets (nodes or links) to repair the failure network with minimal cost. Two types of repair strategies are identified, with different effects under the two energy-transfer rules. The research results enable a more flexible approach to network repair.

  17. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  18. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    Science.gov (United States)

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  19. Understanding complexities in coupled dynamics of human-water and food security

    Science.gov (United States)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  20. An Encryption Key for Secure Authentication: The Dynamic Solution

    Directory of Open Access Journals (Sweden)

    Zubayr Khalid

    2017-06-01

    Full Text Available In modern day technology, the Information Society is at risk. Passwords are a multi-user computer systems usual first line of defence against intrusion. A password may be textual with any combination of alphanumeric characters or biometric or 3-D. But no authentication protocol is fully secured against todays hackers as all of them are Static in type. Dynamic authentication protocol is still a theoretical concept. In this paper, we are focusing on a concept of authentication technique which is actually dynamic in genre, i.e. the password here will change in t time (where t is as small as possible. This technique comprises of both hardware and software part. In this paper, we have covered the idea of generating an efficient algorithm that can work as the final in the Dynamic Password Authentication system. We have used standard deviation within statistics to generalize the possible password which is further secured by Feistel Block Cipher and Advanced Encryption Standard technique (AES, leading and following the said mathematics respectively. In order to allow the system to create variable password in the least time interval possible, we must make sure our process is not much complex.

  1. Physical security technologies for weapons complex reconfiguration facilities

    International Nuclear Information System (INIS)

    Jaeger, C.D.

    1994-01-01

    Sandia National Laboratories was a member of the Weapons Complex Reconfiguration (WCR) Safeguards and Security (S ampersand S) team providing assistance to the Department of Energy's (DOE) Office of Weapons Complex Reconfiguration. The physical security systems in the new and upgraded facilities being considered for the WCR had to meet DOE orders and other requirements set forth in the WCR Programmatic Design Criteria (PDC), incorporate the latest physical security technologies using proven state-of-the-art systems and meet fundamental security principles. The outcome was to avoid costly retrofits and provide effective and comprehensive protection against current and projected threats with minimal impact on operations, costs and schedule. Physical security requirements for WCR facilities include: (1) reducing S ampersand S life-cycle costs, (2) where feasible automating S ampersand S functions to minimize operational costs, access to critical assets and exposure of people to hazardous environments, (3) increasing the amount of delay to outsider adversary attack, (4) compartmentalizing the facility to minimize the number of personnel requiring access to critical areas and (5) having reliable and maintainable systems. To be most effective against threats physical security must be integrated with facility operations, safety and other S ampersand S activities, such as material control and accountability, nuclear measurements and computer and information security. This paper will discuss the S ampersand S issues, requirements, technology opportunities and needs. Physical security technologies and systems considered in the design effort of the Weapons Complex Reconfiguration facilities will be reviewed

  2. Security Inequalities in North America: Reassessing Regional Security Complex Theory

    Directory of Open Access Journals (Sweden)

    Richard Kilroy

    2017-12-01

    Full Text Available This article re-evaluates earlier work done by the authors on Regional Security Complex Theory (RSCT in North America, using sectoral analysis initially developed by Buzan and Waever, but also adding the variables of institutions, identity, and interests. These variables are assessed qualitatively in the contemporary context on how they currently impress upon the process of securitization within sectoral relations between Canada, Mexico, and the United States. The article reviews the movement from bilateral security relations between these states to the development of a trilateral response to regional security challenges post- 9/11. It further addresses the present period and what appears to be a security process derailed by recent political changes and security inequalities, heightened by the election of Donald Trump in 2016. The article argues that while these three states initially evinced a convergence of regional security interests after 9/11, which did create new institutional responses, under the current conditions, divergence in political interests and security inequalities have reduced the explanatory power of RSCT in North America. Relations between states in North American are becoming less characterized by the role of institutions and interests and more by identity politics in the region.

  3. Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis

    Science.gov (United States)

    Mesjasz, Czeslaw

    The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.

  4. Methods for Calculating Frequency of Maintenance of Complex Information Security System Based on Dynamics of Its Reliability

    Science.gov (United States)

    Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.

    2017-11-01

    This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.

  5. Complexity and Dynamical Depth

    Directory of Open Access Journals (Sweden)

    Terrence Deacon

    2014-07-01

    Full Text Available We argue that a critical difference distinguishing machines from organisms and computers from brains is not complexity in a structural sense, but a difference in dynamical organization that is not well accounted for by current complexity measures. We propose a measure of the complexity of a system that is largely orthogonal to computational, information theoretic, or thermodynamic conceptions of structural complexity. What we call a system’s dynamical depth is a separate dimension of system complexity that measures the degree to which it exhibits discrete levels of nonlinear dynamical organization in which successive levels are distinguished by local entropy reduction and constraint generation. A system with greater dynamical depth than another consists of a greater number of such nested dynamical levels. Thus, a mechanical or linear thermodynamic system has less dynamical depth than an inorganic self-organized system, which has less dynamical depth than a living system. Including an assessment of dynamical depth can provide a more precise and systematic account of the fundamental difference between inorganic systems (low dynamical depth and living systems (high dynamical depth, irrespective of the number of their parts and the causal relations between them.

  6. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  7. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  8. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  9. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  10. Analysis and control of complex dynamical systems robust bifurcation, dynamic attractors, and network complexity

    CERN Document Server

    Imura, Jun-ichi; Ueta, Tetsushi

    2015-01-01

    This book is the first to report on theoretical breakthroughs on control of complex dynamical systems developed by collaborative researchers in the two fields of dynamical systems theory and control theory. As well, its basic point of view is of three kinds of complexity: bifurcation phenomena subject to model uncertainty, complex behavior including periodic/quasi-periodic orbits as well as chaotic orbits, and network complexity emerging from dynamical interactions between subsystems. Analysis and Control of Complex Dynamical Systems offers a valuable resource for mathematicians, physicists, and biophysicists, as well as for researchers in nonlinear science and control engineering, allowing them to develop a better fundamental understanding of the analysis and control synthesis of such complex systems.

  11. Geographic/conceptual delimitation of the «Southern Mediterranean». A Regional Security Complex?

    Directory of Open Access Journals (Sweden)

    Alberto Priego Moreno

    2016-07-01

    Full Text Available This article seeks to analyse how the Mediterranean Area has evolved after the changes occurred with the so-called Arab Springs. The main idea is to focus on the Southern Mediterranean as a dynamic space that expands itself as a result of its internal transformations and subsequent external changes caused by the Arab Spring. We will use the IR theory of the Regional Security Complex as it is considered as the most adaptable to this changing reality.

  12. Security Analysis of Dynamic SDN Architectures Based on Game Theory

    Directory of Open Access Journals (Sweden)

    Chao Qi

    2018-01-01

    Full Text Available Security evaluation of SDN architectures is of critical importance to develop robust systems and address attacks. Focused on a novel-proposed dynamic SDN framework, a game-theoretic model is presented to analyze its security performance. This model can represent several kinds of players’ information, simulate approximate attack scenarios, and quantitatively estimate systems’ reliability. And we explore several typical game instances defined by system’s capability, players’ objects, and strategies. Experimental results illustrate that the system’s detection capability is not a decisive element to security enhancement as introduction of dynamism and redundancy into SDN can significantly improve security gain and compensate for its detection weakness. Moreover, we observe a range of common strategic actions across environmental conditions. And analysis reveals diverse defense mechanisms adopted in dynamic systems have different effect on security improvement. Besides, the existence of equilibrium in particular situations further proves the novel structure’s feasibility, flexibility, and its persistent ability against long-term attacks.

  13. Analysis of Social Network Dynamics with Models from the Theory of Complex Adaptive Systems

    OpenAIRE

    Lymperopoulos , Ilias; Lekakos , George

    2013-01-01

    Part 4: Protocols, Regulation and Social Networking; International audience; The understanding and modeling of social dynamics in a complex and unpredictable world, emerges as a research target of particular importance. Success in this direction can yield valuable knowledge as to how social phenomena form and evolve in varying socioeconomic contexts comprising economic crises, societal disasters, cultural differences and security threats among others. The study of social dynamics occurring in...

  14. An empirical application of regional security complex theory on eastern partnership region

    Directory of Open Access Journals (Sweden)

    Ludmila STUPARU

    2015-12-01

    Full Text Available Eastern Partnership (EaP is a very dynamic region. If a year ago the EaP was seen as an authentic and vibrant „laboratory” of democracy building, overcoming the remains of the totalitarian state and putting the basis of a free and pluralist society, nowadays the Eastern Partnership is seen as an „out-dated” approach of the EU. However, Eastern Partnership is visible on European political arena and the big powers (USA, Russia and the EU pay attention more and more to the evolution of EaP countries. Moreover, it seems to be a confrontation between Russia and Western powers regarding the political and geopolitical orientation of EaP countries. Kremlin tries actively to stop the efforts of the EaP to close to the EU and on the other side, the EU as well as the USA encourage EaP countries to implement reforms in order to build their democracy. This paper aims to analyse the Eastern Partnership in terms of security complex, trying to argue that Eastern Partnership countries at this phase don’t form a Regional Security Complex and the EU and USA should rethink its approach towards this region.

  15. A Dynamic Framework for Water Security

    Science.gov (United States)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  16. Nonlinear dynamics and complexity

    CERN Document Server

    Luo, Albert; Fu, Xilin

    2014-01-01

    This important collection presents recent advances in nonlinear dynamics including analytical solutions, chaos in Hamiltonian systems, time-delay, uncertainty, and bio-network dynamics. Nonlinear Dynamics and Complexity equips readers to appreciate this increasingly main-stream approach to understanding complex phenomena in nonlinear systems as they are examined in a broad array of disciplines. The book facilitates a better understanding of the mechanisms and phenomena in nonlinear dynamics and develops the corresponding mathematical theory to apply nonlinear design to practical engineering.

  17. Y‑12 National Security Complex

    Data.gov (United States)

    Federal Laboratory Consortium — The Y‑12 National Security Complex is a premier manufacturing facility dedicated to making our nation and the world a safer place and plays a vital role in the...

  18. MANAGEMENT OF RESOURCES IN DYNAMICALLY CHANGING SECURITY ENVRIONMENT

    Directory of Open Access Journals (Sweden)

    Sevdalina Dimitrova

    2014-09-01

    Full Text Available The monograph recommends integration between science and practice, experts from national bodies and scientific research potential of academic community of military universities in the field of management of resources of security and defence in accordance to the challenges in security environment caused by its dynamic and often unpredictable changes.

  19. On the Road to Holistic Decision Making in Adaptive Security

    Directory of Open Access Journals (Sweden)

    Mahsa Emami-Taba

    2013-08-01

    Full Text Available Security is a critical concern in today's software systems. Besides the interconnectivity and dynamic nature of network systems, the increasing complexity in modern software systems amplifies the complexity of IT security. This fact leaves attackers one step ahead in exploiting vulnerabilities and introducing new cyberattacks. The demand for new methodologies in addressing cybersecurity is emphasized by both private and national corporations. A practical solution to dynamically manage the high complexity of IT security is adaptive security, which facilitates analysis of the system's behaviour and hence the prevention of malicious attacks in complex systems. Systems that feature adaptive security detect and mitigate security threats at runtime with little or no administrator involvement. In these systems, decisions at runtime are balanced according to quality and performance goals. This article describes the necessity of holistic decision making in such systems and paves the road to future research.

  20. Complexity of food preparation and food security status in low-income young women.

    Science.gov (United States)

    Engler-Stringer, Rachel; Stringer, Bernadette; Haines, Ted

    2011-01-01

    This study was conducted to explore whether preparing more complex meals was associated with higher food security status. This mixed-methods, community-based study involved the use of semistructured interviews to examine the cooking practices of a group of young, low-income women in Montreal. Fifty participants aged 18 to 35 were recruited at 10 locations in five low-income neighbourhoods. Food security status was the main outcome measure and the main exposure variable, "complex food preparation," combined the preparation of three specific food types (soups, sauces, and baked goods) using basic ingredients. Low-income women preparing a variety of meals using basic ingredients at least three times a week were more than twice as likely to be food secure as were women preparing more complex meals less frequently. Women who prepared more complex meals more frequently had higher food security. Whether this means that preparing more complex foods results in greater food security remains unclear, as this was an exploratory study.

  1. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  2. Spatio-temporal dynamics of security investments in an interdependent risk environment

    Science.gov (United States)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  3. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  4. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  5. Secure Group Communications for Large Dynamic Multicast Group

    Institute of Scientific and Technical Information of China (English)

    Liu Jing; Zhou Mingtian

    2003-01-01

    As the major problem in multicast security, the group key management has been the focus of research But few results are satisfactory. In this paper, the problems of group key management and access control for large dynamic multicast group have been researched and a solution based on SubGroup Secure Controllers (SGSCs) is presented, which solves many problems in IOLUS system and WGL scheme.

  6. Two Stage Secure Dynamic Load Balancing Architecture for SIP Server Clusters

    Directory of Open Access Journals (Sweden)

    G. Vennila

    2014-08-01

    Full Text Available Session Initiation Protocol (SIP is a signaling protocol emerged with an aim to enhance the IP network capabilities in terms of complex service provision. SIP server scalability with load balancing has a greater concern due to the dramatic increase in SIP service demand. Load balancing of session method (request/response and security measures optimizes the SIP server to regulate of network traffic in Voice over Internet Protocol (VoIP. Establishing a honeywall prior to the load balancer significantly reduces SIP traffic and drops inbound malicious load. In this paper, we propose Active Least Call in SIP Server (ALC_Server algorithm fulfills objectives like congestion avoidance, improved response times, throughput, resource utilization, reducing server faults, scalability and protection of SIP call from DoS attacks. From the test bed, the proposed two-tier architecture demonstrates that the ALC_Server method dynamically controls the overload and provides robust security, uniform load distribution for SIP servers.

  7. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    OpenAIRE

    Anatoliy Petrovich Sterkhov

    2015-01-01

    From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identi...

  8. Early days in complex dynamics a history of complex dynamics in one variable during 1906-1942

    CERN Document Server

    Alexander, Daniel S; Rosa, Alessandro

    2011-01-01

    The theory of complex dynamics, whose roots lie in 19th-century studies of the iteration of complex function conducted by Kœnigs, Schröder, and others, flourished remarkably during the first half of the 20th century, when many of the central ideas and techniques of the subject developed. This book by Alexander, Iavernaro, and Rosa paints a robust picture of the field of complex dynamics between 1906 and 1942 through detailed discussions of the work of Fatou, Julia, Siegel, and several others. A recurrent theme of the authors' treatment is the center problem in complex dynamics. They present its complete history during this period and, in so doing, bring out analogies between complex dynamics and the study of differential equations, in particular, the problem of stability in Hamiltonian systems. Among these analogies are the use of iteration and problems involving small divisors which the authors examine in the work of Poincaré and others, linking them to complex dynamics, principally via the work of Samuel...

  9. Management of complex dynamical systems

    Science.gov (United States)

    MacKay, R. S.

    2018-02-01

    Complex dynamical systems are systems with many interdependent components which evolve in time. One might wish to control their trajectories, but a more practical alternative is to control just their statistical behaviour. In many contexts this would be both sufficient and a more realistic goal, e.g. climate and socio-economic systems. I refer to it as ‘management’ of complex dynamical systems. In this paper, some mathematics for management of complex dynamical systems is developed in the weakly dependent regime, and questions are posed for the strongly dependent regime.

  10. a Statistical Dynamic Approach to Structural Evolution of Complex Capital Market Systems

    Science.gov (United States)

    Shao, Xiao; Chai, Li H.

    As an important part of modern financial systems, capital market has played a crucial role on diverse social resource allocations and economical exchanges. Beyond traditional models and/or theories based on neoclassical economics, considering capital markets as typical complex open systems, this paper attempts to develop a new approach to overcome some shortcomings of the available researches. By defining the generalized entropy of capital market systems, a theoretical model and nonlinear dynamic equation on the operations of capital market are proposed from statistical dynamic perspectives. The US security market from 1995 to 2001 is then simulated and analyzed as a typical case. Some instructive results are discussed and summarized.

  11. Sparse dynamical Boltzmann machine for reconstructing complex networks with binary dynamics

    Science.gov (United States)

    Chen, Yu-Zhong; Lai, Ying-Cheng

    2018-03-01

    Revealing the structure and dynamics of complex networked systems from observed data is a problem of current interest. Is it possible to develop a completely data-driven framework to decipher the network structure and different types of dynamical processes on complex networks? We develop a model named sparse dynamical Boltzmann machine (SDBM) as a structural estimator for complex networks that host binary dynamical processes. The SDBM attains its topology according to that of the original system and is capable of simulating the original binary dynamical process. We develop a fully automated method based on compressive sensing and a clustering algorithm to construct the SDBM. We demonstrate, for a variety of representative dynamical processes on model and real world complex networks, that the equivalent SDBM can recover the network structure of the original system and simulates its dynamical behavior with high precision.

  12. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  13. Secure physical layer using dynamic permutations in cognitive OFDMA systems

    DEFF Research Database (Denmark)

    Meucci, F.; Wardana, Satya Ardhy; Prasad, Neeli R.

    2009-01-01

    This paper proposes a novel lightweight mechanism for a secure Physical (PHY) layer in Cognitive Radio Network (CRN) using Orthogonal Frequency Division Multiplexing (OFDM). User's data symbols are mapped over the physical subcarriers with a permutation formula. The PHY layer is secured...... with a random and dynamic subcarrier permutation which is based on a single pre-shared information and depends on Dynamic Spectrum Access (DSA). The dynamic subcarrier permutation is varying over time, geographical location and environment status, resulting in a very robust protection that ensures...... confidentiality. The method is shown to be effective also for existing non-cognitive systems. The proposed mechanism is effective against eavesdropping even if the eavesdropper adopts a long-time patterns analysis, thus protecting cryptography techniques of higher layers. The correlation properties...

  14. A framework for modelling the complexities of food and water security under globalisation

    Science.gov (United States)

    Dermody, Brian J.; Sivapalan, Murugesu; Stehfest, Elke; van Vuuren, Detlef P.; Wassen, Martin J.; Bierkens, Marc F. P.; Dekker, Stefan C.

    2018-01-01

    We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  15. Complexity in Dynamical Systems

    Science.gov (United States)

    Moore, Cristopher David

    The study of chaos has shown us that deterministic systems can have a kind of unpredictability, based on a limited knowledge of their initial conditions; after a finite time, the motion appears essentially random. This observation has inspired a general interest in the subject of unpredictability, and more generally, complexity; how can we characterize how "complex" a dynamical system is?. In this thesis, we attempt to answer this question with a paradigm of complexity that comes from computer science, we extract sets of symbol sequences, or languages, from a dynamical system using standard methods of symbolic dynamics; we then ask what kinds of grammars or automata are needed a generate these languages. This places them in the Chomsky heirarchy, which in turn tells us something about how subtle and complex the dynamical system's behavior is. This gives us insight into the question of unpredictability, since these automata can also be thought of as computers attempting to predict the system. In the culmination of the thesis, we find a class of smooth, two-dimensional maps which are equivalent to the highest class in the Chomsky heirarchy, the turning machine; they are capable of universal computation. Therefore, these systems possess a kind of unpredictability qualitatively different from the usual "chaos": even if the initial conditions are known exactly, questions about the system's long-term dynamics are undecidable. No algorithm exists to answer them. Although this kind of unpredictability has been discussed in the context of distributed, many-degree-of -freedom systems (for instance, cellular automata) we believe this is the first example of such phenomena in a smooth, finite-degree-of-freedom system.

  16. Symbolic dynamics and description of complexity

    International Nuclear Information System (INIS)

    Hao Bailin.

    1992-10-01

    Symbolic dynamics provides a general framework to describe complexity of dynamical behaviour. After a discussion of the state of the filed special emphasis will be made on the role of transfer matrix (the Stefan matrix) both in deriving the grammar from known symbolic dynamics and in extracting the rules from experimental data. The block structure of the Stefan matrix may serve as another indicator of complexity of the associated dynamics. (author). 33 refs, 6 figs

  17. Dynamics in Complex Coacervates

    Science.gov (United States)

    Perry, Sarah

    Understanding the dynamics of a material provides detailed information about the self-assembly, structure, and intermolecular interactions present in a material. While rheological methods have long been used for the characterization of complex coacervate-based materials, it remains a challenge to predict the dynamics for a new system of materials. Furthermore, most work reports only qualitative trends exist as to how parameters such as charge stoichiometry, ionic strength, and polymer chain length impact self-assembly and material dynamics, and there is little information on the effects of polymer architecture or the organization of charges within a polymer. We seek to link thermodynamic studies of coacervation phase behavior with material dynamics through a carefully-controlled, systematic study of coacervate linear viscoelasticity for different polymer chemistries. We couple various methods of characterizing the dynamics of polymer-based complex coacervates, including the time-salt superposition methods developed first by Spruijt and coworkers to establish a more mechanistic strategy for comparing the material dynamics and linear viscoelasticity of different systems. Acknowledgment is made to the Donors of the American Chemical Society Petroleum Research Fund for support of this research.

  18. Dynamic complexity: plant receptor complexes at the plasma membrane.

    Science.gov (United States)

    Burkart, Rebecca C; Stahl, Yvonne

    2017-12-01

    Plant receptor complexes at the cell surface perceive many different external and internal signalling molecules and relay these signals into the cell to regulate development, growth and immunity. Recent progress in the analyses of receptor complexes using different live cell imaging approaches have shown that receptor complex formation and composition are dynamic and take place at specific microdomains at the plasma membrane. In this review we focus on three prominent examples of Arabidopsis thaliana receptor complexes and how their dynamic spatio-temporal distribution at the PM has been studied recently. We will elaborate on the newly emerging concept of plasma membrane microdomains as potential hubs for specific receptor complex assembly and signalling outputs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  20. Complex dynamics

    CERN Document Server

    Carleson, Lennart

    1993-01-01

    Complex dynamics is today very much a focus of interest. Though several fine expository articles were available, by P. Blanchard and by M. Yu. Lyubich in particular, until recently there was no single source where students could find the material with proofs. For anyone in our position, gathering and organizing the material required a great deal of work going through preprints and papers and in some cases even finding a proof. We hope that the results of our efforts will be of help to others who plan to learn about complex dynamics and perhaps even lecture. Meanwhile books in the field a. re beginning to appear. The Stony Brook course notes of J. Milnor were particularly welcome and useful. Still we hope that our special emphasis on the analytic side will satisfy a need. This book is a revised and expanded version of notes based on lectures of the first author at UCLA over several \\Vinter Quarters, particularly 1986 and 1990. We owe Chris Bishop a great deal of gratitude for supervising the production of cour...

  1. Problems of Ensuring Complex Business Security in the Conditions of Modern Globalization

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Sterkhov

    2015-12-01

    Full Text Available From the viewpoint of ensuring complex business security, the relevance of the present work is associated with the rationale of multilevel hierarchical approach to the classification of security threats in the age of globalization. The specificity of the threats specific to one or another level of the economy, helps to better understand and consequently to build an effective system of ensuring complex business security. For each of the nine hierarchical levels of the economy the author identifies the main threats to the business, as well as the objects and subjects of this study. It is noted that the performance of the business in the form of a complex hierarchical system depends on the principle of specification. The author gives examples of the use of the basic principles of specification. It is noted that the decomposition of the economic system from the viewpoint of its hierarchical nature is of great importance not only to the distribution of the goals and objectives of security of business levels of the system, but their subordination corresponding to each level. The result is the development of specific recommendations and elaboration of the main directions to ensure complex business security for mega-, macro-, micro-, mini-, nano - and mesoeconomic levels. Although the priority of action in multi-level hierarchical system is directed from the upper to the lower levels, the success of the system as a whole depends on the behavior of all system components. It is stated that the interaction with the environment in business occurs mainly in the lower levels of the hierarchy. The quality system of ensuring complex business security which deals with hierarchical positions, will depend not so much on top-level elements, but on response to intervention on the part of lower level, more precisely from their total effect. In other words, the quality of the system of integrated safety management business provides organized feedbacks in the system.

  2. Complex dynamical invariants for two-dimensional complex potentials

    Indian Academy of Sciences (India)

    Abstract. Complex dynamical invariants are searched out for two-dimensional complex poten- tials using rationalization method within the framework of an extended complex phase space characterized by x = x1 + ip3, y = x2 + ip4, px = p1 + ix3, py = p2 + ix4. It is found that the cubic oscillator and shifted harmonic oscillator ...

  3. The Dynamics of the Option-Adjusted Spread of Brady Bond Securities

    Directory of Open Access Journals (Sweden)

    Luiz Otavio Calôba

    2003-06-01

    Full Text Available Brady bond securities represent a substantial fraction of emerging markets countries internationally tradable sovereign debt. The credit risk spread above and beyond the U.S. treasury curve for these securities is usually large in size and volatility. Moreover, most Brady bonds carry embedded options that lead to the existence of an Option-Adjusted Spread, OAS, which increase their risk profiles. In this paper we present an empirical study of the dynamics of Brady bonds OAS using a heath, Jarrow and Morton term structure pricing model. The dynamics of the spread shows that the proper risk management and pricing of these securities require the consideration of volatility in addition to the magnitude of the sovereign risk spread. That is, the proper risk measure for these securities would be the pair (OAS, OAS Volatility. A study of implied default probabilities is also presented. Our analysis is illustrated with bonds from Brazil, Argentina, Mexico, Poland, Bulgaria and the Philippines.

  4. Dynamic model based on Bayesian method for energy security assessment

    International Nuclear Information System (INIS)

    Augutis, Juozas; Krikštolaitis, Ričardas; Pečiulytė, Sigita; Žutautaitė, Inga

    2015-01-01

    Highlights: • Methodology for dynamic indicator model construction and forecasting of indicators. • Application of dynamic indicator model for energy system development scenarios. • Expert judgement involvement using Bayesian method. - Abstract: The methodology for the dynamic indicator model construction and forecasting of indicators for the assessment of energy security level is presented in this article. An indicator is a special index, which provides numerical values to important factors for the investigated area. In real life, models of different processes take into account various factors that are time-dependent and dependent on each other. Thus, it is advisable to construct a dynamic model in order to describe these dependences. The energy security indicators are used as factors in the dynamic model. Usually, the values of indicators are obtained from statistical data. The developed dynamic model enables to forecast indicators’ variation taking into account changes in system configuration. The energy system development is usually based on a new object construction. Since the parameters of changes of the new system are not exactly known, information about their influences on indicators could not be involved in the model by deterministic methods. Thus, dynamic indicators’ model based on historical data is adjusted by probabilistic model with the influence of new factors on indicators using the Bayesian method

  5. Dynamic Security Assessment of Danish Power System Based on Decision Trees: Today and Tomorrow

    DEFF Research Database (Denmark)

    Rather, Zakir Hussain; Liu, Leo; Chen, Zhe

    2013-01-01

    The research work presented in this paper analyzes the impact of wind energy, phasing out of central power plants and cross border power exchange on dynamic security of Danish Power System. Contingency based decision tree (DT) approach is used to assess the dynamic security of present and future...

  6. Integrating Future Land Use Scenarios to Evaluate the Spatio-Temporal Dynamics of Landscape Ecological Security

    Directory of Open Access Journals (Sweden)

    Yi Lu

    2016-11-01

    Full Text Available Urban ecological security is the basic principle of national ecological security. However, analyses of the spatial and temporal dynamics of ecological security remain limited, especially those that consider different scenarios of urban development. In this study, an integrated method is proposed that combines the Conversion of Land Use and its Effects (CLUE-S model with the Pressure–State–Response (P-S-R framework to assess landscape ecological security (LES in Huangshan City, China under two scenarios. Our results suggest the following conclusions: (1 the spatial and temporal dynamics of ecological security are closely related to the urbanization process; (2 although the average values of landscape ecological security are similar under different scenarios, the areas of relatively high security levels vary considerably; and (3 spatial heterogeneity in ecological security exists between different districts and counties, and the city center and its vicinity may face relatively serious declines in ecological security in the future. Overall, the proposed method not only illustrates the spatio-temporal dynamics of landscape ecological security under different scenarios but also reveals the anthropogenic effects on ecosystems by differentiating between causes, effects, and human responses at the landscape scale. This information is of great significance to decision-makers for future urban planning and management.

  7. A framework for modelling the complexities of food and water security under globalisation

    Directory of Open Access Journals (Sweden)

    B. J. Dermody

    2018-01-01

    Full Text Available We present a new framework for modelling the complexities of food and water security under globalisation. The framework sets out a method to capture regional and sectoral interdependencies and cross-scale feedbacks within the global food system that contribute to emergent water use patterns. The framework integrates aspects of existing models and approaches in the fields of hydrology and integrated assessment modelling. The core of the framework is a multi-agent network of city agents connected by infrastructural trade networks. Agents receive socio-economic and environmental constraint information from integrated assessment models and hydrological models respectively and simulate complex, socio-environmental dynamics that operate within those constraints. The emergent changes in food and water resources are aggregated and fed back to the original models with minimal modification of the structure of those models. It is our conviction that the framework presented can form the basis for a new wave of decision tools that capture complex socio-environmental change within our globalised world. In doing so they will contribute to illuminating pathways towards a sustainable future for humans, ecosystems and the water they share.

  8. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    NARCIS (Netherlands)

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  9. Methodology for evaluation of economic security of industrial enterprises

    OpenAIRE

    Kopytko Marta Ivanovna

    2014-01-01

    This paper investigates the features of evaluation of ensuring economic security of industrial enterprises and the algorithm of complex evaluation of the economic security of industrial enterprises over time and the system of criteria and their limit values ​​and the dynamics of change to determine the level of economic security industrial enterprise in terms of its components.

  10. Nonlinear and Complex Dynamics in Economics

    OpenAIRE

    William Barnett; Apostolos Serletis; Demitre Serletis

    2012-01-01

    This paper is an up-to-date survey of the state-of-the-art in dynamical systems theory relevant to high levels of dynamical complexity, characterizing chaos and near chaos, as commonly found in the physical sciences. The paper also surveys applications in economics and �finance. This survey does not include bifurcation analyses at lower levels of dynamical complexity, such as Hopf and transcritical bifurcations, which arise closer to the stable region of the parameter space. We discuss the...

  11. Pinning Synchronization of Switched Complex Dynamical Networks

    Directory of Open Access Journals (Sweden)

    Liming Du

    2015-01-01

    Full Text Available Network topology and node dynamics play a key role in forming synchronization of complex networks. Unfortunately there is no effective synchronization criterion for pinning synchronization of complex dynamical networks with switching topology. In this paper, pinning synchronization of complex dynamical networks with switching topology is studied. Two basic problems are considered: one is pinning synchronization of switched complex networks under arbitrary switching; the other is pinning synchronization of switched complex networks by design of switching when synchronization cannot achieved by using any individual connection topology alone. For the two problems, common Lyapunov function method and single Lyapunov function method are used respectively, some global synchronization criteria are proposed and the designed switching law is given. Finally, simulation results verify the validity of the results.

  12. Securing Digital Audio using Complex Quadratic Map

    Science.gov (United States)

    Suryadi, MT; Satria Gunawan, Tjandra; Satria, Yudi

    2018-03-01

    In This digital era, exchanging data are common and easy to do, therefore it is vulnerable to be attacked and manipulated from unauthorized parties. One data type that is vulnerable to attack is digital audio. So, we need data securing method that is not vulnerable and fast. One of the methods that match all of those criteria is securing the data using chaos function. Chaos function that is used in this research is complex quadratic map (CQM). There are some parameter value that causing the key stream that is generated by CQM function to pass all 15 NIST test, this means that the key stream that is generated using this CQM is proven to be random. In addition, samples of encrypted digital sound when tested using goodness of fit test are proven to be uniform, so securing digital audio using this method is not vulnerable to frequency analysis attack. The key space is very huge about 8.1×l031 possible keys and the key sensitivity is very small about 10-10, therefore this method is also not vulnerable against brute-force attack. And finally, the processing speed for both encryption and decryption process on average about 450 times faster that its digital audio duration.

  13. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  14. Controlling Complex Systems and Developing Dynamic Technology

    Science.gov (United States)

    Avizienis, Audrius Victor

    In complex systems, control and understanding become intertwined. Following Ilya Prigogine, we define complex systems as having control parameters which mediate transitions between distinct modes of dynamical behavior. From this perspective, determining the nature of control parameters and demonstrating the associated dynamical phase transitions are practically equivalent and fundamental to engaging with complexity. In the first part of this work, a control parameter is determined for a non-equilibrium electrochemical system by studying a transition in the morphology of structures produced by an electroless deposition reaction. Specifically, changing the size of copper posts used as the substrate for growing metallic silver structures by the reduction of Ag+ from solution under diffusion-limited reaction conditions causes a dynamical phase transition in the crystal growth process. For Cu posts with edge lengths on the order of one micron, local forces promoting anisotropic growth predominate, and the reaction produces interconnected networks of Ag nanowires. As the post size is increased above 10 microns, the local interfacial growth reaction dynamics couple with the macroscopic diffusion field, leading to spatially propagating instabilities in the electrochemical potential which induce periodic branching during crystal growth, producing dendritic deposits. This result is interesting both as an example of control and understanding in a complex system, and as a useful combination of top-down lithography with bottom-up electrochemical self-assembly. The second part of this work focuses on the technological development of devices fabricated using this non-equilibrium electrochemical process, towards a goal of integrating a complex network as a dynamic functional component in a neuromorphic computing device. Self-assembled networks of silver nanowires were reacted with sulfur to produce interfacial "atomic switches": silver-silver sulfide junctions, which exhibit

  15. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    Science.gov (United States)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  16. The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Directory of Open Access Journals (Sweden)

    Jeroen Ooms

    2013-11-01

    Full Text Available The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system.

  17. Lattice dynamics and molecular dynamics simulation of complex materials

    International Nuclear Information System (INIS)

    Chaplot, S.L.

    1997-01-01

    In this article we briefly review the lattice dynamics and molecular dynamics simulation techniques, as used for complex ionic and molecular solids, and demonstrate a number of applications through examples of our work. These computational studies, along with experiments, have provided microscopic insight into the structure and dynamics, phase transitions and thermodynamical properties of a variety of materials including fullerene, high temperature superconducting oxides and geological minerals as a function of pressure and temperature. The computational techniques also allow the study of the structures and dynamics associated with disorder, defects, surfaces, interfaces etc. (author)

  18. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  19. A novel sort of adaptive complex synchronizations of two indistinguishable chaotic complex nonlinear models with uncertain parameters and its applications in secure communications

    Science.gov (United States)

    Mahmoud, Emad E.; Abood, Fatimah S.

    In this paper, we will demonstrate the adaptive complex anti-lag synchronization (CALS) of two indistinguishable complex chaotic nonlinear systems with the parameters which are uncertain. The significance of CALS is not advised well in the literature yet. The CALS contains or consolidate two sorts of synchronizations (anti-lag synchronization ALS and lag synchronization LS). The state variable of the master system synchronizes with an alternate state variable of the slave system. Depending on the function of Lyapunov, a plan is orchestrated to achieve CALS of chaotic attractors of complex systems with unverifiable parameters. CALS of two indistinguishable complexes of Lü systems is viewed as, for example, an occasion for affirming the likelihood of the plan exhibited. In physics, we can see complex chaotic systems in numerous different applications, for example, applied sciences or engineering. With a specific end goal to affirm the proposed synchronization plan viability and demonstrate the hypothetical outcomes, we can compute the numerical simulation. The above outcomes will give the hypothetical establishment to the secure communication applications. CALS of complex chaotic systems in which a state variable of the master system synchronizes with an alternate state variable of the slave system is an encouraging sort of synchronization as it contributes excellent security in secure communication. Amid this secure communication, the synchronization between transmitter and collector is shut and message signals are recouped. The encryption and restoration of the signals are simulated numerically.

  20. Coarse-graining complex dynamics

    DEFF Research Database (Denmark)

    Sibani, Paolo

    2013-01-01

    Continuous Time Random Walks (CTRW) are widely used to coarse-grain the evolution of systems jumping from a metastable sub-set of their configuration space, or trap, to another via rare intermittent events. The multi-scaled behavior typical of complex dynamics is provided by a fat...... macroscopic variables all produce identical long time relaxation behaviors. Hence, CTRW shed no light on the link between microscopic and macroscopic dynamics. We then highlight how a more recent approach, Record Dynamics (RD) provides a viable alternative, based on a very different set of physical ideas......: while CTRW make use of a renewal process involving identical traps of infinite size, RD embodies a dynamical entrenchment into a hierarchy of traps which are finite in size and possess different degrees of meta-stability. We show in particular how RD produces the stretched exponential, power...

  1. Defining "The Weakest Link" Comparative Security in Complex Systems of Systems

    NARCIS (Netherlands)

    Pieters, Wolter

    2013-01-01

    Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of "weakest link" often appears.

  2. Dynamic Model of Islamic Hybrid Securities: Empirical Evidence From Malaysia Islamic Capital Market

    Directory of Open Access Journals (Sweden)

    Jaafar Pyeman

    2016-12-01

    Full Text Available Capital structure selection is fundamentally important in corporate financial management as it influence on mutually return and risk to stakeholders. Despite of Malaysia’s position as one of the major players of Islamic Financial Market, there are still lack of studies has been conducted on the capital structure of shariah compliant firms especially related to hybrid securities. The objective of this study is to determine the hybrid securities issuance model among the shariah compliant firms in Malaysia. As such, this study is to expand the literature review by providing comprehensive analysis on the hybrid capital structure and to develop dynamic Islamic hybrid securities model for shariah compliant firms. We use panel data of 50 companies that have been issuing the hybrid securities from the year of 2004- 2012. The outcomes of the studies are based on the dynamic model GMM estimation for the determinants of hybrid securities. Based on our model, risk and growth are considered as the most determinant factors for issuing convertible bond and loan stock. These results suggest that, the firms that have high risk but having good growth prospect will choose hybrid securities of convertible bond. The model also support the backdoor equity listing hypothesis by Stein (1992 where the hybrid securities enable the profitable firms to venture into positive NPV project by issuing convertible bond as it offer lower coupon rate as compare to the normal debt rate

  3. Optimal dispatch in dynamic security constrained open power market

    International Nuclear Information System (INIS)

    Singh, S.N.; David, A.K.

    2002-01-01

    Power system security is a new concern in the competitive power market operation, because the integration of the system controller and the generation owner has been broken. This paper presents an approach for dynamic security constrained optimal dispatch in restructured power market environment. The transient energy margin using transient energy function (TEF) approach has been used to calculate the stability margin of the system and a hybrid method is applied to calculate the approximate unstable equilibrium point (UEP) that is used to calculate the exact UEP and thus, the energy margin using TEF. The case study results illustrated on two systems shows that the operating mechanisms are compatible with the new business environment. (author)

  4. Dynamical complexity changes during two forms of meditation

    Science.gov (United States)

    Li, Jin; Hu, Jing; Zhang, Yinhong; Zhang, Xiaofeng

    2011-06-01

    Detection of dynamical complexity changes in natural and man-made systems has deep scientific and practical meaning. We use the base-scale entropy method to analyze dynamical complexity changes for heart rate variability (HRV) series during specific traditional forms of Chinese Chi and Kundalini Yoga meditation techniques in healthy young adults. The results show that dynamical complexity decreases in meditation states for two forms of meditation. Meanwhile, we detected changes in probability distribution of m-words during meditation and explained this changes using probability distribution of sine function. The base-scale entropy method may be used on a wider range of physiologic signals.

  5. Product development projects dynamics and emergent complexity

    CERN Document Server

    Schlick, Christopher

    2016-01-01

    This book primarily explores two topics: the representation of simultaneous, cooperative work processes in product development projects with the help of statistical models, and the assessment of their emergent complexity using a metric from theoretical physics (Effective Measure Complexity, EMC). It is intended to promote more effective management of development projects by shifting the focus from the structural complexity of the product being developed to the dynamic complexity of the development processes involved. The book is divided into four main parts, the first of which provides an introduction to vector autoregression models, periodic vector autoregression models and linear dynamical systems for modeling cooperative work in product development projects. The second part presents theoretical approaches for assessing complexity in the product development environment, while the third highlights and explains closed-form solutions for the complexity metric EMC for vector autoregression models and linear dyn...

  6. Rapid Mission Design for Dynamically Complex Environments

    Data.gov (United States)

    National Aeronautics and Space Administration — Designing trajectories in dynamically complex environments is very challenging and easily becomes an intractable problem. More complex planning implies potentially...

  7. The dynamics of security provision in the aftermath of war : How international efforts to contribute to security in post-settlement countries relate to national and local perceptions and practices of security

    NARCIS (Netherlands)

    Willems, R.C.

    2013-01-01

    This thesis is based on field research in eastern Democratic Republic of the Congo, Burundi and South Sudan and looks at the dynamics of security provisioning in post-settlement contexts. A particular focus is on international security interventions, which are constituted by Disarmament,

  8. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  9. Complex dynamic in ecological time series

    Science.gov (United States)

    Peter Turchin; Andrew D. Taylor

    1992-01-01

    Although the possibility of complex dynamical behaviors-limit cycles, quasiperiodic oscillations, and aperiodic chaos-has been recognized theoretically, most ecologists are skeptical of their importance in nature. In this paper we develop a methodology for reconstructing endogenous (or deterministic) dynamics from ecological time series. Our method consists of fitting...

  10. Traffic Dynamics on Complex Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Shengyong Chen

    2012-01-01

    Full Text Available Traffic dynamics on complex networks are intriguing in recent years due to their practical implications in real communication networks. In this survey, we give a brief review of studies on traffic routing dynamics on complex networks. Strategies for improving transport efficiency, including designing efficient routing strategies and making appropriate adjustments to the underlying network structure, are introduced in this survey. Finally, a few open problems are discussed in this survey.

  11. Inferring network topology from complex dynamics

    International Nuclear Information System (INIS)

    Shandilya, Srinivas Gorur; Timme, Marc

    2011-01-01

    Inferring the network topology from dynamical observations is a fundamental problem pervading research on complex systems. Here, we present a simple, direct method for inferring the structural connection topology of a network, given an observation of one collective dynamical trajectory. The general theoretical framework is applicable to arbitrary network dynamical systems described by ordinary differential equations. No interference (external driving) is required and the type of dynamics is hardly restricted in any way. In particular, the observed dynamics may be arbitrarily complex; stationary, invariant or transient; synchronous or asynchronous and chaotic or periodic. Presupposing a knowledge of the functional form of the dynamical units and of the coupling functions between them, we present an analytical solution to the inverse problem of finding the network topology from observing a time series of state variables only. Robust reconstruction is achieved in any sufficiently long generic observation of the system. We extend our method to simultaneously reconstructing both the entire network topology and all parameters appearing linear in the system's equations of motion. Reconstruction of network topology and system parameters is viable even in the presence of external noise that distorts the original dynamics substantially. The method provides a conceptually new step towards reconstructing a variety of real-world networks, including gene and protein interaction networks and neuronal circuits.

  12. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  13. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  14. Security Dynamics of Cloud Computing

    OpenAIRE

    Khan, Khaled M.

    2009-01-01

    This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing are essentially different in terms of its characteristics and business model. Conventional way of viewing as well as addressing security such as ‘bolting-in’ on the top of cloud computing may not work well. The paper attempts to portray the security spectrum necessary for...

  15. Asynchronous anti-noise hyper chaotic secure communication system based on dynamic delay and state variables switching

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Hongjun [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Weifang Vocational College, Weifang 261041 (China); Wang, Xingyuan, E-mail: wangxy@dlut.edu.cn [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China); Zhu, Quanlong [Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024 (China)

    2011-07-18

    This Letter designs an asynchronous hyper chaotic secure communication system, which possesses high stability against noise, using dynamic delay and state variables switching to ensure the high security. The relationship between the bit error ratio (BER) and the signal-to-noise ratio (SNR) is analyzed by simulation tests, the results show that the BER can be ensured to reach zero by proportionally adjusting the amplitudes of the state variables and the noise figure. The modules of the transmitter and receiver are implemented, and numerical simulations demonstrate the effectiveness of the system. -- Highlights: → Asynchronous anti-noise hyper chaotic secure communication system. → Dynamic delay and state switching to ensure the high security. → BER can reach zero by adjusting the amplitudes of state variables and noise figure.

  16. Dynamic Security Assessment of Western Danish Power System Based on Ensemble Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Bak, Claus Leth; Chen, Zhe

    2014-01-01

    With the increasing penetration of renewable energy resources and other forms of dispersed generation, more and more uncertainties will be brought to the dynamic security assessment (DSA) of power systems. This paper proposes an approach that uses ensemble decision trees (EDT) for online DSA. Fed...... with online wide-area measurement data, it is capable of not only predicting the security states of current operating conditions (OC) with high accuracy, but also indicating the confidence of the security states 1 minute ahead of the real time by an outlier identification method. The results of EDT together...

  17. Complexity: Outline of the NWO strategic theme Dynamics of complex systems

    NARCIS (Netherlands)

    Burgers, G.; Doelman, A.; Frenken, K.; Hogeweg, P.; Hommes, C.; van der Maas, H.; Mulder, B.; Stam, K.; van Steen, M.; Zandee, L.

    2008-01-01

    Dynamics of complex systems is one of the program 5 themes in the NWO (Netherlands Organisation for Scientific Research) strategy for the years 2007-2011. The ambition of the current proposal is to initiate integrated activities in the field of complex systems within the Netherlands, to provide

  18. Complexity : outline of the NWO strategic theme dynamics of complex systems

    NARCIS (Netherlands)

    Burgers, G.; Doelman, A.; Frenken, K.; Hogeweg, P.; Hommes, C.; Maas, van der H.; Mulder, B.; Stam, K.; Steen, van M.; Zandee, L.

    2008-01-01

    Dynamics of complex systems is one of the program 5 themes in the NWO (Netherlands Organisation for Scientific Research) strategy for the years 2007-2011. The ambition of the current proposal is to initiate integrated activities in the field of complex systems within the Netherlands, to provide

  19. Dynamic complexities in a parasitoid-host-parasitoid ecological model

    International Nuclear Information System (INIS)

    Yu Hengguo; Zhao Min; Lv Songjuan; Zhu Lili

    2009-01-01

    Chaotic dynamics have been observed in a wide range of population models. In this study, the complex dynamics in a discrete-time ecological model of parasitoid-host-parasitoid are presented. The model shows that the superiority coefficient not only stabilizes the dynamics, but may strongly destabilize them as well. Many forms of complex dynamics were observed, including pitchfork bifurcation with quasi-periodicity, period-doubling cascade, chaotic crisis, chaotic bands with narrow or wide periodic window, intermittent chaos, and supertransient behavior. Furthermore, computation of the largest Lyapunov exponent demonstrated the chaotic dynamic behavior of the model

  20. Dynamic complexities in a parasitoid-host-parasitoid ecological model

    Energy Technology Data Exchange (ETDEWEB)

    Yu Hengguo [School of Mathematic and Information Science, Wenzhou University, Wenzhou, Zhejiang 325035 (China); Zhao Min [School of Life and Environmental Science, Wenzhou University, Wenzhou, Zhejiang 325027 (China)], E-mail: zmcn@tom.com; Lv Songjuan; Zhu Lili [School of Mathematic and Information Science, Wenzhou University, Wenzhou, Zhejiang 325035 (China)

    2009-01-15

    Chaotic dynamics have been observed in a wide range of population models. In this study, the complex dynamics in a discrete-time ecological model of parasitoid-host-parasitoid are presented. The model shows that the superiority coefficient not only stabilizes the dynamics, but may strongly destabilize them as well. Many forms of complex dynamics were observed, including pitchfork bifurcation with quasi-periodicity, period-doubling cascade, chaotic crisis, chaotic bands with narrow or wide periodic window, intermittent chaos, and supertransient behavior. Furthermore, computation of the largest Lyapunov exponent demonstrated the chaotic dynamic behavior of the model.

  1. Dynamics in electron transfer protein complexes

    OpenAIRE

    Bashir, Qamar

    2010-01-01

    Recent studies have provided experimental evidence for the existence of an encounter complex, a transient intermediate in the formation of protein complexes. We have used paramagnetic relaxation enhancement NMR spectroscopy in combination with Monte Carlo simulations to characterize and visualize the ensemble of encounter orientations in the short-lived electron transfer complex of yeast Cc and CcP. The complete conformational space sampled by the protein molecules during the dynamic part of ...

  2. Chaotic, fractional, and complex dynamics new insights and perspectives

    CERN Document Server

    Macau, Elbert; Sanjuan, Miguel

    2018-01-01

    The book presents nonlinear, chaotic and fractional dynamics, complex systems and networks, together with cutting-edge research on related topics. The fifteen chapters – written by leading scientists working in the areas of nonlinear, chaotic and fractional dynamics, as well as complex systems and networks – offer an extensive overview of cutting-edge research on a range of topics, including fundamental and applied research. These include but are not limited to aspects of synchronization in complex dynamical systems, universality features in systems with specific fractional dynamics, and chaotic scattering. As such, the book provides an excellent and timely snapshot of the current state of research, blending the insights and experiences of many prominent researchers.

  3. Entropy for the Complexity of Physiological Signal Dynamics.

    Science.gov (United States)

    Zhang, Xiaohua Douglas

    2017-01-01

    Recently, the rapid development of large data storage technologies, mobile network technology, and portable medical devices makes it possible to measure, record, store, and track analysis of biological dynamics. Portable noninvasive medical devices are crucial to capture individual characteristics of biological dynamics. The wearable noninvasive medical devices and the analysis/management of related digital medical data will revolutionize the management and treatment of diseases, subsequently resulting in the establishment of a new healthcare system. One of the key features that can be extracted from the data obtained by wearable noninvasive medical device is the complexity of physiological signals, which can be represented by entropy of biological dynamics contained in the physiological signals measured by these continuous monitoring medical devices. Thus, in this chapter I present the major concepts of entropy that are commonly used to measure the complexity of biological dynamics. The concepts include Shannon entropy, Kolmogorov entropy, Renyi entropy, approximate entropy, sample entropy, and multiscale entropy. I also demonstrate an example of using entropy for the complexity of glucose dynamics.

  4. Micro-Level Affect Dynamics in Psychopathology Viewed From Complex Dynamical System Theory

    NARCIS (Netherlands)

    Wichers, M.; Wigman, J. T. W.; Myin-Germeys, I.

    2015-01-01

    This article discusses the role of moment-to-moment affect dynamics in mental disorder and aims to integrate recent literature on this topic in the context of complex dynamical system theory. First, we will review the relevance of temporal and contextual aspects of affect dynamics in relation to

  5. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    Science.gov (United States)

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  6. Advances in dynamics, patterns, cognition challenges in complexity

    CERN Document Server

    Pikovsky, Arkady; Rulkov, Nikolai; Tsimring, Lev

    2017-01-01

    This book focuses on recent progress in complexity research based on the fundamental nonlinear dynamical and statistical theory of oscillations, waves, chaos, and structures far from equilibrium. Celebrating seminal contributions to the field by Prof. M. I. Rabinovich of the University of California at San Diego, this volume brings together perspectives on both the fundamental aspects of complexity studies, as well as in applications in different fields ranging from granular patterns to understanding of the cognitive brain and mind dynamics. The slate of world-class authors review recent achievements that together present a broad and coherent coverage of modern research in complexity greater than the sum of its parts. Presents the most up-to-date developments in the studies of complexity Combines basic and applied aspects Links background nonlinear theory of oscillations and waves with modern approaches Allows readers to recognize general dynamical principles across the applications fields.

  7. Unsafe Gods: Security, Secularism and Schooling

    Science.gov (United States)

    Davies, Lynn

    2014-01-01

    This book makes the compelling argument that religion can be complicit in conflict and that a new secularism is vital to foster security. Using insights from complexity science, it shows how dynamic secularism can be used to accommodate diverse faiths and beliefs within worldly politics. Exploration of the interplay of religion and education in…

  8. Technology transfer of dynamic IT outsourcing requires security measures in SLAs

    NARCIS (Netherlands)

    F. Dickmann (Frank); M. Brodhun (Maximilian); J. Falkner (Jürgen); T.A. Knoch (Tobias); U. Sax (Ulrich)

    2010-01-01

    textabstractFor the present efforts in dynamic IT outsourcing environments like Grid or Cloud computing security and trust are ongoing issues. SLAs are a proved remedy to build up trust in outsourcing relations. Therefore, it is necessary to determine whether SLAs can improve trust from the

  9. Complex economic dynamics: Chaotic saddle, crisis and intermittency

    International Nuclear Information System (INIS)

    Chian, Abraham C.-L.; Rempel, Erico L.; Rogers, Colin

    2006-01-01

    Complex economic dynamics is studied by a forced oscillator model of business cycles. The technique of numerical modeling is applied to characterize the fundamental properties of complex economic systems which exhibit multiscale and multistability behaviors, as well as coexistence of order and chaos. In particular, we focus on the dynamics and structure of unstable periodic orbits and chaotic saddles within a periodic window of the bifurcation diagram, at the onset of a saddle-node bifurcation and of an attractor merging crisis, and in the chaotic regions associated with type-I intermittency and crisis-induced intermittency, in non-linear economic cycles. Inside a periodic window, chaotic saddles are responsible for the transient motion preceding convergence to a periodic or a chaotic attractor. The links between chaotic saddles, crisis and intermittency in complex economic dynamics are discussed. We show that a chaotic attractor is composed of chaotic saddles and unstable periodic orbits located in the gap regions of chaotic saddles. Non-linear modeling of economic chaotic saddle, crisis and intermittency can improve our understanding of the dynamics of financial intermittency observed in stock market and foreign exchange market. Characterization of the complex dynamics of economic systems is a powerful tool for pattern recognition and forecasting of business and financial cycles, as well as for optimization of management strategy and decision technology

  10. Exponential rise of dynamical complexity in quantum computing through projections.

    Science.gov (United States)

    Burgarth, Daniel Klaus; Facchi, Paolo; Giovannetti, Vittorio; Nakazato, Hiromichi; Pascazio, Saverio; Yuasa, Kazuya

    2014-10-10

    The ability of quantum systems to host exponentially complex dynamics has the potential to revolutionize science and technology. Therefore, much effort has been devoted to developing of protocols for computation, communication and metrology, which exploit this scaling, despite formidable technical difficulties. Here we show that the mere frequent observation of a small part of a quantum system can turn its dynamics from a very simple one into an exponentially complex one, capable of universal quantum computation. After discussing examples, we go on to show that this effect is generally to be expected: almost any quantum dynamics becomes universal once 'observed' as outlined above. Conversely, we show that any complex quantum dynamics can be 'purified' into a simpler one in larger dimensions. We conclude by demonstrating that even local noise can lead to an exponentially complex dynamics.

  11. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  12. Analysis of costs-benefits tradeoffs of complex security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.

    1996-01-01

    Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft reg-sign Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels

  13. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  14. Dynamic Complexity Study of Nuclear Reactor and Process Heat Application Integration

    International Nuclear Information System (INIS)

    Taylor, J'Tia Patrice; Shropshire, David E.

    2009-01-01

    This paper describes the key obstacles and challenges facing the integration of nuclear reactors with process heat applications as they relate to dynamic issues. The paper also presents capabilities of current modeling and analysis tools available to investigate these issues. A pragmatic approach to an analysis is developed with the ultimate objective of improving the viability of nuclear energy as a heat source for process industries. The extension of nuclear energy to process heat industries would improve energy security and aid in reduction of carbon emissions by reducing demands for foreign derived fossil fuels. The paper begins with an overview of nuclear reactors and process application for potential use in an integrated system. Reactors are evaluated against specific characteristics that determine their compatibility with process applications such as heat outlet temperature. The reactor system categories include light water, heavy water, small to medium, near term high-temperature, and far term high temperature reactors. Low temperature process systems include desalination, district heating, and tar sands and shale oil recovery. High temperature processes that support hydrogen production include steam reforming, steam cracking, hydrogen production by electrolysis, and far-term applications such as the sulfur iodine chemical process and high-temperature electrolysis. A simple static matching between complementary systems is performed; however, to gain a true appreciation for system integration complexity, time dependent dynamic analysis is required. The paper identifies critical issues arising from dynamic complexity associated with integration of systems. Operational issues include scheduling conflicts and resource allocation for heat and electricity. Additionally, economic and safety considerations that could impact the successful integration of these systems are considered. Economic issues include the cost differential arising due to an integrated system

  15. Combinations of complex dynamical systems

    CERN Document Server

    Pilgrim, Kevin M

    2003-01-01

    This work is a research-level monograph whose goal is to develop a general combination, decomposition, and structure theory for branched coverings of the two-sphere to itself, regarded as the combinatorial and topological objects which arise in the classification of certain holomorphic dynamical systems on the Riemann sphere. It is intended for researchers interested in the classification of those complex one-dimensional dynamical systems which are in some loose sense tame. The program is motivated by the dictionary between the theories of iterated rational maps and Kleinian groups.

  16. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Directory of Open Access Journals (Sweden)

    Sumithra Alagarsamy

    Full Text Available Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff Equation using an Integration Factor (DiffEIF, minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  17. Complex Conjugated certificateless-based signcryption with differential integrated factor for secured message communication in mobile network.

    Science.gov (United States)

    Alagarsamy, Sumithra; Rajagopalan, S P

    2017-01-01

    Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.

  18. Complex Networks IX

    CERN Document Server

    Coronges, Kate; Gonçalves, Bruno; Sinatra, Roberta; Vespignani, Alessandro; Proceedings of the 9th Conference on Complex Networks; CompleNet 2018

    2018-01-01

    This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks. It collects the works presented at the 9th International Conference on Complex Networks (CompleNet) 2018 in Boston, MA in March, 2018. With roots in physical, information and social science, the study of complex networks provides a formal set of mathematical methods, computational tools and theories to describe prescribe and predict dynamics and behaviors of complex systems. Despite their diversity, whether the systems are made up of physical, technological, informational, or social networks, they share many common organizing principles and thus can be studied with similar approaches. This book provides a view of the state-of-the-art in this dynamic field and covers topics such as group decision-making, brain and cellular connectivity, network controllability and resiliency, online activism, recommendation systems, and cyber security.

  19. Automated design of complex dynamic systems.

    Directory of Open Access Journals (Sweden)

    Michiel Hermans

    Full Text Available Several fields of study are concerned with uniting the concept of computation with that of the design of physical systems. For example, a recent trend in robotics is to design robots in such a way that they require a minimal control effort. Another example is found in the domain of photonics, where recent efforts try to benefit directly from the complex nonlinear dynamics to achieve more efficient signal processing. The underlying goal of these and similar research efforts is to internalize a large part of the necessary computations within the physical system itself by exploiting its inherent non-linear dynamics. This, however, often requires the optimization of large numbers of system parameters, related to both the system's structure as well as its material properties. In addition, many of these parameters are subject to fabrication variability or to variations through time. In this paper we apply a machine learning algorithm to optimize physical dynamic systems. We show that such algorithms, which are normally applied on abstract computational entities, can be extended to the field of differential equations and used to optimize an associated set of parameters which determine their behavior. We show that machine learning training methodologies are highly useful in designing robust systems, and we provide a set of both simple and complex examples using models of physical dynamical systems. Interestingly, the derived optimization method is intimately related to direct collocation a method known in the field of optimal control. Our work suggests that the application domains of both machine learning and optimal control have a largely unexplored overlapping area which envelopes a novel design methodology of smart and highly complex physical systems.

  20. A coherency-based method to increase dynamic security in power systems

    Energy Technology Data Exchange (ETDEWEB)

    De Tuglie, E. [Dipartimento di Ingegneria dell' Ambiente e per lo Sviluppo Sostenibile - DIASS, Politecnico di Bari, Viale del Turismo 8, 74100 Taranto (Italy); Iannone, S.M.; Torelli, F. [Dipartimento di Elettrotecnica ed Elettronica - DEE, Politecnico di Bari, Via Re David 200, 70125 Bari (Italy)

    2008-08-15

    Dynamic security analysis is the evaluation of the ability of a system to withstand contingencies by surviving transient conditions to acceptable steady-state operative states. When potential instability due to contingency is detected, preventive action may be desired to improve the system security. This is very important in the on-line operation of a power system, especially when the system is stability-limited. The method proposed in this paper is based on the idea that increasing coherency between generators in the transient behaviour following a system perturbation gives rise to a more stable system. In this paper, we suggest the use of the ''input-output feedback-linearization'' with a reference trajectory obtained using a system dynamic equivalent based on the centre of inertia. To quantify coherency levels a new coherency indicator has been assumed for the given reference trajectory. The result is an increasing level in coherency, critical clearing time and system stability. The method is tested on the IEEE 30 bus test system. (author)

  1. Dynamics of a complex quantum magnet

    International Nuclear Information System (INIS)

    Landry, James W.; Coppersmith, S. N.

    2003-01-01

    We have computed the low energy quantum states and low frequency dynamical susceptibility of complex quantum spin systems in the limit of strong interactions, obtaining exact results for system sizes enormously larger than accessible previously. The ground state is a complex superposition of a substantial fraction of all the classical ground states, and yet the dynamical susceptibility exhibits sharp resonances reminiscent of the behavior of single spins. These results show that strongly interacting quantum systems can organize to generate coherent excitations and shed light on recent experiments demonstrating that coherent excitations are present in a disordered spin liquid. The dependence of the energy spectra on system size differs qualitatively from that of the energy spectra of random undirected bipartite graphs with similar statistics, implying that strong interactions are giving rise to these unusual spectral properties

  2. Charge-Transfer Complexes Studied by Dynamic Force Spectroscopy

    Directory of Open Access Journals (Sweden)

    Jurriaan Huskens

    2013-03-01

    Full Text Available In this paper, the strength and kinetics of two charge-transfer complexes, naphthol-methylviologen and pyrene-methylviologen, are studied using dynamic force spectroscopy. The dissociation rates indicate an enhanced stability of the pyrene-methylviologen complex, which agrees with its higher thermodynamic stability compared to naphthol-methylviologen complex.

  3. The Self as a Complex Dynamic System

    Science.gov (United States)

    Mercer, Sarah

    2011-01-01

    This article explores the potential offered by complexity theories for understanding language learners' sense of self and attempts to show how the self might usefully be conceived of as a complex dynamic system. Rather than presenting empirical findings, the article discusses existent research on the self and aims at outlining a conceptual…

  4. On projective synchronization of hyperchaotic complex nonlinear systems based on passive theory for secure communications

    International Nuclear Information System (INIS)

    Mahmoud, Gamal M; Mahmoud, Emad E; Arafa, Ayman A

    2013-01-01

    In this paper we deal with the projective synchronization (PS) of hyperchaotic complex nonlinear systems and its application in secure communications based on passive theory. The unpredictability of the scaling factor in PS can additionally enhance the security of communications. In this paper, a scheme for secure message transmission is proposed, and we try to transmit more than one large or bounded message from the transmitter to the receiver. The new hyperchaotic complex Lorenz system is employed to encrypt these messages. In the transmitter, the original messages are modulated into its parameter. In the receiver, we assume that the parameter of the receiver system is uncertain. The controllers and corresponding parameter update law are constructed to achieve PS between the transmitter and receiver system with an uncertain parameter, and identify the unknown parameter via passive theory. The original messages can be recovered successfully through some simple operations by the estimated parameter. Numerical results have verified the effectiveness and feasibility of the presented method. (paper)

  5. Sync in Complex Dynamical Networks: Stability, Evolution, Control, and Application

    OpenAIRE

    Li, Xiang

    2005-01-01

    In the past few years, the discoveries of small-world and scale-free properties of many natural and artificial complex networks have stimulated significant advances in better understanding the relationship between the topology and the collective dynamics of complex networks. This paper reports recent progresses in the literature of synchronization of complex dynamical networks including stability criteria, network synchronizability and uniform synchronous criticality in different topologies, ...

  6. Complex systems dynamics in aging: new evidence, continuing questions.

    Science.gov (United States)

    Cohen, Alan A

    2016-02-01

    There have long been suggestions that aging is tightly linked to the complex dynamics of the physiological systems that maintain homeostasis, and in particular to dysregulation of regulatory networks of molecules. This review synthesizes recent work that is starting to provide evidence for the importance of such complex systems dynamics in aging. There is now clear evidence that physiological dysregulation--the gradual breakdown in the capacity of complex regulatory networks to maintain homeostasis--is an emergent property of these regulatory networks, and that it plays an important role in aging. It can be measured simply using small numbers of biomarkers. Additionally, there are indications of the importance during aging of emergent physiological processes, functional processes that cannot be easily understood through clear metabolic pathways, but can nonetheless be precisely quantified and studied. The overall role of such complex systems dynamics in aging remains an important open question, and to understand it future studies will need to distinguish and integrate related aspects of aging research, including multi-factorial theories of aging, systems biology, bioinformatics, network approaches, robustness, and loss of complexity.

  7. Final Site-Wide Environmental Impact Statement for the Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2001-01-01

    The National Nuclear Security Administration (NNSA) a separately organized agency within the U.S. Department of Energy (DOE) is responsible for providing the Nation with nuclear weapons and ensuring that those nuclear weapons remain safe, secure, and reliable. As one of the DOE major production facilities, the Y-12 National Security Complex has been DOE's primary site for enriched uranium processing and storage, and one of the manufacturing facilities for maintaining the U.S. nuclear weapons stockpile. In response to the end of the Cold War and changes in the world's political regimes, the emphasis of the U.S. weapons program has shifted dramatically over the past few years from developing and producing new weapons to dismantlement and maintenance of a smaller, enduring stockpile. The ''Stockpile Stewardship and Management Programmatic Environmental Impact Statement'' [SSM PEIS], DOE/EIS-0236, issued in September 1996, evaluated alternatives for maintaining the safety and reliability of the nuclear weapons stockpile without underground nuclear testing or production of new-design weapons. In the SSM PEIS Record of Decision (ROD), DOE decided to maintain the national security missions at the Y-12 National Security Complex, but to downsize Y-12 consistent with reduced requirements. These national security missions include (1) maintaining the capability and capacity to fabricate secondaries, limited life components, and case parts for nuclear response; (2) evaluating components and subsystems returned from the stockpile; (3) storing enriched uranium that is designated for national security purposes; (4) storing depleted uranium and lithium parts; (5) dismantling nuclear weapons secondaries returned from the stockpile; (6) processing uranium and lithium (which includes chemical recovery, purification, and conversion of enriched uranium and lithium to a form suitable for long-term storage and/or further use); and (7) providing support to weapons laboratories. During the

  8. Robustness of pinning a general complex dynamical network

    International Nuclear Information System (INIS)

    Wang Lei; Sun Youxian

    2010-01-01

    This Letter studies the robustness problem of pinning a general complex dynamical network toward an assigned synchronous evolution. Several synchronization criteria are presented to guarantee the convergence of the pinning process locally and globally by construction of Lyapunov functions. In particular, if a pinning strategy has been designed for synchronization of a given complex dynamical network, then no matter what uncertainties occur among the pinned nodes, synchronization can still be guaranteed through the pinning. The analytical results show that pinning control has a certain robustness against perturbations on network architecture: adding, deleting and changing the weights of edges. Numerical simulations illustrated by scale-free complex networks verify the theoretical results above-acquired.

  9. Generic Adaptively Secure Searchable Phrase Encryption

    Directory of Open Access Journals (Sweden)

    Kissel Zachary A.

    2017-01-01

    Full Text Available In recent years searchable symmetric encryption has seen a rapid increase in query expressiveness including keyword, phrase, Boolean, and fuzzy queries. With this expressiveness came increasingly complex constructions. Having these facts in mind, we present an efficient and generic searchable symmetric encryption construction for phrase queries. Our construction is straightforward to implement, and is proven secure under adaptively chosen query attacks (CQA2 in the random oracle model with an honest-but-curious adversary. To our knowledge, this is the first encrypted phrase search system that achieves CQA2 security. Moreover, we demonstrate that our document collection preprocessing algorithm allows us to extend a dynamic SSE construction so that it supports phrase queries. We also provide a compiler theorem which transforms any CQA2-secure SSE construction for keyword queries into a CQA2-secure SSE construction that supports phrase queries.

  10. Profiles of Food Security for US Farmworker Households and Factors Related to Dynamic of Change.

    Science.gov (United States)

    Ip, Edward H; Saldana, Santiago; Arcury, Thomas A; Grzywacz, Joseph G; Trejo, Grisel; Quandt, Sara A

    2015-10-01

    We recruited 248 farmworker families with preschool-aged children in North Carolina and examined food security indicators over 24 months to identify food security patterns and examine the dynamic of change over time. Participants in the Niños Sanos study, conducted 2011 to 2014, completed quarterly food security assessments. Based on responses to items in the US Household Food Security Survey Module, we identified different states of food security by using hidden Markov model analysis, and examined factors associated with different states. We delineated factors associated with changes in state by using mixed-effect ordinal logistic regression. About half of the households (51%) consistently stayed in the most food-secure state. The least food-secure state was transient, with only 29% probability of this state for 2 consecutive quarters. Seasonal (vs migrant) work status, having immigration documents (vs not documented), and season predicted higher levels of food security. Heterogeneity in food security among farmworker households calls for tailoring intervention strategies. The transiency and unpredictability of low food security suggest that access to safety-net programs could reduce low food security risk in this population.

  11. DYNAMICS OF DEVELOPMENT OF FINANCIAL SAFETY OF THE ENTERPRISE AS A COMPLEX ECONOMIC SECURITY OF THE STATE

    Directory of Open Access Journals (Sweden)

    Tetiana Ganushchak

    2017-09-01

    Full Text Available The purpose of the paper is to the performance of the evaluation of the financial safety of the enterprise. To achieve the stated aim it has been necessary to solve the following tasks: to use the approaches as to the evaluation of the financial safety of the enterprise, to introduce the analysis system of the financial safety of the enterprise, to consider the structural logical scheme of the analysis procedure of the financial safety of the enterprise, to give the description of the integral indicator of the financial safety of the enterprise; to evaluate and compare companies in the paltry industry according to the level of their financial safety. Methodology. Methodologial basis of the research are the scientific methods, such as : method of logical generalization, dialectical method of recognition of the economic phenomena – to give the definitions of «economic security of the enterprise», «financial security of the enterprise», grouping method, analysis which were used to estimate indicator position of the financial security of the poultry company, graph method which was applied to compare integral estimation of the enterprise;methods of synthesis, deduction, induction, method of the expert estimation to calculate and implement integral marker of the financial security of the poultry company;method of the correlation analysis which was used to identify weight coefficients of the all sided figures of the solvency , business activity, profitability, financial steadiness, pay ability. The priority in methods using was defined by the particular tasks and goals. Results of the research showned into a wide set of the ways of financial enterprise safety as a component of economic security of the state. There is an evaluation of enterprise financial safety on the basis of calculations of integral indicator, including combined indices of profitability (unprofitability, pay ability or the lack of that, business activity (fading, financial

  12. Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security

    Directory of Open Access Journals (Sweden)

    Lu Rao

    2018-01-01

    Full Text Available Remote data auditing service is important for mobile clients to guarantee the intactness of their outsourced data stored at cloud side. To relieve mobile client from the nonnegligible burden incurred by performing the frequent data auditing, more and more literatures propose that the execution of such data auditing should be migrated from mobile client to third-party auditor (TPA. However, existing public auditing schemes always assume that TPA is reliable, which is the potential risk for outsourced data security. Although Outsourced Proofs of Retrievability (OPOR have been proposed to further protect against the malicious TPA and collusion among any two entities, the original OPOR scheme applies only to the static data, which is the limitation that should be solved for enabling data dynamics. In this paper, we design a novel authenticated data structure called bv23Tree, which enables client to batch-verify the indices and values of any number of appointed leaves all at once for efficiency. By utilizing bv23Tree and a hierarchical storage structure, we present the first solution for Dynamic OPOR (DOPOR, which extends the OPOR model to support dynamic updates of the outsourced data. Extensive security and performance analyses show the reliability and effectiveness of our proposed scheme.

  13. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  14. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  15. Nonlinear Dynamics, Chaotic and Complex Systems

    Science.gov (United States)

    Infeld, E.; Zelazny, R.; Galkowski, A.

    2011-04-01

    Part I. Dynamic Systems Bifurcation Theory and Chaos: 1. Chaos in random dynamical systems V. M. Gunldach; 2. Controlling chaos using embedded unstable periodic orbits: the problem of optimal periodic orbits B. R. Hunt and E. Ott; 3. Chaotic tracer dynamics in open hydrodynamical flows G. Karolyi, A. Pentek, T. Tel and Z. Toroczkai; 4. Homoclinic chaos L. P. Shilnikov; Part II. Spatially Extended Systems: 5. Hydrodynamics of relativistic probability flows I. Bialynicki-Birula; 6. Waves in ionic reaction-diffusion-migration systems P. Hasal, V. Nevoral, I. Schreiber, H. Sevcikova, D. Snita, and M. Marek; 7. Anomalous scaling in turbulence: a field theoretical approach V. Lvov and I. Procaccia; 8. Abelian sandpile cellular automata M. Markosova; 9. Transport in an incompletely chaotic magnetic field F. Spineanu; Part III. Dynamical Chaos Quantum Physics and Foundations Of Statistical Mechanics: 10. Non-equilibrium statistical mechanics and ergodic theory L. A. Bunimovich; 11. Pseudochaos in statistical physics B. Chirikov; 12. Foundations of non-equilibrium statistical mechanics J. P. Dougherty; 13. Thermomechanical particle simulations W. G. Hoover, H. A. Posch, C. H. Dellago, O. Kum, C. G. Hoover, A. J. De Groot and B. L. Holian; 14. Quantum dynamics on a Markov background and irreversibility B. Pavlov; 15. Time chaos and the laws of nature I. Prigogine and D. J. Driebe; 16. Evolutionary Q and cognitive systems: dynamic entropies and predictability of evolutionary processes W. Ebeling; 17. Spatiotemporal chaos information processing in neural networks H. Szu; 18. Phase transitions and learning in neural networks C. Van den Broeck; 19. Synthesis of chaos A. Vanecek and S. Celikovsky; 20. Computational complexity of continuous problems H. Wozniakowski; Part IV. Complex Systems As An Interface Between Natural Sciences and Environmental Social and Economic Sciences: 21. Stochastic differential geometry in finance studies V. G. Makhankov; Part V. Conference Banquet

  16. Applications of Nonlinear Dynamics Model and Design of Complex Systems

    CERN Document Server

    In, Visarath; Palacios, Antonio

    2009-01-01

    This edited book is aimed at interdisciplinary, device-oriented, applications of nonlinear science theory and methods in complex systems. In particular, applications directed to nonlinear phenomena with space and time characteristics. Examples include: complex networks of magnetic sensor systems, coupled nano-mechanical oscillators, nano-detectors, microscale devices, stochastic resonance in multi-dimensional chaotic systems, biosensors, and stochastic signal quantization. "applications of nonlinear dynamics: model and design of complex systems" brings together the work of scientists and engineers that are applying ideas and methods from nonlinear dynamics to design and fabricate complex systems.

  17. Polyacrylic acids–bovine serum albumin complexation: Structure and dynamics

    International Nuclear Information System (INIS)

    Othman, Mohamed; Aschi, Adel; Gharbi, Abdelhafidh

    2016-01-01

    The study of the mixture of BSA with polyacrylic acids at different masses versus pH allowed highlighting the existence of two regimes of weak and strong complexation. These complexes were studied in diluted regime concentration, by turbidimetry, dynamic light scattering (DLS), zeta-potential measurements and nuclear magnetic resonance (NMR). We have followed the pH effect on the structure and properties of the complex. This allowed refining the interpretation of the phase diagram and understanding the observed phenomena. The NMR measurements allowed probing the dynamics of the constituents versus the pH. The computational method was used to precisely determine the electrostatic potential of BSA and how the polyelectrolyte binds to it at different pH. - Highlights: • Influence of physico-chemical parameters on the electrostatic interactions in the complex system (polyelectrolyte/protein). • Stabilization and encapsulation of biological macromolecules solution by mean of polyelectrolyte. • Properties and structure of mixture obtained by screening the charges of globular protein and at different masses of polyacrylic acids. • Dynamic of the constituents formed by complexes particles. • Evaluation of the electrostatic properties of bovine serum albumin versus pH through solution of the Poisson-Boltzmann equation.

  18. Dynamic Complexity Study of Nuclear Reactor and Process Heat Application Integration

    Energy Technology Data Exchange (ETDEWEB)

    J' Tia Patrice Taylor; David E. Shropshire

    2009-09-01

    Abstract This paper describes the key obstacles and challenges facing the integration of nuclear reactors with process heat applications as they relate to dynamic issues. The paper also presents capabilities of current modeling and analysis tools available to investigate these issues. A pragmatic approach to an analysis is developed with the ultimate objective of improving the viability of nuclear energy as a heat source for process industries. The extension of nuclear energy to process heat industries would improve energy security and aid in reduction of carbon emissions by reducing demands for foreign derived fossil fuels. The paper begins with an overview of nuclear reactors and process application for potential use in an integrated system. Reactors are evaluated against specific characteristics that determine their compatibility with process applications such as heat outlet temperature. The reactor system categories include light water, heavy water, small to medium, near term high-temperature, and far term high temperature reactors. Low temperature process systems include desalination, district heating, and tar sands and shale oil recovery. High temperature processes that support hydrogen production include steam reforming, steam cracking, hydrogen production by electrolysis, and far-term applications such as the sulfur iodine chemical process and high-temperature electrolysis. A simple static matching between complementary systems is performed; however, to gain a true appreciation for system integration complexity, time dependent dynamic analysis is required. The paper identifies critical issues arising from dynamic complexity associated with integration of systems. Operational issues include scheduling conflicts and resource allocation for heat and electricity. Additionally, economic and safety considerations that could impact the successful integration of these systems are considered. Economic issues include the cost differential arising due to an integrated

  19. Complex and Adaptive Dynamical Systems A Primer

    CERN Document Server

    Gros, Claudius

    2011-01-01

    We are living in an ever more complex world, an epoch where human actions can accordingly acquire far-reaching potentialities. Complex and adaptive dynamical systems are ubiquitous in the world surrounding us and require us to adapt to new realities and the way of dealing with them. This primer has been developed with the aim of conveying a wide range of "commons-sense" knowledge in the field of quantitative complex system science at an introductory level, providing an entry point to this both fascinating and vitally important subject. The approach is modular and phenomenology driven. Examples of emerging phenomena of generic importance treated in this book are: -- The small world phenomenon in social and scale-free networks. -- Phase transitions and self-organized criticality in adaptive systems. -- Life at the edge of chaos and coevolutionary avalanches resulting from the unfolding of all living. -- The concept of living dynamical systems and emotional diffusive control within cognitive system theory. Techn...

  20. Complex and adaptive dynamical systems a primer

    CERN Document Server

    Gros, Claudius

    2007-01-01

    We are living in an ever more complex world, an epoch where human actions can accordingly acquire far-reaching potentialities. Complex and adaptive dynamical systems are ubiquitous in the world surrounding us and require us to adapt to new realities and the way of dealing with them. This primer has been developed with the aim of conveying a wide range of "commons-sense" knowledge in the field of quantitative complex system science at an introductory level, providing an entry point to this both fascinating and vitally important subject. The approach is modular and phenomenology driven. Examples of emerging phenomena of generic importance treated in this book are: -- The small world phenomenon in social and scale-free networks. -- Phase transitions and self-organized criticality in adaptive systems. -- Life at the edge of chaos and coevolutionary avalanches resulting from the unfolding of all living. -- The concept of living dynamical systems and emotional diffusive control within cognitive system theory. Techn...

  1. Complex and unexpected dynamics in simple genetic regulatory networks

    Science.gov (United States)

    Borg, Yanika; Ullner, Ekkehard; Alagha, Afnan; Alsaedi, Ahmed; Nesbeth, Darren; Zaikin, Alexey

    2014-03-01

    One aim of synthetic biology is to construct increasingly complex genetic networks from interconnected simpler ones to address challenges in medicine and biotechnology. However, as systems increase in size and complexity, emergent properties lead to unexpected and complex dynamics due to nonlinear and nonequilibrium properties from component interactions. We focus on four different studies of biological systems which exhibit complex and unexpected dynamics. Using simple synthetic genetic networks, small and large populations of phase-coupled quorum sensing repressilators, Goodwin oscillators, and bistable switches, we review how coupled and stochastic components can result in clustering, chaos, noise-induced coherence and speed-dependent decision making. A system of repressilators exhibits oscillations, limit cycles, steady states or chaos depending on the nature and strength of the coupling mechanism. In large repressilator networks, rich dynamics can also be exhibited, such as clustering and chaos. In populations of Goodwin oscillators, noise can induce coherent oscillations. In bistable systems, the speed with which incoming external signals reach steady state can bias the network towards particular attractors. These studies showcase the range of dynamical behavior that simple synthetic genetic networks can exhibit. In addition, they demonstrate the ability of mathematical modeling to analyze nonlinearity and inhomogeneity within these systems.

  2. Complex-Dynamic Cosmology and Emergent World Structure

    OpenAIRE

    Kirilyuk, Andrei P.

    2004-01-01

    Universe structure emerges in the unreduced, complex-dynamic interaction process with the simplest initial configuration (two attracting homogeneous fields, quant-ph/9902015). The unreduced interaction analysis gives intrinsically creative cosmology, describing the real, explicitly emerging world structure with dynamic randomness on each scale. Without imposing any postulates or entities, we obtain physically real space, time, elementary particles with their detailed structure and intrinsic p...

  3. Coupled disease-behavior dynamics on complex networks: A review

    Science.gov (United States)

    Wang, Zhen; Andrews, Michael A.; Wu, Zhi-Xi; Wang, Lin; Bauch, Chris T.

    2015-12-01

    It is increasingly recognized that a key component of successful infection control efforts is understanding the complex, two-way interaction between disease dynamics and human behavioral and social dynamics. Human behavior such as contact precautions and social distancing clearly influence disease prevalence, but disease prevalence can in turn alter human behavior, forming a coupled, nonlinear system. Moreover, in many cases, the spatial structure of the population cannot be ignored, such that social and behavioral processes and/or transmission of infection must be represented with complex networks. Research on studying coupled disease-behavior dynamics in complex networks in particular is growing rapidly, and frequently makes use of analysis methods and concepts from statistical physics. Here, we review some of the growing literature in this area. We contrast network-based approaches to homogeneous-mixing approaches, point out how their predictions differ, and describe the rich and often surprising behavior of disease-behavior dynamics on complex networks, and compare them to processes in statistical physics. We discuss how these models can capture the dynamics that characterize many real-world scenarios, thereby suggesting ways that policy makers can better design effective prevention strategies. We also describe the growing sources of digital data that are facilitating research in this area. Finally, we suggest pitfalls which might be faced by researchers in the field, and we suggest several ways in which the field could move forward in the coming years.

  4. Dynamics of Fos-Jun-NFAT1 complexes.

    Science.gov (United States)

    Ramirez-Carrozzi, V R; Kerppola, T K

    2001-04-24

    Transcription initiation in eukaryotes is controlled by nucleoprotein complexes formed through cooperative interactions among multiple transcription regulatory proteins. These complexes may be assembled via stochastic collisions or defined pathways. We investigated the dynamics of Fos-Jun-NFAT1 complexes by using a multicolor fluorescence resonance energy transfer assay. Fos-Jun heterodimers can bind to AP-1 sites in two opposite orientations, only one of which is populated in mature Fos-Jun-NFAT1 complexes. We studied the reversal of Fos-Jun binding orientation in response to NFAT1 by measuring the efficiencies of energy transfer from donor fluorophores linked to opposite ends of an oligonucleotide to an acceptor fluorophore linked to one subunit of the heterodimer. The reorientation of Fos-Jun by NFAT1 was not inhibited by competitor oligonucleotides or heterodimers. The rate of Fos-Jun reorientation was faster than the rate of heterodimer dissociation at some binding sites. The facilitated reorientation of Fos-Jun heterodimers therefore can enhance the efficiency of Fos-Jun-NFAT1 complex formation. We also examined the influence of the preferred orientation of Fos-Jun binding on the stability and transcriptional activity of Fos-Jun-NFAT1 complexes. Complexes formed at sites where Fos-Jun favored the same binding orientation in the presence and absence of NFAT1 exhibited an 8-fold slower dissociation rate than complexes formed at sites where Fos-Jun favored the opposite binding orientation. Fos-Jun-NFAT1 complexes also exhibited greater transcription activation at promoter elements that favored the same orientation of Fos-Jun binding in the presence and absence of NFAT1. Thus, the orientation of heterodimer binding can influence both the dynamics and promoter selectivity of multiprotein transcription regulatory complexes.

  5. NERSC Cyber Security Challenges That Require DOE Development andSupport

    Energy Technology Data Exchange (ETDEWEB)

    Draney, Brent; Campbell, Scott; Walter, Howard

    2007-01-16

    Traditional security approaches do not adequately addressall the requirements of open, scientific computing facilities. Many ofthe methods used for more restricted environments, including almost allcorporate/commercial systems, do not meet the needs of today's science.Use of only the available "state of the practice" commercial methods willhave adverse impact on the ability of DOE to accomplish its sciencegoals, and impacts the productivity of the DOE Science community. Inparticular, NERSC and other high performance computing (HPC) centers havespecial security challenges that are unlikely to be met unless DOE fundsdevelopment and support of reliable and effective tools designed to meetthe cyber security needs of High Performance Science. The securitychallenges facing NERSC can be collected into three basic problem sets:network performance and dynamics, application complexity and diversity,and a complex user community that can have transient affiliations withactual institutions. To address these problems, NERSC proposes thefollowing four general solutions: auditing user and system activityacross sites; firewall port configuration in real time;cross-site/virtual organization identity management and access control;and detecting security issues in application middleware. Solutions arealsoproposed for three general long term issues: data volume,application complexity, and information integration.

  6. Modified projective synchronization with complex scaling factors of uncertain real chaos and complex chaos

    International Nuclear Information System (INIS)

    Zhang Fang-Fang; Liu Shu-Tang; Yu Wei-Yong

    2013-01-01

    To increase the variety and security of communication, we present the definitions of modified projective synchronization with complex scaling factors (CMPS) of real chaotic systems and complex chaotic systems, where complex scaling factors establish a link between real chaos and complex chaos. Considering all situations of unknown parameters and pseudo-gradient condition, we design adaptive CMPS schemes based on the speed-gradient method for the real drive chaotic system and complex response chaotic system and for the complex drive chaotic system and the real response chaotic system, respectively. The convergence factors and dynamical control strength are added to regulate the convergence speed and increase robustness. Numerical simulations verify the feasibility and effectiveness of the presented schemes. (general)

  7. The design of a dynamic security system at the XXIII Summer Olympics at Los Angeles

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1985-01-01

    The security requirements of the XXIII Summer Olympic Games at Los Angeles provided a challenge unparalleled in the history of the modern games. This paper discusses the dynamics involved and suggests that the principles used are applicable to many of today's security environments. The success of the Intrusion Detection Systems (IDS) employed at each of the three Olympic villages and at the Piper Technical Center is a known fact. How it was accomplished is addressed in a straightforward, systematic way. The paper also recognizes the contributions made by the security community, law enforcement agencies, the government, military, the security industry and RandD organizations. It was a team effort that reflected the spirit of the games and the American ''can-do'' attitude

  8. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  9. The self as a complex dynamic system

    Directory of Open Access Journals (Sweden)

    Sarah Mercer

    2011-04-01

    Full Text Available This article explores the potential offered by complexity theories for understanding language learners’ sense of self and attempts to show how the self might usefully be conceived of as a complex dynamic system. Rather than presenting empirical findings, the article discusses existent research on the self and aims at outlining a conceptual perspective that may inform future studies into the self and possibly other individual learner differences. The article concludes by critically considering the merits of a complexity perspective but also reflecting on the challenges it poses for research.

  10. Modernization at the Y-12 National Security Complex: A Case for Additional Experimental Benchmarks

    Energy Technology Data Exchange (ETDEWEB)

    Thornbury, Matthew [Y-12 National Security Complex, Oak Ridge, TN (United States)

    2017-10-25

    Electrorefining (ER) is a major part of efforts at the Y-12 National Security Complex to revolutionize the reprocessing and purification of enriched uranium (EU). Successful implementation of ER could drastically reduce the operational costs and footprint, hazardous materials use, and waste generation.

  11. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  12. Y-12 National Security Complex Water Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  13. A dynamic mathematical test of international property securities bubbles and crashes

    Science.gov (United States)

    Hui, Eddie C. M.; Zheng, Xian; Wang, Hui

    2010-04-01

    This study investigates property securities bubbles and crashes by using a dynamic mathematical methodology developed from the previous research (Watanabe et al. 2007a, b [31,32]). The improved model is used to detect the bubble and crash periods in five international countries/cities (namely, United States, United Kingdom, Japan, Hong Kong and Singapore) from Jan, 2000 to Oct, 2008. By this model definition, we are able to detect the beginning of each bubble period even before it bursts. Meanwhile, the empirical results show that most of property securities markets experienced bubble periods between 2003 and 2007, and crashes happened in Apr 2008 triggered by the Subprime Mortgage Crisis of US. In contrast, Japan suffered the shortest bubble period and no evidence has documented the existence of crash there.

  14. A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application

    Science.gov (United States)

    Compagna, Luca; El Khoury, Paul; Massacci, Fabio; Saidane, Ayda

    Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to foresee all possible situations and interactions when developing the system. In order to solve this problem context based self- diagnosis and reconfiguration at runtime should be provided.

  15. Development of an industrial complex for ensuring national competitiveness and economic security

    Directory of Open Access Journals (Sweden)

    A. V. Kalach

    2016-01-01

    Full Text Available Living standards depends on the state of the country’s industrial complex. In a message to Russian President Vladimir Putin's Federal Assembly was asked to implement in 2015 a national technological initiative, the development of industries of the new technological order. As a result of the predominance of the industry of the sixth technological order should occur major changes in the structure of production factors and significance. It follows the inevitability of structural changes in the system of economic institutions and mechanisms of economic security and competitiveness of the state achieve the main goal of the state program “The development of industry and increase its competitiveness” is carried out through the following the directions of sub-programs: investment goods (chemical complex development composite materials, industrial biotechnology, power engineering, machine tool industry, agricultural machinery, machinery specialized production, transport engineering; goods (light industry, children;s products industry, the automotive industry; military-industrial complex; infrastructure (development of engineering activities, industrial parks; semi-finished goods and materials (timber industry, metallurgy, industrial development of rare-earth metals. At the current pace of technological and economic development, the 6 th technological structure will come into proliferation phase in 2010–2020, and in the phase of maturity – 40-ies of XXI century. At the same time in 2020–2025 there will be a new scientific-technical and technological revolution, which will become the basis for developing, synthesizing advances in the above basic technologies. In this paper, we proposed as a tool to ensure the economic security of the state to use the acceleration system of technical development of the industrial complex.

  16. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  17. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  18. Topics in Complexity: Dynamical Patterns in the Cyberworld

    Science.gov (United States)

    Qi, Hong

    Quantitative understanding of mechanism in complex systems is a common "difficult" problem across many fields such as physical, biological, social and economic sciences. Investigation on underlying dynamics of complex systems and building individual-based models have recently been fueled by big data resulted from advancing information technology. This thesis investigates complex systems in social science, focusing on civil unrests on streets and relevant activities online. Investigation consists of collecting data of unrests from open digital source, featuring dynamical patterns underlying, making predictions and constructing models. A simple law governing the progress of two-sided confrontations is proposed with data of activities at micro-level. Unraveling the connections between activity of organizing online and outburst of unrests on streets gives rise to a further meso-level pattern of human behavior, through which adversarial groups evolve online and hyper-escalate ahead of real-world uprisings. Based on the patterns found, noticeable improvement of prediction of civil unrests is achieved. Meanwhile, novel model created from combination of mobility dynamics in the cyberworld and a traditional contagion model can better capture the characteristics of modern civil unrests and other contagion-like phenomena than the original one.

  19. Effective control of complex turbulent dynamical systems through statistical functionals.

    Science.gov (United States)

    Majda, Andrew J; Qi, Di

    2017-05-30

    Turbulent dynamical systems characterized by both a high-dimensional phase space and a large number of instabilities are ubiquitous among complex systems in science and engineering, including climate, material, and neural science. Control of these complex systems is a grand challenge, for example, in mitigating the effects of climate change or safe design of technology with fully developed shear turbulence. Control of flows in the transition to turbulence, where there is a small dimension of instabilities about a basic mean state, is an important and successful discipline. In complex turbulent dynamical systems, it is impossible to track and control the large dimension of instabilities, which strongly interact and exchange energy, and new control strategies are needed. The goal of this paper is to propose an effective statistical control strategy for complex turbulent dynamical systems based on a recent statistical energy principle and statistical linear response theory. We illustrate the potential practical efficiency and verify this effective statistical control strategy on the 40D Lorenz 1996 model in forcing regimes with various types of fully turbulent dynamics with nearly one-half of the phase space unstable.

  20. Searching for Appropriate Ways to Face the Challenges of Complexity and Dynamics

    OpenAIRE

    Sommerfeld, Peter; Hollenstein, Lea

    2017-01-01

    People, as bio-psychological systems, are just as dynamic and complex as the social systems that they create. Social work intervenes in the interplay of these two complex, dynamic systems. How can we capture these complexities and dynamics in social work research and practice? The paper introduces the theoretical grounds on which a mixed-methods design has been developed combining a longitudinal quantitative method called Real Time Monitoring that produces dense time series data with qualitat...

  1. European perspectives on security research

    CERN Document Server

    2011-01-01

    Europe’s networked societies of today are shaped by a growing interconnection in almost all areas of life. The complexity of our infrastructures and the concurrent accessibility to means of destruction by terrorist groups and individual perpetrators call for innovative security solutions. However, such evolving innovations inevitably raise fundamental questions of concern in our societies. How do we balance the imperatives of securing our citizens and infrastructures on the one hand, and of protecting of our sacredly held civil liberties on the other? The topical network ‘Safety and Security’ of acatech – the German Academy of Science and Engineering – invited experts from the science academies of various European countries to share their perspectives on security research and the aspect of safety during a two-day workshop hosted by the Fraunhofer Institute for High-Speed Dynamics, Ernst-Mach-Institut in March 2010. This publication is a compilation of contributions made during the workshop.

  2. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    Energy Technology Data Exchange (ETDEWEB)

    Pederson, Ann C. [ORNL; Snow, Catherine L. [ORNL; Townsend, Jeremy [ORNL; Shannon, Michael [ORNL

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  3. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  4. Mathematical model and coordination algorithms for ensuring complex security of an organization

    Science.gov (United States)

    Novoseltsev, V. I.; Orlova, D. E.; Dubrovin, A. S.; Irkhin, V. P.

    2018-03-01

    The mathematical model of coordination when ensuring complex security of the organization is considered. On the basis of use of a method of casual search three types of algorithms of effective coordination adequate to mismatch level concerning security are developed: a coordination algorithm at domination of instructions of the coordinator; a coordination algorithm at domination of decisions of performers; a coordination algorithm at parity of interests of the coordinator and performers. Assessment of convergence of the algorithms considered above it was made by carrying out a computing experiment. The described algorithms of coordination have property of convergence in the sense stated above. And, the following regularity is revealed: than more simply in the structural relation the algorithm, for the smaller number of iterations is provided to those its convergence.

  5. Note on transmitted complexity for quantum dynamical systems

    Science.gov (United States)

    Watanabe, Noboru; Muto, Masahiro

    2017-10-01

    Transmitted complexity (mutual entropy) is one of the important measures for quantum information theory developed recently in several ways. We will review the fundamental concepts of the Kossakowski, Ohya and Watanabe entropy and define a transmitted complexity for quantum dynamical systems. This article is part of the themed issue `Second quantum revolution: foundational questions'.

  6. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  7. Investigating dynamical complexity in the magnetosphere using various entropy measures

    Science.gov (United States)

    Balasis, Georgios; Daglis, Ioannis A.; Papadimitriou, Constantinos; Kalimeri, Maria; Anastasiadis, Anastasios; Eftaxias, Konstantinos

    2009-09-01

    The complex system of the Earth's magnetosphere corresponds to an open spatially extended nonequilibrium (input-output) dynamical system. The nonextensive Tsallis entropy has been recently introduced as an appropriate information measure to investigate dynamical complexity in the magnetosphere. The method has been employed for analyzing Dst time series and gave promising results, detecting the complexity dissimilarity among different physiological and pathological magnetospheric states (i.e., prestorm activity and intense magnetic storms, respectively). This paper explores the applicability and effectiveness of a variety of computable entropy measures (e.g., block entropy, Kolmogorov entropy, T complexity, and approximate entropy) to the investigation of dynamical complexity in the magnetosphere. We show that as the magnetic storm approaches there is clear evidence of significant lower complexity in the magnetosphere. The observed higher degree of organization of the system agrees with that inferred previously, from an independent linear fractal spectral analysis based on wavelet transforms. This convergence between nonlinear and linear analyses provides a more reliable detection of the transition from the quiet time to the storm time magnetosphere, thus showing evidence that the occurrence of an intense magnetic storm is imminent. More precisely, we claim that our results suggest an important principle: significant complexity decrease and accession of persistency in Dst time series can be confirmed as the magnetic storm approaches, which can be used as diagnostic tools for the magnetospheric injury (global instability). Overall, approximate entropy and Tsallis entropy yield superior results for detecting dynamical complexity changes in the magnetosphere in comparison to the other entropy measures presented herein. Ultimately, the analysis tools developed in the course of this study for the treatment of Dst index can provide convenience for space weather

  8. Lyapunov exponents a tool to explore complex dynamics

    CERN Document Server

    Pikovsky, Arkady

    2016-01-01

    Lyapunov exponents lie at the heart of chaos theory, and are widely used in studies of complex dynamics. Utilising a pragmatic, physical approach, this self-contained book provides a comprehensive description of the concept. Beginning with the basic properties and numerical methods, it then guides readers through to the most recent advances in applications to complex systems. Practical algorithms are thoroughly reviewed and their performance is discussed, while a broad set of examples illustrate the wide range of potential applications. The description of various numerical and analytical techniques for the computation of Lyapunov exponents offers an extensive array of tools for the characterization of phenomena such as synchronization, weak and global chaos in low and high-dimensional set-ups, and localization. This text equips readers with all the investigative expertise needed to fully explore the dynamical properties of complex systems, making it ideal for both graduate students and experienced researchers...

  9. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT

    Directory of Open Access Journals (Sweden)

    Hyungjoo Kim

    2016-10-01

    Full Text Available The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

  10. Understanding Learner Agency as a Complex Dynamic System

    Science.gov (United States)

    Mercer, Sarah

    2011-01-01

    This paper attempts to contribute to a fuller understanding of the nature of language learner agency by considering it as a complex dynamic system. The purpose of the study was to explore detailed situated data to examine to what extent it is feasible to view learner agency through the lens of complexity theory. Data were generated through a…

  11. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  12. Development and Application of a New Grey Dynamic Hierarchy Analysis System (GDHAS) for Evaluating Urban Ecological Security

    Science.gov (United States)

    Shao, Chaofeng; Tian, Xiaogang; Guan, Yang; Ju, Meiting; Xie, Qiang

    2013-01-01

    Selecting indicators based on the characteristics and development trends of a given study area is essential for building a framework for assessing urban ecological security. However, few studies have focused on how to select the representative indicators systematically, and quantitative research is lacking. We developed an innovative quantitative modeling approach called the grey dynamic hierarchy analytic system (GDHAS) for both the procedures of indicator selection and quantitative assessment of urban ecological security. Next, a systematic methodology based on the GDHAS is developed to assess urban ecological security comprehensively and dynamically. This assessment includes indicator selection, driving force-pressure-state-impact-response (DPSIR) framework building, and quantitative evaluation. We applied this systematic methodology to assess the urban ecological security of Tianjin, which is a typical coastal super megalopolis and the industry base in China. This case study highlights the key features of our approach. First, 39 representative indicators are selected for the evaluation index system from 62 alternative ones available through the GDHAS. Second, the DPSIR framework is established based on the indicators selected, and the quantitative assessment of the eco-security of Tianjin is conducted. The results illustrate the following: urban ecological security of Tianjin in 2008 was in alert level but not very stable; the driving force and pressure subsystems were in good condition, but the eco-security levels of the remainder of the subsystems were relatively low; the pressure subsystem was the key to urban ecological security; and 10 indicators are defined as the key indicators for five subsystems. These results can be used as the basis for urban eco-environmental management. PMID:23698700

  13. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    Science.gov (United States)

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  14. Chaotic Dynamical State Variables Selection Procedure Based Image Encryption Scheme

    Directory of Open Access Journals (Sweden)

    Zia Bashir

    2017-12-01

    Full Text Available Nowadays, in the modern digital era, the use of computer technologies such as smartphones, tablets and the Internet, as well as the enormous quantity of confidential information being converted into digital form have resulted in raised security issues. This, in turn, has led to rapid developments in cryptography, due to the imminent need for system security. Low-dimensional chaotic systems have low complexity and key space, yet they achieve high encryption speed. An image encryption scheme is proposed that, without compromising the security, uses reasonable resources. We introduced a chaotic dynamic state variables selection procedure (CDSVSP to use all state variables of a hyper-chaotic four-dimensional dynamical system. As a result, less iterations of the dynamical system are required, and resources are saved, thus making the algorithm fast and suitable for practical use. The simulation results of security and other miscellaneous tests demonstrate that the suggested algorithm excels at robustness, security and high speed encryption.

  15. Random complex dynamics and devil's coliseums

    Science.gov (United States)

    Sumi, Hiroki

    2015-04-01

    We investigate the random dynamics of polynomial maps on the Riemann sphere \\hat{\\Bbb{C}} and the dynamics of semigroups of polynomial maps on \\hat{\\Bbb{C}} . In particular, the dynamics of a semigroup G of polynomials whose planar postcritical set is bounded and the associated random dynamics are studied. In general, the Julia set of such a G may be disconnected. We show that if G is such a semigroup, then regarding the associated random dynamics, the chaos of the averaged system disappears in the C0 sense, and the function T∞ of probability of tending to ∞ \\in \\hat{\\Bbb{C}} is Hölder continuous on \\hat{\\Bbb{C}} and varies only on the Julia set of G. Moreover, the function T∞ has a kind of monotonicity. It turns out that T∞ is a complex analogue of the devil's staircase, and we call T∞ a ‘devil’s coliseum'. We investigate the details of T∞ when G is generated by two polynomials. In this case, T∞ varies precisely on the Julia set of G, which is a thin fractal set. Moreover, under this condition, we investigate the pointwise Hölder exponents of T∞.

  16. Modular interdependency in complex dynamical systems.

    Science.gov (United States)

    Watson, Richard A; Pollack, Jordan B

    2005-01-01

    Herbert A. Simon's characterization of modularity in dynamical systems describes subsystems as having dynamics that are approximately independent of those of other subsystems (in the short term). This fits with the general intuition that modules must, by definition, be approximately independent. In the evolution of complex systems, such modularity may enable subsystems to be modified and adapted independently of other subsystems, whereas in a nonmodular system, modifications to one part of the system may result in deleterious side effects elsewhere in the system. But this notion of modularity and its effect on evolvability is not well quantified and is rather simplistic. In particular, modularity need not imply that intermodule dependences are weak or unimportant. In dynamical systems this is acknowledged by Simon's suggestion that, in the long term, the dynamical behaviors of subsystems do interact with one another, albeit in an "aggregate" manner--but this kind of intermodule interaction is omitted in models of modularity for evolvability. In this brief discussion we seek to unify notions of modularity in dynamical systems with notions of how modularity affects evolvability. This leads to a quantifiable measure of modularity and a different understanding of its effect on evolvability.

  17. The Leadership Game : Experiencing Dynamic Complexity under Deep Uncertainty

    NARCIS (Netherlands)

    Pruyt, E.; Segers, J.; Oruc, S.

    2011-01-01

    In this ever more complex, interconnected, and uncertain world, leadership is needed more than ever. But the literature and most leaders largely ignore dynamic complexity and deep uncertainty: only futures characterized by ever faster change, ever more (required) flexibility, and ever more scarcity

  18. Heterogeneous beliefs and routes to complex dynamics in asset pricing models with price contingent contracts

    NARCIS (Netherlands)

    Brock, W.A.; Hommes, C.H.

    2001-01-01

    This paper discusses dynamic evolutionary multi-agent systems, as introduced by Brock and Hommes (1997). In particular the heterogeneous agent dynamic asset pricing model of Brock and Hommes (1998) is extended by introducing derivative securities by means of price contingent contracts. Numerical

  19. Conceptualizing Teacher Identity as a Complex Dynamic System: The Inner Dynamics of Transformations during a Practicum

    Science.gov (United States)

    Henry, Alastair

    2016-01-01

    Currently, the inner dynamics of teacher identity transformations remain a "black box." Conceptualizing preservice teacher identity as a complex dynamic system, and the notion of "being someone who teaches" in dialogical terms as involving shifts between different teacher voices, the study investigates the dynamical processes…

  20. Data based identification and prediction of nonlinear and complex dynamical systems

    Science.gov (United States)

    Wang, Wen-Xu; Lai, Ying-Cheng; Grebogi, Celso

    2016-07-01

    The problem of reconstructing nonlinear and complex dynamical systems from measured data or time series is central to many scientific disciplines including physical, biological, computer, and social sciences, as well as engineering and economics. The classic approach to phase-space reconstruction through the methodology of delay-coordinate embedding has been practiced for more than three decades, but the paradigm is effective mostly for low-dimensional dynamical systems. Often, the methodology yields only a topological correspondence of the original system. There are situations in various fields of science and engineering where the systems of interest are complex and high dimensional with many interacting components. A complex system typically exhibits a rich variety of collective dynamics, and it is of great interest to be able to detect, classify, understand, predict, and control the dynamics using data that are becoming increasingly accessible due to the advances of modern information technology. To accomplish these goals, especially prediction and control, an accurate reconstruction of the original system is required. Nonlinear and complex systems identification aims at inferring, from data, the mathematical equations that govern the dynamical evolution and the complex interaction patterns, or topology, among the various components of the system. With successful reconstruction of the system equations and the connecting topology, it may be possible to address challenging and significant problems such as identification of causal relations among the interacting components and detection of hidden nodes. The "inverse" problem thus presents a grand challenge, requiring new paradigms beyond the traditional delay-coordinate embedding methodology. The past fifteen years have witnessed rapid development of contemporary complex graph theory with broad applications in interdisciplinary science and engineering. The combination of graph, information, and nonlinear dynamical

  1. Data based identification and prediction of nonlinear and complex dynamical systems

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Wen-Xu [School of Systems Science, Beijing Normal University, Beijing, 100875 (China); Business School, University of Shanghai for Science and Technology, Shanghai 200093 (China); Lai, Ying-Cheng, E-mail: Ying-Cheng.Lai@asu.edu [School of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ 85287 (United States); Department of Physics, Arizona State University, Tempe, AZ 85287 (United States); Institute for Complex Systems and Mathematical Biology, King’s College, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom); Grebogi, Celso [Institute for Complex Systems and Mathematical Biology, King’s College, University of Aberdeen, Aberdeen AB24 3UE (United Kingdom)

    2016-07-12

    The problem of reconstructing nonlinear and complex dynamical systems from measured data or time series is central to many scientific disciplines including physical, biological, computer, and social sciences, as well as engineering and economics. The classic approach to phase-space reconstruction through the methodology of delay-coordinate embedding has been practiced for more than three decades, but the paradigm is effective mostly for low-dimensional dynamical systems. Often, the methodology yields only a topological correspondence of the original system. There are situations in various fields of science and engineering where the systems of interest are complex and high dimensional with many interacting components. A complex system typically exhibits a rich variety of collective dynamics, and it is of great interest to be able to detect, classify, understand, predict, and control the dynamics using data that are becoming increasingly accessible due to the advances of modern information technology. To accomplish these goals, especially prediction and control, an accurate reconstruction of the original system is required. Nonlinear and complex systems identification aims at inferring, from data, the mathematical equations that govern the dynamical evolution and the complex interaction patterns, or topology, among the various components of the system. With successful reconstruction of the system equations and the connecting topology, it may be possible to address challenging and significant problems such as identification of causal relations among the interacting components and detection of hidden nodes. The “inverse” problem thus presents a grand challenge, requiring new paradigms beyond the traditional delay-coordinate embedding methodology. The past fifteen years have witnessed rapid development of contemporary complex graph theory with broad applications in interdisciplinary science and engineering. The combination of graph, information, and nonlinear

  2. Data based identification and prediction of nonlinear and complex dynamical systems

    International Nuclear Information System (INIS)

    Wang, Wen-Xu; Lai, Ying-Cheng; Grebogi, Celso

    2016-01-01

    The problem of reconstructing nonlinear and complex dynamical systems from measured data or time series is central to many scientific disciplines including physical, biological, computer, and social sciences, as well as engineering and economics. The classic approach to phase-space reconstruction through the methodology of delay-coordinate embedding has been practiced for more than three decades, but the paradigm is effective mostly for low-dimensional dynamical systems. Often, the methodology yields only a topological correspondence of the original system. There are situations in various fields of science and engineering where the systems of interest are complex and high dimensional with many interacting components. A complex system typically exhibits a rich variety of collective dynamics, and it is of great interest to be able to detect, classify, understand, predict, and control the dynamics using data that are becoming increasingly accessible due to the advances of modern information technology. To accomplish these goals, especially prediction and control, an accurate reconstruction of the original system is required. Nonlinear and complex systems identification aims at inferring, from data, the mathematical equations that govern the dynamical evolution and the complex interaction patterns, or topology, among the various components of the system. With successful reconstruction of the system equations and the connecting topology, it may be possible to address challenging and significant problems such as identification of causal relations among the interacting components and detection of hidden nodes. The “inverse” problem thus presents a grand challenge, requiring new paradigms beyond the traditional delay-coordinate embedding methodology. The past fifteen years have witnessed rapid development of contemporary complex graph theory with broad applications in interdisciplinary science and engineering. The combination of graph, information, and nonlinear

  3. Identifying protein complex by integrating characteristic of core-attachment into dynamic PPI network.

    Directory of Open Access Journals (Sweden)

    Xianjun Shen

    Full Text Available How to identify protein complex is an important and challenging task in proteomics. It would make great contribution to our knowledge of molecular mechanism in cell life activities. However, the inherent organization and dynamic characteristic of cell system have rarely been incorporated into the existing algorithms for detecting protein complexes because of the limitation of protein-protein interaction (PPI data produced by high throughput techniques. The availability of time course gene expression profile enables us to uncover the dynamics of molecular networks and improve the detection of protein complexes. In order to achieve this goal, this paper proposes a novel algorithm DCA (Dynamic Core-Attachment. It detects protein-complex core comprising of continually expressed and highly connected proteins in dynamic PPI network, and then the protein complex is formed by including the attachments with high adhesion into the core. The integration of core-attachment feature into the dynamic PPI network is responsible for the superiority of our algorithm. DCA has been applied on two different yeast dynamic PPI networks and the experimental results show that it performs significantly better than the state-of-the-art techniques in terms of prediction accuracy, hF-measure and statistical significance in biology. In addition, the identified complexes with strong biological significance provide potential candidate complexes for biologists to validate.

  4. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  5. Environmental coupling and population dynamics in the PE545 light-harvesting complex

    Energy Technology Data Exchange (ETDEWEB)

    Aghtar, Mortaza; Kleinekathöfer, Ulrich, E-mail: u.kleinekathoefer@jacobs-university.de

    2016-01-15

    Long-lived quantum coherences have been shown experimentally in the Fenna–Matthews–Olson (FMO) complex of green sulfur bacteria as well as in the phycoerythrin 545 (PE545) photosynthetic antenna system of marine algae. A combination of classical molecular dynamics simulations, quantum chemistry and quantum dynamical calculations is employed to determine the excitation transfer dynamics in PE545. One key property of the light-harvesting system concerning the excitation transfer and dephasing phenomena is the spectral density. This quantity is determined from time series of the vertical excitation energies of the aggregate. In the present study we focus on the quantum dynamical simulations using the earlier QM/MM calculations as input. Employing an ensemble-averaged classical path-based wave packet dynamics, the excitation transfer dynamics between the different bilins in the PE545 complex is determined and analyzed. Furthermore, the nature of the environmental fluctuations determining the transfer dynamics is discussed. - Highlights: • Modeling of excitation energy transfer in the light-harvesting system PE545. • Combination of molecular dynamics simulations, quantum chemistry and quantum dynamics. • Spectral densities for bilins in the PE545 complex.

  6. Emergence of dynamical order synchronization phenomena in complex systems

    CERN Document Server

    Manrubia, Susanna C; Zanette, Damián H

    2004-01-01

    Synchronization processes bring about dynamical order and lead tospontaneous development of structural organization in complex systemsof various origins, from chemical oscillators and biological cells tohuman societies and the brain. This book provides a review and adetailed theoretical analysis of synchronization phenomena in complexsystems with different architectures, composed of elements withperiodic or chaotic individual dynamics. Special attention is paid tostatistical concepts, such as nonequilibrium phase transitions, orderparameters and dynamical glasses.

  7. Tracking excited-state charge and spin dynamics in iron coordination complexes

    DEFF Research Database (Denmark)

    Zhang, Wenkai; Alonso-Mori, Roberto; Bergmann, Uwe

    2014-01-01

    to spin state, can elucidate the spin crossover dynamics of [Fe(2,2'-bipyridine)(3)](2+) on photoinduced metal-to-ligand charge transfer excitation. We are able to track the charge and spin dynamics, and establish the critical role of intermediate spin states in the crossover mechanism. We anticipate......Crucial to many light-driven processes in transition metal complexes is the absorption and dissipation of energy by 3d electrons(1-4). But a detailed understanding of such non-equilibrium excited-state dynamics and their interplay with structural changes is challenging: a multitude of excited...... states and possible transitions result in phenomena too complex to unravel when faced with the indirect sensitivity of optical spectroscopy to spin dynamics(5) and the flux limitations of ultrafast X-ray sources(6,7). Such a situation exists for archetypal poly-pyridyl iron complexes, such as [Fe(2...

  8. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Russian Academy of Sciences, Institute of Solid State Physics (Russian Federation)

    2016-11-15

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  9. One-time pad, complexity of verification of keys, and practical security of quantum cryptography

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2016-01-01

    A direct relation between the complexity of the complete verification of keys, which is one of the main criteria of security in classical systems, and a trace distance used in quantum cryptography is demonstrated. Bounds for the minimum and maximum numbers of verification steps required to determine the actual key are obtained.

  10. Synchronization in Complex Networks of Nonlinear Dynamical Systems

    CERN Document Server

    Wu, Chai Wah

    2007-01-01

    This book brings together two emerging research areas: synchronization in coupled nonlinear systems and complex networks, and study conditions under which a complex network of dynamical systems synchronizes. While there are many texts that study synchronization in chaotic systems or properties of complex networks, there are few texts that consider the intersection of these two very active and interdisciplinary research areas. The main theme of this book is that synchronization conditions can be related to graph theoretical properties of the underlying coupling topology. The book introduces ide

  11. Transparency in complex dynamic food supply chains

    NARCIS (Netherlands)

    Trienekens, J.H.; Wognum, P.M.; Beulens, A.J.M.; Vorst, van der J.G.A.J.

    2012-01-01

    Food supply chains are increasingly complex and dynamic due to (i) increasing product proliferation to serve ever diversifying and globalising markets as a form of mass customisation with resulting global flows of raw materials, ingredients and products, and (ii) the need to satisfy changing and

  12. Nuclear Power Plant Cyber Security Discrete Dynamic Event Tree Analysis (LDRD 17-0958) FY17 Report

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Timothy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Denman, Matthew R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Williams, R. A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Nevin [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jankovsky, Zachary Kyle [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-09-01

    Instrumentation and control of nuclear power is transforming from analog to modern digital assets. These control systems perform key safety and security functions. This transformation is occurring in new plant designs as well as in the existing fleet of plants as the operation of those plants is extended to 60 years. This transformation introduces new and unknown issues involving both digital asset induced safety issues and security issues. Traditional nuclear power risk assessment tools and cyber security assessment methods have not been modified or developed to address the unique nature of cyber failure modes and of cyber security threat vulnerabilities. iii This Lab-Directed Research and Development project has developed a dynamic cyber-risk in- formed tool to facilitate the analysis of unique cyber failure modes and the time sequencing of cyber faults, both malicious and non-malicious, and impose those cyber exploits and cyber faults onto a nuclear power plant accident sequence simulator code to assess how cyber exploits and cyber faults could interact with a plants digital instrumentation and control (DI&C) system and defeat or circumvent a plants cyber security controls. This was achieved by coupling an existing Sandia National Laboratories nuclear accident dynamic simulator code with a cyber emulytics code to demonstrate real-time simulation of cyber exploits and their impact on automatic DI&C responses. Studying such potential time-sequenced cyber-attacks and their risks (i.e., the associated impact and the associated degree of difficulty to achieve the attack vector) on accident management establishes a technical risk informed framework for developing effective cyber security controls for nuclear power.

  13. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security

    National Research Council Canada - National Science Library

    Ganger, Gregory

    2000-01-01

    This report contains the technical content of a recent funding proposal. In it, we propose a new approach to network security in which each individual device erects its own security perimeter and defends its own critical resources...

  14. Perceived price complexity of dynamic energy tariffs: An investigation of antecedents and consequences

    International Nuclear Information System (INIS)

    Layer, Patrick; Feurer, Sven; Jochem, Patrick

    2017-01-01

    Dynamic tariffs have the potential to contribute to a successful shift from conventional to renewable energies, but tapping this potential in Europe ultimately depends on residential consumers selecting them. This study proposes and finds that consumer reactions to dynamic tariffs depend on the level of perceived price complexity that represents the cognitive effort consumers must engage in to compute the overall bill amount. An online experiment conducted with a representative sample of 664 German residential energy consumers examines how salient characteristics of dynamic tariffs contribute to perceived price complexity. Subsequently, a structural equation model (SEM) reveals that the depth of information processing is central to understand how price complexity relates to consumers’ behavioral intentions. The results suggest that it will be challenging to convince European consumers to select complex dynamic tariffs under the current legal framework. Policymakers will need to find ways to make these tariffs more attractive. - Highlights: • Little is known about the processes by which consumers evaluate dynamic tariffs. • In this evaluation process perceived price complexity plays a central role. • Tariff type, price endings, and discount presentation format drive price complexity. • Perceived price complexity decreases the depth of information processing. • A decreased depth of information processing ultimately leads to lower behavioral intentions.

  15. Volterra representation enables modeling of complex synaptic nonlinear dynamics in large-scale simulations.

    Science.gov (United States)

    Hu, Eric Y; Bouteiller, Jean-Marie C; Song, Dong; Baudry, Michel; Berger, Theodore W

    2015-01-01

    Chemical synapses are comprised of a wide collection of intricate signaling pathways involving complex dynamics. These mechanisms are often reduced to simple spikes or exponential representations in order to enable computer simulations at higher spatial levels of complexity. However, these representations cannot capture important nonlinear dynamics found in synaptic transmission. Here, we propose an input-output (IO) synapse model capable of generating complex nonlinear dynamics while maintaining low computational complexity. This IO synapse model is an extension of a detailed mechanistic glutamatergic synapse model capable of capturing the input-output relationships of the mechanistic model using the Volterra functional power series. We demonstrate that the IO synapse model is able to successfully track the nonlinear dynamics of the synapse up to the third order with high accuracy. We also evaluate the accuracy of the IO synapse model at different input frequencies and compared its performance with that of kinetic models in compartmental neuron models. Our results demonstrate that the IO synapse model is capable of efficiently replicating complex nonlinear dynamics that were represented in the original mechanistic model and provide a method to replicate complex and diverse synaptic transmission within neuron network simulations.

  16. Complex networks: Dynamics and security

    Indian Academy of Sciences (India)

    a theory and numerical support to place the cascading phenomenon in the context .... for a given degree distribution, and self- and repeated links are forbidden. ..... Now we present numerical verification of our main result concerning the effect ...

  17. Molecular dynamics study of thermodynamic stability and dynamics of [Li(glyme)]+ complex in lithium-glyme solvate ionic liquids

    Science.gov (United States)

    Shinoda, Wataru; Hatanaka, Yuta; Hirakawa, Masashi; Okazaki, Susumu; Tsuzuki, Seiji; Ueno, Kazuhide; Watanabe, Masayoshi

    2018-05-01

    Equimolar mixtures of glymes and organic lithium salts are known to produce solvate ionic liquids, in which the stability of the [Li(glyme)]+ complex plays an important role in determining the ionic dynamics. Since these mixtures have attractive physicochemical properties for application as electrolytes, it is important to understand the dependence of the stability of the [Li(glyme)]+ complex on the ion dynamics. A series of microsecond molecular dynamics simulations has been conducted to investigate the dynamic properties of these solvate ionic liquids. Successful solvate ionic liquids with high stability of the [Li(glyme)]+ complex have been shown to have enhanced ion dynamics. Li-glyme pair exchange rarely occurs: its characteristic time is longer than that of ion diffusion by one or two orders of magnitude. Li-glyme pair exchange most likely occurs through cluster formation involving multiple [Li(glyme)]+ pairs. In this process, multiple exchanges likely take place in a concerted manner without the production of energetically unfavorable free glyme or free Li+ ions.

  18. Thinking in complexity the complex dynamics of matter, mind, and mankind

    CERN Document Server

    Mainzer, Klaus

    1994-01-01

    The theory of nonlinear complex systems has become a successful and widely used problem-solving approach in the natural sciences - from laser physics, quantum chaos and meteorology to molecular modeling in chemistry and computer simulations of cell growth in biology In recent times it has been recognized that many of the social, ecological and political problems of mankind are also of a global, complex and nonlinear nature And one of the most exciting topics of present scientific and public interest is the idea that even the human mind is governed largely by the nonlinear dynamics of complex systems In this wide-ranging but concise treatment Prof Mainzer discusses, in nontechnical language, the common framework behind these endeavours Special emphasis is given to the evolution of new structures in natural and cultural systems and it is seen clearly how the new integrative approach of complexity theory can give new insights that were not available using traditional reductionistic methods

  19. A Review of In-Office Dynamic Image Navigation for Extraction of Complex Mandibular Third Molars.

    Science.gov (United States)

    Emery, Robert W; Korj, Oxana; Agarwal, Ravi

    2017-08-01

    We performed a retrospective review of in-office removal of complex mandibular third molars with a dynamic image navigation system (DINS). A retrospective review was conducted of cases completed from 2010 to 2014 by a single oral and maxillofacial surgeon. The average age of the patients was 47 years (range, 27 to 72 years). Extraction complexity was classified with Juodzbalys and Daugela's classification system. The included study cases had complexity scores of 9 or greater. Each patient received custom intraoral splints to secure the tracking array and underwent cone beam computed tomography image acquisition. All surgical procedures were performed with a precalibrated tracking straight handpiece under dynamic navigation. All 25 cases were treated successfully with the use of the DINS. Twelve of these cases were associated with pathologic lesions. Three patients were noted to have inferior alveolar nerve paresthesia. One patient sustained a pathologic fracture at week 2. Postoperative infections were noted in 7 cases, 2 of which had a pre-existing infection. One patient reported temporary limitation of mouth opening. A coronectomy was performed in 1 case. We present results using a new technology, the DINS, for removal of complex mandibular third molars. Potential advantages are 1) improved visualization and localization of anatomic structures such as the inferior alveolar nerve, lingual cortical plate, and adjacent roots; 2) improved control during osteotomy; 3) decreased surgical access requirements and reduction in overall bone removal; 4) ability to perform complex procedures successfully in an in-office setting; 5) decreased surgical time resulting from improved visualization; and 6) potential use as a teaching tool. Possible limitations of the use of an in-office DINS include increased cost, increased time attributed to presurgical planning, initial learning curve, and optical array interference by the surgeon or assistants during surgery. Copyright

  20. Spreading dynamics on complex networks: a general stochastic approach.

    Science.gov (United States)

    Noël, Pierre-André; Allard, Antoine; Hébert-Dufresne, Laurent; Marceau, Vincent; Dubé, Louis J

    2014-12-01

    Dynamics on networks is considered from the perspective of Markov stochastic processes. We partially describe the state of the system through network motifs and infer any missing data using the available information. This versatile approach is especially well adapted for modelling spreading processes and/or population dynamics. In particular, the generality of our framework and the fact that its assumptions are explicitly stated suggests that it could be used as a common ground for comparing existing epidemics models too complex for direct comparison, such as agent-based computer simulations. We provide many examples for the special cases of susceptible-infectious-susceptible and susceptible-infectious-removed dynamics (e.g., epidemics propagation) and we observe multiple situations where accurate results may be obtained at low computational cost. Our perspective reveals a subtle balance between the complex requirements of a realistic model and its basic assumptions.

  1. Materials @ LANL: Solutions for National Security Challenges

    Science.gov (United States)

    Teter, David

    2012-10-01

    Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.

  2. Dynamic properties of epidemic spreading on finite size complex networks

    Science.gov (United States)

    Li, Ying; Liu, Yang; Shan, Xiu-Ming; Ren, Yong; Jiao, Jian; Qiu, Ben

    2005-11-01

    The Internet presents a complex topological structure, on which computer viruses can easily spread. By using theoretical analysis and computer simulation methods, the dynamic process of disease spreading on finite size networks with complex topological structure is investigated. On the finite size networks, the spreading process of SIS (susceptible-infected-susceptible) model is a finite Markov chain with an absorbing state. Two parameters, the survival probability and the conditional infecting probability, are introduced to describe the dynamic properties of disease spreading on finite size networks. Our results can help understanding computer virus epidemics and other spreading phenomena on communication and social networks. Also, knowledge about the dynamic character of virus spreading is helpful for adopting immunity policy.

  3. Dynamic coherence in excitonic molecular complexes under various excitation conditions

    Energy Technology Data Exchange (ETDEWEB)

    Chenu, Aurélia; Malý, Pavel; Mančal, Tomáš, E-mail: mancal@karlov.mff.cuni.cz

    2014-08-17

    Highlights: • Dynamic coherence does not improve energy transfer efficiency in natural conditions. • Photo-induced quantum jumps are discussed in classical context. • Natural time scale of a light excitation event is identified. • Coherence in FMO complex averages out under excitation by neighboring antenna. • This result is valid even in absence of dissipation. - Abstract: We investigate the relevance of dynamic quantum coherence in the energy transfer efficiency of molecular aggregates. We derive the time evolution of the density matrix for an open quantum system excited by light or by a neighboring antenna. Unlike in the classical case, the quantum description does not allow for a formal decomposition of the dynamics into sudden jumps in an observable quantity – an expectation value. Rather, there is a natural finite time-scale associated with the excitation process. We propose a simple experiment to test the influence of this time scale on the yield of photosynthesis. We demonstrate, using typical parameters of the Fenna–Matthews–Olson (FMO) complex and a typical energy transfer rate from the chlorosome baseplate, that dynamic coherences are averaged out in the complex even when the FMO model is completely free of all dissipation and dephasing.

  4. Practice brief. Securing wireless technology for healthcare.

    Science.gov (United States)

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  5. How complex a dynamical network can be?

    International Nuclear Information System (INIS)

    Baptista, M.S.; Kakmeni, F. Moukam; Del Magno, Gianluigi; Hussein, M.S.

    2011-01-01

    Positive Lyapunov exponents measure the asymptotic exponential divergence of nearby trajectories of a dynamical system. Not only they quantify how chaotic a dynamical system is, but since their sum is an upper bound for the rate of information production, they also provide a convenient way to quantify the complexity of a dynamical network. We conjecture based on numerical evidences that for a large class of dynamical networks composed by equal nodes, the sum of the positive Lyapunov exponents is bounded by the sum of all the positive Lyapunov exponents of both the synchronization manifold and its transversal directions, the last quantity being in principle easier to compute than the latter. As applications of our conjecture we: (i) show that a dynamical network composed of equal nodes and whose nodes are fully linearly connected produces more information than similar networks but whose nodes are connected with any other possible connecting topology; (ii) show how one can calculate upper bounds for the information production of realistic networks whose nodes have parameter mismatches, randomly chosen; (iii) discuss how to predict the behavior of a large dynamical network by knowing the information provided by a system composed of only two coupled nodes.

  6. Evolution of complex dynamics

    Science.gov (United States)

    Wilds, Roy; Kauffman, Stuart A.; Glass, Leon

    2008-09-01

    We study the evolution of complex dynamics in a model of a genetic regulatory network. The fitness is associated with the topological entropy in a class of piecewise linear equations, and the mutations are associated with changes in the logical structure of the network. We compare hill climbing evolution, in which only mutations that increase the fitness are allowed, with neutral evolution, in which mutations that leave the fitness unchanged are allowed. The simple structure of the fitness landscape enables us to estimate analytically the rates of hill climbing and neutral evolution. In this model, allowing neutral mutations accelerates the rate of evolutionary advancement for low mutation frequencies. These results are applicable to evolution in natural and technological systems.

  7. Complex Hamiltonian Dynamics

    CERN Document Server

    Bountis, Tassos

    2012-01-01

    This book introduces and explores modern developments in the well established field of Hamiltonian dynamical systems. It focuses on high degree-of-freedom systems and the transitional regimes between regular and chaotic motion. The role of nonlinear normal modes is highlighted and the importance of low-dimensional tori in the resolution of the famous FPU paradox is emphasized. Novel powerful numerical methods are used to study localization phenomena and distinguish order from strongly and weakly chaotic regimes. The emerging hierarchy of complex structures in such regimes gives rise to particularly long-lived patterns and phenomena called quasi-stationary states, which are explored in particular in the concrete setting of one-dimensional Hamiltonian lattices and physical applications in condensed matter systems.  The self-contained and pedagogical approach is blended with a unique balance between mathematical rigor, physics insights and concrete applications. End of chapter exercises and (more demanding) res...

  8. Metrical and dynamical aspects in complex analysis

    CERN Document Server

    2017-01-01

    The central theme of this reference book is the metric geometry of complex analysis in several variables. Bridging a gap in the current literature, the text focuses on the fine behavior of the Kobayashi metric of complex manifolds and its relationships to dynamical systems, hyperbolicity in the sense of Gromov and operator theory, all very active areas of research. The modern points of view expressed in these notes, collected here for the first time, will be of interest to academics working in the fields of several complex variables and metric geometry. The different topics are treated coherently and include expository presentations of the relevant tools, techniques and objects, which will be particularly useful for graduate and PhD students specializing in the area.

  9. On the Communication Complexity of Secure Function Evaluation with Long Output

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Wichs, Daniel

    2015-01-01

    We study the communication complexity of secure function evaluation (SFE). Consider a setting where Alice has a short input χA, Bob has an input χB and we want Bob to learn some function y = f(χA, χB) with large output size. For example, Alice has a small secret decryption key, Bob has a large...... value. Moreover, we show that even in an offline/online protocol, the communication of the online phase must have output-size dependence. This negative result uses an incompressibility argument and it generalizes several recent lower bounds for functional encryption and (reusable) garbled circuits...

  10. The Influence of Information Acquisition on the Complex Dynamics of Market Competition

    Science.gov (United States)

    Guo, Zhanbing; Ma, Junhai

    In this paper, we build a dynamical game model with three bounded rational players (firms) to study the influence of information on the complex dynamics of market competition, where useful information is about rival’s real decision. In this dynamical game model, one information-sharing team is composed of two firms, they acquire and share the information about their common competitor, however, they make their own decisions separately, where the amount of information acquired by this information-sharing team will determine the estimation accuracy about the rival’s real decision. Based on this dynamical game model and some creative 3D diagrams, the influence of the amount of information on the complex dynamics of market competition such as local dynamics, global dynamics and profits is studied. These results have significant theoretical and practical values to realize the influence of information.

  11. Brazilian Policy and the Creation of a Regional Security Complex in the South Atlantic: Pax Brasiliana?

    Directory of Open Access Journals (Sweden)

    Beatriz Rodrigues Bessa Mattos

    Full Text Available Abstract Over the past five years, the South Atlantic region has become a central element of Brazilian security policy, with Brazil actively supporting the notion of a trans-oceanic security consciousness involving African littoral states. It has invested in diplomatic initiatives such as the Zone of Peace and Cooperation of the South Atlantic (ZPCSA, or ZOPACAS, and extensive military co-operation with West African states such as São Tomé e Príncipe, Namibia and Cape Verde. Its internal security and defence policy documents have repeatedly been updated to reflect this dimension, and now provide the foundation for advancing these initiatives. This policy thrust is directed at securing Brazil’s offshore oil assets, and limiting the influence of what it has termed ‘extra-regional powers’ such as the P-5. This article highlights these initiatives and reviews the prospects for this policy by examining the plausibility of the South Atlantic region as a regional security complex in the sense coined by Buzan and Wæver. The analysis is based on the role of geographical and linguistic proximity in international relations, and the impact of multilateral bodies on building support for a regional approach to security governance.

  12. Dynamic security issues in autonomous power systems with increasing wind power penetration

    DEFF Research Database (Denmark)

    Margaris, I.D.; Hansen, Anca Daniela; Sørensen, Poul Ejnar

    2011-01-01

    Asynchronous Generator (DFAG) and Permanent Magnet Synchronous Generator (PMSG) – are applied and issues regarding interaction with the power system are investigated. This paper provides conclusions about the dynamic security of non-interconnected power systems with high wind power penetration based...... on a complete model representation of the individual components of the system; three different types of conventional generators are included in the model, while the protection system is also incorporated. The load shedding following faults is finally discussed....

  13. A Memristor-Based Hyperchaotic Complex Lü System and Its Adaptive Complex Generalized Synchronization

    Directory of Open Access Journals (Sweden)

    Shibing Wang

    2016-02-01

    Full Text Available This paper introduces a new memristor-based hyperchaotic complex Lü system (MHCLS and investigates its adaptive complex generalized synchronization (ACGS. Firstly, the complex system is constructed based on a memristor-based hyperchaotic real Lü system, and its properties are analyzed theoretically. Secondly, its dynamical behaviors, including hyperchaos, chaos, transient phenomena, as well as periodic behaviors, are explored numerically by means of bifurcation diagrams, Lyapunov exponents, phase portraits, and time history diagrams. Thirdly, an adaptive controller and a parameter estimator are proposed to realize complex generalized synchronization and parameter identification of two identical MHCLSs with unknown parameters based on Lyapunov stability theory. Finally, the numerical simulation results of ACGS and its applications to secure communication are presented to verify the feasibility and effectiveness of the proposed method.

  14. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  15. Complex Human Dynamics From Mind to Societies

    CERN Document Server

    Winkowska-Nowak, Katarzyna; Brée, David

    2013-01-01

    This book, edited and authored by a closely collaborating network of social scientists and psychologists, recasts typical research topics in these fields into the language of nonlinear, dynamic and complex systems. The aim is to provide scientists with different backgrounds - physics, applied mathematics and computer sciences - with the opportunity to apply the tools of their trade to an altogether new range of possible applications. At the same time, this book will serve as a first reference for a new generation of social scientists and psychologists wishing to familiarize themselves with the new methodology and the "thinking in complexity".

  16. Markovian dynamics on complex reaction networks

    Energy Technology Data Exchange (ETDEWEB)

    Goutsias, J., E-mail: goutsias@jhu.edu; Jenkinson, G., E-mail: jenkinson@jhu.edu

    2013-08-10

    Complex networks, comprised of individual elements that interact with each other through reaction channels, are ubiquitous across many scientific and engineering disciplines. Examples include biochemical, pharmacokinetic, epidemiological, ecological, social, neural, and multi-agent networks. A common approach to modeling such networks is by a master equation that governs the dynamic evolution of the joint probability mass function of the underlying population process and naturally leads to Markovian dynamics for such process. Due however to the nonlinear nature of most reactions and the large size of the underlying state-spaces, computation and analysis of the resulting stochastic population dynamics is a difficult task. This review article provides a coherent and comprehensive coverage of recently developed approaches and methods to tackle this problem. After reviewing a general framework for modeling Markovian reaction networks and giving specific examples, the authors present numerical and computational techniques capable of evaluating or approximating the solution of the master equation, discuss a recently developed approach for studying the stationary behavior of Markovian reaction networks using a potential energy landscape perspective, and provide an introduction to the emerging theory of thermodynamic analysis of such networks. Three representative problems of opinion formation, transcription regulation, and neural network dynamics are used as illustrative examples.

  17. Markovian dynamics on complex reaction networks

    International Nuclear Information System (INIS)

    Goutsias, J.; Jenkinson, G.

    2013-01-01

    Complex networks, comprised of individual elements that interact with each other through reaction channels, are ubiquitous across many scientific and engineering disciplines. Examples include biochemical, pharmacokinetic, epidemiological, ecological, social, neural, and multi-agent networks. A common approach to modeling such networks is by a master equation that governs the dynamic evolution of the joint probability mass function of the underlying population process and naturally leads to Markovian dynamics for such process. Due however to the nonlinear nature of most reactions and the large size of the underlying state-spaces, computation and analysis of the resulting stochastic population dynamics is a difficult task. This review article provides a coherent and comprehensive coverage of recently developed approaches and methods to tackle this problem. After reviewing a general framework for modeling Markovian reaction networks and giving specific examples, the authors present numerical and computational techniques capable of evaluating or approximating the solution of the master equation, discuss a recently developed approach for studying the stationary behavior of Markovian reaction networks using a potential energy landscape perspective, and provide an introduction to the emerging theory of thermodynamic analysis of such networks. Three representative problems of opinion formation, transcription regulation, and neural network dynamics are used as illustrative examples

  18. Annual Storm Water Report for the Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  19. Annual Storm Water Report for the Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Clean Water Compliance Section of the Environment Compliance Department

    2012-01-01

    The storm water pollution prevention program at the Y-12 National Security Complex (Y-12 Complex) intends to protect the quality of storm water runoff through: (1) reducing the exposure of metal accumulation areas to precipitation, (2) implementation of Best Management Practices, (3) sampling during rain events and subsequent analysis, and (4) routine surveillances. When prescribed, the analytical data is compared to a set of cut-off concentration values to determine how the Y-12 Complex relates to other metal fabrication industries in the state of Tennessee. The quality of the storm water exiting the Y-12 Complex via East Fork Poplar Creek indicated some improvement in 2011. This improvement is attributable to the completion of several construction, demolition and remediation projects which occurred in 2010 and 2011. Emphasis will continue to be placed on site inspections and the timely implementation of improved storm water control measures as deemed necessary.

  20. Complex agro-ecosystems for food security in a changing climate

    Science.gov (United States)

    Khumairoh, Uma; Groot, Jeroen CJ; Lantinga, Egbert A

    2012-01-01

    Attempts to increase food crop yields by intensifying agricultural systems using high inputs of nonrenewable resources and chemicals frequently lead to de-gradation of natural resources, whereas most technological innovations are not accessible for smallholders that represent the majority of farmers world wide. Alternatively, cocultures consisting of assemblages of plant and animal species can support ecological processes of nutrient cycling and pest control, which may lead to increasing yields and declining susceptibility to extreme weather conditions with increasing complexity of the systems. Here we show that enhancing the complexity of a rice production system by adding combinations of compost, azolla, ducks, and fish resulted in strongly increased grain yields and revenues in a season with extremely adverse weather conditions on East Java, Indonesia. We found that azolla, duck, and fish increased plant nutrient content, tillering and leaf area expansion, and strongly reduced the density of six different pests. In the most complex system comprising all components the highest grain yield was obtained. The net revenues of this system from sales of rice grain, fish, and ducks, after correction for extra costs, were 114% higher than rice cultivation with only compost as fertilizer. These results provide more insight in the agro-ecological processes and demonstrate how complex agricultural systems can contribute to food security in a changing climate. If smallholders can be trained to manage these systems and are supported for initial investments by credits, their livelihoods can be improved while producing in an ecologically benign way. PMID:22957173

  1. Anticipating the unintended consequences of security dynamics.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.; Saltiel, David H.; Simon Paul Moulton

    2010-01-01

    In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognized nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.

  2. Complex, Dynamic Systems: A New Transdisciplinary Theme for Applied Linguistics?

    Science.gov (United States)

    Larsen-Freeman, Diane

    2012-01-01

    In this plenary address, I suggest that Complexity Theory has the potential to contribute a transdisciplinary theme to applied linguistics. Transdisciplinary themes supersede disciplines and spur new kinds of creative activity (Halliday 2001 [1990]). Investigating complex systems requires researchers to pay attention to system dynamics. Since…

  3. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    OpenAIRE

    J. Noorul Ameen; J. Jamal Mohamed; N. Nilofer Begam

    2014-01-01

    Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers) the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamic...

  4. Understanding the Complexity of Temperature Dynamics in Xinjiang, China, from Multitemporal Scale and Spatial Perspectives

    Directory of Open Access Journals (Sweden)

    Jianhua Xu

    2013-01-01

    Full Text Available Based on the observed data from 51 meteorological stations during the period from 1958 to 2012 in Xinjiang, China, we investigated the complexity of temperature dynamics from the temporal and spatial perspectives by using a comprehensive approach including the correlation dimension (CD, classical statistics, and geostatistics. The main conclusions are as follows (1 The integer CD values indicate that the temperature dynamics are a complex and chaotic system, which is sensitive to the initial conditions. (2 The complexity of temperature dynamics decreases along with the increase of temporal scale. To describe the temperature dynamics, at least 3 independent variables are needed at daily scale, whereas at least 2 independent variables are needed at monthly, seasonal, and annual scales. (3 The spatial patterns of CD values at different temporal scales indicate that the complex temperature dynamics are derived from the complex landform.

  5. Capturing Dynamics in the Power Grid: Formulation of Dynamic State Estimation through Data Assimilation

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Ning [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Huang, Zhenyu [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Meng, Da [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Elbert, Stephen T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Wang, Shaobu [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Diao, Ruisheng [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2014-03-31

    With the increasing complexity resulting from uncertainties and stochastic variations introduced by intermittent renewable energy sources, responsive loads, mobile consumption of plug-in vehicles, and new market designs, more and more dynamic behaviors are observed in everyday power system operation. To operate a power system efficiently and reliably, it is critical to adopt a dynamic paradigm so that effective control actions can be taken in time. The dynamic paradigm needs to include three fundamental components: dynamic state estimation; look-ahead dynamic simulation; and dynamic contingency analysis (Figure 1). These three components answer three basic questions: where the system is; where the system is going; and how secure the system is against accidents. The dynamic state estimation provides a solid cornerstone to support the other 2 components and is the focus of this study.

  6. Analysis of Instantaneous Linear, Nonlinear and Complex Cardiovascular Dynamics from Videophotoplethysmography.

    Science.gov (United States)

    Valenza, Gaetano; Iozzia, Luca; Cerina, Luca; Mainardi, Luca; Barbieri, Riccardo

    2018-05-01

    There is a fast growing interest in the use of non-contact devices for health and performance assessment in humans. In particular, the use of non-contact videophotoplethysmography (vPPG) has been recently demonstrated as a feasible way to extract cardiovascular information. Nevertheless, proper validation of vPPG-derived heartbeat dynamics is still missing. We aim to an in-depth validation of time-varying, linear and nonlinear/complex dynamics of the pulse rate variability extracted from vPPG. We apply inhomogeneous pointprocess nonlinear models to assess instantaneous measures defined in the time, frequency, and bispectral domains as estimated through vPPG and standard ECG. Instantaneous complexity measures, such as the instantaneous Lyapunov exponents and the recently defined inhomogeneous point-process approximate and sample entropy, were estimated as well. Video recordings were processed using our recently proposed method based on zerophase principal component analysis. Experimental data were gathered from 60 young healthy subjects (age: 24±3 years) undergoing postural changes (rest-to-stand maneuver). Group averaged results show that there is an overall agreement between linear and nonlinear/complexity indices computed from ECG and vPPG during resting state conditions. However, important differences are found, particularly in the bispectral and complexity domains, in recordings where the subjects has been instructed to stand up. Although significant differences exist between cardiovascular estimates from vPPG and ECG, it is very promising that instantaneous sympathovagal changes, as well as time-varying complex dynamics, were correctly identified, especially during resting state. In addition to a further improvement of the video signal quality, more research is advocated towards a more precise estimation of cardiovascular dynamics by a comprehensive nonlinear/complex paradigm specifically tailored to the non-contact quantification. Schattauer GmbH.

  7. Adaptive Synchronization of Fractional Order Complex-Variable Dynamical Networks via Pinning Control

    Science.gov (United States)

    Ding, Da-Wei; Yan, Jie; Wang, Nian; Liang, Dong

    2017-09-01

    In this paper, the synchronization of fractional order complex-variable dynamical networks is studied using an adaptive pinning control strategy based on close center degree. Some effective criteria for global synchronization of fractional order complex-variable dynamical networks are derived based on the Lyapunov stability theory. From the theoretical analysis, one concludes that under appropriate conditions, the complex-variable dynamical networks can realize the global synchronization by using the proper adaptive pinning control method. Meanwhile, we succeed in solving the problem about how much coupling strength should be applied to ensure the synchronization of the fractional order complex networks. Therefore, compared with the existing results, the synchronization method in this paper is more general and convenient. This result extends the synchronization condition of the real-variable dynamical networks to the complex-valued field, which makes our research more practical. Finally, two simulation examples show that the derived theoretical results are valid and the proposed adaptive pinning method is effective. Supported by National Natural Science Foundation of China under Grant No. 61201227, National Natural Science Foundation of China Guangdong Joint Fund under Grant No. U1201255, the Natural Science Foundation of Anhui Province under Grant No. 1208085MF93, 211 Innovation Team of Anhui University under Grant Nos. KJTD007A and KJTD001B, and also supported by Chinese Scholarship Council

  8. Complexity, fractal dynamics and determinism in treadmill ambulation: Implications for clinical biomechanists.

    Science.gov (United States)

    Hollman, John H; Watkins, Molly K; Imhoff, Angela C; Braun, Carly E; Akervik, Kristen A; Ness, Debra K

    2016-08-01

    Reduced inter-stride complexity during ambulation may represent a pathologic state. Evidence is emerging that treadmill training for rehabilitative purposes may constrain the locomotor system and alter gait dynamics in a way that mimics pathological states. The purpose of this study was to examine the dynamical system components of gait complexity, fractal dynamics and determinism during treadmill ambulation. Twenty healthy participants aged 23.8 (1.2) years walked at preferred walking speeds for 6min on a motorized treadmill and overground while wearing APDM 6 Opal inertial monitors. Stride times, stride lengths and peak sagittal plane trunk velocities were measured. Mean values and estimates of complexity, fractal dynamics and determinism were calculated for each parameter. Data were compared between overground and treadmill walking conditions. Mean values for each gait parameter were statistically equivalent between overground and treadmill ambulation (P>0.05). Through nonlinear analyses, however, we found that complexity in stride time signals (P<0.001), and long-range correlations in stride time and stride length signals (P=0.005 and P=0.024, respectively), were reduced on the treadmill. Treadmill ambulation induces more predictable inter-stride time dynamics and constrains fluctuations in stride times and stride lengths, which may alter feedback from destabilizing perturbations normally experienced by the locomotor control system during overground ambulation. Treadmill ambulation, therefore, may provide less opportunity for experiencing the adaptability necessary to successfully ambulate overground. Investigators and clinicians should be aware that treadmill ambulation will alter dynamic gait characteristics. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Capturing complexity in work disability research: application of system dynamics modeling methodology.

    Science.gov (United States)

    Jetha, Arif; Pransky, Glenn; Hettinger, Lawrence J

    2016-01-01

    Work disability (WD) is characterized by variable and occasionally undesirable outcomes. The underlying determinants of WD outcomes include patterns of dynamic relationships among health, personal, organizational and regulatory factors that have been challenging to characterize, and inadequately represented by contemporary WD models. System dynamics modeling (SDM) methodology applies a sociotechnical systems thinking lens to view WD systems as comprising a range of influential factors linked by feedback relationships. SDM can potentially overcome limitations in contemporary WD models by uncovering causal feedback relationships, and conceptualizing dynamic system behaviors. It employs a collaborative and stakeholder-based model building methodology to create a visual depiction of the system as a whole. SDM can also enable researchers to run dynamic simulations to provide evidence of anticipated or unanticipated outcomes that could result from policy and programmatic intervention. SDM may advance rehabilitation research by providing greater insights into the structure and dynamics of WD systems while helping to understand inherent complexity. Challenges related to data availability, determining validity, and the extensive time and technical skill requirements for model building may limit SDM's use in the field and should be considered. Contemporary work disability (WD) models provide limited insight into complexity associated with WD processes. System dynamics modeling (SDM) has the potential to capture complexity through a stakeholder-based approach that generates a simulation model consisting of multiple feedback loops. SDM may enable WD researchers and practitioners to understand the structure and behavior of the WD system as a whole, and inform development of improved strategies to manage straightforward and complex WD cases.

  10. Outlier-resilient complexity analysis of heartbeat dynamics

    Science.gov (United States)

    Lo, Men-Tzung; Chang, Yi-Chung; Lin, Chen; Young, Hsu-Wen Vincent; Lin, Yen-Hung; Ho, Yi-Lwun; Peng, Chung-Kang; Hu, Kun

    2015-03-01

    Complexity in physiological outputs is believed to be a hallmark of healthy physiological control. How to accurately quantify the degree of complexity in physiological signals with outliers remains a major barrier for translating this novel concept of nonlinear dynamic theory to clinical practice. Here we propose a new approach to estimate the complexity in a signal by analyzing the irregularity of the sign time series of its coarse-grained time series at different time scales. Using surrogate data, we show that the method can reliably assess the complexity in noisy data while being highly resilient to outliers. We further apply this method to the analysis of human heartbeat recordings. Without removing any outliers due to ectopic beats, the method is able to detect a degradation of cardiac control in patients with congestive heart failure and a more degradation in critically ill patients whose life continuation relies on extracorporeal membrane oxygenator (ECMO). Moreover, the derived complexity measures can predict the mortality of ECMO patients. These results indicate that the proposed method may serve as a promising tool for monitoring cardiac function of patients in clinical settings.

  11. Improving the security of optoelectronic delayed feedback system by parameter modulation and system coupling

    Science.gov (United States)

    Liu, Lingfeng; Miao, Suoxia; Cheng, Mengfan; Gao, Xiaojing

    2016-02-01

    A coupled system with varying parameters is proposed to improve the security of optoelectronic delayed feedback system. This system is coupled by two parameter-varied optoelectronic delayed feedback systems with chaotic modulation. Dynamics performance results show that this system has a higher complexity compared to the original one. Furthermore, this system can conceal the time delay effectively against the autocorrelation function and delayed mutual information method and can increase the dimension space of secure parameters to resist brute-force attack by introducing the digital chaotic systems.

  12. Adaptive control of structural balance for complex dynamical networks based on dynamic coupling of nodes

    Science.gov (United States)

    Gao, Zilin; Wang, Yinhe; Zhang, Lili

    2018-02-01

    In the existing research results of the complex dynamical networks controlled, the controllers are mainly used to guarantee the synchronization or stabilization of the nodes’ state, and the terms coupled with connection relationships may affect the behaviors of nodes, this obviously ignores the dynamic common behavior of the connection relationships between the nodes. In fact, from the point of view of large-scale system, a complex dynamical network can be regarded to be composed of two time-varying dynamic subsystems, which can be called the nodes subsystem and the connection relationships subsystem, respectively. Similar to the synchronization or stabilization of the nodes subsystem, some characteristic phenomena can be also emerged in the connection relationships subsystem. For example, the structural balance in the social networks and the synaptic facilitation in the biological neural networks. This paper focuses on the structural balance in dynamic complex networks. Generally speaking, the state of the connection relationships subsystem is difficult to be measured accurately in practical applications, and thus it is not easy to implant the controller directly into the connection relationships subsystem. It is noted that the nodes subsystem and the relationships subsystem are mutually coupled, which implies that the state of the connection relationships subsystem can be affected by the controllable state of nodes subsystem. Inspired by this observation, by using the structural balance theory of triad, the controller with the parameter adaptive law is proposed for the nodes subsystem in this paper, which may ensure the connection relationship matrix to approximate a given structural balance matrix in the sense of the uniformly ultimately bounded (UUB). That is, the structural balance may be obtained by employing the controlling state of the nodes subsystem. Finally, the simulations are used to show the validity of the method in this paper.

  13. INVESTMENT ACTIVITY OF AGRIBUSINESS IN THE AGROINDUSTRIAL COMPLEX REGION, AS ONE OF THE ELEMENTS OF THE FINANCIAL SECURITY OF THE AGRO-INDUSTRIAL COMPLEX OF THE STATE

    Directory of Open Access Journals (Sweden)

    Olga Nikolaevna Uglitskikh

    2015-09-01

    Full Text Available The developed economic-political situation around of Russia, specifies an indispensability of support of agricultural commodity producers as from their financial well-being, investment activity the financial security of agrarian and industrial complex of the state depends. Limitation of own financial resources at agrarians does not allow them to realize independently conceived projects. Studying of questions of formation and functioning of investment activity in agriculture of Stavropol Territory and an assessment of investment projects offered to reali-zation, have allowed to analyse investment activity of agrarian and industrial complex of region up to the introduction of Russia into WTO and in conditions of its membership. By results of the lead assessment the administrative areas of region showing the greatest investment activity, threats of a financial security of agrarian and industrial complex of region not putting by the activity have been revealed. It is drawn a conclusion on influence West-American sanctions on financial without-danger agra-rian and industrial complex of the state and the responsibility сельхозтоваропроизводителей about delivery of agricultural production in necessary volume and import substitution.

  14. Autonomous Collision-Free Navigation of Microvehicles in Complex and Dynamically Changing Environments.

    Science.gov (United States)

    Li, Tianlong; Chang, Xiaocong; Wu, Zhiguang; Li, Jinxing; Shao, Guangbin; Deng, Xinghong; Qiu, Jianbin; Guo, Bin; Zhang, Guangyu; He, Qiang; Li, Longqiu; Wang, Joseph

    2017-09-26

    Self-propelled micro- and nanoscale robots represent a rapidly emerging and fascinating robotics research area. However, designing autonomous and adaptive control systems for operating micro/nanorobotics in complex and dynamically changing environments, which is a highly demanding feature, is still an unmet challenge. Here we describe a smart microvehicle for precise autonomous navigation in complicated environments and traffic scenarios. The fully autonomous navigation system of the smart microvehicle is composed of a microscope-coupled CCD camera, an artificial intelligence planner, and a magnetic field generator. The microscope-coupled CCD camera provides real-time localization of the chemically powered Janus microsphere vehicle and environmental detection for path planning to generate optimal collision-free routes, while the moving direction of the microrobot toward a reference position is determined by the external electromagnetic torque. Real-time object detection offers adaptive path planning in response to dynamically changing environments. We demonstrate that the autonomous navigation system can guide the vehicle movement in complex patterns, in the presence of dynamically changing obstacles, and in complex biological environments. Such a navigation system for micro/nanoscale vehicles, relying on vision-based close-loop control and path planning, is highly promising for their autonomous operation in complex dynamic settings and unpredictable scenarios expected in a variety of realistic nanoscale scenarios.

  15. Ultra-fast secure communication with complex systems in classical channels (Conference Presentation)

    KAUST Repository

    Mazzone, Valerio

    2017-04-28

    Developing secure communications is a research area of growing interest. During the past years, several cryptographic schemes have been developed, with Quantum cryptography being a promising scheme due to the use of quantum effects, which make very difficult for an eavesdropper to intercept the communication. However, practical quantum key distribution methods have encountered several limitations; current experimental realizations, in fact, fail to scale up on long distances, as well as in providing unconditional security and speed comparable to classical optical communications channels. Here we propose a new, low cost and ultra-fast cryptographic system based on a fully classical optical channel. Our cryptographic scheme exploits the complex synchronization of two different random systems (one on the side of the sender and another on the side of the receiver) to realize a “physical” one paid system. The random medium is created by an optical chip fabricated through electron beam lithography on a Silicon On Insulator (SOI) substrate. We present experiments with ps lasers and commercial fibers, showing the ultrafast distribution of a random key between two users (Alice and Bob), with absolute no possibility for a passive/active eavesdropper to intercept the communication. Remarkably, this system enables the same security of quantum cryptography, but with the use of a classical communication channel. Our system exploits a unique synchronization that exists between two different random systems, and at such is extremely versatile and can enable safe communications among different users in standards telecommunications channels.

  16. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  17. Complex and adaptive dynamical systems a primer

    CERN Document Server

    Gros, Claudius

    2013-01-01

    Complex system theory is rapidly developing and gaining importance, providing tools and concepts central to our modern understanding of emergent phenomena. This primer offers an introduction to this area together with detailed coverage of the mathematics involved. All calculations are presented step by step and are straightforward to follow. This new third edition comes with new material, figures and exercises. Network theory, dynamical systems and information theory, the core of modern complex system sciences, are developed in the first three chapters, covering basic concepts and phenomena like small-world networks, bifurcation theory and information entropy. Further chapters use a modular approach to address the most important concepts in complex system sciences, with the emergence and self-organization playing a central role. Prominent examples are self-organized criticality in adaptive systems, life at the edge of chaos, hypercycles and coevolutionary avalanches, synchronization phenomena, absorbing phase...

  18. Modelling the dynamics of the health-production complex in livestock herds

    DEFF Research Database (Denmark)

    Sørensen, J.T.; Enevoldsen, Carsten

    1992-01-01

    This paper reviews how the dynamics of the health-production complex in livestock herds is mimicked by livestock herd simulation models. Twelve models simulating the dynamics of dairy, beef, sheep and sow herds were examined. All models basically included options to alter input and output...

  19. Evolutionary dynamics of complex communications networks

    CERN Document Server

    Karyotis, Vasileios; Papavassiliou, Symeon

    2013-01-01

    Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology-closing the network design loop in an evolutionary fashion similar to

  20. A Single-Cell Biochemistry Approach Reveals PAR Complex Dynamics during Cell Polarization.

    Science.gov (United States)

    Dickinson, Daniel J; Schwager, Francoise; Pintard, Lionel; Gotta, Monica; Goldstein, Bob

    2017-08-21

    Regulated protein-protein interactions are critical for cell signaling, differentiation, and development. For the study of dynamic regulation of protein interactions in vivo, there is a need for techniques that can yield time-resolved information and probe multiple protein binding partners simultaneously, using small amounts of starting material. Here we describe a single-cell protein interaction assay. Single-cell lysates are generated at defined time points and analyzed using single-molecule pull-down, yielding information about dynamic protein complex regulation in vivo. We established the utility of this approach by studying PAR polarity proteins, which mediate polarization of many animal cell types. We uncovered striking regulation of PAR complex composition and stoichiometry during Caenorhabditis elegans zygote polarization, which takes place in less than 20 min. PAR complex dynamics are linked to the cell cycle by Polo-like kinase 1 and govern the movement of PAR proteins to establish polarity. Our results demonstrate an approach to study dynamic biochemical events in vivo. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. Complex dynamics in the development of the first tarsal segment of Drosophila melanogaster

    Directory of Open Access Journals (Sweden)

    Juan Nicolas Malagon

    2016-09-01

    Full Text Available Gene, protein and cell interactions are vital for the development of a multicellular organism. As a result, complexity theory can be a fundamental tool to understand how diverse developmental and evolutionary processes occur. However, in most scientific programs these two fields are separated. In an effort to create a connection between the Evo-devo and complexity science, this article shows how the cell dynamics of epithelia can display behaviours with similar features to complex systems. Here, I propose that these cell dynamics, in addition to control cell density in epithelia, can provide high evolvability to this type of tissue. To achieve this goal, I used a as a systems the development of Drosophila melanogaster front legs. First, I provide an example in which order at the tissue level emerge from apparently random cell dynamics. Then, I show that small modifications in epithelial cellular components can produce highly organized or the opposite random cell dynamics. Therefore, this work shows that a developing epithelium displays signs of complex behaviours and I propose that the feedback between tension and cellular processes are key for understanding how multicellular organisms development and evolve. Such studies may reveal the mechanistic basis of complex processes that bridge several levels of organization.

  2. Complex Security System for Premises Under Conditions of Large Volume of Passenger Traffic

    Directory of Open Access Journals (Sweden)

    Yakubov Vladimir

    2016-01-01

    Full Text Available Subsystems of the design of a complex security system for premises under conditions of large volume of passenger traffic are considered. These subsystems provide video- and thermal imaging control, radio wave tomography, and gas analysis. Simultaneous application of all examined variants will essentially increase the probability of timely prevention of dangerous situations with the probability of false alarm as low as possible. It is important that finally, this will provide protection of population and will facilitate the work of intelligence services.

  3. Application of learning from examples methods for on-line dynamic security assessment of electric power systems - state of the art

    Energy Technology Data Exchange (ETDEWEB)

    Pecas Lopes, J.A. [Universidade do Porto, Porto (Portugal). Faculdade de Engenharia] Hatziargyriou, Nikos D. [National Technical University of Athens, Athens (Greece)

    1994-12-31

    This paper provides an overview of the application of `learning from examples` techniques like pattern recognition, artificial neural networks and decision trees, when used for fast dynamic security assessment. Problems concerning the system security evaluation relatively to transient stability and voltage stability are addressed with more details and references to research works in this field are briefly described. (author) 44 refs., 3 tabs.

  4. Identifying Complex Dynamics in Social Systems: A New Methodological Approach Applied to Study School Segregation

    Science.gov (United States)

    Spaiser, Viktoria; Hedström, Peter; Ranganathan, Shyam; Jansson, Kim; Nordvik, Monica K.; Sumpter, David J. T.

    2018-01-01

    It is widely recognized that segregation processes are often the result of complex nonlinear dynamics. Empirical analyses of complex dynamics are however rare, because there is a lack of appropriate empirical modeling techniques that are capable of capturing complex patterns and nonlinearities. At the same time, we know that many social phenomena…

  5. Nonlinear dynamics, chaos and complex cardiac arrhythmias

    Science.gov (United States)

    Glass, L.; Courtemanche, M.; Shrier, A.; Goldberger, A. L.

    1987-01-01

    Periodic stimulation of a nonlinear cardiac oscillator in vitro gives rise to complex dynamics that is well described by one-dimensional finite difference equations. As stimulation parameters are varied, a large number of different phase-locked and chaotic rhythms is observed. Similar rhythms can be observed in the intact human heart when there is interaction between two pacemaker sites. Simplified models are analyzed, which show some correspondence to clinical observations.

  6. Dynamic and interacting complex networks

    Science.gov (United States)

    Dickison, Mark E.

    This thesis employs methods of statistical mechanics and numerical simulations to study some aspects of dynamic and interacting complex networks. The mapping of various social and physical phenomena to complex networks has been a rich field in the past few decades. Subjects as broad as petroleum engineering, scientific collaborations, and the structure of the internet have all been analyzed in a network physics context, with useful and universal results. In the first chapter we introduce basic concepts in networks, including the two types of network configurations that are studied and the statistical physics and epidemiological models that form the framework of the network research, as well as covering various previously-derived results in network theory that are used in the work in the following chapters. In the second chapter we introduce a model for dynamic networks, where the links or the strengths of the links change over time. We solve the model by mapping dynamic networks to the problem of directed percolation, where the direction corresponds to the time evolution of the network. We show that the dynamic network undergoes a percolation phase transition at a critical concentration pc, that decreases with the rate r at which the network links are changed. The behavior near criticality is universal and independent of r. We find that for dynamic random networks fundamental laws are changed: i) The size of the giant component at criticality scales with the network size N for all values of r, rather than as N2/3 in static network, ii) In the presence of a broad distribution of disorder, the optimal path length between two nodes in a dynamic network scales as N1/2, compared to N1/3 in a static network. The third chapter consists of a study of the effect of quarantine on the propagation of epidemics on an adaptive network of social contacts. For this purpose, we analyze the susceptible-infected-recovered model in the presence of quarantine, where susceptible

  7. Central Asia as a Regional Security Complex from the Perspectives of Realism, Liberalism and Constructivism

    Directory of Open Access Journals (Sweden)

    Caroline Putri Pratama

    2013-05-01

    Full Text Available Tulisan ini bertujuan menganalisis kawasan Asia Tengah, dilihat dari perspektif Realisme, Liberalisme dan Konstruktivisme, melalui teori Regional Security Complex oleh Barry Buzan dan Ole Waever. Teori ini hendak menunjukkan keamanan regional berdasarkan interdependensi antar unit dalam kawasan dilihat dari struktur power dan proses sekuritisasi di dalamnya, demikian pola hubungan keamanan dalam kawasan Asia Tengah berusaha dijelaskan dengan elemen-elemen dari ketiga paradigma yang terdapat dalam teori tersebut. Hasil analisis tulisan ini menunjukkan bahwa Asia Tengah dipandang sebagai bentuk insecurity interdependence by external forces dari perspektif Realis, security interdependence by interest dari perspektif Liberalis dan securitization interdependence by understanding of threat/security dari perspektif Konstruktivis. Kompleks keamanan Asia Tengah termasuk dalam tipe kompleks keamanan Great Power, terlihat dari peran besar kekuatan-kekuatan eksternal terutama Rusia dan Cina dalam kawasan tersebut; baik dalam pembentukan pola pertemanan dengan kerjasama, pola permusuhan dengan persaingan dan ketakutan, juga proses sekuritisasi isu separatisme, ekstremisme dan terorisme sebagai ancaman terhadap keamanan regional.Tulisan ini diambil dari tugas karya akhir penulis yang diajukan untuk medapatkan gelar Sarjana Sosial dari Departemen Ilmu Hubungan Internasional, Universitas Indonesia.

  8. SecurID

    CERN Multimedia

    Now called RSA SecurID, SecurID is a mechanism developed by Security Dynamics that allows two-factor authentication for a user on a network resource. It works on the principle of the unique password mode, based on a shared secret. Every sixty seconds, the component generates a new six-digit token on the screen. The latter comes from the current time (internal clock) and the seed (SecurID private key that is available on the component, and is also from the SecurID server). During an authentication request, the SecurID server will check the entered token by performing exactly the same calculation as that performed by your component. The server knows the two information required for this calculation: the current time and the seed of your component. Access is allowed if the token calculated by the server matches the token you specified.

  9. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    Energy Technology Data Exchange (ETDEWEB)

    Castro, Javier Arturo Orjuela; Jaimes, Wilson Adarme

    2017-07-01

    Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC). This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  10. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    Directory of Open Access Journals (Sweden)

    Javier Arturo Orjuela Castro

    2017-10-01

    Full Text Available Purpose: Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC. This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  11. Dynamic impact of the structure of the supply chain of perishable foods on logistics performance and food security

    International Nuclear Information System (INIS)

    Castro, Javier Arturo Orjuela; Jaimes, Wilson Adarme

    2017-01-01

    Understanding how the structure affects logistical performance and food security is critical in the supply chains of perishable foods (PFSC). This research proposes a system dynamics model to analyze the effects of structures: lean, agile, flexible, responsive and resilient, in the overall performance and of each agent of the PFSC. Design/methodology/approach: Using a system dynamics model and design of experiments it is studied how the different structures and their combination, affect the behavior of inventory, transportation, responsiveness, efficiency, availability and quality-safety of the fresh fruits supply chain and each echelon. Findings: The studies of supply chains have been done for each structure in an independent way; investigations are scarce in supply chains of perishable foods. The structures modeled in this research do not show the better performance in all the metrics of the chain, neither in all agents for each structure. The above implies the presence of trade-offs. Research limitations/implications: The results show the need to investigate mixed structures with the FPSC´s own characteristics; the model can be applied in other supply chains of perishable foods. Practical implications: Management by combining structures in the FFSC, improves logistics performance and contributes to food security. Social implications: The agents of the FFSC can apply the structures found in this study, to improve their logistics performance and the food security. Originality/value: The dynamics of individual and combined structures were identified, which constitutes a contribution to the discussion in the literature of such problems for FFSC. The model includes six echelons: farmers, wholesalers, agro-industry, third-party logistics operators and retailers. The dynamic contemplates deterioration rate to model perishability and others losses.

  12. Metric-Aware Secure Service Orchestration

    Directory of Open Access Journals (Sweden)

    Gabriele Costa

    2012-12-01

    Full Text Available Secure orchestration is an important concern in the internet of service. Next to providing the required functionality the composite services must also provide a reasonable level of security in order to protect sensitive data. Thus, the orchestrator has a need to check whether the complex service is able to satisfy certain properties. Some properties are expressed with metrics for precise definition of requirements. Thus, the problem is to analyse the values of metrics for a complex business process. In this paper we extend our previous work on analysis of secure orchestration with quantifiable properties. We show how to define, verify and enforce quantitative security requirements in one framework with other security properties. The proposed approach should help to select the most suitable service architecture and guarantee fulfilment of the declared security requirements.

  13. Automated X-ray television complex for testing large dynamic objects

    International Nuclear Information System (INIS)

    Gusev, E.A.; Luk'yanenko, Eh.A.; Chelnokov, V.B.; Kuleshov, V.K.; Alkhimov, Yu.V.

    1992-01-01

    An automated X-ray television complex on the base of matrix gas-dischage large-area (2.1x1.0 m) converter for testing large cargoes and containers, as well as for inductrial article diagnostics is described. The complex pulsed operation with the 512 kbytes television digital memory unit provides for testing dynamic objects under minimal doses (20-100 μR)

  14. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  15. Software complex for developing dynamically packed program system for experiment automation

    International Nuclear Information System (INIS)

    Baluka, G.; Salamatin, I.M.

    1985-01-01

    Software complex for developing dynamically packed program system for experiment automation is considered. The complex includes general-purpose programming systems represented as the RT-11 standard operating system and specially developed problem-oriented moduli providing execution of certain jobs. The described complex is realized in the PASKAL' and MAKRO-2 languages and it is rather flexible to variations of the technique of the experiment

  16. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Directory of Open Access Journals (Sweden)

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  17. Dynamic Security Assessment Of Computer Networks In Siem-Systems

    Directory of Open Access Journals (Sweden)

    Elena Vladimirovna Doynikova

    2015-10-01

    Full Text Available The paper suggests an approach to the security assessment of computer networks. The approach is based on attack graphs and intended for Security Information and Events Management systems (SIEM-systems. Key feature of the approach consists in the application of the multilevel security metrics taxonomy. The taxonomy allows definition of the system profile according to the input data used for the metrics calculation and techniques of security metrics calculation. This allows specification of the security assessment in near real time, identification of previous and future attacker steps, identification of attackers goals and characteristics. A security assessment system prototype is implemented for the suggested approach. Analysis of its operation is conducted for several attack scenarios.

  18. Complexity, Chaos, and Nonlinear Dynamics: A New Perspective on Career Development Theory

    Science.gov (United States)

    Bloch, Deborah P.

    2005-01-01

    The author presents a theory of career development drawing on nonlinear dynamics and chaos and complexity theories. Career is presented as a complex adaptive entity, a fractal of the human entity. Characteristics of complex adaptive entities, including (a) autopiesis, or self-regeneration; (b) open exchange; (c) participation in networks; (d)…

  19. Controlling collective dynamics in complex minority-game resource-allocation systems

    Science.gov (United States)

    Zhang, Ji-Qiang; Huang, Zi-Gang; Dong, Jia-Qi; Huang, Liang; Lai, Ying-Cheng

    2013-05-01

    Resource allocation takes place in various kinds of real-world complex systems, such as traffic systems, social services institutions or organizations, or even ecosystems. The fundamental principle underlying complex resource-allocation dynamics is Boolean interactions associated with minority games, as resources are generally limited and agents tend to choose the least used resource based on available information. A common but harmful dynamical behavior in resource-allocation systems is herding, where there are time intervals during which a large majority of the agents compete for a few resources, leaving many other resources unused. Accompanying the herd behavior is thus strong fluctuations with time in the number of resources being used. In this paper, we articulate and establish that an intuitive control strategy, namely pinning control, is effective at harnessing the herding dynamics. In particular, by fixing the choices of resources for a few agents while leaving the majority of the agents free, herding can be eliminated completely. Our investigation is systematic in that we consider random and targeted pinning and a variety of network topologies, and we carry out a comprehensive analysis in the framework of mean-field theory to understand the working of control. The basic philosophy is then that, when a few agents waive their freedom to choose resources by receiving sufficient incentives, the majority of the agents benefit in that they will make fair, efficient, and effective use of the available resources. Our work represents a basic and general framework to address the fundamental issue of fluctuations in complex dynamical systems with significant applications to social, economical, and political systems.

  20. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  1. Practical synchronization on complex dynamical networks via optimal pinning control

    Science.gov (United States)

    Li, Kezan; Sun, Weigang; Small, Michael; Fu, Xinchu

    2015-07-01

    We consider practical synchronization on complex dynamical networks under linear feedback control designed by optimal control theory. The control goal is to minimize global synchronization error and control strength over a given finite time interval, and synchronization error at terminal time. By utilizing the Pontryagin's minimum principle, and based on a general complex dynamical network, we obtain an optimal system to achieve the control goal. The result is verified by performing some numerical simulations on Star networks, Watts-Strogatz networks, and Barabási-Albert networks. Moreover, by combining optimal control and traditional pinning control, we propose an optimal pinning control strategy which depends on the network's topological structure. Obtained results show that optimal pinning control is very effective for synchronization control in real applications.

  2. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  3. Dynamic behavior and chaos control in a complex Riccati-type map ...

    African Journals Online (AJOL)

    This paper is devoted to analyze the dynamic behavior of a Riccati- type map with complex variables and complex parameters. Fixed points and their asymptotic stability are studied. Lyapunov exponent is computed to indicate chaos. Bifurcation and chaos are discussed. Chaotic behavior of the map has been controlled by ...

  4. Macroscopic description of complex adaptive networks coevolving with dynamic node states

    Science.gov (United States)

    Wiedermann, Marc; Donges, Jonathan F.; Heitzig, Jobst; Lucht, Wolfgang; Kurths, Jürgen

    2015-05-01

    In many real-world complex systems, the time evolution of the network's structure and the dynamic state of its nodes are closely entangled. Here we study opinion formation and imitation on an adaptive complex network which is dependent on the individual dynamic state of each node and vice versa to model the coevolution of renewable resources with the dynamics of harvesting agents on a social network. The adaptive voter model is coupled to a set of identical logistic growth models and we mainly find that, in such systems, the rate of interactions between nodes as well as the adaptive rewiring probability are crucial parameters for controlling the sustainability of the system's equilibrium state. We derive a macroscopic description of the system in terms of ordinary differential equations which provides a general framework to model and quantify the influence of single node dynamics on the macroscopic state of the network. The thus obtained framework is applicable to many fields of study, such as epidemic spreading, opinion formation, or socioecological modeling.

  5. The system of innovative development of the agroindustrial complex in order to ensure the economic security of the region

    Directory of Open Access Journals (Sweden)

    T. I. Ovchinnikova

    2017-01-01

    Full Text Available The basis for innovative development of the agroindustrial complex is the goals, principles and methods that determine the economic security of the region. The category of “economic security”is often identified with the sustainability, competitiveness and risk-free economy of agricultural and processing enterprises. Ensuring the economically safe functioning of all industries and spheres of regional agribusiness is impossible without interconnection with science and education. The most important principles necessary for the formation in the regional and national agribusinesses of a developed economically secure market of scientific, technical and innovative products for agroindustrial purposes are the following: providing the scientific and research sphere of the agro-industrial complex with highly qualified personnel; ensuring real freedom and independence in the activities of research institutions; the formation of a common interdependent economic space and interest; organization of specialized market structures in the field of research and innovation development; development and application within the regional agro-industrial complex of a scientifically grounded economic mechanism for regulating the functioning and stimulating the development of the market for scientific and technical innovation products. Purposeful development of the civilized market of scientific, technical and innovative products of agro-industrial design with its corresponding structures and organizational-economic mechanism is an objective necessity of functioning of economic security of the national economy. The interests of the economic and food security of the region and the state as a whole need to increase the financing of the agricultural sector and the processing industry to a level that will overcome the investment and innovation crisis caused by sanctions. To this end, we believe it is necessary to finance the innovative investment agrarian fund at the

  6. Synchronization criterion for Lur'e type complex dynamical networks with time-varying delay

    International Nuclear Information System (INIS)

    Ji, D.H.; Park, Ju H.; Yoo, W.J.; Won, S.C.; Lee, S.M.

    2010-01-01

    In this Letter, the synchronization problem for a class of complex dynamical networks in which every identical node is a Lur'e system with time-varying delay is considered. A delay-dependent synchronization criterion is derived for the synchronization of complex dynamical network that represented by Lur'e system with sector restricted nonlinearities. The derived criterion is a sufficient condition for absolute stability of error dynamics between the each nodes and the isolated node. Using a convex representation of the nonlinearity for error dynamics, the stability condition based on the discretized Lyapunov-Krasovskii functional is obtained via LMI formulation. The proposed delay-dependent synchronization criterion is less conservative than the existing ones. The effectiveness of our work is verified through numerical examples.

  7. PREFACE: Complex dynamics of fluids in disordered and crowded environments Complex dynamics of fluids in disordered and crowded environments

    Science.gov (United States)

    Coslovich, Daniele; Kahl, Gerhard; Krakoviack, Vincent

    2011-06-01

    Over the past two decades, the dynamics of fluids under nanoscale confinement has attracted much attention. Motivation for this rapidly increasing interest is based on both practical and fundamental reasons. On the practical and rather applied side, problems in a wide range of scientific topics, such as polymer and colloidal sciences, rheology, geology, or biophysics, benefit from a profound understanding of the dynamical behaviour of confined fluids. Further, effects similar to those observed in confinement are expected in fluids whose constituents have strong size or mass asymmetry, and in biological systems where crowding and obstruction phenomena in the cytosol are responsible for clear separations of time scales for macromolecular transport in the cell. In fundamental research, on the other hand, the interest focuses on the complex interplay between confinement and structural relaxation, which is responsible for the emergence of new phenomena in the dynamics of the system: in confinement, geometric constraints associated with the pore shape are imposed to the adsorbed fluids and an additional characteristic length scale, i.e. the pore size, comes into play. For many years, the topic has been mostly experimentally driven. Indeed, a broad spectrum of systems has been investigated by sophisticated experimental techniques, while theoretical and simulation studies were rather scarce due to conceptual and computational issues. In the past few years, however, theory and simulations could largely catch up with experiments. On one side, new theories have been put forward that duly take into account the porosity, the connectivity, and the randomness of the confinement. On the other side, the ever increasing available computational power now allows investigations that were far out of reach a few years ago. Nowadays, instead of isolated state points, systematic investigations on the dynamics of confined fluids, covering a wide range of system parameters, can be realized

  8. Between security and military identities: The case of Israeli security experts

    NARCIS (Netherlands)

    Grassiani, E.

    2018-01-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis

  9. Network dynamics and its relationships to topology and coupling structure in excitable complex networks

    International Nuclear Information System (INIS)

    Zhang Li-Sheng; Mi Yuan-Yuan; Gu Wei-Feng; Hu Gang

    2014-01-01

    All dynamic complex networks have two important aspects, pattern dynamics and network topology. Discovering different types of pattern dynamics and exploring how these dynamics depend on network topologies are tasks of both great theoretical importance and broad practical significance. In this paper we study the oscillatory behaviors of excitable complex networks (ECNs) and find some interesting dynamic behaviors of ECNs in oscillatory probability, the multiplicity of oscillatory attractors, period distribution, and different types of oscillatory patterns (e.g., periodic, quasiperiodic, and chaotic). In these aspects, we further explore strikingly sharp differences among network dynamics induced by different topologies (random or scale-free topologies) and different interaction structures (symmetric or asymmetric couplings). The mechanisms behind these differences are explained physically. (interdisciplinary physics and related areas of science and technology)

  10. Exponential Synchronization of Uncertain Complex Dynamical Networks with Delay Coupling

    International Nuclear Information System (INIS)

    Wang Lifu; Kong Zhi; Jing Yuanwei

    2010-01-01

    This paper studies the global exponential synchronization of uncertain complex delayed dynamical networks. The network model considered is general dynamical delay networks with unknown network structure and unknown coupling functions but bounded. Novel delay-dependent linear controllers are designed via the Lyapunov stability theory. Especially, it is shown that the controlled networks are globally exponentially synchronized with a given convergence rate. An example of typical dynamical network of this class, having the Lorenz system at each node, has been used to demonstrate and verify the novel design proposed. And, the numerical simulation results show the effectiveness of proposed synchronization approaches. (general)

  11. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  12. Dynamics of complexation of a charged dendrimer by linear polyelectrolyte: Computer modelling

    NARCIS (Netherlands)

    Lyulin, S.V.; Darinskii, A.A.; Lyulin, A.V.

    2007-01-01

    Brownian-dynamics simulations have been performed for complexes formed by a charged dendrimer and a long oppositely charged linear polyelectrolyte when overcharging phenomenon is always observed. After a complex formation the orientational mobility of the individual dendrimer bonds, the fluctuations

  13. Structure identification and adaptive synchronization of uncertain general complex dynamical networks

    International Nuclear Information System (INIS)

    Xu Yuhua; Zhou Wuneng; Fang Jian'an; Lu Hongqian

    2009-01-01

    This Letter proposes an approach to identify the topological structure and unknown parameters for uncertain general complex networks simultaneously. By designing effective adaptive controllers, we achieve synchronization between two complex networks. The unknown network topological structure and system parameters of uncertain general complex dynamical networks are identified simultaneously in the process of synchronization. Several useful criteria for synchronization are given. Finally, an illustrative example is presented to demonstrate the application of the theoretical results.

  14. Structure identification and adaptive synchronization of uncertain general complex dynamical networks

    Energy Technology Data Exchange (ETDEWEB)

    Xu Yuhua, E-mail: yuhuaxu2004@163.co [College of Information Science and Technology, Donghua University, Shanghai 201620 (China) and Department of Maths, Yunyang Teacher' s College, Hubei 442000 (China); Zhou Wuneng, E-mail: wnzhou@163.co [College of Information Science and Technology, Donghua University, Shanghai 201620 (China); Fang Jian' an [College of Information Science and Technology, Donghua University, Shanghai 201620 (China); Lu Hongqian [Shandong Institute of Light Industry, Shandong Jinan 250353 (China)

    2009-12-28

    This Letter proposes an approach to identify the topological structure and unknown parameters for uncertain general complex networks simultaneously. By designing effective adaptive controllers, we achieve synchronization between two complex networks. The unknown network topological structure and system parameters of uncertain general complex dynamical networks are identified simultaneously in the process of synchronization. Several useful criteria for synchronization are given. Finally, an illustrative example is presented to demonstrate the application of the theoretical results.

  15. Optimal dimensionality reduction of complex dynamics: the chess game as diffusion on a free-energy landscape.

    Science.gov (United States)

    Krivov, Sergei V

    2011-07-01

    Dimensionality reduction is ubiquitous in the analysis of complex dynamics. The conventional dimensionality reduction techniques, however, focus on reproducing the underlying configuration space, rather than the dynamics itself. The constructed low-dimensional space does not provide a complete and accurate description of the dynamics. Here I describe how to perform dimensionality reduction while preserving the essential properties of the dynamics. The approach is illustrated by analyzing the chess game--the archetype of complex dynamics. A variable that provides complete and accurate description of chess dynamics is constructed. The winning probability is predicted by describing the game as a random walk on the free-energy landscape associated with the variable. The approach suggests a possible way of obtaining a simple yet accurate description of many important complex phenomena. The analysis of the chess game shows that the approach can quantitatively describe the dynamics of processes where human decision-making plays a central role, e.g., financial and social dynamics.

  16. Complex Dynamical Network Control for Trajectory Tracking Using Delayed Recurrent Neural Networks

    Directory of Open Access Journals (Sweden)

    Jose P. Perez

    2014-01-01

    Full Text Available In this paper, the problem of trajectory tracking is studied. Based on the V-stability and Lyapunov theory, a control law that achieves the global asymptotic stability of the tracking error between a delayed recurrent neural network and a complex dynamical network is obtained. To illustrate the analytic results, we present a tracking simulation of a dynamical network with each node being just one Lorenz’s dynamical system and three identical Chen’s dynamical systems.

  17. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  18. System crash as dynamics of complex networks.

    Science.gov (United States)

    Yu, Yi; Xiao, Gaoxi; Zhou, Jie; Wang, Yubo; Wang, Zhen; Kurths, Jürgen; Schellnhuber, Hans Joachim

    2016-10-18

    Complex systems, from animal herds to human nations, sometimes crash drastically. Although the growth and evolution of systems have been extensively studied, our understanding of how systems crash is still limited. It remains rather puzzling why some systems, appearing to be doomed to fail, manage to survive for a long time whereas some other systems, which seem to be too big or too strong to fail, crash rapidly. In this contribution, we propose a network-based system dynamics model, where individual actions based on the local information accessible in their respective system structures may lead to the "peculiar" dynamics of system crash mentioned above. Extensive simulations are carried out on synthetic and real-life networks, which further reveal the interesting system evolution leading to the final crash. Applications and possible extensions of the proposed model are discussed.

  19. Topology Detection for Output-Coupling Weighted Complex Dynamical Networks with Coupling and Transmission Delays

    Directory of Open Access Journals (Sweden)

    Xinwei Wang

    2017-01-01

    Full Text Available Topology detection for output-coupling weighted complex dynamical networks with two types of time delays is investigated in this paper. Different from existing literatures, coupling delay and transmission delay are simultaneously taken into account in the output-coupling network. Based on the idea of the state observer, we build the drive-response system and apply LaSalle’s invariance principle to the error dynamical system of the drive-response system. Several convergent criteria are deduced in the form of algebraic inequalities. Some numerical simulations for the complex dynamical network, with node dynamics being chaotic, are given to verify the effectiveness of the proposed scheme.

  20. Using Small Models for Big Issues : Exploratory System Dynamics Modelling and Analysis for Insightful Crisis Management

    NARCIS (Netherlands)

    Pruyt, E.

    2010-01-01

    The main goal of this paper is to explain and illustrate different exploratory uses of small System Dynamics models for analysis and decision support in case of dynamically complex issues that are deeply uncertain. The applied focuss of the paper is the field of inter/national safety and security.

  1. Protein complexes and cholesterol in the control of late endosomal dynamicsCholesterol and multi-protein complexes in the control of late endosomal dynamics

    NARCIS (Netherlands)

    Kant, Rik Henricus Nicolaas van der

    2013-01-01

    Late endosomal transport is disrupted in several diseases such as Niemann-Pick type C, ARC syndrome and Alzheimer’s disease. This thesis describes the regulation of late endosomal dynamics by cholesterol and multi-protein complexes. We find that cholesterol acts as a cellular tomtom that steers the

  2. Architecting security with Paradigm

    NARCIS (Netherlands)

    Andova, S.; Groenewegen, L.P.J.; Verschuren, J.H.S.; Vink, de E.P.; Lemos, de R.; Fabre, J.C.; Gacek, C.; Gadducci, F.; Beek, ter M.

    2009-01-01

    For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through

  3. Transmission grid security

    CERN Document Server

    Haarla, Liisa; Hirvonen, Ritva; Labeau, Pierre-Etienne

    2011-01-01

    In response to the growing importance of power system security and reliability, ""Transmission Grid Security"" proposes a systematic and probabilistic approach for transmission grid security analysis. The analysis presented uses probabilistic safety assessment (PSA) and takes into account the power system dynamics after severe faults. In the method shown in this book the power system states (stable, not stable, system breakdown, etc.) are connected with the substation reliability model. In this way it is possible to: estimate the system-wide consequences of grid faults; identify a chain of eve

  4. Game theory and extremal optimization for community detection in complex dynamic networks.

    Science.gov (United States)

    Lung, Rodica Ioana; Chira, Camelia; Andreica, Anca

    2014-01-01

    The detection of evolving communities in dynamic complex networks is a challenging problem that recently received attention from the research community. Dynamics clearly add another complexity dimension to the difficult task of community detection. Methods should be able to detect changes in the network structure and produce a set of community structures corresponding to different timestamps and reflecting the evolution in time of network data. We propose a novel approach based on game theory elements and extremal optimization to address dynamic communities detection. Thus, the problem is formulated as a mathematical game in which nodes take the role of players that seek to choose a community that maximizes their profit viewed as a fitness function. Numerical results obtained for both synthetic and real-world networks illustrate the competitive performance of this game theoretical approach.

  5. Complex and adaptive dynamical systems a primer

    CERN Document Server

    Gros, Claudius

    2015-01-01

    This primer offers readers an introduction to the central concepts that form our modern understanding of complex and emergent behavior, together with detailed coverage of accompanying mathematical methods. All calculations are presented step by step and are easy to follow. This new fourth edition has been fully reorganized and includes new chapters, figures and exercises. The core aspects of modern complex system sciences are presented in the first chapters, covering network theory, dynamical systems, bifurcation and catastrophe theory, chaos and adaptive processes, together with the principle of self-organization in reaction-diffusion systems and social animals. Modern information theoretical principles are treated in further chapters, together with the concept of self-organized criticality, gene regulation networks, hypercycles and coevolutionary avalanches, synchronization phenomena, absorbing phase transitions and the cognitive system approach to the brain. Technical course prerequisites are the standard ...

  6. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  7. Transition Manifolds of Complex Metastable Systems: Theory and Data-Driven Computation of Effective Dynamics.

    Science.gov (United States)

    Bittracher, Andreas; Koltai, Péter; Klus, Stefan; Banisch, Ralf; Dellnitz, Michael; Schütte, Christof

    2018-01-01

    We consider complex dynamical systems showing metastable behavior, but no local separation of fast and slow time scales. The article raises the question of whether such systems exhibit a low-dimensional manifold supporting its effective dynamics. For answering this question, we aim at finding nonlinear coordinates, called reaction coordinates, such that the projection of the dynamics onto these coordinates preserves the dominant time scales of the dynamics. We show that, based on a specific reducibility property, the existence of good low-dimensional reaction coordinates preserving the dominant time scales is guaranteed. Based on this theoretical framework, we develop and test a novel numerical approach for computing good reaction coordinates. The proposed algorithmic approach is fully local and thus not prone to the curse of dimension with respect to the state space of the dynamics. Hence, it is a promising method for data-based model reduction of complex dynamical systems such as molecular dynamics.

  8. Synchronization of complex chaotic systems in series expansion form

    International Nuclear Information System (INIS)

    Ge Zhengming; Yang Chenghsiung

    2007-01-01

    This paper studies the synchronization of complex chaotic systems in series expansion form by Lyapunov asymptotical stability theorem. A sufficient condition is given for the asymptotical stability of an error dynamics, and is applied to guiding the design of the secure communication. Finally, numerical results are studied for the Quantum-CNN oscillators synchronizing with unidirectional/bidirectional linear coupling to show the effectiveness of the proposed synchronization strategy

  9. Chaperone-client complexes: A dynamic liaison

    Science.gov (United States)

    Hiller, Sebastian; Burmann, Björn M.

    2018-04-01

    Living cells contain molecular chaperones that are organized in intricate networks to surveil protein homeostasis by avoiding polypeptide misfolding, aggregation, and the generation of toxic species. In addition, cellular chaperones also fulfill a multitude of alternative functionalities: transport of clients towards a target location, help them fold, unfold misfolded species, resolve aggregates, or deliver clients towards proteolysis machineries. Until recently, the only available source of atomic resolution information for virtually all chaperones were crystal structures of their client-free, apo-forms. These structures were unable to explain details of the functional mechanisms underlying chaperone-client interactions. The difficulties to crystallize chaperones in complexes with clients arise from their highly dynamic nature, making solution NMR spectroscopy the method of choice for their study. With the advent of advanced solution NMR techniques, in the past few years a substantial number of structural and functional studies on chaperone-client complexes have been resolved, allowing unique insight into the chaperone-client interaction. This review summarizes the recent insights provided by advanced high-resolution NMR-spectroscopy to understand chaperone-client interaction mechanisms at the atomic scale.

  10. Logic-based hierarchies for modeling behavior of complex dynamic systems with applications

    International Nuclear Information System (INIS)

    Hu, Y.S.; Modarres, M.

    2000-01-01

    Most complex systems are best represented in the form of a hierarchy. The Goal Tree Success Tree and Master Logic Diagram (GTST-MLD) are proven powerful hierarchic methods to represent complex snap-shot of plant knowledge. To represent dynamic behaviors of complex systems, fuzzy logic is applied to replace binary logic to extend the power of GTST-MLD. Such a fuzzy-logic-based hierarchy is called Dynamic Master Logic Diagram (DMLD). This chapter discusses comparison of the use of GTST-DMLD when applied as a modeling tool for systems whose relationships are modeled by either physical, binary logical or fuzzy logical relationships. This is shown by applying GTST-DMLD to the Direct Containment Heating (DCH) phenomenon at pressurized water reactors which is an important safety issue being addressed by the nuclear industry. (orig.)

  11. Security matters : privacy in voting and fairness in digital exchange

    NARCIS (Netherlands)

    Jonker, H.L.

    2009-01-01

    Security matters. In the real world, there are various basic mechanisms that provide security. The digital counterparts of these basic mechanisms have been studied and are now well understood. Understanding of more complex security notions has yet to mature. This thesis studies two complex security

  12. SAInt – A novel quasi-dynamic model for assessing security of supply in coupled gas and electricity transmission networks

    NARCIS (Netherlands)

    Pambour, Kwabena Addo; Cakir Erdener, Burcin; Bolado-Lavin, Ricardo; Dijkema, Gerhard P.J.

    2017-01-01

    The integration of renewable energy sources into existing electric power systems is connected with an increased interdependence between natural gas and electricity transmission networks. To analyse this interdependence and its impact on security of supply, we developed a novel quasi-dynamic

  13. The Comprehensive Approach to Assessing the Economic Security of the Industry Sector in Conditions of Globalization

    Directory of Open Access Journals (Sweden)

    Denysov Oleg Ye.

    2018-01-01

    Full Text Available The author carries out an empirical study of the level of economic security of the chemical industry sector of Ukraine in the direction of «production of polyvinyl chlorides». For this purpose the integral index of economic security has been calculated according to the model of functional-component blocks of economic security of sector, developed by the author. Application of this model allowed to research the algorithm of action of the model on the factual basis and to analyze the obtained indicators. This, in turn, made possible to draw a conclusion about the constructiveness and expediency of application of the model of basic functional-component blocks for calculating the level of economic security of the industry sector. With the help of this approach, with application of the complex, system-structural, dynamic and functional approaches, the level of economic security has been defined and the process of monitoring the status and level of economic security of the industry sector has been ensured.

  14. Adaptive Synchronization between Two Different Complex Networks with Time-Varying Delay Coupling

    International Nuclear Information System (INIS)

    Jian-Rui, Chen; Li-Cheng, Jiao; Jian-She, Wu; Xiao-Hua, Wang

    2009-01-01

    A new general network model for two complex networks with time-varying delay coupling is presented. Then we investigate its synchronization phenomena. The two complex networks of the model differ in dynamic nodes, the number of nodes and the coupling connections. By using adaptive controllers, a synchronization criterion is derived. Numerical examples are given to demonstrate the effectiveness of the obtained synchronization criterion. This study may widen the application range of synchronization, such as in chaotic secure communication. (general)

  15. Methodology for Simulation and Analysis of Complex Adaptive Supply Network Structure and Dynamics Using Information Theory

    Directory of Open Access Journals (Sweden)

    Joshua Rodewald

    2016-10-01

    Full Text Available Supply networks existing today in many industries can behave as complex adaptive systems making them more difficult to analyze and assess. Being able to fully understand both the complex static and dynamic structures of a complex adaptive supply network (CASN are key to being able to make more informed management decisions and prioritize resources and production throughout the network. Previous efforts to model and analyze CASN have been impeded by the complex, dynamic nature of the systems. However, drawing from other complex adaptive systems sciences, information theory provides a model-free methodology removing many of those barriers, especially concerning complex network structure and dynamics. With minimal information about the network nodes, transfer entropy can be used to reverse engineer the network structure while local transfer entropy can be used to analyze the network structure’s dynamics. Both simulated and real-world networks were analyzed using this methodology. Applying the methodology to CASNs allows the practitioner to capitalize on observations from the highly multidisciplinary field of information theory which provides insights into CASN’s self-organization, emergence, stability/instability, and distributed computation. This not only provides managers with a more thorough understanding of a system’s structure and dynamics for management purposes, but also opens up research opportunities into eventual strategies to monitor and manage emergence and adaption within the environment.

  16. Complex dynamics analysis of impulsively coupled Duffing oscillators with ring structure

    International Nuclear Information System (INIS)

    Jiang Hai-Bo; Zhang Li-Ping; Yu Jian-Jiang

    2015-01-01

    Impulsively coupled systems are high-dimensional non-smooth systems that can exhibit rich and complex dynamics. This paper studies the complex dynamics of a non-smooth system which is unidirectionally impulsively coupled by three Duffing oscillators in a ring structure. By constructing a proper Poincaré map of the non-smooth system, an analytical expression of the Jacobian matrix of Poincaré map is given. Two-parameter Hopf bifurcation sets are obtained by combining the shooting method and the Runge–Kutta method. When the period is fixed and the coupling strength changes, the system undergoes stable, periodic, quasi-periodic, and hyper-chaotic solutions, etc. Floquet theory is used to study the stability of the periodic solutions of the system and their bifurcations. (paper)

  17. Outer synchronization between two different fractional-order general complex dynamical networks

    International Nuclear Information System (INIS)

    Xiang-Jun, Wu; Hong-Tao, Lu

    2010-01-01

    Outer synchronization between two different fractional-order general complex dynamical networks is investigated in this paper. Based on the stability theory of the fractional-order system, the sufficient criteria for outer synchronization are derived analytically by applying the nonlinear control and the bidirectional coupling methods. The proposed synchronization method is applicable to almost all kinds of coupled fractional-order general complex dynamical networks. Neither a symmetric nor irreducible coupling configuration matrix is required. In addition, no constraint is imposed on the inner-coupling matrix. Numerical examples are also provided to demonstrate the validity of the presented synchronization scheme. Numeric evidence shows that both the feedback strength k and the fractional order α can be chosen appropriately to adjust the synchronization effect effectively. (general)

  18. The heterogeneous dynamics of economic complexity.

    Science.gov (United States)

    Cristelli, Matthieu; Tacchella, Andrea; Pietronero, Luciano

    2015-01-01

    What will be the growth of the Gross Domestic Product (GDP) or the competitiveness of China, United States, and Vietnam in the next 3, 5 or 10 years? Despite this kind of questions has a large societal impact and an extreme value for economic policy making, providing a scientific basis for economic predictability is still a very challenging problem. Recent results of a new branch--Economic Complexity--have set the basis for a framework to approach such a challenge and to provide new perspectives to cast economic prediction into the conceptual scheme of forecasting the evolution of a dynamical system as in the case of weather dynamics. We argue that a recently introduced non-monetary metrics for country competitiveness (fitness) allows for quantifying the hidden growth potential of countries by the means of the comparison of this measure for intangible assets with monetary figures, such as GDP per capita. This comparison defines the fitness-income plane where we observe that country dynamics presents strongly heterogeneous patterns of evolution. The flow in some zones is found to be laminar while in others a chaotic behavior is instead observed. These two regimes correspond to very different predictability features for the evolution of countries: in the former regime, we find strong predictable pattern while the latter scenario exhibits a very low predictability. In such a framework, regressions, the usual tool used in economics, are no more the appropriate strategy to deal with such a heterogeneous scenario and new concepts, borrowed from dynamical systems theory, are mandatory. We therefore propose a data-driven method--the selective predictability scheme--in which we adopt a strategy similar to the methods of analogues, firstly introduced by Lorenz, to assess future evolution of countries.

  19. Authentication and Data Security in ITS Telecommunications Solutions

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2014-04-01

    Full Text Available Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.

  20. Adaptive synchronization of the complex dynamical network with non-derivative and derivative coupling

    Energy Technology Data Exchange (ETDEWEB)

    Xu Yuhua, E-mail: yuhuaxu2004@163.co [College of Information Science and Technology, Donghua University, Shanghai 201620 (China) and Department of Maths, Yunyang Teachers' College, Hubei 442000 (China); Zhou Wuneng, E-mail: wnzhou@163.co [College of Information Science and Technology, Donghua University, Shanghai 201620 (China); Fang Jian' an [College of Information Science and Technology, Donghua University, Shanghai 201620 (China); Sun Wen [School of Mathematics and Information, Yangtze University, Hubei Jingzhou 434023 (China)

    2010-04-05

    This Letter investigates the synchronization of a general complex dynamical network with non-derivative and derivative coupling. Based on LaSalle's invariance principle, adaptive synchronization criteria are obtained. Analytical result shows that under the designed adaptive controllers, a general complex dynamical network with non-derivative and derivative coupling can asymptotically synchronize to a given trajectory, and several useful criteria for synchronization are given. What is more, the coupling matrix is not assumed to be symmetric or irreducible. Finally, simulations results show the method is effective.

  1. ?Choice Set? for health behavior in choice-constrained settings to frame research and inform policy: examples of food consumption, obesity and food security

    OpenAIRE

    Dover, Robert V. H.; Lambert, Estelle V.

    2016-01-01

    Objectives Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. Methods A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. Results and discussion We suggest that heal...

  2. Using chemistry and microfluidics to understand the spatial dynamics of complex biological networks.

    Science.gov (United States)

    Kastrup, Christian J; Runyon, Matthew K; Lucchetta, Elena M; Price, Jessica M; Ismagilov, Rustem F

    2008-04-01

    Understanding the spatial dynamics of biochemical networks is both fundamentally important for understanding life at the systems level and also has practical implications for medicine, engineering, biology, and chemistry. Studies at the level of individual reactions provide essential information about the function, interactions, and localization of individual molecular species and reactions in a network. However, analyzing the spatial dynamics of complex biochemical networks at this level is difficult. Biochemical networks are nonequilibrium systems containing dozens to hundreds of reactions with nonlinear and time-dependent interactions, and these interactions are influenced by diffusion, flow, and the relative values of state-dependent kinetic parameters. To achieve an overall understanding of the spatial dynamics of a network and the global mechanisms that drive its function, networks must be analyzed as a whole, where all of the components and influential parameters of a network are simultaneously considered. Here, we describe chemical concepts and microfluidic tools developed for network-level investigations of the spatial dynamics of these networks. Modular approaches can be used to simplify these networks by separating them into modules, and simple experimental or computational models can be created by replacing each module with a single reaction. Microfluidics can be used to implement these models as well as to analyze and perturb the complex network itself with spatial control on the micrometer scale. We also describe the application of these network-level approaches to elucidate the mechanisms governing the spatial dynamics of two networkshemostasis (blood clotting) and early patterning of the Drosophila embryo. To investigate the dynamics of the complex network of hemostasis, we simplified the network by using a modular mechanism and created a chemical model based on this mechanism by using microfluidics. Then, we used the mechanism and the model to

  3. Small System dynamics models for big issues : Triple jump towards real-world complexity

    NARCIS (Netherlands)

    Pruyt, E.

    2013-01-01

    System Dynamics (SD) is a method to describe, model, simulate and analyze dynamically complex issues and/or systems in terms of the processes, information, organizational boundaries and strategies. Quantitative SD modeling, simulation and analysis facilitates the (re)design of systems and design of

  4. The dynamic behavior of the exohedral transition metal complexes ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Chemical Sciences; Volume 129; Issue 7. The dynamic behavior of the exohedral transition metal complexes of B₄₀ : η⁶- and η⁷-B₄₀Cr(CO) ₃ and Cr(CO) ₃η⁷-B₄η₀-Cr(CO) ₃. NAIWRIT KARMODAK ELUVATHINGAL D JEMMIS. REGULAR ARTICLE Volume 129 Issue 7 July 2017 pp ...

  5. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  6. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    Science.gov (United States)

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  7. Very Low Food Security in US Households Is Predicted by Complex Patterns of Health, Economics, and Service Participation.

    Science.gov (United States)

    Choi, Seul Ki; Fram, Maryah S; Frongillo, Edward A

    2017-10-01

    Background: Very low food security (VLFS) happens at the intersection of nuanced and complex patterns of risk characteristics across multiple domains. Little is known about the idiosyncratic situations that lead households to experience VLFS. Objective: We used classification and regression tree (CART) analysis, which can handle complex combinations of predictors, to identify patterns of characteristics that distinguish VLFS households in the United States from other households. Methods: Data came from 3 surveys, the 2011-2014 National Health Interview Survey (NHIS), the 2005-2012 NHANES, and the 2002-2012 Current Population Survey (CPS), with sample participants aged ≥18 y and households with income Survey participants were stratified into households with children, adult-only households, and older-adult households (NHIS, CPS) or individuals aged 18-64 y and individuals aged ≥65 y (NHANES). Household food security was measured with the use of the 10-item US Adult Food Security Scale. Variables from multiple domains, including sociodemographic characteristics, health, health care, and participation in social welfare and food assistance programs, were considered as predictors. The 3 data sources were analyzed separately with the use of CART analysis. Results: Household experiences of VLFS were associated with different predictors for different types of households and often occurred at the intersection of multiple characteristics spanning unmet medical needs, poor health, disability, limitation, depressive symptoms, low income, and food assistance program participation. These predictors built complex trees with various combinations in different types of households. Conclusions: This study showed that multiple characteristics across multiple domains distinguished VLFS households. Flexible and nonlinear methods focusing on a wide range of risk characteristics should be used to identify VLFS households and to inform policies and programs that can address VLFS

  8. The dynamic complexity of a three species food chain model

    International Nuclear Information System (INIS)

    Lv Songjuan; Zhao Min

    2008-01-01

    In this paper, a three-species food chain model is analytically investigated on theories of ecology and using numerical simulation. Bifurcation diagrams are obtained for biologically feasible parameters. The results show that the system exhibits rich complexity features such as stable, periodic and chaotic dynamics

  9. Multi-person tracking with overlapping cameras in complex, dynamic environments

    NARCIS (Netherlands)

    Liem, M.; Gavrila, D.M.

    2009-01-01

    This paper presents a multi-camera system to track multiple persons in complex, dynamic environments. Position measurements are obtained by carving out the space defined by foreground regions in the overlapping camera views and projecting these onto blobs on the ground plane. Person appearance is

  10. REMOTE SYNTHESIS AND CONTROL INFORMATION TECHNOLOGY OF SYSTEM-DYNAMIC MODELS

    Directory of Open Access Journals (Sweden)

    A. V. Masloboev

    2015-07-01

    Full Text Available The general line of research is concerned with development of information technologies and computer simulation tools for management information and analytical support of complex semistructured systems. Regional socio-economic systems are consideredas a representative of this system type. Investigation is carried out within the bounds of development strategy implementation of the Arctic zone of the Russian Federation and national safety until 2020 in the Murmansk region, specifically under engineering of high end information infrastructure for innovation and security control problem-solving of regional development. Research methodology consists of system dynamics modeling method, distributed information system engineering technologies, pattern-based modeling and design techniques. The work deals with development of toolkit for decision-making information support problem-solving in the field of innovation security management of regional economics. For that purpose a system-dynamic models suite of innovation process standard components and information technology for remote formation and control of innovation business simulation models under research have been developed. Designed toolkit provides innovation security index dynamics forecasting and innovation business effectiveness of regional economics. Information technology is implemented within the bounds of thin client architecture and is intended for simulation models design process automation of complex systems. Technology implementation software tools provide pattern-based system-dynamic models distributed formation and simulation control of innovation processes. The technology provides availability and reusability index enhancement of information support facilities in application to innovation process simulation at the expense of distributed access to innovation business simulation modeling tools and model synthesis by the reusable components, simulating standard elements of innovation

  11. Absorption dynamics and delay time in complex potentials

    Science.gov (United States)

    Villavicencio, Jorge; Romo, Roberto; Hernández-Maldonado, Alberto

    2018-05-01

    The dynamics of absorption is analyzed by using an exactly solvable model that deals with an analytical solution to Schrödinger’s equation for cutoff initial plane waves incident on a complex absorbing potential. A dynamical absorption coefficient which allows us to explore the dynamical loss of particles from the transient to the stationary regime is derived. We find that the absorption process is characterized by the emission of a series of damped periodic pulses in time domain, associated with damped Rabi-type oscillations with a characteristic frequency, ω = (E + ε)/ℏ, where E is the energy of the incident waves and ‑ε is energy of the quasidiscrete state of the system induced by the absorptive part of the Hamiltonian; the width γ of this resonance governs the amplitude of the pulses. The resemblance of the time-dependent absorption coefficient with a real decay process is discussed, in particular the transition from exponential to nonexponential regimes, a well-known feature of quantum decay. We have also analyzed the effect of the absorptive part of the potential on the dynamical delay time, which behaves differently from the one observed in attractive real delta potentials, exhibiting two regimes: time advance and time delay.

  12. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  13. Dynamics on and of complex networks applications to biology, computer science, and the social sciences

    CERN Document Server

    Ganguly, Niloy; Mukherjee, Animesh

    2009-01-01

    This self-contained book systematically explores the statistical dynamics on and of complex networks having relevance across a large number of scientific disciplines. The theories related to complex networks are increasingly being used by researchers for their usefulness in harnessing the most difficult problems of a particular discipline. The book is a collection of surveys and cutting-edge research contributions exploring the interdisciplinary relationship of dynamics on and of complex networks. Towards this goal, the work is thematically organized into three main sections: Part I studies th

  14. A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud

    Directory of Open Access Journals (Sweden)

    Abdul Jaleel

    2018-05-01

    Full Text Available Autonomic computing embeds self-management features in software systems using external feedback control loops, i.e., autonomic managers. In existing models of autonomic computing, adaptive behaviors are defined at the design time, autonomic managers are statically configured, and the running system has a fixed set of self-* capabilities. An autonomic computing design should accommodate autonomic capability growth by allowing the dynamic configuration of self-* services, but this causes security and integrity issues. A secure, scalable and elastic autonomic computing system (SSE-ACS paradigm is proposed to address the runtime inclusion of autonomic managers, ensuring secure communication between autonomic managers and managed resources. Applying the SSE-ACS concept, a layered approach for the dynamic adaptation of self-* services is presented with an online ‘Autonomic_Cloud’ working as the middleware between Autonomic Managers (offering the self-* services and Autonomic Computing System (requiring the self-* services. A stock trading and forecasting system is used for simulation purposes. The security impact of the SSE-ACS paradigm is verified by testing possible attack cases over the autonomic computing system with single and multiple autonomic managers running on the same and different machines. The common vulnerability scoring system (CVSS metric shows a decrease in the vulnerability severity score from high (8.8 for existing ACS to low (3.9 for SSE-ACS. Autonomic managers are introduced into the system at runtime from the Autonomic_Cloud to test the scalability and elasticity. With elastic AMs, the system optimizes the Central Processing Unit (CPU share resulting in an improved execution time for business logic. For computing systems requiring the continuous support of self-management services, the proposed system achieves a significant improvement in security, scalability, elasticity, autonomic efficiency, and issue resolving time

  15. Automated x-ray television complex for inspecting standard-size dynamic objects

    International Nuclear Information System (INIS)

    Gusev, E.A.; Luk'yanenko, E.A.; Chelnokov, V.B.; Kuleshov, V.K.; Alkhimov, Yu.V.

    1993-01-01

    An automated x-ray television complex based on a matrix gas-discharge converter having a large area (2.1 x 1.0 m) for inspecting standard-size freight and containers and for diagnosing industrial articles is presented. The pulsed operating mode of the complex with a 512K digital television storage makes it possible to inspect dynamic objects with a minimum dose load (20--100 μR). 6 refs., 5 figs

  16. The Y-12 National Security Complex Foreign Research Reactor Uranium Supply Production

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, T. [Nuclear Technology and Nonproliferation Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States); Keller, A.P. [Disposition and Supply Programs, B and W Y-12, L.L.C., Y-12 National Security Complex, Oak Ridge, Tennessee (United States)

    2011-07-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the National Nuclear Security Administration (NNSA) HEU Disposition, the Reduced Enrichment Research and Test Reactors (RERTR), and the United States (U.S.) FRR Spent Nuclear Fuel (SNF) Acceptance Programs. The FRR Supply Program supports the important U.S. government nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to Low-Enriched Uranium (LEU) fuel under the RERTR Program. The NNSA Y-12 Site Office maintains the prime contracts with foreign government agencies for the supply of LEU for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. In addition to uranium metal feedstock for fuel fabrication, Y-12 can produce LEU in different forms to support new fuel development or target fabrication for medical isotope production. With production improvements and efficient delivery preparations, Y-12 continues to successfully support the global research reactor community. (author)

  17. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  18. Experimental and theoretical evidence for the chaotic dynamics of complex structures

    International Nuclear Information System (INIS)

    Agop, M; Dimitriu, D G; Poll, E; Niculescu, O; Radu, V

    2013-01-01

    This paper presents the experimental results on the formation, dynamics and evolution towards chaos of complex space charge structures that emerge in front of a positively biased electrode immersed in a quiescent plasma. In certain experimental conditions, we managed to obtain the so-called multiple double layers (MDLs) with non-concentric configuration. Our experiments show that the interactions between each MDL's constituent entities are held responsible for the complex dynamics and eventually for its transition to chaos through cascades of spatio-temporal sub-harmonic bifurcations. Further, we build a theoretical model based on the fractal approximation (scale relativity theory) in order to reproduce the experimental results (plasma self-structuring and scenario of evolution to chaos). Comparing the experimental results with the theoretical ones, we observe a good correlation between them. (paper)

  19. Framework based on communicability and flow to analyze complex network dynamics

    Science.gov (United States)

    Gilson, M.; Kouvaris, N. E.; Deco, G.; Zamora-López, G.

    2018-05-01

    Graph theory constitutes a widely used and established field providing powerful tools for the characterization of complex networks. The intricate topology of networks can also be investigated by means of the collective dynamics observed in the interactions of self-sustained oscillations (synchronization patterns) or propagationlike processes such as random walks. However, networks are often inferred from real-data-forming dynamic systems, which are different from those employed to reveal their topological characteristics. This stresses the necessity for a theoretical framework dedicated to the mutual relationship between the structure and dynamics in complex networks, as the two sides of the same coin. Here we propose a rigorous framework based on the network response over time (i.e., Green function) to study interactions between nodes across time. For this purpose we define the flow that describes the interplay between the network connectivity and external inputs. This multivariate measure relates to the concepts of graph communicability and the map equation. We illustrate our theory using the multivariate Ornstein-Uhlenbeck process, which describes stable and non-conservative dynamics, but the formalism can be adapted to other local dynamics for which the Green function is known. We provide applications to classical network examples, such as small-world ring and hierarchical networks. Our theory defines a comprehensive framework that is canonically related to directed and weighted networks, thus paving a way to revise the standards for network analysis, from the pairwise interactions between nodes to the global properties of networks including community detection.

  20. Impacts of Base-Case and Post-Contingency Constraint Relaxations on Static and Dynamic Operational Security

    Science.gov (United States)

    Salloum, Ahmed

    Constraint relaxation by definition means that certain security, operational, or financial constraints are allowed to be violated in the energy market model for a predetermined penalty price. System operators utilize this mechanism in an effort to impose a price-cap on shadow prices throughout the market. In addition, constraint relaxations can serve as corrective approximations that help in reducing the occurrence of infeasible or extreme solutions in the day-ahead markets. This work aims to capture the impact constraint relaxations have on system operational security. Moreover, this analysis also provides a better understanding of the correlation between DC market models and AC real-time systems and analyzes how relaxations in market models propagate to real-time systems. This information can be used not only to assess the criticality of constraint relaxations, but also as a basis for determining penalty prices more accurately. Constraint relaxations practice was replicated in this work using a test case and a real-life large-scale system, while capturing both energy market aspects and AC real-time system performance. System performance investigation included static and dynamic security analysis for base-case and post-contingency operating conditions. PJM peak hour loads were dynamically modeled in order to capture delayed voltage recovery and sustained depressed voltage profiles as a result of reactive power deficiency caused by constraint relaxations. Moreover, impacts of constraint relaxations on operational system security were investigated when risk based penalty prices are used. Transmission lines in the PJM system were categorized according to their risk index and each category was as-signed a different penalty price accordingly in order to avoid real-time overloads on high risk lines. This work also extends the investigation of constraint relaxations to post-contingency relaxations, where emergency limits are allowed to be relaxed in energy market models

  1. Exploring the dynamic and complex integration of sustainability performance measurement into product development

    DEFF Research Database (Denmark)

    Rodrigues, Vinicius Picanco; Morioka, S.; Pigosso, Daniela Cristina Antelmi

    2016-01-01

    In order to deal with the complex and dynamic nature of sustainability integration into the product development process, this research explore the use of a qualitative System Dynamics approach by using the causal loop diagram (CLD) tool. A literature analysis was followed by a case study, aiming ...

  2. Cloud Radar: Near Real-Time Detection of Security Failures in Dynamic Virtualized Infrastructures

    NARCIS (Netherlands)

    Bleikertz, Sören; Vogel, Carsten; Groß, Thomas

    2014-01-01

    Cloud infrastructures are designed to share physical resources among many different tenants while ensuring overall secu- rity and tenant isolation. The complexity of dynamically changing and growing cloud environments, as well as insider attacks, can lead to misconfigurations that ultimately result

  3. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections

  4. Secure equality and greater-than tests with sublinear online complexity

    DEFF Research Database (Denmark)

    Lipmaa, Helger; Toft, Tomas

    2013-01-01

    Secure multiparty computation (MPC) allows multiple parties to evaluate functions without disclosing the private inputs. Secure comparisons (testing equality and greater-than) are important primitives required by many MPC applications. We propose two equality tests for ℓ-bit values with O(1) online...

  5. Structure and dynamics of weakly bound complexes

    International Nuclear Information System (INIS)

    Skouteris, D.

    1998-01-01

    The present thesis deals with the spectroscopic and theoretical investigation of weakly bound complexes involving a methane molecule. Studies of these Van der Waals complexes can give valuable information on the relevant intermolecular dynamics and promote the understanding of the interactions between molecules (which can ultimately lead to chemical reactions). Especially interesting are complexes involving molecules of high symmetry (e.g. tetrahedral, such as methane) because of the unusual effects arising from it (selection rules, nuclear Spin statistical weights etc.). The infrared spectrum of the Van der Waals complex between a CH 4 and a N 2 O molecule has been recorded and most of it has been assigned in the region of the N - O stretch (approximately 2225.0 cm -1 ). Despite the fact that this is really a weakly bound complex, it is nevertheless rigid enough so that the standard model for asymmetric top spectra can be applied to it with the usual quantum numbers. From the value of the inertial defect, it turns out that the methane unit is locked in a rigid configuration within the complex rather than freely rotating. The intermolecular distance as well as the tilting angle of the N 2 O linear unit are determined from the rotational constants. The complex itself turns out to have a T - shaped configuration. The infrared spectrum of the Ar - CH 4 complex at the ν 4 (bending) band of methane is also assigned. This is different from the previous one in that the methane unit rotates almost freely Within the complex. As a result, the quantum numbers used to classify rovibrational energy levels include these of the free unit. The concept of 'overall symmetry' is made use of to rationalise selection rules in various sub-bands of the spectrum. Moreover, new terms in the potential anisotropy Hamiltonian are calculated through the use of the overall symmetry concept. These are termed 'mixed anisotropy' terms since they involve both rotational and vibrational degrees of

  6. On the Computational Complexity of the Languages of General Symbolic Dynamical Systems and Beta-Shifts

    DEFF Research Database (Denmark)

    Simonsen, Jakob Grue

    2009-01-01

    We consider the computational complexity of languages of symbolic dynamical systems. In particular, we study complexity hierarchies and membership of the non-uniform class P/poly. We prove: 1.For every time-constructible, non-decreasing function t(n)=@w(n), there is a symbolic dynamical system...... with language decidable in deterministic time O(n^2t(n)), but not in deterministic time o(t(n)). 2.For every space-constructible, non-decreasing function s(n)=@w(n), there is a symbolic dynamical system with language decidable in deterministic space O(s(n)), but not in deterministic space o(s(n)). 3.There...... are symbolic dynamical systems having hard and complete languages under @?"m^l^o^g^s- and @?"m^p-reduction for every complexity class above LOGSPACE in the backbone hierarchy (hence, P-complete, NP-complete, coNP-complete, PSPACE-complete, and EXPTIME-complete sets). 4.There are decidable languages of symbolic...

  7. Epidemic dynamics and endemic states in complex networks

    OpenAIRE

    Pastor-Satorras, Romualdo; Vespignani, Alessandro

    2001-01-01

    We study by analytical methods and large scale simulations a dynamical model for the spreading of epidemics in complex networks. In networks with exponentially bounded connectivity we recover the usual epidemic behavior with a threshold defining a critical point below which the infection prevalence is null. On the contrary, on a wide range of scale-free networks we observe the absence of an epidemic threshold and its associated critical behavior. This implies that scale-free networks are pron...

  8. Dynamic complexities in a seasonal prevention epidemic model with birth pulses

    International Nuclear Information System (INIS)

    Gao Shujing; Chen Lansun; Sun Lihua

    2005-01-01

    In most of population dynamics, increases in population due to birth are assumed to be time-dependent, but many species reproduce only during a single period of the year. In this paper, we propose an epidemic model with density-dependent birth pulses and seasonal prevention. Using the discrete dynamical system determined by stroboscopic map, we obtain the local or global stability, numerical simulation shows there is a characteristic sequence of bifurcations, leading to chaotic dynamics, which implies that the dynamical behaviors of the epidemic model with birth pulses and seasonal prevention are very complex, including small amplitude oscillations, large-amplitude multi-annual cycles and chaos. This suggests that birth pulse, in effect, provides a natural period or cyclicity that may lead a period-doubling route to chaos

  9. Using Proven Reference Monitor Patterns for Security Evaluation

    Directory of Open Access Journals (Sweden)

    Mark R. Heckman

    2016-04-01

    Full Text Available The most effective approach to evaluating the security of complex systems is to deliberately construct the systems using security patterns specifically designed to make them evaluable. Just such an integrated set of security patterns was created decades ago based on the Reference Monitor abstraction. An associated systematic security engineering and evaluation methodology was codified as an engineering standard in the Trusted Computer System Evaluation Criteria (TCSEC. This paper explains how the TCSEC and its Trusted Network Interpretation (TNI constitute a set of security patterns for large, complex and distributed systems and how those patterns have been repeatedly and successfully used to create and evaluate some of the most secure government and commercial systems ever developed.

  10. Complex Dynamic Development of Poliovirus Membranous Replication Complexes

    Science.gov (United States)

    Nair, Vinod; Hansen, Bryan T.; Hoyt, Forrest H.; Fischer, Elizabeth R.; Ehrenfeld, Ellie

    2012-01-01

    Replication of all positive-strand RNA viruses is intimately associated with membranes. Here we utilize electron tomography and other methods to investigate the remodeling of membranes in poliovirus-infected cells. We found that the viral replication structures previously described as “vesicles” are in fact convoluted, branching chambers with complex and dynamic morphology. They are likely to originate from cis-Golgi membranes and are represented during the early stages of infection by single-walled connecting and branching tubular compartments. These early viral organelles gradually transform into double-membrane structures by extension of membranous walls and/or collapsing of the luminal cavity of the single-membrane structures. As the double-membrane regions develop, they enclose cytoplasmic material. At this stage, a continuous membranous structure may have double- and single-walled membrane morphology at adjacent cross-sections. In the late stages of the replication cycle, the structures are represented mostly by double-membrane vesicles. Viral replication proteins, double-stranded RNA species, and actively replicating RNA are associated with both double- and single-membrane structures. However, the exponential phase of viral RNA synthesis occurs when single-membrane formations are predominant in the cell. It has been shown previously that replication complexes of some other positive-strand RNA viruses form on membrane invaginations, which result from negative membrane curvature. Our data show that the remodeling of cellular membranes in poliovirus-infected cells produces structures with positive curvature of membranes. Thus, it is likely that there is a fundamental divergence in the requirements for the supporting cellular membrane-shaping machinery among different groups of positive-strand RNA viruses. PMID:22072780

  11. Complex Nonlinear Dynamic System of Oligopolies Price Game with Heterogeneous Players Under Noise

    Science.gov (United States)

    Liu, Feng; Li, Yaguang

    A nonlinear four oligopolies price game with heterogeneous players, that are boundedly rational and adaptive, is built using two different special demand costs. Based on the theory of complex discrete dynamical system, the stability and the existing equilibrium point are investigated. The complex dynamic behavior is presented via bifurcation diagrams, the Lyapunov exponents to show equilibrium state, bifurcation and chaos with the variation in parameters. As disturbance is ubiquitous in economic systems, this paper focuses on the analysis of delay feedback control method under noise circumstances. Stable dynamics is confirmed to depend mainly on the low price adjustment speed, and if all four players have limited opportunities to stabilize the market, the new adaptive player facing profits of scale are found to be higher than the incumbents of bounded rational.

  12. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    Science.gov (United States)

    2014-09-01

    nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS...national security. A snapshot 13 years post 9/11 reveals a nation of pride and resiliency but also the owner of a complex inwardly focused...acceptance with or without guilt for the social disparity picture captured in the wake of Hurricane Katrina. “Perhaps the most disturbing fact that

  13. Young Children's Knowledge About the Moon: A Complex Dynamic System

    Science.gov (United States)

    Venville, Grady J.; Louisell, Robert D.; Wilhelm, Jennifer A.

    2012-08-01

    The purpose of this research was to use a multidimensional theoretical framework to examine young children's knowledge about the Moon. The research was conducted in the interpretive paradigm and the design was a multiple case study of ten children between the ages of three and eight from the USA and Australia. A detailed, semi-structured interview was conducted with each child. In addition, each child's parents were interviewed to determine possible social and cultural influences on the child's knowledge. We sought evidence about how the social and cultural experiences of the children might have influenced the development of their ideas. From a cognitive perspective we were interested in whether the children's ideas were constructed in a theory like form or whether the knowledge was the result of gradual accumulation of fragments of isolated cultural information. Findings reflected the strong and complex relationship between individual children, their social and cultural milieu, and the way they construct ideas about the Moon and astronomy. Findings are presented around four themes including ontology, creatures and artefacts, animism, and permanence. The findings support a complex dynamic system view of students' knowledge that integrates the framework theory perspective and the knowledge in fragments perspective. An initial model of a complex dynamic system of young children's knowledge about the Moon is presented.

  14. Unpacking complexities of managerial subjectivity: An analytic fixation on constitutive dynamics

    DEFF Research Database (Denmark)

    Plotnikof, Mie

    2012-01-01

    , and the analytic challenges of discourse/Discourse-distinctions and avoiding agency-structure-dualism. This paper proposes an integral conceptualization of subjectification that directs analytic attention to the complex constitutive dynamics of organizational discourses and agency normative to organizational...... is discussed with a case-study of public managers in collaborative governance processes in the Danish day-care sector. With complex-sensitive analytics the paper contributes to the ‘plurivocal’ debate on advancing organizational discourse approaches....

  15. Protein dynamics during presynaptic complex assembly on individual ssDNA molecules

    OpenAIRE

    Gibb, Bryan; Ye, Ling F.; Kwon, YoungHo; Niu, Hengyao; Sung, Patrick; Greene, Eric C.

    2014-01-01

    Homologous recombination is a conserved pathway for repairing double?stranded breaks, which are processed to yield single?stranded DNA overhangs that serve as platforms for presynaptic complex assembly. Here we use single?molecule imaging to reveal the interplay between Saccharomyce cerevisiae RPA, Rad52, and Rad51 during presynaptic complex assembly. We show that Rad52 binds RPA?ssDNA and suppresses RPA turnover, highlighting an unanticipated regulatory influence on protein dynamics. Rad51 b...

  16. Impacts of large dams on the complexity of suspended sediment dynamics in the Yangtze River

    Science.gov (United States)

    Wang, Yuankun; Rhoads, Bruce L.; Wang, Dong; Wu, Jichun; Zhang, Xiao

    2018-03-01

    The Yangtze River is one of the largest and most important rivers in the world. Over the past several decades, the natural sediment regime of the Yangtze River has been altered by the construction of dams. This paper uses multi-scale entropy analysis to ascertain the impacts of large dams on the complexity of high-frequency suspended sediment dynamics in the Yangtze River system, especially after impoundment of the Three Gorges Dam (TGD). In this study, the complexity of sediment dynamics is quantified by framing it within the context of entropy analysis of time series. Data on daily sediment loads for four stations located in the mainstem are analyzed for the past 60 years. The results indicate that dam construction has reduced the complexity of short-term (1-30 days) variation in sediment dynamics near the structures, but that complexity has actually increased farther downstream. This spatial pattern seems to reflect a filtering effect of the dams on the on the temporal pattern of sediment loads as well as decreased longitudinal connectivity of sediment transfer through the river system, resulting in downstream enhancement of the influence of local sediment inputs by tributaries on sediment dynamics. The TGD has had a substantial impact on the complexity of sediment series in the mainstem of the Yangtze River, especially after it became fully operational. This enhanced impact is attributed to the high trapping efficiency of this dam and its associated large reservoir. The sediment dynamics "signal" becomes more spatially variable after dam construction. This study demonstrates the spatial influence of dams on the high-frequency temporal complexity of sediment regimes and provides valuable information that can be used to guide environmental conservation of the Yangtze River.

  17. NATO Advanced Research Workshop on Dynamics of Polyatomic Van der Waals Complexes

    CERN Document Server

    Janda, Kenneth

    1991-01-01

    This publication is the Proceedings of the NATO Advanced Research Workshop (ARW) on the Dynamics of Polyatomic Van der Waals Molecules held at the Chateau de Bonas, Castera-Verduzan, France, from August 21 through August 26, 1989. Van der Waals complexes provide important model problems for understanding energy transfer and dissipation. These processes can be described in great detail for Van der Waals complexes, and the insight gained from such studies can be applied to more complicated chemical problems that are not amenable to detailed study. The workshop concentrated on the current questions and future prospects for extend­ ing our highly detailed knowledge of triatomic Van der Waals molecule dynamics to polyatomic molecules and clusters (one molecule surrounded by several, or up to sev­ eral tens of, atoms). Both experimental and theoretical studies were discussed, with particular emphasis on the dynamical behavior of dissociation as observed in the dis­ tributions of quantum states of the dissociatio...

  18. The Emerging Architecture of a Regional Security Complex in the ...

    African Journals Online (AJOL)

    2015-03-03

    Mar 3, 2015 ... Council for the Development of Social Science Research in Africa, 2017 .... of International Security Studies by appropriating Regional Security .... collaborative network is also embedded across Saharan and Sahelian Africa, ... (previously located in the city of Baga in Nigeria's Borno State), fell into the.

  19. Hash function construction using weighted complex dynamical networks

    International Nuclear Information System (INIS)

    Song Yu-Rong; Jiang Guo-Ping

    2013-01-01

    A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then, each block is divided into components, and the nodes and weighted edges are well defined from these components and their relations. Namely, the WCDN closely related to the original message is established. Furthermore, the node dynamics of the WCDN are chosen as a chaotic map. After chaotic iterations, quantization and exclusive-or operations, the fixed-length hash value is obtained. This scheme has the property that any tiny change in message can be diffused rapidly through the WCDN, leading to very different hash values. Analysis and simulation show that the scheme possesses good statistical properties, excellent confusion and diffusion, strong collision resistance and high efficiency. (general)

  20. Applications of systems thinking and soft operations research in managing complexity from problem framing to problem solving

    CERN Document Server

    2016-01-01

    This book captures current trends and developments in the field of systems thinking and soft operations research which can be applied to solve today's problems of dynamic complexity and interdependency. Such ‘wicked problems’ and messes are seemingly intractable problems characterized as value-laden, ambiguous, and unstable, that resist being tamed by classical problem solving. Actions and interventions associated with this complex problem space can have highly unpredictable and unintended consequences. Examples of such complex problems include health care reform, global climate change, transnational serious and organized crime, terrorism, homeland security, human security, disaster management, and humanitarian aid. Moving towards the development of solutions to these complex problem spaces depends on the lens we use to examine them and how we frame the problem. It will be shown that systems thinking and soft operations research has had great success in contributing to the management of complexity. .

  1. Exponentially asymptotical synchronization in uncertain complex dynamical networks with time delay

    Energy Technology Data Exchange (ETDEWEB)

    Luo Qun; Yang Han; Li Lixiang; Yang Yixian [Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Han Jiangxue, E-mail: luoqun@bupt.edu.c [National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

    2010-12-10

    Over the past decade, complex dynamical network synchronization has attracted more and more attention and important developments have been made. In this paper, we explore the scheme of globally exponentially asymptotical synchronization in complex dynamical networks with time delay. Based on Lyapunov stability theory and through defining the error function between adjacent nodes, four novel adaptive controllers are designed under four situations where the Lipschitz constants of the state function in nodes are known or unknown and the network structure is certain or uncertain, respectively. These controllers could not only globally asymptotically synchronize all nodes in networks, but also ensure that the error functions do not exceed the pre-scheduled exponential function. Finally, simulations of the synchronization among the chaotic system in the small-world and scale-free network structures are presented, which prove the effectiveness and feasibility of our controllers.

  2. On the representation of contextual probabilistic dynamics in the complex Hilbert space: Linear and nonlinear evolutions, Schrodinger dynamics

    International Nuclear Information System (INIS)

    Khrennikov, A.

    2005-01-01

    We constructed the representation of contextual probabilistic dynamics in the complex Hilbert space. Thus dynamics of the wave function can be considered as Hilbert space projection of realistic dynamics in a pre space. The basic condition for representing the pre space-dynamics is the law of statistical conservation of energy-conservation of probabilities. The construction of the dynamical representation is an important step in the development of contextual statistical viewpoint of quantum processes. But the contextual statistical model is essentially more general than the quantum one. Therefore in general the Hilbert space projection of the pre space dynamics can be nonlinear and even irreversible (but it is always unitary). There were found conditions of linearity and reversibility of the Hilbert space dynamical projection. We also found conditions for the conventional Schrodinger dynamics (including time-dependent Hamiltonians). We remark that in general even the Schrodinger dynamics is based just on the statistical conservation of energy; for individual systems the law of conservation of energy can be violated (at least in our theoretical model)

  3. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  4. Complex dynamics in Duffing system with two external forcings

    International Nuclear Information System (INIS)

    Jing Zhujun; Wang Ruiqi

    2005-01-01

    Duffing's equation with two external forcing terms have been discussed. The threshold values of chaotic motion under the periodic and quasi-periodic perturbations are obtained by using second-order averaging method and Melnikov's method. Numerical simulations not only show the consistence with the theoretical analysis but also exhibit the interesting bifurcation diagrams and the more new complex dynamical behaviors, including period-n (n=2,3,6,8) orbits, cascades of period-doubling and reverse period doubling bifurcations, quasi-periodic orbit, period windows, bubble from period-one to period-two, onset of chaos, hopping behavior of chaos, transient chaos, chaotic attractors and strange non-chaotic attractor, crisis which depends on the frequencies, amplitudes and damping. In particular, the second frequency plays a very important role for dynamics of the system, and the system can leave chaotic region to periodic motions by adjusting some parameter which can be considered as an control strategy of chaos. The computation of Lyapunov exponents confirm the dynamical behaviors

  5. Identification of Complex Dynamical Systems with Neural Networks (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The identification and analysis of high dimensional nonlinear systems is obviously a challenging task. Neural networks have been proven to be universal approximators but this still leaves the identification task a hard one. To do it efficiently, we have to violate some of the rules of classical regression theory. Furthermore we should focus on the interpretation of the resulting model to overcome its black box character. First, we will discuss function approximation with 3 layer feedforward neural networks up to new developments in deep neural networks and deep learning. These nets are not only of interest in connection with image analysis but are a center point of the current artificial intelligence developments. Second, we will focus on the analysis of complex dynamical system in the form of state space models realized as recurrent neural networks. After the introduction of small open dynamical systems we will study dynamical systems on manifolds. Here manifold and dynamics have to be identified in parall...

  6. Identification of Complex Dynamical Systems with Neural Networks (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The identification and analysis of high dimensional nonlinear systems is obviously a challenging task. Neural networks have been proven to be universal approximators but this still leaves the identification task a hard one. To do it efficiently, we have to violate some of the rules of classical regression theory. Furthermore we should focus on the interpretation of the resulting model to overcome its black box character. First, we will discuss function approximation with 3 layer feedforward neural networks up to new developments in deep neural networks and deep learning. These nets are not only of interest in connection with image analysis but are a center point of the current artificial intelligence developments. Second, we will focus on the analysis of complex dynamical system in the form of state space models realized as recurrent neural networks. After the introduction of small open dynamical systems we will study dynamical systems on manifolds. Here manifold and dynamics have to be identified in parall...

  7. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  8. Preictal dynamics of EEG complexity in intracranially recorded epileptic seizure: a case report.

    Science.gov (United States)

    Bob, Petr; Roman, Robert; Svetlak, Miroslav; Kukleta, Miloslav; Chladek, Jan; Brazdil, Milan

    2014-11-01

    Recent findings suggest that neural complexity reflecting a number of independent processes in the brain may characterize typical changes during epileptic seizures and may enable to describe preictal dynamics. With respect to previously reported findings suggesting specific changes in neural complexity during preictal period, we have used measure of pointwise correlation dimension (PD2) as a sensitive indicator of nonstationary changes in complexity of the electroencephalogram (EEG) signal. Although this measure of complexity in epileptic patients was previously reported by Feucht et al (Applications of correlation dimension and pointwise dimension for non-linear topographical analysis of focal onset seizures. Med Biol Comput. 1999;37:208-217), it was not used to study changes in preictal dynamics. With this aim to study preictal changes of EEG complexity, we have examined signals from 11 multicontact depth (intracerebral) EEG electrodes located in 108 cortical and subcortical brain sites, and from 3 scalp EEG electrodes in a patient with intractable epilepsy, who underwent preoperative evaluation before epilepsy surgery. From those 108 EEG contacts, records related to 44 electrode contacts implanted into lesional structures and white matter were not included into the experimental analysis.The results show that in comparison to interictal period (at about 8-6 minutes before seizure onset), there was a statistically significant decrease in PD2 complexity in the preictal period at about 2 minutes before seizure onset in all 64 intracranial channels localized in various brain sites that were included into the analysis and in 3 scalp EEG channels as well. Presented results suggest that using PD2 in EEG analysis may have significant implications for research of preictal dynamics and prediction of epileptic seizures.

  9. The Complexity of Dynamics in Small Neural Circuits.

    Directory of Open Access Journals (Sweden)

    Diego Fasoli

    2016-08-01

    Full Text Available Mean-field approximations are a powerful tool for studying large neural networks. However, they do not describe well the behavior of networks composed of a small number of neurons. In this case, major differences between the mean-field approximation and the real behavior of the network can arise. Yet, many interesting problems in neuroscience involve the study of mesoscopic networks composed of a few tens of neurons. Nonetheless, mathematical methods that correctly describe networks of small size are still rare, and this prevents us to make progress in understanding neural dynamics at these intermediate scales. Here we develop a novel systematic analysis of the dynamics of arbitrarily small networks composed of homogeneous populations of excitatory and inhibitory firing-rate neurons. We study the local bifurcations of their neural activity with an approach that is largely analytically tractable, and we numerically determine the global bifurcations. We find that for strong inhibition these networks give rise to very complex dynamics, caused by the formation of multiple branching solutions of the neural dynamics equations that emerge through spontaneous symmetry-breaking. This qualitative change of the neural dynamics is a finite-size effect of the network, that reveals qualitative and previously unexplored differences between mesoscopic cortical circuits and their mean-field approximation. The most important consequence of spontaneous symmetry-breaking is the ability of mesoscopic networks to regulate their degree of functional heterogeneity, which is thought to help reducing the detrimental effect of noise correlations on cortical information processing.

  10. Security Management Model in Cloud Computing Environment

    OpenAIRE

    Ahmadpanah, Seyed Hossein

    2016-01-01

    In the cloud computing environment, cloud virtual machine (VM) will be more and more the number of virtual machine security and management faced giant Challenge. In order to address security issues cloud computing virtualization environment, this paper presents a virtual machine based on efficient and dynamic deployment VM security management model state migration and scheduling, study of which virtual machine security architecture, based on AHP (Analytic Hierarchy Process) virtual machine de...

  11. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-01

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  12. A Historical Evaluation of the U15 Complex, Nevada National Security Site, Nye County, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Drollinger, Harold [Desert Research Inst., Nevada University, Reno, NV (United States); Holz, Barbara A. [Desert Research Inst., Nevada University, Reno, NV (United States); Bullard, Thomas F. [Desert Research Inst., Nevada University, Reno, NV (United States); Goldenberg, Nancy G. [Desert Research Inst., Nevada University, Reno, NV (United States); Ashbaugh, Laurence J. [Desert Research Inst., Nevada University, Reno, NV (United States); Griffin, Wayne R. [Desert Research Inst., Nevada University, Reno, NV (United States)

    2014-01-09

    This report presents a historical evaluation of the U15 Complex on the Nevada National Security Site (NNSS) in southern Nevada. The work was conducted by the Desert Research Institute at the request of the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office and the U.S. Department of Defense, Defense Threat Reduction Agency. Three underground nuclear tests and two underground nuclear fuel storage experiments were conducted at the complex. The nuclear tests were Hard Hat in 1962, Tiny Tot in 1965, and Pile Driver in 1966. The Hard Hat and Pile Driver nuclear tests involved different types of experiment sections in test drifts at various distances from the explosion in order to determine which sections could best survive in order to design underground command centers. The Tiny Tot nuclear test involved an underground cavity in which the nuclear test was executed. It also provided data in designing underground structures and facilities to withstand a nuclear attack. The underground nuclear fuel storage experiments were Heater Test 1 from 1977 to 1978 and Spent Fuel Test - Climax from 1978 to 1985. Heater Test 1 was used to design the later Spent Fuel Test - Climax experiment. The latter experiment was a model of a larger underground storage facility and primarily involved recording the conditions of the spent fuel and the surrounding granite medium. Fieldwork was performed intermittently in the summers of 2011 and 2013, totaling 17 days. Access to the underground tunnel complex is sealed and unavailable. Restricted to the surface, four buildings, four structures, and 92 features associated with nuclear testing and fuel storage experiment activities at the U15 Complex have been recorded. Most of these are along the west side of the complex and next to the primary access road and are characteristic of an industrial mining site, albeit one with scientific interests. The geomorphological fieldwork was conducted over three days in the

  13. Dynamic characterization of oil fields, complex stratigraphically using genetic algorithms

    International Nuclear Information System (INIS)

    Gonzalez, Santiago; Hidrobo, Eduardo A

    2004-01-01

    A novel methodology is presented in this paper for the characterization of highly heterogeneous oil fields by integration of the oil fields dynamic information to the static updated model. The objective of the oil field's characterization process is to build an oil field model, as realistic as possible, through the incorporation of all the available information. The classical approach consists in producing a model based in the oil field's static information, having as the process final stage the validation model with the dynamic information available. It is important to clarify that the term validation implies a punctual process by nature, generally intended to secure the required coherence between productive zones and petrophysical properties. The objective of the proposed methodology is to enhance the prediction capacity of the oil field's model by previously integrating, parameters inherent to the oil field's fluid dynamics by a process of dynamic data inversion through an optimization procedure based on evolutionary computation. The proposed methodology relies on the construction of the oil field's high-resolution static model, escalated by means of hybrid techniques while aiming to preserve the oil field's heterogeneity. Afterwards, using an analytic simulator as reference, the scaled model is methodically modified by means of an optimization process that uses genetic algorithms and production data as conditional information. The process's final product is a model that observes the static and dynamic conditions of the oil field with the capacity to minimize the economic impact that generates production historical adjustments to the simulation tasks. This final model features some petrophysical properties (porosity, permeability and water saturation), as modified to achieve a better adjustment of the simulated production's history versus the real one history matching. Additionally, the process involves a slight modification of relative permeability, which has

  14. Precise regulation of gene expression dynamics favors complex promoter architectures.

    Directory of Open Access Journals (Sweden)

    Dirk Müller

    2009-01-01

    Full Text Available Promoters process signals through recruitment of transcription factors and RNA polymerase, and dynamic changes in promoter activity constitute a major noise source in gene expression. However, it is barely understood how complex promoter architectures determine key features of promoter dynamics. Here, we employ prototypical promoters of yeast ribosomal protein genes as well as simplified versions thereof to analyze the relations among promoter design, complexity, and function. These promoters combine the action of a general regulatory factor with that of specific transcription factors, a common motif of many eukaryotic promoters. By comprehensively analyzing stationary and dynamic promoter properties, this model-based approach enables us to pinpoint the structural characteristics underlying the observed behavior. Functional tradeoffs impose constraints on the promoter architecture of ribosomal protein genes. We find that a stable scaffold in the natural design results in low transcriptional noise and strong co-regulation of target genes in the presence of gene silencing. This configuration also exhibits superior shut-off properties, and it can serve as a tunable switch in living cells. Model validation with independent experimental data suggests that the models are sufficiently realistic. When combined, our results offer a mechanistic explanation for why specific factors are associated with low protein noise in vivo. Many of these findings hold for a broad range of model parameters and likely apply to other eukaryotic promoters of similar structure.

  15. Return-to-Work Within a Complex and Dynamic Organizational Work Disability System

    OpenAIRE

    Jetha, Arif; Pransky, Glenn; Fish, Jon; Hettinger, Lawrence J.

    2015-01-01

    Background Return-to-work (RTW) within a complex organizational system can be associated with suboptimal outcomes. Purpose To apply a sociotechnical systems perspective to investigate complexity in RTW; to utilize system dynamics modeling (SDM) to examine how feedback relationships between individual, psychosocial, and organizational factors make up the work disability system and influence RTW. Methods SDMs were developed within two companies. Thirty stakeholders including senior managers, an...

  16. Quantum coherence spectroscopy reveals complex dynamics in bacterial light-harvesting complex 2 (LH2).

    Science.gov (United States)

    Harel, Elad; Engel, Gregory S

    2012-01-17

    Light-harvesting antenna complexes transfer energy from sunlight to photosynthetic reaction centers where charge separation drives cellular metabolism. The process through which pigments transfer excitation energy involves a complex choreography of coherent and incoherent processes mediated by the surrounding protein and solvent environment. The recent discovery of coherent dynamics in photosynthetic light-harvesting antennae has motivated many theoretical models exploring effects of interference in energy transfer phenomena. In this work, we provide experimental evidence of long-lived quantum coherence between the spectrally separated B800 and B850 rings of the light-harvesting complex 2 (LH2) of purple bacteria. Spectrally resolved maps of the detuning, dephasing, and the amplitude of electronic coupling between excitons reveal that different relaxation pathways act in concert for optimal transfer efficiency. Furthermore, maps of the phase of the signal suggest that quantum mechanical interference between different energy transfer pathways may be important even at ambient temperature. Such interference at a product state has already been shown to enhance the quantum efficiency of transfer in theoretical models of closed loop systems such as LH2.

  17. Knowledge-based computer security advisor

    International Nuclear Information System (INIS)

    Hunteman, W.J.; Squire, M.B.

    1991-01-01

    The rapid expansion of computer security information and technology has included little support to help the security officer identify the safeguards needed to comply with a policy and to secure a computing system. This paper reports that Los Alamos is developing a knowledge-based computer security system to provide expert knowledge to the security officer. This system includes a model for expressing the complex requirements in computer security policy statements. The model is part of an expert system that allows a security officer to describe a computer system and then determine compliance with the policy. The model contains a generic representation that contains network relationships among the policy concepts to support inferencing based on information represented in the generic policy description

  18. Complex Dynamics in Nonequilibrium Economics and Chemistry

    Science.gov (United States)

    Wen, Kehong

    Complex dynamics provides a new approach in dealing with economic complexity. We study interactively the empirical and theoretical aspects of business cycles. The way of exploring complexity is similar to that in the study of an oscillatory chemical system (BZ system)--a model for modeling complex behavior. We contribute in simulating qualitatively the complex periodic patterns observed from the controlled BZ experiments to narrow the gap between modeling and experiment. The gap between theory and reality is much wider in economics, which involves studies of human expectations and decisions, the essential difference from natural sciences. Our empirical and theoretical studies make substantial progress in closing this gap. With the help from the new development in nonequilibrium physics, i.e., the complex spectral theory, we advance our technique in detecting characteristic time scales from empirical economic data. We obtain correlation resonances, which give oscillating modes with decays for correlation decomposition, from different time series including S&P 500, M2, crude oil spot prices, and GNP. The time scales found are strikingly compatible with business experiences and other studies in business cycles. They reveal the non-Markovian nature of coherent markets. The resonances enhance the evidence of economic chaos obtained by using other tests. The evolving multi-humped distributions produced by the moving-time -window technique reveal the nonequilibrium nature of economic behavior. They reproduce the American economic history of booms and busts. The studies seem to provide a way out of the debate on chaos versus noise and unify the cyclical and stochastic approaches in explaining business fluctuations. Based on these findings and new expectation formulation, we construct a business cycle model which gives qualitatively compatible patterns to those found empirically. The soft-bouncing oscillator model provides a better alternative than the harmonic oscillator

  19. Optimization of airport security process

    Science.gov (United States)

    Wei, Jianan

    2017-05-01

    In order to facilitate passenger travel, on the basis of ensuring public safety, the airport security process and scheduling to optimize. The stochastic Petri net is used to simulate the single channel security process, draw the reachable graph, construct the homogeneous Markov chain to realize the performance analysis of the security process network, and find the bottleneck to limit the passenger throughput. Curve changes in the flow of passengers to open a security channel for the initial state. When the passenger arrives at a rate that exceeds the processing capacity of the security channel, it is queued. The passenger reaches the acceptable threshold of the queuing time as the time to open or close the next channel, simulate the number of dynamic security channel scheduling to reduce the passenger queuing time.

  20. Dynamical Analysis, Synchronization, Circuit Design, and Secure Communication of a Novel Hyperchaotic System

    Directory of Open Access Journals (Sweden)

    Li Xiong

    2017-01-01

    Full Text Available This paper is devoted to introduce a novel fourth-order hyperchaotic system. The hyperchaotic system is constructed by adding a linear feedback control level based on a modified Lorenz-like chaotic circuit with reduced number of amplifiers. The local dynamical entities, such as the basic dynamical behavior, the divergence, the eigenvalue, and the Lyapunov exponents of the new hyperchaotic system, are all investigated analytically and numerically. Then, an active control method is derived to achieve global chaotic synchronization of the novel hyperchaotic system through making the synchronization error system asymptotically stable at the origin based on Lyapunov stability theory. Next, the proposed novel hyperchaotic system is applied to construct another new hyperchaotic system with circuit deformation and design a new hyperchaotic secure communication circuit. Furthermore, the implementation of two novel electronic circuits of the proposed hyperchaotic systems is presented, examined, and realized using physical components. A good qualitative agreement is shown between the simulations and the experimental results around 500 kHz and below 1 MHz.

  1. Complexities, Catastrophes and Cities: Emergency Dynamics in Varying Scenarios and Urban Topologies

    Science.gov (United States)

    Narzisi, Giuseppe; Mysore, Venkatesh; Byeon, Jeewoong; Mishra, Bud

    Complex Systems are often characterized by agents capable of interacting with each other dynamically, often in non-linear and non-intuitive ways. Trying to characterize their dynamics often results in partial differential equations that are difficult, if not impossible, to solve. A large city or a city-state is an example of such an evolving and self-organizing complex environment that efficiently adapts to different and numerous incremental changes to its social, cultural and technological infrastructure [1]. One powerful technique for analyzing such complex systems is Agent-Based Modeling (ABM) [9], which has seen an increasing number of applications in social science, economics and also biology. The agent-based paradigm facilitates easier transfer of domain specific knowledge into a model. ABM provides a natural way to describe systems in which the overall dynamics can be described as the result of the behavior of populations of autonomous components: agents, with a fixed set of rules based on local information and possible central control. As part of the NYU Center for Catastrophe Preparedness and Response (CCPR1), we have been exploring how ABM can serve as a powerful simulation technique for analyzing large-scale urban disasters. The central problem in Disaster Management is that it is not immediately apparent whether the current emergency plans are robust against such sudden, rare and punctuated catastrophic events.

  2. Recycled Uranium Mass Balance Project Y-12 National Security Complex Site Report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-12-01

    This report has been prepared to summarize the findings of the Y-12 National Security Complex (Y-12 Complex) Mass Balance Project and to support preparation of associated U. S. Department of Energy (DOE) site reports. The project was conducted in support of DOE efforts to assess the potential for health and environmental issues resulting from the presence of transuranic (TRU) elements and fission products in recycled uranium (RU) processed by DOE and its predecessor agencies. The United States government used uranium in fission reactors to produce plutonium and tritium for nuclear weapons production. Because uranium was considered scarce relative to demand when these operations began almost 50 years ago, the spent fuel from U.S. fission reactors was processed to recover uranium for recycling. The estimated mass balance for highly enriched RU, which is of most concern for worker exposure and is the primary focus of this project, is summarized in a table. A discrepancy in the mass balance between receipts and shipments (plus inventory and waste) reflects an inability to precisely distinguish between RU and non-RU shipments and receipts involving the Y-12 Complex and Savannah River. Shipments of fresh fuel (non-RU) and sweetener (also non-RU) were made from the Y-12 Complex to Savannah River along with RU shipments. The only way to distinguish between these RU and non-RU streams using available records is by enrichment level. Shipments of {le}90% enrichment were assumed to be RU. Shipments of >90% enrichment were assumed to be non-RU fresh fuel or sweetener. This methodology using enrichment level to distinguish between RU and non-RU results in good estimates of RU flows that are reasonably consistent with Savannah River estimates. Although this is the best available means of distinguishing RU streams, this method does leave a difference of approximately 17.3 MTU between receipts and shipments. Slightly depleted RU streams received by the Y-12 Complex from ORGDP and

  3. Cost and performance analysis of physical security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.; Yates, D.; Jago, W.H.; Phillips, A.W.

    1998-04-01

    Analysis of cost and performance of physical security systems can be a complex, multi-dimensional problem. There are a number of point tools that address various aspects of cost and performance analysis. Increased interest in cost tradeoffs of physical security alternatives has motivated development of an architecture called Cost and Performance Analysis (CPA), which takes a top-down approach to aligning cost and performance metrics. CPA incorporates results generated by existing physical security system performance analysis tools, and utilizes an existing cost analysis tool. The objective of this architecture is to offer comprehensive visualization of complex data to security analysts and decision-makers

  4. A Systematic Approach for Dynamic Security Assessment and the Corresponding Preventive Control Scheme Based on Decision Trees

    DEFF Research Database (Denmark)

    Liu, Leo; Sun, Kai; Rather, Zakir Hussain

    2014-01-01

    This paper proposes a decision tree (DT)-based systematic approach for cooperative online power system dynamic security assessment (DSA) and preventive control. This approach adopts a new methodology that trains two contingency-oriented DTs on a daily basis by the databases generated from power...... system simulations. Fed with real-time wide-area measurements, one DT of measurable variables is employed for online DSA to identify potential security issues, and the other DT of controllable variables provides online decision support on preventive control strategies against those issues. A cost......-effective algorithm is adopted in this proposed approach to optimize the trajectory of preventive control. The paper also proposes an importance sampling algorithm on database preparation for efficient DT training for power systems with high penetration of wind power and distributed generation. The performance...

  5. Modularity and the spread of perturbations in complex dynamical systems.

    Science.gov (United States)

    Kolchinsky, Artemy; Gates, Alexander J; Rocha, Luis M

    2015-12-01

    We propose a method to decompose dynamical systems based on the idea that modules constrain the spread of perturbations. We find partitions of system variables that maximize "perturbation modularity," defined as the autocovariance of coarse-grained perturbed trajectories. The measure effectively separates the fast intramodular from the slow intermodular dynamics of perturbation spreading (in this respect, it is a generalization of the "Markov stability" method of network community detection). Our approach captures variation of modular organization across different system states, time scales, and in response to different kinds of perturbations: aspects of modularity which are all relevant to real-world dynamical systems. It offers a principled alternative to detecting communities in networks of statistical dependencies between system variables (e.g., "relevance networks" or "functional networks"). Using coupled logistic maps, we demonstrate that the method uncovers hierarchical modular organization planted in a system's coupling matrix. Additionally, in homogeneously coupled map lattices, it identifies the presence of self-organized modularity that depends on the initial state, dynamical parameters, and type of perturbations. Our approach offers a powerful tool for exploring the modular organization of complex dynamical systems.

  6. Border Security: A Conceptual Model of Complexity

    Science.gov (United States)

    2013-12-01

    law , constitutional powers, environmental regulations, and civil rights, http://tpplegal.files.wordpress.com/2012/05/isds-domestic-legal-process...Violation NAFTA North American Free Trade Agreement NII Non-Intrusive Inspection POE Port of Entry PPD-8 Presidential Policy Directive 8...security measured? What constitutes a measure of effectiveness for protection? These are all questions presented to representatives of the Department of

  7. Flow-pattern identification and nonlinear dynamics of gas-liquid two-phase flow in complex networks.

    Science.gov (United States)

    Gao, Zhongke; Jin, Ningde

    2009-06-01

    The identification of flow pattern is a basic and important issue in multiphase systems. Because of the complexity of phase interaction in gas-liquid two-phase flow, it is difficult to discern its flow pattern objectively. In this paper, we make a systematic study on the vertical upward gas-liquid two-phase flow using complex network. Three unique network construction methods are proposed to build three types of networks, i.e., flow pattern complex network (FPCN), fluid dynamic complex network (FDCN), and fluid structure complex network (FSCN). Through detecting the community structure of FPCN by the community-detection algorithm based on K -mean clustering, useful and interesting results are found which can be used for identifying five vertical upward gas-liquid two-phase flow patterns. To investigate the dynamic characteristics of gas-liquid two-phase flow, we construct 50 FDCNs under different flow conditions, and find that the power-law exponent and the network information entropy, which are sensitive to the flow pattern transition, can both characterize the nonlinear dynamics of gas-liquid two-phase flow. Furthermore, we construct FSCN and demonstrate how network statistic can be used to reveal the fluid structure of gas-liquid two-phase flow. In this paper, from a different perspective, we not only introduce complex network theory to the study of gas-liquid two-phase flow but also indicate that complex network may be a powerful tool for exploring nonlinear time series in practice.

  8. Bifurcation and complex dynamics of a discrete-time predator-prey system

    Directory of Open Access Journals (Sweden)

    S. M. Sohel Rana

    2015-06-01

    Full Text Available In this paper, we investigate the dynamics of a discrete-time predator-prey system of Holling-I type in the closed first quadrant R+2. The existence and local stability of positive fixed point of the discrete dynamical system is analyzed algebraically. It is shown that the system undergoes a flip bifurcation and a Neimark-Sacker bifurcation in the interior of R+2 by using bifurcation theory. It has been found that the dynamical behavior of the model is very sensitive to the parameter values and the initial conditions. Numerical simulation results not only show the consistence with the theoretical analysis but also display the new and interesting dynamic behaviors, including phase portraits, period-9, 10, 20-orbits, attracting invariant circle, cascade of period-doubling bifurcation from period-20 leading to chaos, quasi-periodic orbits, and sudden disappearance of the chaotic dynamics and attracting chaotic set. In particular, we observe that when the prey is in chaotic dynamic, the predator can tend to extinction or to a stable equilibrium. The Lyapunov exponents are numerically computed to characterize the complexity of the dynamical behaviors. The analysis and results in this paper are interesting in mathematics and biology.

  9. Diffractive optical variable image devices generated by maskless interferometric lithography for optical security

    Science.gov (United States)

    Cabral, Alexandre; Rebordão, José M.

    2011-05-01

    In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.

  10. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  11. While Working Around Security

    DEFF Research Database (Denmark)

    Mathiasen, Niels Raabjerg

    Users of technology encounter various IT security mechanisms in their everyday lives. If these mechanisms fail to support everyday activities, they either get in the way, or the users find a way to work around them. Even though users manage to carry out everyday activities by using substandard...... IT security mechanisms or via workarounds, it will influence their experience of security. If researchers and designers only focus on IT security artifacts and fail to take the user experience into account, incorrect processes or workarounds will occur. Accordingly, to get users to follow the correct process...... may seem to be a criterion of success, even though it may yield a less appropriate experience of security. This dissertation deals with an improved understanding of IT security sensitive IT artifacts and presents three design methods, and a framework for addressing the complexities and contingencies...

  12. Complex scattering dynamics and the quantum Hall effects

    International Nuclear Information System (INIS)

    Trugman, S.A.

    1994-01-01

    We review both classical and quantum potential scattering in two dimensions in a magnetic field, with applications to the quantum Hall effect. Classical scattering is complex, due to the approach of scattering states to an infinite number of dynamically bound states. Quantum scattering follows the classical behavior rather closely, exhibiting sharp resonances in place of the classical bound states. Extended scatterers provide a quantitative explanation for the breakdown of the QHE at a comparatively small Hall voltage as seen by Kawaji et al., and possibly for noise effects

  13. Dynamic torsional motion of a diruthenium complex with four homo-catecholates and first synthesis of a diruthenium complex with mixed-catecholates

    Science.gov (United States)

    Chang, Ho-Chol; Mochizuki, Katsunori; Kitagawa, Susumu

    2008-11-01

    Dynamic properties of a diruthenium complex with ligand-unsupported Ru-Ru triple bonds, Na 2[Ru 2(3,6-DTBCat) 4] ( 1), were studied using variable-temperature 1H NMR. Structural freedom derived from the ligand-unsupported structure leads to torsional motion about the Ru-Ru bonds in THF and in DMF. The observed solvent dependency corresponds to the electrostatic interactions between the diruthenium complex and Na + counter cations, which are sensitive to the polarity of solvents. In addition, a new diruthenium complex, [{Na(THF) 2(H 2O)}{Na(THF) 0.5(H 2O)}{Ru 2(3,6-DTBCat) 2(H 4Cat) 2}] ( 2·2.5THF·2H 2O), with a ligand-unsupported Ru-Ru bond surrounded by two different kinds of catecholate derivatives, has been synthesized and crystallographically characterized. The complex, which was characterized by single-crystal structural analysis, will provide an opportunity to investigate not only static molecular structures but also dynamic physicochemical properties in comparison with analogues containing four identical catecholate derivatives.

  14. The Dynamic VPN Controller. Secure Information Sharing in a Coalition Environment

    Science.gov (United States)

    2005-03-01

    coalitionName=" COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress...34 COALA "> <Security>Class A</Security> <Site siteName="SITE1"> <Remote> <Hostname>dvc.site1.com</Hostname> <IPAddress>10.1.1.1

  15. Three tenets for secure cyber-physical system design and assessment

    Science.gov (United States)

    Hughes, Jeff; Cybenko, George

    2014-06-01

    This paper presents a threat-driven quantitative mathematical framework for secure cyber-physical system design and assessment. Called The Three Tenets, this originally empirical approach has been used by the US Air Force Research Laboratory (AFRL) for secure system research and development. The Tenets were first documented in 2005 as a teachable methodology. The Tenets are motivated by a system threat model that itself consists of three elements which must exist for successful attacks to occur: - system susceptibility; - threat accessibility and; - threat capability. The Three Tenets arise naturally by countering each threat element individually. Specifically, the tenets are: Tenet 1: Focus on What's Critical - systems should include only essential functions (to reduce susceptibility); Tenet 2: Move Key Assets Out-of-Band - make mission essential elements and security controls difficult for attackers to reach logically and physically (to reduce accessibility); Tenet 3: Detect, React, Adapt - confound the attacker by implementing sensing system elements with dynamic response technologies (to counteract the attackers' capabilities). As a design methodology, the Tenets mitigate reverse engineering and subsequent attacks on complex systems. Quantified by a Bayesian analysis and further justified by analytic properties of attack graph models, the Tenets suggest concrete cyber security metrics for system assessment.

  16. Complex dynamics of the generic and brand advertising strategies in duopoly

    International Nuclear Information System (INIS)

    Qi Jie; Ding Yongsheng; Chen Liang

    2008-01-01

    By using the optimal profit adjusting strategies, a dynamic advertising competition model in duopoly is extended from Krishnamurthy's static model. Both generic and brand effects for advertising are considered. This model can create complex bifurcating and chaotic behavior for the generic advertising efforts, which lead to chaotic dynamics for the brand advertising and even for the whole system. The asymptotic properties of the symmetric system and the asymmetric system are also investigated, which reflect interactions between the two firms' advertising strategies and relationships between the brand and the generic advertising expenditures

  17. Complex dynamics of the generic and brand advertising strategies in duopoly

    Energy Technology Data Exchange (ETDEWEB)

    Qi Jie [College of Information Sciences and Technology, Donghua University, Shanghai 200051 (China)], E-mail: jieqi@dhu.edu.cn; Ding Yongsheng [College of Information Sciences and Technology, Donghua University, Shanghai 200051 (China)], E-mail: ysding@dhu.edu.cn; Chen Liang [College of Information Sciences and Technology, Donghua University, Shanghai 200051 (China)

    2008-04-15

    By using the optimal profit adjusting strategies, a dynamic advertising competition model in duopoly is extended from Krishnamurthy's static model. Both generic and brand effects for advertising are considered. This model can create complex bifurcating and chaotic behavior for the generic advertising efforts, which lead to chaotic dynamics for the brand advertising and even for the whole system. The asymptotic properties of the symmetric system and the asymmetric system are also investigated, which reflect interactions between the two firms' advertising strategies and relationships between the brand and the generic advertising expenditures.

  18. Exploration of the dynamic properties of protein complexes predicted from spatially constrained protein-protein interaction networks.

    Directory of Open Access Journals (Sweden)

    Eric A Yen

    2014-05-01

    Full Text Available Protein complexes are not static, but rather highly dynamic with subunits that undergo 1-dimensional diffusion with respect to each other. Interactions within protein complexes are modulated through regulatory inputs that alter interactions and introduce new components and deplete existing components through exchange. While it is clear that the structure and function of any given protein complex is coupled to its dynamical properties, it remains a challenge to predict the possible conformations that complexes can adopt. Protein-fragment Complementation Assays detect physical interactions between protein pairs constrained to ≤8 nm from each other in living cells. This method has been used to build networks composed of 1000s of pair-wise interactions. Significantly, these networks contain a wealth of dynamic information, as the assay is fully reversible and the proteins are expressed in their natural context. In this study, we describe a method that extracts this valuable information in the form of predicted conformations, allowing the user to explore the conformational landscape, to search for structures that correlate with an activity state, and estimate the abundance of conformations in the living cell. The generator is based on a Markov Chain Monte Carlo simulation that uses the interaction dataset as input and is constrained by the physical resolution of the assay. We applied this method to an 18-member protein complex composed of the seven core proteins of the budding yeast Arp2/3 complex and 11 associated regulators and effector proteins. We generated 20,480 output structures and identified conformational states using principle component analysis. We interrogated the conformation landscape and found evidence of symmetry breaking, a mixture of likely active and inactive conformational states and dynamic exchange of the core protein Arc15 between core and regulatory components. Our method provides a novel tool for prediction and

  19. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  20. The dynamical complexity of optically injected semiconductor lasers

    International Nuclear Information System (INIS)

    Wieczorek, S.; Krauskopf, B.; Simpson, T.B.; Lenstra, D.

    2005-01-01

    This report presents a modern approach to the theoretical and experimental study of complex nonlinear behavior of a semiconductor laser with optical injection-an example of a widely applied and technologically relevant forced nonlinear oscillator. We show that the careful bifurcation analysis of a rate equation model yields (i) a deeper understanding of already studied physical phenomena, and (ii) the discovery of new dynamical effects, such as multipulse excitability. Different instabilities, cascades of bifurcations, multistability, and sudden chaotic transitions, which are often viewed as independent, are in fact logically connected into a consistent web of bifurcations via special points called organizing centers. This theoretical bifurcation analysis has predictive power, which manifests itself in good agreement with experimental measurements over a wide range of parameters and diversity of dynamics. While it is dealing with the specific system of an optically injected laser, our work constitutes the state-of-the-art in the understanding and modeling of a nonlinear physical system in general

  1. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  2. Dynamics of anion exchange of lanthanides in aqueous-organic complexing media

    International Nuclear Information System (INIS)

    Sheveleva, I.V.; Bogatyrev, I.O.

    1987-01-01

    Effect of organic solvents (ethanol, acetone, acetonitrile) on change in kinetic parameters of the anion exchange process (anion-exchange column chromatography) of r.e.e. (europium and gadolinium) in complexing nitric acid media has been studied. It is established that complex LnA 4 anion is the only sorbing form of europium and gadolinium on anionite. When the organic component content of the solution being the same, the dynamic parameters of lanthanide exchange have higher values in aqueous-acetonitrile and aqueous-acetone media in comparison with aqueous-enthanol solutions of nitric acid. Lesser mobility of complex lanthanide anions in aqueous-alcoholic solutions can be explained by stronger solvation in the presence of solvents with higher acceptor properties

  3. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  4. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  5. How to secure a wireless sensor network

    NARCIS (Netherlands)

    Law, Y.W.; Havinga, Paul J.M.

    2005-01-01

    The security of wireless sensor networks (WSNs) is a complex issue. While security research of WSNs is progressing at a tremendous pace, and many security techniques have been proposed, no comprehensive framework has so far emerged that attempts to tie the bits and pieces together to ease the

  6. EPR & Klein Paradoxes in Complex Hamiltonian Dynamics and Krein Space Quantization

    Science.gov (United States)

    Payandeh, Farrin

    2015-07-01

    Negative energy states are applied in Krein space quantization approach to achieve a naturally renormalized theory. For example, this theory by taking the full set of Dirac solutions, could be able to remove the propagator Green function's divergences and automatically without any normal ordering, to vanish the expected value for vacuum state energy. However, since it is a purely mathematical theory, the results are under debate and some efforts are devoted to include more physics in the concept. Whereas Krein quantization is a pure mathematical approach, complex quantum Hamiltonian dynamics is based on strong foundations of Hamilton-Jacobi (H-J) equations and therefore on classical dynamics. Based on complex quantum Hamilton-Jacobi theory, complex spacetime is a natural consequence of including quantum effects in the relativistic mechanics, and is a bridge connecting the causality in special relativity and the non-locality in quantum mechanics, i.e. extending special relativity to the complex domain leads to relativistic quantum mechanics. So that, considering both relativistic and quantum effects, the Klein-Gordon equation could be derived as a special form of the Hamilton-Jacobi equation. Characterizing the complex time involved in an entangled energy state and writing the general form of energy considering quantum potential, two sets of positive and negative energies will be realized. The new states enable us to study the spacetime in a relativistic entangled “space-time” state leading to 12 extra wave functions than the four solutions of Dirac equation for a free particle. Arguing the entanglement of particle and antiparticle leads to a contradiction with experiments. So, in order to correct the results, along with a previous investigation [1], we realize particles and antiparticles as physical entities with positive energy instead of considering antiparticles with negative energy. As an application of modified descriptions for entangled (space

  7. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  8. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  9. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  10. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    International Nuclear Information System (INIS)

    Booker, Paul M.; Maple, Scott A.

    2010-01-01

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance

  11. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Directory of Open Access Journals (Sweden)

    Ji-Jian Chin

    2014-01-01

    Full Text Available Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user’s secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  12. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    Science.gov (United States)

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions.

  13. Controlling Uncertainty: A Review of Human Behavior in Complex Dynamic Environments

    Science.gov (United States)

    Osman, Magda

    2010-01-01

    Complex dynamic control (CDC) tasks are a type of problem-solving environment used for examining many cognitive activities (e.g., attention, control, decision making, hypothesis testing, implicit learning, memory, monitoring, planning, and problem solving). Because of their popularity, there have been many findings from diverse domains of research…

  14. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  15. Security engineering: systems engineering of security through the adaptation and application of risk management

    Science.gov (United States)

    Gilliam, David P.; Feather, Martin S.

    2004-01-01

    Information Technology (IT) Security Risk Management is a critical task in the organization, which must protect its resources and data against the loss of confidentiality, integrity, and availability. As systems become more complex and diverse, and more vulnerabilities are discovered while attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security. This paper describes an approach to address IT security risk through risk management and mitigation in both the institution and in the project life cycle.

  16. Structural elucidation of dendritic host-guest complexes by X-ray crystallography and molecular dynamics simulations

    NARCIS (Netherlands)

    Chang, T.; Pieterse, K.; Broeren, M.A.C.; Kooijman, H.; Spek, A.L.; Hilbers, P.A.J.; Meijer, E.W.

    2007-01-01

    The multiple monovalent binding of adamantyl-urea poly(propyleneimine) dendrimers with carboxylic acid-urea guests was investigated using molecular dynamics simulations and X-ray crystallography to better understand the structure and behavior of the dynamic multivalent complex in solution. The

  17. Recovery time after localized perturbations in complex dynamical networks

    International Nuclear Information System (INIS)

    Mitra, Chiranjit; Kittel, Tim; Kurths, Jürgen; Donner, Reik V; Choudhary, Anshul

    2017-01-01

    Maintaining the synchronous motion of dynamical systems interacting on complex networks is often critical to their functionality. However, real-world networked dynamical systems operating synchronously are prone to random perturbations driving the system to arbitrary states within the corresponding basin of attraction, thereby leading to epochs of desynchronized dynamics with a priori unknown durations. Thus, it is highly relevant to have an estimate of the duration of such transient phases before the system returns to synchrony, following a random perturbation to the dynamical state of any particular node of the network. We address this issue here by proposing the framework of single-node recovery time (SNRT) which provides an estimate of the relative time scales underlying the transient dynamics of the nodes of a network during its restoration to synchrony. We utilize this in differentiating the particularly slow nodes of the network from the relatively fast nodes, thus identifying the critical nodes which when perturbed lead to significantly enlarged recovery time of the system before resuming synchronized operation. Further, we reveal explicit relationships between the SNRT values of a network, and its global relaxation time when starting all the nodes from random initial conditions. Earlier work on relaxation time generally focused on investigating its dependence on macroscopic topological properties of the respective network. However, we employ the proposed concept for deducing microscopic relationships between topological features of nodes and their respective SNRT values. The framework of SNRT is further extended to a measure of resilience of the different nodes of a networked dynamical system. We demonstrate the potential of SNRT in networks of Rössler oscillators on paradigmatic topologies and a model of the power grid of the United Kingdom with second-order Kuramoto-type nodal dynamics illustrating the conceivable practical applicability of the proposed

  18. Recovery time after localized perturbations in complex dynamical networks

    Science.gov (United States)

    Mitra, Chiranjit; Kittel, Tim; Choudhary, Anshul; Kurths, Jürgen; Donner, Reik V.

    2017-10-01

    Maintaining the synchronous motion of dynamical systems interacting on complex networks is often critical to their functionality. However, real-world networked dynamical systems operating synchronously are prone to random perturbations driving the system to arbitrary states within the corresponding basin of attraction, thereby leading to epochs of desynchronized dynamics with a priori unknown durations. Thus, it is highly relevant to have an estimate of the duration of such transient phases before the system returns to synchrony, following a random perturbation to the dynamical state of any particular node of the network. We address this issue here by proposing the framework of single-node recovery time (SNRT) which provides an estimate of the relative time scales underlying the transient dynamics of the nodes of a network during its restoration to synchrony. We utilize this in differentiating the particularly slow nodes of the network from the relatively fast nodes, thus identifying the critical nodes which when perturbed lead to significantly enlarged recovery time of the system before resuming synchronized operation. Further, we reveal explicit relationships between the SNRT values of a network, and its global relaxation time when starting all the nodes from random initial conditions. Earlier work on relaxation time generally focused on investigating its dependence on macroscopic topological properties of the respective network. However, we employ the proposed concept for deducing microscopic relationships between topological features of nodes and their respective SNRT values. The framework of SNRT is further extended to a measure of resilience of the different nodes of a networked dynamical system. We demonstrate the potential of SNRT in networks of Rössler oscillators on paradigmatic topologies and a model of the power grid of the United Kingdom with second-order Kuramoto-type nodal dynamics illustrating the conceivable practical applicability of the proposed

  19. Shipment security update - 2003

    International Nuclear Information System (INIS)

    Patterson, John; Anne, Catherine

    2003-01-01

    At the 2002 RERTR, NAC reported on the interim measures taken by the U.S. Nuclear Regulatory Commission to enhance the security afforded to shipments of spent nuclear fuel. Since that time, there have been a number of additional actions focused on shipment security including training programs sponsored by the U.S. Department of Transportation and the Electric Power Research Council, investigation by the Government Accounting Office, and individual measures taken by shippers and transportation agents. The paper will present a status update regarding this dynamic set of events and provide an objective assessment of the cost, schedule and technical implications of the changing security landscape. (author)

  20. Reliability of complex systems under dynamic conditions: A Bayesian multivariate degradation perspective

    International Nuclear Information System (INIS)

    Peng, Weiwen; Li, Yan-Feng; Mi, Jinhua; Yu, Le; Huang, Hong-Zhong

    2016-01-01

    Degradation analysis is critical to reliability assessment and operational management of complex systems. Two types of assumptions are often adopted for degradation analysis: (1) single degradation indicator and (2) constant external factors. However, modern complex systems are generally characterized as multiple functional and suffered from multiple failure modes due to dynamic operating conditions. In this paper, Bayesian degradation analysis of complex systems with multiple degradation indicators under dynamic conditions is investigated. Three practical engineering-driven issues are addressed: (1) to model various combinations of degradation indicators, a generalized multivariate hybrid degradation process model is proposed, which subsumes both monotonic and non-monotonic degradation processes models as special cases, (2) to study effects of external factors, two types of dynamic covariates are incorporated jointly, which include both environmental conditions and operating profiles, and (3) to facilitate degradation based reliability analysis, a serial of Bayesian strategy is constructed, which covers parameter estimation, factor-related degradation prediction, and unit-specific remaining useful life assessment. Finally, degradation analysis of a type of heavy machine tools is presented to demonstrate the application and performance of the proposed method. A comparison of the proposed model with a traditional model is studied as well in the example. - Highlights: • A generalized multivariate hybrid degradation process model is introduced. • Various types of dependent degradation processes can be modeled coherently. • The effects of environmental conditions and operating profiles are investigated. • Unit-specific RUL assessment is implemented through a two-step Bayesian method.

  1. Integrated assessment and scenarios simulation of urban water security system in the southwest of China with system dynamics analysis.

    Science.gov (United States)

    Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao

    2017-11-01

    The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.

  2. Universal dynamics of complex adaptive systems: Gauge theory of things alive

    International Nuclear Information System (INIS)

    Mack, G.

    1994-04-01

    A universal dynamics of objects and their relations - a kind of ''universal chemistry'' - is discussed which satisfies general principles of locality and relativity. Einsteins theory of gravitation and the gauge theory of elementary particles are prototypes, but complex adaptive systems - anything that is alive in the widest sense - fall under the same paradigma. Frustration and gauge symmetry arise naturally in this context. Besides a nondissipative deterministic dynamics, which is thought to operate at a fundamental levle, a Thermo-Dynamics in sense of Prigogine is introduced by adding a diffusion process. It introduces irreversibility and entropy production. It equilibrates the chaotic local model of the time development (only) and is designed to be undetectable under continued observation with given finite measuring accuracy. Compositeness and the development of structure can be described in this framework. The existence of a critical equilibrium state may be postulated which is invariant under the dynamics. But it is usually not reached in a finite time from a given starting configuration, because local dynamics suffers from critical slowing down, especially in the presence of frustration. (orig.)

  3. Stochastic dynamics of complex systems: from glasses to evolution (series on complexity science)

    CERN Document Server

    Sibani, Paolo

    2013-01-01

    Dynamical evolution over long time scales is a prominent feature of all the systems we intuitively think of as complex - for example, ecosystems, the brain or the economy. In physics, the term ageing is used for this type of slow change, occurring over time scales much longer than the patience, or indeed the lifetime, of the observer. The main focus of this book is on the stochastic processes which cause ageing, and the surprising fact that the ageing dynamics of systems which are very different at the microscopic level can be treated in similar ways. The first part of this book provides the necessary mathematical and computational tools and the second part describes the intuition needed to deal with these systems. Some of the first few chapters have been covered in several other books, but the emphasis and selection of the topics reflect both the authors' interests and the overall theme of the book. The second part contains an introduction to the scientific literature and deals in some detail with the desc...

  4. Complexity, Sustainability, Justice, and Meaning: Chronological Versus Dynamical Time

    Directory of Open Access Journals (Sweden)

    Horacio Velasco

    2009-11-01

    ="font-size: small; font-family: Times New Roman;"> 

    When nonlinear dynamics came to be complemented with semiotic modulation through the implement of symbol-mediated language (a complementation subsequently termed semantic closure as first instantiated through the communicating (as opposed  to merely dynamically interacting molecular complexes of the cell, what can be termed semiotic hysteresis was born. The paper attempts to show that indefinitely evolving complexity, sustainability, justice, and meaning are indissolubly bound with chronological time in the sense of semiotic hysteresis (as afforded initially by non-cognitive semantic closure and subsequently, at least one hopes, by cognitive semantic closure: This semiotic hysteresis yields the indefinite evolutionary time of the living condition—including culture.

     

  5. Without bounds a scientific canvas of nonlinearity and complex dynamics

    CERN Document Server

    Ryazantsev, Yuri; Starov, Victor; Huang, Guo-Xiang; Chetverikov, Alexander; Arena, Paolo; Nepomnyashchy, Alex; Ferrus, Alberto; Morozov, Eugene

    2013-01-01

    Bringing together over fifty contributions on all aspects of nonlinear and complex dynamics, this impressive topical collection is both a scientific and personal tribute, on the occasion of his 70th birthday, by many outstanding colleagues in the broad fields of research pursued by Prof. Manuel G Velarde. The topics selected reflect the research areas covered by the famous Instituto Pluridisciplinar at the Universidad Complutense of Madrid, which he co-founded over two decades ago, and include: fluid physics and related nonlinear phenomena at interfaces and in other geometries, wetting and spreading dynamics, geophysical and astrophysical flows, and novel aspects of electronic transport in anharmonic lattices, as well as topics in neurodynamics and robotics.

  6. Dynamic polarizability of a complex atom in strong laser fields

    International Nuclear Information System (INIS)

    Rapoport, L.P.; Klinskikh, A.F.; Mordvinov, V.V.

    1997-01-01

    An asymptotic expansion of the dynamic polarizability of a complex atom in a strong circularly polarized light field is found for the case of high frequencies. The self-consistent approximation of the Hartree-Fock type for the ''atom+field'' system is developed, within the framework of which a numerical calculation of the dynamic polarizability of Ne, Kr, and Ar atoms in a strong radiation field is performed. The strong field effect is shown to manifest itself not only in a change of the energy spectrum and the character of behavior of the wave functions of atomic electrons, but also in a modification of the one-electron self-consistent potential for the atom in the field

  7. A European Perspective on Security Research

    Science.gov (United States)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  8. Mathematical and Statistical Opportunities in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meza, Juan; Campbell, Scott; Bailey, David

    2009-03-23

    The role of mathematics in a complex system such as the Internet has yet to be deeply explored. In this paper, we summarize some of the important and pressing problems in cyber security from the viewpoint of open science environments. We start by posing the question 'What fundamental problems exist within cyber security research that can be helped by advanced mathematics and statistics'? Our first and most important assumption is that access to real-world data is necessary to understand large and complex systems like the Internet. Our second assumption is that many proposed cyber security solutions could critically damage both the openness and the productivity of scientific research. After examining a range of cyber security problems, we come to the conclusion that the field of cyber security poses a rich set of new and exciting research opportunities for the mathematical and statistical sciences.

  9. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  10. Probing the dynamics of complexed local anesthetics via neutron scattering spectroscopy and DFT calculations

    DEFF Research Database (Denmark)

    Longo Martins, Murillo; Eckert, Juergen; Jacobsen, Henrik

    2017-01-01

    Since potential changes in the dynamics and mobility of drugs upon complexation for delivery may affect their ultimate efficacy, we have investigated the dynamics of two local anesthetic molecules, bupivacaine (BVC, C18H28N2O) and ropivacaine (RVC, C17H26N2O), in both their crystalline forms...

  11. Modeling Air Traffic Situation Complexity with a Dynamic Weighted Network Approach

    Directory of Open Access Journals (Sweden)

    Hongyong Wang

    2018-01-01

    Full Text Available In order to address the flight delays and risks associated with the forecasted increase in air traffic, there is a need to increase the capacity of air traffic management systems. This should be based on objective measurements of traffic situation complexity. In current air traffic complexity research, no simple means is available to integrate airspace and traffic flow characteristics. In this paper, we propose a new approach for the measurement of air traffic situation complexity. This approach considers the effects of both airspace and traffic flow and objectively quantifies air traffic situation complexity. Considering the aircraft, waypoints, and airways as nodes, and the complexity relationships among these nodes as edges, a dynamic weighted network is constructed. Air traffic situation complexity is defined as the sum of the weights of all edges in the network, and the relationships of complexity with some commonly used indices are statistically analyzed. The results indicate that the new complexity index is more accurate than traffic count and reflects the number of trajectory changes as well as the high-risk situations. Additionally, analysis of potential applications reveals that this new index contributes to achieving complexity-based management, which represents an efficient method for increasing airspace system capacity.

  12. Heterobimetallic porphyrin complexes displaying triple dynamics: coupled metal motions controlled by constitutional evolution.

    Science.gov (United States)

    Le Gac, Stéphane; Fusaro, Luca; Roisnel, Thierry; Boitrel, Bernard

    2014-05-07

    A bis-strap porphyrin ligand (1), with an overhanging carboxylic acid group on each side of the macrocycle, has been investigated toward the formation of dynamic libraries of bimetallic complexes with Hg(II), Cd(II), and Pb(II). Highly heteroselective metalation processes occurred in the presence of Pb(II), with Hg(II) or Cd(II) bound out-of-plane to the N-core and "PbOAc" bound to a carboxylate group of a strap on the opposite side. The resulting complexes, 1(Hg)·PbOAc and 1(Cd)·PbOAc, display three levels of dynamics. The first is strap-level (interactional dynamics), where the PbOAc moiety swings between the left and right side of the strap owing to a second sphere of coordination with lateral amide functions. The second is ligand-level (motional dynamics), where 1(Hg)·PbOAc and 1(Cd)·PbOAc exist as two degenerate states in equilibrium controlled by a chemical effector (AcO(-)). The process corresponds to a double translocation of the metal ions according to an intramolecular migration of Hg(II) or Cd(II) through the N-core, oscillating between the two equivalent overhanging carbonyl groups, coupled to an intermolecular pathway for PbOAc exchanging between the two equivalent overhanging carboxylate groups (N-core(up) ⇆ N-core(down) coupled to strap(down) ⇆ strap(up), i.e., coupled motion #1 in the abstract graphic). The third is library-level (constitutional dynamics), where a dynamic constitutional evolution of the system was achieved by the successive addition of two chemical effectors (DMAP and then AcO(-)). It allowed shifting equilibrium forward and backward between 1(Hg)·PbOAc and the corresponding homobimetallic complexes 1(Hg2)·DMAP and 1(Pb)·PbOAc. The latter displays a different ligand-level dynamics, in the form of an intraligand coupled migration of the Pb(II) ions (N-core(up) ⇆ strap(up) coupled to strap(down) ⇆ N-core(down), i.e., coupled motion #2 in the abstract graphic). In addition, the neutral "bridged" complexes 1HgPb and 1Cd

  13. Multilevel classification of security concerns in cloud computing

    Directory of Open Access Journals (Sweden)

    Syed Asad Hussain

    2017-01-01

    Full Text Available Threats jeopardize some basic security requirements in a cloud. These threats generally constitute privacy breach, data leakage and unauthorized data access at different cloud layers. This paper presents a novel multilevel classification model of different security attacks across different cloud services at each layer. It also identifies attack types and risk levels associated with different cloud services at these layers. The risks are ranked as low, medium and high. The intensity of these risk levels depends upon the position of cloud layers. The attacks get more severe for lower layers where infrastructure and platform are involved. The intensity of these risk levels is also associated with security requirements of data encryption, multi-tenancy, data privacy, authentication and authorization for different cloud services. The multilevel classification model leads to the provision of dynamic security contract for each cloud layer that dynamically decides about security requirements for cloud consumer and provider.

  14. ASLan++ — A Formal Security Specification Language for Distributed Systems

    DEFF Research Database (Denmark)

    Von Oheimb, David; Mödersheim, Sebastian Alexander

    2010-01-01

    This paper introduces ASLan++, the AVANTSSAR Specification Language. ASLan++ has been designed for formally specifying dynamically composed security-sensitive web services and service-oriented architectures, their associated security policies, as well as their security properties, at both communi...

  15. Data-Driven Modeling of Complex Systems by means of a Dynamical ANN

    Science.gov (United States)

    Seleznev, A.; Mukhin, D.; Gavrilov, A.; Loskutov, E.; Feigin, A.

    2017-12-01

    The data-driven methods for modeling and prognosis of complex dynamical systems become more and more popular in various fields due to growth of high-resolution data. We distinguish the two basic steps in such an approach: (i) determining the phase subspace of the system, or embedding, from available time series and (ii) constructing an evolution operator acting in this reduced subspace. In this work we suggest a novel approach combining these two steps by means of construction of an artificial neural network (ANN) with special topology. The proposed ANN-based model, on the one hand, projects the data onto a low-dimensional manifold, and, on the other hand, models a dynamical system on this manifold. Actually, this is a recurrent multilayer ANN which has internal dynamics and capable of generating time series. Very important point of the proposed methodology is the optimization of the model allowing us to avoid overfitting: we use Bayesian criterion to optimize the ANN structure and estimate both the degree of evolution operator nonlinearity and the complexity of nonlinear manifold which the data are projected on. The proposed modeling technique will be applied to the analysis of high-dimensional dynamical systems: Lorenz'96 model of atmospheric turbulence, producing high-dimensional space-time chaos, and quasi-geostrophic three-layer model of the Earth's atmosphere with the natural orography, describing the dynamics of synoptical vortexes as well as mesoscale blocking systems. The possibility of application of the proposed methodology to analyze real measured data is also discussed. The study was supported by the Russian Science Foundation (grant #16-12-10198).

  16. Data Security in Smart Cities: Challenges and Solutions

    Directory of Open Access Journals (Sweden)

    Daniela POPESCUL

    2016-01-01

    Full Text Available The purpose of this paper is to provide an extensive overview of security-related problems in the context of smart cities, seen as huge data consumers and producers. Trends as hyper connectivity, messy complexity, loss of boundary and industrialized hacking transform smart cities in complex environments in which the already-existing security analysis are not useful anymore. Specific data-security requirements and solutions are approached in a four-layer framework, with elements considered to be critical to the operation of a smart city: smart things, smart spaces, smart systems and smart citizens. As urban management should pay close attention to security and privacy protection, network protocols, identity management, standardization, trusted architecture etc., the paper will serve them as a start point for better decisions in security design and management.

  17. MDcons: Intermolecular contact maps as a tool to analyze the interface of protein complexes from molecular dynamics trajectories

    KAUST Repository

    Abdel-Azeim, Safwat

    2014-05-06

    Background: Molecular Dynamics ( MD) simulations of protein complexes suffer from the lack of specific tools in the analysis step. Analyses of MD trajectories of protein complexes indeed generally rely on classical measures, such as the RMSD, RMSF and gyration radius, conceived and developed for single macromolecules. As a matter of fact, instead, researchers engaged in simulating the dynamics of a protein complex are mainly interested in characterizing the conservation/variation of its biological interface. Results: On these bases, herein we propose a novel approach to the analysis of MD trajectories or other conformational ensembles of protein complexes, MDcons, which uses the conservation of inter-residue contacts at the interface as a measure of the similarity between different snapshots. A "consensus contact map" is also provided, where the conservation of the different contacts is drawn in a grey scale. Finally, the interface area of the complex is monitored during the simulations. To show its utility, we used this novel approach to study two protein-protein complexes with interfaces of comparable size and both dominated by hydrophilic interactions, but having binding affinities at the extremes of the experimental range. MDcons is demonstrated to be extremely useful to analyse the MD trajectories of the investigated complexes, adding important insight into the dynamic behavior of their biological interface. Conclusions: MDcons specifically allows the user to highlight and characterize the dynamics of the interface in protein complexes and can thus be used as a complementary tool for the analysis of MD simulations of both experimental and predicted structures of protein complexes.

  18. Complexity and network dynamics in physiological adaptation: An integrated view

    OpenAIRE

    Baffy, Gyorgy; Loscalzo, Joseph

    2014-01-01

    Living organisms constantly interact with their surroundings and sustain internal stability against perturbations. This dynamic process follows three fundamental strategies (restore, explore, and abandon) articulated in historical concepts of physiological adaptation such as homeostasis, allostasis, and the general adaptation syndrome. These strategies correspond to elementary forms of behavior (ordered, chaotic, and static) in complex adaptive systems and invite a network-based analysis of t...

  19. Efficient estimators for likelihood ratio sensitivity indices of complex stochastic dynamics

    Energy Technology Data Exchange (ETDEWEB)

    Arampatzis, Georgios; Katsoulakis, Markos A.; Rey-Bellet, Luc [Department of Mathematics and Statistics, University of Massachusetts, Amherst, Massachusetts 01003 (United States)

    2016-03-14

    We demonstrate that centered likelihood ratio estimators for the sensitivity indices of complex stochastic dynamics are highly efficient with low, constant in time variance and consequently they are suitable for sensitivity analysis in long-time and steady-state regimes. These estimators rely on a new covariance formulation of the likelihood ratio that includes as a submatrix a Fisher information matrix for stochastic dynamics and can also be used for fast screening of insensitive parameters and parameter combinations. The proposed methods are applicable to broad classes of stochastic dynamics such as chemical reaction networks, Langevin-type equations and stochastic models in finance, including systems with a high dimensional parameter space and/or disparate decorrelation times between different observables. Furthermore, they are simple to implement as a standard observable in any existing simulation algorithm without additional modifications.

  20. The dynamic complexity of a three-species Beddington-type food chain with impulsive control strategy

    International Nuclear Information System (INIS)

    Wang Weiming; Wang Hailing; Li Zhenqing

    2007-01-01

    In this paper, by using theories and methods of ecology and ordinary differential equation, the dynamics complexity of a prey-predator system with Beddington-type functional response and impulsive control strategy is established. Conditions for the system to be extinct are given by using the Floquet theory of impulsive equation and small amplitude perturbation skills. Furthermore, by using the method of numerical simulation with the international software Maple, the influence of the impulsive perturbations on the inherent oscillation is investigated, which shows rich dynamics, such as quasi-periodic oscillation, narrow periodic window, wide periodic window, chaotic bands, period doubling bifurcation, symmetry-breaking pitchfork bifurcation, period-halving bifurcation and crises, etc. The numerical results indicate that computer simulation is a useful method for studying the complex dynamic systems

  1. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization

    Directory of Open Access Journals (Sweden)

    Wai Kuan Yip

    2007-01-01

    Full Text Available We introduce a novel method for secure computation of biometric hash on dynamic hand signatures using BioPhasor mixing and discretization. The use of BioPhasor as the mixing process provides a one-way transformation that precludes exact recovery of the biometric vector from compromised hashes and stolen tokens. In addition, our user-specific discretization acts both as an error correction step as well as a real-to-binary space converter. We also propose a new method of extracting compressed representation of dynamic hand signatures using discrete wavelet transform (DWT and discrete fourier transform (DFT. Without the conventional use of dynamic time warping, the proposed method avoids storage of user's hand signature template. This is an important consideration for protecting the privacy of the biometric owner. Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs of and for random and skilled forgeries for stolen token (worst case scenario, and for both forgeries in the genuine token (optimal scenario.

  2. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  3. COMBINED DELAY AND GRAPH EMBEDDING OF EPILEPTIC DISCHARGES IN EEG REVEALS COMPLEX AND RECURRENT NONLINEAR DYNAMICS.

    Science.gov (United States)

    Erem, B; Hyde, D E; Peters, J M; Duffy, F H; Brooks, D H; Warfield, S K

    2015-04-01

    The dynamical structure of the brain's electrical signals contains valuable information about its physiology. Here we combine techniques for nonlinear dynamical analysis and manifold identification to reveal complex and recurrent dynamics in interictal epileptiform discharges (IEDs). Our results suggest that recurrent IEDs exhibit some consistent dynamics, which may only last briefly, and so individual IED dynamics may need to be considered in order to understand their genesis. This could potentially serve to constrain the dynamics of the inverse source localization problem.

  4. Control of complex dynamics and chaos in distributed parameter systems

    Energy Technology Data Exchange (ETDEWEB)

    Chakravarti, S.; Marek, M.; Ray, W.H. [Univ. of Wisconsin, Madison, WI (United States)

    1995-12-31

    This paper discusses a methodology for controlling complex dynamics and chaos in distributed parameter systems. The reaction-diffusion system with Brusselator kinetics, where the torus-doubling or quasi-periodic (two characteristic incommensurate frequencies) route to chaos exists in a defined range of parameter values, is used as an example. Poincare maps are used for characterization of quasi-periodic and chaotic attractors. The dominant modes or topos, which are inherent properties of the system, are identified by means of the Singular Value Decomposition. Tested modal feedback control schemas based on identified dominant spatial modes confirm the possibility of stabilization of simple quasi-periodic trajectories in the complex quasi-periodic or chaotic spatiotemporal patterns.

  5. Open source systems security certification

    CERN Document Server

    Damiani, Ernesto; El Ioini, Nabil

    2009-01-01

    Open Source Advances in Computer Applications book series provides timely technological and business information for: Enabling Open Source Systems (OSS) to become an integral part of systems and devices produced by technology companies; Inserting OSS in the critical path of complex network development and embedded products, including methodologies and tools for domain-specific OSS testing (lab code available), plus certification of security, dependability and safety properties for complex systems; Ensuring integrated systems, including OSS, meet performance and security requirements as well as achieving the necessary certifications, according to the overall strategy of OSS usage on the part of the adopter

  6. Hash functions and information theoretic security

    DEFF Research Database (Denmark)

    Bagheri, Nasoor; Knudsen, Lars Ramkilde; Naderi, Majid

    2009-01-01

    Information theoretic security is an important security notion in cryptography as it provides a true lower bound for attack complexities. However, in practice attacks often have a higher cost than the information theoretic bound. In this paper we study the relationship between information theoretic...

  7. Managing information technology security risk

    Science.gov (United States)

    Gilliam, David

    2003-01-01

    Information Technology (IT) Security Risk Management is a critical task for the organization to protect against the loss of confidentiality, integrity and availability of IT resources. As systems bgecome more complex and diverse and and attacks from intrusions and malicious content increase, it is becoming increasingly difficult to manage IT security risk. This paper describes a two-pronged approach in addressing IT security risk and risk management in the organization: 1) an institutional enterprise appraoch, and 2) a project life cycle approach.

  8. A complex, nonlinear dynamic systems perspective on Ayurveda and Ayurvedic research.

    Science.gov (United States)

    Rioux, Jennifer

    2012-07-01

    The fields of complexity theory and nonlinear dynamic systems (NDS) are relevant for analyzing the theory and practice of Ayurvedic medicine from a Western scientific perspective. Ayurvedic definitions of health map clearly onto the tenets of both systems and complexity theory and focus primarily on the preservation of organismic equanimity. Health care research informed by NDS and complexity theory would prioritize (1) ascertaining patterns reflected in whole systems as opposed to isolating components; (2) relationships and dynamic interaction rather than static end-points; (3) transitions, change and cumulative effects, consistent with delivery of therapeutic packages in the reality of the clinical setting; and (4) simultaneously exploring both local and global levels of healing phenomena. NDS and complexity theory are useful in examining nonlinear transitions between states of health and illness; the qualitative nature of shifts in health status; and looking at emergent properties and behaviors stemming from interactions between organismic and environmental systems. Complexity and NDS theory also demonstrate promise for enhancing the suitability of research strategies applied to Ayurvedic medicine through utilizing core concepts such as initial conditions, emergent properties, fractal patterns, and critical fluctuations. In the Ayurvedic paradigm, multiple scales and their interactions are addressed simultaneously, necessitating data collection on change patterns that occur on continuums of both time and space, and are viewed as complementary rather than isolated and discrete. Serious consideration of Ayurvedic clinical understandings will necessitate new measurement options that can account for the relevance of both context and environmental factors, in terms of local biology and the processual features of the clinical encounter. Relevant research design issues will need to address clinical tailoring strategies and provide mechanisms for mapping patterns of

  9. Water security, risk, and economic growth: Insights from a dynamical systems model

    Science.gov (United States)

    Dadson, Simon; Hall, Jim W.; Garrick, Dustin; Sadoff, Claudia; Grey, David; Whittington, Dale

    2017-08-01

    Investments in the physical infrastructure, human capital, and institutions needed for water resources management have been noteworthy in the development of most civilizations. These investments affect the economy in two distinct ways: (i) by improving the factor productivity of water in multiple economic sectors, especially those that are water intensive such as agriculture and energy and (ii) by reducing acute and chronic harmful effects of water-related hazards like floods, droughts, and water-related diseases. The need for capital investment to mitigate risks and promote economic growth is widely acknowledged, but prior conceptual work on the relationship between water-related investments and economic growth has focused on the productive and harmful roles of water in the economy independently. Here the two influences are combined using a simple, dynamical systems model of water-related investment, risk, and growth. In cases where initial water security is low, initial investment in water-related assets enables growth. Without such investment, losses due to water-related hazards exert a drag on economic growth and may create a poverty trap. The presence and location of the poverty trap is context-specific and depends on the exposure of productive water-related assets to water-related risk. Exogenous changes in water-related risk can potentially push an economy away from a growth path toward a poverty trap. Our investigation shows that an inverted-U-shaped investment relation between the level of investment in water security and the current level of water security leads to faster rates of growth than the alternatives that we consider here, and that this relation is responsible for the "S"-curve that is posited in the literature. These results illustrate the importance of accounting for environmental and health risks in economic models and offer insights for the design of robust policies for investment in water-related productive assets to manage risk, in the face

  10. Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Songzhu Mei

    2012-09-01

    Full Text Available Cloud computing bring a tremendous complexity to information security. Remote attestation can be used to establish trust relationship in cloud. TBVMM is designed to extend the existing chain of trust into the software layers to support dynamic remote attestation for cloud computing. TBVMM uses Bayesian network and Kalman filter to solve the dynamicity of the trusted relationship. It is proposed to fill the trust gap between the infrastructure and upper software stacks.

  11. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological Univ., Cookeville, TN (United States); Caldwell, Blake A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Hicks, Susan Elaine [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Koch, Scott M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Naughton, III, Thomas J. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pelfrey, Daniel S. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Pogge, James R [Tennessee Technological Univ., Cookeville, TN (United States); Scott, Stephen L [Tennessee Technological Univ., Cookeville, TN (United States); Shipman, Galen M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Sorrillo, Lawrence [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges for the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.

  12. Deciphering deterioration mechanisms of complex diseases based on the construction of dynamic networks and systems analysis

    Science.gov (United States)

    Li, Yuanyuan; Jin, Suoqin; Lei, Lei; Pan, Zishu; Zou, Xiufen

    2015-03-01

    The early diagnosis and investigation of the pathogenic mechanisms of complex diseases are the most challenging problems in the fields of biology and medicine. Network-based systems biology is an important technique for the study of complex diseases. The present study constructed dynamic protein-protein interaction (PPI) networks to identify dynamical network biomarkers (DNBs) and analyze the underlying mechanisms of complex diseases from a systems level. We developed a model-based framework for the construction of a series of time-sequenced networks by integrating high-throughput gene expression data into PPI data. By combining the dynamic networks and molecular modules, we identified significant DNBs for four complex diseases, including influenza caused by either H3N2 or H1N1, acute lung injury and type 2 diabetes mellitus, which can serve as warning signals for disease deterioration. Function and pathway analyses revealed that the identified DNBs were significantly enriched during key events in early disease development. Correlation and information flow analyses revealed that DNBs effectively discriminated between different disease processes and that dysfunctional regulation and disproportional information flow may contribute to the increased disease severity. This study provides a general paradigm for revealing the deterioration mechanisms of complex diseases and offers new insights into their early diagnoses.

  13. Synchronization of complex delayed dynamical networks with nonlinearly coupled nodes

    International Nuclear Information System (INIS)

    Liu Tao; Zhao Jun; Hill, David J.

    2009-01-01

    In this paper, we study the global synchronization of nonlinearly coupled complex delayed dynamical networks with both directed and undirected graphs. Via Lyapunov-Krasovskii stability theory and the network topology, we investigate the global synchronization of such networks. Under the assumption that coupling coefficients are known, a family of delay-independent decentralized nonlinear feedback controllers are designed to globally synchronize the networks. When coupling coefficients are unavailable, an adaptive mechanism is introduced to synthesize a family of delay-independent decentralized adaptive controllers which guarantee the global synchronization of the uncertain networks. Two numerical examples of directed and undirected delayed dynamical network are given, respectively, using the Lorenz system as the nodes of the networks, which demonstrate the effectiveness of proposed results.

  14. The Living, Dynamic and Complex Environment Care in Intensive Care Unit.

    Science.gov (United States)

    Backes, Marli Terezinha Stein; Erdmann, Alacoque Lorenzini; Büscher, Andreas

    2015-01-01

    to understand the meaning of the Adult Intensive Care Unit environment of care, experienced by professionals working in this unit, managers, patients, families and professional support services, as well as build a theoretical model about the Adult Intensive Care Unit environment of care. Grounded Theory, both for the collection and for data analysis. Based on theoretical sampling, we carried out 39 in-depth interviews semi-structured from three different Adult Intensive Care Units. built up the so-called substantive theory "Sustaining life in the complex environment of care in the Intensive Care Unit". It was bounded by eight categories: "caring and continuously monitoring the patient" and "using appropriate and differentiated technology" (causal conditions); "Providing a suitable environment" and "having relatives with concern" (context); "Mediating facilities and difficulties" (intervenienting conditions); "Organizing the environment and managing the dynamics of the unit" (strategy) and "finding it difficult to accept and deal with death" (consequences). confirmed the thesis that "the care environment in the Intensive Care Unit is a living environment, dynamic and complex that sustains the life of her hospitalized patients".

  15. A Novel Computer Virus Propagation Model under Security Classification

    Directory of Open Access Journals (Sweden)

    Qingyi Zhu

    2017-01-01

    Full Text Available In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.

  16. Deciphering complex dynamics of water counteraction around secondary structural elements of allosteric protein complex: Case study of SAP-SLAM system in signal transduction cascade.

    Science.gov (United States)

    Samanta, Sudipta; Mukherjee, Sanchita

    2018-01-28

    The first hydration shell of a protein exhibits heterogeneous behavior owing to several attributes, majorly local polarity and structural flexibility as revealed by solvation dynamics of secondary structural elements. We attempt to recognize the change in complex water counteraction generated due to substantial alteration in flexibility during protein complex formation. The investigation is carried out with the signaling lymphocytic activation molecule (SLAM) family of receptors, expressed by an array of immune cells, and interacting with SLAM-associated protein (SAP), composed of one SH2 domain. All atom molecular dynamics simulations are employed to the aqueous solutions of free SAP and SLAM-peptide bound SAP. We observed that water dynamics around different secondary structural elements became highly affected as well as nicely correlated with the SLAM-peptide induced change in structural rigidity obtained by thermodynamic quantification. A few instances of contradictory dynamic features of water to the change in structural flexibility are explained by means of occluded polar residues by the peptide. For βD, EFloop, and BGloop, both structural flexibility and solvent accessibility of the residues confirm the obvious contribution. Most importantly, we have quantified enhanced restriction in water dynamics around the second Fyn-binding site of the SAP due to SAP-SLAM complexation, even prior to the presence of Fyn. This observation leads to a novel argument that SLAM induced more restricted water molecules could offer more water entropic contribution during the subsequent Fyn binding and provide enhanced stability to the SAP-Fyn complex in the signaling cascade. Finally, SLAM induced water counteraction around the second binding site of the SAP sheds light on the allosteric property of the SAP, which becomes an integral part of the underlying signal transduction mechanism.

  17. Deciphering complex dynamics of water counteraction around secondary structural elements of allosteric protein complex: Case study of SAP-SLAM system in signal transduction cascade

    Science.gov (United States)

    Samanta, Sudipta; Mukherjee, Sanchita

    2018-01-01

    The first hydration shell of a protein exhibits heterogeneous behavior owing to several attributes, majorly local polarity and structural flexibility as revealed by solvation dynamics of secondary structural elements. We attempt to recognize the change in complex water counteraction generated due to substantial alteration in flexibility during protein complex formation. The investigation is carried out with the signaling lymphocytic activation molecule (SLAM) family of receptors, expressed by an array of immune cells, and interacting with SLAM-associated protein (SAP), composed of one SH2 domain. All atom molecular dynamics simulations are employed to the aqueous solutions of free SAP and SLAM-peptide bound SAP. We observed that water dynamics around different secondary structural elements became highly affected as well as nicely correlated with the SLAM-peptide induced change in structural rigidity obtained by thermodynamic quantification. A few instances of contradictory dynamic features of water to the change in structural flexibility are explained by means of occluded polar residues by the peptide. For βD, EFloop, and BGloop, both structural flexibility and solvent accessibility of the residues confirm the obvious contribution. Most importantly, we have quantified enhanced restriction in water dynamics around the second Fyn-binding site of the SAP due to SAP-SLAM complexation, even prior to the presence of Fyn. This observation leads to a novel argument that SLAM induced more restricted water molecules could offer more water entropic contribution during the subsequent Fyn binding and provide enhanced stability to the SAP-Fyn complex in the signaling cascade. Finally, SLAM induced water counteraction around the second binding site of the SAP sheds light on the allosteric property of the SAP, which becomes an integral part of the underlying signal transduction mechanism.

  18. Complex spatial dynamics of oncolytic viruses in vitro: mathematical and experimental approaches.

    Directory of Open Access Journals (Sweden)

    Dominik Wodarz

    Full Text Available Oncolytic viruses replicate selectively in tumor cells and can serve as targeted treatment agents. While promising results have been observed in clinical trials, consistent success of therapy remains elusive. The dynamics of virus spread through tumor cell populations has been studied both experimentally and computationally. However, a basic understanding of the principles underlying virus spread in spatially structured target cell populations has yet to be obtained. This paper studies such dynamics, using a newly constructed recombinant adenovirus type-5 (Ad5 that expresses enhanced jellyfish green fluorescent protein (EGFP, AdEGFPuci, and grows on human 293 embryonic kidney epithelial cells, allowing us to track cell numbers and spatial patterns over time. The cells are arranged in a two-dimensional setting and allow virus spread to occur only to target cells within the local neighborhood. Despite the simplicity of the setup, complex dynamics are observed. Experiments gave rise to three spatial patterns that we call "hollow ring structure", "filled ring structure", and "disperse pattern". An agent-based, stochastic computational model is used to simulate and interpret the experiments. The model can reproduce the experimentally observed patterns, and identifies key parameters that determine which pattern of virus growth arises. The model is further used to study the long-term outcome of the dynamics for the different growth patterns, and to investigate conditions under which the virus population eliminates the target cells. We find that both the filled ring structure and disperse pattern of initial expansion are indicative of treatment failure, where target cells persist in the long run. The hollow ring structure is associated with either target cell extinction or low-level persistence, both of which can be viewed as treatment success. Interestingly, it is found that equilibrium properties of ordinary differential equations describing the

  19. Ultrafast Dynamics of Dansylated POPAM Dendrimers and Energy Transfer in their Dye Complexes

    Science.gov (United States)

    Aumanen, J.; Kesti, T.; Sundström, V.; Vögtle, F.; Korppi-Tommola, J.

    We have studied internal dynamics of dansylated poly(propyleneamine) dendrimers of different generations in solution and excitation energy transfer from dansyl chromophores to xanthene dyes that form van der Waals complexes with the dendrimers

  20. From complex spatial dynamics to simple Markov chain models: do predators and prey leave footprints?

    DEFF Research Database (Denmark)

    Nachman, Gøsta Støger; Borregaard, Michael Krabbe

    2010-01-01

    to another, are then depicted in a state transition diagram, constituting the "footprints" of the underlying population dynamics. We investigate to what extent changes in the population processes modeled in the complex simulation (i.e. the predator's functional response and the dispersal rates of both......In this paper we present a concept for using presence-absence data to recover information on the population dynamics of predator-prey systems. We use a highly complex and spatially explicit simulation model of a predator-prey mite system to generate simple presence-absence data: the number...... of transition probabilities on state variables, and combine this information in a Markov chain transition matrix model. Finally, we use this extended model to predict the long-term dynamics of the system and to reveal its asymptotic steady state properties....

  1. Between security and military identities: The case of Israeli security experts.

    Science.gov (United States)

    Grassiani, Erella

    2018-02-01

    The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.

  2. An introduction to complex systems society, ecology, and nonlinear dynamics

    CERN Document Server

    Fieguth, Paul

    2017-01-01

    This undergraduate text explores a variety of large-scale phenomena - global warming, ice ages, water, poverty - and uses these case studies as a motivation to explore nonlinear dynamics, power-law statistics, and complex systems. Although the detailed mathematical descriptions of these topics can be challenging, the consequences of a system being nonlinear, power-law, or complex are in fact quite accessible. This book blends a tutorial approach to the mathematical aspects of complex systems together with a complementary narrative on the global/ecological/societal implications of such systems. Nearly all engineering undergraduate courses focus on mathematics and systems which are small scale, linear, and Gaussian. Unfortunately there is not a single large-scale ecological or social phenomenon that is scalar, linear, and Gaussian. This book offers students insights to better understand the large-scale problems facing the world and to realize that these cannot be solved by a single, narrow academic field or per...

  3. Dynamics of electronic dephasing in the Fenna-Matthews-Olson complex

    International Nuclear Information System (INIS)

    Hayes, Dugan; Panitchayangkoon, Gitt; Fransted, Kelly A; Caram, Justin R; Freed, Karl F; Engel, Gregory S; Wen Jianzhong

    2010-01-01

    Electronic coherence has been shown to persist in the Fenna-Matthews-Olson (FMO) antenna complex from green sulfur bacteria at 77 K for at least 660 fs, several times longer than the typical lifetime of a coherence in a dynamic environment at this temperature. Such long-lived coherence was proposed to improve energy transfer efficiency in photosynthetic systems by allowing an excitation to follow a quantum random walk as it approaches the reaction centre. Here we present a model for bath-induced electronic transitions, demonstrating that the protein matrix protects coherences by globally correlating fluctuations in transition energies. We also quantify the dephasing rates for two particular electronic coherences in the FMO complex at 77 K using two-dimensional Fourier transform electronic spectroscopy and find that the lifetimes of individual coherences are distinct. Within the framework of noise-assisted transport, this result suggests that the FMO complex has been locally tuned by natural selection to optimize transfer efficiency by exploiting quantum coherence.

  4. Complexity and network dynamics in physiological adaptation: an integrated view.

    Science.gov (United States)

    Baffy, György; Loscalzo, Joseph

    2014-05-28

    Living organisms constantly interact with their surroundings and sustain internal stability against perturbations. This dynamic process follows three fundamental strategies (restore, explore, and abandon) articulated in historical concepts of physiological adaptation such as homeostasis, allostasis, and the general adaptation syndrome. These strategies correspond to elementary forms of behavior (ordered, chaotic, and static) in complex adaptive systems and invite a network-based analysis of the operational characteristics, allowing us to propose an integrated framework of physiological adaptation from a complex network perspective. Applicability of this concept is illustrated by analyzing molecular and cellular mechanisms of adaptation in response to the pervasive challenge of obesity, a chronic condition resulting from sustained nutrient excess that prompts chaotic exploration for system stability associated with tradeoffs and a risk of adverse outcomes such as diabetes, cardiovascular disease, and cancer. Deconstruction of this complexity holds the promise of gaining novel insights into physiological adaptation in health and disease. Published by Elsevier Inc.

  5. Protein dynamics during presynaptic complex assembly on individual ssDNA molecules

    Science.gov (United States)

    Gibb, Bryan; Ye, Ling F.; Kwon, YoungHo; Niu, Hengyao; Sung, Patrick; Greene, Eric C.

    2014-01-01

    Homologous recombination is a conserved pathway for repairing double–stranded breaks, which are processed to yield single–stranded DNA overhangs that serve as platforms for presynaptic complex assembly. Here we use single–molecule imaging to reveal the interplay between Saccharomyce cerevisiae RPA, Rad52, and Rad51 during presynaptic complex assembly. We show that Rad52 binds RPA–ssDNA and suppresses RPA turnover, highlighting an unanticipated regulatory influence on protein dynamics. Rad51 binding extends the ssDNA, and Rad52–RPA clusters remain interspersed along the presynaptic complex. These clusters promote additional binding of RPA and Rad52. Together, our work illustrates the spatial and temporal progression of RPA and Rad52 association with the presynaptic complex, and reveals a novel RPA–Rad52–Rad51–ssDNA intermediate, which has implications for understanding how the activities of Rad52 and RPA are coordinated with Rad51 during the later stages recombination. PMID:25195049

  6. Epidemic dynamics and endemic states in complex networks

    Science.gov (United States)

    Pastor-Satorras, Romualdo; Vespignani, Alessandro

    2001-06-01

    We study by analytical methods and large scale simulations a dynamical model for the spreading of epidemics in complex networks. In networks with exponentially bounded connectivity we recover the usual epidemic behavior with a threshold defining a critical point below that the infection prevalence is null. On the contrary, on a wide range of scale-free networks we observe the absence of an epidemic threshold and its associated critical behavior. This implies that scale-free networks are prone to the spreading and the persistence of infections whatever spreading rate the epidemic agents might possess. These results can help understanding computer virus epidemics and other spreading phenomena on communication and social networks.

  7. Epidemic dynamics and endemic states in complex networks

    International Nuclear Information System (INIS)

    Pastor-Satorras, Romualdo; Vespignani, Alessandro

    2001-01-01

    We study by analytical methods and large scale simulations a dynamical model for the spreading of epidemics in complex networks. In networks with exponentially bounded connectivity we recover the usual epidemic behavior with a threshold defining a critical point below that the infection prevalence is null. On the contrary, on a wide range of scale-free networks we observe the absence of an epidemic threshold and its associated critical behavior. This implies that scale-free networks are prone to the spreading and the persistence of infections whatever spreading rate the epidemic agents might possess. These results can help understanding computer virus epidemics and other spreading phenomena on communication and social networks

  8. Complex Dynamics of an Adnascent-Type Game Model

    Directory of Open Access Journals (Sweden)

    Baogui Xin

    2008-01-01

    Full Text Available The paper presents a nonlinear discrete game model for two oligopolistic firms whose products are adnascent. (In biology, the term adnascent has only one sense, “growing to or on something else,” e.g., “moss is an adnascent plant.” See Webster's Revised Unabridged Dictionary published in 1913 by C. & G. Merriam Co., edited by Noah Porter. The bifurcation of its Nash equilibrium is analyzed with Schwarzian derivative and normal form theory. Its complex dynamics is demonstrated by means of the largest Lyapunov exponents, fractal dimensions, bifurcation diagrams, and phase portraits. At last, bifurcation and chaos anticontrol of this system are studied.

  9. Phase dynamics of complex-valued neural networks and its application to traffic signal control.

    Science.gov (United States)

    Nishikawa, Ikuko; Iritani, Takeshi; Sakakibara, Kazutoshi; Kuroe, Yasuaki

    2005-01-01

    Complex-valued Hopfield networks which possess the energy function are analyzed. The dynamics of the network with certain forms of an activation function is de-composable into the dynamics of the amplitude and phase of each neuron. Then the phase dynamics is described as a coupled system of phase oscillators with a pair-wise sinusoidal interaction. Therefore its phase synchronization mechanism is useful for the area-wide offset control of the traffic signals. The computer simulations show the effectiveness under the various traffic conditions.

  10. Structural dynamics of a noncovalent charge transfer complex from femtosecond stimulated Raman spectroscopy.

    Science.gov (United States)

    Fujisawa, Tomotsumi; Creelman, Mark; Mathies, Richard A

    2012-09-06

    Femtosecond stimulated Raman spectroscopy is used to examine the structural dynamics of photoinduced charge transfer within a noncovalent electron acceptor/donor complex of pyromellitic dianhydride (PMDA, electron acceptor) and hexamethylbenzene (HMB, electron donor) in ethylacetate and acetonitrile. The evolution of the vibrational spectrum reveals the ultrafast structural changes that occur during the charge separation (Franck-Condon excited state complex → contact ion pair) and the subsequent charge recombination (contact ion pair → ground state complex). The Franck-Condon excited state is shown to have significant charge-separated character because its vibrational spectrum is similar to that of the ion pair. The charge separation rate (2.5 ps in ethylacetate and ∼0.5 ps in acetonitrile) is comparable to solvation dynamics and is unaffected by the perdeuteration of HMB, supporting the dominant role of solvent rearrangement in charge separation. On the other hand, the charge recombination slows by a factor of ∼1.4 when using perdeuterated HMB, indicating that methyl hydrogen motions of HMB mediate the charge recombination process. Resonance Raman enhancement of the HMB vibrations in the complex reveals that the ring stretches of HMB, and especially the C-CH(3) deformations are the primary acceptor modes promoting charge recombination.

  11. Complexity and multifractality of neuronal noise in mouse and human hippocampal epileptiform dynamics

    Science.gov (United States)

    Serletis, Demitre; Bardakjian, Berj L.; Valiante, Taufik A.; Carlen, Peter L.

    2012-10-01

    Fractal methods offer an invaluable means of investigating turbulent nonlinearity in non-stationary biomedical recordings from the brain. Here, we investigate properties of complexity (i.e. the correlation dimension, maximum Lyapunov exponent, 1/fγ noise and approximate entropy) and multifractality in background neuronal noise-like activity underlying epileptiform transitions recorded at the intracellular and local network scales from two in vitro models: the whole-intact mouse hippocampus and lesional human hippocampal slices. Our results show evidence for reduced dynamical complexity and multifractal signal features following transition to the ictal epileptiform state. These findings suggest that pathological breakdown in multifractal complexity coincides with loss of signal variability or heterogeneity, consistent with an unhealthy ictal state that is far from the equilibrium of turbulent yet healthy fractal dynamics in the brain. Thus, it appears that background noise-like activity successfully captures complex and multifractal signal features that may, at least in part, be used to classify and identify brain state transitions in the healthy and epileptic brain, offering potential promise for therapeutic neuromodulatory strategies for afflicted patients suffering from epilepsy and other related neurological disorders. This paper is based on chapter 5 of Serletis (2010 PhD Dissertation Department of Physiology, Institute of Biomaterials and Biomedical Engineering, University of Toronto).

  12. A dissipative particle dynamics method for arbitrarily complex geometries

    Science.gov (United States)

    Li, Zhen; Bian, Xin; Tang, Yu-Hang; Karniadakis, George Em

    2018-02-01

    Dissipative particle dynamics (DPD) is an effective Lagrangian method for modeling complex fluids in the mesoscale regime but so far it has been limited to relatively simple geometries. Here, we formulate a local detection method for DPD involving arbitrarily shaped geometric three-dimensional domains. By introducing an indicator variable of boundary volume fraction (BVF) for each fluid particle, the boundary of arbitrary-shape objects is detected on-the-fly for the moving fluid particles using only the local particle configuration. Therefore, this approach eliminates the need of an analytical description of the boundary and geometry of objects in DPD simulations and makes it possible to load the geometry of a system directly from experimental images or computer-aided designs/drawings. More specifically, the BVF of a fluid particle is defined by the weighted summation over its neighboring particles within a cutoff distance. Wall penetration is inferred from the value of the BVF and prevented by a predictor-corrector algorithm. The no-slip boundary condition is achieved by employing effective dissipative coefficients for liquid-solid interactions. Quantitative evaluations of the new method are performed for the plane Poiseuille flow, the plane Couette flow and the Wannier flow in a cylindrical domain and compared with their corresponding analytical solutions and (high-order) spectral element solution of the Navier-Stokes equations. We verify that the proposed method yields correct no-slip boundary conditions for velocity and generates negligible fluctuations of density and temperature in the vicinity of the wall surface. Moreover, we construct a very complex 3D geometry - the "Brown Pacman" microfluidic device - to explicitly demonstrate how to construct a DPD system with complex geometry directly from loading a graphical image. Subsequently, we simulate the flow of a surfactant solution through this complex microfluidic device using the new method. Its

  13. Better decision making in complex, dynamic tasks training with human-facilitated interactive learning environments

    CERN Document Server

    Qudrat-Ullah, Hassan

    2015-01-01

    This book describes interactive learning environments (ILEs) and their underlying concepts. It explains how ILEs can be used to improve the decision-making process and how these improvements can be empirically verified. The objective of this book is to enhance our understanding of and to gain insights into the process by which human facilitated ILEs are effectively designed and used in improving users’ decision making in complex, dynamic tasks. This book is divided into four major parts. Part I serves as an introduction to the importance and complexity of decision making in dynamic tasks. Part II provides background material, drawing upon relevant literature, for the development of an integrated process model on the effectiveness of human facilitated ILEs in improving decision making in dynamic tasks. Part III focuses on the design, development, and application of FishBankILE in laboratory experiments to gather empirical evidence for the validity of the process model. Finally, part IV presents a comprehensi...

  14. Security for Key Management Interfaces

    OpenAIRE

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  15. Information security in the context of philosophy of management

    Directory of Open Access Journals (Sweden)

    Irina Yurievna Alekseeva

    2017-04-01

    Full Text Available Building a culture of information security involves consideration of problems of management in society. Ideas and approaches developed in philosophy of management are relevant to studies in problems of information security in broader methodological and social context. The article focuses on problems of information and psychological security in social systems. The author considers disorienting signs and signals as information threat to security of persons and societies. The author argues that management ideology of pseudo-economical reductionism makes distortion at the level of values and priorities of the system. This ideology exalts competitiveness to the detriment of the systems’ viability. Philosophy of complexity (better known as “philosophy of complex systems” embraces new visions for methodology of management in XXI century. “Observer of complexity” and “complexity of observer of complexity” phenomena are central in this context. The problem of appropriate language for system self-description is of critical importance. This language is necessary for substantive production of intellectual tools for problems solving and decision making; refusal to produce such tools is fraught with decrease of information security level.

  16. EPR and Klein Paradoxes in Complex Hamiltonian Dynamics and Krein Space Quantization

    International Nuclear Information System (INIS)

    Payandeh, Farrin

    2015-01-01

    Negative energy states are applied in Krein space quantization approach to achieve a naturally renormalized theory. For example, this theory by taking the full set of Dirac solutions, could be able to remove the propagator Green function's divergences and automatically without any normal ordering, to vanish the expected value for vacuum state energy. However, since it is a purely mathematical theory, the results are under debate and some efforts are devoted to include more physics in the concept. Whereas Krein quantization is a pure mathematical approach, complex quantum Hamiltonian dynamics is based on strong foundations of Hamilton-Jacobi (H-J) equations and therefore on classical dynamics. Based on complex quantum Hamilton-Jacobi theory, complex spacetime is a natural consequence of including quantum effects in the relativistic mechanics, and is a bridge connecting the causality in special relativity and the non-locality in quantum mechanics, i.e. extending special relativity to the complex domain leads to relativistic quantum mechanics. So that, considering both relativistic and quantum effects, the Klein-Gordon equation could be derived as a special form of the Hamilton-Jacobi equation. Characterizing the complex time involved in an entangled energy state and writing the general form of energy considering quantum potential, two sets of positive and negative energies will be realized. The new states enable us to study the spacetime in a relativistic entangled “space-time” state leading to 12 extra wave functions than the four solutions of Dirac equation for a free particle. Arguing the entanglement of particle and antiparticle leads to a contradiction with experiments. So, in order to correct the results, along with a previous investigation [1], we realize particles and antiparticles as physical entities with positive energy instead of considering antiparticles with negative energy. As an application of modified descriptions for entangled (space

  17. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20

    Directory of Open Access Journals (Sweden)

    Davoren Mary

    2012-07-01

    Full Text Available Abstract Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions

  18. Prospective in-patient cohort study of moves between levels of therapeutic security: the DUNDRUM-1 triage security, DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales and the HCR-20.

    Science.gov (United States)

    Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G

    2012-07-13

    We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and

  19. Optimal system size for complex dynamics in random neural networks near criticality

    Energy Technology Data Exchange (ETDEWEB)

    Wainrib, Gilles, E-mail: wainrib@math.univ-paris13.fr [Laboratoire Analyse Géométrie et Applications, Université Paris XIII, Villetaneuse (France); García del Molino, Luis Carlos, E-mail: garciadelmolino@ijm.univ-paris-diderot.fr [Institute Jacques Monod, Université Paris VII, Paris (France)

    2013-12-15

    In this article, we consider a model of dynamical agents coupled through a random connectivity matrix, as introduced by Sompolinsky et al. [Phys. Rev. Lett. 61(3), 259–262 (1988)] in the context of random neural networks. When system size is infinite, it is known that increasing the disorder parameter induces a phase transition leading to chaotic dynamics. We observe and investigate here a novel phenomenon in the sub-critical regime for finite size systems: the probability of observing complex dynamics is maximal for an intermediate system size when the disorder is close enough to criticality. We give a more general explanation of this type of system size resonance in the framework of extreme values theory for eigenvalues of random matrices.

  20. Optimal system size for complex dynamics in random neural networks near criticality

    International Nuclear Information System (INIS)

    Wainrib, Gilles; García del Molino, Luis Carlos

    2013-01-01

    In this article, we consider a model of dynamical agents coupled through a random connectivity matrix, as introduced by Sompolinsky et al. [Phys. Rev. Lett. 61(3), 259–262 (1988)] in the context of random neural networks. When system size is infinite, it is known that increasing the disorder parameter induces a phase transition leading to chaotic dynamics. We observe and investigate here a novel phenomenon in the sub-critical regime for finite size systems: the probability of observing complex dynamics is maximal for an intermediate system size when the disorder is close enough to criticality. We give a more general explanation of this type of system size resonance in the framework of extreme values theory for eigenvalues of random matrices

  1. Lexical Complexity Development from Dynamic Systems Theory Perspective: Lexical Density, Diversity, and Sophistication

    OpenAIRE

    Reza Kalantari; Javad Gholami

    2017-01-01

    This longitudinal case study explored Iranian EFL learners’ lexical complexity (LC) through the lenses of Dynamic Systems Theory (DST). Fifty independent essays written by five intermediate to advanced female EFL learners in a TOEFL iBT preparation course over six months constituted the corpus of this study. Three Coh-Metrix indices (Graesser, McNamara, Louwerse, & Cai, 2004; McNamara & Graesser, 2012), three Lexical Complexity Analyzer indices (Lu, 2010, 2012; Lu & Ai, 2011...

  2. Correlating contact line capillarity and dynamic contact angle hysteresis in surfactant-nanoparticle based complex fluids

    Science.gov (United States)

    Harikrishnan, A. R.; Dhar, Purbarun; Agnihotri, Prabhat K.; Gedupudi, Sateesh; Das, Sarit K.

    2018-04-01

    Dynamic wettability and contact angle hysteresis can be correlated to shed insight onto any solid-liquid interaction. Complex fluids are capable of altering the expected hysteresis and dynamic wetting behavior due to interfacial interactions. We report the effect of capillary number on the dynamic advancing and receding contact angles of surfactant-based nanocolloidal solutions on hydrophilic, near hydrophobic, and superhydrophobic surfaces by performing forced wetting and de-wetting experiments by employing the embedded needle method. A segregated study is performed to infer the contributing effects of the constituents and effects of particle morphology. The static contact angle hysteresis is found to be a function of particle and surfactant concentrations and greatly depends on the nature of the morphology of the particles. An order of estimate of line energy and a dynamic flow parameter called spreading factor and the transient variations of these parameters are explored which sheds light on the dynamics of contact line movement and response to perturbation of three-phase contact. The Cox-Voinov-Tanner law was found to hold for hydrophilic and a weak dependency on superhydrophobic surfaces with capillary number, and even for the complex fluids, with a varying degree of dependency for different fluids.

  3. Understanding human factors in cyber security as a dynamic system

    NARCIS (Netherlands)

    Young, H.J.; Vliet, A.J. van; Ven, J.G.S. van de; Jol, S.C.; Broekman, C.C.M.T.

    2018-01-01

    The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing

  4. Nonlinear complex dynamics and Keynesian rigidity: A short introduction

    Science.gov (United States)

    Jovero, Edgardo

    2005-09-01

    The topic of this paper is to show that the greater acceptance and intense use of complex nonlinear dynamics in macroeconomics makes sense only within the neoKeynesian tradition. An example is presented regarding the behavior of an open-economy two-sector growth model endowed with Keynesian rigidity. The Keynesian view that structural instability globally exists in the aggregate economy is put forward, and therefore the need arises for policy to alleviate this instability in the form of dampened fluctuations is presented as an alternative view for macroeconomic theorizing.

  5. Media rights and media security

    Science.gov (United States)

    Baugher, Mark

    2005-03-01

    Digital Rights Management (DRM) systems typically do not treat rights management as a security problem. DRM uses cryptographic techniques but not security relationships. Instead, DRM systems use "tamper-resistant mechanisms" to discourage unauthorized access to rights-managed content. Although proven ineffective in practice, tamper-resistant mechanisms penalize legitimate customers with added complexity and costs that arise from tamper-resisting data or program code. This paper explores how a security relationship between provider and consumer might be more effective for managing rights to content works on two-way networks.

  6. Complex dynamics in three-well duffing system with two external forcings

    International Nuclear Information System (INIS)

    Jing Zhujun; Huang Jicai; Deng Jin

    2007-01-01

    Three-well duffing system with two external forcing terms is investigated. The criterion of existence of chaos under the periodic perturbation is given by using Melnikov's method. By using second-order averaging method and Melnikov's method we proved the criterion of existence of chaos in averaged systems under quasi-periodic perturbation for ω 2 = nω 1 + εν, n = 1, 3, 5, and cannot prove the criterion of existence of chaos in second-order averaged system under quasi-periodic perturbation for ω 2 = nω 1 + εν, n = 2, 4, 6, 7, 8, 9, 10, 11, 12, where ν is not rational to ω 1 , but can show the occurrence of chaos in original system by numerical simulation. Numerical simulations including heteroclinic and homoclinic bifurcation surfaces, bifurcation diagrams, maximum Lyapunov exponents and Poincare map are given to illustrate the theoretical analysis, and to expose the more new complex dynamical behaviors. We show that cascades of period-doubling bifurcations from period-one to four orbits, cascades of interlocking period-doubling bifurcations from period-two orbits of two sets, from quasi-periodicity leading to chaos, onset of chaos which occurs more than one, interleaving occurrences of chaotic behavior and invariant torus, transient chaos with complex period windows and interior crisis, chaos converting to torus, different kind of chaotic attractors. Our results shows that the dynamical behaviors are different from the dynamics of duffing equation with two-well and two external forcings

  7. Kinetics of the Dynamical Information Shannon Entropy for Complex Systems

    International Nuclear Information System (INIS)

    Yulmetyev, R.M.; Yulmetyeva, D.G.

    1999-01-01

    Kinetic behaviour of dynamical information Shannon entropy is discussed for complex systems: physical systems with non-Markovian property and memory in correlation approximation, and biological and physiological systems with sequences of the Markovian and non-Markovian random noises. For the stochastic processes, a description of the information entropy in terms of normalized time correlation functions is given. The influence and important role of two mutually dependent channels of the entropy change, correlation (creation or generation of correlations) and anti-correlation (decay or annihilation of correlation) is discussed. The method developed here is also used in analysis of the density fluctuations in liquid cesium obtained from slow neutron scattering data, fractal kinetics of the long-range fluctuation in the short-time human memory and chaotic dynamics of R-R intervals of human ECG. (author)

  8. Functional Security Model: Managers Engineers Working Together

    Science.gov (United States)

    Guillen, Edward Paul; Quintero, Rulfo

    2008-05-01

    Information security has a wide variety of solutions including security policies, network architectures and technological applications, they are usually designed and implemented by security architects, but in its own complexity this solutions are difficult to understand by company managers and they are who finally fund the security project. The main goal of the functional security model is to achieve a solid security platform reliable and understandable in the whole company without leaving of side the rigor of the recommendations and the laws compliance in a single frame. This paper shows a general scheme of the model with the use of important standards and tries to give an integrated solution.

  9. A new algorithm for combined dynamic economic emission dispatch with security constraints

    International Nuclear Information System (INIS)

    Arul, R.; Velusami, S.; Ravi, G.

    2015-01-01

    The primary objective of CDEED (combined dynamic economic emission dispatch) problem is to determine the optimal power generation schedule for the online generating units over a time horizon considered and simultaneously minimizing the emission level and satisfying the generators and system constraints. The CDEED problem is bi-objective optimization problem, where generation cost and emission are considered as two competing objective functions. This bi-objective CDEED problem is represented as a single objective optimization problem by assigning different weights for each objective functions. The weights are varied in steps and for each variation one compromise solution are generated and finally fuzzy based selection method is used to select the best compromise solution from the set of compromise solutions obtained. In order to reflect the test systems considered as real power system model, the security constraints are also taken into account. Three new versions of DHS (differential harmony search) algorithms have been proposed to solve the CDEED problems. The feasibility of the proposed algorithms is demonstrated on IEEE-26 and IEEE-39 bus systems. The result obtained by the proposed CSADHS (chaotic self-adaptive differential harmony search) algorithm is found to be better than EP (evolutionary programming), DHS, and the other proposed algorithms in terms of solution quality, convergence speed and computation time. - Highlights: • In this paper, three new algorithms CDHS, SADHS and CSADHS are proposed. • To solve DED with emission, poz's, spinning reserve and security constraints. • Results obtained by the proposed CSADHS algorithm are better than others. • The proposed CSADHS algorithm has fast convergence characteristic than others

  10. Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space

    Directory of Open Access Journals (Sweden)

    Antti Evesti

    2013-03-01

    Full Text Available Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Self-adaptive security is an applicable solution for this challenge. This paper presents an architectural approach for security adaptation in smart spaces. The approach combines an adaptation loop, Information Security Measuring Ontology (ISMO and a smart space security-control model. The adaptation loop includes phases to monitor, analyze, plan and execute changes in the smart space. The ISMO offers input knowledge for the adaptation loop and the security-control model enforces dynamic access control policies. The approach is novel because it defines the whole adaptation loop and knowledge required in each phase of the adaptation. The contributions are validated as a part of the smart space pilot implementation. The approach offers reusable and extensible means to achieve adaptive security in smart spaces and up-to-date access control for devices that appear in the space. Hence, the approach supports the work of smart space application developers.

  11. Exponential synchronization of complex networks with nonidentical time-delayed dynamical nodes

    International Nuclear Information System (INIS)

    Cai Shuiming; He Qinbin; Hao Junjun; Liu Zengrong

    2010-01-01

    In this Letter, exponential synchronization of a complex network with nonidentical time-delayed dynamical nodes is considered. Two effective control schemes are proposed to drive the network to synchronize globally exponentially onto any smooth goal dynamics. By applying open-loop control to all nodes and adding some intermittent controllers to partial nodes, some simple criteria for exponential synchronization of such network are established. Meanwhile, a pinning scheme deciding which nodes need to be pinned and a simply approximate formula for estimating the least number of pinned nodes are also provided. By introducing impulsive effects to the open-loop controlled network, another synchronization scheme is developed for the network with nonidentical time-delayed dynamical nodes, and an estimate of the upper bound of impulsive intervals ensuring global exponential stability of the synchronization process is also given. Numerical simulations are presented finally to demonstrate the effectiveness of the theoretical results.

  12. Assessing the effect of marine reserves on household food security in Kenyan coral reef fishing communities.

    Directory of Open Access Journals (Sweden)

    Emily S Darling

    Full Text Available Measuring the success or failure of natural resource management is a key challenge to evaluate the impact of conservation for ecological, economic and social outcomes. Marine reserves are a popular tool for managing coastal ecosystems and resources yet surprisingly few studies have quantified the social-economic impacts of marine reserves on food security despite the critical importance of this outcome for fisheries management in developing countries. Here, I conducted semi-structured household surveys with 113 women heads-of-households to investigate the influence of two old, well-enforced, no-take marine reserves on food security in four coastal fishing communities in Kenya, East Africa. Multi-model information-theoretic inference and matching methods found that marine reserves did not influence household food security, as measured by protein consumption, diet diversity and food coping strategies. Instead, food security was strongly influenced by fishing livelihoods and household wealth: fishing families and wealthier households were more food secure than non-fishing and poorer households. These findings highlight the importance of complex social and economic landscapes of livelihoods, urbanization, power and gender dynamics that can drive the outcomes of marine conservation and management.

  13. [Molecular dynamics of immune complex of photoadduct-containing DNA with Fab-Anti-DNA antibody fragment].

    Science.gov (United States)

    Akberova, N I; Zhmurov, A A; Nevzorova, T A; Litvinov, R I

    2016-01-01

    Antibodies to DNA play an important role in the pathogenesis of autoimmune diseases. The elucidation of structural mechanisms of both the antigen recognition and the interaction of anti-DNA antibodies with DNA will help to understand the role of DNA-containing immune complexes in various pathologies and can provide a basis for new treatment modalities. Moreover, the DNA-antibody complex is an analog of specific intracellular DNA-protein interactions. In this work, we used in silico molecular dynamic simulations of bimolecular complexes of the dsDNA segment containing the Fab fragment of an anti-DNA antibody to obtain the detailed thermodynamic and structural characteristics of dynamic intermolecular interactions. Using computationally modified crystal structure of the Fab-DNA complex (PDB ID: 3VW3), we studied the equilibrium molecular dynamics of the 64M-5 antibody Fab fragment associated with the dsDNA fragment containing the thymine dimer, the product of DNA photodamage. Amino acid residues that constitute paratopes and the complementary nucleotide epitopes for the Fab-DNA construct were identified. Stacking and electrostatic interactions were found to play the main role in mediating the most specific antibody-dsDNA contacts, while hydrogen bonds were less significant. These findings may shed light on the formation and properties of pathogenic anti-DNA antibodies in autoimmune diseases, such as systemic lupus erythematosus associated with skin photosensitivity and DNA photodamage.

  14. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  15. Sensitivity analysis of complex models: Coping with dynamic and static inputs

    International Nuclear Information System (INIS)

    Anstett-Collin, F.; Goffart, J.; Mara, T.; Denis-Vidal, L.

    2015-01-01

    In this paper, we address the issue of conducting a sensitivity analysis of complex models with both static and dynamic uncertain inputs. While several approaches have been proposed to compute the sensitivity indices of the static inputs (i.e. parameters), the one of the dynamic inputs (i.e. stochastic fields) have been rarely addressed. For this purpose, we first treat each dynamic as a Gaussian process. Then, the truncated Karhunen–Loève expansion of each dynamic input is performed. Such an expansion allows to generate independent Gaussian processes from a finite number of independent random variables. Given that a dynamic input is represented by a finite number of random variables, its variance-based sensitivity index is defined by the sensitivity index of this group of variables. Besides, an efficient sampling-based strategy is described to estimate the first-order indices of all the input factors by only using two input samples. The approach is applied to a building energy model, in order to assess the impact of the uncertainties of the material properties (static inputs) and the weather data (dynamic inputs) on the energy performance of a real low energy consumption house. - Highlights: • Sensitivity analysis of models with uncertain static and dynamic inputs is performed. • Karhunen–Loève (KL) decomposition of the spatio/temporal inputs is performed. • The influence of the dynamic inputs is studied through the modes of the KL expansion. • The proposed approach is applied to a building energy model. • Impact of weather data and material properties on performance of real house is given

  16. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  17. Keystone Business Models for Network Security Processors

    OpenAIRE

    Arthur Low; Steven Muegge

    2013-01-01

    Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor...

  18. Dynamic (2, 3) Threshold Quantum Secret Sharing of Secure Direct Communication

    International Nuclear Information System (INIS)

    Lai Hong; Xiao Jing-Hua; Mehmet, Orgun A.; Josef, Pieprzyk; Xue Li-Yin

    2015-01-01

    In this paper, we show that a (2, 3) discrete variable threshold quantum secret sharing scheme of secure direct communication can be achieved based on recurrence using the same devices as in BB84. The scheme is devised by first placing the shares of smaller secret pieces into the shares of the largest secret piece, converting the shares of the largest secret piece into corresponding quantum state sequences, inserting nonorthogonal state particles into the quantum state sequences with the purpose of detecting eavesdropping, and finally sending the new quantum state sequences to the three participants respectively. Consequently, every particle can on average carry up to 1.5-bit messages due to the use of recurrence. The control codes are randomly prepared using the way to generate fountain codes with pre-shared source codes between Alice and Bob, making three participants can detect eavesdropping by themselves without sending classical messages to Alice. Due to the flexible encoding, our scheme is also dynamic, which means that it allows the participants to join and leave freely. (paper)

  19. A Holistic and Immune System inspired Security Framework

    OpenAIRE

    Mwakalinga, G. Jeffy; Yngström, Louise; Kowalski, Stewart

    2009-01-01

    This paper presents a Framework for adaptive information security systems for securing information systems. Information systems today are vulnerable and not adaptive to the dynamic environments because initial development of these systems focused on computer technology and communications protocol only. Most research in information security does not consider culture of users, system environments and does not pay enough attention to the enemies of information systems. As a result, users serve t...

  20. The Living, Dynamic and Complex Environment Care in Intensive Care Unit

    Directory of Open Access Journals (Sweden)

    Marli Terezinha Stein Backes

    2015-06-01

    Full Text Available OBJECTIVE: to understand the meaning of the Adult Intensive Care Unit environment of care, experienced by professionals working in this unit, managers, patients, families and professional support services, as well as build a theoretical model about the Adult Intensive Care Unit environment of care.METHOD: Grounded Theory, both for the collection and for data analysis. Based on theoretical sampling, we carried out 39 in-depth interviews semi-structured from three different Adult Intensive Care Units.RESULTS: built up the so-called substantive theory "Sustaining life in the complex environment of care in the Intensive Care Unit". It was bounded by eight categories: "caring and continuously monitoring the patient" and "using appropriate and differentiated technology" (causal conditions; "Providing a suitable environment" and "having relatives with concern" (context; "Mediating facilities and difficulties" (intervenienting conditions; "Organizing the environment and managing the dynamics of the unit" (strategy and "finding it difficult to accept and deal with death" (consequences.CONCLUSION: confirmed the thesis that "the care environment in the Intensive Care Unit is a living environment, dynamic and complex that sustains the life of her hospitalized patients".

  1. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  2. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  3. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  4. Molecular dynamic simulation of the self-assembly of DAP12-NKG2C activating immunoreceptor complex.

    Directory of Open Access Journals (Sweden)

    Peng Wei

    Full Text Available The DAP12-NKG2C activating immunoreceptor complex is one of the multisubunit transmembrane protein complexes in which ligand-binding receptor chains assemble with dimeric signal-transducing modules through non-covalent associations in their transmembrane (TM domains. In this work, both coarse grained and atomistic molecular dynamic simulation methods were applied to investigate the self-assembly dynamics of the transmembrane domains of the DAP12-NKG2C activating immunoreceptor complex. Through simulating the dynamics of DAP12-NKG2C TM heterotrimer and point mutations, we demonstrated that a five-polar-residue motif including: 2 Asps and 2 Thrs in DAP12 dimer, as well as 1 Lys in NKG2C TM plays an important role in the assembly structure of the DAP12-NKG2C TM heterotrimer. Furthermore, we provided clear evidences to exclude the possibility that another NKG2C could stably associate with the DAP12-NKG2C heterotrimer. Based on the simulation results, we proposed a revised model for the self-assembly of DAP12-NKG2C activating immunoreceptor complex, along with a plausible explanation for the association of only one NKG2C with a DAP12 dimer.

  5. A dynamic simulation model of the Savannah River Site high level waste complex

    International Nuclear Information System (INIS)

    Gregory, M.V.; Aull, J.E.; Dimenna, R.A.

    1994-01-01

    A detailed, dynamic simulation entire high level radioactive waste complex at the Savannah River Site has been developed using SPEEDUP(tm) software. The model represents mass transfer, evaporation, precipitation, sludge washing, effluent treatment, and vitrification unit operation processes through the solution of 7800 coupled differential and algebraic equations. Twenty-seven discrete chemical constituents are tracked through the unit operations. The simultaneous simultaneous simulation of concurrent batch and continuous processes is achieved by several novel, customized SPEEDUP(tm) algorithms. Due to the model's computational burden, a high-end work station is required: simulation of a years operation of the complex requires approximately three CPU hours on an IBM RS/6000 Model 590 processor. The model will be used to develop optimal high level waste (HLW) processing strategies over a thirty year time horizon. It will be employed to better understand the dynamic inter-relationships between different HLW unit operations, and to suggest strategies that will maximize available working tank space during the early years of operation and minimize overall waste processing cost over the long-term history of the complex. Model validation runs are currently underway with comparisons against actual plant operating data providing an excellent match

  6. Bifurcation and complex dynamics of a discrete-time predator-prey system involving group defense

    Directory of Open Access Journals (Sweden)

    S. M. Sohel Rana

    2015-09-01

    Full Text Available In this paper, we investigate the dynamics of a discrete-time predator-prey system involving group defense. The existence and local stability of positive fixed point of the discrete dynamical system is analyzed algebraically. It is shown that the system undergoes a flip bifurcation and a Neimark-Sacker bifurcation in the interior of R+2 by using bifurcation theory. Numerical simulation results not only show the consistence with the theoretical analysis but also display the new and interesting dynamical behaviors, including phase portraits, period-7, 20-orbits, attracting invariant circle, cascade of period-doubling bifurcation from period-20 leading to chaos, quasi-periodic orbits, and sudden disappearance of the chaotic dynamics and attracting chaotic set. The Lyapunov exponents are numerically computed to characterize the complexity of the dynamical behaviors.

  7. Snow cover dynamics and water balance in complex high alpine terrain

    Science.gov (United States)

    Warscher, Michael; Kraller, Gabriele; Kunstmann, Harald; Strasser, Ulrich; Franz, Helmut

    2010-05-01

    The water balance in high alpine regions in its full complexity is so far insufficiently understood. High altitudinal gradients, a strong variability of meteorological variables in time and space, complex hydrogeological situations, unquantified lateral snow transport processes and heterogenous snow cover dynamics result in high uncertainties in the quantification of the water balance. To achieve interpretable modeling results we have complemented the deterministic hydrological model WaSiM-ETH with the high-alpine specific snow model AMUNDSEN. The integration of the new snow module was done to improve the modeling of water fluxes influenced by the dynamics of the snow cover, which greatly affect the water cycle in high alpine regions. To enhance the reproduction of snow deposition and ablation processes, the new approach calculates the energy balance of the snow cover considering the terrain-dependent radiation fluxes, the interaction between tree canopy and snow cover as well as lateral snow transport processes. The test site for our study is the Berchtesgaden National Park which is characterized by an extreme topography with mountain ranges covering an altitude from 607 to 2713 m.a.s.l. About one quarter of the investigated catchment area, which comprises 433 km² in total, is terrain steeper than 35°. Due to water soluble limestone being predominant in the region, a high number of subsurface water pathways (karst) exist. The results of several tracer experiments and extensive data of spring observations provide additional information to meet the challenge of modeling the unknown subsurface pathways and the complex groundwater system of the region. The validation of the new snow module is based on a dense network of meteorological stations which have been adapted to measure physical properties of the snow cover like snow water equivalent and liquid water content. We will present first results which show that the integration of the new snow module generates a

  8. Information Security and Integrity Systems

    Science.gov (United States)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  9. A novel multilayer model for missing link prediction and future link forecasting in dynamic complex networks

    Science.gov (United States)

    Yasami, Yasser; Safaei, Farshad

    2018-02-01

    The traditional complex network theory is particularly focused on network models in which all network constituents are dealt with equivalently, while fail to consider the supplementary information related to the dynamic properties of the network interactions. This is a main constraint leading to incorrect descriptions of some real-world phenomena or incomplete capturing the details of certain real-life problems. To cope with the problem, this paper addresses the multilayer aspects of dynamic complex networks by analyzing the properties of intrinsically multilayered co-authorship networks, DBLP and Astro Physics, and presenting a novel multilayer model of dynamic complex networks. The model examines the layers evolution (layers birth/death process and lifetime) throughout the network evolution. Particularly, this paper models the evolution of each node's membership in different layers by an Infinite Factorial Hidden Markov Model considering feature cascade, and thereby formulates the link generation process for intra-layer and inter-layer links. Although adjacency matrixes are useful to describe the traditional single-layer networks, such a representation is not sufficient to describe and analyze the multilayer dynamic networks. This paper also extends a generalized mathematical infrastructure to address the problems issued by multilayer complex networks. The model inference is performed using some Markov Chain Monte Carlo sampling strategies, given synthetic and real complex networks data. Experimental results indicate a tremendous improvement in the performance of the proposed multilayer model in terms of sensitivity, specificity, positive and negative predictive values, positive and negative likelihood ratios, F1-score, Matthews correlation coefficient, and accuracy for two important applications of missing link prediction and future link forecasting. The experimental results also indicate the strong predictivepower of the proposed model for the application of

  10. Identifying partial topology of complex dynamical networks via a pinning mechanism

    Science.gov (United States)

    Zhu, Shuaibing; Zhou, Jin; Lu, Jun-an

    2018-04-01

    In this paper, we study the problem of identifying the partial topology of complex dynamical networks via a pinning mechanism. By using the network synchronization theory and the adaptive feedback controlling method, we propose a method which can greatly reduce the number of nodes and observers in the response network. Particularly, this method can also identify the whole topology of complex networks. A theorem is established rigorously, from which some corollaries are also derived in order to make our method more cost-effective. Several numerical examples are provided to verify the effectiveness of the proposed method. In the simulation, an approach is also given to avoid possible identification failure caused by inner synchronization of the drive network.

  11. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with hi......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network.......In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with high...... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load...

  12. Lutetium(III) aqua ion: On the dynamical structure of the heaviest lanthanoid hydration complex

    Energy Technology Data Exchange (ETDEWEB)

    Sessa, Francesco; D’Angelo, Paola, E-mail: p.dangelo@uniroma1.it [Dipartimento di Chimica, Università di Roma “La Sapienza,” P. le A. Moro 5, 00185 Roma (Italy); Spezia, Riccardo [CNRS, UMR 8587, Laboratoire Analyse et Modelisation Pour la Biologie et l’Environnement, Université d’Evry Val d’Essonne, Blvd. F. Mitterrand, 91025 Evry Cedex (France)

    2016-05-28

    The structure and dynamics of the lutetium(III) ion in aqueous solution have been investigated by means of a polarizable force field molecular dynamics (MD). An 8-fold square antiprism (SAP) geometry has been found to be the dominant configuration of the lutetium(III) aqua ion. Nevertheless, a low percentage of 9-fold complexes arranged in a tricapped trigonal prism (TTP) geometry has been also detected. Dynamic properties have been explored by carrying out six independent MD simulations for each of four different temperatures: 277 K, 298 K, 423 K, 632 K. The mean residence time of water molecules in the first hydration shell at room temperature has been found to increase as compared to the central elements of the lanthanoid series in agreement with previous experimental findings. Water exchange kinetic rate constants at each temperature and activation parameters of the process have been determined from the MD simulations. The obtained structural and dynamical results suggest that the water exchange process for the lutetium(III) aqua ion proceeds with an associative mechanism, in which the SAP hydration complex undergoes temporary structural changes passing through a 9-fold TTP intermediate. Such results are consistent with the water exchange mechanism proposed for heavy lanthanoid atoms.

  13. The emergence of learning-teaching trajectories in education: a complex dynamic systems approach.

    Science.gov (United States)

    Steenbeek, Henderien; van Geert, Paul

    2013-04-01

    In this article we shall focus on learning-teaching trajectories ='successful' as well as 'unsuccessful' ones - as emergent and dynamic phenomena resulting from the interactions in the entire educational context, in particular the interaction between students and teachers viewed as processes of intertwining self-, other- and co-regulation. The article provides a review of the educational research literature on action regulation in learning and teaching, and interprets this literature in light of the theory of complex dynamic systems. Based on this reinterpretation of the literature, two dynamic models are proposed, one focusing on the short-term dynamics of learning-teaching interactions as they take place in classrooms, the other focusing on the long-term dynamics of interactions in a network of variables encompassing concerns, evaluations, actions and action effects (such as learning) students and teachers. The aim of presenting these models is to demonstrate, first, the possibility of transforming existing educational theory into dynamic models and, second, to provide some suggestions as to how such models can be used to further educational theory and practice.

  14. The diminishing role of hubs in dynamical processes on complex networks.

    Science.gov (United States)

    Quax, Rick; Apolloni, Andrea; Sloot, Peter M A

    2013-11-06

    It is notoriously difficult to predict the behaviour of a complex self-organizing system, where the interactions among dynamical units form a heterogeneous topology. Even if the dynamics of each microscopic unit is known, a real understanding of their contributions to the macroscopic system behaviour is still lacking. Here, we develop information-theoretical methods to distinguish the contribution of each individual unit to the collective out-of-equilibrium dynamics. We show that for a system of units connected by a network of interaction potentials with an arbitrary degree distribution, highly connected units have less impact on the system dynamics when compared with intermediately connected units. In an equilibrium setting, the hubs are often found to dictate the long-term behaviour. However, we find both analytically and experimentally that the instantaneous states of these units have a short-lasting effect on the state trajectory of the entire system. We present qualitative evidence of this phenomenon from empirical findings about a social network of product recommendations, a protein-protein interaction network and a neural network, suggesting that it might indeed be a widespread property in nature.

  15. Thermal proximity coaggregation for system-wide profiling of protein complex dynamics in cells.

    Science.gov (United States)

    Tan, Chris Soon Heng; Go, Ka Diam; Bisteau, Xavier; Dai, Lingyun; Yong, Chern Han; Prabhu, Nayana; Ozturk, Mert Burak; Lim, Yan Ting; Sreekumar, Lekshmy; Lengqvist, Johan; Tergaonkar, Vinay; Kaldis, Philipp; Sobota, Radoslaw M; Nordlund, Pär

    2018-03-09

    Proteins differentially interact with each other across cellular states and conditions, but an efficient proteome-wide strategy to monitor them is lacking. We report the application of thermal proximity coaggregation (TPCA) for high-throughput intracellular monitoring of protein complex dynamics. Significant TPCA signatures observed among well-validated protein-protein interactions correlate positively with interaction stoichiometry and are statistically observable in more than 350 annotated human protein complexes. Using TPCA, we identified many complexes without detectable differential protein expression, including chromatin-associated complexes, modulated in S phase of the cell cycle. Comparison of six cell lines by TPCA revealed cell-specific interactions even in fundamental cellular processes. TPCA constitutes an approach for system-wide studies of protein complexes in nonengineered cells and tissues and might be used to identify protein complexes that are modulated in diseases. Copyright © 2018 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  16. Secure Multiparty Quantum Computation for Summation and Multiplication.

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-21

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  17. Cognitive dynamics: complexity and creativity

    Energy Technology Data Exchange (ETDEWEB)

    Arecchi, F Tito [Dipartimento di Fisica, Universita di Firenze (Italy); Istituto Nazionale di Ottica Applicata, Florence (Italy)

    2007-05-15

    A scientific problem described within a given code is mapped by a corresponding computational problem. We call (algorithmic) complexity the bit length of the shortest instruction which solves the problem. Deterministic chaos in general affects a dynamical system making the corresponding problem experimentally and computationally heavy, since one must reset the initial conditions at a rate higher than that of information loss (Kolmogorov entropy). One can control chaos by adding to the system new degrees of freedom (information swapping: information lost by chaos is replaced by that arising from the new degrees of freedom). This implies a change of code, or a new augmented model. Within a single code, changing hypotheses is equivalent to fixing different sets of control parameters, each with a different a-priori probability, to be then confirmed and transformed to an a-posteriori probability via Bayes theorem. Sequential application of Bayes rule is nothing else than the Darwinian strategy in evolutionary biology. The sequence is a steepest ascent algorithm, which stops once maximum probability has been reached. At this point the hypothesis exploration stops. By changing code (and hence the set of relevant variables) one can start again to formulate new classes of hypotheses. We call creativity the action of code changing, which is guided by hints not formalized within the previous code, whence not accessible to a computer. We call semantic complexity the number of different scientific codes, or models, that describe a situation. It is however a fuzzy concept, in so far as this number changes due to interaction of the operator with the context. These considerations are illustrated with reference to a cognitive task, starting from synchronization of neuron arrays in a perceptual area and tracing the putative path towards a model building. Since this is a report on work in progress, we skip technicalities in order to stress the gist of the question, and provide

  18. Cognitive dynamics: complexity and creativity

    International Nuclear Information System (INIS)

    Arecchi, F Tito

    2007-01-01

    A scientific problem described within a given code is mapped by a corresponding computational problem. We call (algorithmic) complexity the bit length of the shortest instruction which solves the problem. Deterministic chaos in general affects a dynamical system making the corresponding problem experimentally and computationally heavy, since one must reset the initial conditions at a rate higher than that of information loss (Kolmogorov entropy). One can control chaos by adding to the system new degrees of freedom (information swapping: information lost by chaos is replaced by that arising from the new degrees of freedom). This implies a change of code, or a new augmented model. Within a single code, changing hypotheses is equivalent to fixing different sets of control parameters, each with a different a-priori probability, to be then confirmed and transformed to an a-posteriori probability via Bayes theorem. Sequential application of Bayes rule is nothing else than the Darwinian strategy in evolutionary biology. The sequence is a steepest ascent algorithm, which stops once maximum probability has been reached. At this point the hypothesis exploration stops. By changing code (and hence the set of relevant variables) one can start again to formulate new classes of hypotheses. We call creativity the action of code changing, which is guided by hints not formalized within the previous code, whence not accessible to a computer. We call semantic complexity the number of different scientific codes, or models, that describe a situation. It is however a fuzzy concept, in so far as this number changes due to interaction of the operator with the context. These considerations are illustrated with reference to a cognitive task, starting from synchronization of neuron arrays in a perceptual area and tracing the putative path towards a model building. Since this is a report on work in progress, we skip technicalities in order to stress the gist of the question, and provide

  19. Charge-Transfer Dynamics in the Lowest Excited State of a Pentacene–Fullerene Complex: Implications for Organic Solar Cells

    KAUST Repository

    Joseph, Saju

    2017-10-02

    We characterize the dynamic nature of the lowest excited state in a pentacene/C60 complex on the femtosecond time scale, via a combination of ab initio molecular dynamics and time-dependent density functional theory. We analyze the correlations between the molecular vibrations of the complex and the oscillations in the electron-transfer character of its lowest excited state, which point to vibration-induced coherences between the (pentacene-based) local-excitation (LE) state and the complex charge-transfer (CT) state. We discuss the implications of our results on this model system for the exciton-dissociation process in organic solar cells.

  20. Scalable and Unconditionally Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2007-01-01

    We present a multiparty computation protocol that is unconditionally secure against adaptive and active adversaries, with communication complexity O(Cn)k+O(Dn^2)k+poly(nk), where C is the number of gates in the circuit, n is the number of parties, k is the bit-length of the elements of the field...... over which the computation is carried out, D is the multiplicative depth of the circuit, and κ is the security parameter. The corruption threshold is t passive security the corruption threshold is t