WorldWideScience

Sample records for consequence networked information

  1. Revealing dynamics and consequences of fit and misfit between formal and informal networks in multi-institutional product development collaborations

    NARCIS (Netherlands)

    Kratzer, J.; Gemuenden, Hans G.; Lettl, Christopher

    The study presents a longitudinal examination about dynamics and consequences of fit and misfit between formally ascribed design interfaces and informal communication networks in two large multi-institutional product development collaborations in space industry. Findings: (1) formally ascribed

  2. The functional consequences of mutualistic network architecture.

    Directory of Open Access Journals (Sweden)

    José M Gómez

    Full Text Available The architecture and properties of many complex networks play a significant role in the functioning of the systems they describe. Recently, complex network theory has been applied to ecological entities, like food webs or mutualistic plant-animal interactions. Unfortunately, we still lack an accurate view of the relationship between the architecture and functioning of ecological networks. In this study we explore this link by building individual-based pollination networks from eight Erysimum mediohispanicum (Brassicaceae populations. In these individual-based networks, each individual plant in a population was considered a node, and was connected by means of undirected links to conspecifics sharing pollinators. The architecture of these unipartite networks was described by means of nestedness, connectivity and transitivity. Network functioning was estimated by quantifying the performance of the population described by each network as the number of per-capita juvenile plants produced per population. We found a consistent relationship between the topology of the networks and their functioning, since variation across populations in the average per-capita production of juvenile plants was positively and significantly related with network nestedness, connectivity and clustering. Subtle changes in the composition of diverse pollinator assemblages can drive major consequences for plant population performance and local persistence through modifications in the structure of the inter-plant pollination networks.

  3. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  4. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  5. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  6. National Network for Immunization Information

    Science.gov (United States)

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  7. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  8. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  9. Information cascade on networks

    Science.gov (United States)

    Hisakado, Masato; Mori, Shintaro

    2016-05-01

    In this paper, we discuss a voting model by considering three different kinds of networks: a random graph, the Barabási-Albert (BA) model, and a fitness model. A voting model represents the way in which public perceptions are conveyed to voters. Our voting model is constructed by using two types of voters-herders and independents-and two candidates. Independents conduct voting based on their fundamental values; on the other hand, herders base their voting on the number of previous votes. Hence, herders vote for the majority candidates and obtain information relating to previous votes from their networks. We discuss the difference between the phases on which the networks depend. Two kinds of phase transitions, an information cascade transition and a super-normal transition, were identified. The first of these is a transition between a state in which most voters make the correct choices and a state in which most of them are wrong. The second is a transition of convergence speed. The information cascade transition prevails when herder effects are stronger than the super-normal transition. In the BA and fitness models, the critical point of the information cascade transition is the same as that of the random network model. However, the critical point of the super-normal transition disappears when these two models are used. In conclusion, the influence of networks is shown to only affect the convergence speed and not the information cascade transition. We are therefore able to conclude that the influence of hubs on voters' perceptions is limited.

  10. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  11. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  12. Building a Portuguese Food Microbiological Information Network

    OpenAIRE

    Viegas, Silvia; Machado, Claudia; Dantas, Maria; Oliveira, Luísa

    2011-01-01

    Introduction: The integration of food data from research, microbiological monitoring, epidemiological investigation and disease surveillance is crucial to manage foodborne risk. Consequently, INSA launched the Portuguese Food Information Resource Programme (PortFIR) in a partnership with GS1 Portugal to create national food chain expert networks and sustainable databases on food composition, consumption and chemical and microbiological contamination. Presently, the Food Microbiological Inform...

  13. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  14. Bistable responses in bacterial genetic networks: Designs and dynamical consequences

    Science.gov (United States)

    Tiwari, Abhinav; Ray, J. Christian J.; Narula, Jatin; Igoshin, Oleg A.

    2011-01-01

    A key property of living cells is their ability to react to stimuli with specific biochemical responses. These responses can be understood through the dynamics of underlying biochemical and genetic networks. Evolutionary design principles have been well studied in networks that display graded responses, with a continuous relationship between input signal and system output. Alternatively, biochemical networks can exhibit bistable responses so that over a range of signals the network possesses two stable steady states. In this review, we discuss several conceptual examples illustrating network designs that can result in a bistable response of the biochemical network. Next, we examine manifestations of these designs in bacterial master-regulatory genetic circuits. In particular, we discuss mechanisms and dynamic consequences of bistability in three circuits: two-component systems, sigma-factor networks, and a multistep phosphorelay. Analyzing these examples allows us to expand our knowledge of evolutionary design principles for networks with bistable responses. PMID:21385588

  15. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  16. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  17. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  18. Weekly changes of power supplier - consequences for the network owner

    International Nuclear Information System (INIS)

    Graabak, Ingeborg

    1997-01-01

    In Norway, it is expected that owners of electric distribution networks will be required to make it possible for the customers to change supplier each week. This report examines what consequences such a requirement will have for the network owners. An inquiry among nine network owners shows that at present changing supplier implies a great deal of manual work on the part of the network owner since many do not have computer based tools adapted to handle the situation. If the number of weekly changes of suppliers does not increase beyond a few percent of the network owner's total number of customers over 1 to 3 years, the network owner can cope with the situation. However, if for some reason the increase becomes larger, many network owners will have great problems because they lack the necessary computer tools. 1 table

  19. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  20. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  1. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  2. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  3. Research Award: Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    ... of networked technologies has created new opportunities for advancing human ... The I&N Research Awardee will ideally explore research questions centred ... Examples of questions include: ... engineering or computer/information science;.

  4. A unified plant information network

    International Nuclear Information System (INIS)

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  5. Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    Information and Communication Technologies for Development .... costs of digital media reproduction – combined with rampant piracy – are fundamentally .... namely those related to reputation, resources, time, and ethics - all challenges that ...

  6. Information communication on complex networks

    International Nuclear Information System (INIS)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  7. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  8. Slow, bursty dynamics as a consequence of quenched network topologies

    Science.gov (United States)

    Ådor, Géza

    2014-04-01

    Bursty dynamics of agents is shown to appear at criticality or in extended Griffiths phases, even in case of Poisson processes. I provide numerical evidence for a power-law type of intercommunication time distributions by simulating the contact process and the susceptible-infected-susceptible model. This observation suggests that in the case of nonstationary bursty systems, the observed non-Poissonian behavior can emerge as a consequence of an underlying hidden Poissonian network process, which is either critical or exhibits strong rare-region effects. On the contrary, in time-varying networks, rare-region effects do not cause deviation from the mean-field behavior, and heterogeneity-induced burstyness is absent.

  9. Slow, bursty dynamics as a consequence of quenched network topologies.

    Science.gov (United States)

    Ódor, Géza

    2014-04-01

    Bursty dynamics of agents is shown to appear at criticality or in extended Griffiths phases, even in case of Poisson processes. I provide numerical evidence for a power-law type of intercommunication time distributions by simulating the contact process and the susceptible-infected-susceptible model. This observation suggests that in the case of nonstationary bursty systems, the observed non-Poissonian behavior can emerge as a consequence of an underlying hidden Poissonian network process, which is either critical or exhibits strong rare-region effects. On the contrary, in time-varying networks, rare-region effects do not cause deviation from the mean-field behavior, and heterogeneity-induced burstyness is absent.

  10. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  11. Toward a Systemic Notion of Information: Practical Consequences

    Directory of Open Access Journals (Sweden)

    Nagib Callaos

    2002-01-01

    Full Text Available Our main purpose in this paper is to start a process of a systemic definition of the notion of information and to provide some initial practical consequences of it. We will try to do that providing: 1 a conceptual definition, following Ackoff's (1962 description and method of such a kind of definition, and 2 following Peirce's (1931-5,1958 conception of "meaning", where the practical consequences should be included. To our knowledge, no attempt has been done up to the present neither to find a Peircean meaning to the notion of information, nor to start a process of describing a systemic notion of information. Consequently, we will try to integrate the different definitions made on information. But to integrate we should first differentiate what is to be integrated. Thus, we will typify information conceptions in subjective and objective, providing brief description and analysis of each type, integrating them in the context of a systemic notion of information, and drawing the respective pragmatic consequences, as required by Peirce, for any meaning description, and by a pragmatic-teleological systemic epistemology (Churchmann, 1971

  12. IMNN: Information Maximizing Neural Networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  13. Information on economic and social consequences of the Chernobyl accident

    International Nuclear Information System (INIS)

    1990-07-01

    This ''Information on economic and social consequences of the Chernobyl accident'' was presented to the July 1990 session of the Economic and Social Council of the United Nations by the delegations of the Union of Soviet Socialist Republics, the Byelorussian Soviet Socialist Republic and the Ukrainian Soviet Socialist Republic. It presents the radiation situation, the medical aspects of the accident, the evacuation of the inhabitants from areas affected by radioactive contamination and their social welfare, the agro-industrial production and forestry in these areas, the decontamination operations, the scientific back-up for the work dealing with the consequences of the accident and the expenditure and losses resulting from the Chernobyl disaster

  14. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  15. Vulnerability Assessment Tools for Complex Information Networks

    National Research Council Canada - National Science Library

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  16. Consequences of information technology usage on retailer-supplier relations

    DEFF Research Database (Denmark)

    Esbjerg, Lars

    1. Retailers and suppliers increasingly tend to form long-term co-operative relationships. In the literature, the use of information technology is an enabling factor behind this trend. Nevertheless, our understanding of how information technology influences retailer-supplier relationships is still...... limited. The purpose of this paper therefore is to study the consequences of information technology usage on retailer supplier relationships, focusing on inter-organisational systems. 2. The paper begins by discussing the nature of retailer-supplier relations, noting that whereas these relationships have...... traditionally been adversarial, retailers and suppliers are beginning to realise that they can benefit from co-operating. Further, developmental processes in co-operative inter-organisational relations are discussed and the important role of social exchange in inter-organisational relationships is stressed. 3...

  17. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  18. Consequence-driven cyber-informed engineering (CCE)

    Energy Technology Data Exchange (ETDEWEB)

    Freeman, Sarah G. [Idaho National Lab. (INL), Idaho Falls, ID (United States); St Michel, Curtis [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Robert [Idaho National Lab. (INL), Idaho Falls, ID (United States); Assante, Michael [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-10-18

    The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal of the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.

  19. Maximizing information exchange between complex networks

    International Nuclear Information System (INIS)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    Science is not merely the smooth progressive interaction of hypothesis, experiment and theory, although it sometimes has that form. More realistically the scientific study of any given complex phenomenon generates a number of explanations, from a variety of perspectives, that eventually requires synthesis to achieve a deep level of insight and understanding. One such synthesis has created the field of out-of-equilibrium statistical physics as applied to the understanding of complex dynamic networks. Over the past forty years the concept of complexity has undergone a metamorphosis. Complexity was originally seen as a consequence of memory in individual particle trajectories, in full agreement with a Hamiltonian picture of microscopic dynamics and, in principle, macroscopic dynamics could be derived from the microscopic Hamiltonian picture. The main difficulty in deriving macroscopic dynamics from microscopic dynamics is the need to take into account the actions of a very large number of components. The existence of events such as abrupt jumps, considered by the conventional continuous time random walk approach to describing complexity was never perceived as conflicting with the Hamiltonian view. Herein we review many of the reasons why this traditional Hamiltonian view of complexity is unsatisfactory. We show that as a result of technological advances, which make the observation of single elementary events possible, the definition of complexity has shifted from the conventional memory concept towards the action of non-Poisson renewal events. We show that the observation of crucial processes, such as the intermittent fluorescence of blinking quantum dots as well as the brain's response to music, as monitored by a set of electrodes attached to the scalp, has forced investigators to go beyond the traditional concept of complexity and to establish closer contact with the nascent field of complex networks. Complex networks form one of the most challenging areas of modern

  20. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    Science is not merely the smooth progressive interaction of hypothesis, experiment and theory, although it sometimes has that form. More realistically the scientific study of any given complex phenomenon generates a number of explanations, from a variety of perspectives, that eventually requires synthesis to achieve a deep level of insight and understanding. One such synthesis has created the field of out-of-equilibrium statistical physics as applied to the understanding of complex dynamic networks. Over the past forty years the concept of complexity has undergone a metamorphosis. Complexity was originally seen as a consequence of memory in individual particle trajectories, in full agreement with a Hamiltonian picture of microscopic dynamics and, in principle, macroscopic dynamics could be derived from the microscopic Hamiltonian picture. The main difficulty in deriving macroscopic dynamics from microscopic dynamics is the need to take into account the actions of a very large number of components. The existence of events such as abrupt jumps, considered by the conventional continuous time random walk approach to describing complexity was never perceived as conflicting with the Hamiltonian view. Herein we review many of the reasons why this traditional Hamiltonian view of complexity is unsatisfactory. We show that as a result of technological advances, which make the observation of single elementary events possible, the definition of complexity has shifted from the conventional memory concept towards the action of non-Poisson renewal events. We show that the observation of crucial processes, such as the intermittent fluorescence of blinking quantum dots as well as the brain’s response to music, as monitored by a set of electrodes attached to the scalp, has forced investigators to go beyond the traditional concept of complexity and to establish closer contact with the nascent field of complex networks. Complex networks form one of the most challenging areas of

  1. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    Science is not merely the smooth progressive interaction of hypothesis, experiment and theory, although it sometimes has that form. More realistically the scientific study of any given complex phenomenon generates a number of explanations, from a variety of perspectives, that eventually requires synthesis to achieve a deep level of insight and understanding. One such synthesis has created the field of out-of-equilibrium statistical physics as applied to the understanding of complex dynamic networks. Over the past forty years the concept of complexity has undergone a metamorphosis. Complexity was originally seen as a consequence of memory in individual particle trajectories, in full agreement with a Hamiltonian picture of microscopic dynamics and, in principle, macroscopic dynamics could be derived from the microscopic Hamiltonian picture. The main difficulty in deriving macroscopic dynamics from microscopic dynamics is the need to take into account the actions of a very large number of components. The existence of events such as abrupt jumps, considered by the conventional continuous time random walk approach to describing complexity was never perceived as conflicting with the Hamiltonian view. Herein we review many of the reasons why this traditional Hamiltonian view of complexity is unsatisfactory. We show that as a result of technological advances, which make the observation of single elementary events possible, the definition of complexity has shifted from the conventional memory concept towards the action of non-Poisson renewal events. We show that the observation of crucial processes, such as the intermittent fluorescence of blinking quantum dots as well as the brain's response to music, as monitored by a set of electrodes attached to the scalp, has forced investigators to go beyond the traditional concept of complexity and to establish closer contact with the nascent field of complex networks. Complex networks form one of the most challenging areas of

  2. A new information dimension of complex networks

    International Nuclear Information System (INIS)

    Wei, Daijun; Wei, Bo; Hu, Yong; Zhang, Haixin; Deng, Yong

    2014-01-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  3. A new information dimension of complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Daijun [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Science, Hubei University for Nationalities, Enshi 445000 (China); Wei, Bo [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Hu, Yong [Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006 (China); Zhang, Haixin [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Deng, Yong, E-mail: ydeng@swu.edu.cn [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Engineering, Vanderbilt University, TN 37235 (United States)

    2014-03-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  4. Information Is Not a Virus, and Other Consequences of Human Cognitive Limits

    Directory of Open Access Journals (Sweden)

    Kristina Lerman

    2016-05-01

    Full Text Available The many decisions that people make about what to pay attention to online shape the spread of information in online social networks. Due to the constraints of available time and cognitive resources, the ease of discovery strongly impacts how people allocate their attention to social media content. As a consequence, the position of information in an individual’s social feed, as well as explicit social signals about its popularity, determine whether it will be seen, and the likelihood that it will be shared with followers. Accounting for these cognitive limits simplifies mechanics of information diffusion in online social networks and explains puzzling empirical observations: (i information generally fails to spread in social media and (ii highly connected people are less likely to re-share information. Studies of information diffusion on different social media platforms reviewed here suggest that the interplay between human cognitive limits and network structure differentiates the spread of information from other social contagions, such as the spread of a virus through a population.

  5. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  6. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  7. Inter-American Biodiversity Information Network (IABIN)

    Science.gov (United States)

    site. IABIN Inter-American Biodiversity Information Network (IABIN) OAS » SEDI » DSD » IABIN IABIN GEF Logo inbio natserve usgs polpar wcm The Inter-American Biodiversity Information Network (IABIN , and use of biodiversity information relevant to policy and decision-making on natural resources

  8. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  9. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  10. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  11. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  12. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  13. Status of DOE information network modifications

    International Nuclear Information System (INIS)

    Fuchs, R.

    1988-01-01

    This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support

  14. Students' Informal Peer Feedback Networks

    Science.gov (United States)

    Headington, Rita

    2018-01-01

    The nature and significance of students' informal peer feedback networks is an under-explored area. This paper offers the findings of a longitudinal investigation of the informal peer feedback networks of a cohort of student teachers [n = 105] across the three years of a UK primary education degree programme. It tracked the dynamic nature of these…

  15. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  16. Information Network on Rural Development (INRD), Bangladesh.

    Science.gov (United States)

    Wanasundra, Leelangi

    1994-01-01

    Discusses information networking in Bangladesh and describes the formation of the Information Network on Rural Development (INRD) which was initiated by the Center on Integrated Rural Development for Asia and the Pacific (CIRDAP). Organization, membership, activities, participation, and finance are examined. (four references) (LRW)

  17. An information search model for online social Networks - MOBIRSE

    Directory of Open Access Journals (Sweden)

    Miguel Angel Niño Zambrano

    2015-09-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years.  These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  18. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  19. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  20. Network information provision to potential generators: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)

  1. Searching Information Sources in Networks

    Science.gov (United States)

    2017-06-14

    with partial observations,” in AAAI Conference on Artificial Intelligence , 2017. [6] D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small...critical infrastructure of our society. The failure of the power grid network will have catastrophic impacts on water supplies, transportation

  2. The consequences of Edward Snowden NSA related information disclosures.

    CSIR Research Space (South Africa)

    Von Solms, S

    2015-03-01

    Full Text Available related leaks, and discuss the reactions to these disclosures. We also explore the direct and indirect impact of these leaks. The consequences of these disclosures include strained foreign relationships, and the knowledge that mass surveillance programmes...

  3. Optimal Information Processing in Biochemical Networks

    Science.gov (United States)

    Wiggins, Chris

    2012-02-01

    A variety of experimental results over the past decades provide examples of near-optimal information processing in biological networks, including in biochemical and transcriptional regulatory networks. Computing information-theoretic quantities requires first choosing or computing the joint probability distribution describing multiple nodes in such a network --- for example, representing the probability distribution of finding an integer copy number of each of two interacting reactants or gene products while respecting the `intrinsic' small copy number noise constraining information transmission at the scale of the cell. I'll given an overview of some recent analytic and numerical work facilitating calculation of such joint distributions and the associated information, which in turn makes possible numerical optimization of information flow in models of noisy regulatory and biochemical networks. Illustrating cases include quantification of form-function relations, ideal design of regulatory cascades, and response to oscillatory driving.

  4. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  5. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  6. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  7. Informal networks: the company behind the chart.

    Science.gov (United States)

    Krackhardt, D; Hanson, J R

    1993-01-01

    A glance at an organizational chart can show who's the boss and who reports to whom. But this formal chart won't reveal which people confer on technical matters or discuss office politics over lunch. Much of the real work in any company gets done through this informal organization with its complex networks of relationships that cross functions and divisions. According to consultants David Krackhardt and Jeffrey Hanson, managers can harness the true power in their companies by diagramming three types of networks: the advice network, which reveals the people to whom others turn to get work done; the trust network, which uncovers who shares delicate information; and the communication network, which shows who talks about work-related matters. Using employee questionnaires, managers can generate network maps that will get to the root of many organizational problems. When a task force in a computer company, for example, was not achieving its goals, the CEO turned to network maps to find out why. He discovered that the task force leader was central in the advice network but marginal in the trust network. Task force members did not believe he would look out for their interests, so the CEO used the trust map to find someone to share responsibility for the group. And when a bank manager saw in the network map that there was little communication between tellers and supervisors, he looked for ways to foster interaction among employees of all levels. As companies continue to flatten and rely on teams, managers must rely less on their authority and more on understanding these informal networks. Managers who can use maps to identify, leverage, and revamp informal networks will have the key to success.

  8. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  9. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  10. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  11. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  12. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  13. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  14. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  15. Unraveling the disease consequences and mechanisms of modular structure in animal social networks

    Science.gov (United States)

    Sah, Pratha; Leu, Stephan T.; Cross, Paul C.; Hudson, Peter J.; Bansal, Shweta

    2017-01-01

    Disease risk is a potential cost of group living. Although modular organization is thought to reduce this cost in animal societies, empirical evidence toward this hypothesis has been conflicting. We analyzed empirical social networks from 43 animal species to motivate our study of the epidemiological consequences of modular structure in animal societies. From these empirical studies, we identified the features of interaction patterns associated with network modularity and developed a theoretical network model to investigate when and how subdivisions in social networks influence disease dynamics. Contrary to prior work, we found that disease risk is largely unaffected by modular structure, although social networks beyond a modular threshold experience smaller disease burden and longer disease duration. Our results illustrate that the lowering of disease burden in highly modular social networks is driven by two mechanisms of modular organization: network fragmentation and subgroup cohesion. Highly fragmented social networks with cohesive subgroups are able to structurally trap infections within a few subgroups and also cause a structural delay to the spread of disease outbreaks. Finally, we show that network models incorporating modular structure are necessary only when prior knowledge suggests that interactions within the population are highly subdivided. Otherwise, null networks based on basic knowledge about group size and local contact heterogeneity may be sufficient when data-limited estimates of epidemic consequences are necessary. Overall, our work does not support the hypothesis that modular structure universally mitigates the disease impact of group living.

  16. Fisheries Information Network in Indonesia.

    Science.gov (United States)

    Balachandran, Sarojini

    During the early 1980s the Indonesian government made a policy decision to develop fisheries as an important sector of the national economy. In doing so, it recognized the need for the collection and dissemination of fisheries research information not only for the scientists themselves, but also for the ultimate transfer of technology through…

  17. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  18. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  19. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  20. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  1. Antecedents and Consequences of Consumer's Response to Health Information Complexity

    DEFF Research Database (Denmark)

    Hansen, Torben; Uth Thomsen, Thyra; Beckmann, Suzanne C.

    2013-01-01

    This study develops and empirically tests a model for understanding food consumers' health information seeking behaviour. Data were collected from 504 food consumers using a nationally representative consumer panel. The obtained Lisrel results suggest that consumers' product-specific health...... information seeking is positively affected by general food involvement and by usability of product-specific health information. Moreover, product-specific health information seeking and product-specific health information complexity are both positively related to post-purchase health-related dissonance....... This link between information complexity and post-purchase dissonance has implications for marketers of food products since our results suggest that consumers might avoid purchasing the same food item again if post-purchase dissonance is experienced....

  2. Indirect adaptive fuzzy wavelet neural network with self- recurrent consequent part for AC servo system.

    Science.gov (United States)

    Hou, Runmin; Wang, Li; Gao, Qiang; Hou, Yuanglong; Wang, Chao

    2017-09-01

    This paper proposes a novel indirect adaptive fuzzy wavelet neural network (IAFWNN) to control the nonlinearity, wide variations in loads, time-variation and uncertain disturbance of the ac servo system. In the proposed approach, the self-recurrent wavelet neural network (SRWNN) is employed to construct an adaptive self-recurrent consequent part for each fuzzy rule of TSK fuzzy model. For the IAFWNN controller, the online learning algorithm is based on back propagation (BP) algorithm. Moreover, an improved particle swarm optimization (IPSO) is used to adapt the learning rate. The aid of an adaptive SRWNN identifier offers the real-time gradient information to the adaptive fuzzy wavelet neural controller to overcome the impact of parameter variations, load disturbances and other uncertainties effectively, and has a good dynamic. The asymptotical stability of the system is guaranteed by using the Lyapunov method. The result of the simulation and the prototype test prove that the proposed are effective and suitable. Copyright © 2017. Published by Elsevier Ltd.

  3. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  4. Social Networks: Rational Learning and Information Aggregation

    Science.gov (United States)

    2009-09-01

    predecessor, Gale and Kariv (2003) who generalize the payoff equalization result of Bala and Goyal (1998) in connected social networks (discussed below...requires more notation. Using Bayes’ Rule and the assumption of equal priors on the state θ, we have that the social belief given by observing... Social Networks: Rational Learning and Information Aggregation by Ilan Lobel B.Sc., Pontif́ıcia Universidade Católica do Rio de Janeiro (2004

  5. Network information provision to potential generators

    Energy Technology Data Exchange (ETDEWEB)

    Nicholson, G.

    2001-07-01

    At the time of finalising this report, an Ofgem consultation is underway on the form of Distribution Licence Condition 25, which will state the requirements for Distribution Network Operators to provide and publish data. This report is also relevant to the DTI Ofgem Embedded Generation Working Group (EGWG), which has recently completed its report and recommendations. It is hoped that this document will provide an overview of the status, importance, role and benefits of network information, which can be utilised by Generators, Network Operators and other industry players in framing their responses to this and future consultations. (Authors)

  6. Land use change in the Veneto floodplain and consequences on minor network drainage system

    Directory of Open Access Journals (Sweden)

    Massimo Prosdocimi

    2013-09-01

    Full Text Available Anthropic pressure has been proven to be one of the most evident forces able to alter landscapes. Its impact on the surroundings can be easily detectable especially in a high-density populated country such as Italy. Among the most evident anthropic alterations, the most important are the urbanization processes but also changes in cultural techniques that have been occurring in rural areas. These modifications influence the hydrologic regimes in two ways: by modifying the direct runoff production and by having a strong impact on the drainage system itself. The main objectives of this work are to evaluate the impact of land cover changes in the Veneto region (north-east Italy on the minor drainage network system, and to analyze changes in the direct runoff in the last 50 years. The study area is a typical agrarian landscape and it has been chosen considering its involvement in the major flood of 2010 and considering also the availability of data, including historical aerial photographs, historical information, and a high resolution LiDAR DTM. The results underline how land cover variations over the last 50 years have strongly increased the propension of the soil to produce direct runoff (increase of the Curve Number value and they have also reduced the extent of the minor network system to the detriment of urbanized areas and changes of plots of land boundaries. As a consequence, the capacity of the minor network to attenuate and eventually laminate a flood event is decreased as well. These analysis can be considered useful tools for a suitable land use planning in flood prone areas.

  7. Fitness consequences of social network position in a wild population of forked fungus beetles (Bolitotherus cornutus).

    Science.gov (United States)

    Formica, Vincent A; Wood, C W; Larsen, W B; Butterfield, R E; Augat, M E; Hougen, H Y; Brodie, E D

    2012-01-01

    Social networks describe the pattern of intraspecific interactions within a population. An individual's position in a social network often is expected to influence its fitness, but only a few studies have examined this relationship in natural populations. We investigated the fitness consequences of network position in a wild beetle population. Copulation success of male beetles positively covaried with strength (a measure of network centrality) and negatively covaried with clustering coefficient (CC) (a measure of cliquishness). Further analysis using mediation path models suggested that the activity level of individuals drove the relationships between strength and fitness almost entirely. In contrast, selection on CC was not explained by individual behaviours. Although our data suggest that social network position can experience strong sexual selection, it is also clear that the relationships between fitness and some network metrics merely reflect variation in individual-level behaviours. © 2011 The Authors. Journal of Evolutionary Biology © 2011 European Society For Evolutionary Biology.

  8. Directedness of information flow in mobile phone communication networks.

    Directory of Open Access Journals (Sweden)

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  9. Chaotic, informational and synchronous behaviour of multiplex networks

    Science.gov (United States)

    Baptista, M. S.; Szmoski, R. M.; Pereira, R. F.; Pinto, S. E. De Souza

    2016-03-01

    The understanding of the relationship between topology and behaviour in interconnected networks would allow to charac- terise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives complex behaviour: chaos, information, and weak or strong synchronisation; in multiplex net- works with constant Jacobian. We also study this relationship numerically in multiplex networks of Hindmarsh-Rose neurons. Whereas behaviour in the analytically tractable network is a direct but not trivial consequence of the spectra of eigenvalues of the Laplacian matrix, where behaviour may strongly depend on the break of symmetry in the topology of interconnections, in Hindmarsh-Rose neural networks the nonlinear nature of the chemical synapses breaks the elegant mathematical connec- tion between the spectra of eigenvalues of the Laplacian matrix and the behaviour of the network, creating networks whose behaviour strongly depends on the nature (chemical or electrical) of the inter synapses.

  10. Information filtering on coupled social networks.

    Science.gov (United States)

    Nie, Da-Cheng; Zhang, Zi-Ke; Zhou, Jun-Lin; Fu, Yan; Zhang, Kui

    2014-01-01

    In this paper, based on the coupled social networks (CSN), we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  11. 40 CFR 1400.9 - Access to off-site consequence analysis information by State and local government officials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Access to off-site consequence... CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis Information by Government Officials. § 1400.9 Access to off-site consequence analysis...

  12. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  13. Networked Information: Finding What's Out There.

    Science.gov (United States)

    Lynch, Clifford A.

    1997-01-01

    Clifford A. Lynch, developer of MELVYL and former director of library automation at the University of California, is now executive director for the Coalition for Networked Information (CNI). This interview discusses Lynch's background, MELVYL, the Web and the role of libraries and librarians, community and collaborative filtering, the library of…

  14. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  15. Management of information supporting Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  16. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  17. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  18. Multirate control with incomplete information over Profibus-DP network

    Science.gov (United States)

    Salt, J.; Casanova, V.; Cuenca, A.; Pizá, R.

    2014-07-01

    When a process field bus-decentralized peripherals (Profibus-DP) network is used in an industrial environment, a deterministic behaviour is usually claimed. However, due to some concerns such as bandwidth limitations, lack of synchronisation among different clocks and existence of time-varying delays, a more complex problem must be faced. This problem implies the transmission of irregular and, even, random sequences of incomplete information. The main consequence of this issue is the appearance of different sampling periods at different network devices. In this paper, this aspect is checked by means of a detailed Profibus-DP timescale study. In addition, in order to deal with the different periods, a delay-dependent dual-rate proportional-integral-derivative control is introduced. Stability for the proposed control system is analysed in terms of linear matrix inequalities.

  19. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  20. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  1. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  2. Management of Information Supporting Collaborative Networks

    Science.gov (United States)

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  3. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  4. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  5. 40 CFR 1400.8 - Access to off-site consequence analysis information by Federal government officials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Access to off-site consequence... MANAGEMENT PROGRAMS UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Access to Off-Site Consequence Analysis...

  6. International Expansion and Transition to the Network Structure of the Multinational Companies and Their Social Consequences

    Directory of Open Access Journals (Sweden)

    Daniela Ettaleb

    2015-01-01

    Full Text Available Economic globalization is associated with growing interconnectedness, interdependence and the integration of businesses into a single economic system, improving the competitiveness of businesses, and places new demands and requirements on firms. Companies that wanted to survive in a new, dynamic and competitive environment had to apply new development strategies, whose main motto was to reduce costs and to create greater flexibility on the global market. Many large companies managed huge cost reductions in the globalized economy through international expansion to the industrial periphery and semi-periphery countries (developing countries and Central and Eastern Europe and through the transition from a pyramidal organizational structure to a network structure. The control centre of companies in a network organization deprives hierarchical and pyramidal corporate structures, rather temporarily joins a network of small suppliers, subcontractors and service providers. In the business environment networks are more flexible and adaptable than firms with a hierarchical structure. They are highly effective because they allow significant reductions in the operating costs of the company. On the other hand, the network structure of relations has a number of social consequences, such as the reduction in the number of employees, the rise in non-standard employment contracts and the abolition of responsibility.

  7. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  8. Negative consequences from heavy social networking in adolescents: The mediating role of fear of missing out.

    Science.gov (United States)

    Oberst, Ursula; Wegmann, Elisa; Stodt, Benjamin; Brand, Matthias; Chamarro, Andrés

    2017-02-01

    Social networking sites (SNS) are especially attractive for adolescents, but it has also been shown that these users can suffer from negative psychological consequences when using these sites excessively. We analyze the role of fear of missing out (FOMO) and intensity of SNS use for explaining the link between psychopathological symptoms and negative consequences of SNS use via mobile devices. In an online survey, 1468 Spanish-speaking Latin-American social media users between 16 and 18 years old completed the Hospital Anxiety and Depression Scale (HADS), the Social Networking Intensity scale (SNI), the FOMO scale (FOMOs), and a questionnaire on negative consequences of using SNS via mobile device (CERM). Using structural equation modeling, it was found that both FOMO and SNI mediate the link between psychopathology and CERM, but by different mechanisms. Additionally, for girls, feeling depressed seems to trigger higher SNS involvement. For boys, anxiety triggers higher SNS involvement. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  9. Design of atomic energy information network system

    International Nuclear Information System (INIS)

    Kim, Y. T.; Lee, E. J.; Han, K. W.; Lee, H. C.; Chang, J. H.

    2004-01-01

    As the 21 st century is expected to induce a Knowledge based society, responding to this kind of change on our own initiative could be achieved by establishing networks among atomic energy agencies with the Atomic Energy Portal Site in a pivotal role. Thus, enabling the knowledge information from each agency to be easily shared and utilized. Furthermore, it can contribute to further researches by providing accumulated knowledge in the atomic energy, such as research output and past achievements, and by avoiding the repetition of researches on the same subjects. It could also provide remote educational data to researchers and industrial experts in atomic energy, as well as atomic energy information for general public consistently, so that we can promote our confidence in atomic energy

  10. Consequences for diversity when prioritizing animals for conservation with pedigree or genomic information

    NARCIS (Netherlands)

    Engelsma, K.A.; Veerkamp, R.F.; Calus, M.P.L.; Windig, J.J.

    2011-01-01

    Up to now, prioritization of animals for conservation has been mainly based on pedigree information; however, genomic information may improve prioritization. In this study, we used two Holstein populations to investigate the consequences for genetic diversity when animals are prioritized with

  11. Effects of Information Feedback and Self-Administered Consequences on Self-Monitoring Study Behavior

    Science.gov (United States)

    Richards, C. Steven; And Others

    1976-01-01

    The hypotheses tested among college students (N=87) concerned about study habits were: (a) self-monitoring changes study behavior; (b) information feedback accounts for some of this change; and (c) this change can be enhanced by manipulating the quantity and quality of information feedback and self-administered consequences associated with…

  12. Two sides to every story : Causes and consequences of selective exposure to balanced political information

    NARCIS (Netherlands)

    Brenes Peralta, C.M.

    2017-01-01

    Although the current information environment offers citizens an unprecedented opportunity to engage in selective exposure behavior, namely to seek mostly pro-attitudinal information about politics and public affairs, the debate about the prevalence and consequences of selective exposure in a

  13. Educational commitment and social networking: The power of informal networks

    Science.gov (United States)

    Zwolak, Justyna P.; Zwolak, Michael; Brewe, Eric

    2018-06-01

    The lack of an engaging pedagogy and the highly competitive atmosphere in introductory science courses tend to discourage students from pursuing science, technology, engineering, and mathematics (STEM) majors. Once in a STEM field, academic and social integration has been long thought to be important for students' persistence. Yet, it is rarely investigated. In particular, the relative impact of in-class and out-of-class interactions remains an open issue. Here, we demonstrate that, surprisingly, for students whose grades fall in the "middle of the pack," the out-of-class network is the most significant predictor of persistence. To do so, we use logistic regression combined with Akaike's information criterion to assess in- and out-of-class networks, grades, and other factors. For students with grades at the very top (and bottom), final grade, unsurprisingly, is the best predictor of persistence—these students are likely already committed (or simply restricted from continuing) so they persist (or drop out). For intermediate grades, though, only out-of-class closeness—a measure of one's immersion in the network—helps predict persistence. This does not negate the need for in-class ties. However, it suggests that, in this cohort, only students that get past the convenient in-class interactions and start forming strong bonds outside of class are or become committed to their studies. Since many students are lost through attrition, our results suggest practical routes for increasing students' persistence in STEM majors.

  14. Lewis Information Network (LINK): Background and overview

    Science.gov (United States)

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  15. Essential elements of online information networks on invasive alien species

    Science.gov (United States)

    Simpson, A.; Sellers, E.; Grosse, A.; Xie, Y.

    2006-01-01

    In order to be effective, information must be placed in the proper context and organized in a manner that is logical and (preferably) standardized. Recently, invasive alien species (IAS) scientists have begun to create online networks to share their information concerning IAS prevention and control. At a special networking session at the Beijing International Symposium on Biological Invasions, an online Eastern Asia-North American IAS Information Network (EA-NA Network) was proposed. To prepare for the development of this network, and to provide models for other regional collaborations, we compare four examples of global, regional, and national online IAS information networks: the Global Invasive Species Information Network, the Invasives Information Network of the Inter-American Biodiversity Information Network, the Chinese Species Information System, and the Invasive Species Information Node of the US National Biological Information Infrastructure. We conclude that IAS networks require a common goal, dedicated leaders, effective communication, and broad endorsement, in order to obtain sustainable, long-term funding and long-term stability. They need to start small, use the experience of other networks, partner with others, and showcase benefits. Global integration and synergy among invasive species networks will succeed with contributions from both the top-down and the bottom-up. ?? 2006 Springer.

  16. Optimizing online social networks for information propagation.

    Directory of Open Access Journals (Sweden)

    Duan-Bing Chen

    Full Text Available Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  17. Optimizing online social networks for information propagation.

    Science.gov (United States)

    Chen, Duan-Bing; Wang, Guan-Nan; Zeng, An; Fu, Yan; Zhang, Yi-Cheng

    2014-01-01

    Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  18. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  19. Means of evaluating the consequences of a fire in ventilation and filtration networks

    International Nuclear Information System (INIS)

    Laborde, J.C.; Mulcey, P.; Pourprix, M.; Savornin, J.; Tessier, J.

    1989-10-01

    Accident events involving fire are quite frequent and could have a severe effect on the safety of nuclear facilities. As confinement must be maintained, the ventilation and filtration systems have to be designed to exclude any radioactive release to the environment. To determine and analyse the consequences of a fire on the ventilation network and on its associated air cleaning systems, a research program including the development of calculation codes and experimental studies has been carried out at the Nuclear Studies Centre at Saclay (France). The paper describes the highlights of this research program

  20. 40 CFR 1400.3 - Public access to paper copies of off-site consequence analysis information.

    Science.gov (United States)

    2010-07-01

    ...-site consequence analysis information. 1400.3 Section 1400.3 Protection of Environment ENVIRONMENTAL... PROGRAMS UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.3 Public access to...

  1. Social and Economic Consequences of Informal Labor and Ways to Reduce It

    Directory of Open Access Journals (Sweden)

    Inna V. Donova

    2017-06-01

    Full Text Available The purpose of the article is to analyse the consequences of informal employment for the Russian labor market. The author approaches informal employment from the legalism perspective. While distinguishing between formal and informal employment, the author relies on the contract criterion, i.e. presence or absence of formally established labor relations. The reasons for the existence and reproduction of informal employment relations in the Russian labor market are imperfect institutions of regulation and a complex of economic and social factors. The consequences of informal hiring for participants of the employment relationship are different. In the article are considered the positive and negative consequences of informal hiring for employees, employers and the state. It is shown that the problem of informal hiring is multilayered, not reducible only to imperfect labor market regulation institutions and requires adequate complexity of approaches. The ways to reduce the level of informality on the Russian labor market: the stimulation of an increase in the number of formal jobs and the legalization of business, especially in the smallest and micro-business; refusal of attempts of violent and excessive formalization of employment; improvement of the quality of regulation of the social and labor conditions and business climate. Special attention should be paid to estimation the balance of benefits and losses associated with informality for all participants of social and labor relations.

  2. Information theory and the ethylene genetic network.

    Science.gov (United States)

    González-García, José S; Díaz, José

    2011-10-01

    The original aim of the Information Theory (IT) was to solve a purely technical problem: to increase the performance of communication systems, which are constantly affected by interferences that diminish the quality of the transmitted information. That is, the theory deals only with the problem of transmitting with the maximal precision the symbols constituting a message. In Shannon's theory messages are characterized only by their probabilities, regardless of their value or meaning. As for its present day status, it is generally acknowledged that Information Theory has solid mathematical foundations and has fruitful strong links with Physics in both theoretical and experimental areas. However, many applications of Information Theory to Biology are limited to using it as a technical tool to analyze biopolymers, such as DNA, RNA or protein sequences. The main point of discussion about the applicability of IT to explain the information flow in biological systems is that in a classic communication channel, the symbols that conform the coded message are transmitted one by one in an independent form through a noisy communication channel, and noise can alter each of the symbols, distorting the message; in contrast, in a genetic communication channel the coded messages are not transmitted in the form of symbols but signaling cascades transmit them. Consequently, the information flow from the emitter to the effector is due to a series of coupled physicochemical processes that must ensure the accurate transmission of the message. In this review we discussed a novel proposal to overcome this difficulty, which consists of the modeling of gene expression with a stochastic approach that allows Shannon entropy (H) to be directly used to measure the amount of uncertainty that the genetic machinery has in relation to the correct decoding of a message transmitted into the nucleus by a signaling pathway. From the value of H we can define a function I that measures the amount of

  3. Measuring the consequences of wildfires in a Bayesian network with vulnerability and exposure indicators

    Science.gov (United States)

    Papakosta, Panagiota; Botzler, Sebastian; Krug, Kai; Straub, Daniel

    2013-04-01

    Mediterranean climate type areas have always been experiencing fire events. However, population growth and expansion of urban centers into wildland areas during the 20th century (expansion of wildland-urban interface) has increased the threat to humans and their activities. Life and property losses, damage on infrastructure and crops, and forest degradation are some of the damages caused by wildfires. Although fires repeatedly occur along the Mediterranean basin, not all areas have experienced severe consequences. The extent of damage by wildfires is influenced by several factors, such as population density, vegetation type, topography, weather conditions and social preparedness [1]. Wildfire consequence estimation by means of vulnerability and exposure indicators is an essential part of wildfire risk analysis. Vulnerability indicators express the conditions that increase the susceptibility of a site to the impact of wildfires and exposure indicators describe the elements at risk [2],[3]. Appropriate indicators to measure wildfire vulnerability and exposure can vary with scale and site. The consequences can be classified into economic, social, environmental and safety, and they can be tangible (human life losses, buildings damaged) or intangible (damage of cultural heritage site). As a consequence, a variety of approaches exist and there is a lack of generalized unified easy-to-implement methodologies. In this study we present a methodology for measuring consequences of wildfires in a Mediterranean area in the mesoscale (1 km² spatial resolution). Vulnerability and exposure indicators covering all consequence levels are identified and their interrelations are stressed. Variables such as building materials, roofing type, and average building values are included in the economic vulnerability level. Safety exposure is expressed by population density, demographic structure, street density and distance to closest fire station. Environmental vulnerability of protected

  4. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  5. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  6. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  7. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  8. Mutual information, neural networks and the renormalization group

    Science.gov (United States)

    Koch-Janusz, Maciej; Ringel, Zohar

    2018-06-01

    Physical systems differing in their microscopic details often display strikingly similar behaviour when probed at macroscopic scales. Those universal properties, largely determining their physical characteristics, are revealed by the powerful renormalization group (RG) procedure, which systematically retains `slow' degrees of freedom and integrates out the rest. However, the important degrees of freedom may be difficult to identify. Here we demonstrate a machine-learning algorithm capable of identifying the relevant degrees of freedom and executing RG steps iteratively without any prior knowledge about the system. We introduce an artificial neural network based on a model-independent, information-theoretic characterization of a real-space RG procedure, which performs this task. We apply the algorithm to classical statistical physics problems in one and two dimensions. We demonstrate RG flow and extract the Ising critical exponent. Our results demonstrate that machine-learning techniques can extract abstract physical concepts and consequently become an integral part of theory- and model-building.

  9. Assessing Middle School Students' Knowledge of Conduct and Consequences and Their Behaviors regarding the Use of Social Networking Sites

    Science.gov (United States)

    Kite, Stacey L.; Gable, Robert; Filippelli, Lawrence

    2010-01-01

    Cyberbullying and threats of Internet predators, not to mention the enduring consequences of postings, may lead to dangerous, unspeakable consequences. Cyberbullying and threats of Internet predators through social networking sites and instant messaging programs are initiating numerous problems for parents, school administrators, and law…

  10. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Science.gov (United States)

    Wu, Jibing; Meng, Qinggang; Deng, Su; Huang, Hongbin; Wu, Yahui; Badii, Atta

    2017-01-01

    Heterogeneous information networks (e.g. bibliographic networks and social media networks) that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS) algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  11. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  12. Information filtering in evolving online networks

    Science.gov (United States)

    Chen, Bo-Lun; Li, Fen-Fen; Zhang, Yong-Jun; Ma, Jia-Lin

    2018-02-01

    Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.

  13. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  14. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  15. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  16. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  17. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  18. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  19. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  20. 2015 Global Information Technology Report: Consequences on Knowledge Management in Higher Education Institutions in Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Agbor, Comfort Nkogho; Major, Nanighe Baldwin; Agabi, Chinyere O.; Wali, Worlu I.

    2016-01-01

    This research is a continuation of a theoretical review that evaluated ICT Policy Outcomes for National Development in relation to Networked Readiness Index (NRI) and the impact it has on knowledge integration and management in higher education institutions in Nigeria. A new dawn in information technology (IT) has initiated new trends in…

  1. Measurement and Exploration of Individual Beliefs About the Consequences of Building Information Modelling Use

    DEFF Research Database (Denmark)

    Davies, Richard; Harty, Chris

    2013-01-01

    the consequences of BIM use were broadly favourable although there is a need for more data for comparisons. The structure of the responses showed that expectations that BIM would enhance job performance were strongly related to expectations that BIM use was compatible with preferred and existing ways of working...... of the consequences of ICT use predict subsequent usage. We describe the development of scales to measure beliefs about the consequences of building information modelling (BIM) and their use in a survey of employees of a large construction contracting organization in the United Kingdom. Scales for performance...... expectancy, effort expectancy, social influence, facilitating conditions, compatibility, and attitude toward using technology were adapted from existing measures. In an analysis of responses from 762 construction employees the scales showed acceptable measurement properties. Expectations about...

  2. Information sharing and relationships on social networking sites.

    Science.gov (United States)

    Steijn, Wouter M P; Schouten, Alexander P

    2013-08-01

    This article investigates the relationship between sharing personal information and relationship development in the context of social networking sites (SNSs). Information disclosed on these sites could affect relationships in a different manner compared to more traditional interactions, such as instant messaging or face-to-face interaction. Respondents in the age range of 12 to 83 were surveyed about experiences of relationship development as a consequence of contact through Facebook or Hyves-the most popular Dutch SNSs. Results showed a primarily positive effect of information sharing on SNSs on our relationships. Furthermore, relationship development mainly occurs among acquaintances and friends, and public posts are most strongly related to relationship development. These findings suggest that SNSs might affect relationships in a distinct fashion as acquaintances and friends gain access to public self-disclosures that might normally only be reserved for close friends and family. Overall, this study provides an insight into some of the positive aspects of the public nature of SNSs in contrast with the general negative associations.

  3. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  4. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  5. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  6. Emotion, information and cognition and some possible consequences for Library and Information Science

    DEFF Research Database (Denmark)

    Thellefsen, Torkild Leo; Thellefsen, Martin; Sørensen, Bent

    2013-01-01

    in relation to communication and discuss the semeiotics-inspired communication model, the Dynacom; then, we discuss our semeiotic perspective on the meaning-creation process and communication with regard to a few, but central, elements in library and information science, namely, the systems...

  7. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  8. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  9. Optimal control of epidemic information dissemination over networks.

    Science.gov (United States)

    Chen, Pin-Yu; Cheng, Shin-Ming; Chen, Kwang-Cheng

    2014-12-01

    Information dissemination control is of crucial importance to facilitate reliable and efficient data delivery, especially in networks consisting of time-varying links or heterogeneous links. Since the abstraction of information dissemination much resembles the spread of epidemics, epidemic models are utilized to characterize the collective dynamics of information dissemination over networks. From a systematic point of view, we aim to explore the optimal control policy for information dissemination given that the control capability is a function of its distribution time, which is a more realistic model in many applications. The main contributions of this paper are to provide an analytically tractable model for information dissemination over networks, to solve the optimal control signal distribution time for minimizing the accumulated network cost via dynamic programming, and to establish a parametric plug-in model for information dissemination control. In particular, we evaluate its performance in mobile and generalized social networks as typical examples.

  10. Oceanographic data and information network in the Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  11. Asia Pacific Mangrove Information Network (APMIN): A conceptual model

    Digital Repository Service at National Institute of Oceanography (India)

    Chavan, V.S.; Jagtap, T.G.; Untawale, A.G.

    Asia Pacific Mangrove Information Network (APMIN), its structure and scope, is discussed in this paper. Establishment of National Mangrove Information Centers (NMIC) in 20 Asia-Pacific countries, would contribute towards development of databases...

  12. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  13. A Survey of the Literature on Unintended Consequences Associated with Health Information Technology: 2014–2015

    Science.gov (United States)

    Abraham, J.; Novak, L. L.; Reynolds, T. L.; Gettinger, A.

    2016-01-01

    Summary Objective To summarize recent research on unintended consequences associated with implementation and use of health information technology (health IT). Included in the review are original empirical investigations published in English between 2014 and 2015 that reported unintended effects introduced by adoption of digital interventions. Our analysis focuses on the trends of this steam of research, areas in which unintended consequences have continued to be reported, and common themes that emerge from the findings of these studies. Method Most of the papers reviewed were retrieved by searching three literature databases: MEDLINE, Embase, and CINAHL. Two rounds of searches were performed: the first round used more restrictive search terms specific to unintended consequences; the second round lifted the restrictions to include more generic health IT evaluation studies. Each paper was independently screened by at least two authors; differences were resolved through consensus development. Results The literature search identified 1,538 papers that were potentially relevant; 34 were deemed meeting our inclusion criteria after screening. Studies described in these 34 papers took place in a wide variety of care areas from emergency departments to ophthalmology clinics. Some papers reflected several previously unreported unintended consequences, such as staff attrition and patients’ withholding of information due to privacy and security concerns. A majority of these studies (71%) were quantitative investigations based on analysis of objectively recorded data. Several of them employed longitudinal or time series designs to distinguish between unintended consequences that had only transient impact, versus those that had persisting impact. Most of these unintended consequences resulted in adverse outcomes, even though instances of beneficial impact were also noted. While care areas covered were heterogeneous, over half of the studies were conducted at academic medical

  14. Information Flow Between Resting-State Networks.

    Science.gov (United States)

    Diez, Ibai; Erramuzpe, Asier; Escudero, Iñaki; Mateos, Beatriz; Cabrera, Alberto; Marinazzo, Daniele; Sanz-Arigita, Ernesto J; Stramaglia, Sebastiano; Cortes Diaz, Jesus M

    2015-11-01

    The resting brain dynamics self-organize into a finite number of correlated patterns known as resting-state networks (RSNs). It is well known that techniques such as independent component analysis can separate the brain activity at rest to provide such RSNs, but the specific pattern of interaction between RSNs is not yet fully understood. To this aim, we propose here a novel method to compute the information flow (IF) between different RSNs from resting-state magnetic resonance imaging. After hemodynamic response function blind deconvolution of all voxel signals, and under the hypothesis that RSNs define regions of interest, our method first uses principal component analysis to reduce dimensionality in each RSN to next compute IF (estimated here in terms of transfer entropy) between the different RSNs by systematically increasing k (the number of principal components used in the calculation). When k=1, this method is equivalent to computing IF using the average of all voxel activities in each RSN. For k≥1, our method calculates the k multivariate IF between the different RSNs. We find that the average IF among RSNs is dimension dependent, increasing from k=1 (i.e., the average voxel activity) up to a maximum occurring at k=5 and to finally decay to zero for k≥10. This suggests that a small number of components (close to five) is sufficient to describe the IF pattern between RSNs. Our method--addressing differences in IF between RSNs for any generic data--can be used for group comparison in health or disease. To illustrate this, we have calculated the inter-RSN IF in a data set of Alzheimer's disease (AD) to find that the most significant differences between AD and controls occurred for k=2, in addition to AD showing increased IF w.r.t. The spatial localization of the k=2 component, within RSNs, allows the characterization of IF differences between AD and controls.

  15. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  16. Hodge Decomposition of Information Flow on Small-World Networks.

    Science.gov (United States)

    Haruna, Taichi; Fujiki, Yuuya

    2016-01-01

    We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  17. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  18. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Information and Networks in Asia and Sub-Saharan Africa: Strengthening Research Capacity ... credible, high-quality evidence on the influence of digital initiatives in the areas of ... use of digital information networks and economic growth, democratic reform, and increased educational opportunities in developing countries.

  19. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  20. Pain: a distributed brain information network?

    Directory of Open Access Journals (Sweden)

    Hiroaki Mano

    2015-01-01

    Full Text Available Understanding how pain is processed in the brain has been an enduring puzzle, because there doesn't appear to be a single "pain cortex" that directly codes the subjective perception of pain. An emerging concept is that, instead, pain might emerge from the coordinated activity of an integrated brain network. In support of this view, Woo and colleagues present evidence that distinct brain networks support the subjective changes in pain that result from nociceptive input and self-directed cognitive modulation. This evidence for the sensitivity of distinct neural subsystems to different aspects of pain opens up the way to more formal computational network theories of pain.

  1. Information Operations Innovation Network (IOIN) Demonstration

    National Research Council Canada - National Science Library

    Choo, Vic; Scheiderich, Louis

    2006-01-01

    ...; and Supplement existing/future network defense tools with additional capabilities. The actual software packages used for this effort include VIAasst, VisAlert, Flexviewer, Event Correlation for Cyber Attack Recognition (ECCARS...

  2. Information Dynamics as Foundation for Network Management

    Science.gov (United States)

    2014-12-04

    developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design

  3. When Spiders Bite: The Use, Misuse, and Unintended Consequences of ``Silent Information''

    Science.gov (United States)

    Keenan, Thomas P.

    Spiders are the workhorses of the Internet, silently (and almost invisibly) traversing the online world, 24 hours a day, looking for information that may be of interest to someone. It is being archived, organized, and sold, usually without the knowledge or consent of the subject of the information. Serious consequences are starting to appear, such as the withdrawal of three candidates from the October 2008 Canadian Federal election because of previous online indiscretions. While these were intentional if mis-guided postings, information made available without our consent can have equally devastating effects. Advances in artificial intelligence, as well as the increasing tendency to post more and more information, such as videos, will make the gathering, aggregation, and republishing of this “silent information” an increasingly important issue that must be addressed from the technical, social, ethical and legal perspectives, and sooner rather than later.

  4. Integration of genomic information with biological networks using Cytoscape.

    Science.gov (United States)

    Bauer-Mehren, Anna

    2013-01-01

    Cytoscape is an open-source software for visualizing, analyzing, and modeling biological networks. This chapter explains how to use Cytoscape to analyze the functional effect of sequence variations in the context of biological networks such as protein-protein interaction networks and signaling pathways. The chapter is divided into five parts: (1) obtaining information about the functional effect of sequence variation in a Cytoscape readable format, (2) loading and displaying different types of biological networks in Cytoscape, (3) integrating the genomic information (SNPs and mutations) with the biological networks, and (4) analyzing the effect of the genomic perturbation onto the network structure using Cytoscape built-in functions. Finally, we briefly outline how the integrated data can help in building mathematical network models for analyzing the effect of the sequence variation onto the dynamics of the biological system. Each part is illustrated by step-by-step instructions on an example use case and visualized by many screenshots and figures.

  5. Research Note: The consequences of different methods for handling missing network data in Stochastic Actor Based Models.

    Science.gov (United States)

    Hipp, John R; Wang, Cheng; Butts, Carter T; Jose, Rupa; Lakon, Cynthia M

    2015-05-01

    Although stochastic actor based models (e.g., as implemented in the SIENA software program) are growing in popularity as a technique for estimating longitudinal network data, a relatively understudied issue is the consequence of missing network data for longitudinal analysis. We explore this issue in our research note by utilizing data from four schools in an existing dataset (the AddHealth dataset) over three time points, assessing the substantive consequences of using four different strategies for addressing missing network data. The results indicate that whereas some measures in such models are estimated relatively robustly regardless of the strategy chosen for addressing missing network data, some of the substantive conclusions will differ based on the missing data strategy chosen. These results have important implications for this burgeoning applied research area, implying that researchers should more carefully consider how they address missing data when estimating such models.

  6. Factors Enabling Information Propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    A relevant feature of Social Network Sites is their ability to propagate units of information and create large distributed conversations. This phenomenon is particularly relevant because of the speed of information propagation, which is known to be much faster than within traditional media......, and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...... at measuring specific socio-technical factors enabling information spreading in Social Network Sites....

  7. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  8. Information Systems at Enterprise. Design of Secure Network of Enterprise

    Science.gov (United States)

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  9. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  10. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  11. Consequences of oil spills: a review and framework for informing planning

    Directory of Open Access Journals (Sweden)

    Stephanie E. Chang

    2014-06-01

    Full Text Available As oil transportation worldwide continues to increase, many communities are at risk of oil spill disasters and must anticipate and prepare for them. Factors that influence oil spill consequences are myriad and range from the biophysical to the social. We provide a summary literature review and overview framework to help communities systematically consider the factors and linkages that would influence consequences of a potential oil spill. The focus is on spills from oil tanker accidents. Drawing primarily on empirical studies of previous oil spill disasters, we focused on several main domains of interest: the oil spill itself, disaster management, the physical marine environment, marine biology, human health, economy, and policy. Key variables that influence the severity of consequences are identified, and significant interactions between variables are delineated. The framework can be used to clarify the complexity of oil spill impacts, identify lessons that may be transferable from other oil spill disasters, develop scenarios for planning, and inform risk analysis and policy debates in localities that are seeking to understand and reduce their vulnerability to potential spill disasters. As a case study, the framework is used to consider potential oil spills and consequences in Vancouver, Canada. Major increases in oil tanker traffic are anticipated in this region, creating urgent new demands for risk information, disaster management planning, and policy responses. The case study identifies particular conditions that distinguish the Vancouver context from other historic events; in particular, proximity to a densely populated urban area, the type of oil being transported, financial compensation schemes, and local economic structure. Drawing lessons from other oil spill disasters is important but should be undertaken with recognition of these key differences. Some types of impacts that have been relatively inconsequential in previous events may be

  12. Optimisation of information influences on problems of consequences of Chernobyl accident and quantitative criteria for estimation of information actions

    International Nuclear Information System (INIS)

    Sobaleu, A.

    2004-01-01

    Consequences of Chernobyl NPP accident still very important for Belarus. About 2 million Byelorussians live in the districts polluted by Chernobyl radionuclides. Modern approaches to the decision of after Chernobyl problems in Belarus assume more active use of information and educational actions to grow up a new radiological culture. It will allow to reduce internal doze of radiation without spending a lot of money and other resources. Experience of information work with the population affected by Chernobyl since 1986 till 2004 has shown, that information and educational influences not always reach the final aim - application of received knowledge on radiating safety in practice and changing the style of life. If we take into account limited funds and facilities, we should optimize information work. The optimization can be achieved on the basis of quantitative estimations of information actions effectiveness. It is possible to use two parameters for this quantitative estimations: 1) increase in knowledge of the population and experts on the radiating safety, calculated by new method based on applied theory of the information (Mathematical Theory of Communication) by Claude E. Shannon and 2) reduction of internal doze of radiation, calculated on the basis of measurements on human irradiation counter (HIC) before and after an information or educational influence. (author)

  13. Multiple information sources and consequences of conflicting information about medicine use during pregnancy: a multinational Internet-based survey.

    Science.gov (United States)

    Hämeen-Anttila, Katri; Nordeng, Hedvig; Kokki, Esa; Jyrkkä, Johanna; Lupattelli, Angela; Vainio, Kirsti; Enlund, Hannes

    2014-02-20

    A wide variety of information sources on medicines is available for pregnant women. When using multiple information sources, there is the risk that information will vary or even conflict. The objective of this multinational study was to analyze the extent to which pregnant women use multiple information sources and the consequences of conflicting information, and to investigate which maternal sociodemographic, lifestyle, and medical factors were associated with these objectives. An anonymous Internet-based questionnaire was made accessible during a period of 2 months, on 1 to 4 Internet websites used by pregnant women in 5 regions (Eastern Europe, Western Europe, Northern Europe, Americas, Australia). A total of 7092 responses were obtained (n=5090 pregnant women; n=2002 women with a child younger than 25 weeks). Descriptive statistics and logistic regression analysis were used. Of the respondents who stated that they needed information, 16.16% (655/4054) used one information source and 83.69% (3393/4054) used multiple information sources. Of respondents who used more than one information source, 22.62% (759/3355) stated that the information was conflicted. According to multivariate logistic regression analysis, factors significantly associated with experiencing conflict in medicine information included being a mother (OR 1.32, 95% CI 1.11-1.58), having university (OR 1.33, 95% CI 1.09-1.63) or other education (OR 1.49, 95% CI 1.09-2.03), residing in Eastern Europe (OR 1.52, 95% CI 1.22-1.89) or Australia (OR 2.28, 95% CI 1.42-3.67), use of 3 (OR 1.29, 95% CI 1.04-1.60) or >4 information sources (OR 1.82, 95% CI 1.49-2.23), and having ≥2 chronic diseases (OR 1.49, 95% CI 1.18-1.89). Because of conflicting information, 43.61% (331/759) decided not to use medication during pregnancy, 30.30% (230/759) sought a new information source, 32.67% (248/759) chose to rely on one source and ignore the conflicting one, 25.03% (190/759) became anxious, and 2.64% (20/759) did

  14. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  15. Development of information resources package for the Chernobyl accident and its consequences by INIS

    International Nuclear Information System (INIS)

    Negeri, B.; Tolstenkov, A.; Rieder, S.

    2006-01-01

    The Chernobyl accident was a global catastrophe that captured global attention and as such literature on the Chernobyl accident and its consequences is an important subject covered by the International Nuclear Information System (INIS) Database. The INIS Database contains about 21000 bibliographic records and 9000 full text documents on this subject from 1986 up to August 2006. Based on these extensive resources INIS released a DVD that contained bibliographic references and full text documents as well a bibliometric study of the Chernobyl references on the occasion of the International Conference entitled 'Chernobyl: Looking Back to Go Forwards' held in Vienna on 6 and 7 September 2005. Subsequently, INIS decided to release Revision 1 of the DVD in August 2006 for the twentieth anniversary of the Chernobyl accident with additional value added information sources. This paper briefly discusses the bibliometric parameters of the references, the contents of DVD and the activities undertaken to produce the Chernobyl information resources package

  16. Qualia could arise from information processing in local cortical networks.

    Science.gov (United States)

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  17. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  18. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  19. Networks, Netwar, and Information-Age Terrorism

    Science.gov (United States)

    1999-01-01

    intermediate nodes. • The star, hub, or wheel network, as in a franchise or a cartel structure where a set of actors is tied to a central node or actor...Aviv and Jerusalem. On March 21, a Hamas satchel bomb exploded at a Tel Aviv cafe , killing three persons and injuring 48; on July 30, two Hamas

  20. Information and Networks Working Paper: Aiding surveillance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-12-01

    Dec 1, 2014 ... Information technology transfer is increasingly a key component of development and humanitarian aid initiatives. With social protection programs now incorporating digitized management information systems and electronic transfers, registration and electoral systems deploying biometric technologies, and ...

  1. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  2. Information processing in echo state networks at the edge of chaos.

    Science.gov (United States)

    Boedecker, Joschka; Obst, Oliver; Lizier, Joseph T; Mayer, N Michael; Asada, Minoru

    2012-09-01

    We investigate information processing in randomly connected recurrent neural networks. It has been shown previously that the computational capabilities of these networks are maximized when the recurrent layer is close to the border between a stable and an unstable dynamics regime, the so called edge of chaos. The reasons, however, for this maximized performance are not completely understood. We adopt an information-theoretical framework and are for the first time able to quantify the computational capabilities between elements of these networks directly as they undergo the phase transition to chaos. Specifically, we present evidence that both information transfer and storage in the recurrent layer are maximized close to this phase transition, providing an explanation for why guiding the recurrent layer toward the edge of chaos is computationally useful. As a consequence, our study suggests self-organized ways of improving performance in recurrent neural networks, driven by input data. Moreover, the networks we study share important features with biological systems such as feedback connections and online computation on input streams. A key example is the cerebral cortex, which was shown to also operate close to the edge of chaos. Consequently, the behavior of model systems as studied here is likely to shed light on reasons why biological systems are tuned into this specific regime.

  3. Economic consequences of extra by-passes in district heating networks. Investment-, running- and maintenance costs

    International Nuclear Information System (INIS)

    Herbert, P.

    1995-02-01

    For various reasons, extra by-passes are installed in district heating networks to ensure a high flow temperature when the water circulation is insufficient. By 'extra by-pass' we here mean a connection between the distribution pipe and the return pipe. This study mainly deals with extra by-passes to prevent freezing. The estimation of the extra by-pass costs is based on the district heating rates. Our assumption is that an extra by-pass can be regarded as a substation in the district heating network, with regard to the demand for the water flow, heat and power. The reason is the difficulty to obtain available facts to estimate the real costs concerning extra by-passes. Therefore, the method can not claim that the information about the costs is exact but gives an indication of the size of them. The valves in an extra by-pass can be set more or less open. We assume that manual valves in extra by-passes are wide open. Thermostatic valves are, however, assumed to be adjusted in order to cause a very small water flow. 2 refs, 16 figs, 9 tabs, 6 appendices

  4. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  5. Social Circles Detection from Ego Network and Profile Information

    Science.gov (United States)

    2014-12-19

    way of organizing contacts in personal networks . They are therefore currently implemented in the major social net- working systems, such as Facebook ...0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network ...structural network information but also the contents of social interactions, with the aim to detect copying communities. The views, opinions and/or findings

  6. The Value of Information in Distributed Decision Networks

    Science.gov (United States)

    2016-03-04

    formulation, and then we describe the various results at- tained. 1 Mathematical description of Distributed Decision Network un- der Information...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...to any linear, combinatorial problem like shortest path optimization, and, further, so long as the original combinatorial problem can be solved in

  7. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  8. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  9. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  10. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  11. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  12. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  13. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  14. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  15. Grower Communication Networks: Information Sources for Organic Farmers

    Science.gov (United States)

    Crawford, Chelsi; Grossman, Julie; Warren, Sarah T.; Cubbage, Fred

    2015-01-01

    This article reports on a study to determine which information sources organic growers use to inform farming practices by conducting in-depth semi-structured interviews with 23 organic farmers across 17 North Carolina counties. Effective information sources included: networking, agricultural organizations, universities, conferences, Extension, Web…

  16. Pairwise Network Information and Nonlinear Correlations

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Davidsen, J.

    2016-01-01

    Roč. 94, č. 4 (2016), č. článku 040301. ISSN 2470-0045 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : mutual information * correlation * information theory * redundancy Subject RIV: BD - Theory of Information Impact factor: 2.366, year: 2016

  17. Architectural Design for the Global Legal Information Network

    Science.gov (United States)

    Kalpakis, Konstantinos

    1999-01-01

    In this report, we provide a summary of our activities regarding the goals, requirements analysis, design, and prototype implementation for the Global Legal Information Network, a joint effort between the Law Library of Congress and NASA.

  18. Research Award: Information and Networks (I&N) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... The growth of networked technologies has created new opportunities for advancing human ... The I&N research awardee will ideally explore research questions centred ... such as engineering or computer/information science.

  19. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  20. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  1. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  2. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  3. Information jet: Handling noisy big data from weakly disconnected network

    Science.gov (United States)

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  4. A multivariate extension of mutual information for growing neural networks.

    Science.gov (United States)

    Ball, Kenneth R; Grant, Christopher; Mundy, William R; Shafer, Timothy J

    2017-11-01

    Recordings of neural network activity in vitro are increasingly being used to assess the development of neural network activity and the effects of drugs, chemicals and disease states on neural network function. The high-content nature of the data derived from such recordings can be used to infer effects of compounds or disease states on a variety of important neural functions, including network synchrony. Historically, synchrony of networks in vitro has been assessed either by determination of correlation coefficients (e.g. Pearson's correlation), by statistics estimated from cross-correlation histograms between pairs of active electrodes, and/or by pairwise mutual information and related measures. The present study examines the application of Normalized Multiinformation (NMI) as a scalar measure of shared information content in a multivariate network that is robust with respect to changes in network size. Theoretical simulations are designed to investigate NMI as a measure of complexity and synchrony in a developing network relative to several alternative approaches. The NMI approach is applied to these simulations and also to data collected during exposure of in vitro neural networks to neuroactive compounds during the first 12 days in vitro, and compared to other common measures, including correlation coefficients and mean firing rates of neurons. NMI is shown to be more sensitive to developmental effects than first order synchronous and nonsynchronous measures of network complexity. Finally, NMI is a scalar measure of global (rather than pairwise) mutual information in a multivariate network, and hence relies on less assumptions for cross-network comparisons than historical approaches. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  6. Coordinated Economic Development and the Information Network.

    Science.gov (United States)

    Easton, D. K.

    This is a discussion of some of the problems that the Advisory Organization for Gulf Industries (AOGI) will face when it undertakes (1) to organize both an information center (node) that will serve the information needs of the Gulf States of Iraq, Kuwait, Bahrain, Saudi Arabia, Qatar, the United Arab Emirates (UAE) and Oman; and (2) to compile an…

  7. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  8. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa

    2012-01-01

    This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...

  9. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-01-01

    This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...

  10. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  11. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  12. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  13. Effective network inference through multivariate information transfer estimation

    Science.gov (United States)

    Dahlqvist, Carl-Henrik; Gnabo, Jean-Yves

    2018-06-01

    Network representation has steadily gained in popularity over the past decades. In many disciplines such as finance, genetics, neuroscience or human travel to cite a few, the network may not directly be observable and needs to be inferred from time-series data, leading to the issue of separating direct interactions between two entities forming the network from indirect interactions coming through its remaining part. Drawing on recent contributions proposing strategies to deal with this problem such as the so-called "global silencing" approach of Barzel and Barabasi or "network deconvolution" of Feizi et al. (2013), we propose a novel methodology to infer an effective network structure from multivariate conditional information transfers. Its core principal is to test the information transfer between two nodes through a step-wise approach by conditioning the transfer for each pair on a specific set of relevant nodes as identified by our algorithm from the rest of the network. The methodology is model free and can be applied to high-dimensional networks with both inter-lag and intra-lag relationships. It outperforms state-of-the-art approaches for eliminating the redundancies and more generally retrieving simulated artificial networks in our Monte-Carlo experiments. We apply the method to stock market data at different frequencies (15 min, 1 h, 1 day) to retrieve the network of US largest financial institutions and then document how bank's centrality measurements relate to bank's systemic vulnerability.

  14. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  15. Distribution of Information in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Hassine, Wijden B

    2007-01-01

    .... This work contributes to this study in two specific ways. First, it provides a mathematical model that deals with the best possible site of information source nodes in a graph of infinite density...

  16. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  17. Effects of rewiring strategies on information spreading in complex dynamic networks

    Science.gov (United States)

    Ally, Abdulla F.; Zhang, Ning

    2018-04-01

    Recent advances in networks and communication services have attracted much interest to understand information spreading in social networks. Consequently, numerous studies have been devoted to provide effective and accurate models for mimicking information spreading. However, knowledge on how to spread information faster and more widely remains a contentious issue. Yet, most existing works are based on static networks which limit the reality of dynamism of entities that participate in information spreading. Using the SIR epidemic model, this study explores and compares effects of two rewiring models (Fermi-Dirac and Linear functions) on information spreading in scale free and small world networks. Our results show that for all the rewiring strategies, the spreading influence replenishes with time but stabilizes in a steady state at later time-steps. This means that information spreading takes-off during the initial spreading steps, after which the spreading prevalence settles toward its equilibrium, with majority of the population having recovered and thus, no longer affecting the spreading. Meanwhile, rewiring strategy based on Fermi-Dirac distribution function in one way or another impedes the spreading process, however, the structure of the networks mimic the spreading, even with a low spreading rate. The worst case can be when the spreading rate is extremely small. The results emphasize that despite a big role of such networks in mimicking the spreading, the role of the parameters cannot be simply ignored. Apparently, the probability of giant degree neighbors being informed grows much faster with the rewiring strategy of linear function compared to that of Fermi-Dirac distribution function. Clearly, rewiring model based on linear function generates the fastest spreading across the networks. Therefore, if we are interested in speeding up the spreading process in stochastic modeling, linear function may play a pivotal role.

  18. Exploiting global information in complex network repair processes

    Institute of Scientific and Technical Information of China (English)

    Tianyu WANG; Jun ZHANG; Sebastian WANDELT

    2017-01-01

    Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger compo nents at a low cost only with local information.In this paper,we discuss the effectiveness and effi ciency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair.

  19. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...

  20. Expanding the informational chemistries of life: peptide/RNA networks

    Science.gov (United States)

    Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.

    2017-11-01

    The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.

  1. Propagating semantic information in biochemical network models

    Directory of Open Access Journals (Sweden)

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  2. Workgroup report: base stations and wireless networks-radiofrequency (RF) exposures and health consequences.

    Science.gov (United States)

    Valberg, Peter A; van Deventer, T Emilie; Repacholi, Michael H

    2007-03-01

    Radiofrequency (RF) waves have long been used for different types of information exchange via the air waves--wireless Morse code, radio, television, and wireless telephone (i.e., construction and operation of telephones or telephone systems). Increasingly larger numbers of people rely on mobile telephone technology, and health concerns about the associated RF exposure have been raised, particularly because the mobile phone handset operates in close proximity to the human body, and also because large numbers of base station antennas are required to provide widespread availability of service to large populations. The World Health Organization convened an expert workshop to discuss the current state of cellular-telephone health issues, and this article brings together several of the key points that were addressed. The possibility of RF health effects has been investigated in epidemiology studies of cellular telephone users and workers in RF occupations, in experiments with animals exposed to cell-phone RF, and via biophysical consideration of cell-phone RF electric-field intensity and the effect of RF modulation schemes. As summarized here, these separate avenues of scientific investigation provide little support for adverse health effects arising from RF exposure at levels below current international standards. Moreover, radio and television broadcast waves have exposed populations to RF for > 50 years with little evidence of deleterious health consequences. Despite unavoidable uncertainty, current scientific data are consistent with the conclusion that public exposures to permissible RF levels from mobile telephone and base stations are not likely to adversely affect human health.

  3. Informal networks and resilience to climate change impacts: A collective approach to index insurance

    DEFF Research Database (Denmark)

    Trærup, Sara Lærke Meltofte

    2012-01-01

    This article contributes to the understanding of how to proceed with the development of index-insurance in order to reach extended population coverage with the insurance. The approach is applied to an example from a region in Tanzania. One of the main coping strategies that resource-poor households...... networks become insufficient since the majority of risk-sharers will be affected by the shock at the same time. This paper proposes a collective approach to index-insurance in which the members of an informal network will be insured as one insurance taker. The paper raises a conceptual argument...... that targeting households through existing informal networks will remove a number of prevailing barriers to the takeup of insurance and consequently the approach has the potential to increase households’ resilience to climate change impacts. The policy implications of the conclusions are significant since...

  4. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  5. A Kansas Integrated Commercialization Information Network (KICIN).

    Science.gov (United States)

    Ambler, C.; And Others

    A consortium of Kansas economic development service providers is building a web of virtual satellite offices that will demonstrate the delivery of economic development services in all areas of Kansas. These "offices" will use the Internet and a novel information delivery system to reach small and medium-sized businesses and individuals…

  6. Mutual information-based LPI optimisation for radar network

    Science.gov (United States)

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  7. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  8. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Science.gov (United States)

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  9. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    OpenAIRE

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  10. Information Retrieval on social network: An Adaptive Proof

    Science.gov (United States)

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  11. Scalable Networked Information Processing Environment (SNIPE)

    Energy Technology Data Exchange (ETDEWEB)

    Fagg, G.E.; Moore, K. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science; Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science]|[Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.; Geist, A. [Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.

    1997-11-01

    SNIPE is a metacomputing system that aims to provide a reliable, secure, fault tolerant environment for long term distributed computing applications and data stores across the global Internet. This system combines global naming and replication of both processing and data to support large scale information processing applications leading to better availability and reliability than currently available with typical cluster computing and/or distributed computer environments.

  12. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  13. Brain networks underlying mental imagery of auditory and visual information.

    Science.gov (United States)

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  14. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  15. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  16. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  17. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  18. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  19. Introduction to spiking neural networks: Information processing, learning and applications.

    Science.gov (United States)

    Ponulak, Filip; Kasinski, Andrzej

    2011-01-01

    The concept that neural information is encoded in the firing rate of neurons has been the dominant paradigm in neurobiology for many years. This paradigm has also been adopted by the theory of artificial neural networks. Recent physiological experiments demonstrate, however, that in many parts of the nervous system, neural code is founded on the timing of individual action potentials. This finding has given rise to the emergence of a new class of neural models, called spiking neural networks. In this paper we summarize basic properties of spiking neurons and spiking networks. Our focus is, specifically, on models of spike-based information coding, synaptic plasticity and learning. We also survey real-life applications of spiking models. The paper is meant to be an introduction to spiking neural networks for scientists from various disciplines interested in spike-based neural processing.

  20. Information loss method to measure node similarity in networks

    Science.gov (United States)

    Li, Yongli; Luo, Peng; Wu, Chong

    2014-09-01

    Similarity measurement for the network node has been paid increasing attention in the field of statistical physics. In this paper, we propose an entropy-based information loss method to measure the node similarity. The whole model is established based on this idea that less information loss is caused by seeing two more similar nodes as the same. The proposed new method has relatively low algorithm complexity, making it less time-consuming and more efficient to deal with the large scale real-world network. In order to clarify its availability and accuracy, this new approach was compared with some other selected approaches on two artificial examples and synthetic networks. Furthermore, the proposed method is also successfully applied to predict the network evolution and predict the unknown nodes' attributions in the two application examples.

  1. Construction of the NIFS campus information network, NIFS-LAN

    Energy Technology Data Exchange (ETDEWEB)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  2. 77 FR 55795 - Request for Information: Research on the Causes, Characteristics, and Consequences of Childhood...

    Science.gov (United States)

    2012-09-11

    ... Causes, Characteristics, and Consequences of Childhood Hunger and Food Insecurity AGENCY: Food and... the causes, characteristics, and consequences of childhood hunger and food insecurity. The funding... understanding of the causes and consequences of child hunger and food insecurity? In addition, commenters are...

  3. The evolutionary and ecological consequences of animal social networks: emerging issues.

    Science.gov (United States)

    Kurvers, Ralf H J M; Krause, Jens; Croft, Darren P; Wilson, Alexander D M; Wolf, Max

    2014-06-01

    The first generation of research on animal social networks was primarily aimed at introducing the concept of social networks to the fields of animal behaviour and behavioural ecology. More recently, a diverse body of evidence has shown that social fine structure matters on a broader scale than initially expected, affecting many key ecological and evolutionary processes. Here, we review this development. We discuss the effects of social network structure on evolutionary dynamics (genetic drift, fixation probabilities, and frequency-dependent selection) and social evolution (cooperation and between-individual behavioural differences). We discuss how social network structure can affect important coevolutionary processes (host-pathogen interactions and mutualisms) and population stability. We also discuss the potentially important, but poorly studied, role of social network structure on dispersal and invasion. Throughout, we highlight important areas for future research. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  5. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  6. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  7. Proactive Traffic Information Control in Emergency Evacuation Network

    Directory of Open Access Journals (Sweden)

    Zhengfeng Huang

    2015-01-01

    Full Text Available Traffic demand in emergency evacuation is usually too large to be effectively managed with reactive traffic information control methods. These methods adapt to the road traffic passively by publishing real-time information without consideration of the routing behavior feedback produced by evacuees. Other remedy measures have to be prepared in case of nonrecurring congestion under these methods. To use the network capacity fully to mitigate near-future evacuation traffic congestion, we propose proactive traffic information control (PTIC model. Based on the mechanism between information and routing behavior feedback, this model can change the route choice of evacuees in advance by dissipating strategic traffic information. Generally, the near-future traffic condition is difficult to accurately predict because it is uncertain in evacuation. Assume that the value of traffic information obeys certain distribution within a range, and then real-time traffic information may reflect the most-likely near-future traffic condition. Unlike the real-time information, the proactive traffic information is a selection within the range to achieve a desired level of the road network performance index (total system travel time. In the aspect of the solution algorithm, differential equilibrium decomposed optimization (D-EDO is proposed to compare with other heuristic methods. A field study on a road network around a large stadium is used to validate the PTIC.

  8. Information on the Chernobyl NPP accident and its consequencies prepared for IAEA

    Energy Technology Data Exchange (ETDEWEB)

    1986-11-01

    The information on the accident at the 4th power unit of the Chernobyl NPP and its consequences prepared for IAEA on the basis of the conclusions made by the Government commission constituted for investigating the accident causes and implementing the necessary emergency and reconstruction measures is given. The accident with reactor core disruption and partial destruction of the building Lappened on 26.04.86 at 1 hour and 23 minutes. The accident occurred before reactor shut-down for planned repairs during the testing of one of turbogenerators. The design features of the RBMK-1000 reactor plant, its main physical characteristics and parameters of the NPP safety system are considered. The chronology of the accident development and the results of analysis carried out using a mathematical model are given. The causes of the accident are analyzed. The measures for preventing the accident development and lessening its consequences as well as those for the environment radioactive contamination control and sanitary provisions are described in detail. The conclusion is made that the original cause of the accident is highly improbable combination of disorder and errors in operational conditions made by the personnel of the power unit. It is emphasized that development of the world nuclear engineering, besides advantages in the field of power supply and natural resources conservation, incurs also damages of international character. Among these are transboundary radioactivity transport, in particular, during serious radiation accidents and the danger of international terrorism and specific radiation hazard of nuclear objects under war conditions. All this defines the key necessity of deep international cooperation in the field of nuclear power engineering and its safeguarding.

  9. Information flow in layered networks of non-monotonic units

    Science.gov (United States)

    Schittler Neves, Fabio; Martim Schubert, Benno; Erichsen, Rubem, Jr.

    2015-07-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information.

  10. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  11. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  12. Information flow in layered networks of non-monotonic units

    International Nuclear Information System (INIS)

    Neves, Fabio Schittler; Schubert, Benno Martim; Erichsen, Rubem Jr

    2015-01-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information. (paper)

  13. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  14. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  15. Scatter networks: a new approach for analysing information scatter

    International Nuclear Information System (INIS)

    Adamic, Lada A; Suresh, K; Shi Xiaolin

    2007-01-01

    Information on any given topic is often scattered across the Web. Previously this scatter has been characterized through the inequality of distribution of facts (i.e. pieces of information) across webpages. Such an approach conceals how specific facts (e.g. rare facts) occur in specific types of pages (e.g. fact-rich pages). To reveal such regularities, we construct bipartite networks, consisting of two types of vertices: the facts contained in webpages and the webpages themselves. Such a representation enables the application of a series of network analysis techniques, revealing structural features such as connectivity, robustness and clustering. Not only does network analysis yield new insights into information scatter, but we also illustrate the benefit of applying new and existing analysis techniques directly to a bipartite network as opposed to its one-mode projection. We discuss the implications of each network feature to the users' ability to find comprehensive information online. Finally, we compare the bipartite graph structure of webpages and facts with the hyperlink structure between the webpages

  16. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-03-01

    This project is implemented to survey the current statuses and future trends of the Asian district environment-related information networks, for the (research cooperation project for development of environmental condition measuring laser radar systems), being promoted by NEDO. First, current statuses of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, major domestic nodes and internationally connected conditions are surveyed mainly for internet-connected networks, for surveying the current statuses and future trends of the research networks in Asian countries. Second, current statuses in Indonesia of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, domestic node sites and managing organizations, charge systems and institutions, types/reliability/ stability of the circuits, and conditions of restriction of use, if any, for surveying the current statuses and future trends in Indonesia. Third, conditions of and needs for network utilization by researchers for Asian district environments. (NEDO)

  17. Shifts in the architecture of the Nationwide Health Information Network.

    Science.gov (United States)

    Lenert, Leslie; Sundwall, David; Lenert, Michael Edward

    2012-01-01

    In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internet-like architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood of their success, while making the NwHIN dependent on nascent technologies for community level functions such as record locator services. These changes may impact the health of patients and communities. Independent, scientifically focused debate is needed on the wisdom of ONC's proposed changes in its strategy for the NwHIN.

  18. Investigating the consequences of urban volcanism using a scenario approach II: Insights into transportation network damage and functionality

    Science.gov (United States)

    Blake, Daniel M.; Deligne, Natalia I.; Wilson, Thomas M.; Lindsay, Jan M.; Woods, Richard

    2017-06-01

    Transportation networks are critical infrastructure in urban environments. Before, during and following volcanic activity, these networks can incur direct and indirect impacts, which subsequently reduces the Level-of-Service available to transportation end-users. Additionally, reductions in service can arise from management strategies including evacuation zoning, causing additional complications for transportation end-users and operators. Here, we develop metrics that incorporate Level-of-Service for transportation end-users as the key measure of vulnerability for multi-hazard volcanic impact and risk assessments. A hypothetical eruption scenario recently developed for the Auckland Volcanic Field, New Zealand, is applied to describe potential impacts of a small basaltic eruption on different transportation modes, namely road, rail, and activities at airports and ports. We demonstrate how the new metrics can be applied at specific locations worldwide by considering the geophysical hazard sequence and evacuation zones in this scenario, a process that was strongly informed by consultation with transportation infrastructure providers and emergency management officials. We also discuss the potential implications of modified hazard sequences (e.g. different wind profiles during the scenario, and unrest with no resulting eruption) on transportation vulnerability and population displacement. The vent area of the eruption scenario used in our study is located north of the Māngere Bridge suburb of Auckland. The volcanic activity in the scenario progresses from seismic unrest, through phreatomagmatic explosions generating pyroclastic surges to a magmatic phase generating a scoria cone and lava flows. We find that most physical damage to transportation networks occurs from pyroclastic surges during the initial stages of the eruption. However, the most extensive service reduction across all networks occurs 6 days prior to the eruption onset, largely attributed to the

  19. Think different? An investigation of network antecedents and performance consequences of creativity as deviation

    OpenAIRE

    Soda, Giuseppe; Bizzi, Lorenzo

    2012-01-01

    In this study, we investigate how network relations affect project performance through creativity. We challenge previous conceptualizations of creativity by proposing the idea that creative outcomes in project industries can be conceptualized as deviation from past projects and deviation from partners’ projects. While previous research has mostly assumed that network relations are beneficial to performance because they increase innovation and creativity, our conceptualization of creativity al...

  20. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  1. Information dynamics of brain–heart physiological networks during sleep

    International Nuclear Information System (INIS)

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  2. Information dynamics of brain-heart physiological networks during sleep

    Science.gov (United States)

    Faes, L.; Nollo, G.; Jurysta, F.; Marinazzo, D.

    2014-10-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain-heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain-brain and brain-heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep.

  3. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  4. Towards the understanding of network information processing in biology

    Science.gov (United States)

    Singh, Vijay

    Living organisms perform incredibly well in detecting a signal present in the environment. This information processing is achieved near optimally and quite reliably, even though the sources of signals are highly variable and complex. The work in the last few decades has given us a fair understanding of how individual signal processing units like neurons and cell receptors process signals, but the principles of collective information processing on biological networks are far from clear. Information processing in biological networks, like the brain, metabolic circuits, cellular-signaling circuits, etc., involves complex interactions among a large number of units (neurons, receptors). The combinatorially large number of states such a system can exist in makes it impossible to study these systems from the first principles, starting from the interactions between the basic units. The principles of collective information processing on such complex networks can be identified using coarse graining approaches. This could provide insights into the organization and function of complex biological networks. Here I study models of biological networks using continuum dynamics, renormalization, maximum likelihood estimation and information theory. Such coarse graining approaches identify features that are essential for certain processes performed by underlying biological networks. We find that long-range connections in the brain allow for global scale feature detection in a signal. These also suppress the noise and remove any gaps present in the signal. Hierarchical organization with long-range connections leads to large-scale connectivity at low synapse numbers. Time delays can be utilized to separate a mixture of signals with temporal scales. Our observations indicate that the rules in multivariate signal processing are quite different from traditional single unit signal processing.

  5. Analyzing complex networks evolution through Information Theory quantifiers

    International Nuclear Information System (INIS)

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  6. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  7. Information processing and routing in wireless sensor networks

    CERN Document Server

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  8. Information spread of emergency events: path searching on social networks.

    Science.gov (United States)

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  9. Information Spread of Emergency Events: Path Searching on Social Networks

    Directory of Open Access Journals (Sweden)

    Weihui Dai

    2014-01-01

    Full Text Available Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  10. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  11. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  12. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  13. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  14. A Holistic Approach to Networked Information Systems Design and Analysis

    Science.gov (United States)

    2016-04-15

    attain quite substantial savings. 11. Optimal algorithms for energy harvesting in wireless networks. We use a Markov- decision-process (MDP) based...approach to obtain optimal policies for transmissions . The key advantage of our approach is that it holistically considers information and energy in a...Coding technique to minimize delays and the number of transmissions in Wireless Systems. As we approach an era of ubiquitous computing with information

  15. How to Avoid the Negative Consequences of Restructuring the Network of Rural Schools

    Science.gov (United States)

    Suvorova, Galina

    2004-01-01

    Because of the destruction of the agricultural sector of Russia's economy, there is no demand for workers in the countryside, and, as a consequence, the able-bodied population is leaving the countryside and the birth rate has gone down drastically. These factors have resulted in the liquidation of kindergartens and small-enrollment schools and a…

  16. Seed dispersal networks in the Galápagos and the consequences of alien plant invasions

    DEFF Research Database (Denmark)

    Heleno, R. H.; Olesen, Jens Mogens; Nogales, M.

    2013-01-01

    Alien plants are a growing threat to the Gala´pagos unique biota. We evaluated the impact of alien plants on eight seed dispersal networks from two islands of the archipelago. Nearly 10 000 intact seeds from 58 species were recovered from the droppings of 18 bird and reptile dispersers. The most......, followed by small ground finch, two mockingbirds, the giant tortoise and two insectivorous birds. Most animals dispersed alien seeds, but these formed a relatively small proportion of the interactions. Nevertheless, the integration of aliens was higher in the island that has been invaded for longest......, suggesting a time-lag between alien plant introductions and their impacts on seed dispersal networks. Alien plants become more specialized with advancing invasion, favouring more simplified plant and disperser communities. However, only habitat type significantly affected the overall network structure. Alien...

  17. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui; Zhao, Junzhou; Ribeiro, Bruno; Lui, John C. S.; Towsley, Don; Guan, Xiaohong

    2018-01-01

    querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling

  18. Information Networks and Social Inclusion in Latin America | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rapid changes in information networks throughout Latin America may provide new opportunities to address inequalities in the region. ... government and open education, with specific attention paid to women and youth in urban settings; ... optimizes household expenditures : a case study from rural communities in Mexico.

  19. Information system design for demand-driven supply networks

    OpenAIRE

    Selk, Bernhard

    2004-01-01

    Information system design for demand-driven supply networks : integrating CRM & SCM / B. Selk, K. Turowski, C. Winnewisser. - In: EIS : Fourth International ICSC Symposium on Engineering of Intelligent Systems, EIS 2004. [Elektronische Ressource]. - Millet, Alberta : ICSC Interdisciplinary Research Canada, 2004. - 8 S. auf CD-ROM

  20. Audit Trail Management System in Community Health Care Information Network.

    Science.gov (United States)

    Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio

    2015-01-01

    After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.

  1. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  2. Determinants of informal coordination in networked supply chains

    NARCIS (Netherlands)

    Ashayeri, J.; Ogulin, R.; Selen, W.

    2012-01-01

    Purpose – The purpose of this paper is to empirically examine capability connectivity, relationship alignment and the ability to informally network in the supply chain as determinants for better utilizing capabilities amongst supply chain partners. In particular, the paper focuses on how the above

  3. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Science.gov (United States)

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  4. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Cognitive sciences Impact factor: 4.259, year: 2016

  5. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  6. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  7. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  8. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  9. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), an international nongovernmental organization, has demonstrated the effectiveness of its open source electronic medical record system (OpenMRS) in eight clinics in Rwanda. As a result, the Ministry of Health has decided to roll ...

  10. Value of digital information networks : A holonic framework

    NARCIS (Netherlands)

    Madureira, A.J.P.S.

    2011-01-01

    The extraordinary level of interest worldwide in Digital Information Networks (DINs)’ deployment is due to the strong perception that they bring economic, social and environmental value. However, scientific attempts to evidence this perception lead to speculative, elusive or limited conclusions. In

  11. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research program. INASSA is focused on producing credible, high-quality evidence on the influence of digital initiatives in the areas of governance, science, learning, ...

  12. Attractor Structures of Signaling Networks: Consequences of Different Conformational Barcode Dynamics and Their Relations to Network-Based Drug Design.

    Science.gov (United States)

    Szalay, Kristóf Z; Nussinov, Ruth; Csermely, Peter

    2014-06-01

    Conformational barcodes tag functional sites of proteins and are decoded by interacting molecules transmitting the incoming signal. Conformational barcodes are modified by all co-occurring allosteric events induced by post-translational modifications, pathogen, drug binding, etc. We argue that fuzziness (plasticity) of conformational barcodes may be increased by disordered protein structures, by integrative plasticity of multi-phosphorylation events, by increased intracellular water content (decreased molecular crowding) and by increased action of molecular chaperones. This leads to increased plasticity of signaling and cellular networks. Increased plasticity is both substantiated by and inducing an increased noise level. Using the versatile network dynamics tool, Turbine (www.turbine.linkgroup.hu), here we show that the 10 % noise level expected in cellular systems shifts a cancer-related signaling network of human cells from its proliferative attractors to its largest, apoptotic attractor representing their health-preserving response in the carcinogen containing and tumor suppressor deficient environment modeled in our study. Thus, fuzzy conformational barcodes may not only make the cellular system more plastic, and therefore more adaptable, but may also stabilize the complex system allowing better access to its largest attractor. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. The Consequences of Unpredictable Development of Economic Conditions on Heat Exchanger Network Configurations and Economic Results

    DEFF Research Database (Denmark)

    Mou, C.; Qvale, Einar Bjørn

    2002-01-01

    streams. The primary objective of the present work was to gain an understanding of the influence of dramatic economic changes on heat exchanger network (HEN) configurations, their profitability and how an existing HEN could restrict future possibilities of heat recovery. HENs were designed to maximise...

  14. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Directory of Open Access Journals (Sweden)

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  15. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode.......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  16. Identification of Functional Information Subgraphs in Complex Networks

    International Nuclear Information System (INIS)

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  17. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  18. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  19. The Deep Space Network information system in the year 2000

    Science.gov (United States)

    Markley, R. W.; Beswick, C. A.

    1992-01-01

    The Deep Space Network (DSN), the largest, most sensitive scientific communications and radio navigation network in the world, is considered. Focus is made on the telemetry processing, monitor and control, and ground data transport architectures of the DSN ground information system envisioned for the year 2000. The telemetry architecture will be unified from the front-end area to the end user. It will provide highly automated monitor and control of the DSN, automated configuration of support activities, and a vastly improved human interface. Automated decision support systems will be in place for DSN resource management, performance analysis, fault diagnosis, and contingency management.

  20. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 4.259, year: 2016

  1. Hybrid emergency radiation detection: a wireless sensor network application for consequence management of a radiological release

    Science.gov (United States)

    Kyker, Ronald D.; Berry, Nina; Stark, Doug; Nachtigal, Noel; Kershaw, Chris

    2004-08-01

    The Hybrid Emergency Radiation Detection (HERD) system is a rapidly deployable ad-hoc wireless sensor network for monitoring the radiation hazard associated with a radiation release. The system is designed for low power, small size, low cost, and rapid deployment in order to provide early notification and minimize exposure. The many design tradeoffs, decisions, and challenges in the implementation of this wireless sensor network design will be presented and compared to the commercial systems available. Our research in a scaleable modular architectural highlights the need and implementation of a system level approach that provides flexibility and adaptability for a variety of applications. This approach seeks to minimize power, provide mission specific specialization, and provide the capability to upgrade the system with the most recent technology advancements by encapsulation and modularity. The implementation of a low power, widely available Real Time Operating System (RTOS) for multitasking with an improvement in code maintenance, portability, and reuse will be presented. Finally future design enhancements technology trends affecting wireless sensor networks will be presented.

  2. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-10

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD... Information Technology Research and Development (NITRD). ACTION: Notice, request for public comment. FOR..., the National Coordination Office for Networking and Information Technology Research and Development...

  3. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  4. Information Reference Models for European Pork Supply Networks - Identifying Gaps in Information Infrastructures

    DEFF Research Database (Denmark)

    Lehmann, Richard J.; Hermansen, John Erik; Fritz, Melanie

    2011-01-01

    Several global developments such as diminishing production resources, limits in the availability of water and the growing demand for bio-energy as well as sector-wide crises (e.g. BSE, swine fever, dioxin) have led to a changing attitude of society towards the conse-quences of the food system......‘s activities for social, economic and environmental issues, cap-tured in the term of sustainability. As a consequence, consumers show increasing interest in the characteristics of food, and in turn, on the availability of related information and guaran-tees. The paper introduces different information reference...

  5. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  6. Role of information and communication networks in malaria survival

    Directory of Open Access Journals (Sweden)

    Marathe Achla

    2007-10-01

    Full Text Available Abstract Background Quite often symptoms of malaria go unrecognized or untreated. According to the Multilateral Initiative on Malaria, 70% of the malaria cases that are treated at home are mismanaged. Up to 82% of all malaria episodes in sub-Saharan Africa are treated outside the formal health sector. Fast and appropriate diagnosis and treatment of malaria is extremely important in reducing morbidity and mortality. Method Data from 70 different countries is pooled together to construct a panel dataset of health and socio-economic variables for a time span of (1960–2004. The generalized two-stage least squares and panel data models are used to investigate the impact of information and communication network (ICN variables on malaria death probability. The intensity of ICN is represented by the number of telephone main lines per 1,000 people and the number of television sets per 1,000 people. Results The major finding is that the intensity of ICN is associated with reduced probability of deaths of people that are clinically identified as malaria infected. The results are robust for both indicators i.e. interpersonal and mass communication networks and for all model specifications examined. Conclusion The results suggest that information and communication networks can substantially scale up the effectiveness of the existing resources for malaria prevention. Resources spent in preventing malaria are far less than needed. Expanded information and communication networks will widen the avenues for community based "participatory development", that encourages the use of local information, knowledge and decision making. Timely information, immediate care and collective knowledge based treatment can be extremely important in reducing child mortality and achieving the millennium development goal.

  7. Optimal information transfer in enzymatic networks: A field theoretic formulation

    Science.gov (United States)

    Samanta, Himadri S.; Hinczewski, Michael; Thirumalai, D.

    2017-07-01

    Signaling in enzymatic networks is typically triggered by environmental fluctuations, resulting in a series of stochastic chemical reactions, leading to corruption of the signal by noise. For example, information flow is initiated by binding of extracellular ligands to receptors, which is transmitted through a cascade involving kinase-phosphatase stochastic chemical reactions. For a class of such networks, we develop a general field-theoretic approach to calculate the error in signal transmission as a function of an appropriate control variable. Application of the theory to a simple push-pull network, a module in the kinase-phosphatase cascade, recovers the exact results for error in signal transmission previously obtained using umbral calculus [Hinczewski and Thirumalai, Phys. Rev. X 4, 041017 (2014), 10.1103/PhysRevX.4.041017]. We illustrate the generality of the theory by studying the minimal errors in noise reduction in a reaction cascade with two connected push-pull modules. Such a cascade behaves as an effective three-species network with a pseudointermediate. In this case, optimal information transfer, resulting in the smallest square of the error between the input and output, occurs with a time delay, which is given by the inverse of the decay rate of the pseudointermediate. Surprisingly, in these examples the minimum error computed using simulations that take nonlinearities and discrete nature of molecules into account coincides with the predictions of a linear theory. In contrast, there are substantial deviations between simulations and predictions of the linear theory in error in signal propagation in an enzymatic push-pull network for a certain range of parameters. Inclusion of second-order perturbative corrections shows that differences between simulations and theoretical predictions are minimized. Our study establishes that a field theoretic formulation of stochastic biological signaling offers a systematic way to understand error propagation in

  8. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  9. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  10. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  11. Information dynamics algorithm for detecting communities in networks

    Science.gov (United States)

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  12. Information spread in networks: Games, optimal control, and stabilization

    Science.gov (United States)

    Khanafer, Ali

    This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack

  13. Processing of chromatic information in a deep convolutional neural network.

    Science.gov (United States)

    Flachot, Alban; Gegenfurtner, Karl R

    2018-04-01

    Deep convolutional neural networks are a class of machine-learning algorithms capable of solving non-trivial tasks, such as object recognition, with human-like performance. Little is known about the exact computations that deep neural networks learn, and to what extent these computations are similar to the ones performed by the primate brain. Here, we investigate how color information is processed in the different layers of the AlexNet deep neural network, originally trained on object classification of over 1.2M images of objects in their natural contexts. We found that the color-responsive units in the first layer of AlexNet learned linear features and were broadly tuned to two directions in color space, analogously to what is known of color responsive cells in the primate thalamus. Moreover, these directions are decorrelated and lead to statistically efficient representations, similar to the cardinal directions of the second-stage color mechanisms in primates. We also found, in analogy to the early stages of the primate visual system, that chromatic and achromatic information were segregated in the early layers of the network. Units in the higher layers of AlexNet exhibit on average a lower responsivity for color than units at earlier stages.

  14. Visual sensory networks and effective information transfer in animal groups.

    Science.gov (United States)

    Strandburg-Peshkin, Ariana; Twomey, Colin R; Bode, Nikolai W F; Kao, Albert B; Katz, Yael; Ioannou, Christos C; Rosenthal, Sara B; Torney, Colin J; Wu, Hai Shan; Levin, Simon A; Couzin, Iain D

    2013-09-09

    Social transmission of information is vital for many group-living animals, allowing coordination of motion and effective response to complex environments. Revealing the interaction networks underlying information flow within these groups is a central challenge. Previous work has modeled interactions between individuals based directly on their relative spatial positions: each individual is considered to interact with all neighbors within a fixed distance (metric range), a fixed number of nearest neighbors (topological range), a 'shell' of near neighbors (Voronoi range), or some combination (Figure 1A). However, conclusive evidence to support these assumptions is lacking. Here, we employ a novel approach that considers individual movement decisions to be based explicitly on the sensory information available to the organism. In other words, we consider that while spatial relations do inform interactions between individuals, they do so indirectly, through individuals' detection of sensory cues. We reconstruct computationally the visual field of each individual throughout experiments designed to investigate information propagation within fish schools (golden shiners, Notemigonus crysoleucas). Explicitly considering visual sensing allows us to more accurately predict the propagation of behavioral change in these groups during leadership events. Furthermore, we find that structural properties of visual interaction networks differ markedly from those of metric and topological counterparts, suggesting that previous assumptions may not appropriately reflect information flow in animal groups. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Information processing by networks of quantum decision makers

    Science.gov (United States)

    Yukalov, V. I.; Yukalova, E. P.; Sornette, D.

    2018-02-01

    We suggest a model of a multi-agent society of decision makers taking decisions being based on two criteria, one is the utility of the prospects and the other is the attractiveness of the considered prospects. The model is the generalization of quantum decision theory, developed earlier for single decision makers realizing one-step decisions, in two principal aspects. First, several decision makers are considered simultaneously, who interact with each other through information exchange. Second, a multistep procedure is treated, when the agents exchange information many times. Several decision makers exchanging information and forming their judgment, using quantum rules, form a kind of a quantum information network, where collective decisions develop in time as a result of information exchange. In addition to characterizing collective decisions that arise in human societies, such networks can describe dynamical processes occurring in artificial quantum intelligence composed of several parts or in a cluster of quantum computers. The practical usage of the theory is illustrated on the dynamic disjunction effect for which three quantitative predictions are made: (i) the probabilistic behavior of decision makers at the initial stage of the process is described; (ii) the decrease of the difference between the initial prospect probabilities and the related utility factors is proved; (iii) the existence of a common consensus after multiple exchange of information is predicted. The predicted numerical values are in very good agreement with empirical data.

  16. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  17. The dynamic consequences of cooperation and competition in small-world networks.

    Directory of Open Access Journals (Sweden)

    Iván Y Fernández-Rosales

    Full Text Available We present a study of the social dynamics among cooperative and competitive actors interacting on a complex network that has a small-world topology. In this model, the state of each actor depends on its previous state in time, its inertia to change, and the influence of its neighboring actors. Using numerical simulations, we determine how the distribution of final states of the actors and measures of the distances between the values of the actors at local and global levels, depend on the number of cooperative to competitive actors and the connectivity of the actors in the network. We find that similar numbers of cooperative and competitive actors yield the lowest values for the local and global measures of the distances between the values of the actors. On the other hand, when the number of either cooperative or competitive actors dominate the system, then the divergence is largest between the values of the actors. Our findings make new testable predictions on how the dynamics of a conflict depends on the strategies chosen by groups of actors and also have implications for the evolution of behaviors.

  18. Modeling information diffusion in time-varying community networks

    Science.gov (United States)

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  19. A distributed name resolution system in information centric networks

    Science.gov (United States)

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  20. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  1. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  2. [Linking: relationships between health professionals in the informal health networks].

    Science.gov (United States)

    Sarradon-Eck, A; Vega, A; Faure, M; Humbert-Gaudart, A; Lustman, M

    2008-07-01

    During the last years, the french health system has been developing formal health networks. So, it was necessary to study informal health networks as networks. More precisely, we studied the nature of relationships between various stakeholders around general practionners wich are commonly considering as the stakeholder of the health system private sector. Fieldwork (ethnography based on direct observations and interviews) was conducted between October 2002 and april 2004, in the South-East of France. Ten monographs of general practioner's offices were achieved in a rural area; then, we achieved fieldwork of the informal health networks identified. There is a cultural frame wich is common to all private professionals. This frame includes a triple ideal (teamwork built up the hospital model, independance, and an relational approach with patients). This frame does not square with the real practices. In fact, regulation mechanisms preserve the balance of relashionships between professionnal groups, by restricting/promoting exchanges and complex alliance strategies. These mecanisms include: (1) a few professionnal's rule as disponibility (to the patients and to the professionnals), as communication about patient, as patient's reference, as obligation to communicate between professionals; (2) some constraints such as territory superposition and competition with other professional groups; (3) some needs for: rileiving (of emotions and worries connected to work), sharing (decisions, responsabilities), of delegation (medical treatment, practices), protection against social and legal risk through the creation of trust relationships. These trust relationships are based on several logics (affinity, solidarity, similarity). The study shows the major place of the patient who is often the main organizer of his network, and even though he makes an important structuring work between medical staff, and an information transfer (on his diagnosis, on his treatment, and professionals

  3. Consequences of Strategic Choices within an e-Procurement Implementation Process -From an Actor Network Perspective

    DEFF Research Database (Denmark)

    Krag, Lotte; Thomsen, Mette; Jensen, Tina Blegind

    2004-01-01

    have to be made in order to ensure the success of the implementation in terms of the technical aspects, the business model and the organisation. This article deals with three strategic choices made by the management in the case company, a large European medical company, regarding the process...... of implementing an e-Procurement system - more specifically, an Enterprise Buyer Professional (EBP) module in SAP R/3 for commercial purchasing. These strategic choices are (1) outsourcing the electronic catalogue of the EBP system to an electronic market place, (2) constituting a change management group...... for the implementation, and (3) allying with an external partner in the implementation process. The strategic choices are the basis of a qualitative analysis using an Actor Network Theory (ANT) perspective where focus is on three aspects: Delegation, black box and enrolment. In this regard, strategies for delegating...

  4. DOE waste information network: Data management and communications

    International Nuclear Information System (INIS)

    Fore, C.S.

    1986-01-01

    The U.S. Department of Energy's Waste Information Network (WIN) is an integral part of DOE's Hazardous Waste Remedial Actions Program. WIN has played an active role in the national program's mission to identify the magnitude and nature of existing DOE hazardous chemical and mixed radioactive waste streams and inventories and to provide a mechanism for disseminating pertinent information on technology activities. The information systems activity is structured into three key areas: data base development, data analysis, and data dissemination. As a result of this effort, several key data bases have been developed. Data dissemination is important to the use and management of the diversity of information and communication features developed by the program

  5. Controllable quantum information network with a superconducting system

    International Nuclear Information System (INIS)

    Zhang, Feng-yang; Liu, Bao; Chen, Zi-hong; Wu, Song-lin; Song, He-shan

    2014-01-01

    We propose a controllable and scalable architecture for quantum information processing using a superconducting system network, which is composed of current-biased Josephson junctions (CBJJs) as tunable couplers between the two superconducting transmission line resonators (TLRs), each coupling to multiple superconducting qubits (SQs). We explicitly demonstrate that the entangled state, the phase gate, and the information transfer between any two selected SQs can be implemented, respectively. Lastly, numerical simulation shows that our scheme is robust against the decoherence of the system. -- Highlights: •An architecture for quantum information processing is proposed. •The quantum information transfer between any two selected SQs is implemented. •This proposal is robust against the decoherence of the system. •This architecture can be fabricated on a chip down to the micrometer scale

  6. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  7. The Central American Network for Disaster and Health Information.

    Science.gov (United States)

    Arnesen, Stacey J; Cid, Victor H; Scott, John C; Perez, Ricardo; Zervaas, Dave

    2007-07-01

    This paper describes an international outreach program to support rebuilding Central America's health information infrastructure after several natural disasters in the region, including Hurricane Mitch in 1998 and two major earthquakes in 2001. The National Library of Medicine joined forces with the Pan American Health Organization/World Health Organization, the United Nations International Strategy for Disaster Reduction, and the Regional Center of Disaster Information for Latin America and the Caribbean (CRID) to strengthen libraries and information centers in Central America and improve the availability of and access to health and disaster information in the region by developing the Central American Network for Disaster and Health Information (CANDHI). Through CRID, the program created ten disaster health information centers in medical libraries and disaster-related organizations in six countries. This project served as a catalyst for the modernization of several medical libraries in Central America. The resulting CANDHI provides much needed electronic access to public health "gray literature" on disasters, as well as access to numerous health information resources. CANDHI members assist their institutions and countries in a variety of disaster preparedness activities through collecting and disseminating information.

  8. An open, interoperable, and scalable prehospital information technology network architecture.

    Science.gov (United States)

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  9. [Problems encountered by hospital pharmacists with information systems: Analysis of exchanges within social networks].

    Science.gov (United States)

    Charpiat, B; Mille, F; Fombeur, P; Machon, J; Zawadzki, E; Bobay-Madic, A

    2018-05-21

    The development of information systems in French hospitals is mandatory. The aim of this work was to analyze the content of exchanges carried out within social networks, dealing with problems encountered with hospital pharmacies information systems. Messages exchanged via the mailing list of the Association pour le Digital et l'Information en Pharmacie and abstracts of communications presented at hospital pharmacists trade union congresses were analyzed. Those referring to information systems used in hospital pharmacies were selected. From March 2015 to June 2016, 122 e-mails sent by 80 pharmacists concerned information systems. From 2002 to 2016, 45 abstracts dealt with this topic. Problems most often addressed in these 167 documents were "parameterization and/or functionalities" (n=116), interfaces and complexity of the hospital information systems (n=52), relationship with health information technologies vendors and poor reactivity (n=32), additional workload (n=32), ergonomics (n=30), insufficient user training (n=22). These problems are interdependent, lead to errors and in order to mitigate their consequences, they compel pharmacy professionals to divert a significant amount of working hours to the detriment of pharmaceutical care and dispensing and preparing drugs. Hospital pharmacists are faced with many problems of insecurity and inefficiency generated by information systems. Researches are warranted to determine their cost, specify their deleterious effects on care and identify the safest information systems. Copyright © 2018 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  10. Experimental resource pulses influence social-network dynamics and the potential for information flow in tool-using crows.

    Science.gov (United States)

    St Clair, James J H; Burns, Zackory T; Bettaney, Elaine M; Morrissey, Michael B; Otis, Brian; Ryder, Thomas B; Fleischer, Robert C; James, Richard; Rutz, Christian

    2015-11-03

    Social-network dynamics have profound consequences for biological processes such as information flow, but are notoriously difficult to measure in the wild. We used novel transceiver technology to chart association patterns across 19 days in a wild population of the New Caledonian crow--a tool-using species that may socially learn, and culturally accumulate, tool-related information. To examine the causes and consequences of changing network topology, we manipulated the environmental availability of the crows' preferred tool-extracted prey, and simulated, in silico, the diffusion of information across field-recorded time-ordered networks. Here we show that network structure responds quickly to environmental change and that novel information can potentially spread rapidly within multi-family communities, especially when tool-use opportunities are plentiful. At the same time, we report surprisingly limited social contact between neighbouring crow communities. Such scale dependence in information-flow dynamics is likely to influence the evolution and maintenance of material cultures.

  11. Integrated multimedia information system on interactive CATV network

    Science.gov (United States)

    Lee, Meng-Huang; Chang, Shin-Hung

    1998-10-01

    In the current CATV system architectures, they provide one- way delivery of a common menu of entertainment to all the homes through the cable network. Through the technologies evolution, the interactive services (or two-way services) can be provided in the cable TV systems. They can supply customers with individualized programming and support real- time two-way communications. With a view to the service type changed from the one-way delivery systems to the two-way interactive systems, `on demand services' is a distinct feature of multimedia systems. In this paper, we present our work of building up an integrated multimedia system on interactive CATV network in Shih Chien University. Besides providing the traditional analog TV programming from the cable operator, we filter some channels to reserve them as our campus information channels. In addition to the analog broadcasting channel, the system also provides the interactive digital multimedia services, e.g. Video-On- Demand (VOD), Virtual Reality, BBS, World-Wide-Web, and Internet Radio Station. These two kinds of services are integrated in a CATV network by the separation of frequency allocation for the analog broadcasting service and the digital interactive services. Our ongoing work is to port our previous work of building up a VOD system conformed to DAVIC standard (for inter-operability concern) on Ethernet network into the current system.

  12. Inference of financial networks using the normalised mutual information rate

    Science.gov (United States)

    2018-01-01

    In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics. PMID:29420644

  13. Inference of financial networks using the normalised mutual information rate.

    Science.gov (United States)

    Goh, Yong Kheng; Hasim, Haslifah M; Antonopoulos, Chris G

    2018-01-01

    In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics.

  14. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  15. Automatic physical inference with information maximizing neural networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    Compressing large data sets to a manageable number of summaries that are informative about the underlying parameters vastly simplifies both frequentist and Bayesian inference. When only simulations are available, these summaries are typically chosen heuristically, so they may inadvertently miss important information. We introduce a simulation-based machine learning technique that trains artificial neural networks to find nonlinear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). In test cases where the posterior can be derived exactly, likelihood-free inference based on automatically derived IMNN summaries produces nearly exact posteriors, showing that these summaries are good approximations to sufficient statistics. In a series of numerical examples of increasing complexity and astrophysical relevance we show that IMNNs are robustly capable of automatically finding optimal, nonlinear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima. We anticipate that the automatic physical inference method described in this paper will be essential to obtain both accurate and precise cosmological parameter estimates from complex and large astronomical data sets, including those from LSST and Euclid.

  16. Information spreading in Delay Tolerant Networks based on nodes' behaviors

    Science.gov (United States)

    Wu, Yahui; Deng, Su; Huang, Hongbin

    2014-07-01

    Information spreading in DTNs (Delay Tolerant Networks) adopts a store-carry-forward method, and nodes receive the message from others directly. However, it is hard to judge whether the information is safe in this communication mode. In this case, a node may observe other nodes' behaviors. At present, there is no theoretical model to describe the varying rule of the nodes' trusting level. In addition, due to the uncertainty of the connectivity in DTN, a node is hard to get the global state of the network. Therefore, a rational model about the node's trusting level should be a function of the node's own observing result. For example, if a node finds k nodes carrying a message, it may trust the information with probability p(k). This paper does not explore the real distribution of p(k), but instead presents a unifying theoretical framework to evaluate the performance of the information spreading in above case. This framework is an extension of the traditional SI (susceptible-infected) model, and is useful when p(k) conforms to any distribution. Simulations based on both synthetic and real motion traces show the accuracy of the framework. Finally, we explore the impact of the nodes' behaviors based on certain special distributions through numerical results.

  17. Detection of information security violations with the aid of information and telecommunication networks monitoring

    International Nuclear Information System (INIS)

    Kovalev, D.O.

    2011-01-01

    Author has studied the methods and algorithms used in the monitoring of information security (IS), the distribution law of the number of IS messages, has developed a method and an algorithm for detecting IS violations in the message flow, a technique for generating the consolidated evaluation of results of monitoring the data and telecommunications network information security. Practical recommendations for improving the IS monitoring have been elaborated [ru

  18. Creating a virtual network of communication of information in view on the regime of information

    OpenAIRE

    Luiz Antonio Dias Leal; Isa Freire; Rosali Fernandez de Souza

    2013-01-01

    Presents the results of research that uses the concept of 'information system' Gonzalez Gomez to identify elements and actors within the domain of a virtual network of information communication. The research was conducted under the Program Good Agricultural Practices - Beef Cattle at the Brazilian Agricultural Research Corporation - EMBRAPA, which aims to make systems for beef cattle production more profitable and competitive, ensuring the supply of safe food, from of sustainable production s...

  19. Vaccine Hesitancy and Online Information: The Influence of Digital Networks.

    Science.gov (United States)

    Getman, Rebekah; Helmi, Mohammad; Roberts, Hal; Yansane, Alfa; Cutler, David; Seymour, Brittany

    2017-12-01

    This article analyzes the digital childhood vaccination information network for vaccine-hesitant parents. The goal of this study was to explore the structure and influence of vaccine-hesitant content online by generating a database and network analysis of vaccine-relevant content. We used Media Cloud, a searchable big-data platform of over 550 million stories from 50,000 media sources, for quantitative and qualitative study of an online media sample based on keyword selection. We generated a hyperlink network map and measured indegree centrality of the sources and vaccine sentiment for a random sample of 450 stories. 28,122 publications from 4,817 sources met inclusion criteria. Clustered communities formed based on shared hyperlinks; communities tended to link within, not among, each other. The plurality of information was provaccine (46.44%, 95% confidence interval [39.86%, 53.20%]). The most influential sources were in the health community (National Institutes of Health, Centers for Disease Control and Prevention) or mainstream media ( New York Times); some user-generated sources also had strong influence and were provaccine (Wikipedia). The vaccine-hesitant community rarely interacted with provaccine content and simultaneously used primary provaccine content within vaccine-hesitant narratives. The sentiment of the overall conversation was consistent with scientific evidence. These findings demonstrate an online environment where scientific evidence online drives vaccine information outside of the vaccine-hesitant community but is also prominently used and misused within the robust vaccine-hesitant community. Future communication efforts should take current context into account; more information may not prevent vaccine hesitancy.

  20. Geosciences Information Network (GIN): A modular, distributed, interoperable data network for the geosciences

    Science.gov (United States)

    Allison, M.; Gundersen, L. C.; Richard, S. M.; Dickinson, T. L.

    2008-12-01

    A coalition of the state geological surveys (AASG), the U.S. Geological Survey (USGS), and partners will receive NSF funding over 3 years under the INTEROP solicitation to start building the Geoscience Information Network (www.geoinformatics.info/gin) a distributed, interoperable data network. The GIN project will develop standardized services to link existing and in-progress components using a few standards and protocols, and work with data providers to implement these services. The key components of this network are 1) catalog system(s) for data discovery; 2) service definitions for interfaces for searching catalogs and accessing resources; 3) shared interchange formats to encode information for transmission (e.g. various XML markup languages); 4) data providers that publish information using standardized services defined by the network; and 5) client applications adapted to use information resources provided by the network. The GIN will integrate and use catalog resources that currently exist or are in development. We are working with the USGS National Geologic Map Database's existing map catalog, with the USGS National Geological and Geophysical Data Preservation Program, which is developing a metadata catalog (National Digital Catalog) for geoscience information resource discovery, and with the GEON catalog. Existing interchange formats will be used, such as GeoSciML, ChemML, and Open Geospatial Consortium sensor, observation and measurement MLs. Client application development will be fostered by collaboration with industry and academic partners. The GIN project will focus on the remaining aspects of the system -- service definitions and assistance to data providers to implement the services and bring content online - and on system integration of the modules. Initial formal collaborators include the OneGeology-Europe consortium of 27 nations that is building a comparable network under the EU INSPIRE initiative, GEON, Earthchem, and GIS software company ESRI

  1. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  2. Phylogenetically informed logic relationships improve detection of biological network organization

    Science.gov (United States)

    2011-01-01

    Background A "phylogenetic profile" refers to the presence or absence of a gene across a set of organisms, and it has been proven valuable for understanding gene functional relationships and network organization. Despite this success, few studies have attempted to search beyond just pairwise relationships among genes. Here we search for logic relationships involving three genes, and explore its potential application in gene network analyses. Results Taking advantage of a phylogenetic matrix constructed from the large orthologs database Roundup, we invented a method to create balanced profiles for individual triplets of genes that guarantee equal weight on the different phylogenetic scenarios of coevolution between genes. When we applied this idea to LAPP, the method to search for logic triplets of genes, the balanced profiles resulted in significant performance improvement and the discovery of hundreds of thousands more putative triplets than unadjusted profiles. We found that logic triplets detected biological network organization and identified key proteins and their functions, ranging from neighbouring proteins in local pathways, to well separated proteins in the whole pathway, and to the interactions among different pathways at the system level. Finally, our case study suggested that the directionality in a logic relationship and the profile of a triplet could disclose the connectivity between the triplet and surrounding networks. Conclusion Balanced profiles are superior to the raw profiles employed by traditional methods of phylogenetic profiling in searching for high order gene sets. Gene triplets can provide valuable information in detection of biological network organization and identification of key genes at different levels of cellular interaction. PMID:22172058

  3. Generation of a superposition of odd photon number states for quantum information networks

    DEFF Research Database (Denmark)

    Neergaard-Nielsen, Jonas Schou; Nielsen, B.; Hettich, C.

    2006-01-01

    Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August......Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August...

  4. Why common carrier and network neutrality principles apply to the Nationwide Health Information Network (NWHIN).

    Science.gov (United States)

    Gaynor, Mark; Lenert, Leslie; Wilson, Kristin D; Bradner, Scott

    2014-01-01

    The Office of the National Coordinator will be defining the architecture of the Nationwide Health Information Network (NWHIN) together with the proposed HealtheWay public/private partnership as a development and funding strategy. There are a number of open questions--for example, what is the best way to realize the benefits of health information exchange? How valuable are regional health information organizations in comparison with a more direct approach? What is the role of the carriers in delivering this service? The NWHIN is to exist for the public good, and thus shares many traits of the common law notion of 'common carriage' or 'public calling,' the modern term for which is network neutrality. Recent policy debates in Congress and resulting potential regulation have implications for key stakeholders within healthcare that use or provide services, and for those who exchange information. To date, there has been little policy debate or discussion about the implications of a neutral NWHIN. This paper frames the discussion for future policy debate in healthcare by providing a brief education and summary of the modern version of common carriage, of the key stakeholder positions in healthcare, and of the potential implications of the network neutrality debate within healthcare.

  5. Money makes you reveal more: consequences of monetary cues on preferential disclosure of personal information.

    Science.gov (United States)

    Mukherjee, Sumitava; Manjaly, Jaison A; Nargundkar, Maithilee

    2013-01-01

    With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  6. A FUTURE APPROACHES, SOCIAL ORGANIZATION AND THEIR ECONOMIC CONSEQUENCES OF THE INFORMATIONAL SOCIETY – KNOWLEDGE SOCIETY

    Directory of Open Access Journals (Sweden)

    NICULAE DAVIDESCU

    2011-04-01

    Full Text Available The paper is the result of scientific study under doctoral thesis “Information Society and its Economic Effects” and contains seven sections: -section 1: “Globalization, Development and Information Society”; -section 2: “The Impact of the “Digital Divide” and “Digital Inequality” Phenomena” ; -section 3: “Information Society –Knowledge Society, Definition, Objectives and Strategies” ; -section 4: “Social Structures and New Life Patterns in Information Society” ; -section 5: “Virtual Organizations, Activities and Businesses” ; -section 6: “Strategies, Programmes and Courses of the Information Society Approach” ; -section 7: “The Economic Effects Foreseeable through the Implementation of Information Society–Knowledge Society”.

  7. Under the influence of Facebook? Excess use of social networking sites and drinking motives, consequences, and attitudes in college students.

    Science.gov (United States)

    Hormes, Julia M

    2016-03-01

    Background and aims Excessive use of social networking sites (SNS) has recently been conceptualized as a behavioral addiction (i.e., "disordered SNS use") using key criteria for the diagnosis of substance dependence and shown to be associated with a variety of impairments in psychosocial functioning, including an increased risk of problem drinking. This study sought to characterize associations between "disordered SNS use" and attitudes towards alcohol, drinking motives, and adverse consequences resulting from alcohol use in young adults. Methods Undergraduate students (n = 537, 64.0% female, mean age = 19.63 years, SD = 4.24) reported on their use of SNSs and completed the Alcohol Use Disorders Identification Test, Temptation and Restraint Inventory, Approach and Avoidance of Alcohol and Drinking Motives Questionnaires, and Drinker Inventory of Consequences. Results Respondents meeting previously established criteria for "disordered SNS use" were significantly more likely to use alcohol to cope with negative affect and to conform to perceived social norms, reported significantly more conflicting (i.e., simultaneous positive and negative) attitudes towards alcohol, and had experienced significantly more, and more frequent adverse consequences from drinking in their inter- and intrapersonal, physical, and social functioning, compared to individuals without problems related to SNS use. Discussion and conclusions Findings add to an emerging body of literature suggesting a link between excess or maladaptive SNS use and problems related to alcohol in young adults and point to emotion dysregulation and coping motives as potential shared risk factors for substance and behavioral addictions in this demographic.

  8. Under the influence of Facebook? Excess use of social networking sites and drinking motives, consequences, and attitudes in college students

    Science.gov (United States)

    Hormes, Julia M.

    2016-01-01

    Background and aims Excessive use of social networking sites (SNS) has recently been conceptualized as a behavioral addiction (i.e., “disordered SNS use”) using key criteria for the diagnosis of substance dependence and shown to be associated with a variety of impairments in psychosocial functioning, including an increased risk of problem drinking. This study sought to characterize associations between “disordered SNS use” and attitudes towards alcohol, drinking motives, and adverse consequences resulting from alcohol use in young adults. Methods Undergraduate students (n = 537, 64.0% female, mean age = 19.63 years, SD = 4.24) reported on their use of SNSs and completed the Alcohol Use Disorders Identification Test, Temptation and Restraint Inventory, Approach and Avoidance of Alcohol and Drinking Motives Questionnaires, and Drinker Inventory of Consequences. Results Respondents meeting previously established criteria for “disordered SNS use” were significantly more likely to use alcohol to cope with negative affect and to conform to perceived social norms, reported significantly more conflicting (i.e., simultaneous positive and negative) attitudes towards alcohol, and had experienced significantly more, and more frequent adverse consequences from drinking in their inter- and intrapersonal, physical, and social functioning, compared to individuals without problems related to SNS use. Discussion and conclusions Findings add to an emerging body of literature suggesting a link between excess or maladaptive SNS use and problems related to alcohol in young adults and point to emotion dysregulation and coping motives as potential shared risk factors for substance and behavioral addictions in this demographic. PMID:28092186

  9. Global information network on chemicals (GINC) and its Asian component

    International Nuclear Information System (INIS)

    Kaminuma, Tsuguchika; Nakata, Kotoko

    2003-01-01

    The Global Information Network on Chemicals (GINC) is an effort to build a global information network that links international, national, and other organizations working for the safe management of chemicals in order to exchange information and improve communications. The project was originally proposed in 1993 by one of the authors then at the National Institute of Health Sciences (NIHS) of Japan to the International Program on Chemical Safety (IPCS), which is a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP). The base support system was first implemented at NIHS using the Internet/World Wide Web (WWW) technology in 1995. The project was then endorsed by the Intergovernmental Forum on Chemical Safety (IFCS) and was adopted by the Inter-Organization Program for the Sound Management of Chemicals (IOMC). However, the base system (http://www.nihs.go.jp/GINC/index.html) has been developed and maintained solely by the NIHS group under the support of the Ministry of Health and Welfare (MHW), Japan. Asia, particularly East Asia and the Pacific region, was chosen as the feasibility study region for this project. During the period from December 1994 to July 2002, NIHS hosted eight meetings on this project held in Tokyo

  10. Improving Evaluation to Address the Unintended Consequences of Health Information Technology:

    Science.gov (United States)

    Ammenwerth, E.; Hyppönen, H.; de Keizer, N.; Nykänen, P.; Rigby, M.; Scott, P.; Talmon, J.; Georgiou, A.

    2016-01-01

    Summary Background and objectives With growing use of IT by healthcare professionals and patients, the opportunity for any unintended effects of technology to disrupt care health processes and outcomes is intensified. The objectives of this position paper by the IMIA Working Group (WG) on Technology Assessment and Quality Development are to highlight how our ongoing initiatives to enhance evaluation are also addressing the unintended consequences of health IT. Methods Review of WG initiatives Results We argue that an evidence-based approach underpinned by rigorous evaluation is fundamental to the safe and effective use of IT, and for detecting and addressing its unintended consequences in a timely manner. We provide an overview of our ongoing initiatives to strengthen study design, execution and reporting by using evaluation frameworks and guidelines which can enable better characterization and monitoring of unintended consequences, including the Good Evaluation Practice Guideline in Health Informatics (GEP-HI) and the Statement on Reporting of Evaluation Studies in Health Informatics (STARE-HI). Indicators to benchmark the adoption and impact of IT can similarly be used to monitor unintended effects on healthcare structures, processes and outcome. We have also developed EvalDB, a web-based database of evaluation studies to promulgate evidence about unintended effects and are developing the content for courses to improve training in health IT evaluation. Conclusion Evaluation is an essential ingredient for the effective use of IT to improve healthcare quality and patient safety. WG resources and skills development initiatives can facilitate a proactive and evidence-based approach to detecting and addressing the unintended effects of health IT. PMID:27830232

  11. Changes in the value chain of scientific information: economic consequences for academic institutions

    NARCIS (Netherlands)

    Roosendaal, Hans E.; Huibers, Theo W.C.; Geurts, Petrus A.T.M.; van der Vet, P.E.

    2003-01-01

    The economic impact of information and communication technology (ICT) on the academic library and on the academic institution are discussed in terms of changes in the value chain of scientific information induced by the use of ICT. Argues that ICT is a very strong engine for change as it has the

  12. Consequences of Converting Graded to Action Potentials upon Neural Information Coding and Energy Efficiency

    Science.gov (United States)

    Sengupta, Biswa; Laughlin, Simon Barry; Niven, Jeremy Edward

    2014-01-01

    Information is encoded in neural circuits using both graded and action potentials, converting between them within single neurons and successive processing layers. This conversion is accompanied by information loss and a drop in energy efficiency. We investigate the biophysical causes of this loss of information and efficiency by comparing spiking neuron models, containing stochastic voltage-gated Na+ and K+ channels, with generator potential and graded potential models lacking voltage-gated Na+ channels. We identify three causes of information loss in the generator potential that are the by-product of action potential generation: (1) the voltage-gated Na+ channels necessary for action potential generation increase intrinsic noise and (2) introduce non-linearities, and (3) the finite duration of the action potential creates a ‘footprint’ in the generator potential that obscures incoming signals. These three processes reduce information rates by ∼50% in generator potentials, to ∼3 times that of spike trains. Both generator potentials and graded potentials consume almost an order of magnitude less energy per second than spike trains. Because of the lower information rates of generator potentials they are substantially less energy efficient than graded potentials. However, both are an order of magnitude more efficient than spike trains due to the higher energy costs and low information content of spikes, emphasizing that there is a two-fold cost of converting analogue to digital; information loss and cost inflation. PMID:24465197

  13. Scheduling Data Access in Smart Grid Networks Utilizing Context Information

    DEFF Research Database (Denmark)

    Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein

    2014-01-01

    Current electrical grid is facing increased penetration of intermittent energy resources, in particular wind and solar energy. Fast variability of the power supply due to renewable energy resources can be balanced out using different energy storage systems or shifting the loads. Efficiently...... managing this fast flexibility requires two-way data exchange between a controller and sensors/meters via communication networks. In this paper we investigated scheduling of data collection utilizing meta-data from sensors that are describing dynamics of information. We show the applicability...

  14. Instrumentation for Scientific Computing in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics.

    Science.gov (United States)

    1987-10-01

    include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen

  15. [Digitalization of radiological imaging information and consequences for patient care in the hospital ].

    Science.gov (United States)

    den Heeten, G J; Barneveld Binkhuysen, F H

    2001-08-25

    Determining the rate at which radiology must be digitalised has been a controversial issue for many years. Much radiological information is still obtained from the film-screen combination (X-rays) with all of its known inherent restrictions. The importance of imaging information in the healthcare process continues to increase for both radiologists and referring physicians, and the ongoing developments in information technology means that it is possible to integrate imaging information and electronic patient files. The healthcare process can only become more effective and efficient when the appropriate information is in the right place at the right time, something that conventional methods, using photos that need to be physically moved, can scarcely satisfy. There is also a desire for integration with information obtained from nuclear medicine, pathology and endoscopy, and eventually of all stand-alone data systems with relevance for the individually oriented hospital healthcare. The transition from a conventional to a digital process is complex; it is accompanied by the transition from a data-oriented to a process-oriented system. Many years have already been invested in the integration of information systems and the development of digital systems within radiology, the current performance of which is such that many hospitals are considering the digitalisation process or are already implementing parts of it.

  16. Nuclear disasters and their consequences. An information brochure for critical citizens. Atomkatastrophen und ihre Folgen. Eine Informationshilfe fuer kritische Buerger

    Energy Technology Data Exchange (ETDEWEB)

    Bastian, T

    1986-01-01

    The book is intended to serve as a source of information and a line of orientation for all people afraid of or angry about the consequences of the Chernobyl disaster. The author describes the effects of nuclear disasters that might happen as a result of military or 'peaceful' application of nuclear energy; he explains the situation people will have to cope with, gives advice on protective means and methods and topical information with reference to institutions or authorities where assistance might be available, also including a list of addresses and telephone numbers that has been issued by the governments after the Chernobyl accident.

  17. THE INFORMATIONAL SYSTEM FOR THE COLLABORATIVE LOGISTICS NETWORKS

    Directory of Open Access Journals (Sweden)

    NAIANA ŢARCĂ

    2011-01-01

    Full Text Available This paper presents an informatic system designed for collaborative logistic networks. The informational system is composed of structured informational modules that can easily be modified in order to facilitate the testing of the different algorithms that are being used. The informational system has two components, in the form of web application modules, which are connected to the user-specific modules (THE CLIENT WEB APPLICATION and to the server-specific modules (THE SERVER WEB APPLICATION, respectively. These two modules operate the transmission of information, the demands of the client and the offers generated by the server. The designed informational system has been tested in actual operating conditions, by co-optating ten EMSs from the Bihor county area. Some of the elements considered positive by the users, in the testing period, were: usability, the automatic assignment of a motor vehicle according to the characteristics of the product, the automatic route generation, the selection of goods according to the cluster “route” of the system.

  18. Money makes you reveal more: Consequences of monetary cues on preferential disclosure of personal information

    Directory of Open Access Journals (Sweden)

    Sumitava eMukherjee

    2013-11-01

    Full Text Available With continuous growth in information aggregation and dissemination, studies on privacy preferences are important to understand what makes people reveal information about them. Previous studies have demonstrated that short-term gains and possible monetary rewards make people risk disclosing information. Given the malleability of privacy preferences and the ubiquitous monetary cues in daily lives, we measured the contextual effect of reminding people about money on their privacy disclosure preferences. In experiment 1, we found that priming money increased willingness to disclose their personal information that could be shared with an online shopping website. Beyond stated willingness, experiment 2 tested whether priming money increases propensity for actually giving out personal information. Across both experiments, we found that priming money increases both the reported willingness and the actual disclosure of personal information. Our results imply that not only do short-term rewards make people trade-off personal security and privacy, but also mere exposure to money increases self-disclosure.

  19. Information Filtering via Heterogeneous Diffusion in Online Bipartite Networks.

    Science.gov (United States)

    Zhang, Fu-Guo; Zeng, An

    2015-01-01

    The rapid expansion of Internet brings us overwhelming online information, which is impossible for an individual to go through all of it. Therefore, recommender systems were created to help people dig through this abundance of information. In networks composed by users and objects, recommender algorithms based on diffusion have been proven to be one of the best performing methods. Previous works considered the diffusion process from user to object, and from object to user to be equivalent. We show in this work that it is not the case and we improve the quality of the recommendation by taking into account the asymmetrical nature of this process. We apply this idea to modify the state-of-the-art recommendation methods. The simulation results show that the new methods can outperform these existing methods in both recommendation accuracy and diversity. Finally, this modification is checked to be able to improve the recommendation in a realistic case.

  20. Construction of binary status information system using PC network

    International Nuclear Information System (INIS)

    Kurnianto, K.; Azriani, A.; Teddy, S.

    1998-01-01

    Binary status information system is a part of establishing reactor parameter with Pc that function as MPR-30 Process Computer. Binary Alarm system, consist of interface hardware and input binary module terminal, prepare the information that be displayed in text message and graphical form. Monitor software give facilities that binary status of RSG-GAS components can be monitored using computer network (LAN). This program consist of two part : reside in server computer and reside in user computer. Program in server acquire data from interface and than store it in data base (Access file). Than, user computer read this file and display it in Dynamic Process and Instrumentation Diagram. The number of user computer can be more then one because data base was designed for multi-user operation

  1. International earth science information network for global change decision making

    Energy Technology Data Exchange (ETDEWEB)

    Autrey-Hunley, C.; Kuhn, W.R.; Kasischke, E.; Trichel, M.T.; Coppola, R.

    1991-01-01

    Effective environmental decision making depends upon the ability to predict physical changes in the environment, societal responses to these changes, and how both the physical changes and societal responses will be affected by changes in government regulations, public perceptions and the environment. Technological advances in remote sensing have provided a wealth of earth science data necessary to study global change problems; the Earth Observatory System will provide an unprecedented data source in the late 1990's. The Consortium for an International Earth Science Information Network (CIESIN) will combine earth science data (both satellite and ground-based) with data on the social sciences (e.g., economics, demographics, public health) to support informed policy decisions and to transfer knowledge on global change and its causes to the public.

  2. Social network profiles as information sources for adolescents' offline relations.

    Science.gov (United States)

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-06-01

    This article presents the results of a study concerning the use of online profile pages by adolescents to know more about "offline" friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and acquaintances. First, the results indicate that a combination of passive uncertainty reduction (monitoring a target's profile) and interactive uncertainty reduction (communication through the target's profile) explains a considerable amount of variance in the level of uncertainty about both friends and acquaintances. More specifically, adolescents generally get to know much more about their acquaintances. Second, the results of online uncertainty reduction positively affect the degree of self-disclosure, which is imperative in building a solid friend relation. Further, we find that uncertainty reduction strategies positively mediate the effect of social anxiety on the level of certainty about friends. This implies that socially anxious teenagers benefit from SNSs by getting the conditions right to build a more solid relation with their friends. Hence, we conclude that SNSs play a substantial role in today's adolescents' everyday interpersonal communication.

  3. Value of information analysis for groundwater quality monitoring network design Case study: Eocene Aquifer, Palestine

    Science.gov (United States)

    Khader, A.; McKee, M.

    2010-12-01

    Value of information (VOI) analysis evaluates the benefit of collecting additional information to reduce or eliminate uncertainty in a specific decision-making context. It makes explicit any expected potential losses from errors in decision making due to uncertainty and identifies the “best” information collection strategy as one that leads to the greatest expected net benefit to the decision-maker. This study investigates the willingness to pay for groundwater quality monitoring in the Eocene Aquifer, Palestine, which is an unconfined aquifer located in the northern part of the West Bank. The aquifer is being used by 128,000 Palestinians to fulfill domestic and agricultural demands. The study takes into account the consequences of pollution and the options the decision maker might face. Since nitrate is the major pollutant in the aquifer, the consequences of nitrate pollution were analyzed, which mainly consists of the possibility of methemoglobinemia (blue baby syndrome). In this case, the value of monitoring was compared to the costs of treating for methemoglobinemia or the costs of other options like water treatment, using bottled water or importing water from outside the aquifer. And finally, an optimal monitoring network that takes into account the uncertainties in recharge (climate), aquifer properties (hydraulic conductivity), pollutant chemical reaction (decay factor), and the value of monitoring is designed by utilizing a sparse Bayesian modeling algorithm called a relevance vector machine.

  4. Information governance in dynamic networked business process management

    NARCIS (Netherlands)

    Rasouli, M.; Eshuis, H.; Grefen, P.W.P.J.; Trienekens, J.J.M.; Kusters, R.J.

    2016-01-01

    Competition in today’s globalized markets forces organizations to collaborate within dynamic business networks to provide mass-customized integrated solutions for customers. The collaboration within dynamic business networks necessitates forming dynamic networked business processes (DNBPs).

  5. Research on the method of measuring space information network capacity in communication service

    Directory of Open Access Journals (Sweden)

    Zhu Shichao

    2017-02-01

    Full Text Available Because of the large scale characteristic of space information network in terms of space and time and the increasing of its complexity,existing measuring methods of information transmission capacity have been unable to measure the existing and future space information networkeffectively.In this study,we firstly established a complex model of space information network,and measured the whole space information network capacity by means of analyzing data access capability to the network and data transmission capability within the network.At last,we verified the rationality of the proposed measuring method by using STK and Matlab simulation software for collaborative simulation.

  6. Mention effect in information diffusion on a micro-blogging network.

    Science.gov (United States)

    Bao, Peng; Shen, Hua-Wei; Huang, Junming; Chen, Haiqiang

    2018-01-01

    Micro-blogging systems have become one of the most important ways for information sharing. Network structure and users' interactions such as forwarding behaviors have aroused considerable research attention, while mention, as a key feature in micro-blogging platforms which can improve the visibility of a message and direct it to a particular user beyond the underlying social structure, is seldom studied in previous works. In this paper, we empirically study the mention effect in information diffusion, using the dataset from a population-scale social media website. We find that users with high number of followers would receive much more mentions than others. We further investigate the effect of mention in information diffusion by examining the response probability with respect to the number of mentions in a message and observe a saturation at around 5 mentions. Furthermore, we find that the response probability is the highest when a reciprocal followship exists between users, and one is more likely to receive a target user's response if they have similar social status. To illustrate these findings, we propose the response prediction task and formulate it as a binary classification problem. Extensive evaluation demonstrates the effectiveness of discovered factors. Our results have consequences for the understanding of human dynamics on the social network, and potential implications for viral marketing and public opinion monitoring.

  7. MODELING INFORMATION SYSTEM AVAILABILITY BY USING BAYESIAN BELIEF NETWORK APPROACH

    Directory of Open Access Journals (Sweden)

    Semir Ibrahimović

    2016-03-01

    Full Text Available Modern information systems are expected to be always-on by providing services to end-users, regardless of time and location. This is particularly important for organizations and industries where information systems support real-time operations and mission-critical applications that need to be available on 24  7  365 basis. Examples of such entities include process industries, telecommunications, healthcare, energy, banking, electronic commerce and a variety of cloud services. This article presents a modified Bayesian Belief Network model for predicting information system availability, introduced initially by Franke, U. and Johnson, P. (in article “Availability of enterprise IT systems – an expert based Bayesian model”. Software Quality Journal 20(2, 369-394, 2012 based on a thorough review of several dimensions of the information system availability, we proposed a modified set of determinants. The model is parameterized by using probability elicitation process with the participation of experts from the financial sector of Bosnia and Herzegovina. The model validation was performed using Monte Carlo simulation.

  8. The consequences of seniors seeking health information using the internet and other sources

    NARCIS (Netherlands)

    Medlock, Stephanie; Eslami, Saeid; Askari, Marjan; Sent, Danielle; de Rooij, Sophia E.; Abu-Hanna, Ameen

    2013-01-01

    The internet is viewed as an important channel for patient empowerment, enabling patients to feel more knowledgeable and take action to improve their own health. Internet use among seniors in the Netherlands is increasing, but it is not known if they also use it for health information, nor if

  9. Fuels planning: science synthesis and integration; environmental consequences fact sheet 01: Fire Effects Information System (FEIS)

    Science.gov (United States)

    Steve Sutherland

    2004-01-01

    The Fire Effects Information System (FEIS) provides accessible, up-to-date fire effects summaries, taken from current English-language literature, for almost 900 plant species, about 100 animal species, and 16 Kuchler plant communities found on the North American continent. This fact sheet discusses the development of FEIS and what is contained in the species summary....

  10. A review of the neural and behavioral consequences for unitizing emotional and neutral information

    Directory of Open Access Journals (Sweden)

    Brendan eMurray

    2013-05-01

    Full Text Available A special type of association, called a unitization, is formed when pieces of information are encoded as a single representation in memory (e.g., shirt and blue are encoded as a blue shirt; Graf & Schacter, 1989 and typically are later reactivated in memory as a single unit, allowing access to the features of multiple related stimuli at once (Bader et al., 2010; Diana et al., 2011. This review examines the neural processes supporting memory for unitizations and how the emotional content of the material may influence unitization. Although associative binding is typically reliant on hippocampal processes and supported by recollection, the first part of this review will present evidence to suggest that when two items are unitized into a single representation, memory for those bound items may be accomplished on the basis of familiarity and without reliance on the hippocampus. The second part of this review discusses how emotion may affect the processes that give rise to unitizations. Emotional information typically receives a mnemonic benefit over neutral information, but the literature is mixed on whether the presence of emotional information impedes or enhances the associative binding of neutral information (reviewed by Mather, 2007. It has been suggested that the way the emotional and neutral details are related together may be critical to whether the neutral details are enhanced or impeded (Mather, 2007; Mather & Sutherland, 2011. We focus on whether emotional arousal aides or inhibits the creation of a unitized representation, presenting preliminary data and future directions to test empirically the effects of forming and retrieving emotional and neutral unitizations.

  11. Investigations on an environmental technology transfer information network; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With developing countries (APEC countries) as the main objects, investigations were carried out to issue environmental technology transfer information that Japan has accumulated, and advance exchanges of technical information with persons related inside and outside Japan. As a result of the investigations, it was found that the environmental technology information that serves more effectively for the developing countries is the technical information that has been developed by repeating improvements, has provided actual results in work sites, and is actually used, rather than the state-of-art technologies. Based on this result, business entities having factories and operation centers located in Mie Prefecture and the city of Yokkaichi were asked to provide data for the actually used environmental technologies. Out of 51 items provided by 17 companies, nine items were selected to be used as prototype database materials for an information network. The objects of information sources will be expanded to a nationwide scale in the future to improve the contents of the database. Problems of handling information copyrights and technical know-hows were presented in the course of data collection, urging the necessity of due considerations on the matter. Necessity was indicated on maintenance and management of data base as well as its quantitative expansion. 1 ref., 4 figs.

  12. Risk factors of dependency of Chilean older adults and consequences on informal caregiving

    Directory of Open Access Journals (Sweden)

    María Consuelo CHEIX DIEGUEZ

    2015-12-01

    Full Text Available  Based on the 2009 National Survey of Elderly Dependency we characterize older people who are dependent in Chile, and we compute multivariate logistic regression models to assess the factors associated with dependency. In addition to age and the presence of diseases, there are other factors that are associated with increased prevalence of dependence, such as educational level, quality of family relationships and conducting activities such as physical exercise and reading. We also characterize and describe the level of well-being of the informal caregivers of the dependent persons. Stress informal caregiver is expressed both by an increase in depressive feelings and overload, as well as by a deterioration of physical health, who also tend to be women, older, low educational levels, intensifying further vulnerability context of this group.

  13. Smart network. The information nework in the smart grid; Smart Network. Das Informationsnetz im Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Horrmeyer, Bernd [Phoenix Contact GmbH und Co. KG, Blomberg (Germany). Industrielle Netzwerkverkabelung; Wissig, Claus [Phoenix Contact GmbH und Co. KG, Blomberg (Germany). Geraeteverbindungstechnik

    2012-07-01

    So far, the distribution of electricity was constructed unidirectional - from the generating power plant over the power distribution systems to the consumer. In the last decade, the utilization of renewable energies became popular. Thus the energy flows bi-directionally in the lines. Since the current has to be consumed at the moment of generation, the control becomes more difficult when bi-directional feeding. The techniques are demanding, and the number of devices for controlling and monitoring the of the distribution networks increases. The need for digital communication between the devices increases - the existing information networks in the energy sector are not dimensioned for this. With its bi-directional supply of energy, the smart grid requires a more frequent and faster communication between the devices. New cabling concepts according to IEC 61850 provide reliable and easy to maintain electrical and optical ethernet connections.

  14. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    Science.gov (United States)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  15. Information approach to the assessment of mechanisms and action consequences of ionizing radiation in low doses on a living organism

    International Nuclear Information System (INIS)

    Bulanova, K.Ya.; Kundas, S.P.; Lobanok, L.M.; Konoplya, E.F.

    2006-01-01

    In order to reveal the regularities of interaction of the organism with low-intense ionizing radiation, cybernetic approaches are needed. Living organisms are a self-regulating system of behavioural type. The complexity of the organization is determined by the hierarchy of a controlling system. Relations between systems are not of physico-chemical nature; they are based on control, i. e. on information processes. In the information system, all the weak influences (including ionizing radiation) are perceived in the form of a signal. Signal information of a natural radiation background is vitally important for organisms as in cardioversion type, as bioradiation, it is used for management initiation, i. e. self-regulation, self-development and so on. In the case of a superfluous surge of information at man-caused impacts of ionizing radiation (up to 10 Gy) the information system loses its ability to solve information tasks quickly and begins to experience the state of tension. Brought to a very tensed state it is able to lose its balance, its stability, i. e. to die. The signal-information perception of radiation explains the effects of its low dose, the non-linear character of dependence of biologic response of irradiated dose, hormesis phenomenon, apoptosis, remote consequences of irradiation, bystander effect and other postradiation effects. (authors)

  16. Networking of Bibliographical Information: Lessons learned for the Virtual Observatory

    Science.gov (United States)

    Genova, Françoise; Egret, Daniel

    Networking of bibliographic information is particularly remarkable in astronomy. On-line journals, the ADS bibliographic database, SIMBAD and NED are everyday tools for research, and provide easy navigation from one resource to another. Tables are published on line, in close collaboration with data centers. Recent new developments include the links between observatory archives and the ADS, as well as the large scale prototyping of object links between Astronomy and Astrophysics and SIMBAD, following those implemented a few years ago with New Astronomy and the International Bulletin of Variable stars . This networking has been made possible by close collaboration between the ADS, data centers such as the CDS and NED, and the journals, and this partnership being now extended to observatory archives. Simple, de facto exchange standards, like the bibcode to refer to a published paper, have been the key for building links and exchanging data. This partnership, in which practitioners from different disciplines agree to link their resources and to work together to define useful and usable standards, has produced a revolution in scientists' practice. It is an excellent model for the Virtual Observatory projects.

  17. Network Characteristics and Dynamics: Reciprocity, Competition and Information Dissemination

    Science.gov (United States)

    2015-09-01

    discrete entities or components of a system and edges represent dyadic relations be- tween components. Prominent examples are online social networks such as... community , and considerable work has been devoted to their study. One line of study focuses on the structural properties of networks themselves. Ex...networks [73, 74, 68, 76, 70, 80], communication networks [52], product co-purchasing networks [52], web graphs [52], Wikipedias [1], software call graphs

  18. Traffic networks as information systems a viability approach

    CERN Document Server

    Aubin, Jean-Pierre

    2017-01-01

    This authored monograph covers a viability to approach to traffic management by advising to vehicles circulated on the network the velocity they should follow for satisfying global traffic conditions;. It presents an investigation of three structural innovations: The objective is to broadcast at each instant and at each position the advised celerity to vehicles, which could be read by auxiliary speedometers or used by cruise control devices. Namely, 1. Construct regulation feedback providing at each time and position advised velocities (celerities) for minimizing congestion or other requirements. 2. Taking into account traffic constraints of different type, the first one being to remain on the roads, to stop at junctions, etc. 3. Use information provided by the probe vehicles equipped with GPS to the traffic regulator; 4. Use other global traffic measures of vehicles provided by different types of sensors; These results are based on convex analysis, intertemporal optimization and viability theory as mathemati...

  19. Unsupervised Neural Network Quantifies the Cost of Visual Information Processing.

    Science.gov (United States)

    Orbán, Levente L; Chartier, Sylvain

    2015-01-01

    Untrained, "flower-naïve" bumblebees display behavioural preferences when presented with visual properties such as colour, symmetry, spatial frequency and others. Two unsupervised neural networks were implemented to understand the extent to which these models capture elements of bumblebees' unlearned visual preferences towards flower-like visual properties. The computational models, which are variants of Independent Component Analysis and Feature-Extracting Bidirectional Associative Memory, use images of test-patterns that are identical to ones used in behavioural studies. Each model works by decomposing images of floral patterns into meaningful underlying factors. We reconstruct the original floral image using the components and compare the quality of the reconstructed image to the original image. Independent Component Analysis matches behavioural results substantially better across several visual properties. These results are interpreted to support a hypothesis that the temporal and energetic costs of information processing by pollinators served as a selective pressure on floral displays: flowers adapted to pollinators' cognitive constraints.

  20. Information System for the Goods Transport Service Network

    Directory of Open Access Journals (Sweden)

    Caj Holm

    2008-05-01

    Full Text Available Intermodal transport can reduce the load of the road infrastructure.Knowledge gives it the necessary competitiveness andhelps to control its costs. Fast reaction to changing conditions,opportunities and requirements gives remarkable advantage.Setting up integrated logistic chains using alternative transportmodes requires the trust and close interaction of a variety of actorsinvolved in managing the chain. Especially in the dynamicmobile environment, knowledge has so far not been effectivelyused. FREIGHTWISE tackles this complexity by developing aframework architecture anchored and validated in a range ofdemonstration cases involving commercial and public actors.This paper discusses the general FREIGHTWISE objectivesand its North-East Case, the Logistiikkainfo goods transportservice network information system to be implemented for theEstonian - Finnish transport chain.

  1. UPGRADE FOR HARDWARE/SOFTWARE SERVER AND NETWORK TOPOLOGY IN INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Oleksii O. Kaplun

    2011-02-01

    Full Text Available The network modernization, educational information systems software and hardware updates problem is actual in modern term of information technologies prompt development. There are server applications and network topology of Institute of Information Technology and Learning Tools of National Academy of Pedagogical Sciences of Ukraine analysis and their improvement methods expound in the article. The article materials represent modernization results implemented to increase network efficiency and reliability, decrease response time in Institute’s network information systems. The article gives diagrams of network topology before upgrading and after finish of optimization and upgrading processes.

  2. Learning Predictive Interactions Using Information Gain and Bayesian Network Scoring.

    Directory of Open Access Journals (Sweden)

    Xia Jiang

    Full Text Available The problems of correlation and classification are long-standing in the fields of statistics and machine learning, and techniques have been developed to address these problems. We are now in the era of high-dimensional data, which is data that can concern billions of variables. These data present new challenges. In particular, it is difficult to discover predictive variables, when each variable has little marginal effect. An example concerns Genome-wide Association Studies (GWAS datasets, which involve millions of single nucleotide polymorphism (SNPs, where some of the SNPs interact epistatically to affect disease status. Towards determining these interacting SNPs, researchers developed techniques that addressed this specific problem. However, the problem is more general, and so these techniques are applicable to other problems concerning interactions. A difficulty with many of these techniques is that they do not distinguish whether a learned interaction is actually an interaction or whether it involves several variables with strong marginal effects.We address this problem using information gain and Bayesian network scoring. First, we identify candidate interactions by determining whether together variables provide more information than they do separately. Then we use Bayesian network scoring to see if a candidate interaction really is a likely model. Our strategy is called MBS-IGain. Using 100 simulated datasets and a real GWAS Alzheimer's dataset, we investigated the performance of MBS-IGain.When analyzing the simulated datasets, MBS-IGain substantially out-performed nine previous methods at locating interacting predictors, and at identifying interactions exactly. When analyzing the real Alzheimer's dataset, we obtained new results and results that substantiated previous findings. We conclude that MBS-IGain is highly effective at finding interactions in high-dimensional datasets. This result is significant because we have increasingly

  3. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  4. Information theory and signal transduction systems: from molecular information processing to network inference.

    Science.gov (United States)

    Mc Mahon, Siobhan S; Sim, Aaron; Filippi, Sarah; Johnson, Robert; Liepe, Juliane; Smith, Dominic; Stumpf, Michael P H

    2014-11-01

    Sensing and responding to the environment are two essential functions that all biological organisms need to master for survival and successful reproduction. Developmental processes are marshalled by a diverse set of signalling and control systems, ranging from systems with simple chemical inputs and outputs to complex molecular and cellular networks with non-linear dynamics. Information theory provides a powerful and convenient framework in which such systems can be studied; but it also provides the means to reconstruct the structure and dynamics of molecular interaction networks underlying physiological and developmental processes. Here we supply a brief description of its basic concepts and introduce some useful tools for systems and developmental biologists. Along with a brief but thorough theoretical primer, we demonstrate the wide applicability and biological application-specific nuances by way of different illustrative vignettes. In particular, we focus on the characterisation of biological information processing efficiency, examining cell-fate decision making processes, gene regulatory network reconstruction, and efficient signal transduction experimental design. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. SDN-enabled dynamic WDM networks to address routing information inaccuracy

    CSIR Research Space (South Africa)

    Ravhuanzwo, Lusani

    2016-11-01

    Full Text Available Large dynamic wavelength-division multiplexed (WDM) networks based on the distributed control mechanism are susceptible to routing information inaccuracies. Factors such as non-negligible propagation delays, infrequent network state updates...

  6. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...

  7. Deep Fully Convolutional Networks for the Detection of Informal Settlements in VHR Images

    NARCIS (Netherlands)

    Persello, Claudio; Stein, Alfred

    2017-01-01

    This letter investigates fully convolutional networks (FCNs) for the detection of informal settlements in very high resolution (VHR) satellite images. Informal settlements or slums are proliferating in developing countries and their detection and classification provides vital information for

  8. Information report on electricity distribution network security and financing

    International Nuclear Information System (INIS)

    2011-01-01

    This report first outlines the degradation of electricity quality, and identifies the lack of investment as the main reason of the network weakness. It notices that the French network is much extended, and that the medium and low voltage networks need to be secured, and outlines that some legal measures have already been implemented to correct these problems. In its second part, the report comments the network manager's point of view, and denies his critics of the conceding authorities. It also discusses the network manager's investments, and finally formulates six propositions for a better future of the distribution network

  9. METHODS OF TEXT INFORMATION CLASSIFICATION ON THE BASIS OF ARTIFICIAL NEURAL AND SEMANTIC NETWORKS

    Directory of Open Access Journals (Sweden)

    L. V. Serebryanaya

    2016-01-01

    Full Text Available The article covers the use of perseptron, Hopfild artificial neural network and semantic network for classification of text information. Network training algorithms are studied. An algorithm of inverse mistake spreading for perceptron network and convergence algorithm for Hopfild network are implemented. On the basis of the offered models and algorithms automatic text classification software is developed and its operation results are evaluated.

  10. RANKING RELATIONS USING ANALOGIES IN BIOLOGICAL AND INFORMATION NETWORKS1

    Science.gov (United States)

    Silva, Ricardo; Heller, Katherine; Ghahramani, Zoubin; Airoldi, Edoardo M.

    2013-01-01

    Analogical reasoning depends fundamentally on the ability to learn and generalize about relations between objects. We develop an approach to relational learning which, given a set of pairs of objects S = {A(1) : B(1), A(2) : B(2), …, A(N) : B(N)}, measures how well other pairs A : B fit in with the set S. Our work addresses the following question: is the relation between objects A and B analogous to those relations found in S? Such questions are particularly relevant in information retrieval, where an investigator might want to search for analogous pairs of objects that match the query set of interest. There are many ways in which objects can be related, making the task of measuring analogies very challenging. Our approach combines a similarity measure on function spaces with Bayesian analysis to produce a ranking. It requires data containing features of the objects of interest and a link matrix specifying which relationships exist; no further attributes of such relationships are necessary. We illustrate the potential of our method on text analysis and information networks. An application on discovering functional interactions between pairs of proteins is discussed in detail, where we show that our approach can work in practice even if a small set of protein pairs is provided. PMID:24587838

  11. Hyperbolic mapping of complex networks based on community information

    Science.gov (United States)

    Wang, Zuxi; Li, Qingguang; Jin, Fengdong; Xiong, Wei; Wu, Yao

    2016-08-01

    To improve the hyperbolic mapping methods both in terms of accuracy and running time, a novel mapping method called Community and Hyperbolic Mapping (CHM) is proposed based on community information in this paper. Firstly, an index called Community Intimacy (CI) is presented to measure the adjacency relationship between the communities, based on which a community ordering algorithm is introduced. According to the proposed Community-Sector hypothesis, which supposes that most nodes of one community gather in a same sector in hyperbolic space, CHM maps the ordered communities into hyperbolic space, and then the angular coordinates of nodes are randomly initialized within the sector that they belong to. Therefore, all the network nodes are so far mapped to hyperbolic space, and then the initialized angular coordinates can be optimized by employing the information of all nodes, which can greatly improve the algorithm precision. By applying the proposed dual-layer angle sampling method in the optimization procedure, CHM reduces the time complexity to O(n2) . The experiments show that our algorithm outperforms the state-of-the-art methods.

  12. Graph Regularized Meta-path Based Transductive Regression in Heterogeneous Information Network.

    Science.gov (United States)

    Wan, Mengting; Ouyang, Yunbo; Kaplan, Lance; Han, Jiawei

    2015-01-01

    A number of real-world networks are heterogeneous information networks, which are composed of different types of nodes and links. Numerical prediction in heterogeneous information networks is a challenging but significant area because network based information for unlabeled objects is usually limited to make precise estimations. In this paper, we consider a graph regularized meta-path based transductive regression model ( Grempt ), which combines the principal philosophies of typical graph-based transductive classification methods and transductive regression models designed for homogeneous networks. The computation of our method is time and space efficient and the precision of our model can be verified by numerical experiments.

  13. Reentrant Information Flow in Electrophysiological Rat Default Mode Network.

    Science.gov (United States)

    Jing, Wei; Guo, Daqing; Zhang, Yunxiang; Guo, Fengru; Valdés-Sosa, Pedro A; Xia, Yang; Yao, Dezhong

    2017-01-01

    Functional MRI (fMRI) studies have demonstrated that the rodent brain shows a default mode network (DMN) activity similar to that in humans, offering a potential preclinical model both for physiological and pathophysiological studies. However, the neuronal mechanism underlying rodent DMN remains poorly understood. Here, we used electrophysiological data to analyze the power spectrum and estimate the directed phase transfer entropy (dPTE) within rat DMN across three vigilance states: wakeful rest (WR), slow-wave sleep (SWS), and rapid-eye-movement sleep (REMS). We observed decreased gamma powers during SWS compared with WR in most of the DMN regions. Increased gamma powers were found in prelimbic cortex, cingulate cortex, and hippocampus during REMS compared with WR, whereas retrosplenial cortex showed a reverse trend. These changed gamma powers are in line with the local metabolic variation of homologous brain regions in humans. In the analysis of directional interactions, we observed well-organized anterior-to-posterior patterns of information flow in the delta band, while opposite patterns of posterior-to-anterior flow were found in the theta band. These frequency-specific opposite patterns were only observed in WR and REMS. Additionally, most of the information senders in the delta band were also the receivers in the theta band, and vice versa. Our results provide electrophysiological evidence that rat DMN is similar to its human counterpart, and there is a frequency-dependent reentry loop of anterior-posterior information flow within rat DMN, which may offer a mechanism for functional integration, supporting conscious awareness.

  14. Dissemination of health information through social networks: twitter and antibiotics.

    Science.gov (United States)

    Scanfeld, Daniel; Scanfeld, Vanessa; Larson, Elaine L

    2010-04-01

    This study reviewed Twitter status updates mentioning "antibiotic(s)" to determine overarching categories and explore evidence of misunderstanding or misuse of antibiotics. One thousand Twitter status updates mentioning antibiotic(s) were randomly selected for content analysis and categorization. To explore cases of potential misunderstanding or misuse, these status updates were mined for co-occurrence of the following terms: "cold + antibiotic(s)," "extra + antibiotic(s)," "flu + antibiotic(s)," "leftover + antibiotic(s)," and "share + antibiotic(s)" and reviewed to confirm evidence of misuse or misunderstanding. Of the 1000 status updates, 971 were categorized into 11 groups: general use (n = 289), advice/information (n = 157), side effects/negative reactions (n = 113), diagnosis (n = 102), resistance (n = 92), misunderstanding and/or misuse (n = 55), positive reactions (n = 48), animals (n = 46), other (n = 42), wanting/needing (n = 19), and cost (n = 8). Cases of misunderstanding or abuse were identified for the following combinations: "flu + antibiotic(s)" (n = 345), "cold + antibiotic(s)" (n = 302), "leftover + antibiotic(s)" (n = 23), "share + antibiotic(s)" (n = 10), and "extra + antibiotic(s)" (n = 7). Social media sites offer means of health information sharing. Further study is warranted to explore how such networks may provide a venue to identify misuse or misunderstanding of antibiotics, promote positive behavior change, disseminate valid information, and explore how such tools can be used to gather real-time health data. 2010 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Mosby, Inc. All rights reserved.

  15. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... criminal investigation or national security, such agency may direct the carrier not to so disclose or...

  16. Experience in Russia on information and analytical support of activities associated with recovering of radiation accidents consequences

    International Nuclear Information System (INIS)

    Linge, I.I.

    2003-01-01

    Full text: In spite of substantial practical experience on population protection against radiation that was obtained in the USSR by the moment of the Chernobyl accident it was not possible to implement it most efficiently because of institutional disconnection. Strong necessity of serious coordination of activities an accident consequences liquidation in the scale of the country became obvious by the end of 1980s. In 1990, a decision on a unique program on the Chernobyl accident consequences liquidation was taken. This program, in particular, provided for systematic analytical support of actions an accident consequences implementation. The present report describes the basic decisions on information support of the SU government bodies that were partly realized in 1991 and further developed in the following years. Since 1991, Goscomchernobyl of Russia and, since 1994, EMERCOM of Russia is the Federal body on the consequences minimization. Since 1991 till now, the information system UIS Chernobyl is functioning in the framework of the body. The system includes the Central bank of generalized data (CBGD) and appropriate software. Purposes, structure and contents of CBGD are described in detail in the report. One of the section of CBGD includes data on radiation hygienic characteristics of more then 10,000 settlements in Russia. UIS Chernobyl is the basis for objective estimation of a situation at contaminated after the Chernobyl accident territories, state programs construction, forecasts and preparation of national reports. Systematic data on radiation hygienic situation analysis indicates that the protective measures complex realized in Russia allowed decreasing population irradiation to the large extent. It is necessary to note that the majority of protective measures exhausted their efficiency far ago. For example, spending on the preventing of 1 man/Sv of collective dose in realization of such action as restriction and control of locally produced food in most

  17. Research on the Architecture of a Basic Reconfigurable Information Communication Network

    Directory of Open Access Journals (Sweden)

    Ruimin Wang

    2013-01-01

    Full Text Available The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. This paper provides the theory system for the basic reconfigurable information communication network based on the analysis of present problems on the Internet and summarizes the root of these problems. It also provides an in-depth discussion about the related technologies and the prime components of the architecture.

  18. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  19. Inferring influenza global transmission networks without complete phylogenetic information.

    Science.gov (United States)

    Aris-Brosou, Stéphane

    2014-03-01

    Influenza is one of the most severe respiratory infections affecting humans throughout the world, yet the dynamics of its global transmission network are still contentious. Here, I describe a novel combination of phylogenetics, time series, and graph theory to analyze 14.25 years of data stratified in space and in time, focusing on the main target of the human immune response, the hemagglutinin gene. While bypassing the complete phylogenetic inference of huge data sets, the method still extracts information suggesting that waves of genetic or of nucleotide diversity circulate continuously around the globe for subtypes that undergo sustained transmission over several seasons, such as H3N2 and pandemic H1N1/09, while diversity of prepandemic H1N1 viruses had until 2009 a noncontinuous transmission pattern consistent with a source/sink model. Irrespective of the shift in the structure of H1N1 diversity circulation with the emergence of the pandemic H1N1/09 strain, US prevalence peaks during the winter months when genetic diversity is at its lowest. This suggests that a dominant strain is generally responsible for epidemics and that monitoring genetic and/or nucleotide diversity in real time could provide public health agencies with an indirect estimate of prevalence.

  20. Unsupervised Neural Network Quantifies the Cost of Visual Information Processing.

    Directory of Open Access Journals (Sweden)

    Levente L Orbán

    Full Text Available Untrained, "flower-naïve" bumblebees display behavioural preferences when presented with visual properties such as colour, symmetry, spatial frequency and others. Two unsupervised neural networks were implemented to understand the extent to which these models capture elements of bumblebees' unlearned visual preferences towards flower-like visual properties. The computational models, which are variants of Independent Component Analysis and Feature-Extracting Bidirectional Associative Memory, use images of test-patterns that are identical to ones used in behavioural studies. Each model works by decomposing images of floral patterns into meaningful underlying factors. We reconstruct the original floral image using the components and compare the quality of the reconstructed image to the original image. Independent Component Analysis matches behavioural results substantially better across several visual properties. These results are interpreted to support a hypothesis that the temporal and energetic costs of information processing by pollinators served as a selective pressure on floral displays: flowers adapted to pollinators' cognitive constraints.

  1. Performance Analysis of Space Information Networks with Backbone Satellite Relaying for Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Jian Jiao

    2017-01-01

    Full Text Available Space Information Network (SIN with backbone satellites relaying for vehicular network (VN communications is regarded as an effective strategy to provide diverse vehicular services in a seamless, efficient, and cost-effective manner in rural areas and highways. In this paper, we investigate the performance of SIN return channel cooperative communications via an amplify-and-forward (AF backbone satellite relaying for VN communications, where we assume that both of the source-destination and relay-destination links undergo Shadowed-Rician fading and the source-relay link follows Rician fading, respectively. In this SIN-assisted VN communication scenario, we first obtain the approximate statistical distributions of the equivalent end-to-end signal-to-noise ratio (SNR of the system. Then, we derive the closed-form expressions to efficiently evaluate the average symbol error rate (ASER of the system. Furthermore, the ASER expressions are taking into account the effect of satellite perturbation of the backbone relaying satellite, which reveal the accumulated error of the antenna pointing error. Finally, simulation results are provided to verify the accuracy of our theoretical analysis and show the impact of various parameters on the system performance.

  2. Actor Network Theory Approach and its Application in Investigating Agricultural Climate Information System

    Directory of Open Access Journals (Sweden)

    Maryam Sharifzadeh

    2013-03-01

    Full Text Available Actor network theory as a qualitative approach to study complex social factors and process of socio-technical interaction provides new concepts and ideas to understand socio-technical nature of information systems. From the actor network theory viewpoint, agricultural climate information system is a network consisting of actors, actions and information related processes (production, transformation, storage, retrieval, integration, diffusion and utilization, control and management, and system mechanisms (interfaces and networks. Analysis of such systemsembody the identification of basic components and structure of the system (nodes –thedifferent sources of information production, extension, and users, and the understanding of how successfully the system works (interaction and links – in order to promote climate knowledge content and improve system performance to reach agricultural development. The present research attempted to introduce actor network theory as research framework based on network view of agricultural climate information system.

  3. Consequences of additional use of PET information for target volume delineation and radiotherapy dose distribution for esophageal cancer

    International Nuclear Information System (INIS)

    Muijs, Christina T.; Schreurs, Liesbeth M.; Busz, Dianne M.; Beukema, Jannet C.; Borden, Arnout J. van der; Pruim, Jan; Van der Jagt, Eric J.; Plukker, John Th.; Langendijk, Johannes A.

    2009-01-01

    Background and purpose: To determine the consequences of target volume (TV) modifications, based on the additional use of PET information, on radiation planning, assuming PET/CT-imaging represents the true extent of the tumour. Materials and methods: For 21 patients with esophageal cancer, two separate TV's were retrospectively defined based on CT (CT-TV) and co-registered PET/CT images (PET/CT-TV). Two 3D-CRT plans (prescribed dose 50.4 Gy) were constructed to cover the corresponding TV's. Subsequently, these plans were compared for target coverage, normal tissue dose-volume histograms and the corresponding normal tissue complication probability (NTCP) values. Results: The addition of PET led to the modification of CT-TV with at least 10% in 12 of 21 patients (57%) (reduction in 9, enlargement in 3). PET/CT-TV was inadequately covered by the CT-based treatment plan in 8 patients (36%). Treatment plan modifications resulted in significant changes (p < 0.05) in dose distributions to heart and lungs. Corresponding changes in NTCP values ranged from -3% to +2% for radiation pneumonitis and from -0.2% to +1.2% for cardiac mortality. Conclusions: This study demonstrated that TV's based on CT might exclude PET-avid disease. Consequences are under dosing and thereby possibly ineffective treatment. Moreover, the addition of PET in radiation planning might result in clinical important changes in NTCP.

  4. Technical Evaluation Report (Workshop on Visualising Network Information)

    National Research Council Canada - National Science Library

    Rasmussen, Lisbeth M

    2006-01-01

    The workshop brought together operational users, developers and researchers to explore the connection between visualisation technologies and network analysis for military and civil protection applications...

  5. A novel Bayesian learning method for information aggregation in modular neural networks

    DEFF Research Database (Denmark)

    Wang, Pan; Xu, Lida; Zhou, Shang-Ming

    2010-01-01

    Modular neural network is a popular neural network model which has many successful applications. In this paper, a sequential Bayesian learning (SBL) is proposed for modular neural networks aiming at efficiently aggregating the outputs of members of the ensemble. The experimental results on eight...... benchmark problems have demonstrated that the proposed method can perform information aggregation efficiently in data modeling....

  6. Information transfer and information modification to identify the structure of cardiovascular and cardiorespiratory networks.

    Science.gov (United States)

    Faes, Luca; Nollo, Giandomenico; Krohova, Jana; Czippelova, Barbora; Turianikova, Zuzana; Javorka, Michal

    2017-07-01

    To fully elucidate the complex physiological mechanisms underlying the short-term autonomic regulation of heart period (H), systolic and diastolic arterial pressure (S, D) and respiratory (R) variability, the joint dynamics of these variables need to be explored using multivariate time series analysis. This study proposes the utilization of information-theoretic measures to measure causal interactions between nodes of the cardiovascular/cardiorespiratory network and to assess the nature (synergistic or redundant) of these directed interactions. Indexes of information transfer and information modification are extracted from the H, S, D and R series measured from healthy subjects in a resting state and during postural stress. Computations are performed in the framework of multivariate linear regression, using bootstrap techniques to assess on a single-subject basis the statistical significance of each measure and of its transitions across conditions. We find patterns of information transfer and modification which are related to specific cardiovascular and cardiorespiratory mechanisms in resting conditions and to their modification induced by the orthostatic stress.

  7. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  8. The role of conflict minerals, artisanal mining, and informal trading networks in African intrastate and regional conflicts

    Science.gov (United States)

    Chirico, Peter G.; Malpeli, Katherine C.

    2014-01-01

    The relationship between natural resources and armed conflict gained public and political attention in the 1990s, when it became evident that the mining and trading of diamonds were connected with brutal rebellions in several African nations. Easily extracted resources such as alluvial diamonds and gold have been and continue to be exploited by rebel groups to fund their activities. Artisanal and small-scale miners operating under a quasi-legal status often mine these mineral deposits. While many African countries have legalized artisanal mining and established flow chains through which production is intended to travel, informal trading networks frequently emerge in which miners seek to evade taxes and fees by selling to unauthorized buyers. These networks have the potential to become international in scope, with actors operating in multiple countries. The lack of government control over the artisanal mining sector and the prominence of informal trade networks can have severe social, political, and economic consequences. In the past, mineral extraction fuelled violent civil wars in Sierra Leone, Liberia, and Angola, and it continues to do so today in several other countries. The significant influence of the informal network that surrounds artisanal mining is therefore an important security concern that can extend across borders and have far-reaching impacts.

  9. DATA MAYHEM VERSUS NIMBLE INFORMATION: TRANSFORMING HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS

    Science.gov (United States)

    2017-10-01

    organized intelligence with a comprehensive account of the information derived, validated by intelligence requirements tasking. Third Phase...AU/ACSC/MORALES/AY17 AIR COMMAND AND STAFF COLLEGE DISTANCE LEARNING AIR UNIVERSITY DATA MAYHEM VERSUS NIMBLE INFORMATION : TRANSFORMING...HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS by Luis A. Morales, Major, USAF A Research

  10. 2010 VA Information Technologies Agency (VITA)/VA Geographic Information Network (VGIN) Lidar: Eastern Shore, VA (Accomack and Northampton Counties)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Virginia Geographic Information Network (VGIN) contracted with Sanborn to provide LiDAR mapping services for Accomack and Northampton counties on the eastern...

  11. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  12. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    CERN Document Server

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  13. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  14. The principles of artificial neural network information processing

    International Nuclear Information System (INIS)

    Dai, Ru-Wei

    1993-01-01

    In this article, the basic structure of an artificial neuron is first introduced. In addition, principles of artificial neural network as well as several important artificial neural models such as perception, back propagation model, Hopfield net, and ART model are briefly discussed and analyzed. Finally the application of artificial neural network for Chinese character recognition is also given. (author)

  15. The principles of artificial neural network information processing

    International Nuclear Information System (INIS)

    Dai, Ru-Wei

    1993-01-01

    In this article, the basic structure of an artificial neuron is first introduced. In addition, principles of artificial neural network as well as several important artificial neural models such as Perceptron, Back propagation model, Hopfield net, and ART model are briefly discussed and analyzed. Finally, the application of artificial neural network for Chinese Character Recognition is also given. (author)

  16. Grand Challenges: Science, Engineering, and Societal Advances, Requiring Networking and Information Technology Research and Development

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — ...the U.S. Government makes critical decisions about appropriate investments in IT R and D to help society forward both socially and economically. To inform that...

  17. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  18. Construction and discussion of the science and technology information network of SWIP

    International Nuclear Information System (INIS)

    Wang Li; Zhang Yiming

    2010-01-01

    The digital library needs to be developed with the advancement of digitalisation and network, and the construction of digital information resource is more indispensable. This paper introduces the exploration and the work performed by the Research Office of Science and Technology Information of the Southwestern Institute of Physics with respect to preliminary construction of science and technology (S and T) information network resources and the magnitude alteration of S and T information service platform subsequently and the building of a dynamical network information service mode of its own characteristics. (authors)

  19. Responses to procedural information about colorectal cancer screening using faecal occult blood testing: the role of consideration of future consequences

    Science.gov (United States)

    von Wagner, Christian; Good, Anna; Smith, Samuel G.; Wardle, Jane

    2011-01-01

    Abstract Background  Colorectal cancer (CRC) screening participation is low despite its effectiveness in reducing CRC mortality. Identifying benefits and barriers requires consideration of specific characteristics of screening modalities. Aims and Research Questions  To monitor the impact of providing information about CRC screening via faecal occult blood testing (FOBt) on intentions to participate. To investigate moderation by individual differences in consideration of future consequences (CFC). Design, setting and participants  A total of 211 healthy adults (aged 45–59) with no experience of CRC screening were presented with eight consecutive statements about FOBt‐based screening in a web survey. Participants completed measures of i) intention (after each statement), ii) CFC and iii) the importance of screening practicalities (e.g. unpleasantness of completing the test) and benefits (e.g. early detection of cancer). Results  An 8 (information) × 2 (CFC) mixed ancova showed that intentions varied across the eight statements. (P < 0.001): increasing after information about FOBt being completed at home (P < 0.001) before subsequently decreasing after information about the requirement to collect faecal samples (P < 0.001) in a plastic tub (P < 0.01) on three occasions (P < 0.01) with the low CFC group generally being less inclined to complete the test (P < 0.01). Two between‐group anovas demonstrated that the low CFC group attributed greater importance to practicalities of screening than the high CFC group while the opposite was found for the importance of benefits (both P’s < 0.001). Conclusion  Deconstructing FOBt‐based screening pointed to specific benefits and barriers which can advance research into public preferences of screening and educational materials. PMID:21501350

  20. Uranium mining and metallurgy library information service under the network environment

    International Nuclear Information System (INIS)

    Tang Lilei

    2012-01-01

    This paper analyzes the effect of the network environment on the uranium mining and metallurgy of the information service. Introduces some measures such as strengthening professional characteristic literature resources construction, changing the service mode, building up information navigation, deepening service, meet the individual needs of users, raising librarian's quality, promoting the co-construction and sharing of library information resources, and puts forward the development idea of uranium mining and metallurgy library information service under the network environment. (author)

  1. An open, component-based information infrastructure for integrated health information networks.

    Science.gov (United States)

    Tsiknakis, Manolis; Katehakis, Dimitrios G; Orphanoudakis, Stelios C

    2002-12-18

    A fundamental requirement for achieving continuity of care is the seamless sharing of multimedia clinical information. Different technological approaches can be adopted for enabling the communication and sharing of health record segments. In the context of the emerging global information society, the creation of and access to the integrated electronic health record (I-EHR) of a citizen has been assigned high priority in many countries. This requirement is complementary to an overall requirement for the creation of a health information infrastructure (HII) to support the provision of a variety of health telematics and e-health services. In developing a regional or national HII, the components or building blocks that make up the overall information system ought to be defined and an appropriate component architecture specified. This paper discusses current international priorities and trends in developing the HII. It presents technological challenges and alternative approaches towards the creation of an I-EHR, being the aggregation of health data created during all interactions of an individual with the healthcare system. It also presents results from an ongoing Research and Development (R&D) effort towards the implementation of the HII in HYGEIAnet, the regional health information network of Crete, Greece, using a component-based software engineering approach. Critical design decisions and related trade-offs, involved in the process of component specification and development, are also discussed and the current state of development of an I-EHR service is presented. Finally, Human Computer Interaction (HCI) and security issues, which are important for the deployment and use of any I-EHR service, are considered.

  2. US Geoscience Information Network, Web Services for Geoscience Information Discovery and Access

    Science.gov (United States)

    Richard, S.; Allison, L.; Clark, R.; Coleman, C.; Chen, G.

    2012-04-01

    The US Geoscience information network has developed metadata profiles for interoperable catalog services based on ISO19139 and the OGC CSW 2.0.2. Currently data services are being deployed for the US Dept. of Energy-funded National Geothermal Data System. These services utilize OGC Web Map Services, Web Feature Services, and THREDDS-served NetCDF for gridded datasets. Services and underlying datasets (along with a wide variety of other information and non information resources are registered in the catalog system. Metadata for registration is produced by various workflows, including harvest from OGC capabilities documents, Drupal-based web applications, transformation from tabular compilations. Catalog search is implemented using the ESRI Geoportal open-source server. We are pursuing various client applications to demonstrated discovery and utilization of the data services. Currently operational applications allow catalog search and data acquisition from map services in an ESRI ArcMap extension, a catalog browse and search application built on openlayers and Django. We are developing use cases and requirements for other applications to utilize geothermal data services for resource exploration and evaluation.

  3. Actor-network Theory and cartography of controversies in Information Science

    OpenAIRE

    LOURENÇO, Ramon Fernandes; TOMAÉL, Maria Inês

    2018-01-01

    Abstract The present study aims to discuss the interactions between the Actor-network Theory and the Cartography of Controversies method in Information Science research. A literature review was conducted on books, scholarly articles, and any other sources addressing the Theory-Actor Network and Cartography of Controversies. The understanding of the theoretical assumptions that guide the Network-Actor Theory allows examining important aspects to Information Science research, seeking to identif...

  4. Information Extraction with Character-level Neural Networks and Free Noisy Supervision

    OpenAIRE

    Meerkamp, Philipp; Zhou, Zhengyi

    2016-01-01

    We present an architecture for information extraction from text that augments an existing parser with a character-level neural network. The network is trained using a measure of consistency of extracted data with existing databases as a form of noisy supervision. Our architecture combines the ability of constraint-based information extraction systems to easily incorporate domain knowledge and constraints with the ability of deep neural networks to leverage large amounts of data to learn compl...

  5. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  6. The Origin of Value Through Information Networks : A Preliminary Framework from an Evolutionary Holonic Perspective

    NARCIS (Netherlands)

    Madureira, A.; Bakena, N.; Bouwman, H.

    2010-01-01

    The worldwide extraordinary level of interest in digital information networks deployment among nations is due to the strong perception that they bring economic, social and environmental value. Our literature review on studies aiming at clarifying the value of information networks, led us to conclude

  7. Social adaptation in multi-agent model of linguistic categorization is affected by network information flow.

    Science.gov (United States)

    Zubek, Julian; Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz

    2017-01-01

    This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.

  8. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    socio-technical limitations that restrict the free flow of information and communications (e.g., Bateman , 1996). The flow of information among the...networks. Phys. A Stat. Mech. Appl. 272, 173–187. doi: 10.1016/S0378- 4371(99)00291-5 Bateman , R. L. (1996). Force XXI and the death of

  9. A Bayesian Network approach to the evaluation of building design and its consequences for employee performance and operational costs

    DEFF Research Database (Denmark)

    Jensen, Kasper Lynge; Toftum, Jørn; Friis-Hansen, Peter

    2009-01-01

    A Bayesian Network approach has been developed that can compare different building designs by estimating the effects of the thermal indoor environment on the mental performance of office workers. A part of this network is based on the compilation of subjective thermal sensation data and the assoc...

  10. The informal networks in food procurement by older people - A cross European comparison

    DEFF Research Database (Denmark)

    Turrini, Aida; D'Addezio, Laura; Maccati, Fabrizia

    2010-01-01

    .e., alone vs. with others) in FSW was revealed. Informal social networks may play an important role in public health and welfare policies, particularly given the increase in this demographic group. Assistance with grocery shopping and the availability of trained personnel could widen informal networks......, and effective informal networks may be an important supportive service for older adults. The comparison across countries highlighted relationships between food procurement capabilities and social networks. These findings may be used to develop resources to better meet the nutritional needs of older adults.......Healthy dietary profiles contribute to successful aging, and dietary intake is dependent upon food procurement capabilities. Both formal and informal social networks can contribute to grocery shopping capabilities and methods of food procurement. This investigation explores the role of informal...

  11. A Multi-Hop Energy Neutral Clustering Algorithm for Maximizing Network Information Gathering in Energy Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Yang, Liu; Lu, Yinzhi; Zhong, Yuanchang; Wu, Xuegang; Yang, Simon X

    2015-12-26

    Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs) because it restricts the lifetime of network. Recently, the emergence of energy harvesting techniques has brought with them the expectation to overcome this problem. In particular, it is possible for a sensor node with energy harvesting abilities to work perpetually in an Energy Neutral state. In this paper, a Multi-hop Energy Neutral Clustering (MENC) algorithm is proposed to construct the optimal multi-hop clustering architecture in energy harvesting WSNs, with the goal of achieving perpetual network operation. All cluster heads (CHs) in the network act as routers to transmit data to base station (BS) cooperatively by a multi-hop communication method. In addition, by analyzing the energy consumption of intra- and inter-cluster data transmission, we give the energy neutrality constraints. Under these constraints, every sensor node can work in an energy neutral state, which in turn provides perpetual network operation. Furthermore, the minimum network data transmission cycle is mathematically derived using convex optimization techniques while the network information gathering is maximal. Simulation results show that our protocol can achieve perpetual network operation, so that the consistent data delivery is guaranteed. In addition, substantial improvements on the performance of network throughput are also achieved as compared to the famous traditional clustering protocol LEACH and recent energy harvesting aware clustering protocols.

  12. A Multi-Hop Energy Neutral Clustering Algorithm for Maximizing Network Information Gathering in Energy Harvesting Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Liu Yang

    2015-12-01

    Full Text Available Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs because it restricts the lifetime of network. Recently, the emergence of energy harvesting techniques has brought with them the expectation to overcome this problem. In particular, it is possible for a sensor node with energy harvesting abilities to work perpetually in an Energy Neutral state. In this paper, a Multi-hop Energy Neutral Clustering (MENC algorithm is proposed to construct the optimal multi-hop clustering architecture in energy harvesting WSNs, with the goal of achieving perpetual network operation. All cluster heads (CHs in the network act as routers to transmit data to base station (BS cooperatively by a multi-hop communication method. In addition, by analyzing the energy consumption of intra- and inter-cluster data transmission, we give the energy neutrality constraints. Under these constraints, every sensor node can work in an energy neutral state, which in turn provides perpetual network operation. Furthermore, the minimum network data transmission cycle is mathematically derived using convex optimization techniques while the network information gathering is maximal. Simulation results show that our protocol can achieve perpetual network operation, so that the consistent data delivery is guaranteed. In addition, substantial improvements on the performance of network throughput are also achieved as compared to the famous traditional clustering protocol LEACH and recent energy harvesting aware clustering protocols.

  13. Information services in social networked transportation : governance and ITS.

    Science.gov (United States)

    2014-06-01

    The purpose of this research seeks to understand the functions and the benefits of social : networked transportation (SNT), the processes that make SNT possible, and the institutional : innovations needed to facilitate those processes. First, this re...

  14. Information quality in dynamic networked business process management

    NARCIS (Netherlands)

    Rasouli, M.; Eshuis, H.; Trienekens, J.J.M.; Kusters, R.J.; Grefen, P.W.P.J.; Devruyne, C.; Panetto, H.; Meersman, R.; Dillon, T.; Weichhart, G.; An, Y.; Ardagna, C.A.

    2015-01-01

    The competition in globalized markets forces organizations to provide mass-customized integrated solutions for customers. Mass-customization of integrated solutions by business network requires adaptive interactions between parties to address emerging requirements of customers. These adaptive

  15. Extracting Information Based on Partial or Complete Network Data

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... depth and breadth first search network traversal do not perform well overall .... work was created using the Python's preferential attachment ..... [13] J. Boland, T. Haynes, and L. Lawson, “Domination from a distance,”. Congr.

  16. Change Detection Algorithms for Information Assurance of Computer Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A

    2002-01-01

    .... In this thesis, the author will focus on the detection of three attack scenarios: the spreading of active worms throughout the Internet, distributed denial of service attacks, and routing attacks to wireless ad hoc networks...

  17. Networked professional learning : relating the formal and the informal

    NARCIS (Netherlands)

    Vaessen, M.; Beemt, van den A.A.J.; Laat, de M.

    2014-01-01

    The increasing complexity of the workplace environment requires teachers and professionals in general to tap into their social networks, inside and outside circles of direct colleagues and collaborators, for finding appropriate knowledge and expertise. This collective process of sharing and

  18. Uganda Health Information Network (UHIN) - Phase IV | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... reports on drug supplies and use, and continuing education materials. This phase aims to fully integrate the Network into the Ministry of Health district and national ... IWRA/IDRC webinar on climate change and adaptive water management.

  19. Extracting Information Based on Partial or Complete Network Data

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... The k-Vertex Maximum Domination, introduced by Miyano and Ono in [4], .... work was created using the Python's random network model. ER(n, m) to ..... Proceedings of the Seventeenth Computing: The Australasian Theory.

  20. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  1. The effects of redundancy and information manipulation on traffic networks

    OpenAIRE

    Özel, Berk; Ozel, Berk

    2014-01-01

    Traffic congestion is one of the most frequently encountered problems in real life. It is not only a scientific concern of scholars, but also an inevitable issue for most of the individuals living in urban areas. Since every driver in traffic networks tries to minimize own journey length, and volume of the traffic prevents coordination between individuals, a cooperative behavior will not be provided spontaneously in order to decrease the total cost of the network and the time spent on traffic...

  2. Summer School Mathematical Foundations of Complex Networked Information Systems

    CERN Document Server

    Fosson, Sophie; Ravazzi, Chiara

    2015-01-01

    Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.

  3. Strategic Roadmap for the U.S. Geoscience Information Network

    Science.gov (United States)

    Allison, M. L.; Gallagher, K. T.; Richard, S. M.; Hutchison, V. B.

    2012-04-01

    An external advisory working group has prepared a 5-year strategic roadmap for the U.S. Geoscience Information Network (USGIN). USGIN is a partnership of the Association of American State Geologists (AASG) and the U.S. Geological Survey (USGS), who formally agreed in 2007 to develop a national geoscience information framework that is distributed, interoperable, uses open source standards and common protocols, respects and acknowledges data ownership, fosters communities of practice to grow, and develops new Web services and clients. The intention of the USGIN is to benefit the geological surveys by reducing the cost of online data publication and access provision, and to benefit society through easier (lower cost) access to public domain geoscience data. This information supports environmental planning, resource-development, hazard mitigation design, and decision-making. USGIN supposes that sharing resources for system development and maintenance, standardizing data discovery and creating better access mechanisms, causes cost of data access and maintenance to be reduced. Standardization in a wide variety of business domains provides economic benefits that range between 0.2 and 0.9% of the gross national product. We suggest that the economic benefits of standardization also apply in the informatics domain. Standardized access to rich data resources will create collaborative opportunities in science and business. Development and use of shared protocols and interchange formats for data publication will create a market for user applications, facilitating geoscience data discovery and utility for the benefit of society. The USGIN Working Group envisions further development of tools and capabilities, in addition to extending the community of practice that currently involves geoinformatics practitioners from the USGS and AASG. Promoting engagement and participation of the state geological surveys, and increasing communication between the states, USGS, and other

  4. A Dynamic Microblog Network and Information Dissemination in “@” Mode

    Directory of Open Access Journals (Sweden)

    Mingsheng Tang

    2014-01-01

    Full Text Available Social media, especially the microblogs, emerge as a part of our daily life and become a key way to information spread. Thus, information dissemination in the microblog became a research hotspot. Based on some principles that are summarized from the microblog users’ behaviors, this paper proposes a dynamic microblog network model. Through simulations this network has the features of periodicity of average degree, high clustering coefficient, high degree of modularity, and community. Besides, an information dissemination model through “@” in the microblog has been presented. With the microblog network model and the zombie-city model, this paper has modelled an artificial microblog and has simulated the information dissemination in the artificial microblog with different scenes. Therefore, some interesting findings have been presented. (1 Due to a better connectivity, information could spread widely in a random network; (2 information spreads more quickly in a stable microblog network; (3 the decay rate of the relationships will have an effect on information dissemination; that is, with a lower decay rate, information spreads more quickly and widely; (4 the higher active level of users in microblog could promote information spread widely and quickly; (5 the “@” mode of information dissemination makes a high modularity of the information diffusion network.

  5. Next-generation science information network for leading-edge applications

    International Nuclear Information System (INIS)

    Urushidani, S.; Matsukata, J.

    2008-01-01

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines

  6. Next-generation science information network for leading-edge applications

    Energy Technology Data Exchange (ETDEWEB)

    Urushidani, S. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)], E-mail: urushi@nii.ac.jp; Matsukata, J. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)

    2008-04-15

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines.

  7. Gene regulatory network inference by point-based Gaussian approximation filters incorporating the prior information.

    Science.gov (United States)

    Jia, Bin; Wang, Xiaodong

    2013-12-17

    : The extended Kalman filter (EKF) has been applied to inferring gene regulatory networks. However, it is well known that the EKF becomes less accurate when the system exhibits high nonlinearity. In addition, certain prior information about the gene regulatory network exists in practice, and no systematic approach has been developed to incorporate such prior information into the Kalman-type filter for inferring the structure of the gene regulatory network. In this paper, an inference framework based on point-based Gaussian approximation filters that can exploit the prior information is developed to solve the gene regulatory network inference problem. Different point-based Gaussian approximation filters, including the unscented Kalman filter (UKF), the third-degree cubature Kalman filter (CKF3), and the fifth-degree cubature Kalman filter (CKF5) are employed. Several types of network prior information, including the existing network structure information, sparsity assumption, and the range constraint of parameters, are considered, and the corresponding filters incorporating the prior information are developed. Experiments on a synthetic network of eight genes and the yeast protein synthesis network of five genes are carried out to demonstrate the performance of the proposed framework. The results show that the proposed methods provide more accurate inference results than existing methods, such as the EKF and the traditional UKF.

  8. Future view of electric power information processing techniques. Architecture techniques for power supply communication network

    Energy Technology Data Exchange (ETDEWEB)

    Tanaka, Keisuke

    1988-06-20

    Present situations of a power supply communication are described, and the future trend of a power supply information network is reviewed. For the improvement of a transmission efficiency and quality and a cost benefit for the power supply communication, the introduction of digital networks has been promoted. As for a protection information network, since there is the difference between a required communication quality of system protection information and that of power supply operation information, the individual digital network configuration is expected, in addition, the increasing of image information transmission for monitoring is also estimated. As for a business information network, the construction of a broad-band switched network is expected with increasing of image transmission needs such as a television meeting. Furthermore, the expansion to a power supply ISDN which is possible to connect between a telephone, facsimile and data terminal, to exchange various media and to connect between networks is expected with higher communication services in the protection and business network. However, for its practical use, the standardization of various interfaces will become essential. (3 figs, 1 tab)

  9. E-learning objects and actor-networks as configuring information literacy teaching

    DEFF Research Database (Denmark)

    Schreiber, Trine Louise

    2017-01-01

    Introduction. With actor-network theory (ANT) as the theoretical lens the aim of the paper is to examine attempts to build network for shaping information literacy teaching. Method. The paper is based on a study of a project in 2014-2016 where information professionals representing ten educational...... libraries produced and implemented e-learning objects in information literacy teaching. The material was collected through interviews, observations, documents and feedback sessions. Analysis. Latour´s concept of translation and Callon´s four translation moments are used to analyze the network building...... that a network configuring information literacy teaching based on new interactive roles has not been stabilized. Conclusion. The paper concludes that the strength of ANT is first of all the mediation of an overview of different kinds of actors involved in network building. Further, the paper proposes to combine...

  10. Bandwidth Optimization On Design Of Visual Display Information System Based Networking At Politeknik Negeri Bali

    Science.gov (United States)

    Sudiartha, IKG; Catur Bawa, IGNB

    2018-01-01

    Information can not be separated from the social life of the community, especially in the world of education. One of the information fields is academic calendar information, activity agenda, announcement and campus activity news. In line with technological developments, text-based information is becoming obsolete. For that need creativity to present information more quickly, accurately and interesting by exploiting the development of digital technology and internet. In this paper will be developed applications for the provision of information in the form of visual display, applied to computer network system with multimedia applications. Network-based applications provide ease in updating data through internet services, attractive presentations with multimedia support. The application “Networking Visual Display Information Unit” can be used as a medium that provides information services for students and academic employee more interesting and ease in updating information than the bulletin board. The information presented in the form of Running Text, Latest Information, Agenda, Academic Calendar and Video provide an interesting presentation and in line with technological developments at the Politeknik Negeri Bali. Through this research is expected to create software “Networking Visual Display Information Unit” with optimal bandwidth usage by combining local data sources and data through the network. This research produces visual display design with optimal bandwidth usage and application in the form of supporting software.

  11. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  12. Information mining in weighted complex networks with nonlinear rating projection

    Science.gov (United States)

    Liao, Hao; Zeng, An; Zhou, Mingyang; Mao, Rui; Wang, Bing-Hong

    2017-10-01

    Weighted rating networks are commonly used by e-commerce providers nowadays. In order to generate an objective ranking of online items' quality according to users' ratings, many sophisticated algorithms have been proposed in the complex networks domain. In this paper, instead of proposing new algorithms we focus on a more fundamental problem: the nonlinear rating projection. The basic idea is that even though the rating values given by users are linearly separated, the real preference of users to items between the different given values is nonlinear. We thus design an approach to project the original ratings of users to more representative values. This approach can be regarded as a data pretreatment method. Simulation in both artificial and real networks shows that the performance of the ranking algorithms can be improved when the projected ratings are used.

  13. Consequences of mild traumatic brain injury on information processing assessed with attention and short-term memory tasks.

    Science.gov (United States)

    Malojcic, Branko; Mubrin, Zdenko; Coric, Bojana; Susnic, Mirica; Spilich, George J

    2008-01-01

    In this investigation, we explored the impact of mild traumatic brain injury (mTBI) upon short term or working memory and attention. The performance of 37 individuals with mTBI was compared with that of 53 age, sex and education-matched controls. All participants were staff members or individuals seeking medical care at a University hospital serving a large metropolitan area. A battery of computerized tests measured sustained visual attention, short-term memory (STM), simple reaction time, and decision time. Individuals with mTBI showed a performance deficit at sustained visual attention, STM scanning and a trend towards slowing in choice decision making. These observed changes in the cognitive performance of mTBI individuals are hypothesized to be a consequence of impaired central information processing. Our results suggest that mTBI can elicit meaningful cognitive deficits for several months post-injury. Additionally, we believe that the tasks employed in the current investigation demonstrate their utility for understanding cognitive deficits in mTBI individuals.

  14. Converging Redundant Sensor Network Information for Improved Building Control

    Energy Technology Data Exchange (ETDEWEB)

    Dale Tiller; D. Phil; Gregor Henze; Xin Guo

    2007-09-30

    This project investigated the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point could improve system performance. Phase I of the project focused on instrumentation and data collection. During the initial project phase, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Phase II of the project demonstrated that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. This phase also established that analysis algorithms could be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications. In Phase III of the project, the sensor network from Phase I was complemented by a control strategy developed based on the results from the first two project phases: this controller was implemented in a small sample of work areas, and applied to lighting control. Two additional technologies were developed in the course of completing the project. A prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy was designed and implemented. A new capability that enables occupancy sensors in a sensor network to dynamically set the 'time delay' interval based on ongoing occupant behavior in the space was also designed and implemented.

  15. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  16. Using Incomplete Information for Complete Weight Annotation of Road Networks

    DEFF Research Database (Denmark)

    Yang, Bin; Kaul, Manohar; Jensen, Christian Søndergaard

    2014-01-01

    to solve the problem. Specifically, the problem is modeled as a regression problem and solved by minimizing a judiciously designed objective function that takes into account the topology of the road network. In particular, the use of weighted PageRank values of edges is explored for assigning appropriate...... weights to all edges, and the property of directional adjacency of edges is also taken into account to assign weights. Empirical studies with weights capturing travel time and GHG emissions on two road networks (Skagen, Denmark, and North Jutland, Denmark) offer insight into the design properties...

  17. Using Incomplete Information for Complete Weight Annotation of Road Networks

    DEFF Research Database (Denmark)

    Yang, Bin; Kaul, Manohar; Jensen, Christian S.

    2014-01-01

    ground-truth travel cost. A general framework is proposed to solve the problem. Specifically, the problem is modeled as a regression problem and solved by minimizing a judiciously designed objective function that takes into account the topology of the road network. In particular, the use of weighted Page......Rank values of edges is explored for assigning appropriate weights to all edges, and the property of directional adjacency of edges is also taken into account to assign weights. Empirical studies with weights capturing travel time and GHG emissions on two road networks offer insight into the design properties...

  18. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  19. Spatially dynamic recurrent information flow across long-range dorsal motor network encodes selective motor goals.

    Science.gov (United States)

    Yoo, Peter E; Hagan, Maureen A; John, Sam E; Opie, Nicholas L; Ordidge, Roger J; O'Brien, Terence J; Oxley, Thomas J; Moffat, Bradford A; Wong, Yan T

    2018-03-08

    Performing voluntary movements involves many regions of the brain, but it is unknown how they work together to plan and execute specific movements. We recorded high-resolution ultra-high-field blood-oxygen-level-dependent signal during a cued ankle-dorsiflexion task. The spatiotemporal dynamics and the patterns of task-relevant information flow across the dorsal motor network were investigated. We show that task-relevant information appears and decays earlier in the higher order areas of the dorsal motor network then in the primary motor cortex. Furthermore, the results show that task-relevant information is encoded in general initially, and then selective goals are subsequently encoded in specifics subregions across the network. Importantly, the patterns of recurrent information flow across the network vary across different subregions depending on the goal. Recurrent information flow was observed across all higher order areas of the dorsal motor network in the subregions encoding for the current goal. In contrast, only the top-down information flow from the supplementary motor cortex to the frontoparietal regions, with weakened recurrent information flow between the frontoparietal regions and bottom-up information flow from the frontoparietal regions to the supplementary cortex were observed in the subregions encoding for the opposing goal. We conclude that selective motor goal encoding and execution rely on goal-dependent differences in subregional recurrent information flow patterns across the long-range dorsal motor network areas that exhibit graded functional specialization. © 2018 Wiley Periodicals, Inc.

  20. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Marina V. Tumbinskaya

    2017-01-01

    Full Text Available Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level. 

  1. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    Nowadays, due to wide applicability of Wireless Sensor Network (WSN) added by the low cost sensor devices, its popularity among the researchers and industrialists are very much visible. A substantial amount of works can be seen in the literature on WSN which are mainly focused on application...

  2. Top-K Interesting Subgraph Discovery in Information Networks

    Science.gov (United States)

    2014-03-03

    top ten types (film, person, company, football biography, nrhp, television, album , settlement, musical artist, single). This ten-type network covers...well as some comedy and musical roles, which are quite different from this war movie. Again, John has worked mostly in US movies, rather than Italian

  3. Networked Professional Learning: Relating the Formal and the Informal

    Science.gov (United States)

    Vaessen, Matthieu; van den Beemt, Antoine; de Laat, Maarten

    2014-01-01

    The increasing complexity of the workplace environment requires teachers and professionals in general to tap into their social networks, inside and outside circles of direct colleagues and collaborators, for finding appropriate knowledge and expertise. This collective process of sharing and constructing knowledge can be considered "networked…

  4. Informal Learning and Identity Formation in Online Social Networks

    Science.gov (United States)

    Greenhow, Christine; Robelia, Beth

    2009-01-01

    All students today are increasingly expected to develop technological fluency, digital citizenship, and other twenty-first century competencies despite wide variability in the quality of learning opportunities schools provide. Social network sites (SNSs) available via the internet may provide promising contexts for learning to supplement…

  5. The Global Heat Health Information Network (GHHIN): Putting the Pieces Together

    Science.gov (United States)

    Jones, H.; Shumake, J.; Trtanj, J.

    2017-12-01

    Human exposure to extreme heat is one of the principal and most manageable impacts of climate on human health. Yet, every year worldwide, tens of thousands of people die as a result of avoidable heat-induced health consequences and countless others experience reduced labor productivity, physiological stress and ill health. The IPCC predicts with high confidence, that the observed trend of longer lasting, more frequent, more intense, and earlier onset heat waves will continue into the future. This situation requires the global health community to aggressively confront this recognized risk. Many countries and cities worldwide have developed heat action plans or heat health early warning systems, but these efforts are only connected in an ad-hoc fashion, use a broad range of non-standardized tools, methods, and approaches, and lack a clear mechanism to learn from each other in order to more rapidly advance health protection. To address this gap and accelerate heat health protection, the Global Heat Health Information Network (GHHIN) was launched in June 2016, by the WMO/WHO joint office for Climate and Health and the NOAA Climate Program Office. GHHIN is envisioned to be an independent, voluntary, member driven forum of scientists, professionals, and policymakers focused on enhancing and multiplying the global and local learning and resilience-building for heat health that is already occurring. GHHIN seeks to serve as a catalyst, knowledge broker, disseminator of good practices, and a forum for facilitating exchange and identifying needs. GHHIN will promote evidence-driven interventions, shared-learning, co-production of information, synthesis of priorities and capacity building to empower actors to take more effective and informed life-saving preparedness and planning measures. GHHIN is working toward several activities in 2018. The first Global Heat Health Synthesis report will be published to synthesize the state of science and practice to monitor, predict, and

  6. Guidelines on CV networking information flow optimization for Texas.

    Science.gov (United States)

    2017-03-01

    Recognizing the fundamental role of information flow in future transportation applications, the research team investigated the quality and security of information flow in the connected vehicle (CV) environment. The research team identified key challe...

  7. Network public goods with asymmetric information about cooperation preferences and network degree

    NARCIS (Netherlands)

    Dijkstra, Jacob; van Assen, Marcus

    2013-01-01

    We propose a game theoretical model of one-shot network public goods formalizing the 'closure argument' that cooperation is more frequent in denser groups or networks. Equilibrium analyses show that (i) an 'inefficiency problem' exists: players all preferring mutual cooperation need not all

  8. In-House Communication Support System Based on the Information Propagation Model Utilizes Social Network

    Science.gov (United States)

    Takeuchi, Susumu; Teranishi, Yuuichi; Harumoto, Kaname; Shimojo, Shinji

    Almost all companies are now utilizing computer networks to support speedier and more effective in-house information-sharing and communication. However, existing systems are designed to support communications only within the same department. Therefore, in our research, we propose an in-house communication support system which is based on the “Information Propagation Model (IPM).” The IPM is proposed to realize word-of-mouth communication in a social network, and to support information-sharing on the network. By applying the system in a real company, we found that information could be exchanged between different and unrelated departments, and such exchanges of information could help to build new relationships between the users who are apart on the social network.

  9. Connected or informed?: Local Twitter networking in a London neighbourhood

    Directory of Open Access Journals (Sweden)

    John Bingham-Hall

    2015-08-01

    Full Text Available This paper asks whether geographically localised, or ‘hyperlocal’, uses of Twitter succeed in creating peer-to-peer neighbourhood networks or simply act as broadcast media at a reduced scale. Literature drawn from the smart cities discourse and from a UK research project into hyperlocal media, respectively, take on these two opposing interpretations. Evidence gathered in the case study presented here is consistent with the latter, and on this basis we criticise the notion that hyperlocal social media can be seen as a community in itself. We demonstrate this by creating a network map of Twitter followers of a popular hyperlocal blog in Brockley, southeast London. We describe various attributes of this network including its average degree and clustering coefficient to suggest that a small and highly connected cluster of visible local entities such as businesses form a clique at the centre of this network, with individual residents following these but not one another. We then plot the locations of these entities and demonstrate that sub-communities in the network are formed due to close geographical proximity between smaller sets of businesses. These observations are illustrated with qualitative evidence from interviews with users who suggest instead that rather than being connected to one another they benefit from what has been described as ‘neighbourhood storytelling’. Despite the limitations of working with Twitter data, we propose that this multi-modal approach offers a valuable way to investigate the experience of using social media as a communication tool in urban neighbourhoods.

  10. Personalized Recommendations Based on Users' Information-Centered Social Networks

    Science.gov (United States)

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  11. A quantitative approach to measure road network information based on edge diversity

    Science.gov (United States)

    Wu, Xun; Zhang, Hong; Lan, Tian; Cao, Weiwei; He, Jing

    2015-12-01

    The measure of map information has been one of the key issues in assessing cartographic quality and map generalization algorithms. It is also important for developing efficient approaches to transfer geospatial information. Road network is the most common linear object in real world. Approximately describe road network information will benefit road map generalization, navigation map production and urban planning. Most of current approaches focused on node diversities and supposed that all the edges are the same, which is inconsistent to real-life condition, and thus show limitations in measuring network information. As real-life traffic flow are directed and of different quantities, the original undirected vector road map was first converted to a directed topographic connectivity map. Then in consideration of preferential attachment in complex network study and rich-club phenomenon in social network, the from and to weights of each edge are assigned. The from weight of a given edge is defined as the connectivity of its end node to the sum of the connectivities of all the neighbors of the from nodes of the edge. After getting the from and to weights of each edge, edge information, node information and the whole network structure information entropies could be obtained based on information theory. The approach has been applied to several 1 square mile road network samples. Results show that information entropies based on edge diversities could successfully describe the structural differences of road networks. This approach is a complementarity to current map information measurements, and can be extended to measure other kinds of geographical objects.

  12. Energy-efficient neural information processing in individual neurons and neuronal networks.

    Science.gov (United States)

    Yu, Lianchun; Yu, Yuguo

    2017-11-01

    Brains are composed of networks of an enormous number of neurons interconnected with synapses. Neural information is carried by the electrical signals within neurons and the chemical signals among neurons. Generating these electrical and chemical signals is metabolically expensive. The fundamental issue raised here is whether brains have evolved efficient ways of developing an energy-efficient neural code from the molecular level to the circuit level. Here, we summarize the factors and biophysical mechanisms that could contribute to the energy-efficient neural code for processing input signals. The factors range from ion channel kinetics, body temperature, axonal propagation of action potentials, low-probability release of synaptic neurotransmitters, optimal input and noise, the size of neurons and neuronal clusters, excitation/inhibition balance, coding strategy, cortical wiring, and the organization of functional connectivity. Both experimental and computational evidence suggests that neural systems may use these factors to maximize the efficiency of energy consumption in processing neural signals. Studies indicate that efficient energy utilization may be universal in neuronal systems as an evolutionary consequence of the pressure of limited energy. As a result, neuronal connections may be wired in a highly economical manner to lower energy costs and space. Individual neurons within a network may encode independent stimulus components to allow a minimal number of neurons to represent whole stimulus characteristics efficiently. This basic principle may fundamentally change our view of how billions of neurons organize themselves into complex circuits to operate and generate the most powerful intelligent cognition in nature. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  13. Research of using mobile agents for information discovery in P2P networks

    International Nuclear Information System (INIS)

    Lan Yan; Yao Qing

    2003-01-01

    The technology of P2P is a new network-computing model that has great value of commerce and technology. After analyzing the current information discovery technology in P2P network, a new solution that is based on mobile agent is proposed. The mobile agent solution can reduce the need of bandwidth, be adapt to the dynamic of P2P network, and be asynchronous and be very fault tolerant. (authors)

  14. A local area network and information management system for a submarine overhaul facility

    OpenAIRE

    Bushmire, Jeffrey D

    1990-01-01

    A preliminary design of a local area network for a submarine overhaul facility is developed using System Engineering concepts. SOFLAN, the Submarine Overhaul Facility Local Area Network, is necessary to provide more timely and accurate information to submarine overhaul managers in order to decrease the overhaul time period and become more competitive. The network is a microcomputer based system following the Ethernet and IEEE 802.3 standards with a server .. client architecture. SOFLAN serves...

  15. Culture, agency and power: Theoretical reflections on informal economic networks and political process

    OpenAIRE

    Meagher, Kate

    2009-01-01

    Do network theory really offer a suitable concept for the theorization of informal processes of economic regulation and institutional change? This working paper challenges both essentialist and skeptical attitudes to networks through an examination of the positive and negative effects of network governance in contemporary societies in a range of regional contexts. The analysis focuses on three broad principles of non-state organization - culture, agency and power - and their role in shaping p...

  16. A comparative study of information diffusion in weblogs and microblogs based on social network analysis

    Institute of Scientific and Technical Information of China (English)

    Yang ZHANG; Wanyang LING

    2012-01-01

    Purpose:This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach:Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science (LIS) as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings:Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect.Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks.Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism.Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations:The sample size needs to be increased so that samples are more representative.Errors may exist during the data collection.Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications:This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through

  17. A comparative study of information diffusion in weblogs and microblogs based on social network analysis

    Institute of Scientific and Technical Information of China (English)

    Yang; ZHANG; Wanyang; LING

    2012-01-01

    Purpose:This paper intends to explore a quantitative method for investigating the characteristics of information diffusion through social media like weblogs and microblogs.By using the social network analysis methods,we attempt to analyze the different characteristics of information diffusion in weblogs and microblogs as well as the possible reasons of these differences.Design/methodology/approach:Using the social network analysis methods,this paper carries out an empirical study by taking the Chinese weblogs and microblogs in the field of Library and Information Science(LIS)as the research sample and employing measures such as network density,core/peripheral structure and centrality.Findings:Firstly,both bloggers and microbloggers maintain weak ties,and both of their social networks display a small-world effect.Secondly,compared with weblog users,microblog users are more interconnected,more equal and more capable of developing relationships with people outside their own social networks.Thirdly,the microblogging social network is more conducive to information diffusion than the blogging network,because of their differences in functions and the information flow mechanism.Finally,the communication mode emerged with microblogging,with the characteristics of micro-content,multi-channel information dissemination,dense and decentralized social network and content aggregation,will be one of the trends in the development of the information exchange platform in the future.Research limitations:The sample size needs to be increased so that samples are more representative.Errors may exist during the data collection.Moreover,the individual-level characteristics of the samples as well as the types of information exchanged need to be further studied.Practical implications:This preliminary study explores the characteristics of information diffusion in the network environment and verifies the feasibility of conducting a quantitative analysis of information diffusion through social

  18. Measuring the Influence of Information Networks on Transaction Costs Using a Non-parametric Regression Technique

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian

    2011-01-01

    All business transactions as well as achieving innovations take up resources, subsumed under the concept of transaction costs (TAC). One of the major factors in TAC theory is information. Information networks can catalyse the interpersonal information exchange and hence, increase the access...... to nonpublic information. Our analysis shows that information networks have an impact on the level of TAC. Many resources that are sacrificed for TAC are inputs that also enter the technical production process. As most production data do not separate between these two usages of inputs, high transaction costs...

  19. Sexting: definition, risk factors and consequences

    OpenAIRE

    Mercado Contreras, Cinthia Tomasa; Pedraza Cabrera, Francisco Javier; Martínez Martínez, Kalina Isela

    2016-01-01

    [EN] The advance of the technology in communications has led to social networking sites fulfill an important role in society. Among the most used and known is Facebook, that social network allows to make public certain information and provides the opportunity to hold private conversations. This new trend of talks, and the natural desire to explore sexuality has led young people interested at phenomenon known as sexting. This phenomenon, from some of the negative consequences be...

  20. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  1. Experiences with using information and communication technology to build a multi-municipal support network for informal carers.

    Science.gov (United States)

    Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth

    2013-09-01

    This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.

  2. It takes two to tango: the fit between network context and inter-organizational strategic information systems planning

    NARCIS (Netherlands)

    Spil, Antonius A.M.; van den Broek, Tijs; Salmela, Hannu T.T.

    2010-01-01

    The view of evaluating Strategic Information Systems Planning (Grover & Segars, 2005) process and effectiveness has matured. However, the inter-organizational view or network view is understudied. The introduction of information strategy in networks seems more reactive than proactive; many

  3. Networked information: Management issues for the acquisitions librarian

    Science.gov (United States)

    Lawrence, Gregory

    1994-01-01

    Historically, libraries have been the depositories and public access points to both domestic and international government information. A change in the information seeking behavior of the public is driving a change in government information publishing and dissemination. Patrons who traditionally used libraries for access to printed government information have become familiar and comfortable with the electronic environment. These data users are showing an increased interest in certain types of government information in electronic format, including indexes, numeric files, statistics, and hypertext documents. Government response to increased demand for electronic information has led to a flurry of special initiatives, with the production of information products on diskette, CD-ROM, and dissemination via the Internet. Libraries, and acquisitions units in particular, are being challenged to provide consistent and timely management of the information. The rapidly developing communications infrastructure, which frequently redesigns access to the information environment, poses significant obstacles to, and the tremendous opportunities for, making large bodies of government information available to a broad base of users.

  4. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-01-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized. PMID:26960247

  5. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-03-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.

  6. Information and management system for the secondary electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Knezevic, M. (Rudnik i Termoelectrana Gacko u Osnivanju (Yugoslavia))

    1988-07-01

    Emphasizes the importance of a reliable and continuous secondary electrical distribution network for surface coal mine productivity. Interruptions in equipment operation caused by mechanical and electrical failures should be eliminated without delay. Effective communication systems should lead to reliable management and high productivity in mines. It is suggested that mines be divided into four groups according to their sensitivity to supply interruptions, and provided with remotely controlled signalling devices linked to main and auxiliary dispatching stations equipped with micro-computers. Productivity may be increased by some 50-70% and supply costs decreased by some 35% if appropriate electrical distribution systems are used. A sketch of a secondary electrical supply network is attached. 11 refs.

  7. Information Collection using Handheld Devices in Unreliable Networking Environments

    Science.gov (United States)

    2014-06-01

    joint logistics operations center JMS Java Message System JUNG Java Universal Network/Graph Framework KTG Kestral Technology Group MILOB... Java Message System, a Publisher/Subscriber system that is explained in greater detail at either Oracle’s JMS site (Oracle 2014) or the JMS Wikipedia...Google’s infrastructure and local servers with MySQL and PostgreSQL on the backend (ODK 2014b). (2) Google Fusion Tables are used to do basic link

  8. CONVERGING REDUNDANT SENSOR NETWORK INFORMATION FOR IMPROVED BUILDING CONTROL

    Energy Technology Data Exchange (ETDEWEB)

    Dale K. Tiller; Gregor P. Henze

    2004-11-01

    Knowing how many people occupy a building, and where they are located, is a key component of building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, however, current sensor technology and control algorithms limit the effectiveness of both energy management and security systems. This topical report describes results from the first phase of a project to design, implement, validate, and prototype new technologies to monitor occupancy, control indoor environment services, and promote security in buildings. Phase I of the project focused on instrumentation and data collection. In this project phase a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Analysis tools based on Bayesian probability theory were applied to the occupancy data generated by the sensor network. The inference of primary importance is a probability distribution over the number of occupants and their locations in a building, given past and present sensor measurements. Inferences were computed for occupancy and its temporal persistence in individual offices as well as the persistence of sensor status. The raw sensor data were also used to calibrate the sensor belief network, including the occupancy transition matrix used in the Markov model, sensor sensitivity, and sensor failure models. This study shows that the belief network framework can be applied to the analysis of data streams from sensor networks, offering significant benefits to building operation compared to current practice.

  9. Information Extraction from Large-Multi-Layer Social Networks

    Science.gov (United States)

    2015-08-06

    mization [4]. Methods that fall into this category include spec- tral algorithms, modularity methods, and methods that rely on statistical inference...Snijders and Chris Baerveldt, “A multilevel network study of the effects of delinquent behavior on friendship evolution,” Journal of mathematical sociol- ogy...1970. [10] Ulrike Luxburg, “A tutorial on spectral clustering,” Statistics and Computing, vol. 17, no. 4, pp. 395–416, Dec. 2007. [11] R. A. Fisher, “On

  10. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  11. Thinking in networks: artistic–architectural responses to ubiquitous information

    Directory of Open Access Journals (Sweden)

    Yvonne Spielmann

    2011-12-01

    Full Text Available The article discusses creative practices that in aesthetical-technical ways intervene into the computer networked communication systems.I am interested in artist practices that use networks in different ways to make us aware about the possibilities to rethink media-cultural environments. I use the example of the Japanese art-architectural group Double Negative Architecture to give an example of creatively thinking in networks.Yvonne Spielmann (Ph.D., Dr. habil. is presently Research Professor and Chair of New Media at The University of the West of Scotland. Her work focuses on inter-relationships between media and culture, technology, art, science and communication, and in particular on Western/European and non-Western/South-East Asian interaction. Milestones of publish research output are four authored monographs and about 90 single authored articles. Her book, “Video, the Reflexive Medium” (published by MIT Press 2008, Japanese edition by Sangen-sha Press 2011 was rewarded the 2009 Lewis Mumford Award for Outstanding Scholarship in the Ecology of Technics. Her most recent book “Hybrid Cultures” was published in German by Suhrkamp Press in 2010, English edition from MIT Press in 2012. Spielmann's work has been published in German and English and has been translated into French, Polish, Croatian, Swedish, Japanese, and Korean. She holds the 2011 Swedish Prize for Swedish–German scientific co-operation.

  12. IPSN monitoring capabilities and information networks in accidental situation

    International Nuclear Information System (INIS)

    Calmet, D.; Robeau, D.

    1992-01-01

    In 1989, a Radiological Transmission and Early Warning System (SYTAR) came into being in order to harmonize radioactivity surveillance methodologies and furthermore to trigger off an alert throughout the networks whenever an unusual degree of radioactivity is detected. SYTAR is a remote permanent system linking up a national electronic access and the radiation protection services of nuclear facilities located on the mainland. The structure of the network are particularly presented in the framework of a drill organized on october 1991 in the south-east of France. During this drill, an accident was simulated on a ghost nuclear power plant located in the Cadarache Nuclear Center. A large number of samples were taken from filtered aerosols, soils, grass, milk, vegetables, food stuff; they were contaminated with Caesium 137 and Iodine 131 before to be sent to laboratories for measurements. The results of measurements were transmitted to the actors of the drill using SYTAR network. They permit to determine the exclusion area, the radiological impacts and counter-measures. (author)

  13. Fast mapping rapidly integrates information into existing memory networks.

    Science.gov (United States)

    Coutanche, Marc N; Thompson-Schill, Sharon L

    2014-12-01

    Successful learning involves integrating new material into existing memory networks. A learning procedure known as fast mapping (FM), thought to simulate the word-learning environment of children, has recently been linked to distinct neuroanatomical substrates in adults. This idea has suggested the (never-before tested) hypothesis that FM may promote rapid incorporation into cortical memory networks. We test this hypothesis here in 2 experiments. In our 1st experiment, we introduced 50 participants to 16 unfamiliar animals and names through FM or explicit encoding (EE) and tested participants on the training day, and again after sleep. Learning through EE produced strong declarative memories, without immediate lexical competition, as expected from slow-consolidation models. Learning through FM, however, led to almost immediate lexical competition, which continued to the next day. Additionally, the learned words began to prime related concepts on the day following FM (but not EE) training. In a 2nd experiment, we replicated the lexical integration results and determined that presenting an already-known item during learning was crucial for rapid integration through FM. The findings presented here indicate that learned items can be integrated into cortical memory networks at an accelerated rate through fast mapping. The retrieval of a related known concept, in order to infer the target of the FM question, is critical for this effect. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  14. Rural Health Networks: How Network Analysis Can Inform Patient Care and Organizational Collaboration in a Rural Breast Cancer Screening Network.

    Science.gov (United States)

    Prusaczyk, Beth; Maki, Julia; Luke, Douglas A; Lobb, Rebecca

    2018-04-15

    Rural health networks have the potential to improve health care quality and access. Despite this, the use of network analysis to study rural health networks is limited. The purpose of this study was to use network analysis to understand how a network of rural breast cancer care providers deliver services and to demonstrate the value of this methodology in this research area. Leaders at 47 Federally Qualified Health Centers and Rural Health Clinics across 10 adjacent rural counties were asked where they refer patients for mammograms or breast biopsies. These clinics and the 22 referral providers that respondents named comprised the network. The network was analyzed graphically and statistically with exponential random graph modeling. Most (96%, n = 45) of the clinics and referral sites (95%, n = 21) are connected to each other. Two clinics of the same type were 62% less likely to refer patients to the same providers as 2 clinics of different types (OR = 0.38, 95% CI = 0.29-0.50). Clinics in the same county have approximately 8 times higher odds of referring patients to the same providers compared to clinics in different counties (OR = 7.80, CI = 4.57-13.31). This study found that geographic location of resources is an important factor in rural health care providers' referral decisions and demonstrated the usefulness of network analysis for understanding rural health networks. These results can be used to guide delivery of patient care and strengthen the network by building resources that take location into account. © 2018 National Rural Health Association.

  15. A constructive logic for services and information flow in computer networks

    NARCIS (Netherlands)

    Borghuis, V.A.J.; Feijs, L.M.G.

    2000-01-01

    In this paper we introduce a typed -calculus in which computer networks can be formalized and directed at situations where the services available on the network are stationary, while the information can flow freely. For this calculus, an analogue of the ‘propositions-as-types ’interpretation of

  16. The Role of Social Support and Social Networks in Health Information Seeking Behavior among Korean Americans

    Science.gov (United States)

    Kim, Wonsun

    2013-01-01

    Access to health information appears to be a crucial piece of the racial and ethnic health disparities puzzle among immigrants. There are a growing number of scholars who are investigating the role of social networks that have shown that the number and even types of social networks among minorities and lower income groups differ (Chatman, 1991;…

  17. Dynamic logics of networks: Information flow and the spread of opinion

    NARCIS (Netherlands)

    Christoff, Z.L.

    2016-01-01

    This thesis uses logical tools to investigate a number of basic features of social networks and their evolution over time, including flow of information and spread of opinions. Part I contains the preliminaries, including an introduction to the basic phenomena in social networks that call for a

  18. Methodology for Simulation and Analysis of Complex Adaptive Supply Network Structure and Dynamics Using Information Theory

    Directory of Open Access Journals (Sweden)

    Joshua Rodewald

    2016-10-01

    Full Text Available Supply networks existing today in many industries can behave as complex adaptive systems making them more difficult to analyze and assess. Being able to fully understand both the complex static and dynamic structures of a complex adaptive supply network (CASN are key to being able to make more informed management decisions and prioritize resources and production throughout the network. Previous efforts to model and analyze CASN have been impeded by the complex, dynamic nature of the systems. However, drawing from other complex adaptive systems sciences, information theory provides a model-free methodology removing many of those barriers, especially concerning complex network structure and dynamics. With minimal information about the network nodes, transfer entropy can be used to reverse engineer the network structure while local transfer entropy can be used to analyze the network structure’s dynamics. Both simulated and real-world networks were analyzed using this methodology. Applying the methodology to CASNs allows the practitioner to capitalize on observations from the highly multidisciplinary field of information theory which provides insights into CASN’s self-organization, emergence, stability/instability, and distributed computation. This not only provides managers with a more thorough understanding of a system’s structure and dynamics for management purposes, but also opens up research opportunities into eventual strategies to monitor and manage emergence and adaption within the environment.

  19. Success Factors and Challenges of an Information Communication Technology Network in Rural Schools

    Science.gov (United States)

    Mihai, Maryke A.

    2017-01-01

    In April 2008, an interactive information communication technology (ICT) network was established in Mpumalanga, South Africa. the network involved the implementation of SMART board interactive whiteboards (IWBs) and collaboration between a leading school and several disadvantaged schools. the main purpose of the Mpumalanga IWB project was to reach…

  20. Synthetic aperture radar ship discrimination, generation and latent variable extraction using information maximizing generative adversarial networks

    CSIR Research Space (South Africa)

    Schwegmann, Colin P

    2017-07-01

    Full Text Available such as Synthetic Aperture Radar imagery. To aid in the creation of improved machine learning-based ship detection and discrimination methods this paper applies a type of neural network known as an Information Maximizing Generative Adversarial Network. Generative...