WorldWideScience

Sample records for file sharing networks

  1. Kwaabana: File sharing for rural networks

    CSIR Research Space (South Africa)

    Johnson, DL

    2013-12-01

    Full Text Available , Zambia. The results show that our localized file sharing service facilitates reliable sharing amongst rural users. Importantly, it also removes the cost barrier present for similar Internet-based services. We outline the process used by Kwaabana...

  2. Controlling P2P File-Sharing Networks Traffic

    OpenAIRE

    García Pineda, Miguel; HAMMOUMI, MOHAMMED; Canovas Solbes, Alejandro; Lloret, Jaime

    2011-01-01

    Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many Internet users have chosen this technology to share and search programs, videos, music, documents, etc. The total number of P2P file-sharing users has been increasing and decreasing in the last decade depending on the creation or end of some well known P2P file-sharing systems. P2P file-sharing networks traffic is currently overloading some data networks and it is a major headache for netw...

  3. Characteristics of file sharing and peer to peer networking | Opara ...

    African Journals Online (AJOL)

    Characteristics of file sharing and peer to peer networking. ... distributing or providing access to digitally stored information, such as computer programs, ... including in multicast systems, anonymous communications systems, and web caches.

  4. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  5. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  6. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    OpenAIRE

    Wang, Lei; Wang, Qing

    2017-01-01

    In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D) communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the netw...

  7. Folksonomical P2P File Sharing Networks Using Vectorized KANSEI Information as Search Tags

    Science.gov (United States)

    Ohnishi, Kei; Yoshida, Kaori; Oie, Yuji

    We present the concept of folksonomical peer-to-peer (P2P) file sharing networks that allow participants (peers) to freely assign structured search tags to files. These networks are similar to folksonomies in the present Web from the point of view that users assign search tags to information distributed over a network. As a concrete example, we consider an unstructured P2P network using vectorized Kansei (human sensitivity) information as structured search tags for file search. Vectorized Kansei information as search tags indicates what participants feel about their files and is assigned by the participant to each of their files. A search query also has the same form of search tags and indicates what participants want to feel about files that they will eventually obtain. A method that enables file search using vectorized Kansei information is the Kansei query-forwarding method, which probabilistically propagates a search query to peers that are likely to hold more files having search tags that are similar to the query. The similarity between the search query and the search tags is measured in terms of their dot product. The simulation experiments examine if the Kansei query-forwarding method can provide equal search performance for all peers in a network in which only the Kansei information and the tendency with respect to file collection are different among all of the peers. The simulation results show that the Kansei query forwarding method and a random-walk-based query forwarding method, for comparison, work effectively in different situations and are complementary. Furthermore, the Kansei query forwarding method is shown, through simulations, to be superior to or equal to the random-walk based one in terms of search speed.

  8. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems

    Directory of Open Access Journals (Sweden)

    Mo Zhou

    2007-01-01

    Full Text Available The architecture of P2P file-sharing applications has been developing to meet the needs of large scale demands. The structured overlay network, also known as DHT, has been used in these applications to improve the scalability, and robustness of the system, and to make it free from single-point failure. We believe that the measurement study of the overlay network used in the real file-sharing P2P systems can provide guidance for the designing of such systems, and improve the performance of the system. In this paper, we perform the measurement in two different aspects. First, a modified client is designed to provide view to the overlay network from a single-user vision. Second, the instances of crawler programs deployed in many nodes managed to crawl the user information of the overlay network as much as possible. We also find a vulnerability in the overlay network, combined with the character of the DNS service, a more serious DDoS attack can be launched.

  9. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  10. Competitive Status Signaling in Peer-to-Peer File-Sharing Networks

    Directory of Open Access Journals (Sweden)

    Henry F. Lyle

    2007-04-01

    Full Text Available Internet peer-to-peer file sharing is a contemporary example of asymmetrical sharing in which “altruists” (file uploaders share unconditionally with non-reciprocating “free riders” (file downloaders. Those who upload digital media files over the Internet risk prosecution for copyright infringement, and are more vulnerable to computer hackers and viruses. In an analysis of file-sharing behavior among university undergraduates (N=331, we found that significantly more males than females engaged in risky file uploading. Contrary to expectations, uploaders were not concerned about their reputation online and file sharers were not interested in identifying or chatting with uploaders while online. Among uploaders, males were more likely than females to be identified as uploaders by friends, to discuss uploading and to upload in the presence of peers. We interpret these results using costly-signaling theory, and argue that uploading is a costly signal in which males engage in avoidable risk taking as a means to compete for status among peers in social contexts other than the Internet.

  11. Online file sharing innovations in media consumption

    CERN Document Server

    Andersson Schwarz, Jonas

    2013-01-01

    It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, ""piracy,"" and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality th

  12. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  13. Efficient File Sharing by Multicast - P2P Protocol Using Network Coding and Rank Based Peer Selection

    Science.gov (United States)

    Stoenescu, Tudor M.; Woo, Simon S.

    2009-01-01

    In this work, we consider information dissemination and sharing in a distributed peer-to-peer (P2P highly dynamic communication network. In particular, we explore a network coding technique for transmission and a rank based peer selection method for network formation. The combined approach has been shown to improve information sharing and delivery to all users when considering the challenges imposed by the space network environments.

  14. Reliable file sharing in distributed operating system using web RTC

    Science.gov (United States)

    Dukiya, Rajesh

    2017-12-01

    Since, the evolution of distributed operating system, distributed file system is come out to be important part in operating system. P2P is a reliable way in Distributed Operating System for file sharing. It was introduced in 1999, later it became a high research interest topic. Peer to Peer network is a type of network, where peers share network workload and other load related tasks. A P2P network can be a period of time connection, where a bunch of computers connected by a USB (Universal Serial Bus) port to transfer or enable disk sharing i.e. file sharing. Currently P2P requires special network that should be designed in P2P way. Nowadays, there is a big influence of browsers in our life. In this project we are going to study of file sharing mechanism in distributed operating system in web browsers, where we will try to find performance bottlenecks which our research will going to be an improvement in file sharing by performance and scalability in distributed file systems. Additionally, we will discuss the scope of Web Torrent file sharing and free-riding in peer to peer networks.

  15. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  16. SHARAF: The Canadian Shared Authority File Project.

    Science.gov (United States)

    MacIntosh, Helen

    1982-01-01

    Describes history, operating procedures, and current activities of group of users of the University of Toronto Library Automation System (UTLAS) who cooperated with each other, the bibliographic utility, and the National Library of Canada to produce an automated authority control system, termed Shared Authority File (SHARAF). Five references are…

  17. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  18. Implementing Journaling in a Linux Shared Disk File System

    Science.gov (United States)

    Preslan, Kenneth W.; Barry, Andrew; Brassow, Jonathan; Cattelan, Russell; Manthei, Adam; Nygaard, Erling; VanOort, Seth; Teigland, David; Tilstra, Mike; O'Keefe, Matthew; hide

    2000-01-01

    In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channel and Gigabit Ethernet provide the scaffolding from which higher performance computer systems implementations may be constructed, but new thinking is required about how machines interact with network-enabled storage devices. In this paper we describe how we implemented journaling in the Global File System (GFS), a shared-disk, cluster file system for Linux. Our previous three papers on GFS at the Mass Storage Symposium discussed our first three GFS implementations, their performance, and the lessons learned. Our fourth paper describes, appropriately enough, the evolution of GFS version 3 to version 4, which supports journaling and recovery from client failures. In addition, GFS scalability tests extending to 8 machines accessing 8 4-disk enclosures were conducted: these tests showed good scaling. We describe the GFS cluster infrastructure, which is necessary for proper recovery from machine and disk failures in a collection of machines sharing disks using GFS. Finally, we discuss the suitability of Linux for handling the big data requirements of supercomputing centers.

  19. Benchmarking and monitoring framework for interconnected file synchronization and sharing services

    DEFF Research Database (Denmark)

    Mrówczyński, Piotr; Mościcki, Jakub T.; Lamanna, Massimo

    2018-01-01

    computing and storage infrastructure in the research labs. In this work we present a benchmarking and monitoring framework for file synchronization and sharing services. It allows service providers to monitor the operational status of their services, understand the service behavior under different load...... types and with different network locations of the synchronization clients. The framework is designed as a monitoring and benchmarking tool to provide performance and robustness metrics for interconnected file synchronization and sharing services such as Open Cloud Mesh....

  20. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  1. To share or not to share? Business aspects of network sharing for Mobile Network Operators

    NARCIS (Netherlands)

    Berkers, F.T.H.M.; Hendrix, G.; Chatzicharistou, I.; Haas, T. de; Hamera, D.

    2010-01-01

    Radio spectrum and network infrastructure are two essential resources for mobile service delivery, which are both costly and increasingly scarce. In this paper we consider drivers and barriers of network sharing, which is seen as a potential solution for scarcity in these resources. We considered a

  2. Digital music and subculture: Sharing files, sharing styles

    OpenAIRE

    Ebare, Sean

    2004-01-01

    In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around issues of anonymity and trust, identity experimentation, and online communication...

  3. Zebra: A striped network file system

    Science.gov (United States)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  4. Digital music and subculture: Sharing files, sharing styles (originally published in February 2004)

    OpenAIRE

    Ebare, Sean

    2005-01-01

    Digital music and subculture: Sharing files, sharing styles by Sean Ebare In this paper I propose a new approach for the study of online music sharing communities, drawing from popular music studies and cyberethnography. I describe how issues familiar to popular music scholars — identity and difference, subculture and genre hybridity, and the political economy of technology and music production and consumption — find homologues in the dynamics of online communication, centering around iss...

  5. United Network for Organ Sharing

    Science.gov (United States)

    ... donor families & recipients Organ donation facts Policy Policy development Policy brochures Membership Data Transplant trends Data resources Technology Get Involved EDUCATE Become a UNOS Ambassador Promote organ donation Share through social media VISIT Attend a UNOS event Tour the National ...

  6. Network node for peripheral sharing

    International Nuclear Information System (INIS)

    Bobbitt, J.; Johnson, M.

    1977-01-01

    A module which enables several independent computer systems to share the peripherals (graphics display and line printer) of a PDP-11 computer is described. The module requires no software support in the PDP-11

  7. Evolutionary Game Theory-Based Evaluation of P2P File-Sharing Systems in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Yusuke Matsuda

    2010-01-01

    Full Text Available Peer-to-Peer (P2P file sharing is one of key technologies for achieving attractive P2P multimedia social networking. In P2P file-sharing systems, file availability is improved by cooperative users who cache and share files. Note that file caching carries costs such as storage consumption and processing load. In addition, users have different degrees of cooperativity in file caching and they are in different surrounding environments arising from the topological structure of P2P networks. With evolutionary game theory, this paper evaluates the performance of P2P file sharing systems in such heterogeneous environments. Using micro-macro dynamics, we analyze the impact of the heterogeneity of user selfishness on the file availability and system stability. Further, through simulation experiments with agent-based dynamics, we reveal how other aspects, for example, synchronization among nodes and topological structure, affect the system performance. Both analytical and simulation results show that the environmental heterogeneity contributes to the file availability and system stability.

  8. Legal, economic and cultural aspects of file sharing

    NARCIS (Netherlands)

    van Eijk, N.; Poort, J.P.; Rutten, P.

    2010-01-01

    This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the

  9. Tuning chaos in network sharing common nonlinearity

    Science.gov (United States)

    Paul Asir, M.; Jeevarekha, A.; Philominathan, P.

    2016-06-01

    In this paper, a novel type of network called network sharing common nonlinearity comprising both autonomous and non-autonomous oscillators have been investigated. We propose that these networks are robust for operating at desired modes i.e., chaotic or periodic by altering the v-i characteristics of common nonlinear element alone. The dynamics of these networks were examined through numerical, analytical, experimental and Multisim simulations.

  10. Automatic creation of LabVIEW network shared variables

    International Nuclear Information System (INIS)

    Kluge, T.; Schroeder, H.

    2012-01-01

    We are in the process of preparing the LabVIEW controlled system components of our Solid State Direct Drive experiments for the integration into a Supervisory Control And Data Acquisition (SCADA) or distributed control system. The predetermined route to this is the generation of LabVIEW network shared variables that can easily be exported by LabVIEW to the SCADA system using OLE for Process Control (OPC) or other means. Many repetitive tasks are associated with the creation of the shared variables and the required code. We are introducing an efficient and inexpensive procedure that automatically creates shared variable libraries and sets default values for the shared variables. Furthermore, LabVIEW controls are created that are used for managing the connection to the shared variable inside the LabVIEW code operating on the shared variables. The procedure takes as input an XML spread-sheet defining the required input. The procedure utilizes XSLT and LabVIEW scripting. In a later state of the project the code generation can be expanded to also create code and configuration files that will become necessary in order to access the shared variables from the SCADA system of choice. (authors)

  11. Cytoscape file of chemical networks

    Data.gov (United States)

    U.S. Environmental Protection Agency — The maximum connectivity scores of pairwise chemical conditions summarized from Cmap results in a file with Cytoscape format (http://www.cytoscape.org/). The figures...

  12. Sagnac secret sharing over telecom fiber networks.

    Science.gov (United States)

    Bogdanski, Jan; Ahrens, Johan; Bourennane, Mohamed

    2009-01-19

    We report the first Sagnac quantum secret sharing (in three-and four-party implementations) over 1550 nm single mode fiber (SMF) networks, using a single qubit protocol with phase encoding. Our secret sharing experiment has been based on a single qubit protocol, which has opened the door to practical secret sharing implementation over fiber telecom channels and in free-space. The previous quantum secret sharing proposals were based on multiparticle entangled states, difficult in the practical implementation and not scalable. Our experimental data in the three-party implementation show stable (in regards to birefringence drift) quantum secret sharing transmissions at the total Sagnac transmission loop distances of 55-75 km with the quantum bit error rates (QBER) of 2.3-2.4% for the mean photon number micro?= 0.1 and 1.7-2.1% for micro= 0.3. In the four-party case we have achieved quantum secret sharing transmissions at the total Sagnac transmission loop distances of 45-55 km with the quantum bit error rates (QBER) of 3.0-3.7% for the mean photon number micro= 0.1 and 1.8-3.0% for micro?= 0.3. The stability of quantum transmission has been achieved thanks to our new concept for compensation of SMF birefringence effects in Sagnac, based on a polarization control system and a polarization insensitive phase modulator. The measurement results have showed feasibility of quantum secret sharing over telecom fiber networks in Sagnac configuration, using standard fiber telecom components.

  13. COMBINE archive and OMEX format: one file to share all information to reproduce a modeling project.

    Science.gov (United States)

    Bergmann, Frank T; Adams, Richard; Moodie, Stuart; Cooper, Jonathan; Glont, Mihai; Golebiewski, Martin; Hucka, Michael; Laibe, Camille; Miller, Andrew K; Nickerson, David P; Olivier, Brett G; Rodriguez, Nicolas; Sauro, Herbert M; Scharm, Martin; Soiland-Reyes, Stian; Waltemath, Dagmar; Yvon, Florent; Le Novère, Nicolas

    2014-12-14

    With the ever increasing use of computational models in the biosciences, the need to share models and reproduce the results of published studies efficiently and easily is becoming more important. To this end, various standards have been proposed that can be used to describe models, simulations, data or other essential information in a consistent fashion. These constitute various separate components required to reproduce a given published scientific result. We describe the Open Modeling EXchange format (OMEX). Together with the use of other standard formats from the Computational Modeling in Biology Network (COMBINE), OMEX is the basis of the COMBINE Archive, a single file that supports the exchange of all the information necessary for a modeling and simulation experiment in biology. An OMEX file is a ZIP container that includes a manifest file, listing the content of the archive, an optional metadata file adding information about the archive and its content, and the files describing the model. The content of a COMBINE Archive consists of files encoded in COMBINE standards whenever possible, but may include additional files defined by an Internet Media Type. Several tools that support the COMBINE Archive are available, either as independent libraries or embedded in modeling software. The COMBINE Archive facilitates the reproduction of modeling and simulation experiments in biology by embedding all the relevant information in one file. Having all the information stored and exchanged at once also helps in building activity logs and audit trails. We anticipate that the COMBINE Archive will become a significant help for modellers, as the domain moves to larger, more complex experiments such as multi-scale models of organs, digital organisms, and bioengineering.

  14. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  15. A peer-to-peer file search and download protocol for wireless ad-hoc networks

    NARCIS (Netherlands)

    Sözer, Hasan; Tekkalmaz, M.; Korpeoglu, I.

    Deployment of traditional peer-to-peer file sharing systems on a wireless ad-hoc network introduces several challenges. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their immediate neighborhood. In this

  16. Sharing cost in social community networks

    DEFF Research Database (Denmark)

    Pal, Ranjan; Elango, Divya; Wardana, Satya Ardhy

    2012-01-01

    their deployment in a residential locality. Our proposed mechanism accounts for heterogeneous user preferences towards different router features and comes up with the optimal (feature-set, user costs) router blueprint that satisfies each user in a locality, in turn motivating them to buy routers and thereby improve......Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting...... reflect their slow progress in capturing the WiFi router market. In this paper, we look at a router design and cost sharing problem in WSCNs to improve deployment. We devise a simple to implement, successful, budget-balanced, ex-post efficient, and individually rational auction-based mechanism...

  17. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  18. 47 CFR 27.1305 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Shared wireless broadband network. 27.1305... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  19. 47 CFR 90.1405 - Shared wireless broadband network.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Shared wireless broadband network. 90.1405... broadband network. The Shared Wireless Broadband Network developed by the 700 MHz Public/Private Partnership must be designed to meet requirements associated with a nationwide, public safety broadband network. At...

  20. Ethical considerations of using information obtained from online file sharing sites: The case of the piratebay

    NARCIS (Netherlands)

    van Wynsberghe, Amy Louise; van der Ham, Jeroen

    2015-01-01

    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the

  1. Ethical considerations of using information obtained from online file sharing sites : The case of the piratebay

    NARCIS (Netherlands)

    van Wynsberghe, A.; van der Ham, J.

    2015-01-01

    Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data collected from an online file-sharing site known as The PirateBay. Since the creation of Napster back in the late 1990s for the sharing and distribution of MP3 files across the Internet, the

  2. Elvis is returning to the building: understanding a decline in unauthorized file sharing

    NARCIS (Netherlands)

    Poort, J.; Weda, J.

    2015-01-01

    A set of representative consumer surveys shows that in the Netherlands unauthorized file sharing of music has declined substantially between 2008 and 2012. It decreased slightly for games, but almost doubled for films and TV series. Overall, file sharing dropped from 38% to 27% of the population.

  3. Guest editorial - Networked collaboration, sharing and response

    Directory of Open Access Journals (Sweden)

    Olav Skundberg

    2008-11-01

    Full Text Available  This issue of Seminar.net contains three articles that were written in connection with a Norwegian e-learning conference titled “Networked collaboration, sharing and response”. The conference was held in Mars 2008 in Trondheim, and the presentations from the conference is available (in norwegian language at http://www.nvu.no. Networked collaboration was chosen as a theme because collaboration is important to achieve learning, according to the social-constructivistic pedagogy that has a strong standing in Norway, but how should this occur on the net? Sharing of content, as in digital learning resources, is a phenomenon with increasing popularity as described in the OECD-report “Giving Knowledge for Free”. But to achieve reuse of content, not only publishing it, it is important with a networked community where the plethora of information can be sorted with relevance to specific topics. Response is about guiding, coaching and tutoring. In what ways may resources and tools be used to move in the direction of solving Bloom’s two sigma problem/challenge? The first article, by Morten Flate Paulsen, shows how cooperative learning can be implemented successfully so that students have optimal individual freedom within online learning communities. The second article, by Carl F. Dons, shows how student teachers can be prepared to deal with pupils who have a wide range of experiences of the digital world. The third and last article, by Kristin Dale, is sharing experiences with multiple choice-tests to give midterm responses to students. In addition, this issue has a commentary article by Rune Krumsvik discussing the need to develop new practices for teachers and students on the background of the digital developments. The conference and articles covers three big themes. It may be difficult to find more important issues, apart from finding money and time to support its development. Olav Skundberg, guest editorAssociate professor

  4. Traffic sharing algorithms for hybrid mobile networks

    Science.gov (United States)

    Arcand, S.; Murthy, K. M. S.; Hafez, R.

    1995-01-01

    In a hybrid (terrestrial + satellite) mobile personal communications networks environment, a large size satellite footprint (supercell) overlays on a large number of smaller size, contiguous terrestrial cells. We assume that the users have either a terrestrial only single mode terminal (SMT) or a terrestrial/satellite dual mode terminal (DMT) and the ratio of DMT to the total terminals is defined gamma. It is assumed that the call assignments to and handovers between terrestrial cells and satellite supercells take place in a dynamic fashion when necessary. The objectives of this paper are twofold, (1) to propose and define a class of traffic sharing algorithms to manage terrestrial and satellite network resources efficiently by handling call handovers dynamically, and (2) to analyze and evaluate the algorithms by maximizing the traffic load handling capability (defined in erl/cell) over a wide range of terminal ratios (gamma) given an acceptable range of blocking probabilities. Two of the algorithms (G & S) in the proposed class perform extremely well for a wide range of gamma.

  5. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  6. Solving data-at-rest for the storage and retrieval of files in ad hoc networks

    Science.gov (United States)

    Knobler, Ron; Scheffel, Peter; Williams, Jonathan; Gaj, Kris; Kaps, Jens-Peter

    2013-05-01

    Based on current trends for both military and commercial applications, the use of mobile devices (e.g. smartphones and tablets) is greatly increasing. Several military applications consist of secure peer to peer file sharing without a centralized authority. For these military applications, if one or more of these mobile devices are lost or compromised, sensitive files can be compromised by adversaries, since COTS devices and operating systems are used. Complete system files cannot be stored on a device, since after compromising a device, an adversary can attack the data at rest, and eventually obtain the original file. Also after a device is compromised, the existing peer to peer system devices must still be able to access all system files. McQ has teamed with the Cryptographic Engineering Research Group at George Mason University to develop a custom distributed file sharing system to provide a complete solution to the data at rest problem for resource constrained embedded systems and mobile devices. This innovative approach scales very well to a large number of network devices, without a single point of failure. We have implemented the approach on representative mobile devices as well as developed an extensive system simulator to benchmark expected system performance based on detailed modeling of the network/radio characteristics, CONOPS, and secure distributed file system functionality. The simulator is highly customizable for the purpose of determining expected system performance for other network topologies and CONOPS.

  7. Students' Acceptance of File Sharing Systems as a Tool for Sharing Course Materials: The Case of Google Drive

    Science.gov (United States)

    Sadik, Alaa

    2017-01-01

    Students' perceptions about both ease of use and usefulness are fundamental factors in determining their acceptance and successful use of technology in higher education. File sharing systems are one of these technologies and can be used to manage and deliver course materials and coordinate virtual teams. The aim of this study is to explore how…

  8. Fluid limits for Bandwidth-Sharing Networks with Impatience.

    NARCIS (Netherlands)

    Remerova, M.; Reed, J.; Zwart, A.P.

    2014-01-01

    Bandwidth-sharing networks as introduced by Roberts and Massoulié [Roberts JW, Massoulié L (1998) Bandwidth sharing and admission control for elastic traffic. Proc. ITC Specialist Seminar, Yokohama, Japan], Massoulié and Roberts [Massoulié L, Roberts JW (1999) Bandwidth sharing: Objectives and

  9. Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

    Science.gov (United States)

    Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.

    2016-11-01

    The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.

  10. Social Networks Impacts on Knowledge Sharing Among Public ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Keywords- Social networks, Social media, Facebook, Twitter, and. Linkedin, Knowledge ... of knowledge sharing among public education students which the researcher see as .... frankness with teaching sphere. The American ...

  11. Cooperative storage of shared files in a parallel computing system with dynamic block size

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-11-10

    Improved techniques are provided for parallel writing of data to a shared object in a parallel computing system. A method is provided for storing data generated by a plurality of parallel processes to a shared object in a parallel computing system. The method is performed by at least one of the processes and comprises: dynamically determining a block size for storing the data; exchanging a determined amount of the data with at least one additional process to achieve a block of the data having the dynamically determined block size; and writing the block of the data having the dynamically determined block size to a file system. The determined block size comprises, e.g., a total amount of the data to be stored divided by the number of parallel processes. The file system comprises, for example, a log structured virtual parallel file system, such as a Parallel Log-Structured File System (PLFS).

  12. OK, Computer: File Sharing, the Music Industry, and Why We Need the Pirate Party

    Directory of Open Access Journals (Sweden)

    Adrian Cosstick

    2009-03-01

    Full Text Available The Pirate Party believes the state and big business are in the process of protecting stale and inefficient models of business for their own monetary benefit by limiting our right to share information. The Pirate Party suggests that they are achieving this goal through the amendment of intellectual property legislation. In the dawn of the digital era, the Pirate Party advocates that governments and multinational corporations are using intellectual property to: crack down on file sharing which limits the ability to share knowledge and information; increase the terms and length of copyright to raise profits; and build code into music files which limits their ability to be shared (Pirate Party, 2009. There are a number of ‘copyright industries’ that are affected by these issues, none more so than the music industry. Its relationship with file sharing is topical and makes an excellent case study to address the impact big business has had on intellectual property and the need for the Pirate Party’s legislative input. The essay will then examine the central issues raised by illegal file sharing. In particular, the future for record companies in an environment that increasingly demands flexibility, and whether the Pirate Party’s proposal is a viable solution to the music industry’s problems

  13. Fluid Limits for Bandwidth-Sharing Networks in Overload.

    NARCIS (Netherlands)

    Borst, S.; Egorova, R.; Zwart, A.P.

    2014-01-01

    Bandwidth-sharing networks as considered by Roberts and Massoulié [28] (Roberts JW, Massoulié L (1998) Bandwidth sharing and admission control for elastic traffic. Proc. ITC Specialist Seminar, Yokohama, Japan) provide a natural modeling framework for describing the dynamic flow-level interaction

  14. Fluid limits for bandwidth-sharing networks in overload

    NARCIS (Netherlands)

    Borst, S.C.; Egorova, R.R.; Zwart, B.

    2014-01-01

    Bandwidth-sharing networks as considered by Roberts and Massoulié [28] (Roberts JW, Massoulié L (1998) Bandwidth sharing and admission control for elastic traffic. Proc. ITC Specialist Seminar, Yokohama, Japan) provide a natural modeling framework for describing the dynamic flow-level interaction

  15. The role of network sharing in transforming the operator business: Impact on profitability and competition

    OpenAIRE

    Mölleryd, Bengt G.; Markendahl, Jan

    2013-01-01

    This paper focuses on network sharing on mobile networks and examines the impact on profitability and competition. Network sharing refers to that operators collaborates with its competitors on part of the production of mobile services, and it could vary from passive sharing, like sharing of sites or basic facilities, to active sharing, like radio access networks or even entire networks. The paper takes a global scope on examining the extent of network sharing. The emergence of a sector with d...

  16. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  17. Private Sharing of User Location over Online Social Networks

    OpenAIRE

    Freudiger, Julien; Neu, Raoul; Hubaux, Jean-Pierre

    2010-01-01

    Online social networks increasingly allow mobile users to share their location with their friends. Much to the detriment of users’ privacy, this also means that social network operators collect users’ lo- cation. Similarly, third parties can learn users’ location from localization and location visualization services. Ideally, third-parties should not be given complete access to users’ location. To protect location privacy, we design and implement a platform-independent solution for users to s...

  18. Fluid limits for bandwidth-sharing networks with rate constraints

    NARCIS (Netherlands)

    M. Frolkova (Masha); J. Reed (Josh); A.P. Zwart (Bert)

    2013-01-01

    htmlabstractBandwidth-sharing networks as introduced by Massouli\\'e~\\& Roberts (1998) model the dynamic interaction among an evolving population of elastic flows competing for several links. With policies based on optimization procedures, such models are of interest both from a~Queueing Theory and

  19. Optimizing Knowledge Sharing in Learning Networks through Peer Tutoring

    NARCIS (Netherlands)

    Hsiao, Amy; Brouns, Francis; Kester, Liesbeth; Sloep, Peter

    2009-01-01

    Hsiao, Y. P., Brouns, F., Kester, L., & Sloep, P. (2009). Optimizing Knowledge Sharing in Learning Networks through Peer Tutoring. Presentation at the IADIS international conference on Cognition and Exploratory in Digital Age (CELDA 2009). November, 20-22, 2009, Rome, Italy.

  20. Optimizing Knowledge Sharing In Learning Networks Through Peer Tutoring

    NARCIS (Netherlands)

    Hsiao, Amy; Brouns, Francis; Kester, Liesbeth; Sloep, Peter

    2009-01-01

    Hsiao, Y. P., Brouns, F., Kester, L., & Sloep, P. B. (2009). Optimizing Knowledge Sharing In Learning Networks Through Peer Tutoring. In D. Kinshuk, J. Sampson, J. Spector, P. Isaías, P. Barbosa & D. Ifenthaler (Eds.). Proceedings of IADIS International Conference Cognition and Exploratory Learning

  1. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  2. Sharing is caring, but not error free: transparency of granular controls for sharing personal health information in social networks.

    Science.gov (United States)

    Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda

    2011-01-01

    When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.

  3. Author's rights in the digital age: how Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs

    Directory of Open Access Journals (Sweden)

    Milijana Micunovic

    2016-01-01

    Full Text Available Author's rights and copyright law have gone through quite a few changes in the 'post-print' culture of binary systems, digital formations and techno-practices. Technological development supports new concept of author's rights by promoting free internet and digital market, as well as new contemporary experience of culture that is being rooted in digital technology, mass communication and the world of multimedia and virtuality. Though computer and digital technology have served both authors and users in various ways, they have also served as a very fertile ground for sharing copyrighted content thus leading to numerous copyright infringements and conflicts with the copyright law. The aim of this paper is to identify and analyze the ways in which computer and digital technology have given rise to new trends in the production (e.g. remix culture and consumption (e.g. peer-to-peer file sharing technology of culture, but also to determine how new forms of distribution, use and sharing of digital content changed and shaped the perception of authorship in the 21st century. In order to analyze the dynamic, nature and structure by which new digital and networking technologies are affecting the concept of authorship and author's rights and to test the consistency of previously established hypotheses, we conducted a survey amongst general public. Altogether 535 questionnaires were completed. Data was analyzed using SPSS tool and quantitative method of analysis. In the analysis special attention was given to both, the concept of authorship in the digital environment and the concept of peer-to-peer file sharing technology as not so new, but still very popular networked architecture for distributing, using and sharing digital content. Results have shown that most of the respondents use peer-to-peer file sharing technology to access, consume and/or share different cultural content (e.g. movies, music, books, etc. while violating the rights of copyright holders

  4. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  5. Generalized Load Sharing for Homogeneous Networks of Distributed Environment

    Directory of Open Access Journals (Sweden)

    A. Satheesh

    2008-01-01

    Full Text Available We propose a method for job migration policies by considering effective usage of global memory in addition to CPU load sharing in distributed systems. When a node is identified for lacking sufficient memory space to serve jobs, one or more jobs of the node will be migrated to remote nodes with low memory allocations. If the memory space is sufficiently large, the jobs will be scheduled by a CPU-based load sharing policy. Following the principle of sharing both CPU and memory resources, we present several load sharing alternatives. Our objective is to reduce the number of page faults caused by unbalanced memory allocations for jobs among distributed nodes, so that overall performance of a distributed system can be significantly improved. We have conducted trace-driven simulations to compare CPU-based load sharing policies with our policies. We show that our load sharing policies not only improve performance of memory bound jobs, but also maintain the same load sharing quality as the CPU-based policies for CPU-bound jobs. Regarding remote execution and preemptive migration strategies, our experiments indicate that a strategy selection in load sharing is dependent on the amount of memory demand of jobs, remote execution is more effective for memory-bound jobs, and preemptive migration is more effective for CPU-bound jobs. Our CPU-memory-based policy using either high performance or high throughput approach and using the remote execution strategy performs the best for both CPU-bound and memory-bound job in homogeneous networks of distributed environment.

  6. The impacts of network competence, knowledge sharing on service innovation performance: Moderating role of relationship quality

    Directory of Open Access Journals (Sweden)

    Zaoquan Jian

    2013-03-01

    Full Text Available Purpose: To examine how network competence, knowledge sharing and relationship quality affect service innovation performanceDesign/methodology/approach: Empirical ResearchFindings: 1 Both enterprise’s network competence and knowledge sharing have distinct positive impact on SIP; (2 Knowledge sharing partially mediates the effect of network competence on SIP. (3 Relationship quality positively moderates the effect of network competence on knowledge sharing, and the effect of knowledge sharing on SIP. (4 Relationship quality does not positively moderate the effect of network competence on SIP.Originality/value: This study has enriched current understanding of the relationship among network competence, knowledge sharing, relationship quality and service innovation performance.

  7. Enabling Interoperable and Selective Data Sharing among Social Networking Sites

    Science.gov (United States)

    Shin, Dongwan; Lopes, Rodrigo

    With the widespread use of social networking (SN) sites and even introduction of a social component in non-social oriented services, there is a growing concern over user privacy in general, how to handle and share user profiles across SN sites in particular. Although there have been several proprietary or open source-based approaches to unifying the creation of third party applications, the availability and retrieval of user profile information are still limited to the site where the third party application is run, mostly devoid of the support for data interoperability. In this paper we propose an approach to enabling interopearable and selective data sharing among SN sites. To support selective data sharing, we discuss an authenticated dictionary (ADT)-based credential which enables a user to share only a subset of her information certified by external SN sites with applications running on an SN site. For interoperable data sharing, we propose an extension to the OpenSocial API so that it can provide an open source-based framework for allowing the ADT-based credential to be used seamlessly among different SN sites.

  8. Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt

    2010-01-01

    in high mobility conditions. These goals can be only achieved through the use highly Optimized Local Area (OLA) access networks, operating at low range and low power transmissions. The efficient sharing of radio resources among OLAs will be very difficult to achieve with a traditional network planning......The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...

  9. 78 FR 3447 - Information Collection: Southern Alaska Sharing Network and Subsistence Study; Submitted for OMB...

    Science.gov (United States)

    2013-01-16

    ... local sharing networks that structure contemporary subsistence-cash economies using research methods... Collection: Southern Alaska Sharing Network and Subsistence Study; Submitted for OMB Review; Comment Request... conducting a survey on subsistence and sharing networks in coastal Alaska. This notice provides the public a...

  10. Legal Effects of Link Sharing in Social Networks

    Directory of Open Access Journals (Sweden)

    Eugenio Gil

    2015-12-01

    Full Text Available Knowledge sharing among individuals has changed deeply with the advent of social networks in the environment of Web 2.0. Every user has the possibility of publishing what he or she deems of interest for their audience, regardless of the origin or authorship of the piece of knowledge. It is generally accepted that as the user is sharing a link to a document or video, for example, without getting paid for it, there is no point in worrying about the rights of the original author. It seems that the concepts of authorship and originality is about to disappear as promised the structuralists fifty years ago. Nevertheless the legal system has not changed, nor have the economic interests concerned. This paper explores the last developments of the legal system concerning these issues.

  11. Multi-Resolution Playback of Network Trace Files

    Science.gov (United States)

    2015-06-01

    insertion, populateDB organizes the packet data by Open Systems Interconnec- tion model ( OSI ) layer, links each packet with those in the same flow to create...well as replay based on a statistical model of a network trace file. This thesis attempts to create such a system and to fulfil the requirements set...Lastly, the statistical model generated from characteristics of the original trace proved to accurately model the original capture and provide for a user

  12. File Detection On Network Traffic Using Approximate Matching

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial.Within this paper we present a new technique for network trac analysis based on approximate matching (a.k.a fuzzy hashing which is very common in digital forensics to correlate similar files. This paper demonstrates how to optimize and apply them on single network packets. Our contribution is a straightforward concept which does not need a comprehensive conguration: hash the file and store the digest in the database. Within our experiments we obtained false positive rates between 10-4 and 10-5 and an algorithm throughput of over 650 Mbit/s.

  13. Social Network Perspective: Model of Student Knowledge Sharing On Social Network Media

    OpenAIRE

    Bentar Priyopradono; Danny Manongga; Wiranto H. Utomo

    2012-01-01

    Recently, the role and development of information technology especially the internet, gives impact and influence in social relationship especially for social network site services users. The impact and influence the use of Internet which is related to exchange information and knowledge sharing still become one of the interesting topics to be researched. Now, the use of social media network by students are the best way to them to increase their knowledge as communication media such as, exchang...

  14. The national drug abuse treatment clinical trials network data share project: website design, usage, challenges, and future directions.

    Science.gov (United States)

    Shmueli-Blumberg, Dikla; Hu, Lian; Allen, Colleen; Frasketi, Michael; Wu, Li-Tzy; Vanveldhuisen, Paul

    2013-01-01

    There are many benefits of data sharing, including the promotion of new research from effective use of existing data, replication of findings through re-analysis of pooled data files, meta-analysis using individual patient data, and reinforcement of open scientific inquiry. A randomized controlled trial is considered as the 'gold standard' for establishing treatment effectiveness, but clinical trial research is very costly, and sharing data is an opportunity to expand the investment of the clinical trial beyond its original goals at minimal costs. We describe the goals, developments, and usage of the Data Share website (http://www.ctndatashare.org) for the National Drug Abuse Treatment Clinical Trials Network (CTN) in the United States, including lessons learned, limitations, and major revisions, and considerations for future directions to improve data sharing. Data management and programming procedures were conducted to produce uniform and Health Insurance Portability and Accountability Act (HIPAA)-compliant de-identified research data files from the completed trials of the CTN for archiving, managing, and sharing on the Data Share website. Since its inception in 2006 and through October 2012, nearly 1700 downloads from 27 clinical trials have been accessed from the Data Share website, with the use increasing over the years. Individuals from 31 countries have downloaded data from the website, and there have been at least 13 publications derived from analyzing data through the public Data Share website. Minimal control over data requests and usage has resulted in little information and lack of control regarding how the data from the website are used. Lack of uniformity in data elements collected across CTN trials has limited cross-study analyses. The Data Share website offers researchers easy access to de-identified data files with the goal to promote additional research and identify new findings from completed CTN studies. To maximize the utility of the website

  15. Count Your Calories and Share Them: Health Benefits of Sharing mHealth Information on Social Networking Sites.

    Science.gov (United States)

    Oeldorf-Hirsch, Anne; High, Andrew C; Christensen, John L

    2018-04-23

    This study investigates the relationship between sharing tracked mobile health (mHealth) information online, supportive communication, feedback, and health behavior. Based on the Integrated Theory of mHealth, our model asserts that sharing tracked health information on social networking sites benefits users' perceptions of their health because of the supportive communication they gain from members of their online social networks and that the amount of feedback people receive moderates these associations. Users of mHealth apps (N = 511) completed an online survey, and results revealed that both sharing tracked health information and receiving feedback from an online social network were positively associated with supportive communication. Network support both corresponded with improved health behavior and mediated the association between sharing health information and users' health behavior. As users received greater amounts of feedback from their online social networks, however, the association between sharing tracked health information and health behavior decreased. Theoretical implications for sharing tracked health information and practical implications for using mHealth apps are discussed.

  16. Information sharing and relationships on social networking sites.

    Science.gov (United States)

    Steijn, Wouter M P; Schouten, Alexander P

    2013-08-01

    This article investigates the relationship between sharing personal information and relationship development in the context of social networking sites (SNSs). Information disclosed on these sites could affect relationships in a different manner compared to more traditional interactions, such as instant messaging or face-to-face interaction. Respondents in the age range of 12 to 83 were surveyed about experiences of relationship development as a consequence of contact through Facebook or Hyves-the most popular Dutch SNSs. Results showed a primarily positive effect of information sharing on SNSs on our relationships. Furthermore, relationship development mainly occurs among acquaintances and friends, and public posts are most strongly related to relationship development. These findings suggest that SNSs might affect relationships in a distinct fashion as acquaintances and friends gain access to public self-disclosures that might normally only be reserved for close friends and family. Overall, this study provides an insight into some of the positive aspects of the public nature of SNSs in contrast with the general negative associations.

  17. A Hybrid Energy Sharing Framework for Green Cellular Networks

    KAUST Repository

    Farooq, Muhammad Junaid

    2016-12-09

    Cellular operators are increasingly turning towards renewable energy (RE) as an alternative to using traditional electricity in order to reduce operational expenditure and carbon footprint. Due to the randomness in both RE generation and mobile traffic at each base station (BS), a surplus or shortfall of energy may occur at any given time. To increase energy selfreliance and minimize the network’s energy cost, the operator needs to efficiently exploit the RE generated across all BSs. In this paper, a hybrid energy sharing framework for cellular network is proposed, where a combination of physical power lines and energy trading with other BSs using smart grid is used. Algorithms for physical power lines deployment between BSs, based on average and complete statistics of the net RE available, are developed. Afterwards, an energy management framework is formulated to optimally determine the quantities of electricity and RE to be procured and exchanged among BSs, respectively, while considering battery capacities and real-time energy pricing. Three cases are investigated where RE generation is unknown, perfectly known, and partially known ahead of time. Results investigate the time varying energy management of BSs and demonstrate considerable reduction in average energy cost thanks to the hybrid energy sharing scheme.

  18. Request queues for interactive clients in a shared file system of a parallel computing system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin

    2015-08-18

    Interactive requests are processed from users of log-in nodes. A metadata server node is provided for use in a file system shared by one or more interactive nodes and one or more batch nodes. The interactive nodes comprise interactive clients to execute interactive tasks and the batch nodes execute batch jobs for one or more batch clients. The metadata server node comprises a virtual machine monitor; an interactive client proxy to store metadata requests from the interactive clients in an interactive client queue; a batch client proxy to store metadata requests from the batch clients in a batch client queue; and a metadata server to store the metadata requests from the interactive client queue and the batch client queue in a metadata queue based on an allocation of resources by the virtual machine monitor. The metadata requests can be prioritized, for example, based on one or more of a predefined policy and predefined rules.

  19. Optimal File-Distribution in Heterogeneous and Asymmetric Storage Networks

    Science.gov (United States)

    Langner, Tobias; Schindelhauer, Christian; Souza, Alexander

    We consider an optimisation problem which is motivated from storage virtualisation in the Internet. While storage networks make use of dedicated hardware to provide homogeneous bandwidth between servers and clients, in the Internet, connections between storage servers and clients are heterogeneous and often asymmetric with respect to upload and download. Thus, for a large file, the question arises how it should be fragmented and distributed among the servers to grant "optimal" access to the contents. We concentrate on the transfer time of a file, which is the time needed for one upload and a sequence of n downloads, using a set of m servers with heterogeneous bandwidths. We assume that fragments of the file can be transferred in parallel to and from multiple servers. This model yields a distribution problem that examines the question of how these fragments should be distributed onto those servers in order to minimise the transfer time. We present an algorithm, called FlowScaling, that finds an optimal solution within running time {O}(m log m). We formulate the distribution problem as a maximum flow problem, which involves a function that states whether a solution with a given transfer time bound exists. This function is then used with a scaling argument to determine an optimal solution within the claimed time complexity.

  20. Shared Leadership and Team Creativity: A Social Network Analysis in Engineering Design Teams

    Directory of Open Access Journals (Sweden)

    Qiong Wu

    2016-06-01

    Full Text Available This research explores the relationship between shared leadership and creativity in engineering design teams. To do this, a social network perspective was adopted using four measures to assess key elements of shared leadership networks. These are (a network density, (b centralization, (c efficiency and (d strength. Data was collected from a sample of 22 engineering design teams who adopt a shared leadership approach. Our results support previous findings that the density of a shared leadership network is positively related to team creativity. In contrast, we learned that centralization exerts a negative influence on it. Moreover, while we found that there is no evidence to support a positive correlation between efficiency and team creativity, we demonstrate an inverted U-shaped relationship between strength and team creativity in a shared leadership network. These findings are important because they add to the academic debate in the shared leadership area and provide valuable insights for managers.

  1. Parallel checksumming of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-09-06

    Checksum values are generated and used to verify the data integrity. A client executing in a parallel computing system stores a data chunk to a shared data object on a storage node in the parallel computing system. The client determines a checksum value for the data chunk; and provides the checksum value with the data chunk to the storage node that stores the shared object. The data chunk can be stored on the storage node with the corresponding checksum value as part of the shared object. The storage node may be part of a Parallel Log-Structured File System (PLFS), and the client may comprise, for example, a Log-Structured File System client on a compute node or burst buffer. The checksum value can be evaluated when the data chunk is read from the storage node to verify the integrity of the data that is read.

  2. Resource sharing in wireless networks: The SAPHYRE approach

    NARCIS (Netherlands)

    Jorswieck, E.A.; Badia, L.; Fahldieck, T.; Gesbert, D.; Gustafsson, S.; Haardt, M.; Ho, K.-M.; Karipidis, E.; Kortke, A.; Larsson, E.G.; Mark, H.; Nawrocki, M.; Piesiewicz, R.; Römer, F.; Schubert, M.; Sykora, J.; Trommelen, P.H.; Ende, B.D. van; Zorzi, M.

    2010-01-01

    Physical resource sharing between wireless operators and service providers is necessary in order to support efficient, competitive, and innovative wireless communication markets. By sharing resources, such as spectrum or infrastructure, which are usually exclusively allocated interference is created

  3. Sharing for Health: A Study of Chinese Adolescents' Experiences and Perspectives on Using Social Network Sites to Share Health Information.

    Science.gov (United States)

    Zhang, Ni; Teti, Michele; Stanfield, Kellie; Campo, Shelly

    2017-07-01

    This exploratory qualitative study examines Chinese adolescents' health information sharing habits on social network sites. Ten focus group meetings with 76 adolescents, ages 12 to 17 years, were conducted at community-based organizations in Chicago's Chinatown. The research team transcribed the recording and analyzed the transcripts using ATLAS.ti. Chinese adolescents are using different social network sites for various topics of health information including food, physical activity, and so on. Adolescents would share useful and/or interesting health information. Many adolescents raised credibility concerns regarding health information and suggested evaluating the information based on self-experience or intuition, word-of-mouth, or information online. The findings shed lights on future intervention using social network sites to promote health among Chinese adolescents in the United States. Future interventions should provide adolescents with interesting and culturally sensitive health information and educate them to critically evaluate health information on social network sites.

  4. Parallel compression of data chunks of a shared data object using a log-structured file system

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2016-10-25

    Techniques are provided for parallel compression of data chunks being written to a shared object. A client executing on a compute node or a burst buffer node in a parallel computing system stores a data chunk generated by the parallel computing system to a shared data object on a storage node by compressing the data chunk; and providing the data compressed data chunk to the storage node that stores the shared object. The client and storage node may employ Log-Structured File techniques. The compressed data chunk can be de-compressed by the client when the data chunk is read. A storage node stores a data chunk as part of a shared object by receiving a compressed version of the data chunk from a compute node; and storing the compressed version of the data chunk to the shared data object on the storage node.

  5. Supporting the Maritime Information Dominance: Optimizing Tactical Network for Biometric Data Sharing in Maritime Interdiction Operations

    Science.gov (United States)

    2015-03-01

    biometric data collection. Capture role- player mock biometric data including finger prints, iris scans, and facial recognition photos. (MOC training...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS by Adam R. Sinsel...MARITIME INFORMATION DOMINANCE: OPTIMIZING TACTICAL NETWORK FOR BIOMETRIC DATA SHARING IN MARITIME INTERDICTION OPERATIONS 6. AUTHOR(S) Adam R

  6. The social sharing of emotion (SSE) in online social networks: a case study in Live Journal

    NARCIS (Netherlands)

    Rodriguez Hidalgo, C.T.; Tan, E.S.; Verlegh, P.W.J.

    2015-01-01

    Social Sharing of Emotion (SSE) occurs when one person shares an emotional experience with another and is considered potentially beneficial. Though social sharing has been shown prevalent in interpersonal communication, research on its occurrence and communication structure in online social networks

  7. Distributed metadata servers for cluster file systems using shared low latency persistent key-value metadata store

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Pedone, Jr., James M.; Tzelnic, Percy; Ting, Dennis P. J.; Ionkov, Latchesar A.; Grider, Gary

    2017-12-26

    A cluster file system is provided having a plurality of distributed metadata servers with shared access to one or more shared low latency persistent key-value metadata stores. A metadata server comprises an abstract storage interface comprising a software interface module that communicates with at least one shared persistent key-value metadata store providing a key-value interface for persistent storage of key-value metadata. The software interface module provides the key-value metadata to the at least one shared persistent key-value metadata store in a key-value format. The shared persistent key-value metadata store is accessed by a plurality of metadata servers. A metadata request can be processed by a given metadata server independently of other metadata servers in the cluster file system. A distributed metadata storage environment is also disclosed that comprises a plurality of metadata servers having an abstract storage interface to at least one shared persistent key-value metadata store.

  8. General-purpose computer networks and resource sharing in ERDA. Volume 3. Remote resource-sharing experience and findings

    Energy Technology Data Exchange (ETDEWEB)

    1977-07-15

    The investigation focused on heterogeneous networks in which a variety of dissimilar computers and operating systems were interconnected nationwide. Homogeneous networks, such as MFE net and SACNET, were not considered since they could not be used for general purpose resource sharing. Issues of privacy and security are of concern in any network activity. However, consideration of privacy and security of sensitive data arise to a much lesser degree in unclassified scientific research than in areas involving personal or proprietary information. Therefore, the existing mechanisms at individual sites for protecting sensitive data were relied on, and no new protection mechanisms to prevent infringement of privacy and security were attempted. Further development of ERDA networking will need to incorporate additional mechanisms to prevent infringement of privacy. The investigation itself furnishes an excellent example of computational resource sharing through a heterogeneous network. More than twenty persons, representing seven ERDA computing sites, made extensive use of both ERDA and non-ERDA computers in coordinating, compiling, and formatting the data which constitute the bulk of this report. Volume 3 analyzes the benefits and barriers encountered in actual resource sharing experience, and provides case histories of typical applications.

  9. Cost sharing in production situations and network exploitation

    NARCIS (Netherlands)

    Koster, M.A.L.

    1999-01-01

    In many real-life situations where individuals work together in a joint project, joint costs (or profits) occur which have to be shared. The central problem of cost sharing is the allocation of costs in a 'just' way among the participants. Examples are numerous and range from setting fees for the

  10. KaZaA and similar Peer-to-Peer (P2P) file-sharing applications

    CERN Multimedia

    2003-01-01

    Personal use of Peer-to-Peer (P2P) file sharing applications is NOT permitted at CERN. A non-exhaustive list of such applications, popular for exchanging music, videos, software etc, is: KaZaA, Napster, Gnutella, Edonkey2000, Napigator, Limewire, Bearshare, WinMX, Aimster, Morpheus, BitTorrent, ... You are reminded that use of CERN's Computing Facilities is governed by CERN's Computing Rules (Operational Circular No 5). They require that all users of CERN's Computing Facilities respect copyright, license and confidentiality agreements for data of any form (software, music, videos, etc). Sanctions are applicable in case of non-respect of the Computing Rules. Further details on restrictions for P2P applications are at: http://cern.ch/security/file-sharing CERN's Computing Rules are at: http://cern.ch/ComputingRules Denise Heagerty, CERN Computer Security Officer, Computer.Security@cern.ch

  11. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  12. G-ROME : semantic-driven capacity sharing among P2P networks

    NARCIS (Netherlands)

    Exarchakos, G.; Antonopoulos, N.; Salter, J.

    2007-01-01

    Purpose – The purpose of this paper is to propose a model for sharing network capacity on demand among different underloaded and overloaded P2P ROME-enabled networks. The paper aims to target networks of nodes with highly dynamic workload fluctuations that may experience a burst of traffic and/or

  13. Final report for Palestine knowledge-sharing network enhancing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Naser Qadous

    2013-08-27

    Aug 27, 2013 ... needs a Chief Knowledge Officer, a position designed for someone who can connect the loose ends between ... included, "the role of technology in knowledge sharing/management," "the resources of tacit ... Financial Report:.

  14. Attitudes towards Social Networking and Sharing Behaviors among Consumers of Direct-to-Consumer Personal Genomics.

    Science.gov (United States)

    Lee, Sandra Soo-Jin; Vernez, Simone L; Ormond, K E; Granovetter, Mark

    2013-10-14

    Little is known about how consumers of direct-to-consumer personal genetic services share personal genetic risk information. In an age of ubiquitous online networking and rapid development of social networking tools, understanding how consumers share personal genetic risk assessments is critical in the development of appropriate and effective policies. This exploratory study investigates how consumers share personal genetic information and attitudes towards social networking behaviors. Adult participants aged 23 to 72 years old who purchased direct-to-consumer genetic testing from a personal genomics company were administered a web-based survey regarding their sharing activities and social networking behaviors related to their personal genetic test results. 80 participants completed the survey; of those, 45% shared results on Facebook and 50.9% reported meeting or reconnecting with more than 10 other individuals through the sharing of their personal genetic information. For help interpreting test results, 70.4% turned to Internet websites and online sources, compared to 22.7% who consulted their healthcare providers. Amongst participants, 51.8% reported that they believe the privacy of their personal genetic information would be breached in the future. Consumers actively utilize online social networking tools to help them share and interpret their personal genetic information. These findings suggest a need for careful consideration of policy recommendations in light of the current ambiguity of regulation and oversight of consumer initiated sharing activities.

  15. Attitudes towards Social Networking and Sharing Behaviors among Consumers of Direct-to-Consumer Personal Genomics

    Directory of Open Access Journals (Sweden)

    Mark Granovetter

    2013-10-01

    Full Text Available Little is known about how consumers of direct-to-consumer personal genetic services share personal genetic risk information. In an age of ubiquitous online networking and rapid development of social networking tools, understanding how consumers share personal genetic risk assessments is critical in the development of appropriate and effective policies. This exploratory study investigates how consumers share personal genetic information and attitudes towards social networking behaviors. Methods: Adult participants aged 23 to 72 years old who purchased direct-to-consumer genetic testing from a personal genomics company were administered a web-based survey regarding their sharing activities and social networking behaviors related to their personal genetic test results. Results: 80 participants completed the survey; of those, 45% shared results on Facebook and 50.9% reported meeting or reconnecting with more than 10 other individuals through the sharing of their personal genetic information. For help interpreting test results, 70.4% turned to Internet websites and online sources, compared to 22.7% who consulted their healthcare providers. Amongst participants, 51.8% reported that they believe the privacy of their personal genetic information would be breached in the future. Conclusion: Consumers actively utilize online social networking tools to help them share and interpret their personal genetic information. These findings suggest a need for careful consideration of policy recommendations in light of the current ambiguity of regulation and oversight of consumer initiated sharing activities.

  16. Insensitivity of proportional fairness in critically loaded bandwidth sharing networks

    NARCIS (Netherlands)

    Vlasiou, M.; Zhang, J.; Zwart, B.

    2014-01-01

    Proportional fairness is a popular service allocation mechanism to describe and analyze the performance of data networks at flow level. Recently, several authors have shown that the invariant distribution of such networks admits a product form distribution under critical loading. Assuming

  17. Information Sharing Modalities for Mobile Ad-Hoc Networks

    Science.gov (United States)

    de Spindler, Alexandre; Grossniklaus, Michael; Lins, Christoph; Norrie, Moira C.

    Current mobile phone technologies have fostered the emergence of a new generation of mobile applications. Such applications allow users to interact and share information opportunistically when their mobile devices are in physical proximity or close to fixed installations. It has been shown how mobile applications such as collaborative filtering and location-based services can take advantage of ad-hoc connectivity to use physical proximity as a filter mechanism inherent to the application logic. We discuss the different modes of information sharing that arise in such settings based on the models of persistence and synchronisation. We present a platform that supports the development of applications that can exploit these modes of ad-hoc information sharing and, by means of an example, show how such an application can be realised based on the supported event model.

  18. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  19. Sci-Share: Social Networking Adapted for Distributed Scientific Collaboration, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Our goal is to develop a social networking site with novel, specially designed feature sets to enable simultaneous remote collaboration and sharing of large data...

  20. Service network design of bike sharing systems analysis and optimization

    CERN Document Server

    Vogel, Patrick

    2016-01-01

    This monograph presents a tactical planning approach for service network design in metropolitan areas. Designing the service network requires the suitable aggregation of demand data as well as the anticipation of operational relocation decisions. To this end, an integrated approach of data analysis and mathematical optimization is introduced. The book also includes a case study based on real-world data to demonstrate the benefit of the proposed service network design approach. The target audience comprises primarily research experts in the field of traffic engineering, but the book may also be beneficial for graduate students.

  1. Neural Networks through Shared Maps in Mobile Devices

    Directory of Open Access Journals (Sweden)

    William Raveane

    2014-12-01

    Full Text Available We introduce a hybrid system composed of a convolutional neural network and a discrete graphical model for image recognition. This system improves upon traditional sliding window techniques for analysis of an image larger than the training data by effectively processing the full input scene through the neural network in less time. The final result is then inferred from the neural network output through energy minimization to reach a more precize localization than what traditional maximum value class comparisons yield. These results are apt for applying this process in a mobile device for real time image recognition.

  2. Analysis of technology and business antecedents for spectrum sharing in mobile broadband networks

    OpenAIRE

    Yrjölä, S. (Seppo)

    2017-01-01

    Abstract Sharing is emerging as one of the megatrends influencing future business opportunities, and wireless communications is no exception to this development. Future mobile broadband networks will operate on different types of spectrum bands including shared spectrum, which calls for changes in the operation and management of the networks. The creation and capture of value by the different players in the mobile broadband ecosystem is expected to change due to regulation, technology, an...

  3. Factorized Estimation of Partially Shared Parameters in Diffusion Networks

    Czech Academy of Sciences Publication Activity Database

    Dedecius, Kamil; Sečkárová, Vladimíra

    2017-01-01

    Roč. 65, č. 19 (2017), s. 5153-5163 ISSN 1053-587X R&D Projects: GA ČR(CZ) GP14-06678P; GA ČR GA16-09848S Institutional support: RVO:67985556 Keywords : Diffusion network * Diffusion estimation * Heterogeneous parameters * Multitask networks Subject RIV: BD - Theory of Information OBOR OECD: Applied mathematics Impact factor: 4.300, year: 2016 http://library.utia.cas.cz/separaty/2017/AS/dedecius-0477044.pdf

  4. Resource Sharing Networks for Higher Education at State Level

    OpenAIRE

    Raman Nair, R.

    1990-01-01

    The project proposal on Development of an Information and Library Network (INFLIBNET) became a public document by 1990. The aim of INFLIBNET as provided in the report was modernizing college and university libraries in India and connecting them through a nation-wide high speed data network using the state-of-art technologies for the optimum utilization of information. INFLIBNET was envisaged to be a major player in promoting scholarly communication among academicians and researchers in India....

  5. Fair sharing of resources in a supply network with constraints

    Science.gov (United States)

    Carvalho, Rui; Buzna, Lubos; Just, Wolfram; Helbing, Dirk; Arrowsmith, David K.

    2012-04-01

    This paper investigates the effect of network topology on the fair allocation of network resources among a set of agents, an all-important issue for the efficiency of transportation networks all around us. We analyze a generic mechanism that distributes network capacity fairly among existing flow demands. The problem can be solved by semianalytical methods on a nearest-neighbor graph with one source and sink pair, when transport occurs over shortest paths. For this setup, we uncover a broad range of patterns of intersecting shortest paths as a function of the distance between the source and the sink. When the number of intersections is the maximum and the distance between the source and the sink is large, we find that a fair allocation implies a decrease of at least 50% from the maximum throughput. We also find that the histogram of the flow allocations assigned to the agents decays as a power law with exponent -1. Our semianalytical framework suggests possible explanations for the well-known reduction of the throughput in fair allocations. It also suggests that the combination of network topology and routing rules can lead to highly uneven (but fair) distributions of resources, a remark of caution to network designers.

  6. What happens when organisations embrace social networking? Knowledge sharing at a multinational business solutions corporation

    Directory of Open Access Journals (Sweden)

    C. Stafford

    2009-04-01

    Full Text Available Amid widespread resistance to online social networking tools, their effectiveness in promoting knowledge sharing in a knowledge-driven organisation was demonstrated in the study. Usage patterns, user attitudes and perceptions regarding online social networking technologies as a professional application for knowledge sharing within the workplace were investigated. Self-administered questionnaires were administered to a sample of IBM Global Business Services employees in South Africa. Upon completion of the questionnaire analysis an interview was conducted with the knowledge manager for verification and clarification purposes. The results revealed the respondents' positive attitudes regarding the use of social networking tools for knowledge sharing. The culture of knowledge sharing at IBM and the contribution that social networking tools makes within the company were uncovered. Findings disclosed that the online social networking tools were effective and that management at IBM encourages employees to make more and more use of the tools for knowledge sharing and knowledge creation. The results of this study demonstrate the effectiveness of online social networking tools and serve as encouragement to hesitant organisations to adopt social networking in their business practices.

  7. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    KAUST Repository

    Khan, Fahd Ahmed; Tourki, Kamel; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2014-01-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent

  8. Fixed-Point Approximations of Bandwidth-Sharing Networks with Rate Constraints

    NARCIS (Netherlands)

    M. Frolkova (Masha); J. Reed (Josh); A.P. Zwart (Bert)

    2011-01-01

    htmlabstractBandwidth-sharing networks are important flow level models of communication networks. We focus on the fact that it takes a signicant number of users to saturate a link, necessitating the inclusion of individual rate constraints. In particular we extend work of Reed & Zwart on fluid

  9. Knowledge sharing in an Emerging Network of Practice: The Role of a Knowledge Portal

    NARCIS (Netherlands)

    P.J. van Baalen (Peter); J.M. Bloemhof-Ruwaard (Jacqueline); H.W.G.M. van Heck (Eric)

    2005-01-01

    textabstractThis article addresses the emergence of networks of practice and the role of knowledge sharing via knowledge portals. Its focus is on factors that stimulate the successful emergence of networks of practice. Literature on knowledge management and communities of practice suggest the

  10. Categorical Structure among Shared Features in Networks of Early-Learned Nouns

    Science.gov (United States)

    Hills, Thomas T.; Maouene, Mounir; Maouene, Josita; Sheya, Adam; Smith, Linda

    2009-01-01

    The shared features that characterize the noun categories that young children learn first are a formative basis of the human category system. To investigate the potential categorical information contained in the features of early-learned nouns, we examine the graph-theoretic properties of noun-feature networks. The networks are built from the…

  11. Dynamic segment shared protection for multicast traffic in meshed wavelength-division-multiplexing optical networks

    Science.gov (United States)

    Liao, Luhua; Li, Lemin; Wang, Sheng

    2006-12-01

    We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.

  12. Protocol of networks using energy sharing collisions of bright solitons

    Indian Academy of Sciences (India)

    Equations (13a) and (13b) can be satisfied by choosing αk as .... (right) configurations of the two-soliton solution in the Manakov-type system on PSG. .... receivers of messages, the present phase change can be used as protocols of network.

  13. Knowledge Sharing via Social Networking Platforms in Organizations

    Science.gov (United States)

    Kettles, Degan

    2012-01-01

    Knowledge Management Systems have been actively promoted for decades within organizations but have frequently failed to be used. Recently, deployments of enterprise social networking platforms used for knowledge management have become commonplace. These platforms help harness the knowledge of workers by serving as repositories of knowledge as well…

  14. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    be improved. However, we identify the benefit of individual operators and show that it’s not equal but highly depends on the initial network dimensioning. Furthermore, we demonstrate that under specific conditions the blocking probability in an area is lower than for fully accessible system and therefore...

  15. 47 CFR 90.1410 - Network sharing agreement.

    Science.gov (United States)

    2010-10-01

    ... intangible assets sold. This right and option shall be senior to, and have priority over, any other right... purchase the network assets if and whenever such assets are otherwise to be sold and an irrevocable and... assets if and whenever the Upper 700 MHz D Block license is cancelled or terminated, by reason of default...

  16. 47 CFR 27.1310 - Network sharing agreement.

    Science.gov (United States)

    2010-10-01

    ... intangible assets sold. This right and option shall be senior to, and have priority over, any other right... purchase the network assets if and whenever such assets are otherwise to be sold and an irrevocable and... assets if and whenever the Upper 700 MHz D Block license is cancelled or terminated, by reason of default...

  17. A Spontaneous Ad Hoc Network to Share WWW Access

    Directory of Open Access Journals (Sweden)

    Lloret Jaime

    2010-01-01

    Full Text Available In this paper, we propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction, to grant a quick, easy, and secure access to the users to surf the Web. The paper shows the description of our proposal, the procedure of the nodes involved in the system, the security algorithms implemented, and the designed messages. We have taken into account the security and its performance. Although some people have defined and described the main features of spontaneous ad-hoc networks, nobody has published any design and simulation until today. Spontaneous networking will enable a more natural form of wireless computing when people physically meet in the real world. We also validate the success of our proposal through several simulations and comparisons with a regular architecture, taking into account the optimization of the resources of the devices. Finally, we compare our proposal with other caching techniques published in the related literature. The proposal has been developed with the main objective of improving the communication and integration between different study centers of low-resource communities. That is, it lets communicate spontaneous networks, which are working collaboratively and which have been created on different physical places.

  18. The long term agroecosystem research network - shared research strategy

    Science.gov (United States)

    Jean L. Steiner; Timothy Strickland; Peter J.A. Kleinman; Kris Havstad; Thomas B. Moorman; M.Susan Moran; Phil Hellman; Ray B. Bryant; David Huggins; Greg McCarty

    2016-01-01

    While current weather patterns and rapidly accelerated changes in technology often focus attention on short-term trends in agriculture, the fundamental demands on modern agriculture to meet society food, feed, fuel and fiber production while providing the foundation for a healthy environment requires long-term perspective. The Long- Term Agroecoystem Research Network...

  19. IBM Software Defined Storage and ownCloud Enterprise Editon - a perfect match for hyperscale Enterprise File Sync and Share

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    IBM Software Defined Storage, in particular the technology offering codenamed Elastic Storage (based on GPFS technology) has proven to be an ideal match for Enterprise File Sync and Share (EFSS) solutions that need highly scalable storage. The presentation will provide insight into the integration of Elastic Storage with the ownCloud Enterprise Edition (based on Open Source technology) software that showed impressive scalability and performance metrics during a proof-of-concept phase of an installation that is supposed to serve 300000 users when fully deployed.

  20. mEducator: A Best Practice Network for Repurposing and Sharing Medical Educational Multi-type Content

    Science.gov (United States)

    Bamidis, Panagiotis D.; Kaldoudi, Eleni; Pattichis, Costas

    Although there is an abundance of medical educational content available in individual EU academic institutions, this is not widely available or easy to discover and retrieve, due to lack of standardized content sharing mechanisms. The mEducator EU project will face this lack by implementing and experimenting between two different sharing mechanisms, namely, one based one mashup technologies, and one based on semantic web services. In addition, the mEducator best practice network will critically evaluate existing standards and reference models in the field of e-learning in order to enable specialized state-of-the-art medical educational content to be discovered, retrieved, shared, repurposed and re-used across European higher academic institutions. Educational content included in mEducator covers and represents the whole range of medical educational content, from traditional instructional teaching to active learning and experiential teaching/studying approaches. It spans the whole range of types, from text to exam sheets, algorithms, teaching files, computer programs (simulators or games) and interactive objects (like virtual patients and electronically traced anatomies), while it covers a variety of topics. In this paper, apart from introducing the relevant project concepts and strategies, emphasis is also placed on the notion of (dynamic) user-generated content, its advantages and peculiarities, as well as, gaps in current research and technology practice upon its embedding into existing standards.

  1. The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

    Directory of Open Access Journals (Sweden)

    Y. B. Li

    2012-09-01

    Full Text Available The competitive price game model is used to analyze the spectrum sharing problem in the cognitive radio networks, and the spectrum sharing problem with the constraints of available spectrum resource from primary users is further discussed in this paper. The Rockafeller multiplier method is applied to deal with the constraints of available licensed spectrum resource, and the improved profits function is achieved, which can be used to measure the impact of shared spectrum price strategies on the system profit. However, in the competitive spectrum sharing problem of practical cognitive radio network, primary users have to determine price of the shared spectrum without the acknowledgement of the other primary user’s price strategies. Thus a fast gradient iterative calculation method of equilibrium price is proposed, only with acknowledgement of the price strategies of shared spectrum during last cycle. Through the adaptive iteration at the direction with largest gradient of improved profit function, the equilibrium price strategies can be achieved rapidly. It can also avoid the predefinition of adjustment factor according to the parameters of communication system in conventional linear iteration method. Simulation results show that the proposed competitive price spectrum sharing model can be applied in the cognitive radio networks with constraints of available licensed spectrum, and it has better convergence performance.

  2. Sharing waste management data over a wide area computer network

    International Nuclear Information System (INIS)

    Menke, W.; Friberg, P.

    1992-01-01

    In this paper the authors envision a time when waste management professionals from any institution will be able to access high quality data, regardless of where this data may actually be archived. They will not have to know anything about where the data actually resides or what format it is stored in. They will only have to specify the type of data and the workstation software will handle the rest of the details of finding them and accessing them. A method - now in use at the Lamont-Doherty Geological Observatory of Columbia University and several other institutions - of achieving this vision is described in this paper. Institutions make views of their databases publicly available to users of the wide-area network (e.g. Internet), using database serving software that runs on one of their computers. This software completely automates the process of finding out what kind of data are available and of retrieving them

  3. Distributed opportunistic spectrum sharing in cognitive radio networks

    KAUST Repository

    Hawa, Mohammed

    2016-05-19

    In cases where the licensed radio spectrum is underutilized, cognitive radio technology enables cognitive devices to sense and then dynamically access this scarce resource making the most out of it. In this work, we introduce a simple and intuitive, yet powerful and efficient, technique that allows opportunistic channel access in cognitive radio systems in a completely distributed fashion. Our proposed method achieves very high values of spectrum utilization and throughput. It also minimizes interference between cognitive base stations and the primary users licensed to use the spectrum. The algorithm responds quickly and efficiently to variations in the network parameters and also achieves a high degree of fairness between cognitive base stations. © 2016 John Wiley & Sons, Ltd.

  4. If you can't beat 'em, join 'em: Cooperative and non-cooperative games in network sharing

    NARCIS (Netherlands)

    Offergelt, F.H.S.; Berkers, F.T.H.M.; Hendrix, G.P.

    2011-01-01

    No Mobile Network Operator (MNO) will make the decision to share its network lightly. There are many financial and strategic considerations to this question. In this paper we outline a non-cooperative game which can be used to model the strategic decision of an MNO regarding mobile network sharing

  5. Sharing and community curation of mass spectrometry data with Global Natural Products Social Molecular Networking

    DEFF Research Database (Denmark)

    Wang, Mingxun; Carver, Jeremy J.; Pevzner, Pavel

    2016-01-01

    are well-suited to high-throughput characterization of NP, there is a pressing need for an infrastructure to enable sharing and curation of data. We present Global Natural Products Social Molecular Networking (GNPS; http://gnps.ucsd.edu), an open-access knowledge base for community-wide organization...... and sharing of raw, processed or identified tandem mass (MS/MS) spectrometry data. In GNPS, crowdsourced curation of freely available community-wide reference MS libraries will underpin improved annotations. Data-driven social-networking should facilitate identification of spectra and foster collaborations...

  6. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge Bow-Nan Cheng, Greg Kuperman, Patricia Deutsch, Logan...been a large push in the U.S. Department of Defense to move to an all Internet Protocol (IP) infrastructure, particularly on the tactical edge . IP and...lossy links, and scaling to large numbers of users. Unfortunately, these are the exact conditions military tactical edge networks must operate within

  7. Sharing of Alcohol-Related Content on Social Networking Sites: Frequency, Content, and Correlates.

    Science.gov (United States)

    Erevik, Eilin K; Torsheim, Torbjørn; Vedaa, Øystein; Andreassen, Cecilie S; Pallesen, Ståle

    2017-05-01

    The present study aimed to explore students' reports of their sharing of alcohol-related content on different social networking sites (i.e., frequency of sharing and connotations of alcohol-related posts), and to identify indicators of such posting. Students at the four largest institutions for higher education in Bergen, Norway, were invited to participate in an Internet-based survey. The sample size was 11,236 (a 39.4% response rate). The survey included questions about disclosure of alcohol-related content on social networking sites, alcohol use (using the Alcohol Use Disorders Identification Test), personality factors (using the Mini-IPIP), and demographic characteristics. Binary logistic regressions were used to analyze indicators of frequent sharing of alcohol-related content depicting positive and negative aspects of alcohol use. A majority of the students had posted alcohol-related content (71.0%), although few reported having done so frequently. Positive aspects of alcohol use (e.g., enjoyment or social community) were most frequently shared. Young, single, and extroverted students with high alcohol consumption were more likely to report frequent sharing of alcohol-related content. Positive attitudes toward posting alcohol-related content and reports of exposure to such content particularly increased the likelihood of one's own posting of alcohol-related content. Positive aspects of alcohol use seem to be emphasized on social networking sites. Sharing of alcohol-related content is associated with heightened alcohol use, which implies that such sites can be relevant for prevention agents. Social influence from social networking sites, such as exposure to others' alcohol-related content, is associated with one's own sharing of similar content.

  8. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  9. COMBINE archive and OMEX format : One file to share all information to reproduce a modeling project

    NARCIS (Netherlands)

    Bergmann, Frank T.; Olivier, Brett G.; Soiland-Reyes, Stian

    2014-01-01

    Background: With the ever increasing use of computational models in the biosciences, the need to share models and reproduce the results of published studies efficiently and easily is becoming more important. To this end, various standards have been proposed that can be used to describe models,

  10. Distributed generation of shared RSA keys in mobile ad hoc networks

    Science.gov (United States)

    Liu, Yi-Liang; Huang, Qin; Shen, Ying

    2005-12-01

    Mobile Ad Hoc Networks is a totally new concept in which mobile nodes are able to communicate together over wireless links in an independent manner, independent of fixed physical infrastructure and centralized administrative infrastructure. However, the nature of Ad Hoc Networks makes them very vulnerable to security threats. Generation and distribution of shared keys for CA (Certification Authority) is challenging for security solution based on distributed PKI(Public-Key Infrastructure)/CA. The solutions that have been proposed in the literature and some related issues are discussed in this paper. The solution of a distributed generation of shared threshold RSA keys for CA is proposed in the present paper. During the process of creating an RSA private key share, every CA node only has its own private security. Distributed arithmetic is used to create the CA's private share locally, and that the requirement of centralized management institution is eliminated. Based on fully considering the Mobile Ad Hoc network's characteristic of self-organization, it avoids the security hidden trouble that comes by holding an all private security share of CA, with which the security and robustness of system is enhanced.

  11. Network computing infrastructure to share tools and data in global nuclear energy partnership

    International Nuclear Information System (INIS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    2010-01-01

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer - Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP. (author)

  12. More than a Master: Developing, Sharing, and Using Knowledge in School-University Research Networks

    Science.gov (United States)

    Cornelissen, Frank; Daly, Alan J.; Liou, Yi-Hwa; van Swet, Jacqueline; Beijaard, Douwe; Bergen, Theo C. M.

    2014-01-01

    Postgraduate master's programs for in-service teachers may be a promising new avenue in developing research partnership networks that link schools and university and enable collaborative development, sharing and use of knowledge of teacher research. This study explores the way these knowledge processes originating from master's students' research…

  13. Investment and Usage of New Technologies : Evidence from a Shared ATM Network

    NARCIS (Netherlands)

    Ferrari, S.; Verboven, F.L.; Degryse, H.A.

    2007-01-01

    When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment

  14. Investment and Usage of New Technologies : Evidence from a Shared ATM Network

    NARCIS (Netherlands)

    Ferrari, S.; Verboven, F.L.; Degryse, H.A.

    2008-01-01

    When new technologies become available, it is not only essential that firms have the correct investment incentives, but often also that consumers make the proper usage decisions. This paper studies investment and usage in a shared ATM network. Be- cause all banks coordinate their ATM investment

  15. Integrating market share models with network optimizing models for strategic planning in an oil pipeline company

    International Nuclear Information System (INIS)

    Smith, L.D.; Moses, S.W.

    1991-01-01

    Mathematical models of market share are constructed to describe the distribution of petroleum products from pipeline terminals, water terminals and refineries in the midcontinental United States. Network distribution models are developed to analyse the constraints and economics of alternative distribution systems. This paper describes how the two types of models were integrated for strategic planning in an oil pipeline company

  16. Data Use for School Improvement : Knowledge Sharing and Knowledge Brokerage in Network Structures

    NARCIS (Netherlands)

    Hubers, Mireille Desirée; Moolenaar, Nienke; Schildkamp, Kim; Handelzalts, Adam; Pieters, Julius Marie; Daly, A.J.; Daly, Alan J.

    2015-01-01

    Data teams are used in Dutch secondary education to support schools in data use for school improvement. Such teams are likely to be most effective when knowledge is shared between the data team members and brokered throughout the school. Social network structures may play an important role in this.

  17. Evolution of market shares with repeated purchases and heterogeneous network externalities

    NARCIS (Netherlands)

    M.C.W. Janssen (Maarten); E. Mendys

    2007-01-01

    textabstractWe investigate how market shares change when a new, superior technology exhibiting network externalities is introduced in a market initially dominated by an old technology. This is done under the assumption that consumers are heterogeneous in their valuation of technology quality and

  18. Social Networking Privacy Control: Exploring University Variables Related to Young Adults' Sharing of Personally Identifiable Information

    Science.gov (United States)

    Zimmerman, Melisa S.

    2014-01-01

    The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…

  19. Construction and Application of a National Data-Sharing Service Network of Material Environmental Corrosion

    Directory of Open Access Journals (Sweden)

    Xiaogang Li

    2007-12-01

    Full Text Available This article discusses the key features of a newly developed national data-sharing online network for material environmental corrosion. Written in Java language and based on Oracle database technology, the central database in the network is supported with two unique series of corrosion failure data, both of which were accumulated during a long period of time. The first category of data, provided by national environment corrosion test sites, is corrosion failure data for different materials in typical environments (atmosphere, seawater and soil. The other category is corrosion data in production environments, provided by a variety of firms. This network system enables standardized management of environmental corrosion data, an effective data sharing process, and research and development support for new products and after-sale services. Moreover this network system provides a firm base and data-service platform for the evaluation of project bids, safety, and service life. This article also discusses issues including data quality management and evaluation in the material corrosion data sharing process, access authority of different users, compensation for providers of shared historical data, and finally, the related policy and law legal processes, which are required to protect the intellectual property rights of the database.

  20. Secure Real-Time Monitoring and Management of Smart Distribution Grid using Shared Cellular Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Ganem, Hervé; Jorguseski, Ljupco

    2017-01-01

    capabilities. Thanks to the advanced measurement devices, management framework, and secure communication infrastructure developed in the FP7 SUNSEED project, the Distribution System Operator (DSO) now has full observability of the energy flows at the medium/low voltage grid. Furthermore, the prosumers are able......, where the smart grid ICT solutions are provided through shared cellular LTE networks....

  1. An Agent-mediated Approach to Promote Knowledge Sharing Through Enterprise Social Networks

    NARCIS (Netherlands)

    Van Splunter, S.; Sedighi, M.

    2013-01-01

    Broadening adoption of social network tools within the enterprise suggests a new and valuable source for insight into the social structure through organizations. While online social media tools are being evolved by enterprises in recent years, the social media are used much for knowledge sharing.

  2. Tracking the dynamic variations in a social network formed through shared interests

    Directory of Open Access Journals (Sweden)

    Gerold Pedemonte

    2009-06-01

    Full Text Available We tracked the dynamics of a social network formed by a shared interest in movies. Users-, movie ratings-, and rental date-data from the Netflix Prize dataset were used to construct a series of date-filtered social networks, wherein viewers were linked when they rented the same movie and gave the same rating. We obtained a nearly constant high clustering coefficient (0.60 – 0.85, and a low average path length (1.4 – 2.3 indicating a static 'small-world' network despite the dynamic behavior of the borrowers.

  3. Investigation of Load Sharing in Hybrid (2G/3G Mobile Networks

    Directory of Open Access Journals (Sweden)

    Martynas Stirbys

    2015-07-01

    Full Text Available The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indicators.

  4. Investigation of Load Sharing in Hybrid (2G/3G) Mobile Networks

    OpenAIRE

    Martynas Stirbys; Karolis Žvinys

    2015-01-01

    The main purpose of this work is to investigate load sharing methods for 2G/3G cellular networks in order to determine their impact on the network and users. One of the study aims is to analyze the performance of the methods. Moreover the paper provides an overview of the methods circumstances, limitations. Directed Retry and Load Based Handover methods were chosen. Data was obtained from real Lithuanian mobile operator’s network. The paper also discusses the changes in Key Performance Indica...

  5. Network Analysis of an Emergent Massively Collaborative Creation on Video Sharing Website

    Science.gov (United States)

    Hamasaki, Masahiro; Takeda, Hideaki; Nishimura, Takuichi

    The Web technology enables numerous people to collaborate in creation. We designate it as massively collaborative creation via the Web. As an example of massively collaborative creation, we particularly examine video development on Nico Nico Douga, which is a video sharing website that is popular in Japan. We specifically examine videos on Hatsune Miku, a version of a singing synthesizer application software that has inspired not only song creation but also songwriting, illustration, and video editing. As described herein, creators of interact to create new contents through their social network. In this paper, we analyzed the process of developing thousands of videos based on creators' social networks and investigate relationships among creation activity and social networks. The social network reveals interesting features. Creators generate large and sparse social networks including some centralized communities, and such centralized community's members shared special tags. Different categories of creators have different roles in evolving the network, e.g., songwriters gather more links than other categories, implying that they are triggers to network evolution.

  6. A self-describing file protocol for simulation integration and shared postprocessors

    International Nuclear Information System (INIS)

    Borland, M.

    1995-01-01

    A typical accelerator physics code uses a combination of text output, unformatted output, and special-purpose graphics to present results to the user. Most users must learn multiple graphics and postprocessing systems; many resort to manual extraction of data from text output, creation of customized postprocessing programs, and even modification of the simulation code. This situation slows research, results in duplication of effort, hampers unforeseen use of simulation output, and makes program upgrades potentially traumatic. This paper discusses the design and use of a self-describing file protocol that addresses these problems. An extensive toolkit of generic post-processing programs, including sophisticated graphics, is available. This system has been used for most of the data collection for Advanced Photon Source (APS) commissioning , and is incorporated into a number of simulation codes

  7. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  8. ANALISIS TRANSFER RATE PENAMBAHAN NODE PADA INFRASTRUKTUR MOBILE ADHOC NETWORK (MANET UNTUK FILE SERVER

    Directory of Open Access Journals (Sweden)

    Rudi Kurniawan

    2017-05-01

    Full Text Available Teknologi Wireless Network sudah lama ditemukan dan seiring waktu juga mengalami perkembangan, Namun sifat teknologi ini menggantungkan diri pada infrastruktur jaringan yang ada. Hal ini bias menjadi kelemahan tersendiri saat kondisi infrastruktur jaringan sedang mengalami gangguan, karena setiap komunikasi yang melewati infrastruktur jaringan tersebut tidak akan sampai pada tujuan. Teknologi jaringan Mobile Ad-hoc Network (MANET diciptakan sebagai antisipasi jika infrastruktur jaringan sedang mengalami gangguan. Dengan jaringan MANET sistem komunikasi yang dilakukan tidak membutuhkan infrastruktur jaringan karena tiap node pada jaringan tersebut bersifat mobile. Untuk menguji kemampuan MANET, pada penelitian ini akan menerapkan File Transfer Protocol (FTP sebagai media untuk melakukan komunikasi data file transfer yang diimplementasi pada jaringan MANET. Dari pengujian yang telah dilakukan diperoleh hasil bahwa File Transfer dapat berfungsi dengan baik saat diterapkan pada jaringan MANET.

  9. Time Shared Optical Network (TSON): a novel metro architecture for flexible multi-granular services.

    Science.gov (United States)

    Zervas, Georgios S; Triay, Joan; Amaya, Norberto; Qin, Yixuan; Cervelló-Pastor, Cristina; Simeonidou, Dimitra

    2011-12-12

    This paper presents the Time Shared Optical Network (TSON) as metro mesh network architecture for guaranteed, statistically-multiplexed services. TSON proposes a flexible and tunable time-wavelength assignment along with one-way tree-based reservation and node architecture. It delivers guaranteed sub-wavelength and multi-granular network services without wavelength conversion, time-slice interchange and optical buffering. Simulation results demonstrate high network utilization, fast service delivery, and low end-to-end delay on a contention-free sub-wavelength optical transport network. In addition, implementation complexity in terms of Layer 2 aggregation, grooming and optical switching has been evaluated. © 2011 Optical Society of America

  10. Scaling laws for file dissemination in P2P networks with random contacts

    NARCIS (Netherlands)

    Nunez-Queija, R.; Prabhu, B.

    2008-01-01

    In this paper we obtain the scaling law for the mean broadcast time of a file in a P2P network with an initial population of N nodes. In the model, at Poisson rate λ a node initiates a contact with another node chosen uniformly at random. This contact is said to be successful if the contacted node

  11. Scaling laws for file dissemination in P2P networks with random contacts

    NARCIS (Netherlands)

    Núñez-Queija, R.; Prabhu, B.

    2008-01-01

    In this paper we obtain the scaling law for the mean broadcast time of a file in a P2P network with an initial population of N nodes. In the model, at Poisson rate lambda a node initiates a contact with another node chosen uniformly at random. This contact is said to be successful if the contacted

  12. Knowledge sharing Network analysis and its relationship with the experience and education of librarians at Ferdowsi University of Mashhad

    Directory of Open Access Journals (Sweden)

    Maryam Salami

    2017-03-01

    Full Text Available As human resources are important resources in organization, it is important for organizations to use knowledge organization of human resources. Thus managing and sharing knowledge in organizations is so important. Libraries as well service-oriented and knowledge-based organizations, librarians’ contribution of knowledge management is important. The study tries to determine Ferdowsi University of Mashhad librarians’ participation in the process of knowledge sharing by knowledge sharing network analysis method. The application used for social network analysis is UCINET6. Determining the degree of centralization in the network of knowledge sharing can also help to detect factors may influence it. In this study, the degree of centralization in the network of knowledge sharing communicating with the librarians' qualifications and work experiences were tested. It is also determined the degree centralization of the whole of the knowledge sharing network with 26.76% that is not so satisfactory.  The results show that despite the positive relationship between level of education and the centrality of people, the experience no significant relationship. Statistically, there is also no significant difference between men and women in knowledge sharing degrees of librarians in Ferdowsi University of Mashhad. At the end, according to the results of this research some suggestions are given to increase degrees of knowledge sharing of librarians and generally knowledge sharing degree of the network knowledge sharing.

  13. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  14. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  15. Code 672 observational science branch computer networks

    Science.gov (United States)

    Hancock, D. W.; Shirk, H. G.

    1988-01-01

    In general, networking increases productivity due to the speed of transmission, easy access to remote computers, ability to share files, and increased availability of peripherals. Two different networks within the Observational Science Branch are described in detail.

  16. A Group Based Key Sharing and Management Algorithm for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Shafi Khan

    2014-01-01

    Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.

  17. A Comparative Analysis of Social Media Marketing by Transportation Network Companies in the Sharing Economy

    OpenAIRE

    Heymans, Alice

    2017-01-01

    The sharing economy is a new business model rapidly expanding. In transportation, many people use innovative services proposed by ride-hailing mobile applications. These technological platforms, operated by networking companies, rely extensively on social media to promote their services, and reach new customers (riders) and providers (drivers). This dissertation focuses on e-marketing communication. It makes a comparative analysis of the information published on several social media (Facebook...

  18. Automatic theory generation from analyst text files using coherence networks

    Science.gov (United States)

    Shaffer, Steven C.

    2014-05-01

    This paper describes a three-phase process of extracting knowledge from analyst textual reports. Phase 1 involves performing natural language processing on the source text to extract subject-predicate-object triples. In phase 2, these triples are then fed into a coherence network analysis process, using a genetic algorithm optimization. Finally, the highest-value sub networks are processed into a semantic network graph for display. Initial work on a well- known data set (a Wikipedia article on Abraham Lincoln) has shown excellent results without any specific tuning. Next, we ran the process on the SYNthetic Counter-INsurgency (SYNCOIN) data set, developed at Penn State, yielding interesting and potentially useful results.

  19. Sharing data for public health research by members of an international online diabetes social network.

    Directory of Open Access Journals (Sweden)

    Elissa R Weitzman

    2011-04-01

    Full Text Available Surveillance and response to diabetes may be accelerated through engaging online diabetes social networks (SNs in consented research. We tested the willingness of an online diabetes community to share data for public health research by providing members with a privacy-preserving social networking software application for rapid temporal-geographic surveillance of glycemic control.SN-mediated collection of cross-sectional, member-reported data from an international online diabetes SN entered into a software application we made available in a "Facebook-like" environment to enable reporting, charting and optional sharing of recent hemoglobin A1c values through a geographic display. Self-enrollment by 17% (n = 1,136 of n = 6,500 active members representing 32 countries and 50 US states. Data were current with 83.1% of most recent A1c values reported obtained within the past 90 days. Sharing was high with 81.4% of users permitting data donation to the community display. 34.1% of users also displayed their A1cs on their SN profile page. Users selecting the most permissive sharing options had a lower average A1c (6.8% than users not sharing with the community (7.1%, p = .038. 95% of users permitted re-contact. Unadjusted aggregate A1c reported by US users closely resembled aggregate 2007-2008 NHANES estimates (respectively, 6.9% and 6.9%, p = 0.85.Success within an early adopter community demonstrates that online SNs may comprise efficient platforms for bidirectional communication with and data acquisition from disease populations. Advancing this model for cohort and translational science and for use as a complementary surveillance approach will require understanding of inherent selection and publication (sharing biases in the data and a technology model that supports autonomy, anonymity and privacy.

  20. Sharing data for public health research by members of an international online diabetes social network.

    Science.gov (United States)

    Weitzman, Elissa R; Adida, Ben; Kelemen, Skyler; Mandl, Kenneth D

    2011-04-27

    Surveillance and response to diabetes may be accelerated through engaging online diabetes social networks (SNs) in consented research. We tested the willingness of an online diabetes community to share data for public health research by providing members with a privacy-preserving social networking software application for rapid temporal-geographic surveillance of glycemic control. SN-mediated collection of cross-sectional, member-reported data from an international online diabetes SN entered into a software application we made available in a "Facebook-like" environment to enable reporting, charting and optional sharing of recent hemoglobin A1c values through a geographic display. Self-enrollment by 17% (n = 1,136) of n = 6,500 active members representing 32 countries and 50 US states. Data were current with 83.1% of most recent A1c values reported obtained within the past 90 days. Sharing was high with 81.4% of users permitting data donation to the community display. 34.1% of users also displayed their A1cs on their SN profile page. Users selecting the most permissive sharing options had a lower average A1c (6.8%) than users not sharing with the community (7.1%, p = .038). 95% of users permitted re-contact. Unadjusted aggregate A1c reported by US users closely resembled aggregate 2007-2008 NHANES estimates (respectively, 6.9% and 6.9%, p = 0.85). Success within an early adopter community demonstrates that online SNs may comprise efficient platforms for bidirectional communication with and data acquisition from disease populations. Advancing this model for cohort and translational science and for use as a complementary surveillance approach will require understanding of inherent selection and publication (sharing) biases in the data and a technology model that supports autonomy, anonymity and privacy.

  1. Optimization of communication network topology for navigation sharing among distributed satellites

    Science.gov (United States)

    Dang, Zhaohui; Zhang, Yulin

    2013-01-01

    Navigation sharing among distributed satellites is quite important for coordinated motion and collision avoidance. This paper proposes optimization methods of the communication network topology to achieve navigation sharing. The whole communication network constructing by inter-satellite links are considered as a topology graph. The aim of this paper is to find the communication network topology with minimum communication connections' number (MCCN) in different conditions. It has found that the communication capacity and the number of channels are two key parameters affecting the results. The model of MCCN topology for navigation sharing is established and corresponding method is designed. Two main scenarios, viz., homogeneous case and heterogeneous case, are considered. For the homogeneous case where each member has the same communication capacity, it designs a construction method (Algorithm 1) to find the MCCN topology. For the heterogeneous case, it introduces a modified genetic algorithm (Algorithm 2) to find the MCCN topology. When considering the fact that the number of channels is limited, the Algorithm 2 is further modified by adding a penalized term in the fitness function. The effectiveness of these algorithms is all proved in theoretical. Three examples are further tested to illustrate the methods developed in this paper.

  2. Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network

    Directory of Open Access Journals (Sweden)

    Zhen Hong

    2017-11-01

    Full Text Available Device-to-device (D2D communication is becoming an increasingly important technology in future networks with the climbing demand for local services. For instance, resource sharing in the D2D network features ubiquitous availability, flexibility, low latency and low cost. However, these features also bring along challenges when building a satisfactory resource sharing system in the D2D network. Specifically, user mobility is one of the top concerns for designing a cooperative D2D computational resource sharing system since mutual communication may not be stably available due to user mobility. A previous endeavour has demonstrated and proven how connectivity can be incorporated into cooperative task scheduling among users in the D2D network to effectively lower average task execution time. There are doubts about whether this type of task scheduling scheme, though effective, presents fairness among users. In other words, it can be unfair for users who contribute many computational resources while receiving little when in need. In this paper, we propose a novel blockchain-based credit system that can be incorporated into the connectivity-aware task scheduling scheme to enforce fairness among users in the D2D network. Users’ computational task cooperation will be recorded on the public blockchain ledger in the system as transactions, and each user’s credit balance can be easily accessible from the ledger. A supernode at the base station is responsible for scheduling cooperative computational tasks based on user mobility and user credit balance. We investigated the performance of the credit system, and simulation results showed that with a minor sacrifice of average task execution time, the level of fairness can obtain a major enhancement.

  3. Testing knowledge sharing effectiveness: trust, motivation, leadership style, workplace spirituality and social network embedded model

    Directory of Open Access Journals (Sweden)

    Rahman Muhammad Sabbir

    2015-12-01

    Full Text Available The aim of this inquiry is to investigate the relationships among the antecedents of knowledge sharing effectiveness under the position of non-academic staff of higher learning institutions through an empirical test of a conceptual model consisting of trust, extrinsic and intrinsic motivation, leadership style, workplace spirituality and online social network. This study used the respondents from the non-academic staff of higher learning institutions in Malaysia (n = 200, utilizing a self-administered survey questionnaire. The structural equation modeling approach was used to test the proposed hypotheses. The outcomes indicate that all the antecedents play a substantial function in knowledge sharing effectiveness. In addition, perceived risk plays a mediating role between trust and knowledge sharing effectiveness. On the other hand, this research also proved the communication skill also plays a mediating role between leadership style and knowledge sharing effectiveness. This study contributes to pioneering empirical findings on knowledge sharing literature under the scope of the non-academic staff perspective.

  4. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  5. A distributed authentication and authorization scheme for in-network big data sharing

    Directory of Open Access Journals (Sweden)

    Ruidong Li

    2017-11-01

    Full Text Available Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC to propose a Distributed Authentication and Authorization Scheme (DAAS, where an identity-based signature (IBS is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribute-based encryption (CP-ABE is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the interest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes.

  6. Shared "core" areas between the pain and other task-related networks.

    Directory of Open Access Journals (Sweden)

    Franco Cauda

    Full Text Available The idea of a 'pain matrix' specifically devoted to the processing of nociceptive inputs has been challenged. Alternative views now propose that the activity of the primary and secondary somatosensory cortices (SI, SII, the insula and cingulate cortex may be related to a basic defensive system through which significant potentially dangerous events for the body's integrity are detected. By reviewing the role of the SI, SII, the cingulate and the insular cortices in the perception of nociceptive and tactile stimuli, in attentional, emotional and reward tasks, and in interoception and memory, we found that all these task-related networks overlap in the dorsal anterior cingulate cortex, the anterior insula and the dorsal medial thalamus. A thorough analysis revealed that the 'pain-related' network shares important functional similarities with both somatomotor-somatosensory networks and emotional-interoceptive ones. We suggest that these shared areas constitute the central part of an adaptive control system involved in the processing and integration of salient information coming both from external and internal sources. These areas are activated in almost all fMRI tasks and have been indicated to play a pivotal role in switching between externally directed and internally directed brain networks.

  7. Benefit of adaptive FEC in shared backup path protected elastic optical network.

    Science.gov (United States)

    Guo, Hong; Dai, Hua; Wang, Chao; Li, Yongcheng; Bose, Sanjay K; Shen, Gangxiang

    2015-07-27

    We apply an adaptive forward error correction (FEC) allocation strategy to an Elastic Optical Network (EON) operated with shared backup path protection (SBPP). To maximize the protected network capacity that can be carried, an Integer Linear Programing (ILP) model and a spectrum window plane (SWP)-based heuristic algorithm are developed. Simulation results show that the FEC coding overhead required by the adaptive FEC scheme is significantly lower than that needed by a fixed FEC allocation strategy resulting in higher network capacity for the adaptive strategy. The adaptive FEC allocation strategy can also significantly outperform the fixed FEC allocation strategy both in terms of the spare capacity redundancy and the average FEC coding overhead needed per optical channel. The proposed heuristic algorithm is efficient and not only performs closer to the ILP model but also does much better than the shortest-path algorithm.

  8. The Global File System

    Science.gov (United States)

    Soltis, Steven R.; Ruwart, Thomas M.; OKeefe, Matthew T.

    1996-01-01

    The global file system (GFS) is a prototype design for a distributed file system in which cluster nodes physically share storage devices connected via a network-like fiber channel. Networks and network-attached storage devices have advanced to a level of performance and extensibility so that the previous disadvantages of shared disk architectures are no longer valid. This shared storage architecture attempts to exploit the sophistication of storage device technologies whereas a server architecture diminishes a device's role to that of a simple component. GFS distributes the file system responsibilities across processing nodes, storage across the devices, and file system resources across the entire storage pool. GFS caches data on the storage devices instead of the main memories of the machines. Consistency is established by using a locking mechanism maintained by the storage devices to facilitate atomic read-modify-write operations. The locking mechanism is being prototyped in the Silicon Graphics IRIX operating system and is accessed using standard Unix commands and modules.

  9. Virtual File System Mounting amp Searching With Network JVM For LAN

    OpenAIRE

    Nikita Kamble; Vaishnavi Patil; Shweta Desai; Dhanashri Kasar; Mrunali Patil

    2015-01-01

    Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and...

  10. Design of shared unit-dose drug distribution network using multi-level particle swarm optimization.

    Science.gov (United States)

    Chen, Linjie; Monteiro, Thibaud; Wang, Tao; Marcon, Eric

    2018-03-01

    Unit-dose drug distribution systems provide optimal choices in terms of medication security and efficiency for organizing the drug-use process in large hospitals. As small hospitals have to share such automatic systems for economic reasons, the structure of their logistic organization becomes a very sensitive issue. In the research reported here, we develop a generalized multi-level optimization method - multi-level particle swarm optimization (MLPSO) - to design a shared unit-dose drug distribution network. Structurally, the problem studied can be considered as a type of capacitated location-routing problem (CLRP) with new constraints related to specific production planning. This kind of problem implies that a multi-level optimization should be performed in order to minimize logistic operating costs. Our results show that with the proposed algorithm, a more suitable modeling framework, as well as computational time savings and better optimization performance are obtained than that reported in the literature on this subject.

  11. Ad Hoc Wireless Networking and Shared Computation for Autonomous Multirobot Systems

    OpenAIRE

    Bevilacqua, Riccardo; Hall, Jason S.; Horning, James; Romano, Marcello

    2009-01-01

    The article of record as published may be located at http://dx.doi.org/10.2514/1.40734 A wireless ad hoc network is introduced that enables inter-robot communication and shared computation among multiple robots with PC/104-based single board computers running the real-time application interface patched Linux operating system. Through the use of IEEE 802.11 ad hoc technology and User Datagram Protocol, each robot is able to exchange data without the need of a centralized router ...

  12. Cross-layer shared protection strategy towards data plane in software defined optical networks

    Science.gov (United States)

    Xiong, Yu; Li, Zhiqiang; Zhou, Bin; Dong, Xiancun

    2018-04-01

    In order to ensure reliable data transmission on the data plane and minimize resource consumption, a novel protection strategy towards data plane is proposed in software defined optical networks (SDON). Firstly, we establish a SDON architecture with hierarchical structure of data plane, which divides the data plane into four layers for getting fine-grained bandwidth resource. Then, we design the cross-layer routing and resource allocation based on this network architecture. Through jointly considering the bandwidth resource on all the layers, the SDN controller could allocate bandwidth resource to working path and backup path in an economical manner. Next, we construct auxiliary graphs and transform the shared protection problem into the graph vertex coloring problem. Therefore, the resource consumption on backup paths can be reduced further. The simulation results demonstrate that the proposed protection strategy can achieve lower protection overhead and higher resource utilization ratio.

  13. Interference-Aware Spectrum Sharing Techniques for Next Generation Wireless Networks

    KAUST Repository

    Qaraqe, Marwa Khalid

    2011-11-20

    Background: Reliable high-speed data communication that supports multimedia application for both indoor and outdoor mobile users is a fundamental requirement for next generation wireless networks and requires a dense deployment of physically coexisting network architectures. Due to the limited spectrum availability, a novel interference-aware spectrum-sharing concept is introduced where networks that suffer from congested spectrums (secondary-networks) are allowed to share the spectrum with other networks with available spectrum (primary-networks) under the condition that limited interference occurs to primary networks. Objective: Multiple-antenna and adaptive rate can be utilized as a power-efficient technique for improving the data rate of the secondary link while satisfying the interference constraint of the primary link by allowing the secondary user to adapt its transmitting antenna, power, and rate according to the channel state information. Methods: Two adaptive schemes are proposed using multiple-antenna transmit diversity and adaptive modulation in order to increase the spectral-efficiency of the secondary link while maintaining minimum interference with the primary. Both the switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan-and-wait combining antenna technique (SWC) where there is a secondary transmission only when a branch with an acceptable performance is found; else the data is buffered. Results: In both these schemes the constellation size and selected transmit branch are determined to minimized the average number of switches and achieve the highest spectral efficiency given a minimum bit-error-rate (BER), fading conditions, and peak interference constraint. For delayed sensitive applications, two schemes using power control are used: SES-PC and BES-PC. In these schemes the secondary transmitter sends data using a nominal power level, which is optimized to minimize the average delay. Several numerical examples show

  14. The development and achievement of a healthy cities network in Taiwan: sharing leadership and partnership building.

    Science.gov (United States)

    Hu, Susan C; Kuo, Hsien-Wen

    2016-03-01

    The World Health Organization (WHO) Healthy Cities (HC) projects are the best known of the settings-based approaches to health promotion. They engage local governments in health development through a process of political commitment, institutional change, capacity-building, partnership-based planning and innovative projects. Many cities have promoted HC projects in Taiwan since 2002. In 2008, the Taiwan Alliance for Healthy Cities (TAHC) was launched to assist local governments in effectively establishing, operating and promoting HC projects. In this article, we share our experiences of establishing a platform and network to promote the HC program in Taiwan. Based on individual city profiles and governance in Taiwan, the TAHC developed a well-organized framework and model to encourage strong leadership in local governments and to promote participation and engagement in their communities. In the last 6 years, leaders from Taiwan's local governments in HC networks have integrated the HC concepts into their governance models, actively engaging and combining various resources with practical expertise and private sectors. The network of health in Taiwan allows each city to develop its unique perspective on the HC projects. Using this method, not only local government meets its needs, but also increases governance efficiency and effectiveness, resulting in the promotion of its citizens' overall sustainable urban health development. This HC network in Taiwan has partnerships with government and non-governmental organizations (NGOs), with academic support and citizen involvement, a dynamic data collection system and demonstrated leadership in the sharing of information in the Asian region. © The Author(s) 2016.

  15. A Novel Intensive Distribution Logistics Network Design and Profit Allocation Problem considering Sharing Economy

    Directory of Open Access Journals (Sweden)

    Mi Gan

    2018-01-01

    Full Text Available The rapid growth of logistics distribution highlights the problems including the imperfect infrastructure of logistics distribution network, the serious shortage of distribution capacity of each individual enterprise, and the high cost of distribution in China. While the development of sharing economy makes it possible to achieve the integration of whole social logistic resources, big data technology can grasp customer’s logistics demand accurately on the basis of analyzing the customer’s logistics distribution preference, which contributes to the integration and optimization of the whole logistics resources. This paper proposes a kind of intensive distribution logistics network considering sharing economy, which assumes that all the social logistics suppliers build a strategic alliance, and individual idle logistics resources are also used to deal with distribution needs. Analyzing customer shopping behavior by the big data technology to determine customer’s logistics preference on the basis of dividing the customer’s logistics preference into high speed, low cost, and low pollution and then constructing the corresponding objective function model according to different logistics preferences, we obtain the intensive distribution logistics network model and solve it with heuristic algorithm. Furthermore, this paper analyzes the mechanism of interest distribution of the participants in the distribution network and puts forward an improved interval Shapley value method considering both satisfaction and contribution, with case verifying the feasibility and effectiveness of the model. The results showed that, compared with the traditional Shapley method, distribution coefficient calculated by the improved model could be fairer, improve stakeholder satisfaction, and promote the sustainable development of the alliance as well.

  16. Distributed Data Mining in Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — Peer-to-peer (P2P) networks are gaining popularity in many applications such as file sharing, e-commerce, and social networking, many of which deal with rich,...

  17. Virtual File System Mounting amp Searching With Network JVM For LAN

    Directory of Open Access Journals (Sweden)

    Nikita Kamble

    2015-08-01

    Full Text Available Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and other mobile devices that share resources such as printer or network storage. A LAN is contrasted in principle to a wide area networkWANwhich covers a larger geographic distance and may involve leased telecom circuits while the media for LANs are locally managed. Ethernet are twisted pair cabling amp Wi-Fi are the two most common transmission technologies in use for LAN. The rise of virtualization has fueled the development of virtual LANWLANwhich allows network administrator to logically group network nodes amp partition their networks without the need for major infrastructure changes. In some situations a wireless LAN or Wi-Fi maybe preferable to a wired LAN because of its flexibility amp cost. Companies are asserting WLANs as a replacement for their wired infrastructure as the number of smart phones tablets amp other mobile devices proliferates.

  18. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  19. Shared atypical default mode and salience network functional connectivity between autism and schizophrenia.

    Science.gov (United States)

    Chen, Heng; Uddin, Lucina Q; Duan, Xujun; Zheng, Junjie; Long, Zhiliang; Zhang, Youxue; Guo, Xiaonan; Zhang, Yan; Zhao, Jingping; Chen, Huafu

    2017-11-01

    Schizophrenia and autism spectrum disorder (ASD) are two prevalent neurodevelopmental disorders sharing some similar genetic basis and clinical features. The extent to which they share common neural substrates remains unclear. Resting-state fMRI data were collected from 35 drug-naïve adolescent participants with first-episode schizophrenia (15.6 ± 1.8 years old) and 31 healthy controls (15.4 ± 1.6 years old). Data from 22 participants with ASD (13.1 ± 3.1 years old) and 21 healthy controls (12.9 ± 2.9 years old) were downloaded from the Autism Brain Imaging Data Exchange. Resting-state functional networks were constructed using predefined regions of interest. Multivariate pattern analysis combined with multi-task regression feature selection methods were conducted in two datasets separately. Classification between individuals with disorders and controls was achieved with high accuracy (schizophrenia dataset: accuracy = 83%; ASD dataset: accuracy = 80%). Shared atypical brain connections contributing to classification were mostly present in the default mode network (DMN) and salience network (SN). These functional connections were further related to severity of social deficits in ASD (p = 0.002). Distinct atypical connections were also more related to the DMN and SN, but showed different atypical connectivity patterns between the two disorders. These results suggest some common neural mechanisms contributing to schizophrenia and ASD, and may aid in understanding the pathology of these two neurodevelopmental disorders. Autism Res 2017, 10: 1776-1786. © 2017 International Society for Autism Research, Wiley Periodicals, Inc. Autism spectrum disorder (ASD) and schizophrenia are two common neurodevelopmental disorders which share several genetic and behavioral features. The present study identified common neural mechanisms contributing to ASD and schizophrenia using resting-state functional MRI data. The results may help to understand

  20. The importance of social networks in their association to drug equipment sharing among injection drug users: a review.

    Science.gov (United States)

    De, Prithwish; Cox, Joseph; Boivin, Jean-François; Platt, Robert W; Jolly, Ann M

    2007-11-01

    To examine the scientific evidence regarding the association between characteristics of social networks of injection drug users (IDUs) and the sharing of drug injection equipment. A search was performed on MEDLINE, EMBASE, BIOSIS, Current Contents, PsycINFO databases and other sources to identify published studies on social networks of IDUs. Papers were selected based on their examination of social network factors in relation to the sharing of syringes and drug preparation equipment (e.g. containers, filters, water). Additional relevant papers were found from the reference list of identified articles. Network correlates of drug equipment sharing are multi-factorial and include structural factors (network size, density, position, turnover), compositional factors (network member characteristics, role and quality of relationships with members) and behavioural factors (injecting norms, patterns of drug use, severity of drug addiction). Factors appear to be related differentially to equipment sharing. Social network characteristics are associated with drug injection risk behaviours and should be considered alongside personal risk behaviours in prevention programmes. Recommendations for future research into the social networks of IDUs are proposed.

  1. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  2. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  3. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  4. 76 FR 79169 - Power Network New Mexico, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes...

    Science.gov (United States)

    2011-12-21

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ER12-605-000] Power Network New Mexico, LLC; Supplemental Notice That Initial Market-Based Rate Filing Includes Request for... Power Network New Mexico, LLC's application for market-based rate authority, with an accompanying rate...

  5. Spectrum Sharing Based on a Bertrand Game in Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Biqing Zeng

    2017-01-01

    Full Text Available In the study of power control and allocation based on pricing, the utility of secondary users is usually studied from the perspective of the signal to noise ratio. The study of secondary user utility from the perspective of communication demand can not only promote the secondary users to meet the maximum communication needs, but also to maximize the utilization of spectrum resources, however, research in this area is lacking, so from the viewpoint of meeting the demand of network communication, this paper designs a two stage model to solve spectrum leasing and allocation problem in cognitive radio sensor networks (CRSNs. In the first stage, the secondary base station collects the secondary network communication requirements, and rents spectrum resources from several primary base stations using the Bertrand game to model the transaction behavior of the primary base station and secondary base station. The second stage, the subcarriers and power allocation problem of secondary base stations is defined as a nonlinear programming problem to be solved based on Nash bargaining. The simulation results show that the proposed model can satisfy the communication requirements of each user in a fair and efficient way compared to other spectrum sharing schemes.

  6. Sharing clinical decisions for multimorbidity case management using social network and open-source tools.

    Science.gov (United States)

    Martínez-García, Alicia; Moreno-Conde, Alberto; Jódar-Sánchez, Francisco; Leal, Sandra; Parra, Carlos

    2013-12-01

    Social networks applied through Web 2.0 tools have gained importance in health domain, because they produce improvements on the communication and coordination capabilities among health professionals. This is highly relevant for multimorbidity patients care because there is a large number of health professionals in charge of patient care, and this requires to obtain clinical consensus in their decisions. Our objective is to develop a tool for collaborative work among health professionals for multimorbidity patient care. We describe the architecture to incorporate decision support functionalities in a social network tool to enable the adoption of shared decisions among health professionals from different care levels. As part of the first stage of the project, this paper describes the results obtained in a pilot study about acceptance and use of the social network component in our healthcare setting. At Virgen del Rocío University Hospital we have designed and developed the Shared Care Platform (SCP) to provide support in the continuity of care for multimorbidity patients. The SCP has two consecutively developed components: social network component, called Clinical Wall, and Clinical Decision Support (CDS) system. The Clinical Wall contains a record where health professionals are able to debate and define shared decisions. We conducted a pilot study to assess the use and acceptance of the SCP by healthcare professionals through questionnaire based on the theory of the Technology Acceptance Model. In March 2012 we released and deployed the SCP, but only with the social network component. The pilot project lasted 6 months in the hospital and 2 primary care centers. From March to September 2012 we created 16 records in the Clinical Wall, all with a high priority. A total of 10 professionals took part in the exchange of messages: 3 internists and 7 general practitioners generated 33 messages. 12 of the 16 record (75%) were answered by the destination health professionals

  7. Delay performance of a broadcast spectrum sharing network in Nakagami-m fading

    KAUST Repository

    Khan, Fahd Ahmed

    2014-03-01

    In this paper, we analyze the delay performance of a point-to-multipoint secondary network (P2M-SN), which is concurrently sharing the spectrum with a point-to-multipoint primary network (P2M-PN). The channel is assumed to be independent but not identically distributed (i.n.i.d.) and has Nakagami-m fading. A constraint on the peak transmit power of the secondary-user transmitter (SU-Tx) is considered, in addition to the peak interference power constraint. The SU-Tx is assumed to be equipped with a buffer and is modeled using the M/G/1 queueing model. The performance of this system is analyzed for two scenarios: 1) P2M-SN does not experience interference from the primary network (denoted by P2M-SN-NI), and 2) P2M-SN does experience interference from the primary network (denoted by P2M-SN-WI). The performance of both P2M-SN-NI and P2M-SN-WI is analyzed in terms of the packet transmission time, and the closed-form cumulative density function (cdf) of the packet transmission time is derived for both scenarios. Furthermore, by utilizing the concept of timeout, an exact closed-form expression for the outage probability of the P2M-SN-NI is obtained. In addition, an accurate approximation for the outage probability of the P2M-SN-WI is also derived. Furthermore, for the P2M-SN-NI, the analytic expressions for the total average waiting time (TAW-time) of packets and the average number of packets waiting in the buffer of the SU-Tx are also derived. Numerical simulations are also performed to validate the derived analytical results. © 1967-2012 IEEE.

  8. Risk, Benefit, and Moderators of the Affect Heuristic in a Widespread Unlawful Activity: Evidence from a Survey of Unlawful File-Sharing Behavior.

    Science.gov (United States)

    Watson, Steven J; Zizzo, Daniel J; Fleming, Piers

    2017-06-01

    Increasing the perception of legal risk via publicized litigation and lobbying for copyright law enforcement has had limited success in reducing unlawful content sharing by the public. We consider the extent to which engaging in file sharing online is motivated by the perceived benefits of this activity as opposed to perceived legal risks. Moreover, we explore moderators of the relationship between perceived risk and perceived benefits; namely, trust in industry and legal regulators, and perceived online anonymity. We examine these questions via a large two-part survey of consumers of music (n = 658) and eBooks (n = 737). We find that perceptions of benefit, but not of legal risk, predict stated file-sharing behavior. An affect heuristic is employed: as perceived benefit increases, perceived risk falls. This relationship is increased under high regulator and industry trust (which actually increases perceived risk in this study) and low anonymity (which also increases perceived risk). We propose that, given the limited impact of perceived legal risk upon unlawful downloading, it would be better for the media industries to target enhancing the perceived benefit and availability of lawful alternatives. © 2016 The Authors Risk Analysis published by Wiley Periodicals, Inc. on behalf of Society for Risk Analysis.

  9. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  10. A performance analysis of advanced I/O architectures for PC-based network file servers

    Science.gov (United States)

    Huynh, K. D.; Khoshgoftaar, T. M.

    1994-12-01

    In the personal computing and workstation environments, more and more I/O adapters are becoming complete functional subsystems that are intelligent enough to handle I/O operations on their own without much intervention from the host processor. The IBM Subsystem Control Block (SCB) architecture has been defined to enhance the potential of these intelligent adapters by defining services and conventions that deliver command information and data to and from the adapters. In recent years, a new storage architecture, the Redundant Array of Independent Disks (RAID), has been quickly gaining acceptance in the world of computing. In this paper, we would like to discuss critical system design issues that are important to the performance of a network file server. We then present a performance analysis of the SCB architecture and disk array technology in typical network file server environments based on personal computers (PCs). One of the key issues investigated in this paper is whether a disk array can outperform a group of disks (of same type, same data capacity, and same cost) operating independently, not in parallel as in a disk array.

  11. The Jade File System. Ph.D. Thesis

    Science.gov (United States)

    Rao, Herman Chung-Hwa

    1991-01-01

    File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems, such as Unix, support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. Four characteristics of scalability were recognized: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. The Jade File System, which provides a uniform way to name and access files in the internet environment, is presented. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: (1) it allows multiple file systems to be mounted under one direction; and (2) it permits one logical name space to mount other logical name spaces. A prototype of Jade was implemented to examine and validate its

  12. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    KAUST Repository

    Khafagy, Mohammad Galal; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2015-01-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  13. Delay analysis of a point-to-multipoint spectrum sharing network with CSI based power allocation

    KAUST Repository

    Khan, Fahd Ahmed

    2012-10-01

    In this paper, we analyse the delay performance of a point-to-multipoint cognitive radio network which is sharing the spectrum with a point-to-multipoint primary network. The channel is assumed to be independent but not identically distributed and has Nakagami-m fading. A constraint on the peak transmit power of the secondary user transmitter (SU-Tx) is also considered in addition to the peak interference power constraint. Based on the constraints, a power allocation scheme which requires knowledge of the instantaneous channel state information (CSI) of the interference links is derived. The SU-Tx is assumed to be equipped with a buffer and is modelled using the M/G/1 queueing model. Closed form expressions for the probability distribution function (PDF) and cumulative distribution function (CDF) of the packet transmission time is derived. Using the PDF, the expressions for the moments of transmission time are obtained. In addition, using the moments, the expressions for the performance measures such as the total average waiting time of packets and the average number of packets waiting in the buffer of the SU-Tx are also obtained. Numerical simulations corroborate the theoretical results. © 2012 IEEE.

  14. Resource sharing on CSMA/CD networks in the presence of noise. M.S. Thesis

    Science.gov (United States)

    Dinschel, Duane Edward

    1987-01-01

    Resource sharing on carrier sense multiple access with collision detection (CSMA/CD) networks can be accomplished by using window-control algorithms for bus contention. The window-control algorithms are designed to grant permission to transmit to the station with the minimum contention parameter. Proper operation of the window-control algorithm requires that all stations sense the same state of the newtork in each contention slot. Noise causes the state of the network to appear as a collision. False collisions can cause the window-control algorithm to terminate without isolating any stations. A two-phase window-control protocol and approximate recurrence equation with noise as a parameter to improve the performance of the window-control algorithms in the presence of noise are developed. The results are compared through simulation, with the approximate recurrence equation yielding the best overall performance. Noise is even a bigger problem when it is not detected by all stations. In such cases it is possible for the window boundaries of the contending stations to become out of phase. Consequently, it is possible to isolate a station other than the one with the minimum contention parameter. To guarantee proper isolation of the minimum, a broadcast phase must be added after the termination of the algorithm. The protocol required to correct the window-control algorithm when noise is not detected by all stations is discussed.

  15. Full-Duplex opportunistic relay selection in future spectrum-sharing networks

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-06-01

    We propose and analyze the performance of full-duplex relay selection in primary/secondary spectrum-sharing networks. Contrary to half-duplex relaying, full-duplex relaying (FDR) enables simultaneous listening/forwarding at the secondary relay, thereby allowing for a higher spectral efficiency. However, since the source and relay simultaneously transmit in FDR, their superimposed signal at the primary receiver should now satisfy the existing interference constraint which can considerably limit the secondary network throughput. In this regard, relay selection can offer an adequate solution to boost the secondary throughput while satisfying the imposed interference limit. We first analyze the performance of opportunistic relay selection among a cluster of full-duplex decode-and-forward relays with self-interference by deriving the exact cumulative distribution function of its end-to-end signal-to-noise ratio. Second, we evaluate the end-to-end performance of relay selection with interference constraints due to the presence of a primary receiver. Finally, the presented exact theoretical findings are verified by numerical simulations.

  16. The Stability of Interbank Market Network: A Perspective on Contagion and Risk Sharing

    Directory of Open Access Journals (Sweden)

    Chi Xie

    2016-01-01

    Full Text Available As an important part of the financial system, interbank market provides banks with liquidity and credit lending and also is the main channel for risk contagion. In this paper, we test the existence of systematic risk contagion within the Chinese interbank market. By building the networks of the Chinese interbank market for each year and using the measure of mutual information, we quantitatively detect the changes of interbank market networks and observe that the correlations between banks become increasingly tighter in recent years. With the bilateral risk exposure among Chinese listed commercial banks, we find that the possibility of systemic risk contagion in Chinese interbank market is fairly small. But of great concern on each individual bank, the matter is different. Our simulation shows that the failures of three special banks (i.e., Agricultural Bank of China and Bank of China and Industrial and Commercial Bank of China most likely lead to systemic risk contagion. Furthermore, we test the antirisk ability of the Chinese interbank market from the perspective of risk sharing and discover that the interbank market is stable when the loss scale is lower than forty percent of banks’ total core capital.

  17. Building collaboration through shared actions: The experience of the Global Network for Disaster Reduction

    Directory of Open Access Journals (Sweden)

    Terry Gibson

    2012-10-01

    Full Text Available This article asks how the emergent Global Network for Disaster Reduction has built collaboration and impact. Observation of the network’s journey nuanced the researcher’s initial hypothesis in marked ways. A ‘reflective practitioner’ perspective is adopted, locating action within two relevant theoretical frameworks to aid understanding and define future progress. Development showed an early emphasis on a ‘community of practice’ model. However, this appeared ineffective in creating the intended collaboration and led to the recognition of the power of shared action. This observation is framed within the thinking of Freire (1996 on action and reflection as a means of empowerment. The political dimension of the network’s activity is recognised, and is related to Gaventa’s (1980 thinking on the creation of political space. The article attempts to show that combining cycles of action and reflection in the network’s activity (i.e. creating a practitioner focus with a wider investigation of relevant literature and thinking can be helpful in framing understanding and determining future strategy. It concludes by suggesting that a proposed framework of ‘communities of praxis’ may have a broader application in the development of networks.

  18. XML Files

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  19. The Shared Health Research Information Network (SHRINE): a prototype federated query tool for clinical data repositories.

    Science.gov (United States)

    Weber, Griffin M; Murphy, Shawn N; McMurry, Andrew J; Macfadden, Douglas; Nigrin, Daniel J; Churchill, Susanne; Kohane, Isaac S

    2009-01-01

    The authors developed a prototype Shared Health Research Information Network (SHRINE) to identify the technical, regulatory, and political challenges of creating a federated query tool for clinical data repositories. Separate Institutional Review Boards (IRBs) at Harvard's three largest affiliated health centers approved use of their data, and the Harvard Medical School IRB approved building a Query Aggregator Interface that can simultaneously send queries to each hospital and display aggregate counts of the number of matching patients. Our experience creating three local repositories using the open source Informatics for Integrating Biology and the Bedside (i2b2) platform can be used as a road map for other institutions. The authors are actively working with the IRBs and regulatory groups to develop procedures that will ultimately allow investigators to obtain identified patient data and biomaterials through SHRINE. This will guide us in creating a future technical architecture that is scalable to a national level, compliant with ethical guidelines, and protective of the interests of the participating hospitals.

  20. Critical Factors to Achieve Dockless Bike-Sharing Sustainability in China: A Stakeholder-Oriented Network Perspective

    Directory of Open Access Journals (Sweden)

    Jian-gang Shi

    2018-06-01

    Full Text Available In China, dockless bike-sharing programs (DBSPs play a significant role in promoting the goals of sustainable urban travel and carbon emissions reduction. However, the sustainability of DBSPs is increasingly being challenged as various issues associated with different stakeholders emerge. While numerous studies have focused on the barriers to traditional bike-sharing programs, the sustainability performance of new-generation DBSPs is largely overlooked. It is accordingly imperative to understand the primary challenges that impede the sustainability of DBSPs and to consider what stimulative measures can be taken. In this study, we investigate the factors that are critical to DBSPs’ sustainability from a network perspective. Stakeholder-associated factors and their interrelations were identified via literature analysis and interviews, and the social network analysis (SNA method was employed to recognize the critical factors and links in DBSPs. As a result, 10 critical factors and 10 major interactions were identified and further classified into six challenges. Sharing transport schemes, legislative perfection, public private partnership (PPP, and product lifecycle management (PLM were proposed to govern these challenges. This paper contributes to the existing body of knowledge of bike-sharing programs via a network approach that integrates the key influencing factors with those factors’ associated stakeholders. Furthermore, these findings provide the government and operators with implications for mitigating the tough challenges and facilitating the sustainability of DBSPs.

  1. Shared molecular pathways and gene networks for cardiovascular disease and type 2 diabetes mellitus in women across diverse ethnicities.

    Science.gov (United States)

    Chan, Kei Hang K; Huang, Yen-Tsung; Meng, Qingying; Wu, Chunyuan; Reiner, Alexander; Sobel, Eric M; Tinker, Lesley; Lusis, Aldons J; Yang, Xia; Liu, Simin

    2014-12-01

    Although cardiovascular disease (CVD) and type 2 diabetes mellitus (T2D) share many common risk factors, potential molecular mechanisms that may also be shared for these 2 disorders remain unknown. Using an integrative pathway and network analysis, we performed genome-wide association studies in 8155 blacks, 3494 Hispanic American, and 3697 Caucasian American women who participated in the national Women's Health Initiative single-nucleotide polymorphism (SNP) Health Association Resource and the Genomics and Randomized Trials Network. Eight top pathways and gene networks related to cardiomyopathy, calcium signaling, axon guidance, cell adhesion, and extracellular matrix seemed to be commonly shared between CVD and T2D across all 3 ethnic groups. We also identified ethnicity-specific pathways, such as cell cycle (specific for Hispanic American and Caucasian American) and tight junction (CVD and combined CVD and T2D in Hispanic American). In network analysis of gene-gene or protein-protein interactions, we identified key drivers that included COL1A1, COL3A1, and ELN in the shared pathways for both CVD and T2D. These key driver genes were cross-validated in multiple mouse models of diabetes mellitus and atherosclerosis. Our integrative analysis of American women of 3 ethnicities identified multiple shared biological pathways and key regulatory genes for the development of CVD and T2D. These prospective findings also support the notion that ethnicity-specific susceptibility genes and process are involved in the pathogenesis of CVD and T2D. © 2014 American Heart Association, Inc.

  2. Sex Differences in Mortality Based on United Network for Organ Sharing Status While Awaiting Heart Transplantation.

    Science.gov (United States)

    Hsich, Eileen M; Blackstone, Eugene H; Thuita, Lucy; McNamara, Dennis M; Rogers, Joseph G; Ishwaran, Hemant; Schold, Jesse D

    2017-06-01

    There are sex differences in mortality while awaiting heart transplantation, and the reason remains unclear. We included all adults in the Scientific Registry of Transplant Recipients placed on the heart transplant active waitlist from 2004 to 2015. The primary end point was all-cause mortality. Multivariable Cox proportional hazards models were performed to evaluate survival by United Network for Organ Sharing (UNOS) status at the time of listing. Random survival forest was used to identify sex interactions for the competing risk of death and transplantation. There were 33 069 patients (25% women) awaiting heart transplantation. This cohort included 7681 UNOS status 1A (26% women), 13 027 UNOS status 1B (25% women), and 12 361 UNOS status 2 (26% women). During a median follow-up of 4.3 months, 1351 women and 4052 men died. After adjusting for >20 risk factors, female sex was associated with a significant risk of death among UNOS status 1A (adjusted hazard ratio, 1.14; 95% confidence interval, 1.01-1.29) and UNOS status 1B (adjusted hazard ratio, 1.17; 95% confidence interval, 1.05-1.30). In contrast, female sex was significantly protective for time to death among UNOS status 2 (adjusted hazard ratio, 0.85; 95% confidence interval, 0.76-0.95). Sex differences in probability of transplantation were present for every UNOS status, and >20 sex interactions were identified for mortality and transplantation. When stratified by initial UNOS status, women had a higher mortality than men as UNOS status 1 and a lower mortality as UNOS status 2. With >20 sex interactions for mortality and transplantation, further evaluation is warranted to form a more equitable allocation system. © 2017 American Heart Association, Inc.

  3. Applying social network analysis to understand the knowledge sharing behaviour of practitioners in a clinical online discussion forum.

    Science.gov (United States)

    Stewart, Samuel Alan; Abidi, Syed Sibte Raza

    2012-12-04

    Knowledge Translation (KT) plays a vital role in the modern health care community, facilitating the incorporation of new evidence into practice. Web 2.0 tools provide a useful mechanism for establishing an online KT environment in which health practitioners share their practice-related knowledge and experiences with an online community of practice. We have implemented a Web 2.0 based KT environment--an online discussion forum--for pediatric pain practitioners across seven different hospitals in Thailand. The online discussion forum enabled the pediatric pain practitioners to share and translate their experiential knowledge to help improve the management of pediatric pain in hospitals. The goal of this research is to investigate the knowledge sharing dynamics of a community of practice through an online discussion forum. We evaluated the communication patterns of the community members using statistical and social network analysis methods in order to better understand how the online community engages to share experiential knowledge. Statistical analyses and visualizations provide a broad overview of the communication patterns within the discussion forum. Social network analysis provides the tools to delve deeper into the social network, identifying the most active members of the community, reporting the overall health of the social network, isolating the potential core members of the social network, and exploring the inter-group relationships that exist across institutions and professions. The statistical analyses revealed a network dominated by a single institution and a single profession, and found a varied relationship between reading and posting content to the discussion forum. The social network analysis discovered a healthy network with strong communication patterns, while identifying which users are at the center of the community in terms of facilitating communication. The group-level analysis suggests that there is strong interprofessional and interregional

  4. Social Networking Adapted for Distributed Scientific Collaboration

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    Share is a social networking site with novel, specially designed feature sets to enable simultaneous remote collaboration and sharing of large data sets among scientists. The site will include not only the standard features found on popular consumer-oriented social networking sites such as Facebook and Myspace, but also a number of powerful tools to extend its functionality to a science collaboration site. A Virtual Observatory is a promising technology for making data accessible from various missions and instruments through a Web browser. Sci-Share augments services provided by Virtual Observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase science returns from NASA missions. Sci-Share also enables better utilization of NASA s high-performance computing resources by providing an easy and central mechanism to access and share large files on users space or those saved on mass storage. The most common means of remote scientific collaboration today remains the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. Each of these tools has well-known limitations. Sci-Share transforms the social networking paradigm into a scientific collaboration environment by offering powerful tools for cooperative discourse and digital content sharing. Sci-Share differentiates itself by serving as an online repository for users digital content with the following unique features: a) Sharing of any file type, any size, from anywhere; b) Creation of projects and groups for controlled sharing; c) Module for sharing files on HPC (High Performance Computing) sites; d) Universal accessibility of staged files as embedded links on other sites (e.g. Facebook) and tools (e.g. e-mail); e) Drag-and-drop transfer of large files, replacing awkward e-mail attachments (and file size limitations); f) Enterprise-level data and

  5. Resources Sharing and Access Control in Group-oriented Networks : Fednet and Related Paradigms

    NARCIS (Netherlands)

    Ibrohimovna, K.M.; Heemstra de Groot, S.

    2009-01-01

    A Personal Network (PN) is a network composed of devices of a person that can communicate with each other independently from their geographical location. Extra functionality in PNs enables the cooperation amongst different persons forming a group-oriented network called a Federation of Personal

  6. Social network community structure and the contact-mediated sharing of commensal E. coli among captive rhesus macaques (Macaca mulatta).

    Science.gov (United States)

    Balasubramaniam, Krishna; Beisner, Brianne; Guan, Jiahui; Vandeleest, Jessica; Fushing, Hsieh; Atwill, Edward; McCowan, Brenda

    2018-01-01

    In group-living animals, heterogeneity in individuals' social connections may mediate the sharing of microbial infectious agents. In this regard, the genetic relatedness of individuals' commensal gut bacterium Escherichia coli may be ideal to assess the potential for pathogen transmission through animal social networks. Here we use microbial phylogenetics and population genetics approaches, as well as host social network reconstruction, to assess evidence for the contact-mediated sharing of E. coli among three groups of captively housed rhesus macaques ( Macaca mulatta ), at multiple organizational scales. For each group, behavioral data on grooming, huddling, and aggressive interactions collected for a six-week period were used to reconstruct social network communities via the Data Cloud Geometry (DCG) clustering algorithm. Further, an E. coli isolate was biochemically confirmed and genotypically fingerprinted from fecal swabs collected from each macaque. Population genetics approaches revealed that Group Membership, in comparison to intrinsic attributes like age, sex, and/or matriline membership of individuals, accounted for the highest proportion of variance in E. coli genotypic similarity. Social network approaches revealed that such sharing was evident at the community-level rather than the dyadic level. Specifically, although we found no links between dyadic E. coli similarity and social contact frequencies, similarity was significantly greater among macaques within the same social network communities compared to those across different communities. Moreover, tests for one of our study-groups confirmed that E. coli isolated from macaque rectal swabs were more genotypically similar to each other than they were to isolates from environmentally deposited feces. In summary, our results suggest that among frequently interacting, spatially constrained macaques with complex social relationships, microbial sharing via fecal-oral, social contact-mediated routes may

  7. Share2Quit: Online Social Network Peer Marketing of Tobacco Cessation Systems.

    Science.gov (United States)

    Sadasivam, Rajani S; Cutrona, Sarah L; Luger, Tana M; Volz, Erik; Kinney, Rebecca; Rao, Sowmya R; Allison, Jeroan J; Houston, Thomas K

    2017-03-01

    Although technology-assisted tobacco interventions (TATIs) are effective, they are underused due to recruitment challenges. We tested whether we could successfully recruit smokers to a TATI using peer marketing through a social network (Facebook). We recruited smokers on Facebook using online advertisements. These recruited smokers (seeds) and subsequent waves of smokers (peer recruits) were provided the Share2Quit peer recruitment Facebook app and other tools. Smokers were incentivized for up to seven successful peer recruitments and had 30 days to recruit from date of registration. Successful peer recruitment was defined as a peer recruited smoker completing the registration on the TATI following a referral. Our primary questions were (1) whether smokers would recruit other smokers and (2) whether peer recruitment would extend the reach of the intervention to harder-to-reach groups, including those not ready to quit and minority smokers. Overall, 759 smokers were recruited (seeds: 190; peer recruits: 569). Fifteen percent (n = 117) of smokers successfully recruited their peers (seeds: 24.7%; peer recruits: 7.7%) leading to four recruitment waves. Compared to seeds, peer recruits were less likely to be ready to quit (peer recruits 74.2% vs. seeds 95.1%), more likely to be male (67.1% vs. 32.9%), and more likely to be African American (23.8% vs. 10.8%) (p marketing quadrupled our engaged smokers and enriched the sample with not-ready-to-quit and African American smokers. Peer recruitment is promising, and our study uncovered several important challenges for future research. This study demonstrates the successful recruitment of smokers to a TATI using a Facebook-based peer marketing strategy. Smokers on Facebook were willing and able to recruit other smokers to a TATI, yielding a large and diverse population of smokers. © The Author 2016. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For

  8. CryptoCache: A Secure Sharable File Cache for Roaming Users

    DEFF Research Database (Denmark)

    Jensen, Christian D.

    2000-01-01

    . Conventional distributed file systems cache everything locally or not at all; there is no possibility to cache files on nearby nodes.In this paper we present the design of a secure cache system called CryptoCache that allows roaming users to cache files on untrusted file hosting servers. The system allows...... flexible sharing of cached files among unauthenticated users, i.e. unlike most distributed file systems CryptoCache does not require a global authentication framework.Files are encrypted when they are transferred over the network and while stored on untrusted servers. The system uses public key......Small mobile computers are now sufficiently powerful to run many applications, but storage capacity remains limited so working files cannot be cached or stored locally. Even if files can be stored locally, the mobile device is not powerful enough to act as server in collaborations with other users...

  9. From social network (centralized vs. decentralized to collective decision-making (unshared vs. shared consensus.

    Directory of Open Access Journals (Sweden)

    Cédric Sueur

    Full Text Available Relationships we have with our friends, family, or colleagues influence our personal decisions, as well as decisions we make together with others. As in human beings, despotism and egalitarian societies seem to also exist in animals. While studies have shown that social networks constrain many phenomena from amoebae to primates, we still do not know how consensus emerges from the properties of social networks in many biological systems. We created artificial social networks that represent the continuum from centralized to decentralized organization and used an agent-based model to make predictions about the patterns of consensus and collective movements we observed according to the social network. These theoretical results showed that different social networks and especially contrasted ones--star network vs. equal network--led to totally different patterns. Our model showed that, by moving from a centralized network to a decentralized one, the central individual seemed to lose its leadership in the collective movement's decisions. We, therefore, showed a link between the type of social network and the resulting consensus. By comparing our theoretical data with data on five groups of primates, we confirmed that this relationship between social network and consensus also appears to exist in animal societies.

  10. From social network (centralized vs. decentralized) to collective decision-making (unshared vs. shared consensus).

    Science.gov (United States)

    Sueur, Cédric; Deneubourg, Jean-Louis; Petit, Odile

    2012-01-01

    Relationships we have with our friends, family, or colleagues influence our personal decisions, as well as decisions we make together with others. As in human beings, despotism and egalitarian societies seem to also exist in animals. While studies have shown that social networks constrain many phenomena from amoebae to primates, we still do not know how consensus emerges from the properties of social networks in many biological systems. We created artificial social networks that represent the continuum from centralized to decentralized organization and used an agent-based model to make predictions about the patterns of consensus and collective movements we observed according to the social network. These theoretical results showed that different social networks and especially contrasted ones--star network vs. equal network--led to totally different patterns. Our model showed that, by moving from a centralized network to a decentralized one, the central individual seemed to lose its leadership in the collective movement's decisions. We, therefore, showed a link between the type of social network and the resulting consensus. By comparing our theoretical data with data on five groups of primates, we confirmed that this relationship between social network and consensus also appears to exist in animal societies.

  11. Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

    Directory of Open Access Journals (Sweden)

    Changhee Hahn

    2016-01-01

    Full Text Available Mobile health (also written as mHealth provisions the practice of public health supported by mobile devices. mHealth systems let patients and healthcare providers collect and share sensitive information, such as electronic and personal health records (EHRs at any time, allowing more rapid convergence to optimal treatment. Key to achieving this is securely sharing data by providing enhanced access control and reliability. Typically, such sharing follows policies that depend on patient and physician preferences defined by a set of attributes. In mHealth systems, not only the data but also the policies for sharing it may be sensitive since they directly contain sensitive information which can reveal the underlying data protected by the policy. Also, since the policies usually incur linearly increasing communication costs, mHealth is inapplicable to resource-constrained environments. Lastly, access privileges may be publicly known to users, so a malicious user could illegally share his access privileges without the risk of being traced. In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. The computation cost to the user is reduced by delegating approximately 50% of the decryption operations to the more powerful storage systems.

  12. From Social Network (Centralized vs. Decentralized) to Collective Decision-Making (Unshared vs. Shared Consensus)

    OpenAIRE

    Sueur, Cédric; Deneubourg, Jean-Louis; Petit, Odile

    2012-01-01

    Relationships we have with our friends, family, or colleagues influence our personal decisions, as well as decisions we make together with others. As in human beings, despotism and egalitarian societies seem to also exist in animals. While studies have shown that social networks constrain many phenomena from amoebae to primates, we still do not know how consensus emerges from the properties of social networks in many biological systems. We created artificial social networks that represent the...

  13. Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

    Directory of Open Access Journals (Sweden)

    Qinlong Huang

    2017-01-01

    Full Text Available Mobile healthcare social networks (MHSN integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.

  14. An e-consent-based shared EHR system architecture for integrated healthcare networks.

    Science.gov (United States)

    Bergmann, Joachim; Bott, Oliver J; Pretschner, Dietrich P; Haux, Reinhold

    2007-01-01

    Virtual integration of distributed patient data promises advantages over a consolidated health record, but raises questions mainly about practicability and authorization concepts. Our work aims on specification and development of a virtual shared health record architecture using a patient-centred integration and authorization model. A literature survey summarizes considerations of current architectural approaches. Complemented by a methodical analysis in two regional settings, a formal architecture model was specified and implemented. Results presented in this paper are a survey of architectural approaches for shared health records and an architecture model for a virtual shared EHR, which combines a patient-centred integration policy with provider-oriented document management. An electronic consent system assures, that access to the shared record remains under control of the patient. A corresponding system prototype has been developed and is currently being introduced and evaluated in a regional setting. The proposed architecture is capable of partly replacing message-based communications. Operating highly available provider repositories for the virtual shared EHR requires advanced technology and probably means additional costs for care providers. Acceptance of the proposed architecture depends on transparently embedding document validation and digital signature into the work processes. The paradigm shift from paper-based messaging to a "pull model" needs further evaluation.

  15. Network cyberinfrastructure as a shared platform to support multi-site research

    Science.gov (United States)

    Multi-site research across the Long-term Agroecosystem Research (LTAR) network requires access to data and information. We present some existing examples where you can get data from across the network and summarize the rich inventory of measurements taken across LTAR sites. But data management suppo...

  16. A Scalable QoS-Aware VoD Resource Sharing Scheme for Next Generation Networks

    Science.gov (United States)

    Huang, Chenn-Jung; Luo, Yun-Cheng; Chen, Chun-Hua; Hu, Kai-Wen

    In network-aware concept, applications are aware of network conditions and are adaptable to the varying environment to achieve acceptable and predictable performance. In this work, a solution for video on demand service that integrates wireless and wired networks by using the network aware concepts is proposed to reduce the blocking probability and dropping probability of mobile requests. Fuzzy logic inference system is employed to select appropriate cache relay nodes to cache published video streams and distribute them to different peers through service oriented architecture (SOA). SIP-based control protocol and IMS standard are adopted to ensure the possibility of heterogeneous communication and provide a framework for delivering real-time multimedia services over an IP-based network to ensure interoperability, roaming, and end-to-end session management. The experimental results demonstrate that effectiveness and practicability of the proposed work.

  17. Networking Knowledge. Considering Alexander von Humboldt’s Legacy in a New Shared Space in Education

    Directory of Open Access Journals (Sweden)

    Karin Lundberg

    2015-05-01

    . Nevertheless, true globality, as represented through diverse discourses and perspectives of the world, still seems neglected in curricula and course assignments. This article explores the possibilities offered through a new shared space in education where different forms of networked knowledge and multifaceted perspectives can build a global platform of exchange in a diverse student population. The universal science concept described by Alexander von Humboldt at the beginning of the 19th Century illuminates this intertwined approach to knowledge of the world, which has the potential to positively impact contemporary curricula and course design. Von Humboldt’s writings emphasize inclusion and interplay among cultures and natural phenomena. By inviting our students to be active representatives of diverse discourses, these interconnecting links will become more transparent. In turn, productive forms of knowing about the world may enrich current learning objectives and thereby reflect a true global citizenship as it evolves in a new shared space of education. Keywords: global citizenship, plurality, diverse discourses, multicultural education. Résumé La citoyenneté mondiale et la diversité figurent aujourd’hui parmi les concepts les plus représentés dans les études supérieures. Les résultats de l’apprentissage et les compétences sont conçus pour rendre les étudiants sensibles aux nombreuses origines culturelles des établissements d’instruction des États-Unis. Néanmoins, la vraie globalité, représentée à travers des perspectives et des discours divers, semble être toujours négligée dans les programmes scolaires et les attributions de cours. Dans cet article l’auteur explore les possibilités offertes par un nouvel espace partagé dans le domaine de l’éducation -- une éducation caractérisée d’ailleurs par des formes variées de connaissances atteintes dans des réseaux différents et en des perspectives multiples qui peuvent contribuer

  18. The Use of Neural Network and Portfolio Analysis in Forecasting Share Prices at the Stock Exchange

    Directory of Open Access Journals (Sweden)

    Przemyslaw Stochel

    2000-01-01

    Full Text Available The article presents the use of neural networks in decision making process on the capital market. The author tried to show the efficiency of established solution in Polish reality which features different conditions in comparison with the markets of higher developed countries. The aim of the paper was to prove that neural networks are flexible tools which on one hand might be adjusted to investor's requirements and on the other, can reduce equirements to his experience. The article is based on the author's own research carried out by modelling neural network operation with a simulation program. The established solutions are input which employs stocks portfolio computed on the basis of Markowitz portfolio theory and Sharpe's model. According to the established propositions, the portfolio created in such a way is modified by neutral network in order to optimise a criterion which maximises the income of such a modified portfolio. A detailed genesis of the established input vector and network structure are presented. It allows the reader to carry out his own research and create his own attitude towards applied values. The research results based on a real stock market database with the use of one-output networks predicting thc price of a single company - Agros as well as networks predicting the desirable structure of the whole portfolio are presented. The effect of the network structure leaming parameters, input vector (not only as to the input quantity but also as to period of time they were collected was examined. The dependence between the factors mentioned above such as input vector and network structure were discussed. lt seems that the presented paper has proved that some not widely spread methods with neural networks can become at competitive tool to optimisation methods.

  19. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  20. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  1. Network File - TP Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available at file For CSML (Cell System Markup Language), see also the CSML website. CSML files may be graphically vie... and simulated at Cell Illustrator Online. For these pieces of software, see also the Cell Illustrator websi...te or the Cell Illustrator Online website. Legend in Fundamental Biology Legend in Medicine/Pharmacology Leg

  2. 75 FR 6560 - Financial Crimes Enforcement Network; Expansion of Special Information Sharing Procedures To...

    Science.gov (United States)

    2010-02-10

    ...; Expansion of Special Information Sharing Procedures To Deter Money Laundering and Terrorist Activity AGENCY... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter...-5332, to promote the prevention, detection, and prosecution of international money laundering and the...

  3. Knowledge sharing in infection prevention in routine and outbreak situations: a survey of the Society for Healthcare Epidemiology of America Research Network

    Directory of Open Access Journals (Sweden)

    Rami Sommerstein

    2017-08-01

    Full Text Available Abstract In this cross-sectional Society for Healthcare Epidemiology of America Research Network survey on knowledge sharing in infection prevention we identified a rudimentary understanding of how to communicate and share knowledge within healthcare institutions. Our data support the need of further research in this important field.

  4. GPP Webinar: Solar Utilization in Higher Education Networking & Information Sharing Group: Financing Issues Discussion

    Science.gov (United States)

    This presentation from a Solar Utilization in Higher Education Networking and Information webinar covers financing and project economics issues related to solar project development in the higher education sector.

  5. Data Sharing: A New Editorial Initiative of the International Committee of Medical Journal Editors. Implications for the Editors’ Network

    Directory of Open Access Journals (Sweden)

    Fernando Alfonso, MD

    2017-05-01

    Full Text Available The International Committee of Medical Journal Editors (ICMJE provides recommendations to improve the editorial standards and scientific quality of biomedical journals. These recommendations range from uniform technical requirements to more complex and elusive editorial issues including ethical aspects of the scientific process. Recently, registration of clinical trials, conflicts of interest disclosure, and new criteria for authorship -emphasizing the importance of responsibility and accountability-, have been proposed. Last year, a new editorial initiative to foster sharing of clinical trial data was launched. This review discusses this novel initiative with the aim of increasing awareness among readers, investigators, authors and editors belonging to the Editors’ Network of the European Society of Cardiology.

  6. Data sharing: A new editorial initiative of the International Committee of Medical Journal Editors. Implications for the editors’ network

    Directory of Open Access Journals (Sweden)

    Fernando Alfonso

    2017-06-01

    Full Text Available The International Committee of Medical Journal Editors (ICMJE provides recommendations to improve the editorial standards and scientific quality of biomedical journals. These recommendations range from uniform technical requirements to more complex and elusive editorial issues including ethical aspects of the scientific process. Recently, registration of clinical trials, conflicts of interest disclosure, and new criteria for authorship -emphasizing the importance of responsibility and accountability-, have been proposed. Last year, a new editorial initiative to foster sharing of clinical trial data was launched. This review discusses this novel initiative with the aim of increasing awareness among readers, investigators, authors and editors belonging to the Editors’ Network of the European Society of Cardiology.

  7. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness

    Science.gov (United States)

    2016-06-22

    socio-technical limitations that restrict the free flow of information and communications (e.g., Bateman , 1996). The flow of information among the...networks. Phys. A Stat. Mech. Appl. 272, 173–187. doi: 10.1016/S0378- 4371(99)00291-5 Bateman , R. L. (1996). Force XXI and the death of

  8. Information Re-Sharing on Social Network Sites in the Age of Fake News

    Directory of Open Access Journals (Sweden)

    Mehrdad Koohikamali

    2017-10-01

    This study has important practical implications for SNS users and providers alike. Ensuring that information available on SNS is of high quality is critical to maintaining a healthy user base. Findings: Results indicate that attitude toward using SNSs and intention to re-share infor-mation on SNSs is influenced by perceived information quality (enjoyment, rele-vance, and reliability. Also, risk-taking propensity and enjoyment influence the intention to re-share information on SNSs in a positive direction. Future Research: In the dynamic context of SNSs, the role played by quality of information is changing. Understanding changes in quality of information by conducting longitudinal studies and experiments and including the role of habits is necessary.

  9. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS. Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively. Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate. Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  10. Knowledge-Sharing Networks in Hunter-Gatherers and the Evolution of Cumulative Culture.

    Science.gov (United States)

    Salali, Gul Deniz; Chaudhary, Nikhil; Thompson, James; Grace, Olwen Megan; van der Burgt, Xander M; Dyble, Mark; Page, Abigail E; Smith, Daniel; Lewis, Jerome; Mace, Ruth; Vinicius, Lucio; Migliano, Andrea Bamberg

    2016-09-26

    Humans possess the unique ability for cumulative culture [1, 2]. It has been argued that hunter-gatherer's complex social structure [3-9] has facilitated the evolution of cumulative culture by allowing information exchange among large pools of individuals [10-13]. However, empirical evidence for the interaction between social structure and cultural transmission is scant [14]. Here we examine the reported co-occurrence of plant uses between individuals in dyads (which we define as their "shared knowledge" of plant uses) in BaYaka Pygmies from Congo. We studied reported uses of 33 plants of 219 individuals from four camps. We show that (1) plant uses by BaYaka fall into three main domains: medicinal, foraging, and social norms/beliefs; (2) most medicinal plants have known bioactive properties, and some are positively associated with children's BMI, suggesting that their use is adaptive; (3) knowledge of medicinal plants is mainly shared between spouses and biological and affinal kin; and (4) knowledge of plant uses associated with foraging and social norms is shared more widely among campmates, regardless of relatedness, and is important for camp-wide activities that require cooperation. Our results show the interdependence between social structure and knowledge sharing. We propose that long-term pair bonds, affinal kin recognition, exogamy, and multi-locality create ties between unrelated families, facilitating the transmission of medicinal knowledge and its fitness implications. Additionally, multi-family camps with low inter-relatedness between camp members provide a framework for the exchange of functional information related to cooperative activities beyond the family unit, such as foraging and regulation of social life. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Efficient Priority Access to the Shared Commercial Radio with Offloading for Public Safety in LTE Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Chafika Tata

    2014-01-01

    Full Text Available This paper presents the algorithm Courteous Priority Access to the shared commercial radio with offloading (CPAwO, for public safety network (PSN over LTE heterogeneous networks (HetNets. We propose a solution for prioritization of PSN users with access to the commercial radio network resources. Our model offers additional radio resources to the PSN. Furthermore, it ensures a certain priority for commercial users by assigning quantities of additional radio resources through the courteous scheme. This allows delaying preemption and blocking bearers when the radio resources are limited. The other part of CPAwO model is to apply the principle of offloading in order to reduce the impact of the macrocell congestion. This technique is to switch the new bearers arriving at the LTE macrocells to small cells, in order to decrease the number of the blocked and interrupted bearers in the network. The results of the simulation showed that the allocation of radio resources via the courteous mechanism with offloading of new bearers to small cells reduces the rate of blocking bearers and delays the preemption of active bearers present in the LTE HetNets. It also reduces the cost of the end-to-end communications, thanks to the reallocation of free frequencies.

  12. Distributed data networks: a blueprint for Big Data sharing and healthcare analytics.

    Science.gov (United States)

    Popovic, Jennifer R

    2017-01-01

    This paper defines the attributes of distributed data networks and outlines the data and analytic infrastructure needed to build and maintain a successful network. We use examples from one successful implementation of a large-scale, multisite, healthcare-related distributed data network, the U.S. Food and Drug Administration-sponsored Sentinel Initiative. Analytic infrastructure-development concepts are discussed from the perspective of promoting six pillars of analytic infrastructure: consistency, reusability, flexibility, scalability, transparency, and reproducibility. This paper also introduces one use case for machine learning algorithm development to fully utilize and advance the portfolio of population health analytics, particularly those using multisite administrative data sources. © 2016 New York Academy of Sciences.

  13. Frequency Resource Sharing and Allocation Scheme Based on Coalition Formation Game in Hybrid D2D-Cellular Network

    Directory of Open Access Journals (Sweden)

    Qing Ou

    2015-01-01

    Full Text Available A distributed cooperation scheme on frequency resource sharing is proposed to improve the quality of service (QoS in device-to-device (D2D communications underlaying cellular networks. Specifically, we formulate the resource allocation problem as a coalition formation game with transferable utility, in which all users have the incentive to cooperate with some others and form a competitive group to maximize the probability of obtaining their favorite spectrum resources. Taking the cost for coalition formation into account, such as the path loss for data sharing, we prove that the core of the proposed game is empty, which shows the impossibility of grand coalition. Hence, we propose a distributed merge-and-split based coalition formation algorithm based on a new defined Max-Coalition order to effectively solve the coalition game. Compared with the exhaustive search, our algorithm has much lower computer complexity. In addition, we prove that stability and convergence of the proposed algorithm using the concept of a defection function. Finally, the simulation results show that the proposed scheme achieves a suboptimal performance in terms of network sum rate compared with the centralized optimal resource allocation scheme obtained via exhaustive search.

  14. The Sharing of Benefits from a Logistics Alliance Based on a Hub-Spoke Network: A Cooperative Game Theoretic Approach

    Directory of Open Access Journals (Sweden)

    Minyoung Yea

    2018-06-01

    Full Text Available This study investigates a strategic alliance as a horizontal cooperation in the logistics and transportation industries by considering various sharing rules with a cooperative game approach. Through forging a strategic alliance, carriers gain extra benefits from resource sharing and high efficiency resource utilization. In particular, our research focuses on the cost savings from using larger vehicles utilizing collective market demand and regarding them as benefits of cooperation. The model conceptualizes the characteristic function of cost savings by coalitions that take into account the hub-spoke network which is common in transportation services. To share the improved profits fairly between members, we use different allocation schemes: the Shapley value, the core center, the τ -value, and the nucleolus. By analyzing those cooperative game theoretic solutions employing an alliance composed of three carriers, we investigate whether satisfaction in this specific coalition provides an incentive for carriers to join such a coalition. Our results from the analysis, with respect to fair allocation schemes, provide a practical and academic foundation for further research.

  15. A model for evaluating sharing policies for network-assisted HTTP adaptive streaming

    NARCIS (Netherlands)

    J.W.M. Kleinrouweler (Jan Willem); S. Cabrero Barros (Sergio); R.D. van der Mei (Rob); P.S. Cesar Garcia (Pablo Santiago)

    2016-01-01

    textabstractHTTP adaptive streaming (HAS) has become the dominant technology for streaming video over the Internet. It gained popularity because of its ability to adapt the video quality to the current network conditions and other appealing properties such as usage of off-the-shelf HTTP servers and

  16. A model for evaluating sharing policies for network-assisted HTTP adaptive streaming

    NARCIS (Netherlands)

    Kleinrouweler, Jan Willem; Cabrero, Sergio; van der Mei, Rob; Cesar Garcia, P.S.

    2016-01-01

    HTTP adaptive streaming (HAS) has become the dominant technology for streaming video over the Internet. It gained popularity because of its ability to adapt the video quality to the current network conditions and other appealing properties such as usage of off-the-shelf HTTP servers and easy

  17. Performance analysis of differentiated resource-sharing in a wireless ad-hoc network

    NARCIS (Netherlands)

    Roijers, F.; van den Berg, H.; Mandjes, M.

    2010-01-01

    In this paper we model and analyze a relay node in a wireless ad-hoc network; the capacity available at this node is used to both transmit traffic from the source nodes (towards the relay node), and to serve traffic at the relay node (so that it can be forwarded to successor nodes). Clearly, a

  18. Encoding, rehearsal, and recall in signers and speakers: shared network but differential engagement.

    Science.gov (United States)

    Bavelier, D; Newman, A J; Mukherjee, M; Hauser, P; Kemeny, S; Braun, A; Boutla, M

    2008-10-01

    Short-term memory (STM), or the ability to hold verbal information in mind for a few seconds, is known to rely on the integrity of a frontoparietal network of areas. Here, we used functional magnetic resonance imaging to ask whether a similar network is engaged when verbal information is conveyed through a visuospatial language, American Sign Language, rather than speech. Deaf native signers and hearing native English speakers performed a verbal recall task, where they had to first encode a list of letters in memory, maintain it for a few seconds, and finally recall it in the order presented. The frontoparietal network described to mediate STM in speakers was also observed in signers, with its recruitment appearing independent of the modality of the language. This finding supports the view that signed and spoken STM rely on similar mechanisms. However, deaf signers and hearing speakers differentially engaged key structures of the frontoparietal network as the stages of STM unfold. In particular, deaf signers relied to a greater extent than hearing speakers on passive memory storage areas during encoding and maintenance, but on executive process areas during recall. This work opens new avenues for understanding similarities and differences in STM performance in signers and speakers.

  19. Multi-agent control of urban transportation networks and of hybrid systems with limited information sharing

    NARCIS (Netherlands)

    Luo, R.

    2016-01-01

    This thesis aims at developing efficient methods for control of large-scale systems by employing state-of-the-art control methods and optimization techniques. This thesis is divided into two parts. In the first part, we address dynamic traffic routing for urban transportation networks. In the second

  20. Guidelines for governance of data sharing in agri-food networks

    NARCIS (Netherlands)

    Wolfert, J.; Bogaardt, M.J.; Ge, L.; Soma, K.; Verdouw, C.N.

    2017-01-01

    Big Data is becoming a new asset in the agri-food sector including enterprise data from operational systems, sensor data, farm equipment data, etc. Recently, Big Data applications are being implemented to improve farm and chain performance in agri-food networks. Still, many companies are refraining

  1. Robust client/server shared state interactions of collaborative process with system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes state, it sends messages to relevant processes to inform about this change. However, server crashes and

  2. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  3. SISMIKO: emergency network deployment and data sharing for the 2016 central Italy seismic sequence

    Directory of Open Access Journals (Sweden)

    Milena Moretti

    2016-12-01

    Full Text Available At 01:36 UTC (03:36 local time on August 24th 2016, an earthquake Mw 6.0 struck an extensive sector of the central Apennines (coordinates: latitude 42.70° N, longitude 13.23° E, 8.0 km depth. The earthquake caused about 300 casualties and severe damage to the historical buildings and economic activity in an area located near the borders of the Umbria, Lazio, Abruzzo and Marche regions. The Istituto Nazionale di Geofisica e Vulcanologia (INGV located in few minutes the hypocenter near Accumoli, a small town in the province of Rieti. In the hours after the quake, dozens of events were recorded by the National Seismic Network (Rete Sismica Nazionale, RSN of the INGV, many of which had a ML > 3.0. The density and coverage of the RSN in the epicentral area meant the epicenter and magnitude of the main event and subsequent shocks that followed it in the early hours of the seismic sequence were well constrained. However, in order to better constrain the localizations of the aftershock hypocenters, especially the depths, a denser seismic monitoring network was needed. Just after the mainshock, SISMIKO, the coordinating body of the emergency seismic network at INGV, was activated in order to install a temporary seismic network integrated with the existing permanent network in the epicentral area. From August the 24th to the 30th, SISMIKO deployed eighteen seismic stations, generally six components (equipped with both velocimeter and accelerometer, with thirteen of the seismic station transmitting in real-time to the INGV seismic monitoring room in Rome. The design and geometry of the temporary network was decided in consolation with other groups who were deploying seismic stations in the region, namely EMERSITO (a group studying site-effects, and the emergency Italian strong motion network (RAN managed by the National Civil Protection Department (DPC. Further 25 BB temporary seismic stations were deployed by colleagues of the British Geological Survey

  4. Analysis of Online Social Networks to Understand Information Sharing Behaviors Through Social Cognitive Theory.

    Science.gov (United States)

    Yoon, Hong-Jun; Tourassi, Georgia

    2014-05-01

    Analyzing the contents of online social networks is an effective process for monitoring and understanding peoples' behaviors. Since the nature of conversation and information propagation is similar to traditional conversation and learning, one of the popular socio-cognitive methods, social cognitive theory was applied to online social networks to. Two major news topics about colon cancer were chosen to monitor traffic of Twitter messages. The activity of "leaders" on the issue (i.e., news companies or people will prior Twitter activity on topics related to colon cancer) was monitored. In addition, the activity of "followers", people who never discussed the topics before, but replied to the discussions was also monitored. Topics that produce tangible benefits such as positive outcomes from appropriate preventive actions received dramatically more attention and online social media traffic. Such characteristics can be explained with social cognitive theory and thus present opportunities for effective health campaigns.

  5. A Next Generation Repository for Sharing Sensitive Network and Security Data

    Science.gov (United States)

    2018-01-01

    protocols, trends regarding the Internet -of- Things (e.g., in terms of traffic growth) or malicious trends (e.g., scanning). 3.2 Darknet Data Network...Cyber-risk & Trust IP – Internet Protocol IODA – Internet Outage Detection and Analysis IoT – Internet of Things IRB – Institutional Review Board...09 13. SUPPLEMENTARY NOTES 14. ABSTRACT Defending critical infrastructure from cyber-security threats, understanding macroscopic Internet and

  6. The Sharing Economy

    OpenAIRE

    Reinhold, Stephan; Dolnicar, Sara

    2017-01-01

    Peer-to-peer accommodation networks in general, and Airbnb in specific, are frequently referred to as part of the sharing economy. This chapter provides an overview of key characteristics of the sharing economy, discusses how these characteristics relate to peer-to-peer accommodation, and positions peer-to-peer accommodation networks within the sharing economy.

  7. Adaptive multi-channel downlink assignment for overloaded spectrum-shared multi-antenna overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud

    2012-10-19

    Overlaid cellular technology has been considered as a promising candidate to enhance the capacity and extend the coverage of cellular networks, particularly indoors. The deployment of small cells (e.g. femtocells and/or picocells) in an overlaid setup is expected to reduce the operational power and to function satisfactorily with the existing cellular architecture. Among the possible deployments of small-cell access points is to manage many of them to serve specific spatial locations, while reusing the available spectrum universally. This contribution considers the aforementioned scenario with the objective to serve as many active users as possible when the available downlink spectrum is overloaded. The case study is motivated by the importance of realizing universal resource sharing in overlaid networks, while reducing the load of distributing available resources, satisfying downlink multi-channel assignment, controlling the aggregate level of interference, and maintaining desired design/operation requirements. These objectives need to be achieved in distributed manner in each spatial space with as low processing load as possible when the feedback links are capacity-limited, multiple small-cell access points can be shared, and data exchange between access points can not be coordinated. This contribution is summarized as follows. An adaptive downlink multi-channel assignment scheme when multiple co-channel and shared small-cell access points are allocated to serve active users is proposed. It is assumed that the deployed access points employ isotropic antenna arrays of arbitrary sizes, operate using the open-access strategy, and transmit on shared physical channels simultaneously. Moreover, each active user can be served by a single transmit channel per each access point at a time, and can sense the concurrent interference level associated with each transmit antenna channel non-coherently. The proposed scheme aims to identify a suitable subset of transmit channels

  8. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    CERN Document Server

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  9. Ras and relatives--job sharing and networking keep an old family together.

    Science.gov (United States)

    Ehrhardt, Annette; Ehrhardt, Götz R A; Guo, Xuecui; Schrader, John W

    2002-10-01

    Many members of the Ras superfamily of GTPases have been implicated in the regulation of hematopoietic cells, with roles in growth, survival, differentiation, cytokine production, chemotaxis, vesicle-trafficking, and phagocytosis. The well-known p21 Ras proteins H-Ras, N-Ras, K-Ras 4A, and K-Ras 4B are also frequently mutated in human cancer and leukemia. Besides the four p21 Ras proteins, the Ras subfamily of the Ras superfamily includes R-Ras, TC21 (R-Ras2), M-Ras (R-Ras3), Rap1A, Rap1B, Rap2A, Rap2B, RalA, and RalB. They exhibit remarkable overall amino acid identities, especially in the regions interacting with the guanine nucleotide exchange factors that catalyze their activation. In addition, there is considerable sharing of various downstream effectors through which they transmit signals and of GTPase activating proteins that downregulate their activity, resulting in overlap in their regulation and effector function. Relatively little is known about the physiological functions of individual Ras family members, although the presence of well-conserved orthologs in Caenorhabditis elegans suggests that their individual roles are both specific and vital. The structural and functional similarities have meant that commonly used research tools fail to discriminate between the different family members, and functions previously attributed to one family member may be shared with other members of the Ras family. Here we discuss similarities and differences in activation, effector usage, and functions of different members of the Ras subfamily. We also review the possibility that the differential localization of Ras proteins in different parts of the cell membrane may govern their responses to activation of cell surface receptors.

  10. The Middle Eastern Biodiversity Network: Generating and sharing knowledge for ecosystem management and conservation

    Directory of Open Access Journals (Sweden)

    Friedhelm Krupp

    2009-12-01

    Full Text Available Despite prevailing arid conditions, the diversity of terrestrial and freshwater biota in the Middle East is amazingly high and marine biodiversity is the second highest on Earth. Throughout the region, threats to the environment are moderate to severe. Despite the outstanding economic and ecological importance of biological diversity, the capacity in biodiversity-related research and education is inadequate in most parts of the Middle East. The ";;Middle Eastern Biodiversity Network";; (MEBN, founded in 2006 by six universities and research institutes in Iran, Jordan, Germany, Lebanon and Yemen was designed to fill this gap. An integrated approach is taken to upgrade biodiversity research and education to improve regional ecosystem conservation and management capacities. A wide range of activities are carried out in the framework of the Network, including capacity building in biological collection management and professional natural history curatorship, developing university curricula in biodiversity, conducting scientific research, organising workshops and conferences on Middle Eastern biodiversity, and translating the results of biodiversity research into conservation and sustainable development.

  11. Building, Sharing and Exploiting Spatio-Temporal Aggregates in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Dorsaf Zekri

    2014-01-01

    Full Text Available This article focuses on data aggregation in vehicular ad hoc networks (VANETs. In such networks, data produced by sensors or crowdsourcers are exchanged between vehicles in order to warn or inform drivers when an event occurs (e.g., an accident, a traffic congestion, a parking space released, a vehicle with non-functioning brake lights, etc.. In the following, we propose to generate spatio-temporal aggregates containing these data in order to keep a summary of past events. We therefore use Flajolet-Martin sketches. Our goal is then to exploit these aggregates to better assist the drivers. These aggregates may indeed produce additional knowledge that may be useful when no event has been recently transmitted by surrounding vehicles or when some knowledge about the global demand may improve the decision that need to be taken at the vehicle level. To prove the effectiveness of our approach, an extensive experimental evaluation has been performed considering vehicles looking for an available parking space, that proves the interest of our proposal. The experimentations indeed show that the use of our aggregation structure significantly reduces the time needed to actually find a parking space. It also increases the percentage of vehicles finding such a resource in a bounded time in congested situations.

  12. Data Sharing: A New Editorial Initiative of the International Committee of Medical Journal Editors. Implications for the Editors' Network.

    Science.gov (United States)

    Alfonso, Fernando; Adamyan, Karlen; Artigou, Jean-Yves; Aschermann, Michael; Boehm, Michael; Buendia, Alfonso; Chu, Pao-Hsien; Cohen, Ariel; Cas, Livio Dei; Dilic, Mirza; Doubell, Anton; Echeverri, Dario; Enç, Nuray; Ferreira-González, Ignacio; Filipiak, Krzysztof J; Flammer, Andreas; Fleck, Eckart; Gatzov, Plamen; Ginghina, Carmen; Goncalves, Lino; Haouala, Habib; Hassanein, Mahmoud; Heusch, Gerd; Huber, Kurt; Hulín, Ivan; Ivanusa, Mario; Krittayaphong, Rungroj; Lau, Chu-Pak; Marinskis, Germanas; Mach, François; Moreira, Luiz Felipe; Nieminen, Tuomo; Oukerraj, Latifa; Perings, Stefan; Pierard, Luc; Potpara, Tatjana; Reyes-Caorsi, Walter; Rim, Se-Joong; Rødevand, Olaf; Saade, Georges; Sander, Mikael; Shlyakhto, Evgeny; Timuralp, Bilgin; Tousoulis, Dimitris; Ural, Dilek; Piek, J J; Varga, Albert; Lüscher, Thomas F

    The International Committee of Medical Journal Editors (ICMJE) provides recommendations to improve the editorial standards and scientific quality of biomedical journals. These recommendations range from uniform technical requirements to more complex and elusive editorial issues including ethical aspects of the scientific process. Recently, registration of clinical trials, conflicts of interest disclosure, and new criteria for authorship - emphasizing the importance of responsibility and accountability -, have been proposed. Last year, a new editorial initiative to foster sharing of clinical trial data was launched. This review discusses this novel initiative with the aim of increasing awareness among readers, investigators, authors and editors belonging to the Editors' Network of the European Society of Cardiology. Copyright © 2017. Publicado por Masson Doyma México S.A.

  13. Innovative business models within niche tourist markets: shared identity, authenticity and flexibile networks. The case of three italian SMEs

    Directory of Open Access Journals (Sweden)

    Federica Montaguti

    2016-07-01

    Full Text Available Innovative business models within niche tourist markets: shared identity, authenticity and flexibile networks. The case of three italian SMEs The evolution of business models is a crucial challenge for tourism companies, which should understand how they can stimulate their creativity and introduce innovation. However for many firms, in particular for SMEs, this process is not so easy to be adopted. Even more difficult it is to understand how the business model should change to be successful in solving what appears to be one of the main problems for SMEs, especially within mature, tourist destinations, i.e. targeting new profitable segments. The paper discusses the main findings of a research project carried out by the authors about changes in the business models of Italian tourism companies, underlining in particular three case-studies of interest in terms of the innovation put in place and that relate to SMEs. The analysis, based on the business model canvas, the value constellation and the storytelling, found out that these three firms are flexible companies that have characteristics emblematic of the knowledge and information economy business models. They successfully answer the needs of specific niches, finding new opportunities within a mature tourism market and famous destinations, thanks to their ability to develop wide flexible networks, where customers are an active part, and thanks to the value proposed to the clients, centred on the idea of a shared identity between the clients and the company’s founders and of an authenticity guaranteed by the life story of the founders themselves.

  14. A Fluid Model for a Relay Node in an Ad Hoc Network: Evaluation of Resource Sharing Policies

    Directory of Open Access Journals (Sweden)

    Michel Mandjes

    2008-01-01

    Full Text Available Fluid queues offer a natural framework for analyzing waiting times in a relay node of an ad hoc network. Because of the resource sharing policy applied, the input and output of these queues are coupled. More specifically, when there are users who wish to transmit data through a specific node, each of them obtains a share 1/(+ of the service capacity to feed traffic into the queue of the node, whereas the remaining fraction /(+ is used to serve the queue; here >0 is a free design parameter. Assume now that jobs arrive at the relay node according to a Poisson process, and that they bring along exponentially distributed amounts of data. The case =1 has been addressed before; the present paper focuses on the intrinsically harder case >1, that is, policies that give more weight to serving the queue. Four performance metrics are considered: (i the stationary workload of the queue, (ii the queueing delay, that is, the delay of a “packet” (a fluid particle that arrives at an arbitrary point in time, (iii the flow transfer delay, (iv the sojourn time, that is, the flow transfer time increased by the time it takes before the last fluid particle of the flow is served. We explicitly compute the Laplace transforms of these random variables.

  15. Individual- and area-level disparities in access to the road network, subway system and a public bicycle share program on the Island of Montreal, Canada.

    Science.gov (United States)

    Fuller, Daniel; Gauvin, Lise; Kestens, Yan

    2013-02-01

    Few studies have examined potential disparities in access to transportation infrastructures, an important determinant of population health. To examine individual- and area-level disparities in access to the road network, public transportation system, and a public bicycle share program in Montreal, Canada. Examining associations between sociodemographic variables and access to the road network, public transportation system, and a public bicycle share program, 6,495 adult respondents (mean age, 48.7 years; 59.0 % female) nested in 33 areas were included in a multilevel analysis. Individuals with lower incomes lived significantly closer to public transportation and the bicycle share program. At the area level, the interaction between low-education and low-income neighborhoods showed that these areas were significantly closer to public transportation and the bicycle share program controlling for individual and urbanicity variables. More deprived areas of the Island of Montreal have better access to transportation infrastructure than less-deprived areas.

  16. Coupling Flux Towers and Networks with Proximal and Remote Sensing Data: New Tools to Collect and Share Time-Synchronized Hourly Fluxes

    Science.gov (United States)

    Burba, George; Avenson, Tom; Burkart, Andreas; Gamon, John; Guan, Kaiyu; Julitta, Tommaso; Pastorello, Gilberto; Sakowska, Karolina

    2017-04-01

    Multiple hundreds of flux towers are presently operational as standalone projects and as parts of larger networks. However, the vast majority of these towers do not allow straight-forward coupling with satellite data, and even fewer have optical sensors for validation of satellite products and upscaling from field to regional levels. In 2016, new tools to collect, process, and share time-synchronized flux data from multiple towers were developed and deployed globally. Originally designed to automate site and data management, these new tools can also be effective in coupling tower data with satellite data due to the following present capabilities: Fully automated FluxSuite system combines hardware, software and web-services, and does not require an expert to run it It can be incorporated into a new flux station or added to a present station, using weatherized remotely-accessible microcomputer, SmartFlux2 It utilizes EddyPro software to calculate fully-processed fluxes and footprints in near-realtime, alongside radiation, optical, weather and soil data All site data are merged into a single quality-controlled file timed using PTP time protocol Data from optical sensors can be integrated into this complete dataset via compatible dataloggers Multiple stations can be linked into time-synchronized network with automated reports and email alerts visible to PIs in real-time Remote sensing researchers without stations can form "virtual networks" of stations by collaborating with tower PIs from different physical networks The present system can then be utilized to couple ground data with satellite data via the following proposed concept: GPS-driven PTP protocol will synchronize instrumentation within the station, different stations with each other, and all of these to satellite data to precisely align optical and flux data in time Footprint size and coordinates computed and stored with flux data will help correctly align footprints and satellite motion to precisely align

  17. Approaches in highly parameterized inversion-PESTCommander, a graphical user interface for file and run management across networks

    Science.gov (United States)

    Karanovic, Marinko; Muffels, Christopher T.; Tonkin, Matthew J.; Hunt, Randall J.

    2012-01-01

    Models of environmental systems have become increasingly complex, incorporating increasingly large numbers of parameters in an effort to represent physical processes on a scale approaching that at which they occur in nature. Consequently, the inverse problem of parameter estimation (specifically, model calibration) and subsequent uncertainty analysis have become increasingly computation-intensive endeavors. Fortunately, advances in computing have made computational power equivalent to that of dozens to hundreds of desktop computers accessible through a variety of alternate means: modelers have various possibilities, ranging from traditional Local Area Networks (LANs) to cloud computing. Commonly used parameter estimation software is well suited to take advantage of the availability of such increased computing power. Unfortunately, logistical issues become increasingly important as an increasing number and variety of computers are brought to bear on the inverse problem. To facilitate efficient access to disparate computer resources, the PESTCommander program documented herein has been developed to provide a Graphical User Interface (GUI) that facilitates the management of model files ("file management") and remote launching and termination of "slave" computers across a distributed network of computers ("run management"). In version 1.0 described here, PESTCommander can access and ascertain resources across traditional Windows LANs: however, the architecture of PESTCommander has been developed with the intent that future releases will be able to access computing resources (1) via trusted domains established in Wide Area Networks (WANs) in multiple remote locations and (2) via heterogeneous networks of Windows- and Unix-based operating systems. The design of PESTCommander also makes it suitable for extension to other computational resources, such as those that are available via cloud computing. Version 1.0 of PESTCommander was developed primarily to work with the

  18. Differential sharing and distinct co-occurrence networks among spatially close bacterial microbiota of bark, mosses and lichens‬‬.

    Science.gov (United States)

    Aschenbrenner, Ines Aline; Cernava, Tomislav; Erlacher, Armin; Berg, Gabriele; Grube, Martin

    2017-05-01

    Knowledge of bacterial community host-specificity has increased greatly in recent years. However, the intermicrobiome relationships of unrelated but spatially close organisms remain little understood. Trunks of trees covered by epiphytes represent complex habitats with a mosaic of ecological niches. In this context, we investigated the structure, diversity and interactions of microbiota associated with lichens, mosses and the bare tree bark. Comparative analysis revealed significant differences in the habitat-associated community structures. Corresponding co-occurrence analysis indicated that the lichen microbial network is less complex and less densely interconnected than the moss- and bark-associated networks. Several potential generalists and specialists were identified for the selected habitats. Generalists belonged mainly to Proteobacteria, with Sphingomonas as the most abundant genus. The generalists comprise microorganisms with generally beneficial features, such as nitrogen fixation or other supporting functions, according to a metagenomic analysis. We argue that beneficial strains shared among hosts contribute to ecological stability of the host biocoenoses. © 2017 John Wiley & Sons Ltd.

  19. Social Networking Websites Usage and Life Satisfaction: A Study of Materialist Values Shared by Facebook Users

    Directory of Open Access Journals (Sweden)

    Valeriu Frunzaru

    2015-07-01

    Full Text Available This paper attempts to analyze how materialist values mediate the relationship between time spent on social networking websites (SNW and overall life satisfaction. Admittedly, younger generations spend more time on SNW compared to older generations, therefore we can anticipate that younger people are more affected by materialism and, consequently, less satisfied with their lives. The conceptual model proposed here was tested on a convenience sample of 390 Romanian adults. Using structural equation modeling, our findings validate the hypothesis that younger people spend more time on SNW; the SNW usage makes them more materialistic and, as a result, less satisfied with life. These findings raise ethical questions regarding the impact of SNW on overall life satisfaction. For example, Facebook, the most popular SNW in Romania, is a virtual social sphere where people become “friends”, give or receive “likes”, are “fans” of something or somebody, etc. Therefore, we argue that Facebook is a symbolical locus for quantitative manifestations of something intimate and private, like feelings or appreciations. Such materialist approach to friendship and relationships has a significant negative impact on life satisfaction.

  20. Load sharing with a local thermal network fed by a microcogenerator: Thermo-economic optimization by means of dynamic simulations

    International Nuclear Information System (INIS)

    Angrisani, Giovanni; Canelli, Michele; Rosato, Antonio; Roselli, Carlo; Sasso, Maurizio; Sibilio, Sergio

    2014-01-01

    , even in Mediterranean areas, where the climatic conditions are not always suitable for cogeneration. - Highlights: • Load sharing approach between house and office is proposed. • A system consisting of MCHP, heat storage, boiler and thermal network is simulated. • Two different geographical locations in Italy are considered. • An optimal thermo-economic control of MCHP system is implemented. • The energy, environmental and economic implication of the system are investigated

  1. Medical consultations and the sharing of medical images involving spinal injury over mobile phone networks.

    Science.gov (United States)

    Filip, Michal; Linzer, Petr; Šámal, Filip; Tesař, Jiří; Herzig, Roman; Školoudík, David

    2012-07-01

    The transmission of medical images and other data over mobile phone networks may facilitate remote medical consultations between neurosurgeons and regional hospitals treating spinal injury patients. The aim of this study was to compare the efficacy of mobile phone consultations with standard hospital workstation consultations in spinal injury patients. The images were exported over the Internet from surrounding local hospitals through the Picture Archiving and Communication System, in DICOM III format, to the central hospital server. The xVision browser was used to view the acquired images on a standard workstation. The data were also exported to the secured hospital Web server IIS60 and converted to JPEG format to enable remote physician access and consultation. The remote consulting physician connected to this server by mobile phone using the phone's Internet browser. A second physician, blind to the mobile phone results, evaluated the same images at a workstation in the hospital. The results of the mobile phone consultations were compared with the results from standard workstation consultations. There was no difference in the quality of spinal computed tomographic/magnetic resonance images viewed on the phone screen compared with on the workstation. More importantly, the final diagnoses made by mobile phone did not differ from those made by workstation consultations. A transfer to the department of neurosurgery was required after consultation in 11 patients. Mobile phone consultations for patients with spinal injuries was as effective as workstation consultations. Mobile phone consultations can increase the expertise available to regional hospitals, which are often the first responders to medical emergencies. Copyright © 2012 Elsevier Inc. All rights reserved.

  2. File management for experiment control parameters within a distributed function computer network

    International Nuclear Information System (INIS)

    Stubblefield, F.W.

    1976-10-01

    An attempt to design and implement a computer system for control of and data collection from a set of laboratory experiments reveals that many of the experiments in the set require an extensive collection of parameters for their control. The operation of the experiments can be greatly simplified if a means can be found for storing these parameters between experiments and automatically accessing them as they are required. A subsystem for managing files of such experiment control parameters is discussed. 3 figures

  3. Large sharing networks and unusual injection practices explain the rapid rise in HIV among IDUs in Sargodha, Pakistan

    Directory of Open Access Journals (Sweden)

    Qureshi Salman U

    2009-06-01

    Full Text Available Abstract Background Of the nearly 100,000 street-based IDUs in Pakistan, 20% have HIV. We investigated the recent rise in HIV prevalence from 12 to 52% among IDUs in Sargodha despite > 70% coverage with syringe exchanges. Methods We interviewed approximately 150 IDUs and 30 outreach workers in focus group discussions. Results We found six rural and 28 urban injecting locations. Urban locations have about 20–30 people at any time and about 100 daily; rural locations have twice as many (national average: 4–15. About half of the IDUs started injecting within the past 2 years and are not proficient at injecting themselves. They use street injectors, who have 15–16 clients daily. Heroin is almost exclusively the drug used. Most inject 5–7 times daily. Nearly all injectors claim to use fresh syringes. However, they load, inject and share using a locally developed method called scale. Most Pakistani IDUs prefer to double pump drug the syringe, which allows mixing of blood with drug in the syringe. The injector injects 3 ml and keeps 2 ml (the scale as injection fee. The injector usually pools all the leftover scale (now with some blood mixed with drug either for his own use or to sell it. Most IDUs backload the scale they buy into their own fresh syringes. Discussion Use of an unprecedented method of injecting drugs that largely bypasses fresh syringes, larger size of sharing networks, higher injection frequency and near universal use of street injectors likely explain for the rapid rise in HIV prevalence among IDUs in Sargodha despite high level provision of fresh syringes. This had been missed by us and the national surveillance, which is quantitative. We have addressed this by hiring injectors as peer outreach workers and increasing syringe supply. Our findings highlight both the importance of qualitative research and operations research to enrich the quality of HIV prevention programs.

  4. The Impact of Resource Scarcity on Bonding and Bridging Social Capital: the Case of Fishers' Information-Sharing Networks in Loreto, BCS, Mexico

    Directory of Open Access Journals (Sweden)

    Saudiel Ramirez-Sanchez

    2009-06-01

    Full Text Available Fishers often rely on their social capital to cope with resource fluctuations by sharing information on the abundance and location of fish. Drawing on research in seven coastal fishing communities in Loreto, Baja California Sur, Mexico, we examine the effect of resource scarcity on the bonding, bridging, and linking social-capital patterns of fishers' information-sharing networks. We found that: (1 fishers' information sharing is activated in response to varying ecological conditions; (2 resource scarcity is an ambiguous indicator of the extent to which fishers share information on the abundance and location of fish within and between communities; (3 information sharing is based on trust and occurs through kinship, friendship, and acquaintance social relations; (4 friendship ties play a key and flexible role in fishers' social networks within and between communities; (5 overall, the composition of fishers' social networks follows a friendship>kinship>acquaintance order of importance; and (6 the function of social ties, internal conflict, and settlement histories moderate the effects of resource scarcity on fishers' social capital. We conclude by arguing that the livelihoods of fishers from Loreto have adaptive capacity for dealing with fish fluctuations but little or no proactive resilience to address resource-management issues.

  5. A system to build distributed multivariate models and manage disparate data sharing policies: implementation in the scalable national network for effectiveness research.

    Science.gov (United States)

    Meeker, Daniella; Jiang, Xiaoqian; Matheny, Michael E; Farcas, Claudiu; D'Arcy, Michel; Pearlman, Laura; Nookala, Lavanya; Day, Michele E; Kim, Katherine K; Kim, Hyeoneui; Boxwala, Aziz; El-Kareh, Robert; Kuo, Grace M; Resnic, Frederic S; Kesselman, Carl; Ohno-Machado, Lucila

    2015-11-01

    Centralized and federated models for sharing data in research networks currently exist. To build multivariate data analysis for centralized networks, transfer of patient-level data to a central computation resource is necessary. The authors implemented distributed multivariate models for federated networks in which patient-level data is kept at each site and data exchange policies are managed in a study-centric manner. The objective was to implement infrastructure that supports the functionality of some existing research networks (e.g., cohort discovery, workflow management, and estimation of multivariate analytic models on centralized data) while adding additional important new features, such as algorithms for distributed iterative multivariate models, a graphical interface for multivariate model specification, synchronous and asynchronous response to network queries, investigator-initiated studies, and study-based control of staff, protocols, and data sharing policies. Based on the requirements gathered from statisticians, administrators, and investigators from multiple institutions, the authors developed infrastructure and tools to support multisite comparative effectiveness studies using web services for multivariate statistical estimation in the SCANNER federated network. The authors implemented massively parallel (map-reduce) computation methods and a new policy management system to enable each study initiated by network participants to define the ways in which data may be processed, managed, queried, and shared. The authors illustrated the use of these systems among institutions with highly different policies and operating under different state laws. Federated research networks need not limit distributed query functionality to count queries, cohort discovery, or independently estimated analytic models. Multivariate analyses can be efficiently and securely conducted without patient-level data transport, allowing institutions with strict local data storage

  6. Challenges to Participation in the Sharing Economy: The Case of Local Online Peer-to-Peer Exchange in a Single Parents’ Network

    Directory of Open Access Journals (Sweden)

    Airi Lampinen

    2015-05-01

    Full Text Available This paper depicts an initiative to deploy an online peer-to-peer exchange system for a community network of single parents – a group of people in need of goods, services, and social support in their local neighborhoods. We apply participant observation and semi-structured interviews to uncover key issues that can hinder the emergence of sharing practices in local community networks of this type. Our study illustrates how pressures related to single parenthood can impede opportunities to engage in peer-to-peer exchange, even when community members view the social and material benefits of participation as desirable and necessary. This complicates the prevalent narrative that local peer-to-peer exchange systems are an accessible and convenient alternative to traditional markets. Moreover, we discuss our collaboration with the community as well as the developers of the sharing platform, highlighting the challenges of user-centered design in the sharing economy.

  7. Launching a Laboratory Testing Process Quality Improvement Toolkit: From the Shared Networks of Colorado Ambulatory Practices and Partners (SNOCAP).

    Science.gov (United States)

    Fernald, Douglas; Hamer, Mika; James, Kathy; Tutt, Brandon; West, David

    2015-01-01

    Family medicine and internal medicine physicians order diagnostic laboratory tests for nearly one-third of patient encounters in an average week, yet among medical errors in primary care, an estimated 15% to 54% are attributed to laboratory testing processes. From a practice improvement perspective, we (1) describe the need for laboratory testing process quality improvements from the perspective of primary care practices, and (2) describe the approaches and resources needed to implement laboratory testing process quality improvements in practice. We applied practice observations, process mapping, and interviews with primary care practices in the Shared Networks of Colorado Ambulatory Practices and Partners (SNOCAP)-affiliated practice-based research networks that field-tested in 2013 a laboratory testing process improvement toolkit. From the data collected in each of the 22 participating practices, common testing quality issues included, but were not limited to, 3 main testing process steps: laboratory test preparation, test tracking, and patient notification. Three overarching qualitative themes emerged: practices readily acknowledge multiple laboratory testing process problems; practices know that they need help addressing the issues; and practices face challenges with finding patient-centered solutions compatible with practice priorities and available resources. While practices were able to get started with guidance and a toolkit to improve laboratory testing processes, most did not seem able to achieve their quality improvement aims unassisted. Providing specific guidance tools with practice facilitation or other rapid-cycle quality improvement support may be an effective approach to improve common laboratory testing issues in primary care. © Copyright 2015 by the American Board of Family Medicine.

  8. Reduced-complexity adaptive multi-channel assignment for shared access points in over-loaded small-cell networks

    KAUST Repository

    Radaydeh, Redha Mahmoud

    2013-06-01

    This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled users in over-loaded (i.e. dense) pico/femtocell networks. It assumes that the deployed access points can be shared simultaneously and employ isotropic antenna arrays of arbitrary sizes. Moreover, they transmit their data on a common physical channel and can not coordinate their transmissions. On the other hand, each scheduled user can be served by single transmit channel from each active access point at a time, and it lacks coordination with concurrent active users. The scheme operates according to the occupancy of available transmit channels, wherein extensively occupied access points are avoided adaptively, while reducing the load of processing. The operation is linked to a target performance via controlling the observed aggregate interference from the projected set of serving points. Through the analysis, results for the scheduled user outage performance, and the average number of active access points are presented. Numerical and simulations studies clarify the gains of the proposed scheme for different operating conditions. © 2013 IEEE.

  9. Reduced-complexity adaptive multi-channel assignment for shared access points in over-loaded small-cell networks

    KAUST Repository

    Radaydeh, Redha Mahmoud; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2013-01-01

    This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled users in over-loaded (i.e. dense) pico/femtocell networks. It assumes that the deployed access points can be shared simultaneously and employ isotropic antenna arrays of arbitrary sizes. Moreover, they transmit their data on a common physical channel and can not coordinate their transmissions. On the other hand, each scheduled user can be served by single transmit channel from each active access point at a time, and it lacks coordination with concurrent active users. The scheme operates according to the occupancy of available transmit channels, wherein extensively occupied access points are avoided adaptively, while reducing the load of processing. The operation is linked to a target performance via controlling the observed aggregate interference from the projected set of serving points. Through the analysis, results for the scheduled user outage performance, and the average number of active access points are presented. Numerical and simulations studies clarify the gains of the proposed scheme for different operating conditions. © 2013 IEEE.

  10. Statistical Delay QoS Provisioning for Energy-Efficient Spectrum-Sharing Based Wireless Ad Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yichen Wang

    2016-01-01

    Full Text Available In this paper, we develop the statistical delay quality-of-service (QoS provisioning framework for the energy-efficient spectrum-sharing based wireless ad hoc sensor network (WAHSN, which is characterized by the delay-bound violation probability. Based on the established delay QoS provisioning framework, we formulate the nonconvex optimization problem which aims at maximizing the average energy efficiency of the sensor node in the WAHSN while meeting PU’s statistical delay QoS requirement as well as satisfying sensor node’s average transmission rate, average transmitting power, and peak transmitting power constraints. By employing the theories of fractional programming, convex hull, and probabilistic transmission, we convert the original fractional-structured nonconvex problem to the additively structured parametric convex problem and obtain the optimal power allocation strategy under the given parameter via Lagrangian method. Finally, we derive the optimal average energy efficiency and corresponding optimal power allocation scheme by employing the Dinkelbach method. Simulation results show that our derived optimal power allocation strategy can be dynamically adjusted based on PU’s delay QoS requirement as well as the channel conditions. The impact of PU’s delay QoS requirement on sensor node’s energy efficiency is also illustrated.

  11. Detection of Dendritic Spines Using Wavelet-Based Conditional Symmetric Analysis and Regularized Morphological Shared-Weight Neural Networks

    Directory of Open Access Journals (Sweden)

    Shuihua Wang

    2015-01-01

    Full Text Available Identification and detection of dendritic spines in neuron images are of high interest in diagnosis and treatment of neurological and psychiatric disorders (e.g., Alzheimer’s disease, Parkinson’s diseases, and autism. In this paper, we have proposed a novel automatic approach using wavelet-based conditional symmetric analysis and regularized morphological shared-weight neural networks (RMSNN for dendritic spine identification involving the following steps: backbone extraction, localization of dendritic spines, and classification. First, a new algorithm based on wavelet transform and conditional symmetric analysis has been developed to extract backbone and locate the dendrite boundary. Then, the RMSNN has been proposed to classify the spines into three predefined categories (mushroom, thin, and stubby. We have compared our proposed approach against the existing methods. The experimental result demonstrates that the proposed approach can accurately locate the dendrite and accurately classify the spines into three categories with the accuracy of 99.1% for “mushroom” spines, 97.6% for “stubby” spines, and 98.6% for “thin” spines.

  12. A Tool for Visualizing Mobile Ad-Hoc Network Topology Definitions Files

    National Research Council Canada - National Science Library

    Nguyen, Binh Q

    2006-01-01

    This report documents a research and development effort that the U.S. Army Research Laboratory conducted in FY05 in support of the building of an emulated tactical mobile ad hoc network (MANET) research test bed...

  13. DEVELOPMENT OF A WEB-BASED PROXIMITY BASED MEDIA SHARING APPLICATION

    OpenAIRE

    Erol Ozan

    2016-01-01

    This article reports the development of Vissou, which is a location based web application that enables media recording and sharing among users who are in close proximity to each other. The application facilitates the automated hand-over of the recorded media files from one user to another. There are many social networking applications and web sites that provide digital media sharing and editing functionalities. What differentiates Vissou from other similar applications is the functions and us...

  14. Advancing Collaboration through Hydrologic Data and Model Sharing

    Science.gov (United States)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.

    2015-12-01

    HydroShare is an online, collaborative system for open sharing of hydrologic data, analytical tools, and models. It supports the sharing of and collaboration around "resources" which are defined primarily by standardized metadata, content data models for each resource type, and an overarching resource data model based on the Open Archives Initiative's Object Reuse and Exchange (OAI-ORE) standard and a hierarchical file packaging system called "BagIt". HydroShare expands the data sharing capability of the CUAHSI Hydrologic Information System by broadening the classes of data accommodated to include geospatial and multidimensional space-time datasets commonly used in hydrology. HydroShare also includes new capability for sharing models, model components, and analytical tools and will take advantage of emerging social media functionality to enhance information about and collaboration around hydrologic data and models. It also supports web services and server/cloud based computation operating on resources for the execution of hydrologic models and analysis and visualization of hydrologic data. HydroShare uses iRODS as a network file system for underlying storage of datasets and models. Collaboration is enabled by casting datasets and models as "social objects". Social functions include both private and public sharing, formation of collaborative groups of users, and value-added annotation of shared datasets and models. The HydroShare web interface and social media functions were developed using the Django web application framework coupled to iRODS. Data visualization and analysis is supported through the Tethys Platform web GIS software stack. Links to external systems are supported by RESTful web service interfaces to HydroShare's content. This presentation will introduce the HydroShare functionality developed to date and describe ongoing development of functionality to support collaboration and integration of data and models.

  15. Peer-to-Peer Networking -RE-SONANCE

    Indian Academy of Sciences (India)

    networking, operating systems and embedded systems. Peer-to-Peer (P2P) networking in recent times has been touted as .... Gnutella (General file sharing) P2P service at the same time. 2. .... The data processing does not occur in 'real time' ...

  16. Modelling of P2P-Based Video Sharing Performance for Content-Oriented Community-Based VoD Systems in Wireless Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shijie Jia

    2016-01-01

    Full Text Available The video sharing performance is a key factor for scalability and quality of service of P2P VoD systems in wireless mobile networks. There are some impact factors for the video sharing performance, such as available upload bandwidth, resource distribution in overlay networks, and mobility of mobile nodes. In this paper, we firstly model user behaviors: joining, playback, and departure for the content-oriented community-based VoD systems in wireless mobile networks and construct a resource assignment model by the analysis of transition of node state: suspend, wait, and playback. We analyze the influence of the above three factors: upload bandwidth, startup delay, and resource distribution for the sharing performance and QoS of systems. We further propose the improved resource sharing strategies from the perspectives of community architecture, resource distribution, and data transmission for the systems. Extensive tests show how the improved strategies achieve much better performance results in comparison with original strategies.

  17. Effects of Knowledge Sharing and Social Presence on the Intention to Continuously Use Social Networking Sites: The Case of Twitter in Korea

    Science.gov (United States)

    Park, Bong-Won; Lee, Kun Chang

    Recent surge of social networking websites in the world supports a widely accepted assumption that people aspires to be recognized online by sharing information with others, perceive enjoyment and keeps to use their social networking site continuously. Different from traditional social networking sites (SNSs) like Cyworld and Facebook, Twitter is famous for its short message and ease of sharing knowledge with others in a prompt manner. Therefore, Twitter is preferred most by many people who seem innovative generically. In this sense, Twitter accumulates its fame as the most influential SNS media among users. However, there is no study to investigate why people holds continuous intention to use the Twitter from the perspective of knowledge-sharing and social presence. To resolve this research issue, this paper adopts six constructs such as personal innovativeness, knowledge-sharing intention, perceived ease of use, perceived enjoyment, social presence, and intention to continuously use. Empirical results with 105 valid questionnaires revealed that the proposed research model is statistically significant, and people's intention to use the Twitter continuously is influenced by social presence, perceived enjoyment, and perceived ease of use.

  18. Trust Transitivity in Social Networks

    OpenAIRE

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical...

  19. GIFT: an HEP project for file transfer

    International Nuclear Information System (INIS)

    Ferrer, M.L.; Mirabelli, G.; Valente, E.

    1986-01-01

    Started in autumn 1983, GIFT (General Internetwork File Transfer) is a collaboration among several HEP centers, including CERN, Frascati, Oslo, Oxford, RAL and Rome. The collaboration was initially set up with the aim of studying the feasibility of a software system to allow direct file exchange between computers which do not share a common Virtual File Protocol. After the completion of this first phase, an implementation phase started and, since March 1985, an experimental service based on this system has been running at CERN between DECnet, CERNET and the UK Coloured Book protocols. The authors present the motivations that, together with previous gateway experiences, led to the definition of GIFT specifications and to the implementation of the GIFT Kernel system. The position of GIFT in the overall development framework of the networking facilities needed by large international collaborations within the HEP community is explained. (Auth.)

  20. Multi-objective optimization for the maximization of the operating share of cogeneration system in District Heating Network

    International Nuclear Information System (INIS)

    Franco, Alessandro; Versace, Michele

    2017-01-01

    Highlights: • Combined Heat and Power plants and civil/residential energy uses. • CHP plant supported by auxiliary boilers and thermal energy storage. • Definition of optimal operational strategies for cogeneration plants for District Heating. • Optimal-sized Thermal Energy Storage and a hybrid operational strategy. • Maximization of cogeneration share and reduction of time of operation of auxiliary boilers. - Abstract: The aim of the paper is to define optimal operational strategies for Combined Heat and Power plants connected to civil/residential District Heating Networks. The role of a reduced number of design variables, including a Thermal Energy Storage system and a hybrid operational strategy dependent on the storage level, is considered. The basic principle is to reach maximum efficiency of the system operation through the utilization of an optimal-sized Thermal Energy Storage. Objective functions of both energetic and combined energetic and economic can be considered. In particular, First and Second Law Efficiency, thermal losses of the storage, number of starts and stops of the combined heat and power unit are considered. Constraints are imposed to nullify the waste of heat and to operate the unit at its maximum efficiency for the highest possible number of consecutive operating hours, until the thermal tank cannot store more energy. The methodology is applied to a detailed case study: a medium size district heating system, in an urban context in the northern Italy, powered by a combined heat and power plant supported by conventional auxiliary boilers. The issues involving this type of thermal loads are also widely investigated in the paper. An increase of Second Law Efficiency of the system of 26% (from 0.35 to 0.44) can be evidenced, while the First Law Efficiency shifts from about 0.74 to 0.84. The optimization strategy permits of combining the economic benefit of cogeneration with the idea of reducing the energy waste and exergy losses.

  1. Analysis of Swedish Forest Owners' Information and Knowledge-Sharing Networks for Decision-Making: Insights for Climate Change Communication and Adaptation

    Science.gov (United States)

    André, Karin; Baird, Julia; Gerger Swartling, Åsa; Vulturius, Gregor; Plummer, Ryan

    2017-06-01

    To further the understanding of climate change adaptation processes, more attention needs to be paid to the various contextual factors that shape whether and how climate-related knowledge and information is received and acted upon by actors involved. This study sets out to examine the characteristics of forest owners' in Sweden, the information and knowledge-sharing networks they draw upon for decision-making, and their perceptions of climate risks, their forests' resilience, the need for adaptation, and perceived adaptive capacity. By applying the concept of ego-network analysis, the empirical data was generated by a quantitative survey distributed to 3000 private forest owners' in Sweden in 2014 with a response rate of 31%. The results show that there is a positive correlation, even though it is generally weak, between forest owner climate perceptions and (i) network features, i.e. network size and heterogeneity, and (ii) presence of certain alter groups (i.e. network members or actors). Results indicate that forest owners' social networks currently serve only a minimal function of sharing knowledge of climate change and adaptation. Moreover, considering the fairly infrequent contact between respondents and alter groups, the timing of knowledge sharing is important. In conclusion we suggest those actors that forest owners' most frequently communicate with, especially forestry experts providing advisory services (e.g. forest owner associations, companies, and authorities) have a clear role to communicate both the risks of climate change and opportunities for adaptation. Peers are valuable in connecting information about climate risks and adaptation to the actual forest property.

  2. Understanding the value of social networks in life satisfaction of elderly people: a comparative study of 16 European countries using SHARE data.

    Science.gov (United States)

    Tomini, Florian; Tomini, Sonila M; Groot, Wim

    2016-12-01

    Networks of family and friends are a source of support and are generally associated with higher life satisfaction values among older adults. On the other hand, older adults who are satisfied with their life may be more able to develop and maintain a wider social network. For this reason, the causal link between size and composition of the social networks and satisfaction with life is yet to be explored. This paper investigates the effect of the 'size', (number of family and friends, and network) and the 'composition' (the proportion of friends over total number of persons) of the social network on life satisfaction among older adults (50+). Moreover, we also investigate the patterns of this relation between different European countries. Data from the 4 th wave of Survey of Health, Ageing and Retirement in Europe and an instrumental variable approach are used to estimate the extent of the relation between life satisfaction and size and composition of social networks. Respondents in Western and Northern European (WNE) countries report larger networks than respondents in Eastern and Southern European (ESE) countries. However, the positive relationship between network size and life satisfaction is consistent across countries. On the other hand, the share of friends in the network appears to be generally negatively related to satisfaction with life, though results are not statistically significant for all countries. Apparently, a larger personal network is important for older adults (50+) to be more satisfied with life. Our results suggest that this relation is particularly positive if the network is comprised of family members.

  3. THE EFFECTS OF MATERIALISM, SELF-CONGRUITY, INDIVIDUALISM ON ATTITUDE TOWARD AND INTENTION TO SHARE PERSONALIZED ADVERTISEMENT ON SOCIAL NETWORK SITES

    OpenAIRE

    Hakan Cengiz; Behçet Yalın Özkara

    2016-01-01

    The main purpose of this study is to investigate the effects of materialism, individualism and self-congruity on the consumers’ intention to share personalized advertisements on social network sites (SNS) and attitude toward such advertisements. For this purpose, using a snowball sampling technique, social media users were invited to participate the study and encouraged to forward the invitation to others. The obtained data from 144 social media users were used to estimate the structural equa...

  4. Pemanfaatan Social Media Network Sebagai Media Komunikasi Komunitas Pustakawan Homogen Dalam Rangka Optimalisasi Resources Sharing Koleksi Antar Perguruan Tinggi

    Directory of Open Access Journals (Sweden)

    Haryanto Haryanto

    2016-07-01

    The purpose of this analysis is the creation of a homogeneous communication between librarians between universities so that they can support each other to provide of collection. In the world of libraries, collection limitations faced by almost all libraries, so that the necessary efforts such as sharing collections (resources sharing, for it is needed of a comunication medium that can be used as a medium of communication that connect these libraries. And social media is facebook With social media may be possible to create communities of similar or homogeneous so that they can communicate quickly for sharing collections. In utilizing social media for sharing resources the college library, in order to effectively take a few things in common among communities majors / homogeneous, the main admin control, resources sharing deal, admin list each library, freight forwarding services, as well as the MoU.

  5. Shared genetic regulatory networks for cardiovascular disease and type 2 diabetes in multiple populations of diverse ethnicities in the United States.

    Directory of Open Access Journals (Sweden)

    Le Shu

    2017-09-01

    Full Text Available Cardiovascular diseases (CVD and type 2 diabetes (T2D are closely interrelated complex diseases likely sharing overlapping pathogenesis driven by aberrant activities in gene networks. However, the molecular circuitries underlying the pathogenic commonalities remain poorly understood. We sought to identify the shared gene networks and their key intervening drivers for both CVD and T2D by conducting a comprehensive integrative analysis driven by five multi-ethnic genome-wide association studies (GWAS for CVD and T2D, expression quantitative trait loci (eQTLs, ENCODE, and tissue-specific gene network models (both co-expression and graphical models from CVD and T2D relevant tissues. We identified pathways regulating the metabolism of lipids, glucose, and branched-chain amino acids, along with those governing oxidation, extracellular matrix, immune response, and neuronal system as shared pathogenic processes for both diseases. Further, we uncovered 15 key drivers including HMGCR, CAV1, IGF1 and PCOLCE, whose network neighbors collectively account for approximately 35% of known GWAS hits for CVD and 22% for T2D. Finally, we cross-validated the regulatory role of the top key drivers using in vitro siRNA knockdown, in vivo gene knockout, and two Hybrid Mouse Diversity Panels each comprised of >100 strains. Findings from this in-depth assessment of genetic and functional data from multiple human cohorts provide strong support that common sets of tissue-specific molecular networks drive the pathogenesis of both CVD and T2D across ethnicities and help prioritize new therapeutic avenues for both CVD and T2D.

  6. Shared pledge shared vision

    International Nuclear Information System (INIS)

    Boussaha, Ali; Diatta, Christian Sina

    2005-01-01

    The New Partnership for Africa's Development (NEPAD) is a pledge by African leaders to eradicate poverty and to promote sustainable growth and development. NEPAD is a 'new framework of interaction with the rest of the world, including the industrialised countries and multilateral organizations.' The agenda is based on regional priorities and development plans and its implementation relies on African ownership and management. As a UN system organisation, the IAEA strongly supports the priorities identified in the Millennium Declaration and the New Partnership for Africa's Development. As a technical agency, the IAEA shares its recognized core competencies and technical expertise in support of NEPAD goals. Efforts aim at strengthening institutional capacity building in nuclear sciences and technology and promoting the sustainable application of nuclear techniques for social and economic development. The IAEA has a membership of 34 African countries. The Agency supports them under its technical cooperation programme through provision of expertise, training opportunities and equipment in priority areas identified by the countries themselves. For many African Member States, meeting basic human needs through the implementation of poverty alleviation strategies remains the top priority on the agenda for national development plans and international cooperation programmes. In the context of sustainable development, special attention is being paid to enlarging the contribution of isotopes and nuclear techniques in major areas of economic and social significance and to promoting regional cooperation in nuclear science and technology related fields. As a partner in development, the Agency has promoted and undertaken programmes to support African countries' efforts to address priority development issues particularly in the areas of health care, food and agriculture and water resources development. The IAEA technical cooperation mechanism includes support to the African Regional

  7. Data sharing system for lithography APC

    Science.gov (United States)

    Kawamura, Eiichi; Teranishi, Yoshiharu; Shimabara, Masanori

    2007-03-01

    We have developed a simple and cost-effective data sharing system between fabs for lithography advanced process control (APC). Lithography APC requires process flow, inter-layer information, history information, mask information and so on. So, inter-APC data sharing system has become necessary when lots are to be processed in multiple fabs (usually two fabs). The development cost and maintenance cost also have to be taken into account. The system handles minimum information necessary to make trend prediction for the lots. Three types of data have to be shared for precise trend prediction. First one is device information of the lots, e.g., process flow of the device and inter-layer information. Second one is mask information from mask suppliers, e.g., pattern characteristics and pattern widths. Last one is history data of the lots. Device information is electronic file and easy to handle. The electronic file is common between APCs and uploaded into the database. As for mask information sharing, mask information described in common format is obtained via Wide Area Network (WAN) from mask-vender will be stored in the mask-information data server. This information is periodically transferred to one specific lithography-APC server and compiled into the database. This lithography-APC server periodically delivers the mask-information to every other lithography-APC server. Process-history data sharing system mainly consists of function of delivering process-history data. In shipping production lots to another fab, the product-related process-history data is delivered by the lithography-APC server from the shipping site. We have confirmed the function and effectiveness of data sharing systems.

  8. Shared and disorder-specific task-positive and default mode network dysfunctions during sustained attention in paediatric Attention-Deficit/Hyperactivity Disorder and obsessive/compulsive disorder

    Directory of Open Access Journals (Sweden)

    Luke J. Norman

    2017-01-01

    Full Text Available Patients with Attention-Deficit/Hyperactivity Disorder (ADHD and obsessive/compulsive disorder (OCD share problems with sustained attention, and are proposed to share deficits in switching between default mode and task positive networks. The aim of this study was to investigate shared and disorder-specific brain activation abnormalities during sustained attention in the two disorders. Twenty boys with ADHD, 20 boys with OCD and 20 age-matched healthy controls aged between 12 and 18 years completed a functional magnetic resonance imaging (fMRI version of a parametrically modulated sustained attention task with a progressively increasing sustained attention load. Performance and brain activation were compared between groups. Only ADHD patients were impaired in performance. Group by sustained attention load interaction effects showed that OCD patients had disorder-specific middle anterior cingulate underactivation relative to controls and ADHD patients, while ADHD patients showed disorder-specific underactivation in left dorsolateral prefrontal cortex/dorsal inferior frontal gyrus (IFG. ADHD and OCD patients shared left insula/ventral IFG underactivation and increased activation in posterior default mode network relative to controls, but had disorder-specific overactivation in anterior default mode regions, in dorsal anterior cingulate for ADHD and in anterior ventromedial prefrontal cortex for OCD. In sum, ADHD and OCD patients showed mostly disorder-specific patterns of brain abnormalities in both task positive salience/ventral attention networks with lateral frontal deficits in ADHD and middle ACC deficits in OCD, as well as in their deactivation patterns in medial frontal DMN regions. The findings suggest that attention performance in the two disorders is underpinned by disorder-specific activation patterns.

  9. Supplement B: Research Networking Systems Characteristics Profiles. A Companion to the OCLC Research Report, Registering Researchers in Authority Files

    Science.gov (United States)

    Smith-Yoshimura, Karen; Altman, Micah; Conlon, Michael; Cristán, Ana Lupe; Dawson, Laura; Dunham, Joanne; Hickey, Thom; Hill, Amanda; Hook, Daniel; Horstmann, Wolfram; MacEwan, Andrew; Schreur, Philip; Smart, Laura; Wacker, Melanie; Woutersen, Saskia

    2014-01-01

    The OCLC Research Report, "Registering Researchers in Authority Files", [Accessible in ERIC as ED564924] summarizes the results of the research conducted by the OCLC Research Registering Researchers in Authority Files Task Group in 2012-2014. Details of this research are in supplementary data sets: (1) "Supplement A: Use Cases. A…

  10. Triadic Closure in Core Networks : Disentangling the Effects of Social Distance, National Origin Similarity and Shared Contexts

    NARCIS (Netherlands)

    Mollenhorst, Gerald|info:eu-repo/dai/nl/304835153; Van Duijn, Marijtje; Rydgren, Jens; Edling, Christofer

    2016-01-01

    Acknowledging that the composition and structure of personal networks is affected by meeting opportunities, social distance, and national origin similarity, we aim to disentangle their association with triadic closure in the core of personal networks. We use data (collected 2009) on the core

  11. Triadic closure in core networks: Disentangling the effects of social distance, natoinal origin similarity and shared contexts

    NARCIS (Netherlands)

    Mollenhorst, Gerald; van Duijn, Maria; Rydgren, Jens; Edling, Christopher

    2016-01-01

    Acknowledging that the composition and structure of personal networks is affected by meeting opportunities, social distance, and national origin similarity, we aim to disentangle their association with triadic closure in the core of personal networks. We use data (collected 2009) on the core

  12. Information sharing for effective IT incident resolving in IT service provider networks: A financial service case study

    NARCIS (Netherlands)

    Vlietland, J.; Vliet, J.C.

    2015-01-01

    Information technology (IT)-enabled financial services are typically delivered by a network of interdependent IT service providers. Such networks need information to resolve IT incidents in their delivered IT services. The objective of this research is to identify the set of information that needs

  13. Regulating the sharing economy

    OpenAIRE

    Erickson, Kristofer; Sorensen, Inge

    2016-01-01

    In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian) and economic (allocative, profit-seeking) aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions). This definition of the sharing economy distinguishe...

  14. Introducing the idea of 'assumed shared food narratives' in the context of social networks: reflections from a qualitative study conducted in Nottingham, England.

    Science.gov (United States)

    Bissell, Paul; Peacock, Marian; Holdsworth, Michelle; Powell, Katie; Wilcox, John; Clonan, Angie

    2018-06-19

    This study explores the ways in which social networks might shape accounts about food practices. Drawing on insights from the work of Christakis and Fowler () whose claims about the linkages between obesity and social networks have been the subject of vigorous debate in the sociological literature, we present qualitative data from a study of women's' accounts of social networks and food practices, conducted in Nottingham, England. We tentatively suggest that whilst social networks in their broadest sense, might shape what was perceived to be normal and acceptable in relation to food practices (and provide everyday discursive resources which normalise practice), the relationship between the two is more complex than the linear relationship proposed by Christakis and Fowler. Here, we introduce the idea of assumed shared food narratives (ASFNs), which, we propose, sheds light on motive talk about food practices, and which also provide practical and discursive resources to actors seeking to protect and defend against 'untoward' behaviour, in the context of public health messages around food and eating. We suggest that understanding ASFNs and the ways in which they are embedded in social networks represents a novel way of understanding food and eating practices from a sociological perspective. © 2018 Foundation for the Sociology of Health & Illness.

  15. Sharing individual patient and parasite-level data through the WorldWide Antimalarial Resistance Network platform: A qualitative case study [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Elizabeth Pisani

    2017-08-01

    Full Text Available Background: Increasingly, biomedical researchers are encouraged or required by research funders and journals to share their data, but there's very little guidance on how to do that equitably and usefully, especially in resource-constrained settings. We performed an in-depth case study of one data sharing pioneer: the WorldWide Antimalarial Resistance Network (WWARN. Methods: The case study included a records review, a quantitative analysis of WAARN-related publications, in-depth interviews with 47 people familiar with WWARN, and a witness seminar involving a sub-set of 11 interviewees. Results: WWARN originally aimed to collate clinical, in vitro, pharmacological and molecular data into linked, open-access databases intended to serve as a public resource to guide antimalarial drug treatment policies. Our study describes how WWARN navigated challenging institutional and academic incentive structures, alongside funders' reluctance to invest in capacity building in malaria-endemic countries, which impeded data sharing. The network increased data contributions by focusing on providing free, online tools to improve the quality and efficiency of data collection, and by inviting collaborative authorship on papers addressing policy-relevant questions that could only be answered through pooled analyses. By July 1, 2016, the database included standardised data from 103 molecular studies and 186 clinical trials, representing 135,000 individual patients. Developing the database took longer and cost more than anticipated, and efforts to increase equity for data contributors are on-going. However, analyses of the pooled data have generated new methods and influenced malaria treatment recommendations globally. Despite not achieving the initial goal of real-time surveillance, WWARN has developed strong data governance and curation tools, which are now being adapted relatively quickly for other diseases. Conclusions: To be useful, data sharing requires

  16. Non-POSIX File System for LHCb Online Event Handling

    CERN Document Server

    Garnier, J C; Cherukuwada, S S

    2011-01-01

    LHCb aims to use its O(20000) CPU cores in the high level trigger (HLT) and its 120 TB Online storage system for data reprocessing during LHC shutdown periods. These periods can last a few days for technical maintenance or only a few hours during beam interfill gaps. These jobs run on files which are staged in from tape storage to the local storage buffer. The result are again one or more files. Efficient file writing and reading is essential for the performance of the system. Rather than using a traditional shared file-system such as NFS or CIFS we have implemented a custom, light-weight, non-Posix network file-system for the handling of these files. Streaming this file-system for the data-access allows to obtain high performance, while at the same time keep the resource consumption low and add nice features not found in NFS such as high-availability, transparent fail-over of the read and write service. The writing part of this streaming service is in successful use for the Online, real-time writing of the d...

  17. User-Friendly Data-Sharing Practices for Fostering Collaboration within a Research Network: Roles of a Vanguard Center for a Community-Based Study

    Directory of Open Access Journals (Sweden)

    Jae Eun Lee

    2015-12-01

    Full Text Available Although various attempts have been made to build collaborative cultures for data sharing, their effectiveness is still questionable. The Jackson Heart Study (JHS Vanguard Center (JHSVC at the NIH-funded Research Centers in Minority Institutions (RCMI Translational Research Network (RTRN Data Coordinating Center (DCC may be a new concept in that the data are being shared with a research network where a plethora of scientists/researchers are working together to achieve their common goal. This study describes the current practices to share the JHS data through the mechanism of JHSVC. The JHS is the largest single-site cohort study to prospectively investigate the determinants of cardiovascular disease among African-Americans. It has adopted a formal screened access method through a formalized JHSVC mechanism, in which only a qualified scientist(s can access the data. The role of the DCC was to help RTRN researchers explore hypothesis-driven ideas to enhance the output and impact of JHS data through customized services, such as feasibility tests, data querying, manuscript proposal development and data analyses for publication. DCC has implemented these various programs to facilitate data utility. A total of 300 investigators attended workshops and/or received training booklets. DCC provided two online and five onsite workshops and developed/distributed more than 250 copies of the booklet to help potential data users understand the structure of and access to the data. Information on data use was also provided through the RTRN website. The DCC efforts led to the production of five active manuscript proposals, seven completed publications, 11 presentations and four NIH grant proposals. These outcomes resulted from activities during the first four years; over the last couple of years, there were few new requests. Our study suggested that DCC-customized services enhanced the accessibility of JHS data and their utility by RTRN researchers and helped to

  18. GPP Webinar: Solar Utilization in Higher Education Networking & Information Sharing Group: RFP, Contract, and Administrative Issues Discussion

    Science.gov (United States)

    This presentation from a Solar Utilization in Higher Education Networking and Information webinar covers contracts, Request for Proposals (RFPs), and administrative issues related to solar project development in the higher education sector.

  19. Comparative transcriptional profiling of 3 murine models of SLE nephritis reveals both unique and shared regulatory networks.

    Directory of Open Access Journals (Sweden)

    Ramalingam Bethunaickan

    Full Text Available To define shared and unique features of SLE nephritis in mouse models of proliferative and glomerulosclerotic renal disease.Perfused kidneys from NZB/W F1, NZW/BXSB and NZM2410 mice were harvested before and after nephritis onset. Affymetrix based gene expression profiles of kidney RNA were analyzed using Genomatix Pathway Systems and Ingenuity Pathway Analysis software. Gene expression patterns were confirmed using real-time PCR.955, 1168 and 755 genes were regulated in the kidneys of nephritic NZB/W F1, NZM2410 and NZW/BXSB mice respectively. 263 genes were regulated concordantly in all three strains reflecting immune cell infiltration, endothelial cell activation, complement activation, cytokine signaling, tissue remodeling and hypoxia. STAT3 was the top associated transcription factor, having a binding site in the gene promoter of 60/263 regulated genes. The two strains with proliferative nephritis shared a macrophage/DC infiltration and activation signature. NZB/W and NZM2410 mice shared a mitochondrial dysfunction signature. Dominant T cell and plasma cell signatures in NZB/W mice reflected lymphoid aggregates; this was the only strain with regulatory T cell infiltrates. NZW/BXSB mice manifested tubular regeneration and NZM2410 mice had the most metabolic stress and manifested loss of nephrin, indicating podocyte loss.These findings identify shared inflammatory mechanisms of SLE nephritis that can be therapeutically targeted. Nevertheless, the heterogeneity of effector mechanisms suggests that individualized therapy might need to be based on biopsy findings. Some common mechanisms are shared with non-immune-mediated renal diseases, suggesting that strategies to prevent tissue hypoxia and remodeling may be useful in SLE nephritis.

  20. Towards Internet of Things (IOTS):Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing

    OpenAIRE

    Piyare, Rajeev; Lee, Seong Ro

    2013-01-01

    Cloud computing provides great benefits for applications hosted on the Web that also have special computational and storage requirements. This paper proposes an extensible and flexible architecture for integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an interoperable application layer that can be directly integrated into other application domains for remote monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN)...

  1. Analysis of a summary network of co-infection in humans reveals that parasites interact most via shared resources

    OpenAIRE

    Griffiths, Emily C; Pedersen, Amy B; Fenton, Andy; Petchey, Owen L

    2014-01-01

    Simultaneous infection by multiple parasite species (viruses, bacteria, helminths, protozoa or fungi) is commonplace. Most reports show co-infected humans to have worse health than those with single infections. However, we have little understanding of how co-infecting parasites interact within human hosts. We used data from over 300 published studies to construct a network that offers the first broad indications of how groups of co-infecting parasites tend to interact. The network had three l...

  2. The Mekong Fish Network: expanding the capacity of the people and institutions of the Mekong River Basin to share information and conduct standardized fisheries monitoring

    Science.gov (United States)

    Patricio, Harmony C.; Ainsley, Shaara M.; Andersen, Matthew E.; Beeman, John W.; Hewitt, David A.

    2012-01-01

    The Mekong River is one of the most biologically diverse rivers in the world, and it supports the most productive freshwater fisheries in the world. Millions of people in the Lower Mekong River Basin (LMB) countries of the Union of Myanmar (Burma), Lao People’s Democratic Republic, the Kingdom of Thailand, the Kingdom of Cambodia, and the Socialist Republic of Vietnam rely on the fisheries of the basin to provide a source of protein. The Mekong Fish Network Workshop was convened in Phnom Penh, Cambodia, in February 2012 to discuss the potential for coordinating fisheries monitoring among nations and the utility of establishing standard methods for short- and long-term monitoring and data sharing throughout the LMB. The concept for this network developed out of a frequently cited need for fisheries researchers in the LMB to share their knowledge with other scientists and decisionmakers. A fish monitoring network could be a valuable forum for researchers to exchange ideas, store data, or access general information regarding fisheries studies in the LMB region. At the workshop, representatives from governments, nongovernmental organizations, and universities, as well as participating foreign technical experts, cited a great need for more international cooperation and technical support among them. Given the limited staff and resources of many institutions in the LMB, the success of the proposed network would depend on whether it could offer tools that would provide benefits to network participants. A potential tool discussed at the workshop was a user-friendly, Web-accessible portal and database that could help streamline data entry and storage at the institutional level, as well as facilitate communication and data sharing among institutions. The workshop provided a consensus to establish pilot standardized data collection and database efforts that will be further reviewed by the workshop participants. Overall, workshop participants agreed that this is the type of

  3. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  4. Optimization of routing strategies for data transfer in peer-to-peer networks

    International Nuclear Information System (INIS)

    Morioka, Atsushi; Igarashi, Akito

    2014-01-01

    Since peer-to-peer file-sharing systems have become familiar recently, the information traffic in the networks is increasing. Therefore it causes various traffic problems in peer-to-peer networks. In this paper, we model some features of the peer-to-peer networks, and investigate the traffic problems. Peer-to-peer networks have two notable characters. One is that each peer frequently searches for a file and download it from a peer who has the requested file. To decide whether a peer has the requested file or not in modelling of the search and download process, we introduce file-parameter P j , which expresses the amount of files stored in peer j. It is assumed that if P j is large, peer j has many files and can meet other peers' requests with high probability. The other character is that peers leave and join into the network repeatedly. Many researchers address traffic problems of data transfer in computer communication networks. To our knowledge, however, no reports focus on those in peer-to-peer networks whose topology changes with time. For routing paths of data transfer, generally, the shortest paths are used in usual computer networks. In this paper, we introduce a new optimal routing strategy which uses weights of peers to avoid traffic congestion. We find that the new routing strategy is superior to the shortest path strategy in terms of congestion frequency in data transfer

  5. Radiology education 2.0--on the cusp of change: part 2. eBooks; file sharing and synchronization tools; websites/teaching files; reference management tools and note taking applications.

    Science.gov (United States)

    Bhargava, Puneet; Dhand, Sabeen; Lackey, Amanda E; Pandey, Tarun; Moshiri, Mariam; Jambhekar, Kedar

    2013-03-01

    Increasing use of smartphones and handheld computers is accompanied by a rapid growth in the other related industries. Electronic books have revolutionized the centuries-old conventional books and magazines markets and have simplified publishing by reducing the cost and processing time required to create and distribute any given book. We are now able to read, review, store, and share various types of documents via several electronic tools, many of which are available free of charge. Additionally, this electronic revolution has resulted in an explosion of readily available Internet-based educational resources for the residents and has paved the path for educators to reach out to a larger and more diverse student population. Published by Elsevier Inc.

  6. A Data Sharing Story

    Directory of Open Access Journals (Sweden)

    Mercè Crosas

    2012-01-01

    Full Text Available From the early days of modern science through this century of Big Data, data sharing has enabled some of the greatest advances in science. In the digital age, technology can facilitate more effective and efficient data sharing and preservation practices, and provide incentives for making data easily accessible among researchers. At the Institute for Quantitative Social Science at Harvard University, we have developed an open-source software to share, cite, preserve, discover and analyze data, named the Dataverse Network. We share here the project’s motivation, its growth and successes, and likely evolution.

  7. Situated Learning through Social Networking Communities: The Development of Joint Enterprise, Mutual Engagement, and a Shared Repertoire

    Science.gov (United States)

    Mills, Nicole

    2011-01-01

    Scholars praise social networking tools for their ability to engage and motivate iGeneration students in meaningful communicative practice, content exchange, and collaboration (Greenhow, Robelia, & Hughes, 2009; Ziegler, 2007). To gain further insight about the nature of student participation, knowledge acquisition, and relationship development…

  8. Aspects that play a role in developing, sharing and using knowledge in school-university research networks

    NARCIS (Netherlands)

    prof dr Douwe Beijaard; Dr. Jacqueline van Swet; prof dr Theo Bergen; dr Frank Cornelissen

    2011-01-01

    School-university research networks aim at closer integration of research and practice by means of teacher research. Such practice-oriented research can enhance teachers' professional knowledge development, and can benefit both schools and university. This paper reports on 21 participants of a

  9. Networks of Food Sharing Reveal the Functional Significance of Multilevel Sociality in Two Hunter-Gatherer Groups.

    Science.gov (United States)

    Dyble, Mark; Thompson, James; Smith, Daniel; Salali, Gul Deniz; Chaudhary, Nikhil; Page, Abigail E; Vinicuis, Lucio; Mace, Ruth; Migliano, Andrea Bamberg

    2016-08-08

    Like many other mammalian and primate societies [1-4], humans are said to live in multilevel social groups, with individuals situated in a series of hierarchically structured sub-groups [5, 6]. Although this multilevel social organization has been described among contemporary hunter-gatherers [5], questions remain as to the benefits that individuals derive from living in such groups. Here, we show that food sharing among two populations of contemporary hunter-gatherers-the Palanan Agta (Philippines) and Mbendjele BaYaka (Republic of Congo)-reveals similar multilevel social structures, with individuals situated in households, within sharing clusters of 3-4 households, within the wider residential camps, which vary in size. We suggest that these groupings serve to facilitate inter-sexual provisioning, kin provisioning, and risk reduction reciprocity, three levels of cooperation argued to be fundamental in human societies [7, 8]. Humans have a suite of derived life history characteristics including a long childhood and short inter-birth intervals that make offspring energetically demanding [9] and have moved to a dietary niche that often involves the exploitation of difficult to acquire foods with highly variable return rates [10-12]. This means that human foragers face both day-to-day and more long-term energetic deficits that conspire to make humans energetically interdependent. We suggest that a multilevel social organization allows individuals access to both the food sharing partners required to buffer themselves against energetic shortfalls and the cooperative partners required for skill-based tasks such as cooperative foraging. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Group Clustering Mechanism for P2P Large Scale Data Sharing Collaboration

    Institute of Scientific and Technical Information of China (English)

    DENGQianni; LUXinda; CHENLi

    2005-01-01

    Research shows that P2P scientific collaboration network will exhibit small-world topology, as do a large number of social networks for which the same pattern has been documented. In this paper we propose a topology building protocol to benefit from the small world feature. We find that the idea of Freenet resembles the dynamic pattern of social interactions in scientific data sharing and the small world characteristic of Freenet is propitious to improve the file locating performance in scientificdata sharing. But the LRU (Least recently used) datas-tore cache replacement scheme of Freenet is not suitableto be used in scientific data sharing network. Based onthe group locality of scientific collaboration, we proposean enhanced group clustering cache replacement scheme.Simulation shows that this scheme improves the request hitratio dramatically while keeping the small average hops per successful request comparable to LRU.

  11. Health Topic XML File Description

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xmldescription.html Health Topic XML File Description: MedlinePlus To use the sharing ... information categories assigned. Example of a Full Health Topic Record A record for a MedlinePlus health topic ...

  12. Evaluation of cooperation WPP and PV connected through the shared transformer to the network 22kV

    Directory of Open Access Journals (Sweden)

    Tomas Sumbera

    2012-01-01

    Full Text Available The article deals with evaluation the cooperation possibility of wind and solar power plants connected through the common transformator to the 22kV network. Cooperation evaluation is, based on measured data, for wind power plant about installed capacity 2MW and for solar power plant about installed capacity 1,1MWp. In the next part of this article there is the analysis of suitable localities for construction of „hybrid system (WPP+PV“ in the Czech Republic. The last part of the article deals with analysis of active power fluctuation of individuals electric sources compared with system WPP+PV and with evaluation the effects after system connection WPP+PV to the 22kV network.

  13. Sharing life”. About the adoption of social networks on the Internet among people with disabilities and older persons

    Directory of Open Access Journals (Sweden)

    Luis Miguel Bascones Serrano

    2014-06-01

    Full Text Available Social networking on the Internet, in conjunction with new devices like the smartphone or tablet –evolutions of the PC which have become an extension of the individual– recreate the ways of being in contact. This article offers, from a sociological approach to technology, an approximation to practices and, especially, to the processes of discursive representation of these networks between people with disabilities and elderly, to understand the different attitudes to them, barriers perceived, the distances and its disclosed potential. It is found that, in addition to the functional diversity profiles, age and educational level largely condition the process of adoption of these information and communications technologies (ICTs, the effect of its barriers and the use of their advantages.

  14. Conference of Radiation Control Program Directors, Inc. (CRCPD). A model for networking, cooperation, resource sharing, information exchange and regulation harmonization

    International Nuclear Information System (INIS)

    2007-01-01

    The focus of the talk will be to introduce the participants to the Conference of Radiation Control Program Directors, Inc. (CRCPD) and their proven methods for networking, information exchange, regulation development and standardization, and radiation protection guidance on emerging technologies. The presentation will describe how radiation control programs and staff from all 50 states in the US work collaboratively to ensure adequate radiation protection standards are uniformly applied throughout the country by pooling of resources and networking between all the states and the federal government, as well as with international members and partners. The products of CRCPD, such as the Suggested State Regulations along with other relevant informational documents, will be discussed along with how participants can access these products for use in their respective countries. CRCPD and its members represent a comprehensive radiation regulatory structure, covering all radiation sources and activities, (radioactive materials, licensing, registration, radioactive waste, x-ray, accelerators, emergency response, environmental monitoring, radon, and security). Networks are in place for all radiation issues. At the completion of this presentation, the participants will better understand a proven method to develop and implement a cooperative partnership with other countries. They will also gain knowledge on how to access CRCPD products that can be tailored for their own use and how to request technical assistance from membership. (author)

  15. Patients with first-episode, drug-naive schizophrenia and subjects at ultra-high risk of psychosis shared increased cerebellar-default mode network connectivity at rest.

    Science.gov (United States)

    Wang, Houliang; Guo, Wenbin; Liu, Feng; Wang, Guodong; Lyu, Hailong; Wu, Renrong; Chen, Jindong; Wang, Shuai; Li, Lehua; Zhao, Jingping

    2016-05-18

    Increased cerebellar-default mode network (DMN) connectivity has been observed in first-episode, drug-naive patients with schizophrenia. However, it remains unclear whether increased cerebellar-DMN connectivity starts earlier than disease onset. Thirty-four ultra-high risk (UHR) subjects, 31 first-episode, drug-naive patients with schizophrenia and 37 healthy controls were enrolled for a resting-state scan. The imaging data were analyzed using the seed-based functional connectivity (FC) method. Compared with the controls, UHR subjects and patients with schizophrenia shared increased connectivity between the right Crus I and bilateral posterior cingulate cortex/precuneus and between Lobule IX and the left superior medial prefrontal cortex. There are positive correlations between the right Crus I-bilateral precuneus connectivity and clinical variables (Structured Interview for Prodromal Syndromes/Positive and Negative Symptom Scale negative symptoms/total scores) in the UHR subjects. Increased cerebellar-DMN connectivity shared by the UHR subjects and the patients not only highlights the importance of the DMN in the pathophysiology of psychosis but also may be a trait alteration for psychosis.

  16. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    4 KB of data is read or written, data is copied back and forth using trampoline buffers — pages that are shared during proxy initialization — because...in 2008. CIO Magazine. 104 · File system virtual appliances [64] Megiddo, N. and Modha, D. S. 2003. ARC: A Self-Tuning, Low Over- head Replacement

  17. Synthesizing community wisdom: A model for sharing cancer-related resources through social networking and collaborative partnerships.

    Science.gov (United States)

    Weiss, Jacob B; Lorenzi, Nancy M; Lorenzi, Nancy

    2008-11-06

    Despite the availability of community-based support services, cancer patients and survivors are not aware of many of these resources. Without access to community programs, cancer survivors are at risk for lower quality of care and lower quality of life. At the same time, non-profit community organizations lack access to advanced consumer informatics applications to effectively promote awareness of their services. In addition to the current models of print and online resource guides, new community-driven informatics approaches are needed to achieve the goal of comprehensive care for cancer survivors. We present the formulation of a novel model for synthesizing a local communitys collective wisdom of cancer-related resources through a combination of online social networking technologies and real-world collaborative partnerships. This approach can improve awareness of essential, but underutilized community resources.

  18. Investigation of extra power loss sharing among photovoltaic inverters caused by reactive power management in distribution networks

    DEFF Research Database (Denmark)

    Demirok, Erhan; Sera, Dezso; Teodorescu, Remus

    2014-01-01

    load and power loss on the feeders and individual inverters. Simplified energy loss evaluation is carried out here by using analytical average loss modeling of 2-level full bridge inverter coupled with network load flow analysis simulating one month period. The study shows that whatever Q control......Grid-connected photovoltaic (PV) inverters tailored with reactive power management feature can support the grid voltage especially when the voltage fluctuates near its admissible limits. Although Q control allows reducing the grid voltage elevation along the distribution feeder, it brings extra...... is selected, extra power loss is not a substantial amount to take into consideration. Similarly, loss difference among the inverters located at the various points is negligible....

  19. To share and be shared

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    2018-01-01

    to another. To a certain degree, they share their everyday lives, things, places, memories, and past/future, but as the ones who move back and forth, they belong a little less in each place. This article is about children who are shared between their parent, households and siblings. They are shared...

  20. Q-Learning and p-persistent CSMA based rendezvous protocol for cognitive radio networks operating with shared spectrum activity

    Science.gov (United States)

    Watson, Clifton L.; Biswas, Subir

    2014-06-01

    With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.

  1. Shared effects of the clusterin gene on the default mode network among individuals at risk for Alzheimer's disease.

    Science.gov (United States)

    Ye, Qing; Su, Fan; Shu, Hao; Gong, Liang; Xie, Chun-Ming; Zhou, Hong; Zhang, Zhi-Jun; Bai, Feng

    2017-05-01

    To explore the common effects of the clusterin (CLU) rs11136000 variant on the default mode network (DMN) in amnestic mild cognitive impairment (aMCI) subjects and remitted geriatric depression (RGD) subjects. Fifty-one aMCI subjects, 38 RGD subjects, and 64 cognitively normal elderly subjects underwent resting-state fMRI scans and neuropsychological tests at both baseline and a 35-month follow-up. Posterior cingulate cortex seed-based functional connectivity (FC) analysis was used to obtain the DMN patterns. A CLU gene×disease×time interaction for aMCI subjects was mainly detected in the core cortical midline structures of the DMN, and the interaction for RGD subjects was mainly detected in the limbic system. However, they overlapped in two frontal regions, where consistent effects of the CLU gene on FC alterations were found between aMCI and RGD groups. Furthermore, the alterations of FC with frontal, parietal, and limbic regions compensated for episodic memory impairments in CLU-CT/TT carriers, while no such compensation was found in CLU-CC carriers. The CLU gene could consistently affect the DMN FC with frontal regions among individuals at risk for Alzheimer's disease, and the CLU-T allele was associated with more compensatory neural processes in DMN changes. © 2017 John Wiley & Sons Ltd.

  2. "Every Gene Is Everywhere but the Environment Selects": Global Geolocalization of Gene Sharing in Environmental Samples through Network Analysis.

    Science.gov (United States)

    Fondi, Marco; Karkman, Antti; Tamminen, Manu V; Bosi, Emanuele; Virta, Marko; Fani, Renato; Alm, Eric; McInerney, James O

    2016-05-13

    The spatial distribution of microbes on our planet is famously formulated in the Baas Becking hypothesis as "everything is everywhere but the environment selects." While this hypothesis does not strictly rule out patterns caused by geographical effects on ecology and historical founder effects, it does propose that the remarkable dispersal potential of microbes leads to distributions generally shaped by environmental factors rather than geographical distance. By constructing sequence similarity networks from uncultured environmental samples, we show that microbial gene pool distributions are not influenced nearly as much by geography as ecology, thus extending the Bass Becking hypothesis from whole organisms to microbial genes. We find that gene pools are shaped by their broad ecological niche (such as sea water, fresh water, host, and airborne). We find that freshwater habitats act as a gene exchange bridge between otherwise disconnected habitats. Finally, certain antibiotic resistance genes deviate from the general trend of habitat specificity by exhibiting a high degree of cross-habitat mobility. The strong cross-habitat mobility of antibiotic resistance genes is a cause for concern and provides a paradigmatic example of the rate by which genes colonize new habitats when new selective forces emerge. © The Author(s) 2016. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  3. Sharing City

    DEFF Research Database (Denmark)

    This magazine offers an insight into the growing commercial innovation, civic movements, and political narratives surrounding sharing economy services, solutions and organisational types. It presents a cross-section of the manifold sharing economy services and solutions that can be found in Denmark....... Moreover, 15 thought leading experts - professionals and academic - have been invited to give their perspective on sharing economy for cities. This magazine touches upon aspects of the sharing economy as mobility, communities, sustainability, business development, mobility, and urban-rural relation....

  4. Establishment of the National Nuclear Regulatory Portal (NNRP) as the key element of the Global Nuclear Safety and Security Network and Regulatory Network (GNSSN/RegNet) for sharing of nuclear safety information and knowledge among the Global Expert Community

    International Nuclear Information System (INIS)

    Kuvshinnikov, A.V.

    2011-01-01

    The Global Nuclear Safety and Security Network (GNSSN) implements the concept of the Global Nuclear Safety and Security Framework (GNSSF) as outlined in INSAG 21. This is the framework of instruments and resources for achieving and maintaining worldwide a high level of safety and security at nuclear facilities and activities as stated in SF-1 and supporting safety standards or recommendations such as INSAG-12. National efforts are and should be augmented by the activities of a variety of international enterprises that facilitate safety and security. The IAEA standard GS-R-3 requires that information and knowledge is managed as a resource. Further strengthening of GNSSN in particular regulatory networking as intended by GNSSN/RegNet has to be based on current national priorities, on existing regional and thematic networks and on the established mechanisms of international co-operation as presented for example on the websites of the IAEA or the OECD-NEA. Current design and operation of RegNet are flexible enough to accommodate differences in national and international approaches and practices and to facilitate exchange and cooperation on regulatory matters. The main role of GNSSN/RegNet is sharing knowledge and bringing people together to enhance and promote nuclear safety and security. The objectives of GNSSN/RegNet: enhancing safety and security by international cooperation, sharing information and best practices, enabling adequate access to relevant safety and security information and promoting the dissemination of this information, implementing active collaboration in the relevant areas related to safety and security, such as joint projects, peer reviews, enabling synergies among existing networks and initiatives, informing the public on the relevant safety and security areas and the related international collaboration. In the RegNet part of the GNSSN exist the National Nuclear Regulatory Portal (NNRP) which is on one hand a part of the global RegNet and on the

  5. Derived virtual devices: a secure distributed file system mechanism

    Science.gov (United States)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  6. Validation of organ procurement and transplant network (OPTN)/united network for organ sharing (UNOS) criteria for imaging diagnosis of hepatocellular carcinoma.

    Science.gov (United States)

    Fowler, Kathryn J; Karimova, E Jane; Arauz, Anthony R; Saad, Nael E; Brunt, Elizabeth M; Chapman, William C; Heiken, Jay P

    2013-06-27

    Imaging diagnosis of hepatocellular carcinoma (HCC) presents an important pathway for transplant exception points and priority for cirrhotic patients. The purpose of this retrospective study is to evaluate the validity of the new Organ Procurement and Transplant Network (OPTN) classification system on patients undergoing transplantation for HCC. One hundred twenty-nine patients underwent transplantation for HCC from April 14, 2006 to April 18, 2011; a total of 263 lesions were reported as suspicious for HCC on pretransplantation magnetic resonance imaging. Magnetic resonance imaging examinations were reviewed independently by two experienced radiologists, blinded to final pathology. Reviewers identified major imaging features and an OPTN classification was assigned to each lesion. Final proof of diagnosis was pathology on explant or necrosis along with imaging findings of ablation after transarterial chemoembolization. Application of OPTN imaging criteria in our population resulted in high specificity for the diagnosis of HCC. Sensitivity in diagnosis of small lesions (≥1 and based on preoperative imaging but would not have met criteria under the new system. Eleven percent of the patients not meeting OPTN criteria were found to have T2 stage tumor burden on pathology. The OPTN imaging policy introduces a high level of specificity for HCC but may decrease sensitivity for small lesions. Management may be impacted in a number of patients, potentially requiring longer surveillance periods or biopsy to confirm diagnosis.

  7. Culture, social networks, and information sharing: An exploratory study of Japanese aerospace engineers' information-seeking processes and habits in light of cultural factors

    Science.gov (United States)

    Sato, Yuko

    The purpose of this study was to investigate the effects of culture and language on Japanese aerospace engineers' information-seeking processes by both quantitative and qualitative approaches. The Japanese sample consisted of 162 members of the Japan Society for Aeronautical and Space Sciences (JSASS). U.S. aerospace engineers served as a reference point, consisting of 213 members of the American Institute of Aeronautics and Astronautics (AIAA). The survey method was utilized in gathering data using self-administered mail questionnaires in order to explore the following eight areas: (1) the content and use of information resources; (2) production and use of information products; (3) methods of accessing information service providers; (4) foreign language skills; (5) studying/researching/collaborating abroad as a tool in expanding information resources; (6) scientific and technical societies as networking tools; (7) alumni associations (school/class reunions) as networking tools; and (8) social, corporate, civic and health/fitness clubs as networking tools. Nine Japanese cultural factors expressed as statements about Japanese society are as follows: (1) information is neither autonomous, objective, nor independent of the subject of cognition; (2) information and knowledge are not readily accessible to the public; (3) emphasis on groups is reinforced in a hierarchical society; (4) social networks thrive as information-sharing vehicles; (5) high context is a predominant form of communication in which most of the information is already in the person, while very little is in the coded, transmitted part of the message; (6) obligations based on mutual trust dictate social behaviors instead of contractual agreements; (7) a surface message is what is presented while a bottom-line message is true feeling privately held; (8) various religious beliefs uphold a work ethic based on harmony; (9) ideas from outside are readily assimilated into its own society. The result of the

  8. Sharing Keynote Slideshows

    CERN Document Server

    Clark, Josh

    2010-01-01

    Slideshows have come a long way since overhead projectors were your only option. You can show share your ideas with the world via email, DVD, PDF, YouTube, iPhone, or kiosk. Once your show is polished to perfection, this thorough, accessible guide shows you how to export and deliver it all possible ways-even as a PowerPoint file, QuickTime movie, or web site. As a bonus, you'll find advice on setting up your equipment and delivering an effective presentation.

  9. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  10. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  11. Shared leadership

    DEFF Research Database (Denmark)

    Ulhøi, John Parm; Müller, Sabine

    2012-01-01

    The aim of this paper is twofold. First, this paper comprehensively will review the conceptual and empirical literature to identify such critical underlying mechanisms which enable shared or collective leadership. Second, this article identifies the antecedents and outcomes of shared leadership...... according to the literature review to develop a re-conceptualised and synthesized framework for managing the organizational issues associated with shared leadership on various organizational levels. The paper rectifies this by identifying the critical factors and mechanisms which enable shared leadership...... and its antecedents and outcomes, and to develop a re-conceptualized and synthesized framework of shared leadership. The paper closes with a brief discussion of avenues for future research and implications for managers....

  12. Little Cross-Feeding of the Mycorrhizal Networks Shared Between C3-Panicum bisulcatum and C4-Panicum maximum Under Different Temperature Regimes

    Directory of Open Access Journals (Sweden)

    Veronika Řezáčová

    2018-04-01

    Full Text Available Common mycorrhizal networks (CMNs formed by arbuscular mycorrhizal fungi (AMF interconnect plants of the same and/or different species, redistributing nutrients and draining carbon (C from the different plant partners at different rates. Here, we conducted a plant co-existence (intercropping experiment testing the role of AMF in resource sharing and exploitation by simplified plant communities composed of two congeneric grass species (Panicum spp. with different photosynthetic metabolism types (C3 or C4. The grasses had spatially separated rooting zones, conjoined through a root-free (but AMF-accessible zone added with 15N-labeled plant (clover residues. The plants were grown under two different temperature regimes: high temperature (36/32°C day/night or ambient temperature (25/21°C day/night applied over 49 days after an initial period of 26 days at ambient temperature. We made use of the distinct C-isotopic composition of the two plant species sharing the same CMN (composed of a synthetic AMF community of five fungal genera to estimate if the CMN was or was not fed preferentially under the specific environmental conditions by one or the other plant species. Using the C-isotopic composition of AMF-specific fatty acid (C16:1ω5 in roots and in the potting substrate harboring the extraradical AMF hyphae, we found that the C3-Panicum continued feeding the CMN at both temperatures with a significant and invariable share of C resources. This was surprising because the growth of the C3 plants was more susceptible to high temperature than that of the C4 plants and the C3-Panicum alone suppressed abundance of the AMF (particularly Funneliformis sp. in its roots due to the elevated temperature. Moreover, elevated temperature induced a shift in competition for nitrogen between the two plant species in favor of the C4-Panicum, as demonstrated by significantly lower 15N yields of the C3-Panicum but higher 15N yields of the C4-Panicum at elevated as

  13. Give-and-take based peer-to-peer content distribution networks

    Indian Academy of Sciences (India)

    Compared to traditional content distribution schemes, peer- to-peer networks ... are shared among users who desire to download files. In a peer-to-peer ..... randomly generated data points, with 300 segments and 200 peers. From the figure ...

  14. Decreased graft survival in liver transplant recipients of donors with positive blood cultures: a review of the United Network for Organ Sharing dataset.

    Science.gov (United States)

    Huaman, Moises A; Vilchez, Valery; Mei, Xiaonan; Shah, Malay B; Daily, Michael F; Berger, Jonathan; Gedaly, Roberto

    2017-06-01

    Liver transplantation using blood culture positive donors (BCPD) has allowed a significant expansion of the donor pool. We aimed to characterize BCPD and assess the outcomes of BCPD liver transplant recipients. We retrieved data from the United Network for Organ Sharing (UNOS) registry on all adults who underwent primary, single-organ deceased-donor liver transplantation in the USA between 2008 and 2013. Patients were classified into two cohorts: the BCPD cohort and the non-BCPD cohort. One-year graft and patient survival were compared between cohorts using Kaplan-Meier estimates and Cox models. A total of 28 961 patients were included. There were 2316 (8.0%) recipients of BCPD. BCPD were more likely to be older, female, black, diabetic, hypertensive, and obese compared to non-BCPD. Graft survival was significantly lower in BCPD recipients compared to non-BCPD recipients (Kaplan-Meier, 0.85 vs. 0.87; P = 0.009). Results remained significant in propensity-matched analysis (P = 0.038). BCPD was independently associated with decreased graft survival (adjusted HR; 1.10, 95% CI 1.01-1.20; P = 0.04). There were no significant differences in patient survival between study groups. BCPD was associated with decreased graft survival in liver transplant recipients. Studies are needed to identify subgroups of BCPD with the highest risk of graft failure and characterize the underlying pathogenic mechanisms. © 2016 Steunstichting ESOT.

  15. Communications infrastructure requirements for telemedicine/telehealth in the context of planning for and responding to natural disasters: Considering the need for shared regional networks

    Science.gov (United States)

    Scott, John Carver

    1991-01-01

    During the course of recent years the frequency and magnitude of major disasters - of natural, technological, or ecological origin - have made the world community dramatically aware of the immense losses of human life and economic resources that are caused regularly by such calamities. Particularly hard hit are developing countries, for whom the magnitude of disasters frequently outstrips the ability of the society to cope with them. In many cases this situation can be prevented, and the recent trend in disaster management has been to emphasize the importance of preparedness and mitigation as a means of prevention. In cases of disaster, a system is needed to respond to relief requirements, particularly the delivery of medical care. There is no generic telecommunications infrastructure appropriate for the variety of applications in medical care and disaster management. The need to integrate telemedicine/telehealth into shared regional disaster management telecommunications networks is discussed. Focus is on the development of infrastructure designed to serve the needs of disaster prone regions of the developing world.

  16. Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    The concept of knowledge management has, indeed, become a buzzword that every single organization is expected to practice and live by. Knowledge management is about managing the organization's knowledge for the common good of the organization -but practicing knowledge management is not as simple...... as that. This article focuses on knowledge sharing as the process seeking to reduce the resources spent on reinventing the wheel.The article introduces the concept of time sensitiveness; i.e. that knowledge is either urgently needed, or not that urgently needed. Furthermore, knowledge sharing...... is considered as either a push or pull system. Four strategies for sharing knowledge - help, post-it, manuals and meeting, and advice are introduced. Each strategy requires different channels for sharing knowledge. An empirical analysis in a production facility highlights how the strategies can be practiced....

  17. Benefit sharing in health research

    African Journals Online (AJOL)

    2015-08-02

    Aug 2, 2015 ... [4] Those who contribute to scientific research ought to share in its benefits. .... women to form new relationships, social networks and develop a sense of ... or discoveries about the indigenous biological resources before.

  18. Download this PDF file

    African Journals Online (AJOL)

    telecommunication network were highly essential if Nigerian universities are to take full advantage of ... communicate and share project data. Today the .edu ... the world would, to a large extent, depend on the availability of enabling infrastructure .... providers (ISPs) connect their networks in order to exchange Internet traffic;.

  19. Information partnerships--shared data, shared scale.

    Science.gov (United States)

    Konsynski, B R; McFarlan, F W

    1990-01-01

    How can one company gain access to another's resources or customers without merging ownership, management, or plotting a takeover? The answer is found in new information partnerships, enabling diverse companies to develop strategic coalitions through the sharing of data. The key to cooperation is a quantum improvement in the hardware and software supporting relational databases: new computer speeds, cheaper mass-storage devices, the proliferation of fiber-optic networks, and networking architectures. Information partnerships mean that companies can distribute the technological and financial exposure that comes with huge investments. For the customer's part, partnerships inevitably lead to greater simplification on the desktop and more common standards around which vendors have to compete. The most common types of partnership are: joint marketing partnerships, such as American Airline's award of frequent flyer miles to customers who use Citibank's credit card; intraindustry partnerships, such as the insurance value-added network service (which links insurance and casualty companies to independent agents); customer-supplier partnerships, such as Baxter Healthcare's electronic channel to hospitals for medical and other equipment; and IT vendor-driven partnerships, exemplified by ESAB (a European welding supplies and equipment company), whose expansion strategy was premised on a technology platform offered by an IT vendor. Partnerships that succeed have shared vision at the top, reciprocal skills in information technology, concrete plans for an early success, persistence in the development of usable information for all partners, coordination on business policy, and a new and imaginative business architecture.

  20. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  1. Software for hyperspectral, joint photographic experts group (.JPG), portable network graphics (.PNG) and tagged image file format (.TIFF) segmentation

    Science.gov (United States)

    Bruno, L. S.; Rodrigo, B. P.; Lucio, A. de C. Jorge

    2016-10-01

    This paper presents a system developed by an application of a neural network Multilayer Perceptron for drone acquired agricultural image segmentation. This application allows a supervised user training the classes that will posteriorly be interpreted by neural network. These classes will be generated manually with pre-selected attributes in the application. After the attribute selection a segmentation process is made to allow the relevant information extraction for different types of images, RGB or Hyperspectral. The application allows extracting the geographical coordinates from the image metadata, geo referencing all pixels on the image. In spite of excessive memory consume on hyperspectral images regions of interest, is possible to perform segmentation, using bands chosen by user that can be combined in different ways to obtain different results.

  2. Regulating the sharing economy

    Directory of Open Access Journals (Sweden)

    Kristofer Erickson

    2016-06-01

    Full Text Available In this introductory essay, we explore definitions of the ‘sharing economy’, a concept indicating both social (relational, communitarian and economic (allocative, profit-seeking aspects which appear to be in tension. We suggest combining the social and economic logics of the sharing economy to focus on the central features of network enabled, aggregated membership in a pool of offers and demands (for goods, services, creative expressions. This definition of the sharing economy distinguishes it from other related peer-to-peer and collaborative forms of production. Understanding the social and economic motivations for and implications of participating in the sharing economy is important to its regulation. Each of the papers in this special issue contributes to knowledge by linking the social and economic aspects of sharing economy practices to regulatory norms and mechanisms. We conclude this essay by suggesting future research to further clarify and render intelligible the sharing economy, not as a contradiction in terms but as an empirically observable realm of socio-economic activity.

  3. Online network of subspecialty aortic disease experts: Impact of "cloud" technology on management of acute aortic emergencies.

    Science.gov (United States)

    Schoenhagen, Paul; Roselli, Eric E; Harris, C Martin; Eagleton, Matthew; Menon, Venu

    2016-07-01

    For the management of acute aortic syndromes, regional treatment networks have been established to coordinate diagnosis and treatment between local emergency rooms and central specialized centers. Triage of acute aortic syndromes requires definitive imaging, resulting in complex data files. Modern information technology network structures, specifically "cloud" technology, coupled with mobile communication, increasingly support sharing of these data in a network of experts using mobile, online access and communication. Although this network is technically complex, the potential benefit of online sharing of data files between professionals at multiple locations within a treatment network appear obvious; however, clinical experience is limited, and further evaluation is needed. Copyright © 2016 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  4. 75 FR 23752 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-05-04

    ...Corp. Description: PacifiCorp submits Revised Network Integration Transmission Service Agreement dated... Network Integration Transmission Service Agreement et al. Filed Date: 04/26/2010. Accession Numbers... filing per 35.12: Initial Market Based Rates to be effective 6/1/2010. Filed Date: 04/27/2010. Accession...

  5. Impact of Socioeconomic Status on Patients Supported With a Left Ventricular Assist Device: An Analysis of the UNOS Database (United Network for Organ Sharing).

    Science.gov (United States)

    Clerkin, Kevin J; Garan, Arthur Reshad; Wayda, Brian; Givens, Raymond C; Yuzefpolskaya, Melana; Nakagawa, Shunichi; Takeda, Koji; Takayama, Hiroo; Naka, Yoshifumi; Mancini, Donna M; Colombo, Paolo C; Topkara, Veli K

    2016-10-01

    Low socioeconomic status (SES) is a known risk factor for heart failure, mortality among those with heart failure, and poor post heart transplant (HT) outcomes. This study sought to determine whether SES is associated with decreased waitlist survival while on left ventricular assist device (LVADs) support and after HT. A total of 3361 adult patients bridged to primary HT with an LVAD between May 2004 and April 2014 were identified in the UNOS database (United Network for Organ Sharing). SES was measured using the Agency for Healthcare Research and Quality SES index using data from the 2014 American Community Survey. In the study cohort, SES did not have an association with the combined end point of death or delisting on LVAD support (P=0.30). In a cause-specific unadjusted model, those in the top (hazard ratio, 1.55; 95% confidence interval, 1.14-2.11; P=0.005) and second greatest SES quartile (hazard ratio 1.50; 95% confidence interval, 1.10-2.04; P=0.01) had an increased risk of death on device support compared with the lowest SES quartile. Adjusting for clinical risk factors mitigated the increased risk. There was no association between SES and complications. Post-HT survival, both crude and adjusted, was decreased for patients in the lowest quartile of SES index compared with all other SES quartiles. Freedom from waitlist death or delisting was not affected by SES. Patients with a higher SES had an increased unadjusted risk of waitlist mortality during LVAD support, which was mitigated by adjusting for increased comorbid conditions. Low SES was associated with worse post-HT outcomes. Further study is needed to confirm and understand a differential effect of SES on post-transplant outcomes that was not seen during LVAD support before HT. © 2016 American Heart Association, Inc.

  6. Data Sharing: A New Editorial Initiative of the International Committee of Medical Journal Editors. Implications for the Editors´ Network.

    Science.gov (United States)

    Alfonso, Fernando; Adamyan, Karlen; Artigou, Jean-Yves; Aschermann, Michael; Boehm, Michael; Buendia, Alfonso; Chu, Pao-Hsien; Cohen, Ariel; Cas, Livio Dei; Dilic, Mirza; Doubell, Anton; Echeverri, Dario; Enç, Nuray; Ferreira-González, Ignacio; Filipiak, Krzysztof J; Flammer, Andreas; Fleck, Eckart; Gatzov, Plamen; Ginghina, Carmen; Goncalves, Lino; Haouala, Habib; Hassanein, Mahmoud; Heusch, Gerd; Huber, Kurt; Hulín, Ivan; Ivanusa, Mario; Krittayaphong, Rungroj; Lau, Chu-Pak; Marinskis, Germanas; Mach, François; Moreira, Luiz Felipe; Nieminen, Tuomo; Oukerraj, Latifa; Perings, Stefan; Pierard, Luc; Potpara, Tatjana; Reyes-Caorsi, Walter; Rim, Se-Joong; Rødevand, Olaf; Saade, Georges; Sander, Mikael; Shlyakhto, Evgeny; Timuralp, Bilgin; Tousoulis, Dimitris; Ural, Dilek; Piek, J J; Varga, Albert; Lüscher, Thomas F

    2017-05-01

    The International Committee of Medical Journal Editors (ICMJE) provides recommendations to improve the editorial standards and scientific quality of biomedical journals. These recommendations range from uniform technical requirements to more complex and elusive editorial issues including ethical aspects of the scientific process. Recently, registration of clinical trials, conflicts of interest disclosure, and new criteria for authorship - emphasizing the importance of responsibility and accountability-, have been proposed. Last year, a new editorial initiative to foster sharing of clinical trial data was launched. This review discusses this novel initiative with the aim of increasing awareness among readers, investigators, authors and editors belonging to the Editors´ Network of the European Society of Cardiology. Resumo O Comitê Internacional de Editores de Revistas Médicas (ICMJE) fornece recomendações para aprimorar o padrão editorial e a qualidade científica das revistas biomédicas. Tais recomendações variam desde requisitos técnicos de uniformização até assuntos editoriais mais complexos e elusivos, como os aspectos éticos do processo científico. Recentemente, foram propostos registro de ensaios clínicos, divulgação de conflitos de interesse e novos critérios de autoria, enfatizando a importância da responsabilidade e da responsabilização. No último ano, lançou-se uma nova iniciativa editorial para fomentar o compartilhamento dos dados de ensaios clínicos. Esta revisão discute essa nova iniciativa visando a aumentar a conscientização de leitores, investigadores, autores e editores filiados à Rede de Editores da Sociedade Europeia de Cardiologia.

  7. Self-face recognition shares brain regions active during proprioceptive illusion in the right inferior fronto-parietal superior longitudinal fasciculus III network.

    Science.gov (United States)

    Morita, Tomoyo; Saito, Daisuke N; Ban, Midori; Shimada, Koji; Okamoto, Yuko; Kosaka, Hirotaka; Okazawa, Hidehiko; Asada, Minoru; Naito, Eiichi

    2017-04-21

    Proprioception is somatic sensation that allows us to sense and recognize position, posture, and their changes in our body parts. It pertains directly to oneself and may contribute to bodily awareness. Likewise, one's face is a symbol of oneself, so that visual self-face recognition directly contributes to the awareness of self as distinct from others. Recently, we showed that right-hemispheric dominant activity in the inferior fronto-parietal cortices, which are connected by the inferior branch of the superior longitudinal fasciculus (SLF III), is associated with proprioceptive illusion (awareness), in concert with sensorimotor activity. Herein, we tested the hypothesis that visual self-face recognition shares brain regions active during proprioceptive illusion in the right inferior fronto-parietal SLF III network. We scanned brain activity using functional magnetic resonance imaging while twenty-two right-handed healthy adults performed two tasks. One was a proprioceptive illusion task, where blindfolded participants experienced a proprioceptive illusion of right hand movement. The other was a visual self-face recognition task, where the participants judged whether an observed face was their own. We examined whether the self-face recognition and the proprioceptive illusion commonly activated the inferior fronto-parietal cortices connected by the SLF III in a right-hemispheric dominant manner. Despite the difference in sensory modality and in the body parts involved in the two tasks, both tasks activated the right inferior fronto-parietal cortices, which are likely connected by the SLF III, in a right-side dominant manner. Here we discuss possible roles for right inferior fronto-parietal activity in bodily awareness and self-awareness. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  8. Urban sharing culture

    DEFF Research Database (Denmark)

    Fjalland, Emmy Laura Perez

    of the structures of the networked urban mobilities and holds the potentials to change the future mobilities. References Bauman, Zygmunt. 2000. Liquid Modernity. Cambridge: Polity. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity (Published in Association with Theory, Culture & Society). London: SAGE......In urban areas sharing cultures, services and economies are rising. People share, rent and recycle their homes, cars, bikes, rides, tools, cloths, working space, knowhow and so on. The sharing culture can be understood as mobilities (Kesselring and Vogl 2013) of goods, values and ideas reshaping...... problems and side effects from concentration of consumption and contamination; and due to the shift from ownership to access it change our basic social cultural norms (Sayer 2005; Sayer 2011) about the ‘good’ life and social status (Freudendal-Pedersen 2007), commons and individuality, responsibility...

  9. Strategies for Sharing Seismic Data Among Multiple Computer Platforms

    Science.gov (United States)

    Baker, L. M.; Fletcher, J. B.

    2001-12-01

    Seismic waveform data is readily available from a variety of sources, but it often comes in a distinct, instrument-specific data format. For example, data may be from portable seismographs, such as those made by Refraction Technology or Kinemetrics, from permanent seismograph arrays, such as the USGS Parkfield Dense Array, from public data centers, such as the IRIS Data Center, or from personal communication with other researchers through e-mail or ftp. A computer must be selected to import the data - usually whichever is the most suitable for reading the originating format. However, the computer best suited for a specific analysis may not be the same. When copies of the data are then made for analysis, a proliferation of copies of the same data results, in possibly incompatible, computer-specific formats. In addition, if an error is detected and corrected in one copy, or some other change is made, all the other copies must be updated to preserve their validity. Keeping track of what data is available, where it is located, and which copy is authoritative requires an effort that is easy to neglect. We solve this problem by importing waveform data to a shared network file server that is accessible to all our computers on our campus LAN. We use a Network Appliance file server running Sun's Network File System (NFS) software. Using an NFS client software package on each analysis computer, waveform data can then be read by our MatLab or Fortran applications without first copying the data. Since there is a single copy of the waveform data in a single location, the NFS file system hierarchy provides an implicit complete waveform data catalog and the single copy is inherently authoritative. Another part of our solution is to convert the original data into a blocked-binary format (known historically as USGS DR100 or VFBB format) that is interpreted by MatLab or Fortran library routines available on each computer so that the idiosyncrasies of each machine are not visible to

  10. More Photos From Me to Thee : Factors Influencing the Intention to Continue Sharing Personal Photos on an Online Social Networking (OSN) Site among Young Adults in the Netherlands

    NARCIS (Netherlands)

    Beldad, Ardion Daroca; Hegner, Sabrina

    2017-01-01

    The current study investigated the factors influencing photo sharing continuance intention of Dutch Facebook users aged 18 to 25 years old. The focus was specifically on personal photos (those that include the person sharing), as their disclosure is expected to result in privacy-related issues for

  11. The global unified parallel file system (GUPFS) project: FY 2003 activities and results

    Energy Technology Data Exchange (ETDEWEB)

    Butler, Gregory F.; Baird William P.; Lee, Rei C.; Tull, Craig E.; Welcome, Michael L.; Whitney Cary L.

    2004-04-30

    The Global Unified Parallel File System (GUPFS) project is a multiple-phase project at the National Energy Research Scientific Computing (NERSC) Center whose goal is to provide a scalable, high-performance, high-bandwidth, shared file system for all of the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make the scientific users more productive as they conduct advanced scientific research at NERSC by simplifying the scientists' data management tasks and maximizing storage and data availability. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is accessible by all the NERSC production computing and support systems. In order to successfully deploy a scalable high-performance shared file system with consolidated disk storage, three major emerging technologies must be brought together: (1) shared/cluster file systems software, (2) cost-effective, high-performance storage area network (SAN) fabrics, and (3) high-performance storage devices. Although they are evolving rapidly, these emerging technologies individually are not targeted towards the needs of scientific high-performance computing (HPC). The GUPFS project is in the process of assessing these emerging technologies to determine the best combination of solutions for a center-wide shared file system, to encourage the development of these technologies in directions needed for HPC, particularly at NERSC, and to then put them into service. With the development of an evaluation methodology and benchmark suites, and with the updating of the GUPFS testbed system, the project did a substantial number of investigations and evaluations during FY 2003. The investigations and evaluations involved many vendors and products. From our evaluation of these products, we have found that most vendors and many of the products are more focused on the commercial market. Most vendors

  12. The impact of blood transfusions in deceased organ donors on the outcomes of 1,884 renal grafts from United Network for Organ Sharing Region 5.

    Science.gov (United States)

    de la Cruz, J Salvador; Sally, Mitchell B; Zatarain, John R; Crutchfield, Megan; Ramsey, Katrina; Nielsen, Jamison; Patel, Madhukar; Lapidus, Jodi; Orloff, Susan; Malinoski, Darren J

    2015-10-01

    Historically, strategies to reduce acute rejection and improve graft survival in kidney transplant recipients included blood transfusions (BTs) before transplantation. While advents in recipient immunosuppression strategies have replaced this practice, the impact of BTs in the organ donor on recipient graft outcomes has not been evaluated. We hypothesize that BTs in organ donors after neurologic determination of death (DNDDs) translate into improved recipient renal graft outcomes, as measured by a decrease in delayed graft function (DGF). Donor demographics, critical care end points, the use of BTs, and graft outcome data were prospectively collected on DNDDs from March 2012 to October 2013 in the United Network for Organ Sharing Region 5 Donor Management Database. Propensity analysis determined each DNDD's probability of receiving packed red blood cells based on demographic and critical care data as well as provider bias. The primary outcome measure was the rate of DGF (dialysis in the first week after transplantation) in different donor BT groups as follows: no BT, any BT, 1 to 5, 6 to 10, or greater than 10 packed red blood cell units. Regression models determined the relationship between donor BTs and recipient DGF after accounting for known predictors of DGF as well as the propensity to receive a BT. Data were complete for 1,884 renal grafts from 1,006 DNDDs; 52% received any BT, 32% received 1 to 5 U, 11% received 6 to 10, and 9% received greater than 10 U of blood. Grafts from transfused donors had a lower rate of DGF compared with those of the nontransfused donors (26% vs. 34%, p donors with any BT had a lower odds of DGF (odds ratio, 0.76; p = 0.030), and this effect was greatest in those with greater than 10 U transfused. Any BT in a DNDD was associated with a 23% decrease in the odds of recipients developing DGF, and this effect was more pronounced as the number of BTs increased. Therapeutic study, level III; epidemiologic/prognostic study, level II.

  13. Availability and quality of paraffin blocks identified in pathology archives: A multi-institutional study by the Shared Pathology Informatics Network (SPIN)

    International Nuclear Information System (INIS)

    Patel, Ashokkumar A; Dry, Sarah; Schirripa, Osvaldo; Yu, Hong; Becich, Michael J; Parwani, Anil V; Gupta, Dilipkumar; Seligson, David; Hattab, Eyas M; Balis, Ulysses J; Ulbright, Thomas M; Kohane, Isaac S; Berman, Jules J; Gilbertson, John R

    2007-01-01

    Shared Pathology Informatics Network (SPIN) is a tissue resource initiative that utilizes clinical reports of the vast amount of paraffin-embedded tissues routinely stored by medical centers. SPIN has an informatics component (sending tissue-related queries to multiple institutions via the internet) and a service component (providing histopathologically annotated tissue specimens for medical research). This paper examines if tissue blocks, identified by localized computer searches at participating institutions, can be retrieved in adequate quantity and quality to support medical researchers. Four centers evaluated pathology reports (1990–2005) for common and rare tumors to determine the percentage of cases where suitable tissue blocks with tumor were available. Each site generated a list of 100 common tumor cases (25 cases each of breast adenocarcinoma, colonic adenocarcinoma, lung squamous carcinoma, and prostate adenocarcinoma) and 100 rare tumor cases (25 cases each of adrenal cortical carcinoma, gastro-intestinal stromal tumor [GIST], adenoid cystic carcinoma, and mycosis fungoides) using a combination of Tumor Registry, laboratory information system (LIS) and/or SPIN-related tools. Pathologists identified the slides/blocks with tumor and noted first 3 slides with largest tumor and availability of the corresponding block. Common tumors cases (n = 400), the institutional retrieval rates (all blocks) were 83% (A), 95% (B), 80% (C), and 98% (D). Retrieval rate (tumor blocks) from all centers for common tumors was 73% with mean largest tumor size of 1.49 cm; retrieval (tumor blocks) was highest-lung (84%) and lowest-prostate (54%). Rare tumors cases (n = 400), each institution's retrieval rates (all blocks) were 78% (A), 73% (B), 67% (C), and 84% (D). Retrieval rate (tumor blocks) from all centers for rare tumors was 66% with mean largest tumor size of 1.56 cm; retrieval (tumor blocks) was highest for GIST (72%) and lowest for adenoid cystic carcinoma (58

  14. Digital Libraries: The Next Generation in File System Technology.

    Science.gov (United States)

    Bowman, Mic; Camargo, Bill

    1998-01-01

    Examines file sharing within corporations that use wide-area, distributed file systems. Applications and user interactions strongly suggest that the addition of services typically associated with digital libraries (content-based file location, strongly typed objects, representation of complex relationships between documents, and extrinsic…

  15. University Reactor Sharing Program

    International Nuclear Information System (INIS)

    Reese, W.D.

    2004-01-01

    Research projects supported by the program include items such as dating geological material and producing high current super conducting magnets. The funding continues to give small colleges and universities the valuable opportunity to use the NSC for teaching courses in nuclear processes; specifically neutron activation analysis and gamma spectroscopy. The Reactor Sharing Program has supported the construction of a Fast Neutron Flux Irradiator for users at New Mexico Institute of Mining and Technology and the University of Houston. This device has been characterized and has been found to have near optimum neutron fluxes for A39/Ar 40 dating. Institution final reports and publications resulting from the use of these funds are on file at the Nuclear Science Center

  16. Data Sharing Interviews with Crop Sciences Faculty: Why They Share Data and How the Library Can Help

    Science.gov (United States)

    Williams, Sarah C.

    2013-01-01

    This study was designed to generate a deeper understanding of data sharing by targeting faculty members who had already made data publicly available. During interviews, crop scientists at the University of Illinois at Urbana-Champaign were asked why they decided to share data, why they chose a data sharing method (e. g., supplementary file,…

  17. Lessons Learned in Deploying the World s Largest Scale Lustre File System

    Energy Technology Data Exchange (ETDEWEB)

    Dillow, David A [ORNL; Fuller, Douglas [ORNL; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Zhang, Zhe [ORNL; Hill, Jason J [ORNL; Shipman, Galen M [ORNL

    2010-01-01

    The Spider system at the Oak Ridge National Laboratory's Leadership Computing Facility (OLCF) is the world's largest scale Lustre parallel file system. Envisioned as a shared parallel file system capable of delivering both the bandwidth and capacity requirements of the OLCF's diverse computational environment, the project had a number of ambitious goals. To support the workloads of the OLCF's diverse computational platforms, the aggregate performance and storage capacity of Spider exceed that of our previously deployed systems by a factor of 6x - 240 GB/sec, and 17x - 10 Petabytes, respectively. Furthermore, Spider supports over 26,000 clients concurrently accessing the file system, which exceeds our previously deployed systems by nearly 4x. In addition to these scalability challenges, moving to a center-wide shared file system required dramatically improved resiliency and fault-tolerance mechanisms. This paper details our efforts in designing, deploying, and operating Spider. Through a phased approach of research and development, prototyping, deployment, and transition to operations, this work has resulted in a number of insights into large-scale parallel file system architectures, from both the design and the operational perspectives. We present in this paper our solutions to issues such as network congestion, performance baselining and evaluation, file system journaling overheads, and high availability in a system with tens of thousands of components. We also discuss areas of continued challenges, such as stressed metadata performance and the need for file system quality of service alongside with our efforts to address them. Finally, operational aspects of managing a system of this scale are discussed along with real-world data and observations.

  18. Parallel file system with metadata distributed across partitioned key-value store c

    Science.gov (United States)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-09-19

    Improved techniques are provided for storing metadata associated with a plurality of sub-files associated with a single shared file in a parallel file system. The shared file is generated by a plurality of applications executing on a plurality of compute nodes. A compute node implements a Parallel Log Structured File System (PLFS) library to store at least one portion of the shared file generated by an application executing on the compute node and metadata for the at least one portion of the shared file on one or more object storage servers. The compute node is also configured to implement a partitioned data store for storing a partition of the metadata for the shared file, wherein the partitioned data store communicates with partitioned data stores on other compute nodes using a message passing interface. The partitioned data store can be implemented, for example, using Multidimensional Data Hashing Indexing Middleware (MDHIM).

  19. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.; Sorour, Sameh; Aboutorab, Neda; Sadeghi, Parastoo; Al-Naffouri, Tareq Y.

    2015-01-01

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  20. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.

    2015-12-06

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients\\' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  1. Sharing knowledge

    Energy Technology Data Exchange (ETDEWEB)

    2009-07-01

    The workshop on Climate Change Impacts and Adaptation Strategies for Arctic Indigenous Communities is one stage in developing positions and providing input from the perspectives of Arctic Peoples in preparation for the Indigenous Peoples' Global Summit on Climate Change that will take place in April, 2009, in Anchorage, Alaska. The Summit, organized by the Inuit Circumpolar Council with oversight of an International Steering Committee, will bring together hundreds of indigenous Peoples around the world. This Workshop intended to bring together Arctic Indigenous Peoples to deliver and to share information, academic research, case studies based on traditional knowledge and researchers knowledgeable in traditional knowledge and/or policy issues drawn from traditional knowledge. The following themes were discussed: 1) Traditional knowledge research and education; 2) Laws and lawmaking; 3) Food and health; 4) Organisation; 5) Communications and advocacy. (ln)

  2. Network survivability performance (computer diskette)

    Science.gov (United States)

    1993-11-01

    File characteristics: Data file; 1 file. Physical description: 1 computer diskette; 3 1/2 in.; high density; 2.0MB. System requirements: Mac; Word. This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunication networks to user expectations for network survivability.

  3. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  4. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  5. Data Publishing and Sharing Via the THREDDS Data Repository

    Science.gov (United States)

    Wilson, A.; Caron, J.; Davis, E.; Baltzer, T.

    2007-12-01

    The terms "Team Science" and "Networked Science" have been coined to describe a virtual organization of researchers tied via some intellectual challenge, but often located in different organizations and locations. A critical component to these endeavors is publishing and sharing of content, including scientific data. Imagine pointing your web browser to a web page that interactively lets you upload data and metadata to a repository residing on a remote server, which can then be accessed by others in a secure fasion via the web. While any content can be added to this repository, it is designed particularly for storing and sharing scientific data and metadata. Server support includes uploading of data files that can subsequently be subsetted, aggregrated, and served in NetCDF or other scientific data formats. Metadata can be associated with the data and interactively edited. The THREDDS Data Repository (TDR) is a server that provides client initiated, on demand, location transparent storage for data of any type that can then be served by the THREDDS Data Server (TDS). The TDR provides functionality to: * securely store and "own" data files and associated metadata * upload files via HTTP and gridftp * upload a collection of data as single file * modify and restructure repository contents * incorporate metadata provided by the user * generate additional metadata programmatically * edit individual metadata elements The TDR can exist separately from a TDS, serving content via HTTP. Also, it can work in conjunction with the TDS, which includes functionality to provide: * access to data in a variety of formats via -- OPeNDAP -- OGC Web Coverage Service (for gridded datasets) -- bulk HTTP file transfer * a NetCDF view of datasets in NetCDF, OPeNDAP, HDF-5, GRIB, and NEXRAD formats * serving of very large volume datasets, such as NEXRAD radar * aggregation into virtual datasets * subsetting via OPeNDAP and NetCDF Subsetting services This talk will discuss TDR

  6. Conflict free network coding for distributed storage networks

    KAUST Repository

    Al-Habob, Ahmed A.; Sorour, Sameh; Aboutorab, Neda; Sadeghi, Parastoo

    2015-01-01

    © 2015 IEEE. In this paper, we design a conflict free instantly decodable network coding (IDNC) solution for file download from distributed storage servers. Considering previously downloaded files at the clients from these servers as side

  7. Deceit: A flexible distributed file system

    Science.gov (United States)

    Siegel, Alex; Birman, Kenneth; Marzullo, Keith

    1989-01-01

    Deceit, a distributed file system (DFS) being developed at Cornell, focuses on flexible file semantics in relation to efficiency, scalability, and reliability. Deceit servers are interchangeable and collectively provide the illusion of a single, large server machine to any clients of the Deceit service. Non-volatile replicas of each file are stored on a subset of the file servers. The user is able to set parameters on a file to achieve different levels of availability, performance, and one-copy serializability. Deceit also supports a file version control mechanism. In contrast with many recent DFS efforts, Deceit can behave like a plain Sun Network File System (NFS) server and can be used by any NFS client without modifying any client software. The current Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management, an approach that reduces system complexity and increases system robustness.

  8. Download this PDF file

    African Journals Online (AJOL)

    user

    music-sharing, crowd sourcing and voice over IP, to name a few. Various media network sites include Facebook, Twitter,. Dreams village, Bebo, Myspace, Eskimi, .... expressions of the other when one is passing information particularly about good or bad news, they either smile or frown and their eyes light up or pop up”.

  9. Entropy based file type identification and partitioning

    Science.gov (United States)

    2017-06-01

    energy spectrum,” Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, pp. 288–293, 2016...ABBREVIATIONS AES Advanced Encryption Standard ANN Artificial Neural Network ASCII American Standard Code for Information Interchange CWT...the identification of file types and file partitioning. This approach has applications in cybersecurity as it allows for a quick determination of

  10. Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images

    Science.gov (United States)

    Chen, Chien-Chang; Liu, Chong-An

    2013-01-01

    A (t,n) secret image-sharing scheme shares a secret image to n participants, and the t users recover the image. During the recovery procedure of a conventional secret image-sharing scheme, cheaters may use counterfeit secret keys or modified shared images to cheat other users' secret keys and shared images. A cheated secret key or shared image leads to an incorrect secret image. Unfortunately, the cheater cannot be identified. We present an exponent and modulus-based scheme to provide a tamper-proof secret image-sharing scheme for identifying cheaters on secret keys or shared images. The proposed scheme allows users to securely select their secret key. This assignment can be performed over networks. Modulus results of each shared image is calculated to recognize cheaters of a shared image. Experimental results indicate that the proposed scheme is excellent at identifying cheated secret keys and shared images.

  11. Bonobos share with strangers.

    Directory of Open Access Journals (Sweden)

    Jingzhi Tan

    Full Text Available Humans are thought to possess a unique proclivity to share with others--including strangers. This puzzling phenomenon has led many to suggest that sharing with strangers originates from human-unique language, social norms, warfare and/or cooperative breeding. However, bonobos, our closest living relative, are highly tolerant and, in the wild, are capable of having affiliative interactions with strangers. In four experiments, we therefore examined whether bonobos will voluntarily donate food to strangers. We show that bonobos will forego their own food for the benefit of interacting with a stranger. Their prosociality is in part driven by unselfish motivation, because bonobos will even help strangers acquire out-of-reach food when no desirable social interaction is possible. However, this prosociality has its limitations because bonobos will not donate food in their possession when a social interaction is not possible. These results indicate that other-regarding preferences toward strangers are not uniquely human. Moreover, language, social norms, warfare and cooperative breeding are unnecessary for the evolution of xenophilic sharing. Instead, we propose that prosociality toward strangers initially evolves due to selection for social tolerance, allowing the expansion of individual social networks. Human social norms and language may subsequently extend this ape-like social preference to the most costly contexts.

  12. Shared decision making

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/patientinstructions/000877.htm Shared decision making To use the sharing features on this page, ... treatment you both support. When to use Shared Decision Making Shared decision making is often used when you ...

  13. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  14. One-way shared memory

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2018-01-01

    Standard multicore processors use the shared main memory via the on-chip caches for communication between cores. However, this form of communication has two limitations: (1) it is hardly time-predictable and therefore not a good solution for real-time systems and (2) this single shared memory...... is a bottleneck in the system. This paper presents a communication architecture for time-predictable multicore systems where core-local memories are distributed on the chip. A network-on-chip constantly copies data from a sender core-local memory to a receiver core-local memory. As this copying is performed...... in one direction we call this architecture a one-way shared memory. With the use of time-division multiplexing for the memory accesses and the network-on-chip routers we achieve a time-predictable solution where the communication latency and bandwidth can be bounded. An example architecture for a 3...

  15. Preliminary experience of shared clinical management between Milan and Pointe Noire using the INteractive TeleConsultation Network for Worldwide HealthcAre Services (INCAS): telemedicine between Milan and Africa.

    Science.gov (United States)

    Malacarne, Mara; Lesma, Alessandro; Madera, Angelo; Malfatti, Eugenio; Castelli, Alberto; Lucini, Daniela; Pizzinelli, Paolo; Pagani, Massimo

    2004-01-01

    This paper describes preliminary experience in shared clinical management of patients located in Pointe Noire, Africa, and a referral center, Sacco University Hospital, located in Milan, Italy. The employed infrastructure INteractive TeleConsultation Network for Worldwide HealthcAre Services (INCAS) jointly developed by CEFRIEL (Center of Excellence For Research, Innovation, Education & Industrial Labs partnership) and ENI (Ente Nazionale Idrocarburi) is based on commercial off-the-shelf technology. This minimizes maintenance problems, while permitting a simple and friendly sharing of data using the telephone and e-mail for store-and-forward applications. The critical aspect of the flow of events comprising the exchange of information is discussed. In 60% of cases, only one telemedicine consultation was required. In the remainder 40%, a number of telemedicine consultations were required for appropriate management of clinical cases. The project demonstrated flexibility as documented by the wide range of pathologies that can be dealt with it. Finally the possibility of using shared clinical management as a learning tool is highlighted by the steep and rising learning curve. We conclude, however, that the patient, although handled in a "virtual" manner, should be viewed as very "real," as some of them elected to close the gap physically between Pointe Noire and Milan, and chose to be treated at the referral site.

  16. The jabber chat tool EFDA Messenger and screen sharing tool EFDATV

    International Nuclear Information System (INIS)

    Thomsen, K.; Beck, S.; Wilhelm, B.

    2008-01-01

    Two Remote Participation (RP) tools are described. The first tool, named EFDA Messenger, is a secure Instant Messaging (IM) tool based on a Jabber server that only accepts SSL encrypted communication and does not allow file transfers as well as audio and video transmissions. This tool is useful to have as another mean of communication during video or teleconferences. The second tool, named EFDATV, is a multipurposeVirtual Network Computing (VNC) based desktop screen sharing system used to share presentations via the Internet. A Java enabled web browser or a VNC client is sufficient for the presenter and the audience to use EFDATV. It is also possible from an EFDATV channel to connect to another VNC server and broadcast the view from that VNC server

  17. The jabber chat tool EFDA Messenger and screen sharing tool EFDATV

    Energy Technology Data Exchange (ETDEWEB)

    Thomsen, K. [EFDA Close Support Unit Garching, Boltzmannstr. 2, D-85748 Garching (Germany)], E-mail: Knud.Thomsen@efda.org; Beck, S. [EFDA Close Support Unit Garching, Boltzmannstr. 2, D-85748 Garching (Germany); Wilhelm, B. [EFDA CSU Barcelona, c/Josep Pla n.2, Torres Diag. Litoral Edificio B3, 7a planta, 08019 Barcelona (Spain)

    2008-04-15

    Two Remote Participation (RP) tools are described. The first tool, named EFDA Messenger, is a secure Instant Messaging (IM) tool based on a Jabber server that only accepts SSL encrypted communication and does not allow file transfers as well as audio and video transmissions. This tool is useful to have as another mean of communication during video or teleconferences. The second tool, named EFDATV, is a multipurposeVirtual Network Computing (VNC) based desktop screen sharing system used to share presentations via the Internet. A Java enabled web browser or a VNC client is sufficient for the presenter and the audience to use EFDATV. It is also possible from an EFDATV channel to connect to another VNC server and broadcast the view from that VNC server.

  18. The Neural Basis of Recollection Rejection: Increases in Hippocampal-Prefrontal Connectivity in the Absence of a Shared Recall-to-Reject and Target Recollection Network.

    Science.gov (United States)

    Bowman, Caitlin R; Dennis, Nancy A

    2016-08-01

    Recollection rejection or "recall-to-reject" is a mechanism that has been posited to help maintain accurate memory by preventing the occurrence of false memories. Recollection rejection occurs when the presentation of a new item during recognition triggers recall of an associated target, a mismatch in features between the new and old items is registered, and the lure is correctly rejected. Critically, this characterization of recollection rejection involves a recall signal that is conceptually similar to recollection as elicited by a target. However, previous neuroimaging studies have not evaluated the extent to which recollection rejection and target recollection rely on a common neural signal but have instead focused on recollection rejection as a postretrieval monitoring process. This study utilized a false memory paradigm in conjunction with an adapted remember-know-new response paradigm that separated "new" responses based on recollection rejection from those that were based on a lack of familiarity with the item. This procedure allowed for parallel recollection rejection and target recollection contrasts to be computed. Results revealed that, contrary to predictions from theoretical and behavioral literature, there was virtually no evidence of a common retrieval mechanism supporting recollection rejection and target recollection. Instead of the typical target recollection network, recollection rejection recruited a network of lateral prefrontal and bilateral parietal regions that is consistent with the retrieval monitoring network identified in previous neuroimaging studies of recollection rejection. However, a functional connectivity analysis revealed a component of the frontoparietal rejection network that showed increased coupling with the right hippocampus during recollection rejection responses. As such, we demonstrate a possible link between PFC monitoring network and basic retrieval mechanisms within the hippocampus that was not revealed with

  19. Peer-to-Peer Service Sharing Platforms

    DEFF Research Database (Denmark)

    Andersson, Magnus; Hjalmarsson, Anders; Avital, Michel

    2013-01-01

    The sharing economy has been growing continuously in the last decade thanks to the proliferation of internet-based platforms that allow people to disintermediate the traditional commercial channels and to share excess resources and trade with one another effectively at a reasonably low transaction...... cost. Whereas early peer-to-peer platforms were designed to enable file sharing and goods trading, we recently witness the emergence of a new breed of peer-to-peer platforms that are designed for ordinary service sharing. Ordinary services entail intangible provisions and are defined as an economic...... activity that generates immaterial benefits and does not result in ownership of material goods. Based on a structured analysis of 41 internet-based rideshare platforms, we explore and layout the unique characteristics of peer-to-peer service sharing platforms based on three distinct temporal patterns...

  20. Library Information System Time-Sharing (LISTS) Project. Final Report.

    Science.gov (United States)

    Black, Donald V.

    The Library Information System Time-Sharing (LISTS) experiment was based on three innovations in data processing technology: (1) the advent of computer time-sharing on third-generation machines, (2) the development of general-purpose file-management software and (3) the introduction of large, library-oriented data bases. The main body of the…

  1. 75 FR 29750 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-05-27

    ...: Consumers Energy Company submits tariff filing per 35: Wholesale Market-Based Rate Tariff For Sales Of.... Description: Southern Companies submits an amendment to the Network Integration Transmission Service Agreement...: Southern Companies submits an amendment to the Network Integration Transmission Service Agreement. Filed...

  2. BioCreative V track 4: a shared task for the extraction of causal network information using the Biological Expression Language.

    Science.gov (United States)

    Rinaldi, Fabio; Ellendorff, Tilia Renate; Madan, Sumit; Clematide, Simon; van der Lek, Adrian; Mevissen, Theo; Fluck, Juliane

    2016-01-01

    Automatic extraction of biological network information is one of the most desired and most complex tasks in biological and medical text mining. Track 4 at BioCreative V attempts to approach this complexity using fragments of large-scale manually curated biological networks, represented in Biological Expression Language (BEL), as training and test data. BEL is an advanced knowledge representation format which has been designed to be both human readable and machine processable. The specific goal of track 4 was to evaluate text mining systems capable of automatically constructing BEL statements from given evidence text, and of retrieving evidence text for given BEL statements. Given the complexity of the task, we designed an evaluation methodology which gives credit to partially correct statements. We identified various levels of information expressed by BEL statements, such as entities, functions, relations, and introduced an evaluation framework which rewards systems capable of delivering useful BEL fragments at each of these levels. The aim of this evaluation method is to help identify the characteristics of the systems which, if combined, would be most useful for achieving the overall goal of automatically constructing causal biological networks from text. © The Author(s) 2016. Published by Oxford University Press.

  3. Labelling : Security in Information Management and Sharing

    NARCIS (Netherlands)

    Schotanus, H.A.; Hartog, T.; Hut, D.H.; Boonstra, D.

    2011-01-01

    Military communication infrastructures are often deployed as stand-alone information systems operating at the System High mode. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements for information management and sharing which current communication

  4. Combining sync&share functionality with filesystem-like access

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  5. JENDL special purpose file

    International Nuclear Information System (INIS)

    Nakagawa, Tsuneo

    1995-01-01

    In JENDL-3,2, the data on all the reactions having significant cross section over the neutron energy from 0.01 meV to 20 MeV are given for 340 nuclides. The object range of application extends widely, such as the neutron engineering, shield and others of fast reactors, thermal neutron reactors and nuclear fusion reactors. This is a general purpose data file. On the contrary to this, the file in which only the data required for a specific application field are collected is called special purpose file. The file for dosimetry is a typical special purpose file. The Nuclear Data Center, Japan Atomic Energy Research Institute, is making ten kinds of JENDL special purpose files. The files, of which the working groups of Sigma Committee are in charge, are listed. As to the format of the files, ENDF format is used similarly to JENDL-3,2. Dosimetry file, activation cross section file, (α, n) reaction data file, fusion file, actinoid file, high energy data file, photonuclear data file, PKA/KERMA file, gas production cross section file and decay data file are described on their contents, the course of development and their verification. Dosimetry file and gas production cross section file have been completed already. As for the others, the expected time of completion is shown. When these files are completed, they are opened to the public. (K.I.)

  6. Fast transfer of shared data

    International Nuclear Information System (INIS)

    Timmer, C.; Abbott, D.J.; Heyes, W.G.; Jostizembski, E.; MacLeod, R.W.; Wolin, E.

    2000-01-01

    The Event Transfer system enables its users to produce events (data) and share them with other users by utilizing shared memory on either Solaris or Linux-based computers. Its design emphasizes speed, reliability, ease of use, and recoverability from crashes. In addition to fast local operation, the ET system allows network transfer of events. Using multi-threaded code based on POSIX threades and mutexes, a successful implementation was developed which allowed passing events over 500 kHz on a 4 cpu Sun workstation and 150 kHz on a dual cpu PC

  7. Vaccines, our shared responsibility.

    Science.gov (United States)

    Pagliusi, Sonia; Jain, Rishabh; Suri, Rajinder Kumar

    2015-05-05

    The Developing Countries Vaccine Manufacturers' Network (DCVMN) held its fifteenth annual meeting from October 27-29, 2014, New Delhi, India. The DCVMN, together with the co-organizing institution Panacea Biotec, welcomed over 240 delegates representing high-profile governmental and nongovernmental global health organizations from 36 countries. Over the three-day meeting, attendees exchanged information about their efforts to achieve their shared goal of preventing death and disability from known and emerging infectious diseases. Special praise was extended to all stakeholders involved in the success of polio eradication in South East Asia and highlighted challenges in vaccine supply for measles-rubella immunization over the coming decades. Innovative vaccines and vaccine delivery technologies indicated creative solutions for achieving global immunization goals. Discussions were focused on three major themes including regulatory challenges for developing countries that may be overcome with better communication; global collaborations and partnerships for leveraging investments and enable uninterrupted supply of affordable and suitable vaccines; and leading innovation in vaccines difficult to develop, such as dengue, Chikungunya, typhoid-conjugated and EV71, and needle-free technologies that may speed up vaccine delivery. Moving further into the Decade of Vaccines, participants renewed their commitment to shared responsibility toward a world free of vaccine-preventable diseases. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  8. Exchange Network

    Science.gov (United States)

    The Environmental Information Exchange Network (EN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.

  9. 75 FR 1761 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-01-13

    .... Applicants: Cloud County Wind Farm, LLC, Pioneer Prairie Wind Farm I, LLC, Arlington Wind Power Project LLC... of the Localized Costs Sharing Agreement. Filed Date: 12/22/2009. Accession Number: 20091224-0002... Rate Schedule 1 effective 11/25/09. Filed Date: 12/22/2009. Accession Number: 20091224-0077. Comment...

  10. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  11. Switch and examine transmit diversity for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed M.; Alouini, Mohamed-Slim; Qaraqe, Khalid A.

    2011-01-01

    In this paper, we develop a switch and examine transmit diversity algorithm for spectrum sharing cognitive networks. We consider a cognitive network composed of a primary link that employs constant rate and constant power transmission scheme

  12. “Every Gene Is Everywhere but the Environment Selects”: Global Geolocalization of Gene Sharing in Environmental Samples through Network Analysis

    Science.gov (United States)

    Fondi, Marco; Karkman, Antti; Tamminen, Manu V.; Bosi, Emanuele; Virta, Marko; Fani, Renato; Alm, Eric; McInerney, James O.

    2016-01-01

    The spatial distribution of microbes on our planet is famously formulated in the Baas Becking hypothesis as “everything is everywhere but the environment selects.” While this hypothesis does not strictly rule out patterns caused by geographical effects on ecology and historical founder effects, it does propose that the remarkable dispersal potential of microbes leads to distributions generally shaped by environmental factors rather than geographical distance. By constructing sequence similarity networks from uncultured environmental samples, we show that microbial gene pool distributions are not influenced nearly as much by geography as ecology, thus extending the Bass Becking hypothesis from whole organisms to microbial genes. We find that gene pools are shaped by their broad ecological niche (such as sea water, fresh water, host, and airborne). We find that freshwater habitats act as a gene exchange bridge between otherwise disconnected habitats. Finally, certain antibiotic resistance genes deviate from the general trend of habitat specificity by exhibiting a high degree of cross-habitat mobility. The strong cross-habitat mobility of antibiotic resistance genes is a cause for concern and provides a paradigmatic example of the rate by which genes colonize new habitats when new selective forces emerge. PMID:27190206

  13. Mastering Microsoft SharePoint Foundation 2010

    CERN Document Server

    Callahan, C A

    2011-01-01

    Everything IT professionals need to create collaborative solutions. SharePoint Foundation 2010 is the newest version of a powerful collaboration tool used in many Exchange-enabled organizations. This book gets network professionals and business application administrators up to speed on the updates, features, and installation procedures, preparing them to create powerful collaboration structures for their companies.: Microsoft SharePoint Foundation 2010 is the successor to Windows SharePoint Services 3.0 and is used with Microsoft Office SharePoint Server to enable collaboration; this guide pre

  14. Redes Sociais e as Gerações X e Y: Disseminação e Compartilhamento de Experiências de Turismo / Social Networks and Generations X and Y: Dissemination and Tourism Experience Sharing

    Directory of Open Access Journals (Sweden)

    Antônio Claret Guerra

    2015-07-01

    Full Text Available Este artigo tem como objetivo identificar a contribuição de redes sociais on-line (OSN para o processo de disseminação e compartilhamento de experiências de turismo das gerações X e Y. A pesquisa realizada tem natureza exploratória e abordagem qualitativa, sendo os dados obtidos por entrevistas semiestruturadas. A análise de conteúdo (Bardin, 2009 foi a técnica usada para a análise dos dados coletados. Procurou-se, dessa forma, investigar vários aspectos ligados ao tema proposto: se as OSN são uma inovação tecnológica que impactou o setor de viagens; sua importância para o desenvolvimento e manutenção de relacionamentos das gerações X e Y com mídias sociais on-line; a interface de cocriação de produtos turísticos; sua contribuição para a formação de preferências e intenções de compra. Entre as conclusões do estudo, verifica-se que os entrevistados concordam que as OSN impactam o setor e o consumidor busca benefícios ao utilizá-las, destacando a praticidade, comodidade, segurança, troca de informações e experiências. Foi citado, ainda, que as OSN divulgam roteiros turísticos competitivos e acessíveis, que antes da era digital eram relativamente pouco conhecidos do grande público. Palavras-chave: Turismo. Experiência Turística. Redes Sociais On-line. Gerações X e Y. Social Networks and Generations X and Y: Dissemination and Tourism Experience Sharing - This article aims to identify the on-line social network (OSN contribution to the X and Y generations´ tourism experiences of dissemination and sharing process. The content analysis (Bardin, 2008 was the technique used to analyses the data obtained through semi structured interviews. It was sought to investigate the OSN as technological innovation, its significance for the X and y generations relationships development, co-creation and formation of purchase intentions interface. Among the conclusions is the actual benefit of the OSN impact on the

  15. Computerized management of radiology department: Installation and use of local area network(LAN) by personal computers

    International Nuclear Information System (INIS)

    Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo

    1993-01-01

    There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe

  16. 78 FR 11258 - Self-Regulatory Organizations; Chicago Stock Exchange, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2013-02-15

    ....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68894; File No. SR-CHX-2013-06] Self-Regulatory...

  17. Hierarchical Data Distribution Scheme for Peer-to-Peer Networks

    Science.gov (United States)

    Bhushan, Shashi; Dave, M.; Patel, R. B.

    2010-11-01

    In the past few years, peer-to-peer (P2P) networks have become an extremely popular mechanism for large-scale content sharing. P2P systems have focused on specific application domains (e.g. music files, video files) or on providing file system like capabilities. P2P is a powerful paradigm, which provides a large-scale and cost-effective mechanism for data sharing. P2P system may be used for storing data globally. Can we implement a conventional database on P2P system? But successful implementation of conventional databases on the P2P systems is yet to be reported. In this paper we have presented the mathematical model for the replication of the partitions and presented a hierarchical based data distribution scheme for the P2P networks. We have also analyzed the resource utilization and throughput of the P2P system with respect to the availability, when a conventional database is implemented over the P2P system with variable query rate. Simulation results show that database partitions placed on the peers with higher availability factor perform better. Degradation index, throughput, resource utilization are the parameters evaluated with respect to the availability factor.

  18. Temporal Patterns of Pedophile Activity in a P2P Network: First Insights about User Profiles from Big Data

    OpenAIRE

    Fournier , Raphaël; Latapy , Matthieu

    2015-01-01

    International audience; Recent studies have shown that child abuse material is shared through peer-to-peer (P2P) networks, which allow users to exchange files without a central server. Obtaining knowledge on the extent of this activity has major consequences for child protection, policy making and Internet regulation. Previous works have developed tools and analyses to provide overall figures in temporally-limited measurements. Offenders' behavior is mostly studied through small-scale intervi...

  19. SharePoint 2010 Six-in-One

    CERN Document Server

    Geier, Chris; Bertram, Becky

    2011-01-01

    A team of SharePoint authorities addresses the six most essential areas of SharePoint 2010. SharePoint enables Web sites to host shared workspaces and is a leading solution for Enterprise Content Management. This book serves as one-stop shopping for concise coverage on six key areas that you need to know in order to get up and running with SharePoint 2010 quickly. After an introduction to the new features of SharePoint 2010, the author team of SharePoint experts walk you through branding and customization, workflow, business connectivity services, social networking and tools, the search functi

  20. A secure file manager for UNIX

    Energy Technology Data Exchange (ETDEWEB)

    DeVries, R.G.

    1990-12-31

    The development of a secure file management system for a UNIX-based computer facility with supercomputers and workstations is described. Specifically, UNIX in its usual form does not address: (1) Operation which would satisfy rigorous security requirements. (2) Online space management in an environment where total data demands would be many times the actual online capacity. (3) Making the file management system part of a computer network in which users of any computer in the local network could retrieve data generated on any other computer in the network. The characteristics of UNIX can be exploited to develop a portable, secure file manager which would operate on computer systems ranging from workstations to supercomputers. Implementation considerations making unusual use of UNIX features, rather than requiring extensive internal system changes, are described, and implementation using the Cray Research Inc. UNICOS operating system is outlined.

  1. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  2. Microsoft Office SharePoint Designer 2007 Step by Step

    CERN Document Server

    Coventry, Penelope

    2008-01-01

    The smart way to learn Office SharePoint Designer 2007-one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting tips to master the fundamentals of building customized SharePoint sites and applications. You'll learn how to work with Windows® SharePoint Services 3.0 and Office SharePoint Server 2007 to create Web pages complete with Cascading Style Sheets, Lists, Libraries, and customized Web parts. Then, make your site really work for you by adding data sources, including databases, XML data and Web services, and RSS fe

  3. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  4. MR-AFS: a global hierarchical file-system

    International Nuclear Information System (INIS)

    Reuter, H.

    2000-01-01

    The next generation of fusion experiments will use object-oriented technology creating the need for world wide sharing of an underlying hierarchical file-system. The Andrew file system (AFS) is a well known and widely spread global distributed file-system. Multiple-resident-AFS (MR-AFS) combines the features of AFS with hierarchical storage management systems. Files in MR-AFS therefore may be migrated on secondary storage, such as roboted tape libraries. MR-AFS is in use at IPP for the current experiments and data originating from super-computer applications. Experiences and scalability issues are discussed

  5. Applications of Coding in Network Communications

    Science.gov (United States)

    Chang, Christopher SungWook

    2012-01-01

    This thesis uses the tool of network coding to investigate fast peer-to-peer file distribution, anonymous communication, robust network construction under uncertainty, and prioritized transmission. In a peer-to-peer file distribution system, we use a linear optimization approach to show that the network coding framework significantly simplifies…

  6. PC Graphic file programing

    International Nuclear Information System (INIS)

    Yang, Jin Seok

    1993-04-01

    This book gives description of basic of graphic knowledge and understanding and realization of graphic file form. The first part deals with graphic with graphic data, store of graphic data and compress of data, programing language such as assembling, stack, compile and link of program and practice and debugging. The next part mentions graphic file form such as Mac paint file, GEM/IMG file, PCX file, GIF file, and TIFF file, consideration of hardware like mono screen driver and color screen driver in high speed, basic conception of dithering and conversion of formality.

  7. Assured Resource Sharing in Ad-Hoc Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Ahn, Gail-Joon [Arizona State Univ., Tempe, AZ (United States)

    2015-12-19

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  8. Files synchronization from a large number of insertions and deletions

    Science.gov (United States)

    Ellappan, Vijayan; Kumari, Savera

    2017-11-01

    Synchronization between different versions of files is becoming a major issue that most of the applications are facing. To make the applications more efficient a economical algorithm is developed from the previously used algorithm of “File Loading Algorithm”. I am extending this algorithm in three ways: First, dealing with non-binary files, Second backup is generated for uploaded files and lastly each files are synchronized with insertions and deletions. User can reconstruct file from the former file with minimizing the error and also provides interactive communication by eliminating the frequency without any disturbance. The drawback of previous system is overcome by using synchronization, in which multiple copies of each file/record is created and stored in backup database and is efficiently restored in case of any unwanted deletion or loss of data. That is, to introduce a protocol that user B may use to reconstruct file X from file Y with suitably low probability of error. Synchronization algorithms find numerous areas of use, including data storage, file sharing, source code control systems, and cloud applications. For example, cloud storage services such as Drop box synchronize between local copies and cloud backups each time users make changes to local versions. Similarly, synchronization tools are necessary in mobile devices. Specialized synchronization algorithms are used for video and sound editing. Synchronization tools are also capable of performing data duplication.

  9. Rethinking the Sharing Economy

    DEFF Research Database (Denmark)

    Kornberger, Martin; Leixnering, Stephan; Meyer, Renate

    2017-01-01

    Our paper focuses on a non-standard sharing example that harbors the potential to disrupt received wisdom on the sharing economy. While originally entering the field to analyze, broadly from a governance perspective, how the 2015 refugee crisis was handled in Vienna, Austria, we found that the no...... of sharing: economic and moral. Our paper contributes to this Special Issue of the Academy of Management Discoveries by highlighting and explaining the two-fold economic and moral nature of sharing and the organization of sharing between movement and platform....... sharing of resources (i.e., the economic dimension): the sharing of a distinct concern (i.e., the moral dimension of sharing). Our discovery exemplifies such a moral dimension that is rather different from the status quo materialistic treatments focusing on economic transactions and property rights...

  10. Job Sharing in Education.

    Science.gov (United States)

    Davidson, Wilma; Kline, Susan

    1979-01-01

    The author presents the advantages of job sharing for all school personnel, saying that education is particularly adaptable to this new form of employment. Current job sharing programs in Massachusetts, California, and New Jersey schools are briefly discussed. (SJL)

  11. Production sharing agreements

    International Nuclear Information System (INIS)

    1994-01-01

    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  12. Communication security in open health care networks.

    Science.gov (United States)

    Blobel, B; Pharow, P; Engel, K; Spiegel, V; Krohn, R

    1999-01-01

    Fulfilling the shared care paradigm, health care networks providing open systems' interoperability in health care are needed. Such communicating and co-operating health information systems, dealing with sensitive personal medical information across organisational, regional, national or even international boundaries, require appropriate security solutions. Based on the generic security model, within the European MEDSEC project an open approach for secure EDI like HL7, EDIFACT, XDT or XML has been developed. The consideration includes both securing the message in an unsecure network and the transport of the unprotected information via secure channels (SSL, TLS etc.). Regarding EDI, an open and widely usable security solution has been specified and practically implemented for the examples of secure mailing and secure file transfer (FTP) via wrapping the sensitive information expressed by the corresponding protocols. The results are currently prepared for standardisation.

  13. Job Sharing in Geography.

    Science.gov (United States)

    Kay, Jeanne

    1982-01-01

    Job sharing is an employment alternative in which two qualified individuals manage the responsibilities of a single position. Discusses the barriers to and the potential, advantages, disadvantages, pitfalls, and challenges of job sharing. Focuses on job sharing in the geography profession. (Author/JN)

  14. Satisfaction and 'comparison sharing'

    DEFF Research Database (Denmark)

    Amilon, Anna

    2009-01-01

    the probability of satisfaction. Results show that comparison sharing impacts satisfaction for women, and that those women who share more equally than their peers are more likely to be satisfied, whereas comparison sharing has no influence on satisfaction for men. Also, parents are less likely to be satisfied...

  15. Physician Shared Patient Patterns

    Data.gov (United States)

    U.S. Department of Health & Human Services — The physician referral data linked below was provided as a response to a Freedom of Information Act (FOIA) request. These files represent the number of encounters a...

  16. Music2Share - Copyright-Compliant Music Sharing in P2P Systems

    NARCIS (Netherlands)

    Kalker, Ton; Epema, Dick H.J.; Hartel, Pieter H.; Lagendijk, R. (Inald) L.; van Steen, Martinus Richardus; van Steen, Maarten

    Peer-to-Peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  17. Music2Share --- Copyright-Compliant Music Sharing in P2P Systems

    NARCIS (Netherlands)

    Kalker, T.; Epema, D.; Hartel, P.; Lagendijk, I.; van Steen, M.R.

    2004-01-01

    Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for music sharing. In particular, we propose a P2P protocol that integrates the functions

  18. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  19. 78 FR 28210 - Combined Notice of Filings #1

    Science.gov (United States)

    2013-05-14

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings 1 Take notice... Company of New Mexico. Description: City of Gallup Network Integration Transmission Service Agreement to..., Section III--Distribution of Revenues to be effective 7/1/2013. Filed Date: 4/30/13. Accession Number...

  20. C-share: Optical circuits sharing for software-defined data-centers [arXiv

    DEFF Research Database (Denmark)

    Ben-Itzhak, Yaniv; Caba, Cosmin Marius; Schour, Liran

    2016-01-01

    Integrating optical circuit switches in data-centers is an ongoing research challenge. In recent years, state-of-the-art solutions introduce hybrid packet/circuit architectures for different optical circuit switch technologies, control techniques, and traffic rerouting methods. These solutions...... are based on separated packet and circuit planes which do not have the ability to utilize an optical circuit with flows that do not arrive from or delivered to switches directly connected to the circuit’s end-points. Moreover, current SDN-based elephant flow rerouting methods require a forwarding rule...... for each flow, which raise scalability issues. In this paper, we present C-Share - a practical, scalable SDN-based circuit sharing solution for data center networks. C-Share inherently enable elephant flows to share optical circuits by exploiting a flat upper tier network topology. C-Share is based...

  1. Sharing family and household:

    DEFF Research Database (Denmark)

    Winther, Ida Wentzel

    Keynote: Family relationships are normatively assumed to be characterized by ‘sharing’, such as living together in the same home, occupying the same place, sharing stuff, blood and biology, spending special and ordinary time together, and consequently creating shared biographical experiences....... In that way, families are thrown into togetherness. At the same time, we see families in varying forms where 'sharing' is lived and contested differently. In Denmark, many children live in nuclear families, and many live in different variations of more than one household. For those who share household...... and family, 'sharing' will be a basic condition. No matter what, they should share life circumstances, more stories, more places and spaces, more households families with both kin and non-kin. This keynote addresses the particular of children’s experiences of living apart and/or living together in sharing...

  2. User Identification Framework in Social Network Services Environment

    Directory of Open Access Journals (Sweden)

    Brijesh BAKARIYA

    2014-01-01

    Full Text Available Social Network Service is a one of the service where people may communicate with one an-other; and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a type of network. Such type of web application plays a dominant role in internet technology. In such type of online community, people may share their common interest. Facebook LinkedIn, orkut and many more are the Social Network Service and it is good medium of making link with people having unique or common interest and goals. But the problem of privacy protection is a big issue in today’s world. As social networking sites allows anonymous users to share information of other stuffs. Due to which cybercrime is also increasing to a rapid extent. In this article we preprocessed the web log data of Social Network Services and assemble that data on the basis of image file format like jpg, jpeg, gif, png, bmp etc. and also propose a framework for victim’s identification.

  3. A Technical Mode for Sharing and Utilizing Open Educational Resources in Chinese Universities

    Directory of Open Access Journals (Sweden)

    Juan Yang

    2011-09-01

    Full Text Available Open educational resources just supply potentials to help equalize the access to worldwide knowledge and education, but themselves alone do not cause effective learning or education. How to make effective use of the resources is still a big challenge. In this study, a technical mode is proposed to collect the open educational resources from different sources on the Internet into a campus-network-based resource management system. The system facilitates free and easy access to the resources for instructors and students in universities and integrates the resources into learning and teaching. The technical issues regarding the design the resource management system are examined, including the structure and functions of the system, metadata standard compatibility and scalability, metadata file format, and resource utilization assessment. Furthermore, the resource collecting, storage and utilization modes are also discussed so as to lay a technical basis for extensive and efficient sharing and utilization of the OER in Chinese universities.

  4. SharePoint 2010 Development For Dummies

    CERN Document Server

    Withee, Ken

    2011-01-01

    A much-needed guide that shows you how to leverage SharePoint tools without writing a line of code!. The great news about SharePoint is…you don't need to be a seasoned .NET developer to develop custom functions for it. This book shows you how to use SharePoint Designer, Report Builder, Dashboard Designer, InfoPath, Excel, Word, Visio, and the SharePoint web-based UI to design and develop—without ever writing a line of code! Learn how to customize your site, build SharePoint apps, start social networking, or add Web parts.  This straightforward guide makes everything easier.: Introduces you to

  5. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  6. Image File - TP Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available ption of data contents Network diagrams (in PNG format) for each project. One project has one pathway file o...List Contact us TP Atlas Image File Data detail Data name Image File DOI 10.18908/lsdba.nbdc01161-004 Descri

  7. Regional differences in recipient waitlist time and pre- and post-transplant mortality after the 2006 United Network for Organ Sharing policy changes in the donor heart allocation algorithm.

    Science.gov (United States)

    Schulze, P Christian; Kitada, Shuichi; Clerkin, Kevin; Jin, Zhezhen; Mancini, Donna M

    2014-04-01

    This study examined the impact of the United Network for Organ Sharing (UNOS) policy changes for regional differences in waitlist time and mortality before and after heart transplantation. The 2006 UNOS thoracic organ allocation policy change was implemented to allow for greater regional sharing of organs for heart transplantation. We analyzed 36,789 patients who were listed for heart transplantation from January 1999 through April 2012. These patients were separated into 2 eras centered on the July 12, 2006 UNOS policy change. Pre- and post-transplantation characteristics were compared by UNOS regions. Waitlist mortality decreased nationally (up to 180 days: 13.3% vs. 7.9% after the UNOS policy change, p < 0.001) and within each region. Similarly, 2-year post-transplant mortality decreased nationally (2-year mortality: 17.3% vs. 14.6%; p < 0.001) as well as regionally. Waitlist time for UNOS status 1A and 1B candidates increased nationally 17.8 days on average (p < 0.001) with variability between the regions. The greatest increases were in Region 9 (59.2-day increase, p < 0.001) and Region 4 (41.2-day increase, p < 0.001). Although the use of mechanical circulatory support increased nearly 2.3-fold nationally in Era 2, significant differences were present on a regional basis. In Regions 6, 7, and 10, nearly 40% of those transplanted required left ventricular assist device bridging, whereas only 19.6%, 22.3%, and 15.5% required a left ventricular assist device in regions 3, 4, and 5, respectively. The 2006 UNOS policy change has resulted in significant regional heterogeneity with respect to waitlist time and reliance on mechanical circulatory support as a bridge to transplantation, although overall both waitlist mortality and post-transplant survival are improved. Copyright © 2014 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  8. Dynamic quantum secret sharing

    International Nuclear Information System (INIS)

    Jia, Heng-Yue; Wen, Qiao-Yan; Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo

    2012-01-01

    In this Letter we consider quantum secret sharing (QSS) between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications. -- Highlights: ► We consider quantum secret sharing between a sender and a dynamic agent group, called dynamic quantum secret sharing (DQSS). ► In the DQSS, the change of the agent group is allowable during the procedure of sharing classical and quantum information. ► Two DQSS schemes are proposed based on a special kind of entangled state, starlike cluster states. ► Without redistributing all the shares, the changed agent group can reconstruct the sender's secret by their cooperation. ► Compared with the previous quantum secret sharing scheme, our schemes are more flexible and suitable for practical applications.

  9. Prototyping a file sharing and synchronization service with Owncloud

    Science.gov (United States)

    Mościcki, Jakub T.; Lamanna, Massimo

    2014-06-01

    We present the summary of technical evaluation of the Owncloud product as a technology to implement the CERNBOX service - an open source alternative to Dropbox use at CERN. In this paper we highlight the strengths of Owncloud and we also identify core issues which needs to be addressed for large-scale deployment at CERN.

  10. Prototyping a file sharing and synchronization service with Owncloud

    International Nuclear Information System (INIS)

    Mościcki, Jakub T; Lamanna, Massimo

    2014-01-01

    We present the summary of technical evaluation of the Owncloud product as a technology to implement the CERNBOX service – an open source alternative to Dropbox use at CERN. In this paper we highlight the strengths of Owncloud and we also identify core issues which needs to be addressed for large-scale deployment at CERN.

  11. Decay data file based on the ENSDF file

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, J. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1997-03-01

    A decay data file with the JENDL (Japanese Evaluated Nuclear Data Library) format based on the ENSDF (Evaluated Nuclear Structure Data File) file was produced as a tentative one of special purpose files of JENDL. The problem using the ENSDF file as primary source data of the JENDL decay data file is presented. (author)

  12. Energy economy: Federal network agency to the request of EnBW Trading for transformation of interruptible network use capacities into firm network use capacities; Energiewirtschaft: Bundesnetzagentur zum Antrag von EnBW Trading auf Umwandlung unterbrechbarer in feste Netznutzungskapazitaeten

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2006-07-15

    In the so-called ministerial permission from July / September 2002 the E.ON AG is permitted to adopt shares of the former Ruhrgas AG (today E.ON Ruhrgas AG, ERAG). The transformation of the duties in this ministerial permission led to law suites. Recently, the federal network agency had to decide on a petition of EnBW Trading GmbH (EnBW) against the E.ON Ruhrgas Transport AG and Co. KG (ERT). EnBW had requested a transformation interruptible network use capacities into firm network use capacities. The federal network agency has permitted this petition of EnBW with resolution from 5 May 2006 (file reference: BK7-06-008). In the following, the author describes the reasons of this decision in detail. However, this decision is not be valid in law. Therefore, ERT has appealed a complaint at the higher regional court Duesseldorf.

  13. Modern ICT Tools: Online Electronic Resources Sharing Using Web ...

    African Journals Online (AJOL)

    Modern ICT Tools: Online Electronic Resources Sharing Using Web 2.0 and Its Implications For Library And Information Practice In Nigeria. ... The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more ...

  14. Job sharing. Part 1.

    Science.gov (United States)

    Anderson, K; Forbes, R

    1989-01-01

    This article is the first of a three part series discussing the impact of nurses job sharing at University Hospital, London, Ontario. This first article explores the advantages and disadvantages of job sharing for staff nurses and their supervising nurse manager, as discussed in the literature. The results of a survey conducted on a unit with a large number of job sharing positions, concur with literature findings. The second article will present the evaluation of a pilot project in which two nurses job share a first line managerial position in the Operating Room. The third article will relate the effects of job sharing on women's perceived general well being. Job sharing in all areas, is regarded as a positive experience by both nurse and administrators.

  15. The Sharing Economy

    DEFF Research Database (Denmark)

    Avital, Michel; Carroll, John M.; Hjalmarsson, Anders

    2015-01-01

    The sharing economy is spreading rapidly worldwide in a number of industries and markets. The disruptive nature of this phenomenon has drawn mixed responses ranging from active conflict to adoption and assimilation. Yet, in spite of the growing attention to the sharing economy, we still do not know...... much about it. With the abundant enthusiasm about the benefits that the sharing economy can unleash and the weekly reminders about its dark side, further examination is required to determine the potential of the sharing economy while mitigating its undesirable side effects. The panel will join...... the ongoing debate about the sharing economy and contribute to the discourse with insights about how digital technologies are critical in shaping this turbulent ecosystem. Furthermore, we will define an agenda for future research on the sharing economy as it becomes part of the mainstream society as well...

  16. RAMA: A file system for massively parallel computers

    Science.gov (United States)

    Miller, Ethan L.; Katz, Randy H.

    1993-01-01

    This paper describes a file system design for massively parallel computers which makes very efficient use of a few disks per processor. This overcomes the traditional I/O bottleneck of massively parallel machines by storing the data on disks within the high-speed interconnection network. In addition, the file system, called RAMA, requires little inter-node synchronization, removing another common bottleneck in parallel processor file systems. Support for a large tertiary storage system can easily be integrated in lo the file system; in fact, RAMA runs most efficiently when tertiary storage is used.

  17. UPIN Group File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Group Unique Physician Identifier Number (UPIN) File is the business entity file that contains the group practice UPIN and descriptive information. It does NOT...

  18. Tuning HDF5 subfiling performance on parallel file systems

    Energy Technology Data Exchange (ETDEWEB)

    Byna, Suren [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Chaarawi, Mohamad [Intel Corp. (United States); Koziol, Quincey [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Mainzer, John [The HDF Group (United States); Willmore, Frank [The HDF Group (United States)

    2017-05-12

    Subfiling is a technique used on parallel file systems to reduce locking and contention issues when multiple compute nodes interact with the same storage target node. Subfiling provides a compromise between the single shared file approach that instigates the lock contention problems on parallel file systems and having one file per process, which results in generating a massive and unmanageable number of files. In this paper, we evaluate and tune the performance of recently implemented subfiling feature in HDF5. In specific, we explain the implementation strategy of subfiling feature in HDF5, provide examples of using the feature, and evaluate and tune parallel I/O performance of this feature with parallel file systems of the Cray XC40 system at NERSC (Cori) that include a burst buffer storage and a Lustre disk-based storage. We also evaluate I/O performance on the Cray XC30 system, Edison, at NERSC. Our results show performance benefits of 1.2X to 6X performance advantage with subfiling compared to writing a single shared HDF5 file. We present our exploration of configurations, such as the number of subfiles and the number of Lustre storage targets to storing files, as optimization parameters to obtain superior I/O performance. Based on this exploration, we discuss recommendations for achieving good I/O performance as well as limitations with using the subfiling feature.

  19. Probabilistic Infinite Secret Sharing

    OpenAIRE

    Csirmaz, László

    2013-01-01

    The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes. It highlights important properties, explains why certain definitions work better than others, connects this topic to other branches of mathematics, and might yield new design paradigms. A probabilistic secret sharing scheme is a joint probability distribution of the shares and the secret together with a colle...

  20. BBSRC Data Sharing Policy

    OpenAIRE

    Amanda Collis; David McAllister; Michael Ball

    2011-01-01

    BBSRC recognizes the importance of contributing to the growing international efforts in data sharing. BBSRC is committed to getting the best value for the funds we invest and believes that making research data more readily available will reinforce open scientific inquiry and stimulate new investigations and analyses. BBSRC supports the view that data sharing should be led by the scientific community and driven by scientific need. It should also be cost effective and the data shared should be ...

  1. Factors Impacting Knowledge Sharing

    DEFF Research Database (Denmark)

    Schulzmann, David; Slepniov, Dmitrij

    The purpose of this paper is to examine various factors affecting knowledge sharing at the R&D center of a Western MNE in China. The paper employs qualitative methodology and is based on the action research and case study research techniques. The findings of the paper advance our understanding...... about factors that affect knowledge sharing. The main emphasis is given to the discussion on how to improve knowledge sharing in global R&D organizations....

  2. Phenomenology of experiential sharing

    DEFF Research Database (Denmark)

    León, Felipe; Zahavi, Dan

    2016-01-01

    The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended to be overl......The chapter explores the topic of experiential sharing by drawing on the early contributions of the phenomenologists Alfred Schutz and Gerda Walther. It is argued that both Schutz and Walther support, from complementary perspectives, an approach to experiential sharing that has tended...

  3. Share your sweets

    DEFF Research Database (Denmark)

    Byrnit, Jill; Høgh-Olesen, Henrik; Makransky, Guido

    2015-01-01

    study to examine the sharing behavior of groups of captive chimpanzees and bonobos when introducing the same type of food (branches) manipulated to be of two different degrees of desirability (with or without syrup). Results showed that, the large majority of food transfers in both species came about...... as sharing in which group members were allowed to co-feed or remove food from the stock of the food possessor, and the introduction of high-value food resulted in more sharing, not less. Food sharing behavior differed between species in that chimpanzees displayed significantly more begging behavior than...

  4. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  5. Efficient disk-to-disk copy through long-distance high-speed networks with background traffic

    International Nuclear Information System (INIS)

    Tanida, Naoki; Hiraki, Kei; Inaba, Mary

    2010-01-01

    We propose 'ICDC - InterContinental Disk Copy', a data sharing facility between distant places. ICDC aims to transfer huge amount of data files easily on Long Fat-pipe Networks with some background traffic. ICDC consists of commodity PCs and Solid State Drives and we apply Inter Packet Gap tuning technique to it. Using 'ICDC-1 Gbps model', we transferred data between Tokyo and Cadarache via New York. We attained about 860 Mbps, i.e., 86% usage of the network bottleneck bandwidth.

  6. A File Archival System

    Science.gov (United States)

    Fanselow, J. L.; Vavrus, J. L.

    1984-01-01

    ARCH, file archival system for DEC VAX, provides for easy offline storage and retrieval of arbitrary files on DEC VAX system. System designed to eliminate situations that tie up disk space and lead to confusion when different programers develop different versions of same programs and associated files.

  7. Text File Comparator

    Science.gov (United States)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  8. Potential for shared log transport services

    Science.gov (United States)

    Tim McDonald; Steve Taylor; Jorge Valenzuela

    2001-01-01

    A simulation model of a log transport logistics network was developed. The model could be structured to either share truck capacity among a group of loggers, or to assign a fixed number of trucks to individual loggers. Another variation of the model allowed the use of a staging yard to set out loaded trailers and deliver them to destinations using dedicated shuttle...

  9. Analyzing user behavior across social sharing environments

    NARCIS (Netherlands)

    Meo, P.; Ferrara, E.; Abel, F.; Aroyo, L.M.; Houben, G.J

    2015-01-01

    In this work we present an in-depth analysis of the user behaviors on different Social Sharing systems. We consider three popular platforms, Flickr, Delicious and StumbleUpon, and, by combining techniques from social network analysis with techniques from semantic analysis, we characterize the

  10. Sharing the cost of risky projects

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Moulin, Hervé

    2018-01-01

    Users share the cost of unreliable non-rival projects (items). For instance, industry partners pay today for R&D that may or may not deliver a cure to some viruses, agents pay for the edges of a network that will cover their connectivity needs, but the edges may fail, etc. Each user has a binary...

  11. Learning Objects, Repositories, Sharing and Reusability

    Science.gov (United States)

    Koppi, Tony; Bogle, Lisa; Bogle, Mike

    2005-01-01

    The online Learning Resource Catalogue (LRC) Project has been part of an international consortium for several years and currently includes 25 institutions worldwide. The LRC Project has evolved for several pragmatic reasons into an academic network whereby members can identify and share reusable learning objects as well as collaborate in a number…

  12. Millennials and the Sharing Economy

    DEFF Research Database (Denmark)

    Ranzini, Giulia; Newlands, Gemma; Anselmi, Guido

    Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy......Report from the EU H2020 Research Project Ps2Share: Participation, Privacy, and Power in the Sharing Economy...

  13. Mobile energy sharing futures

    DEFF Research Database (Denmark)

    Worgan, Paul; Knibbe, Jarrod; Plasencia, Diego Martinez

    2016-01-01

    We foresee a future where energy in our mobile devices can be shared and redistributed to suit our current task needs. Many of us are beginning to carry multiple mobile devices and we seek to re-evaluate the traditional view of a mobile device as only accepting energy. In our vision, we can...... sharing futures....

  14. 5G Spectrum Sharing

    OpenAIRE

    Nekovee, Maziar; Rudd, Richard

    2017-01-01

    In this paper an overview is given of the current status of 5G industry standards, spectrum allocation and use cases, followed by initial investigations of new opportunities for spectrum sharing in 5G using cognitive radio techniques, considering both licensed and unlicensed scenarios. A particular attention is given to sharing millimeter-wave frequencies, which are of prominent importance for 5G.

  15. NCSU Reactor Sharing Program

    International Nuclear Information System (INIS)

    Perez, P.B.

    1993-01-01

    The Nuclear Reactor Program at North Carolina State University provides the PULSTAR Research Reactor and associated facilities to eligible institutions with support, in part, from the Department of Energy Reactor Sharing Program. Participation in the NCSU Reactor Sharing Program continues to increase steadily with visitors ranging from advance high school physics and chemistry students to Ph.D. level research from neighboring universities

  16. 'An Arena for Sharing'

    DEFF Research Database (Denmark)

    la Cour, Karen; Ledderer, Loni; Hansen, Helle Ploug

    2015-01-01

    relatives). In-depth interviews were conducted in the participants' homes 1 month after the rehabilitation course. Data were analyzed by a constant comparative method. Results: Residential rehabilitation course was identified to serve as an "arena for sharing," underpinned by 3 dimensions of sharing...

  17. Exploring the Sharing Economy

    DEFF Research Database (Denmark)

    Netter, Sarah

    Despite the growing interest on the part of proponents and opponents - ranging from business, civil society, media, to policy-makers alike - there is still limited knowledge about the working mechanisms of the sharing economy. The thesis is dedicated to explore this understudied phenomenon...... and to provide a more nuanced understanding of the micro- and macro-level tensions that characterize the sharing economy. This thesis consists of four research papers, each using different literature, methodology, and data sets. The first paper investigates how the sharing economy is diffused and is ‘talked......-level tensions experience by sharing platforms by looking at the case of mobile fashion reselling and swapping markets. The final paper combines the perspectives of different sharing economy stakeholders and outlines some of the micro and macro tensions arising in and influencing the organization of these multi...

  18. Sharing Rare Attitudes Attracts.

    Science.gov (United States)

    Alves, Hans

    2018-04-01

    People like others who share their attitudes. Online dating platforms as well as other social media platforms regularly rely on the social bonding power of their users' shared attitudes. However, little is known about moderating variables. In the present work, I argue that sharing rare compared with sharing common attitudes should evoke stronger interpersonal attraction among people. In five studies, I tested this prediction for the case of shared interests from different domains. I found converging evidence that people's rare compared with their common interests are especially potent to elicit interpersonal attraction. I discuss the current framework's theoretical implications for impression formation and impression management as well as its practical implications for improving online dating services.

  19. Experience and Lessons learnt from running High Availability Databases on Network Attached Storage

    CERN Document Server

    Guijarro, Manuel

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department supplies the Oracle Central Database services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been setup. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS (Network File System) as shared disk space for RAC purposes and Data hosting. It is composed of two private LANs (Local Area Network), one to provide access to the NAS filers and a second to implement the Oracle RAC private interconnect, both using Network Bonding. NAS filers are configured in partnership to prevent having single points of failure and to provide automatic NAS filer fail-over.

  20. Experience and lessons learnt from running high availability databases on network attached storage

    International Nuclear Information System (INIS)

    Guijarro, M; Gaspar, R

    2008-01-01

    The Database and Engineering Services Group of CERN's Information Technology Department supplies the Oracle Central Database services used in many activities at CERN. In order to provide High Availability and ease management for those services, a NAS (Network Attached Storage) based infrastructure has been setup. It runs several instances of the Oracle RAC (Real Application Cluster) using NFS (Network File System) as shared disk space for RAC purposes and Data hosting. It is composed of two private LANs (Local Area Network), one to provide access to the NAS filers and a second to implement the Oracle RAC private interconnect, both using Network Bonding. NAS filers are configured in partnership to prevent having single points of failure and to provide automatic NAS filer fail-over

  1. Chimpanzees share forbidden fruit.

    Directory of Open Access Journals (Sweden)

    Kimberley J Hockings

    2007-09-01

    Full Text Available The sharing of wild plant foods is infrequent in chimpanzees, but in chimpanzee communities that engage in hunting, meat is frequently used as a 'social tool' for nurturing alliances and social bonds. Here we report the only recorded example of regular sharing of plant foods by unrelated, non-provisioned wild chimpanzees, and the contexts in which these sharing behaviours occur. From direct observations, adult chimpanzees at Bossou (Republic of Guinea, West Africa very rarely transferred wild plant foods. In contrast, they shared cultivated plant foods much more frequently (58 out of 59 food sharing events. Sharing primarily consists of adult males allowing reproductively cycling females to take food that they possess. We propose that hypotheses focussing on 'food-for-sex and -grooming' and 'showing-off' strategies plausibly account for observed sharing behaviours. A changing human-dominated landscape presents chimpanzees with fresh challenges, and our observations suggest that crop-raiding provides adult male chimpanzees at Bossou with highly desirable food commodities that may be traded for other currencies.

  2. Sharing the Pi

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Thorsteinsson, Simon

    2014-01-01

    , and flexible platform to deploy large research networking testbeds for the evaluation of network coding protocols. We propose key parameters and representations to evaluate protocol performance in network nodes as well as validating the testbed’s statistics using the case of a one–hop broadcast with random......Abstract—This paper presents the design and performance evaluation of an inexpensive testbed for network coding protocols composed of Raspberry Pis. First, we show the performance of random linear network coding primitives on the Raspberry Pi in terms of processing speed and energy consumption...

  3. Hybrid shared/distributed parallelism for 3D characteristics transport solvers

    International Nuclear Information System (INIS)

    Dahmani, M.; Roy, R.

    2005-01-01

    In this paper, we will present a new hybrid parallel model for solving large-scale 3-dimensional neutron transport problems used in nuclear reactor simulations. Large heterogeneous reactor problems, like the ones that occurs when simulating Candu cores, have remained computationally intensive and impractical for routine applications on single-node or even vector computers. Based on the characteristics method, this new model is designed to solve the transport equation after distributing the calculation load on a network of shared memory multi-processors. The tracks are either generated on the fly at each characteristics sweep or stored in sequential files. The load balancing is taken into account by estimating the calculation load of tracks and by distributing batches of uniform load on each node of the network. Moreover, the communication overhead can be predicted after benchmarking the latency and bandwidth using appropriate network test suite. These models are useful for predicting the performance of the parallel applications and to analyze the scalability of the parallel systems. (authors)

  4. Development of EDFSRS: evaluated data files storage and retrieval system

    International Nuclear Information System (INIS)

    Hasegawa, Akira

    1985-07-01

    EDFSRS: Evaluated Data Files Storage and Retrieval System has been developed, which is a complete service system for the evaluated nuclear data files compiled in the major three formats: ENDF/B, UKNDL and KEDAK. This system intends to give efficient loading and maintenance of evaluated nuclear data files to the data base administrators and efficient retrievals to their users not only with the easiness but with the best confidence. It can give users all of the information available in these major three formats. The system consists of more than fifteen independent programs and some 150 Mega byte data files and index files (data-base) of the loaded data. In addition it is designed to be operated in the on-line TSS (Time Sharing System) mode, so that users can get any information from their desk top terminals. This report is prepared as a reference manual of the EDFSRS. (author)

  5. Sharing the dance -

    DEFF Research Database (Denmark)

    He, Jing; Ravn, Susanne

    2018-01-01

    In his recent works on daily face-to-face encounters, Zahavi claims that the phenomenon of sharing involves reciprocity. Following Zahavi’s line of thought, we wonder what exactly reciprocity amounts to and how the shared experience emerges from the dynamic process of interaction. By turning...... to the highly specialized field of elite sports dance, we aim at exploring the way in which reciprocity unfolds in intensive deliberate practices of movement. In our analysis, we specifically argue that the ongoing dynamics of two separate flows of movement constitute a shared experience of dancing together...

  6. Global resource sharing

    CERN Document Server

    Frederiksen, Linda; Nance, Heidi

    2011-01-01

    Written from a global perspective, this book reviews sharing of library resources on a global scale. With expanded discovery tools and massive digitization projects, the rich and extensive holdings of the world's libraries are more visible now than at any time in the past. Advanced communication and transmission technologies, along with improved international standards, present a means for the sharing of library resources around the globe. Despite these significant improvements, a number of challenges remain. Global Resource Sharing provides librarians and library managers with a comprehensive

  7. Report endorses data sharing

    Science.gov (United States)

    The potential benefits of sharing data so outweigh its costs that investigators should be required to include plans for sharing data as part of their grant proposals, according to recommendations issued recently by the Committee on National Statistics (CNSTAT) of the National Research Council (NRC).In their report Sharing Research Data, CNSTAT also recommended that “Journals should give more emphasis to reports of secondary analyses and to replications,” provided that the original collections of data receive full credit. In addition, “Journal editors should require authors to provide access to data during the peer review process.”

  8. Use of econometric models to estimate expenditure shares.

    Science.gov (United States)

    Trogdon, Justin G; Finkelstein, Eric A; Hoerger, Thomas J

    2008-08-01

    To investigate the use of regression models to calculate disease-specific shares of medical expenditures. Medical Expenditure Panel Survey (MEPS), 2000-2003. Theoretical investigation and secondary data analysis. Condition files used to define the presence of 10 medical conditions. Incremental effects of conditions on expenditures, expressed as a fraction of total expenditures, cannot generally be interpreted as shares. When the presence of one condition increases treatment costs for another condition, summing condition-specific shares leads to double-counting of expenditures. Condition-specific shares generated from multiplicative models should not be summed. We provide an algorithm that allows estimates based on these models to be interpreted as shares and summed across conditions.

  9. Performance evaluation of a high-speed switched network for PACS

    Science.gov (United States)

    Zhang, Randy H.; Tao, Wenchao; Huang, Lu J.; Valentino, Daniel J.

    1998-07-01

    We have replaced our shared-media Ethernet and FDDI network with a multi-tiered, switched network using OC-12 (622 Mbps) ATM for the network backbone, OC3 (155 Mbps) connections to high-end servers and display workstations, and switched 100/10 Mbps Ethernet for workstations and desktop computers. The purpose of this research was to help PACS designers and implementers understand key performance factors in a high- speed switched network by characterizing and evaluating its image delivery performance, specifically, the performance of socket-based TCP (Transmission Control Protocol) and DICOM 3.0 communications. A test network within the UCLA Clinical RIS/PACS was constructed using Sun UltraSPARC-II machines with ATM, Fast Ethernet, and Ethernet network interfaces. To identify performance bottlenecks, we evaluated network throughput for memory to memory, memory to disk, disk to memory, and disk to disk transfers. To evaluate the effect of file size, tests involving disks were further divided using sizes of small (514 KB), medium (8 MB), and large (16 MB) files. The observed maximum throughput for various network configurations using the TCP protocol was 117 Mbps for memory to memory and 88 MBPS for memory to disk. For disk to memory, the peak throughput was 98 Mbps using small files, 114 Mbps using medium files, and 116 Mbps using large files. The peak throughput for disk to disk became 64 Mbps using small files and 96 Mbps using medium and large files. The peak throughput using the DICOM 3.0 protocol was substantially lower in all categories. The measured throughput varied significantly among the tests when TCP socket buffer was raised above the default value. The optimal buffer size was approximately 16 KB or the TCP protocol and around 256 KB for the DICOM protocol. The application message size also displayed distinctive effects on network throughput when the TCP socket buffer size was varied. The throughput results for Fast Ethernet and Ethernet were expectedly

  10. The impact of meeting donor management goals on the number of organs transplanted per donor: results from the United Network for Organ Sharing Region 5 prospective donor management goals study.

    Science.gov (United States)

    Malinoski, Darren J; Patel, Madhukar S; Daly, Michael C; Oley-Graybill, Chrystal; Salim, Ali

    2012-10-01

    Many organ procurement organizations have implemented critical care end points as donor management goals in efforts to increase organs transplanted per donor after neurologic determination of death. Although retrospective studies have demonstrated an association between meeting donor management goals and organ yield, prospective studies are lacking. In June 2008, nine donor management goals were prospectively implemented as a checklist and every donor after neurologic determination of death was managed to meet them. The donor management goals represented normal cardiovascular, pulmonary, renal, and endocrine end points. Data were collected for 7 months. Donor management goals "met" was defined a priori as achieving any seven of the nine donor management goals, and this was recorded at the time of consent, 12-18 hrs later, and prior to organ recovery. The primary outcome measure was ≥4 organs transplanted per donor, and binary logistic regression was used to identify independent predictors of this outcome with a porgan procurement organizations in the five Southwestern United States (United Network for Organ Sharing Region 5). All standard criteria donors after neurologic determination of deaths. Prospective implementation of a donor management goal checklist. There were 380 standard criteria donors with 3.6±1.7 organs transplanted per donor. Fifteen percent had donor management goals met at the time of consent, 33% at 12-18 hrs, and 38% prior to organ recovery. Forty-eight percent had ≥4 organs transplanted per donor. Donors with ≥4 organs transplanted per donor had significantly more individual donor management goals met at all three time points. Independent predictors of ≥4 organs transplanted per donor were age (odds ratio=0.95 per year), final creatinine (odds ratio=0.75 per 1-unit increase), donor management goals "met" at consent (odds ratio=2.03), donor management goals "met" prior to organ recovery (odds ratio=2.34), and a change in the number of

  11. Shared-resource computing for small research labs.

    Science.gov (United States)

    Ackerman, M J

    1982-04-01

    A real time laboratory computer network is described. This network is composed of four real-time laboratory minicomputers located in each of four division laboratories and a larger minicomputer in a centrally located computer room. Off the shelf hardware and software were used with no customization. The network is configured for resource sharing using DECnet communications software and the RSX-11-M multi-user real-time operating system. The cost effectiveness of the shared resource network and multiple real-time processing using priority scheduling is discussed. Examples of utilization within a medical research department are given.

  12. Network analysis for the visualization and analysis of qualitative data.

    Science.gov (United States)

    Pokorny, Jennifer J; Norman, Alex; Zanesco, Anthony P; Bauer-Wu, Susan; Sahdra, Baljinder K; Saron, Clifford D

    2018-03-01

    We present a novel manner in which to visualize the coding of qualitative data that enables representation and analysis of connections between codes using graph theory and network analysis. Network graphs are created from codes applied to a transcript or audio file using the code names and their chronological location. The resulting network is a representation of the coding data that characterizes the interrelations of codes. This approach enables quantification of qualitative codes using network analysis and facilitates examination of associations of network indices with other quantitative variables using common statistical procedures. Here, as a proof of concept, we applied this method to a set of interview transcripts that had been coded in 2 different ways and the resultant network graphs were examined. The creation of network graphs allows researchers an opportunity to view and share their qualitative data in an innovative way that may provide new insights and enhance transparency of the analytical process by which they reach their conclusions. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  13. Facilitating Knowledge Sharing

    DEFF Research Database (Denmark)

    Holdt Christensen, Peter

    knowledge sharing is to ensure that the exchange is seen as equitable for the parties involved, and by viewing the problems of knowledge sharing as motivational problems situated in different organizational settings, the paper explores how knowledge exchange can be conceptualized as going on in four...... distinct situations of exchange denominated organizational exchange yielding extrinsic rewards, organizational exchange yielding intrinsic rewards, financial exchange, and social exchange. The paper argues that each situation of exchange has distinct assumptions about individual behaviour...... and the intermediaries regulating the exchange, and facilitating knowledge sharing should therefore be viewed as a continuum of practices under the influence of opportunistic behaviour, obedience or organizational citizenship behaviour. Keywords: Knowledge sharing, motivation, organizational settings, situations...

  14. A Sharing Proposition.

    Science.gov (United States)

    Sturgeon, Julie

    2002-01-01

    Describes how the University of Vermont and St. Michael's College in Burlington, Vermont cooperated to share a single card access system. Discusses the planning, financial, and marketplace advantages of the cooperation. (EV)

  15. Pricing Shared Appreciation Mortgages

    OpenAIRE

    Zhong, Yina

    2006-01-01

    This paper develops a model for the valuation of shared appreciation mortgage (SAM) and examines the effect of reduction in interest rate on the mortgage duration and share of property appreciation lender charges. The recent rise in SAM availability, as a result of some secondary market financial support and prerequisite standardization, motivates a more careful consideration of the underlying SAM value. The primary difference between the SAM model and the model for general traditional mor...

  16. Sharing resources@CERN

    CERN Multimedia

    Maximilien Brice

    2002-01-01

    The library is launching a 'sharing resources@CERN' campaign, aiming to increase the library's utility by including the thousands of books bought by individual groups at CERN. This will improve sharing of information among CERN staff and users. Photo 01: L. to r. Eduardo Aldaz, from the PS division, Corrado Pettenati, Head Librarian, and Isabel Bejar, from the ST division, read their divisional copies of the same book.

  17. SharePoint governance

    OpenAIRE

    Ali, Mudassar

    2013-01-01

    Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad SharePoint is a web-based business collaboration platform from Microsoft which is very robust and dynamic in nature. The platform has been in the market for more than a decade and has been adapted by large number of organisations in the world. The platform has become larger in scale, richer in features and is improving consistently with every new version. However, SharePoint ...

  18. Secure medical information sharing in cloud computing.

    Science.gov (United States)

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  19. DataSync - sharing data via filesystem

    Science.gov (United States)

    Ulbricht, Damian; Klump, Jens

    2014-05-01

    Usually research work is a cycle of to hypothesize, to collect data, to corroborate the hypothesis, and finally to publish the results. In this sequence there are possibilities to base the own work on the work of others. Maybe there are candidates of physical samples listed in the IGSN-Registry and there is no need to go on excursion to acquire physical samples. Hopefully the DataCite catalogue lists already metadata of datasets that meet the constraints of the hypothesis and that are now open for reappraisal. After all, working with the measured data to corroborate the hypothesis involves new methods, and proven methods as well as different software tools. A cohort of intermediate data is created that can be shared with colleagues to discuss the research progress and receive a first evaluation. In consequence, the intermediate data should be versioned to easily get back to valid intermediate data, when you notice you get on the wrong track. Things are different for project managers. They want to know what is currently done, what has been done, and what is the last valid data, if somebody has to continue the work. To make life of members of small science projects easier we developed Datasync [1] as a software for sharing and versioning data. Datasync is designed to synchronize directory trees between different computers of a research team over the internet. The software is developed as JAVA application and watches a local directory tree for changes that are replicated as eSciDoc-objects into an eSciDoc-infrastructure [2] using the eSciDoc REST API. Modifications to the local filesystem automatically create a new version of an eSciDoc-object inside the eSciDoc-infrastructure. This way individual folders can be shared between team members while project managers can get a general idea of current status by synchronizing whole project inventories. Additionally XML metadata from separate files can be managed together with data files inside the eSciDoc-objects. While

  20. Shared memories reveal shared structure in neural activity across individuals

    Science.gov (United States)

    Chen, J.; Leong, Y.C.; Honey, C.J.; Yong, C.H.; Norman, K.A.; Hasson, U.

    2016-01-01

    Our lives revolve around sharing experiences and memories with others. When different people recount the same events, how similar are their underlying neural representations? Participants viewed a fifty-minute movie, then verbally described the events during functional MRI, producing unguided detailed descriptions lasting up to forty minutes. As each person spoke, event-specific spatial patterns were reinstated in default-network, medial-temporal, and high-level visual areas. Individual event patterns were both highly discriminable from one another and similar between people, suggesting consistent spatial organization. In many high-order areas, patterns were more similar between people recalling the same event than between recall and perception, indicating systematic reshaping of percept into memory. These results reveal the existence of a common spatial organization for memories in high-level cortical areas, where encoded information is largely abstracted beyond sensory constraints; and that neural patterns during perception are altered systematically across people into shared memory representations for real-life events. PMID:27918531

  1. Understanding Interdependency Through Complex Information Sharing

    Directory of Open Access Journals (Sweden)

    Fernando Rosas

    2016-01-01

    Full Text Available The interactions between three or more random variables are often nontrivial, poorly understood and, yet, are paramount for future advances in fields such as network information theory, neuroscience and genetics. In this work, we analyze these interactions as different modes of information sharing. Towards this end, and in contrast to most of the literature that focuses on analyzing the mutual information, we introduce an axiomatic framework for decomposing the joint entropy that characterizes the various ways in which random variables can share information. Our framework distinguishes between interdependencies where the information is shared redundantly and synergistic interdependencies where the sharing structure exists in the whole, but not between the parts. The key contribution of our approach is to focus on symmetric properties of this sharing, which do not depend on a specific point of view for differentiating roles between its components. We show that our axioms determine unique formulas for all of the terms of the proposed decomposition for systems of three variables in several cases of interest. Moreover, we show how these results can be applied to several network information theory problems, providing a more intuitive understanding of their fundamental limits.

  2. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    different online networks for communities of people who share interests or individuals who presents themselves through user produced content is what makes up the social networking of today. The purpose of this paper is to discuss perceived user requirements to the next generation social networks. The paper...

  3. GOTHIC memory management : a multiprocessor shared single level store

    OpenAIRE

    Michel , Béatrice

    1990-01-01

    Gothic purpose is to build an object-oriented fault-tolerant distributed operating system for a local area network of multiprocessor workstations. This paper describes Gothic memory manager. It realizes the sharing of the secondary memory space between any process running on the Gothic system. Processes on different processors can communicate by sharing permanent information. The manager implements a shared single level storage with an invalidation protocol working on disk-pages to maintain s...

  4. Knowledge Sharing for Climate Change Adaptation in Africa | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project aims to put in place a vast mechanism for sharing information on climate change adaptation across the continent of Africa. The interactive network will be a platform for exchange of ideas, debate and information sharing between diverse actors (communities, researchers, development practitioners, ...

  5. Knowledge Sharing for Climate Change Adaptation in Africa | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project aims to put in place a vast mechanism for sharing information on climate change adaptation across the continent of Africa. The interactive network will be a platform for exchange of ideas, debate and information sharing between diverse actors (communities, researchers, development practitioners, ...

  6. In Whom Do We Trust - Sharing Security Events

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2016-01-01

    Security event sharing is deemed of critical importance to counteract large-scale attacks at Internet service provider (ISP) networks as these attacks have become larger, more sophisticated and frequent. On the one hand, security event sharing is regarded to speed up organization's mitigation and

  7. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  8. Source Reference File

    Data.gov (United States)

    Social Security Administration — This file contains a national set of names and contact information for doctors, hospitals, clinics, and other facilities (known collectively as sources) from which...

  9. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  10. RRB Earnings File (RRBERN)

    Data.gov (United States)

    Social Security Administration — RRBERN contains records for all beneficiaries on the RRB's PSSVES file who's SSNs are validated through the SVES processing. Validated output is processed through...

  11. 24 CFR 266.626 - Notice of default and filing an insurance claim.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Notice of default and filing an... AND OTHER AUTHORITIES HOUSING FINANCE AGENCY RISK-SHARING PROGRAM FOR INSURED AFFORDABLE MULTIFAMILY PROJECT LOANS Contract Rights and Obligations Claim Procedures § 266.626 Notice of default and filing an...

  12. 75 FR 47043 - Self-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness...

    Science.gov (United States)

    2010-08-04

    ... Educational Services Inc 280 TSL Trina Solar Ltd 332 NKE NIKE Inc 282 EWW iShares MSCI Mexico 335 FIS Fidelity...-Regulatory Organizations; BATS Exchange, Inc.; Notice of Filing and Immediate Effectiveness of a Proposed...\\ notice is hereby given that on July 26, 2010, BATS Exchange, Inc. (the ``Exchange'' or ``BATS'') filed...

  13. 75 FR 47664 - Self-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing and Immediate...

    Science.gov (United States)

    2010-08-06

    ..../The 331 ESI ITT Educational Services Inc. 280 TSL Trina Solar Ltd. 332 NKE NIKE Inc. 282 EWW iShares...-Regulatory Organizations; NASDAQ OMX PHLX, Inc.; Notice of Filing and Immediate Effectiveness of Proposed..., notice is hereby given that on July 22, 2010, NASDAQ OMX PHLX, Inc. (``Phlx'' or ``Exchange'') filed with...

  14. Next generation WLCG File Transfer Service (FTS)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    LHC experiments at CERN and worldwide utilize WLCG resources and middleware components to perform distributed computing tasks. One of the most important tasks is reliable file replication. It is a complex problem, suffering from transfer failures, disconnections, transfer duplication, server and network overload, differences in storage systems, etc. To address these problems, EMI and gLite have provided the independent File Transfer Service (FTS) and Grid File Access Library (GFAL) tools. Their development started almost a decade ago, in the meantime, requirements in data management have changed - the old architecture of FTS and GFAL cannot keep support easily these changes. Technology has also been progressing: FTS and GFAL do not fit into the new paradigms (cloud, messaging, for example). To be able to serve the next stage of LHC data collecting (from 2013), we need a new generation of  these tools: FTS 3 and GFAL 2. We envision a service requiring minimal configuration, which can dynamically adapt to the...

  15. Labia Majora Share

    Directory of Open Access Journals (Sweden)

    Hanjing Lee

    2017-01-01

    Full Text Available Defects involving specialised areas with characteristic anatomical features, such as the nipple, upper eyelid, and lip, benefit greatly from the use of sharing procedures. The vulva, a complex 3-dimensional structure, can also be reconstructed through a sharing procedure drawing upon the contralateral vulva. In this report, we present the interesting case of a patient with chronic, massive, localised lymphedema of her left labia majora that was resected in 2011. Five years later, she presented with squamous cell carcinoma over the left vulva region, which is rarely associated with chronic lymphedema. To the best of our knowledge, our management of the radical vulvectomy defect with a labia majora sharing procedure is novel and has not been previously described. The labia major flap presented in this report is a shared flap; that is, a transposition flap based on the dorsal clitoral artery, which has consistent vascular anatomy, making this flap durable and reliable. This procedure epitomises the principle of replacing like with like, does not interfere with leg movement or patient positioning, has minimal donor site morbidity, and preserves other locoregional flap options for future reconstruction. One limitation is the need for a lax contralateral vulva. This labia majora sharing procedure is a viable option in carefully selected patients.

  16. 76 FR 62092 - Filing Procedures

    Science.gov (United States)

    2011-10-06

    ... INTERNATIONAL TRADE COMMISSION Filing Procedures AGENCY: International Trade Commission. ACTION: Notice of issuance of Handbook on Filing Procedures. SUMMARY: The United States International Trade Commission (``Commission'') is issuing a Handbook on Filing Procedures to replace its Handbook on Electronic...

  17. Collaborate, compete and share

    Science.gov (United States)

    Pugliese, Emanuele; Castellano, Claudio; Marsili, Matteo; Pietronero, Luciano

    2009-02-01

    We introduce and study a model of an interacting population of agents who collaborate in groups which compete for limited resources. Groups are formed by random matching agents and their worth is determined by the sum of the efforts deployed by agents in group formation. Agents, on their side, have to share their effort between contributing to their group’s chances to outcompete other groups and resource sharing among partners, when the group is successful. A simple implementation of this strategic interaction gives rise to static and evolutionary properties with a very rich phenomenology. A robust emerging feature is the separation of the population between agents who invest mainly in the success of their group and agents who concentrate in getting the largest share of their group’s profits.

  18. Parallel discrete event simulation using shared memory

    Science.gov (United States)

    Reed, Daniel A.; Malony, Allen D.; Mccredie, Bradley D.

    1988-01-01

    With traditional event-list techniques, evaluating a detailed discrete-event simulation-model can often require hours or even days of computation time. By eliminating the event list and maintaining only sufficient synchronization to ensure causality, parallel simulation can potentially provide speedups that are linear in the numbers of processors. A set of shared-memory experiments, using the Chandy-Misra distributed-simulation algorithm, to simulate networks of queues is presented. Parameters of the study include queueing network topology and routing probabilities, number of processors, and assignment of network nodes to processors. These experiments show that Chandy-Misra distributed simulation is a questionable alternative to sequential-simulation of most queueing network models.

  19. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  20. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683