WorldWideScience

Sample records for isis network model

  1. Interim Service ISDN Satellite (ISIS) network model for advanced satellite designs and experiments

    Science.gov (United States)

    Pepin, Gerard R.; Hager, E. Paul

    1991-01-01

    The Interim Service Integrated Services Digital Network (ISDN) Satellite (ISIS) Network Model for Advanced Satellite Designs and Experiments describes a model suitable for discrete event simulations. A top-down model design uses the Advanced Communications Technology Satellite (ACTS) as its basis. The ISDN modeling abstractions are added to permit the determination and performance for the NASA Satellite Communications Research (SCAR) Program.

  2. Examining ISIS Support and Opposition Networks on Twitter

    Science.gov (United States)

    2016-01-01

    Examining ISIS Support and Opposition Networks on Twitter Elizabeth Bodine-Baron, Todd C. Helmus, Madeline Magnuson, Zev Winkelman C O R P O R A T...Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers...and recruit new fighters. Though much less heralded, ISIS opponents have also taken to Twitter to cas- tigate the ISIS message. This report draws on

  3. Interim Service ISDN Satellite (ISIS) simulator development for advanced satellite designs and experiments

    Science.gov (United States)

    Pepin, Gerard R.

    1992-01-01

    The simulation development associated with the network models of both the Interim Service Integrated Services Digital Network (ISDN) Satellite (ISIS) and the Full Service ISDN Satellite (FSIS) architectures is documented. The ISIS Network Model design represents satellite systems like the Advanced Communications Technology Satellite (ACTS) orbiting switch. The FSIS architecture, the ultimate aim of this element of the Satellite Communications Applications Research (SCAR) Program, moves all control and switching functions on-board the next generation ISDN communications satellite. The technical and operational parameters for the advanced ISDN communications satellite design will be obtained from the simulation of ISIS and FSIS engineering software models for their major subsystems. Discrete event simulation experiments will be performed with these models using various traffic scenarios, design parameters, and operational procedures. The data from these simulations will be used to determine the engineering parameters for the advanced ISDN communications satellite.

  4. A Network of Kalman Filters for MAI and ISI Compensation in a Non-Gaussian Environment

    Directory of Open Access Journals (Sweden)

    Sayadi Bessem

    2005-01-01

    Full Text Available This paper develops a new multiuser detector based on a network of kalman filters (NKF dealing with multiple access-interference (MAI, intersymbol Interference (ISI, and an impulsive observation noise. The two proposed schemes are based on the modeling of the DS-CDMA system by a discrete-time linear system that has non-Gaussian state and measurement noises. By approximating the non-Gaussian densities of the noises by a weighted sum of Gaussian terms and under the common MMSE estimation criterion, we first derive an NKF detector. This version is further optimized by introducing a feedback exploiting the ISI interference structure. The resulting scheme is an NKF detector based on a likelihood ratio test (LRT. Monte-Carlo simulations have shown that the NKF and the NKF based on LRT detectors significantly improve the efficiency and the performance of the classical Kalman algorithm.

  5. The use of CDS/ISIS software in Africa | Abboy | Innovation

    African Journals Online (AJOL)

    CDS/ISIS is free-of-charge software that has been developed by UNESCO and is distributed through a network of country distributors and more recently through the World Wide Web. CDS/ISIS is ideally suited for the manipulation of bibliographic data. Literature sources reveal that the use of CDS/ISIS is widespread in Africa ...

  6. Noise and Synchronization Analysis of the Cold-Receptor Neuronal Network Model

    Directory of Open Access Journals (Sweden)

    Ying Du

    2014-01-01

    Full Text Available This paper analyzes the dynamics of the cold receptor neural network model. First, it examines noise effects on neuronal stimulus in the model. From ISI plots, it is shown that there are considerable differences between purely deterministic simulations and noisy ones. The ISI-distance is used to measure the noise effects on spike trains quantitatively. It is found that spike trains observed in neural models can be more strongly affected by noise for different temperatures in some aspects; meanwhile, spike train has greater variability with the noise intensity increasing. The synchronization of neuronal network with different connectivity patterns is also studied. It is shown that chaotic and high period patterns are more difficult to get complete synchronization than the situation in single spike and low period patterns. The neuronal network will exhibit various patterns of firing synchronization by varying some key parameters such as the coupling strength. Different types of firing synchronization are diagnosed by a correlation coefficient and the ISI-distance method. The simulations show that the synchronization status of neurons is related to the network connectivity patterns.

  7. Annual report ISIS

    International Nuclear Information System (INIS)

    Biggin, S.

    1988-07-01

    The paper presents the 1988 Annual Report for ISIS (United Kingdom). A description is given of the accelerator and target station. The capability of ISIS is described including the facilities available and the type of science carried out using the instruments. The development and support activities are outlined, along with the ISIS organisation and user interaction. The appendix contains experimental reports on research work conducted at ISIS. (U.K.)

  8. Spike trains in Hodgkin-Huxley model and ISIs of acupuncture manipulations

    International Nuclear Information System (INIS)

    Wang Jiang; Si Wenjie; Che Yanqiu; Fei Xiangyang

    2008-01-01

    The Hodgkin-Huxley equations (HH) are parameterized by a number of parameters and shows a variety of qualitatively different behaviors depending on the parameter values. Under stimulation of an external periodic voltage, the ISIs (interspike intervals) of a HH model are investigated in this work, while the frequency of the voltage is taken as the controlling parameter. As well-known, the science of acupuncture and moxibustion is an important component of Traditional Chinese Medicine with a long history. Although there are a number of different acupuncture manipulations, the method for distinguishing them is rarely investigated. With the idea of ISI, we study the electrical signal time series at the spinal dorsal horn produced by three different acupuncture manipulations in Zusanli point and present an effective way to distinguish them

  9. Spike trains in Hodgkin-Huxley model and ISIs of acupuncture manipulations

    Energy Technology Data Exchange (ETDEWEB)

    Wang Jiang [School of Electrical and Automation Engineering, Tianjin University, Tianjin 300072 (China)], E-mail: jiangwang@tju.edu.cn; Si Wenjie; Che Yanqiu; Fei Xiangyang [School of Electrical and Automation Engineering, Tianjin University, Tianjin 300072 (China)

    2008-05-15

    The Hodgkin-Huxley equations (HH) are parameterized by a number of parameters and shows a variety of qualitatively different behaviors depending on the parameter values. Under stimulation of an external periodic voltage, the ISIs (interspike intervals) of a HH model are investigated in this work, while the frequency of the voltage is taken as the controlling parameter. As well-known, the science of acupuncture and moxibustion is an important component of Traditional Chinese Medicine with a long history. Although there are a number of different acupuncture manipulations, the method for distinguishing them is rarely investigated. With the idea of ISI, we study the electrical signal time series at the spinal dorsal horn produced by three different acupuncture manipulations in Zusanli point and present an effective way to distinguish them.

  10. From ISIS to CouchDB: Databases and Data Models for Bibliographic Records

    Directory of Open Access Journals (Sweden)

    Luciano Ramalho

    2011-04-01

    Full Text Available For decades bibliographic data has been stored in non-relational databases, and thousands of libraries in developing countries still use ISIS databases to run their OPACs. Fast forward to 2010 and the NoSQL movement has shown that non-relational databases are good enough for Google, Amazon.com and Facebook. Meanwhile, several Open Source NoSQL systems have appeared. This paper discusses the data model of one class of NoSQL products, semistructured, document-oriented databases exemplified by Apache CouchDB and MongoDB, and why they are well-suited to collective cataloging applications. Also shown are the methods, tools, and scripts used to convert, from ISIS to CouchDB, bibliographic records of LILACS, a key Latin American and Caribbean health sciences index operated by the Pan-American Health Organization.

  11. Topside Ionogram Scaler With True Height Algorithm (TOPIST): Automated processing of ISIS topside ionograms

    Science.gov (United States)

    Bilitza, Dieter; Huang, Xueqin; Reinisch, Bodo W.; Benson, Robert F.; Hills, H. Kent; Schar, William B.

    2004-02-01

    The United States/Canadian ISIS-1 and ISIS-2 satellites collected several million topside ionograms in the 1960s and 1970s with a multinational network of ground stations that provided good global coverage. However, processing of these ionograms into electron density profiles required time-consuming manual scaling of the traces from the analog ionograms, and as a result, only a few percent of the ionograms had been processed into electron density profiles. In recent years an effort began to digitize the analog recordings to prepare the ionograms for computerized analysis. As of November 2002, approximately 390,000 ISIS-1 and ISIS-2 digital topside-sounder ionograms have been produced. The Topside Ionogram Scaler With True Height Algorithm (TOPIST) program was developed for the automated scaling of the echo traces and for the inversion of these traces into topside electron density profiles. The program is based on the techniques that have been successfully applied in the analysis of ground-based Digisonde ionograms. The TOPIST software also includes an "editing option" for manual scaling of the more difficult ionograms, which could not be scaled during the automated TOPIST run. TOPIST is now successfully scaling ˜60% of the ISIS ionograms, and the electron density profiles are available through the online archive of the National Space Science Data Center at ftp://nssdcftp.gsfc.nasa.gov/spacecraft_data/isis/topside_sounder. This data restoration effort is producing a unique global database of topside electron densities over more than one solar cycle, which will be of particular importance for improvements of topside ionosphere models, especially the International Reference Ionosphere.

  12. Inside ISIS II

    CERN Multimedia

    1981-01-01

    ISIS stands for Identification of Secondaries by Ionization Sampling. It was a drift chamber with an active volume of about 40 m3 built by Oxford University as a particle identifier for the European Hybrid Spectrometer (EHS). The photo shows the electrostatic grading structure and the central anode-wire plane, with Roger Giles standing just under it (Annual Report 1981 p. 57, Fig. 4). ISIS-II differed from the prototype ISIS-I only in the depth of the track (4 m instead of 1 m) thus extending the momentum range for particle identification to 50 GeV/c. See Nucl. Instr. and Meth. 224 (1984) 396, and Nucl. Instr. and Meth. 258 (1987) 26.

  13. United States Counterterrorism on ISIS

    Directory of Open Access Journals (Sweden)

    ANTON MYNARDY

    2016-05-01

    Full Text Available The U.S. counter terrorism on ISIS had implemented with various strategies including degrading ISIS’s capability, shaping global coalition to defeat ISIS, and using trained military armed men for Iraq army forces, Kurdi army, Arabian army, and moderate opposition groups to fight against Bassar. In early 2015, U.S. government described the group as “losing this fight” and reported that anti- ISIS operations had killed more than 8,500 fighters, destroyed hundreds of vehicles and heavy weapons systems, and significantly degraded IS command and control capabilities. Unfortunately, ISIS still exists with their weapons. Moreover, the fear against ISIS and the worst conditions it brings are not exclusive in Syria, Iraq and Libya as the conflict has already spread to many countries in Europe. These countries are in dilemma because despite being affected by the conflict, still they intend to give asylum to the refugees, but their concern is that with refugees coming in, there might be exporting of ISIS’s ideologies which leads to bigger and more serious concerns than the possibility of economic instability. Inevitably, there have been questions regarding the existence of ISIS today: How can groups such as ISIS still exists despite being attacked for 3 years by the U.S? The reality is that the U.S. initiated the establishment of new and democratic governments in Afghanistan, Iraq, and Libya few years ago bothers some experts on the continuing existence of ISIS.

  14. Full Service ISDN Satellite (FSIS) network model for advanced ISDN satellite design and experiments

    Science.gov (United States)

    Pepin, Gerard R.

    1992-01-01

    The Full Service Integrated Services Digital Network (FSIS) network model for advanced satellite designs describes a model suitable for discrete event simulations. A top down model design uses the Advanced Communications Technology Satellite (ACTS) as its basis. The ACTS and the Interim Service ISDN Satellite (ISIS) perform ISDN protocol analyses and switching decisions in the terrestrial domain, whereas FSIS makes all its analyses and decisions on-board the ISDN satellite.

  15. Computer modelling of eddy current probes for ISI of pressure tube/calandria tube assemblies in PHWRs

    International Nuclear Information System (INIS)

    Rao, B.P.C.; Shyamsunder, M.T.; Bhattacharya, D.K.; Raj, Baldev

    1992-01-01

    Non-destructive Evaluation (NDE) plays a major role in ensuring the safe and reliable operation of PHWRs which are the mainstay of India's nuclear power programme. An important in-service inspection (ISI) requirement in these reactors is carried out through Eddy Current Testing (ECT) of the pressure tube (PT)/calandria tube (CT) assemblies. The material of construction of these assemblies is zircaloy-2. The two main objectives of this ISI are the detection of garter spring between CT and PT and the profiling of gap between CT and PT. The paper discusses the work carried out at the authors' laboratory on the development of ECT probes for ISI of PT/CT assemblies. Emphasis has been given on the work done on the design and optimisation of the probes using computer modeling. A 2-D finite element code has been developed for this purpose. The code is developed around a diffusion equation which can be derived from Maxwell's equations governing the electromagnetic phenomenon. An axisymmetry has been considered, since the probes are bobbin type. Results of impedance plane outputs obtained by modelling and those by experiments using actual probes have shown good matching. Salient features of an indigenously developed interactive PC based data acquisition, analysis and retrieval system to cater to ISI of PC/CT assemblies are described. (author). 10 refs., 7 figs

  16. ISIS annual report

    International Nuclear Information System (INIS)

    Biggin, Sue

    1986-07-01

    The paper is the first 1985/6 report of the ISIS experimental facility for neutron scattering studies, which commenced operations June 1985, at the Rutherford Laboratory, United Kingdom. The report is divided into eight chapters, including: 1) accelerator, target station and moderators, 2) instruments and related science, 3) techniques, 4) future developments, 5) condensed matter theory research, 6) ISIS organisation and user interaction, 7) publications, and 8) experimental reports. (UK)

  17. The effect on design of ISI

    International Nuclear Information System (INIS)

    Hart, J.D.

    The evolution of in-service inspection techniques from the Magnox reactors through the AGR constructions is described. The following aspects are mentioned: general principles; factors that have influenced the development of ISI; objectives of ISI; examples drawn from AGR experience; major design changes to accommodate ISI; PWR reactors; occupational safety. (U.K.)

  18. BEATING ISIS IN THE DIGITAL SPACE: FOCUS TESTING ISIS DEFECTOR COUNTER-NARRATIVE VIDEOS WITH AMERICAN COLLEGE STUDENTS

    Directory of Open Access Journals (Sweden)

    Allision McDowell-Smith

    2017-03-01

    Full Text Available ISIS recruits on a 24/7 basis in over 21 languages over the Internet using videos, memes, tweets and other social media postings and swarming in on anyone that retweets, likes or endorses their materials to try to seduce them into the group. Their unprecedented social media drive has resulted in over 30,000 foreign fighters from more than 100 countries migrating to Syria and Iraq. ISIS recruitment in the U.S. is for the most part Internet based and has resulted in the actual and attempted recruitment of over 100 individuals residing in the U.S. with over 200 Americans traveling to Syria to join terrorist groups. To date very little counter-narrative material exists and most of it is cognitive versus emotionally impactful. The International Center for the Study of Violent Extremism (ICSVE Breaking the ISIS Brand – the ISIS Defectors Interviews Project has managed to collect 43 ISIS defector interviews and thus far produce two video clips of ISIS defectors denouncing the group which were focus tested in this research in a small normative college student sample of 75 undergraduate students. The results demonstrate that American college students find the videos authentic, disturbing and turn them away from ISIS, fulfilling the goals that the project is aiming for in producing counter-narrative materials.

  19. Can Counter-Gang Models be Applied to Counter ISIS’s Internet Recruitment Campaign

    Science.gov (United States)

    2016-06-10

    limitation that exists is the lack of reliable statistics from social media companies in regards to the quantity of ISIS-affiliated sites, which exist on... statistics , they have approximately 320-million monthly active users with thirty-five-plus languages supported and 77 percent of accounts located...Justice and Delinquency Prevention program. For deterrence-based models, the primary point of research is focused deterrence models with emphasis placed

  20. Future data acquisition at ISIS

    International Nuclear Information System (INIS)

    Pulford, W.C.A.; Quinton, S.P.H.; Johnson, M.W.; Norris, J.

    1989-01-01

    Data collection techniques at ISIS are fast reaching the point where the current computer systems will no longer be able to migrate the data to long-term storage, let alone enable their analysis at a speed compatible with continuous use of the ISIS instruments. The current data acquisition electronics (DAE 1) and migration path work effectively but have a number of inherent difficulties: (1) Seven instruments are equipped with VAX computers as their Front End Minicomputers (FEM). Unfortunately these machines usually possess insufficient processor power to perform some of the more complex data reduction. This means that the raw data have necessarily to be networked to the HUB computer before analysis. (2) The size of bulk store memory is restricted to 16 Mbytes by the 24 bit address field of Multibus. (3) The DAE error detection and analysis system of FEM is crude. It is clear that the most effective method to improve on this situation is to reduce the data volume flowing between the DAE and the FEM and to provide facilities to monitor data acquisition within the DAE. For these purposes processing power must be incorporated closer to the point of data collection. It has been decided to implement processing elements within DAE 2 (the next generation of DAE) in the form of intelligent memory boards. 6 figs., 1 tab

  1. Status report on ISIS

    International Nuclear Information System (INIS)

    Rees, G.H.

    1987-01-01

    The recent performance of the ISIS spallation neutron source is described and possible developments for the future are outlined. Aims for the near future are to raise the energy and intensity of the 50 Hz proton synchrotron to the design specification. Longer term aims are being evaluated by an International ISIS Project Group and an International Science Advisory Group. The hope is to develop the project in an international context to an improved specification

  2. RUTHERFORD APPLETON: ISIS nice

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1986-07-15

    The ISIS pulsed spallation neutron source continues to make good progress. In March the machine reached its highest intensity when 5 x 10{sup 12} protons per pulse at 550 MeV and 50 pulses per second were delivered to the neutron production target. This 40 microamperes of mean proton current is 20% of the design performance and confirms once again the potential of ISIS as a powerful accelerator- based pulsed neutron source.

  3. Flaw distributions and use of ISI data in RPV integrity evaluations

    International Nuclear Information System (INIS)

    Dimitrijevic, V.; Ammirato, F.

    1993-01-01

    A probabilistic method for developing post-inspection flaw distributions has been developed that explicitly accounts for the capability of the inspection procedure to detect and size flaws. This methodology has been used to develop flaw distributions for calculating reactor vessel failure probability under postulated pressurized thermal shock (PTS) conditions. Realistic flaw distributions are important because plant-specific PTS safety assessments are very sensitive to assumptions made about major flaw parameters such as density, size, shape, and location. PTS analysis made in the past do not consider ISI. Two main reasons are (1) lack of a general and approved methodology which provides directions for involvement of ISI results in developing new flaw parameters and (2) lack of confidence in the capability of ISI procedures to detect critical flaws that may be present near the clad-to-base metal interface of the vessel, the location of most concern for PTS conditions. Recent developments in ISI practice, however, have led to substantial improvement in ISI capability and provide a basis for using ISI data to develop plant-specific post-inspection flaw distributions for vessel integrity evaluations. The key components of this evaluation are (1) the generic (preinspection) flaw distribution, (2) a probabilistic flaw detection model, and (3) Bayesian updating of the prior flaw distribution with the detection model to develop a post-inspection flaw distribution. Destructive analysis of RPV weld material was performed to develop data to support the pre-inspection flaw distributions. Since the probability of detection (POD) plays such an important role in the analysis and a high POD is needed to make significant reductions in probability of failure, a procedure was developed to achieve and demonstrate POD greater than 0.9 by using a combination of independent inspection techniques

  4. Implementation of an ISIS Compatible Stereo Processing Chain for 3D Stereo Reconstruction

    Science.gov (United States)

    Tasdelen, E.; Unbekannt, H.; Willner, K.; Oberst, J.

    2012-09-01

    The department for Planetary Geodesy at TU Berlin is developing routines for photogrammetric processing of planetary image data to derive 3D representations of planetary surfaces. The ISIS software, developed by USGS, Flagstaff, is readily available, open source, and very well documented. Hence, ISIS [1] was chosen as a prime processing platform and tool kit. However, ISIS does not provide a full photogrammetric stereo processing chain. Several components like image matching, bundle block adjustment (until recently) or digital terrain model (DTM) interpolation from 3D object points are missing. Our group aims to complete this photogrammetric stereo processing chain by implementing the missing components, taking advantage of already existing ISIS classes and functionality. With this abstract we would like to report on the development of a new image matching software that is optimized for both orbital and closeranged planetary images and compatible with ISIS formats and routines and an interpolation tool that is developed to create DTMs from large 3-D point clouds.

  5. Validation process of ISIS CFD software for fire simulation

    International Nuclear Information System (INIS)

    Lapuerta, C.; Suard, S.; Babik, F.; Rigollet, L.

    2012-01-01

    Fire propagation constitutes a major safety concern in nuclear facilities. In this context, IRSN is developing a CFD code, named ISIS, dedicated to fire simulations. This software is based on a coherent set of models that can be used to describe a fire in large, mechanically ventilated compartments. The system of balance equations obtained by combining these models is discretized in time using fractional step methods, including a pressure correction technique for solving hydrodynamic equations. Discretization in space combines two techniques, each proven in the relevant context: mixed finite elements for hydrodynamic equations and finite volumes for transport equations. ISIS is currently in an advanced stage of verification and validation. The results obtained for a full-scale fire test performed at IRSN are presented.

  6. Introducing advanced ISI requirements at Paks NPP for supporting the LTO

    International Nuclear Information System (INIS)

    Trampus, P.; Ratkai, S.

    2012-01-01

    The four VVER-440 model 213 units in operation at Paks NPP, Hungary, are facing to approach their licensed term of operation, which is 30 years. To extend the safe operation of the units beyond the original licensed term by additional 20 years belongs to the highest priorities of the owners/operator of MVM Paks NPP. According to the nuclear legislation, a formal license renewal application for the extended period has to be submitted to the Hungarian Atomic Energy Authority. A significant feature of the license renewal process is the demonstration of the effectiveness of the currently applied ageing management program. ISI is an essential part of the ageing management program thus the adequate ISI techniques and the tailor made requirements have to be incorporated in it. To cope with the expectations originating from the LTO at Paks NPP, it was decided to replace the original Soviet based ISI system by the widely applied ASME BPVC Section XI requirements. Additionally, in 2011 a new nuclear regulation was issued in Hungary, in which the ISI requirements have also been changed. This paper intends to present the entire structure of the new Hungarian regulation related to the ISI but mainly focusing on the deviation to the ASME Section XI with the perspective of the licence renewal. (author)

  7. Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter

    Science.gov (United States)

    Joseph, Kenneth; Carley, Kathleen M.

    2017-01-01

    The Islamic State of Iraq and ash-Sham (ISIS) continues to use social media as an essential element of its campaign to motivate support. On Twitter, ISIS’ unique ability to leverage unaffiliated sympathizers that simply retweet propaganda has been identified as a primary mechanism in their success in motivating both recruitment and “lone wolf” attacks. The present work explores a large community of Twitter users whose activity supports ISIS propaganda diffusion in varying degrees. Within this ISIS supporting community, we observe a diverse range of actor types, including fighters, propagandists, recruiters, religious scholars, and unaffiliated sympathizers. The interaction between these users offers unique insight into the people and narratives critical to ISIS’ sustainment. In their entirety, we refer to this diverse set of users as an online extremist community or OEC. We present Iterative Vertex Clustering and Classification (IVCC), a scalable analytic approach for OEC detection in annotated heterogeneous networks, and provide an illustrative case study of an online community of over 22,000 Twitter users whose online behavior directly advocates support for ISIS or contibutes to the group’s propaganda dissemination through retweets. PMID:29194446

  8. Modelling and observation of transionospheric propagation results from ISIS II in preparation for ePOP

    Directory of Open Access Journals (Sweden)

    R. G. Gillies

    2007-02-01

    Full Text Available The enhanced Polar Outflow Probe (ePOP is scheduled to be launched as part of the Cascade Demonstrator Small-Sat and Ionospheric Polar Explorer (CASSIOPE satellite in early 2008. A Radio Receiver Instrument (RRI on ePOP will receive HF transmissions from various ground-based transmitters. In preparation for the ePOP mission, data from a similar transionospheric experiment performed by the International Satellites for Ionospheric Studies (ISIS II satellite has been studied. Prominent features in the received 9.303-MHz signal were periodic Faraday fading of signal intensity at rates up to 13 Hz and a time of arrival delay between the O- and X-modes of up to 0.8 ms. Both features occurred when the satellite was above or south of the Ottawa transmitter. Ionospheric models for ray tracing were constructed using both International Reference Ionosphere (IRI profiles and local peak electron density values from ISIS ionograms. Values for fade rate and differential mode delay were computed and compared to the values observed in the ISIS II data. The computed values showed very good agreement to the observed values of both received signal parameters when the topside sounding foF2 values were used to scale IRI profiles, but not when strictly modelled IRI profiles were used. It was determined that the primary modifier of the received signal parameters was the foF2 density and not the shape of the profile. This dependence was due to refraction, at the 9.303-MHz signal frequency, causing the rays to travel larger distances near the peak density where essentially all the mode splitting occurred. This study should assist in interpretation of ePOP RRI data when they are available.

  9. Education and Training on ISIS Research Reactor

    International Nuclear Information System (INIS)

    Foulon, F.; Badeau, G.; Lescop, B.; Wohleber, X.

    2013-01-01

    In the frame of academic and vocational programs the National Institute for Nuclear Science and Technology uses the ISIS research reactor as a major tool to ensure a practical and comprehensive understanding of the nuclear reactor physics, principles and operation. A large set of training courses have been developed on ISIS, optimising both the content of the courses and the pedagogical approach. Programs with duration ranging from 3 hours (introduction to reactor operation) to 24 hours (full program for the future operators of research reactors) are carried out on ISIS reactor. The reactor is operated about 350 hours/year for education and training, about 40 % of the courses being carried out in English. Thus, every year about 400 trainees attend training courses on ISIS reactor. We present here the ISIS research reactor and the practical courses that have been developed on ISIS reactor. Emphasis is given to the pedagogical method which is used to focus on the operational and safety aspects, both in normal and incidental operation. We will present the curricula of the academic and vocational courses in which the practical courses are integrated, the courses being targeted to a wide public, including operators of research reactors, engineers involved in the design and operation of nuclear reactors as well as staff of the regulatory body. We address the very positive impact of the courses on the development of the competences and skills of participants. Finally, we describe the Internet Reactor Laboratories (IRL) that are under development and will consist in broadcasting the training courses via internet to remote facilities or institutions

  10. Education and Training on ISIS Research Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Foulon, F.; Badeau, G.; Lescop, B.; Wohleber, X. [French Atomic Energy and Alternative Energies Commission, Paris (France)

    2013-07-01

    In the frame of academic and vocational programs the National Institute for Nuclear Science and Technology uses the ISIS research reactor as a major tool to ensure a practical and comprehensive understanding of the nuclear reactor physics, principles and operation. A large set of training courses have been developed on ISIS, optimising both the content of the courses and the pedagogical approach. Programs with duration ranging from 3 hours (introduction to reactor operation) to 24 hours (full program for the future operators of research reactors) are carried out on ISIS reactor. The reactor is operated about 350 hours/year for education and training, about 40 % of the courses being carried out in English. Thus, every year about 400 trainees attend training courses on ISIS reactor. We present here the ISIS research reactor and the practical courses that have been developed on ISIS reactor. Emphasis is given to the pedagogical method which is used to focus on the operational and safety aspects, both in normal and incidental operation. We will present the curricula of the academic and vocational courses in which the practical courses are integrated, the courses being targeted to a wide public, including operators of research reactors, engineers involved in the design and operation of nuclear reactors as well as staff of the regulatory body. We address the very positive impact of the courses on the development of the competences and skills of participants. Finally, we describe the Internet Reactor Laboratories (IRL) that are under development and will consist in broadcasting the training courses via internet to remote facilities or institutions.

  11. Building a comprehensive mill-level database for the Industrial Sectors Integrated Solutions (ISIS) model of the U.S. pulp and paper sector.

    Science.gov (United States)

    Modak, Nabanita; Spence, Kelley; Sood, Saloni; Rosati, Jacky Ann

    2015-01-01

    Air emissions from the U.S. pulp and paper sector have been federally regulated since 1978; however, regulations are periodically reviewed and revised to improve efficiency and effectiveness of existing emission standards. The Industrial Sectors Integrated Solutions (ISIS) model for the pulp and paper sector is currently under development at the U.S. Environmental Protection Agency (EPA), and can be utilized to facilitate multi-pollutant, sector-based analyses that are performed in conjunction with regulatory development. The model utilizes a multi-sector, multi-product dynamic linear modeling framework that evaluates the economic impact of emission reduction strategies for multiple air pollutants. The ISIS model considers facility-level economic, environmental, and technical parameters, as well as sector-level market data, to estimate the impacts of environmental regulations on the pulp and paper industry. Specifically, the model can be used to estimate U.S. and global market impacts of new or more stringent air regulations, such as impacts on product price, exports and imports, market demands, capital investment, and mill closures. One major challenge to developing a representative model is the need for an extensive amount of data. This article discusses the collection and processing of data for use in the model, as well as the methods used for building the ISIS pulp and paper database that facilitates the required analyses to support the air quality management of the pulp and paper sector.

  12. Bounds on the Capacity of ASK Molecular Communication Channels with ISI

    OpenAIRE

    Ghavami, Siavash; Adve, Raviraj; Lahouti, Farshad

    2015-01-01

    There are now several works on the use of the additive inverse Gaussian noise (AIGN) model for the random transit time in molecular communication~(MC) channels. The randomness invariably causes inter-symbol interference (ISI) in MC, an issue largely ignored or simplified. In this paper we derive an upper bound and two lower bounds for MC based on amplitude shift keying (ASK) in presence of ISI. The Blahut-Arimoto algorithm~(BAA) is modified to find the input distribution of transmitted symbol...

  13. An intense transmission spectrometer for ISIS

    International Nuclear Information System (INIS)

    Newport, R.J.; Howells, W.S.

    1986-07-01

    The report seeks to outline a design for an intense transmission spectrometer (ITS) suitable for installation on the pulsed neutron source ISIS. The performance of the instrument is evaluated and several examples of the areas of science made accessible are discussed. It is shown that the proposed design will represent a scientifically valuable and cost-effective addition to the present suite of ISIS instruments. (author)

  14. Conceptional design and some application for ISI systems of 'Monju'

    International Nuclear Information System (INIS)

    Nakamura, Takashi; Rindo, Hiroshi; Ara, Kuniaki; Kamimura, Takeo; Tsuzuki, Satoshi; Morimoto, Kazuo; Nagaoka, Etsuo; Ikeda, Naoaki.

    1987-01-01

    In order to fit the Monju system for inspection during use of the (prototype FBR) ''Monju'' plant, a system concept necessary for this plant has been established and part of the machinery has been tested, on the basis of ISI light water reactor and thermal plant technology. Electromagnetic acoustic testing equipment (EMAT), which is drawing attention for the volumetric examination without contact, and also a wall-to-wall four-wheel self-propelled vehicle, as an ISI tool for R/V of FBR, are both being developed. Contents are the following: basic concept and development of ISI system - reactor vessel proper and inlet piping ISI system, and concept of steam generator evaporator heat exchanger tube ISI system; development of ISI systems - experimental self-propelled four-wheel tool, and EMAT signal processing unit. (Mori, K.)

  15. Intersections of two isiZulu genderlects and the construction of ...

    African Journals Online (AJOL)

    Kate H

    The isiNgqumo lexicon is characterised largely by what Zulu speakers ... isiNgqumo offers a sense of community and an opportunity to escape public .... isiNgqumo use seems more prevalent in lower socioeconomic “gay” circles and semi-.

  16. ISI PUBLICATIONS MANAGEMENT THROUGH PERFORMANCE INDICATORS

    Directory of Open Access Journals (Sweden)

    Victor VELTER

    2010-09-01

    Full Text Available The paper proposes to describe the ways in which the research management and administration department from a certain institution can interfere with specific policies in order to increase the visibility of scientific publications. Scientometric analysis is made on ISI publications of “Constantin Brancsi” University from Targu Jiu and wants to reveal performance indicators able to monitor the visibility of the papers indexed in ThomsonReuters ISI base.

  17. Building a Comprehensive Mill-Level Database for the Industrial Sectors Integrated Solutions (ISIS) Model of the U.S. Pulp and Paper Sector

    Science.gov (United States)

    Modak, Nabanita; Spence, Kelley; Sood, Saloni; Rosati, Jacky Ann

    2015-01-01

    Air emissions from the U.S. pulp and paper sector have been federally regulated since 1978; however, regulations are periodically reviewed and revised to improve efficiency and effectiveness of existing emission standards. The Industrial Sectors Integrated Solutions (ISIS) model for the pulp and paper sector is currently under development at the U.S. Environmental Protection Agency (EPA), and can be utilized to facilitate multi-pollutant, sector-based analyses that are performed in conjunction with regulatory development. The model utilizes a multi-sector, multi-product dynamic linear modeling framework that evaluates the economic impact of emission reduction strategies for multiple air pollutants. The ISIS model considers facility-level economic, environmental, and technical parameters, as well as sector-level market data, to estimate the impacts of environmental regulations on the pulp and paper industry. Specifically, the model can be used to estimate U.S. and global market impacts of new or more stringent air regulations, such as impacts on product price, exports and imports, market demands, capital investment, and mill closures. One major challenge to developing a representative model is the need for an extensive amount of data. This article discusses the collection and processing of data for use in the model, as well as the methods used for building the ISIS pulp and paper database that facilitates the required analyses to support the air quality management of the pulp and paper sector. PMID:25806516

  18. Channel Equalization Using Multilayer Perceptron Networks

    Directory of Open Access Journals (Sweden)

    Saba Baloch

    2012-07-01

    Full Text Available In most digital communication systems, bandwidth limited channel along with multipath propagation causes ISI (Inter Symbol Interference to occur. This phenomenon causes distortion of the given transmitted symbol due to other transmitted symbols. With the help of equalization ISI can be reduced. This paper presents a solution to the ISI problem by performing blind equalization using ANN (Artificial Neural Networks. The simulated network is a multilayer feedforward Perceptron ANN, which has been trained by utilizing the error back-propagation algorithm. The weights of the network are updated in accordance with training of the network. This paper presents a very effective method for blind channel equalization, being more efficient than the pre-existing algorithms. The obtained results show a visible reduction in the noise content.

  19. The ISI distribution of the stochastic Hodgkin-Huxley neuron.

    Science.gov (United States)

    Rowat, Peter F; Greenwood, Priscilla E

    2014-01-01

    The simulation of ion-channel noise has an important role in computational neuroscience. In recent years several approximate methods of carrying out this simulation have been published, based on stochastic differential equations, and all giving slightly different results. The obvious, and essential, question is: which method is the most accurate and which is most computationally efficient? Here we make a contribution to the answer. We compare interspike interval histograms from simulated data using four different approximate stochastic differential equation (SDE) models of the stochastic Hodgkin-Huxley neuron, as well as the exact Markov chain model simulated by the Gillespie algorithm. One of the recent SDE models is the same as the Kurtz approximation first published in 1978. All the models considered give similar ISI histograms over a wide range of deterministic and stochastic input. Three features of these histograms are an initial peak, followed by one or more bumps, and then an exponential tail. We explore how these features depend on deterministic input and on level of channel noise, and explain the results using the stochastic dynamics of the model. We conclude with a rough ranking of the four SDE models with respect to the similarity of their ISI histograms to the histogram of the exact Markov chain model.

  20. Evaluatie van ISIS-MML

    NARCIS (Netherlands)

    Benthem BHB van; EPI

    2007-01-01

    The Infectious Diseases Surveillance Information system that collects data of medical microbiology laboratories in the Netherlands (ISIS-MML) is not suitable for early warning of infectious diseases outbreaks. However, the system is appropriate for monitoring trends in antimicrobial resistance.

  1. Operation and Thermal Modeling of the ISIS H– Source from 50 to 2 Hz Repetition Rates

    CERN Document Server

    Pereira, H; Lettry, J

    2013-01-01

    CERN’s Linac4 accelerator H− ion source, currently under construction, will operate at a 2 Hz repetition rate, with pulse length of 0.5 ms and a beam current of 80 mA. Its reliability must exceed 99 % with a mandatory 3 month uninterrupted operation period. A Penning ion source is successfully operated at ISIS; at 50 Hz repetition rate it reliably provides 55 mA H− pulses of 0.25 ms duration over 1 month. The discharge plasma ignition is very sensitive to the temperatures of the discharge region, especially of its cathode. The investigation by modeling and measurement of operation parameters suitable for arc ignition and H− production at 2 Hz is of paramount importance and must be understood prior to the implementation of discharge ion sources in the Linac4 accelerator. In its original configuration, the ISIS H− source delivers beam only if the repetition rate is above 12.5 Hz, this paper describes the implementation of a temperature control of the discharge region aiming at lower repetition rate op...

  2. Replacement of the ISIS control system

    International Nuclear Information System (INIS)

    Mannix, R.P.; Barton, C.J.; Brownless, D.M.; Kerr, J.C.

    1992-01-01

    In operation since 1985, ISIS is the world's most powerful pulsed spallation neutron source. The decision has been taken to replace the existing ISIS control system, which has been in use for over ten years. The problems of such a project, given the legacy of processor specific hardware and software are discussed, a long with the problems associated with incorporating existing interface hardware into any new system. Present progress using commercial workstation based control software is presented with, an assessment of the benefits and pitfalls of such an approach. (author)

  3. The Isis project: Fault-tolerance in large distributed systems

    Science.gov (United States)

    Birman, Kenneth P.; Marzullo, Keith

    1993-01-01

    This final status report covers activities of the Isis project during the first half of 1992. During the report period, the Isis effort has achieved a major milestone in its effort to redesign and reimplement the Isis system using Mach and Chorus as target operating system environments. In addition, we completed a number of publications that address issues raised in our prior work; some of these have recently appeared in print, while others are now being considered for publication in a variety of journals and conferences.

  4. BEATING ISIS IN THE DIGITAL SPACE: FOCUS TESTING ISIS DEFECTOR COUNTER-NARRATIVE VIDEOS WITH AMERICAN COLLEGE STUDENTS

    OpenAIRE

    Allision McDowell-Smith; Anne Speckhard; Ahmet S. Yayla

    2017-01-01

    ISIS recruits on a 24/7 basis in over 21 languages over the Internet using videos, memes, tweets and other social media postings and swarming in on anyone that retweets, likes or endorses their materials to try to seduce them into the group. Their unprecedented social media drive has resulted in over 30,000 foreign fighters from more than 100 countries migrating to Syria and Iraq. ISIS recruitment in the U.S. is for the most part Internet based and has resulted in the actual and attempted r...

  5. IsiZulu as a vehicle towards teaching and conducting research in ...

    African Journals Online (AJOL)

    Results indicate that lecturers use isiZulu successfully for purposes of research and teaching, but there are some challenges which need to be considered. These challenges include isiZulu as language of instruction in some study programmes, and reporting research outputs through the use of an African language, isiZulu.

  6. KARMEN: neutrino spectroscopy at ISIS

    Energy Technology Data Exchange (ETDEWEB)

    Drexlin, G [Forschungszentrum Karlsruhe GmbH Technik und Umwelt (Germany). Inst. fuer Kernphysik

    1996-11-01

    The Karlsruhe-Rutherford Neutrino Experiment KARMEN at the spallation neutron facility ISIS investigates fundamental properties of neutrinos as well as their interactions with matter. Low energy neutrinos with energies up to 50 MeV emitted by the pulsed {nu}-source ISIS are detected by a 56 tonne high resolution liquid scintillation calorimeter. Clear {nu}-signatures allow a reliable search for neutrino oscillations of the type {nu}{sub {mu}}{yields}{nu}{sub e} and {nu}{sub {mu}}{yields}{nu}{sub e} as well as a detailed investigation of neutrino-nucleus interactions in an energy range important for astrophysics. We present the results of the KARMEN experiment from data taking in the period from June 1990 - December 1995. (author) 9 figs., 10 refs.

  7. Isis, la Gran Maga

    Directory of Open Access Journals (Sweden)

    Hipólito Pecci Tenrero

    2002-01-01

    Full Text Available La diosa Isis es una de las divinidades más importantes de Egipto, al extenderse por el Mediterráneo continúa manteniendo esta significación. En el texto siguiente se intenta tratar de una forma sucinta como se ha producido esta expansión, la rapidez en conseguir adeptos fuera de Egipto y la influencia no solo dentro de la sociedad, sino también dentro de la política, así como su desaparición final.The goddess Isis is one of the most important divinities of Egypt, on having spread over the Mediterranean she continúes supporting this significance. In the next text one is tried to treat as a succinct form since this expansión, the rapidity has taken place in followers obtained out of Egypt and the influence not only inside the society, but also inside the politics, asweil as his final disappearance.

  8. Journal maps on the basis of Scopus data: a comparison with the Journal Citation Reports of the ISI

    NARCIS (Netherlands)

    Leydesdorff, L.; de Moya-Anegon, F.; Guerrero-Bote, V.P.

    2010-01-01

    Using the Scopus dataset (1996-2007) a grand matrix of aggregated journal-journal citations was constructed. This matrix can be compared in terms of the network structures with the matrix contained in the Journal Citation Reports (JCR) of the Institute of Scientific Information (ISI). Because the

  9. Automated Processing of ISIS Topside Ionograms into Electron Density Profiles

    Science.gov (United States)

    Reinisch, bodo W.; Huang, Xueqin; Bilitza, Dieter; Hills, H. Kent

    2004-01-01

    Modeling of the topside ionosphere has for the most part relied on just a few years of data from topside sounder satellites. The widely used Bent et al. (1972) model, for example, is based on only 50,000 Alouette 1 profiles. The International Reference Ionosphere (IRI) (Bilitza, 1990, 2001) uses an analytical description of the graphs and tables provided by Bent et al. (1972). The Alouette 1, 2 and ISIS 1, 2 topside sounder satellites of the sixties and seventies were ahead of their times in terms of the sheer volume of data obtained and in terms of the computer and software requirements for data analysis. As a result, only a small percentage of the collected topside ionograms was converted into electron density profiles. Recently, a NASA-funded data restoration project has undertaken and is continuing the process of digitizing the Alouette/ISIS ionograms from the analog 7-track tapes. Our project involves the automated processing of these digital ionograms into electron density profiles. The project accomplished a set of important goals that will have a major impact on understanding and modeling of the topside ionosphere: (1) The TOPside Ionogram Scaling and True height inversion (TOPIST) software was developed for the automated scaling and inversion of topside ionograms. (2) The TOPIST software was applied to the over 300,000 ISIS-2 topside ionograms that had been digitized in the fkamework of a separate AISRP project (PI: R.F. Benson). (3) The new TOPIST-produced database of global electron density profiles for the topside ionosphere were made publicly available through NASA s National Space Science Data Center (NSSDC) ftp archive at . (4) Earlier Alouette 1,2 and ISIS 1, 2 data sets of electron density profiles from manual scaling of selected sets of ionograms were converted fiom a highly-compressed binary format into a user-friendly ASCII format and made publicly available through nssdcftp.gsfc.nasa.gov. The new database for the topside ionosphere established

  10. Epithermal neutron instrumentation at ISIS

    International Nuclear Information System (INIS)

    Gorini, G; Festa, G; Andreani, C

    2014-01-01

    The advent of pulsed neutron sources makes available high epithermal neutron fluxes (in the energy range between 500 meV and 100 eV). New dedicated instrumentation, such as Resonance Detectors, was developed at ISIS spallation neutron source in the last years to apply the specific properties of this kind of neutron beam to the study of condensed matter. New detection strategies like Filter Difference method and Foil Cycling Technique were also developed in parallel to the detector improvement at the VESUVIO beamline. Recently, epithermal neutron beams were also used at the INES beamline to study elemental and isotopic composition of materials, with special application to cultural heritage studies. In this paper we review a series of epithermal neutron instrumentation developed at ISIS, their evolution over time and main results obtained

  11. The ISIS Open GENIE user manual

    International Nuclear Information System (INIS)

    Akeroyd, F.A.; Ashworth, R.L.; Campbell, S.I.; Johnston, S.D.; Martin, J.M.; Moreton-Smith, C.M.; Sivia, D.S.

    2000-01-01

    This manual should enable you to become familiar with Open GENIE quickly and easily. It therefore complements the Open GENIE Reference Manual which should be used to understand the full meaning of Open GENIE commands. The reference manual is accessible on the ISIS web server at: http://www.isis.rl.ac.uk/GENIEReferenceManual/ and the user manual is planned to be accessible by January '98 at http://www.isis.rl.ac.ukIGENIEUserManual/. The Open GENIE User Manual is separated into two parts: Part A. The User Manual. An introduction to the use of Open GENIE. Part B. The Installation Guide. General information on how to install and run Open GENIE. Assuming that you are new to Open GENIE and have just downloaded a copy you will need to consult the Installation Guide to get Open GENIE installed on your machine. After this we recommend you experiment with some of the example files to get an idea of the capabilities of Open GENIE. For further information, comments, additions of routines that you feel should be included, please contact us at genie at isise.rl.ac.uk

  12. ISIS status report

    International Nuclear Information System (INIS)

    Finney, J.L.; Gray, D.A.

    1989-01-01

    The authors review the progress on ISIS, the pulsed neutron source at the Rutherford-Appleton Laboratory, since the last ICANS meeting. The machine is now running regularly at 100 μA at 750 MeV, and delivering neutrons for an increasing UK and international neutron scattering program. The current status of the operating and development instruments is summarized, and some examples given of recent science. 3 refs., 11 figs., 3 tabs

  13. Defeating ISIS by Winning the War of Ideas

    Science.gov (United States)

    2017-03-17

    Partial Fulfillment of the Graduation Requirements Advisor: Lt Col Brande Walton Maxwell Air Force Base, Alabama 17 March 2017 DISTRIBUTION A...with their lives due to economic or emotional struggle could fall victim to ISIS messaging. ISIS messaging is sophisticated, attracting several...slavery, denying women’s rights, rape, torture, and jihadi groups are all forbidden.53 Though many Muslims have been branded as “radical extremists

  14. Framework for applying RI-ISI methodology for Indian PHWRs

    International Nuclear Information System (INIS)

    Vinod, Gopika; Saraf, R.K.; Ghosh, A.K.; Kushwaha, H.S.

    2006-01-01

    Risk Informed In-Service Inspection (RI-ISI) aims at categorizing the components for In-Service inspection based on their contribution to Risk. For defining the contribution of risk from components, their failure probabilities and its subsequent effect on Core Damage Frequency (CDF) needs to be evaluated using Probabilistic Safety Assessment methodology. During the last several years, both the U.S. Nuclear Regulatory Commission (NRC) and the nuclear industry have recognized that Probabilistic Safety Assessment (PSA) has evolved to be more useful in supplementing traditional engineering approaches in reactor regulation. The paper highlights the various stages involved in applying RI-ISI and then compares the findings with existing ISI practices. (author)

  15. Adaptive Detection and ISI Mitigation for Mobile Molecular Communication.

    Science.gov (United States)

    Chang, Ge; Lin, Lin; Yan, Hao

    2018-03-01

    Current studies on modulation and detection schemes in molecular communication mainly focus on the scenarios with static transmitters and receivers. However, mobile molecular communication is needed in many envisioned applications, such as target tracking and drug delivery. Until now, investigations about mobile molecular communication have been limited. In this paper, a static transmitter and a mobile bacterium-based receiver performing random walk are considered. In this mobile scenario, the channel impulse response changes due to the dynamic change of the distance between the transmitter and the receiver. Detection schemes based on fixed distance fail in signal detection in such a scenario. Furthermore, the intersymbol interference (ISI) effect becomes more complex due to the dynamic character of the signal which makes the estimation and mitigation of the ISI even more difficult. In this paper, an adaptive ISI mitigation method and two adaptive detection schemes are proposed for this mobile scenario. In the proposed scheme, adaptive ISI mitigation, estimation of dynamic distance, and the corresponding impulse response reconstruction are performed in each symbol interval. Based on the dynamic channel impulse response in each interval, two adaptive detection schemes, concentration-based adaptive threshold detection and peak-time-based adaptive detection, are proposed for signal detection. Simulations demonstrate that the ISI effect is significantly reduced and the adaptive detection schemes are reliable and robust for mobile molecular communication.

  16. Business Models for NFC based mobile payments

    OpenAIRE

    Johannes Sang Un Chae; Jonas Hedman

    2015-01-01

    Purpose: The purpose of the paper is to develop a business model framework for NFC based mobile payment solutions consisting of four mutually interdepended components: the value service, value network, value architecture, and value finance. Design: Using a comparative case study method, the paper investigates Google Wallet and ISIS Mobile Wallet and their underlying business models. Findings: Google Wallet and ISIS Mobile Wallet are focusing on providing an enhanced customer experienc...

  17. The status of ISI in the UK nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Bann, T.; Rogerson, A. [AEA Technology, Risley (United Kingdom). Nuclear NDE Services

    1999-08-01

    This paper reviews the status of in-service inspection (ISI) in UK nuclear power generation industry through the experience of its nuclear utilities. The paper is intended to be a summary of some of the most recent and relevant ISI issues facing the utilities and the solutions devised to address those issues. (orig.)

  18. The Lemmatization of Loan Words in the isiNdebele–English ...

    African Journals Online (AJOL)

    user

    English Dictionary and the selection of words for lemmatization are ... The IsiNdebele–English Dictionary is a bilingual, bi-directional dictionary, which is divided ... In the above examples, lemmas are in isiNdebele and English and each lemma.

  19. Overall aspects of control of ISIS-type nuclear reactor

    International Nuclear Information System (INIS)

    Amato, S.; Santinelli, A.

    1996-01-01

    The paper describes the main aspects related to the definition of main controls required to operate an ISIS-type nuclear power reactors. ISIS is a PWR-type intrinsically safe nuclear reactor designed by ANSALDO, based on density lock concept; it presents, between the other safety functions, self-depressurization and core cooling capability for unlimited time. Due to its specific characteristics, the ISIS reactor required to development of new control philosophy (if compared with actual nuclear power reactor) with the implementation of new control functions, for instance the density locks hot/cold interface locations control. This paper describes the main control functions implemented, their rationale, as well as the dynamic simulation performed to verify the adequacy of controls definitions. The dynamic simulations here described refers to a step-wise power ramp of 100-90-100 (% of nominal power) and to a power ramp of 100-50-100 with a slope of 5%/min; the results obtained have shown the ISIS capability to perform such operational transients, despite its innovative design was mainly focused on intrinsically safe behaviour. (author)

  20. Interim Service ISDN Satellite (ISIS) hardware experiment development for advanced ISDN satellite designs and experiments

    Science.gov (United States)

    Pepin, Gerard R.

    1992-01-01

    The Interim Service Integrated Service Digital Network (ISDN) Satellite (ISIS) Hardware Experiment Development for Advanced Satellite Designs describes the development of the ISDN Satellite Terminal Adapter (ISTA) capable of translating ISDN protocol traffic into Time Division Multiple Access (TDMA) signals for use by a communications satellite. The ISTA connects the Type 1 Network Termination (NT1) via the U-interface on the line termination side of the CPE to the RS-499 interface for satellite uplink. The same ISTA converts in the opposite direction the RS-499 to U-interface data with a simple switch setting.

  1. Interim Service ISDN Satellite (ISIS) hardware experiment design for advanced ISDN satellite design and experiments

    Science.gov (United States)

    Pepin, Gerard R.

    1992-01-01

    The Interim Service Integrated Services Digital Network (ISDN) Satellite (ISIS) Hardware Experiment Design for Advanced Satellite Designs describes the design of the ISDN Satellite Terminal Adapter (ISTA) capable of translating ISDN protocol traffic into time division multiple access (TDMA) signals for use by a communications satellite. The ISTA connects the Type 1 Network Termination (NT1) via the U-interface on the line termination side of the CPE to the V.35 interface for satellite uplink. The same ISTA converts in the opposite direction the V.35 to U-interface data with a simple switch setting.

  2. A molecular dynamics simulation code ISIS

    International Nuclear Information System (INIS)

    Kambayashi, Shaw

    1992-06-01

    Computer simulation based on the molecular dynamics (MD) method has become an important tool complementary to experiments and theoretical calculations in a wide range of scientific fields such as physics, chemistry, biology, and so on. In the MD method, the Newtonian equations-of-motion of classical particles are integrated numerically to reproduce a phase-space trajectory of the system. In the 1980's, several new techniques have been developed for simulation at constant-temperature and/or constant-pressure in convenient to compare result of computer simulation with experimental results. We first summarize the MD method for both microcanonical and canonical simulations. Then, we present and overview of a newly developed ISIS (Isokinetic Simulation of Soft-spheres) code and its performance on various computers including vector processors. The ISIS code has a capability to make a MD simulation under constant-temperature condition by using the isokinetic constraint method. The equations-of-motion is integrated by a very accurate fifth-order finite differential algorithm. The bookkeeping method is also utilized to reduce the computational time. Furthermore, the ISIS code is well adopted for vector processing: Speedup ratio ranged from 16 to 24 times is obtained on a VP2600/10 vector processor. (author)

  3. Student responses to being taught physics in isiZulu

    Directory of Open Access Journals (Sweden)

    Naven Chetty

    2013-09-01

    Full Text Available The University of KwaZulu-Natal is in the process of formulating a language policy to introduce teaching and learning in isiZulu as well as in English to improve throughput and increase the number of graduates. The aim of this study was to determine if this policy is feasible within the discipline of physics. Critical engagement with students and a literature search allowed the determination of the potential gains and pitfalls of such a language introduction. The study also provides some useful insight into student contexts, schooling history and their perceptions of being taught in their vernacular. The inconsistent use of isiZulu words to translate basic physics words will require the development of a common vocabulary for teaching physics in isiZulu.

  4. Intersections of two isiZulu genderlects and the construction of 'skesana' identities

    Directory of Open Access Journals (Sweden)

    Thabo Msibi

    2015-09-01

    Full Text Available Drawing on Youdell’s (2000, 2005, 2006 work on identity formation, we examine in this article multiple performances of gender identities in relation to a particular language use among African men who engage in same-sex relations. Based on semi-ethnographic research and in-depth interviews with African men who are isiNgqumo speakers in the Durban metropolitan area in KwaZulu-Natal, this article portrays the intersectional nature of two genderlects. The isiNgqumo lexicon is characterised largely by what Zulu speakers refer to as “deep” lexicon, and a closer examination reveals that a substantial number of lexical items are drawn from the isiHlonipho variety of Zulu, also termed “isiHlonipho Sabafazi” (‘women’s language of respect’. Hlonipha (lit. ‘respect’ social actions and language use are representative of showing submissiveness towards males and other people who are considered superiors. On the basis of the experiences of men who engage in same-sex relations and who self-identify as skesana, we argue that an isiNgqumo variety that draws from the isiHlonipho lexicon represents a linguistic variety that is linked to a heteronormative and patriarchal cultural system which renders femininity an inferior subject position. Within this gendered order, certain linguistic expressions of isiNgqumo can create tension-riddled identity categories and allow for complex positioning for skesanas, many of whom draw on heteronormative and heteropoleric categories in the construction of their sexual and gender identities.

  5. Domitian between Isis and Minerva

    DEFF Research Database (Denmark)

    Clausen, Kristine Bülow

    2013-01-01

    This paper is concerned with the sculptural decoration of the Flavian sanctuary of Isis at Beneventum. It challenges the traditional “Egyptian” appearance of the sanctuary and suggests that “Graeco-Roman” elements, too, played a role in its sculptural decoration. Based on the analysis of a small...

  6. Development of Intelligent Database Program for PSI/ISI Data Management of Nuclear Power Plant

    International Nuclear Information System (INIS)

    Park, Un Su; Park, Ik Keun; Um, Byong Guk; Park, Yun Won; Kang, Suk Chul

    1998-01-01

    For an effective and efficient management of large amounts of preservice/inservice inspection(PSI/ISI) data in nuclear power plants, an intelligent Windows 95-based data management program was developed. This program enables the prompt extraction of previously conducted PSI/ISI conditions and results so that the time-consuming data management, painstaking data processing and analysis in the past are avoided. The program extracts, and the associated remedies. Furthermore, additional inspection data and comments can be easily added or deleted for subsequent PSI/ISI operation. Although the initial version of the program was applied to Kori nuclear power plant, this program can be equally applied to other nuclear power plant. And also this program can be used to offer the fundamental data for application of evaluation data related to fracture mechanics analysis(FMA), probabilistic reliability assessment(PRA) of PSI/ISI results, performance demonstration initiative(PDI) and risk-informed ISI based on probability of detection(POD) information of ultrasonic examination. Besides, the program can be further developed as a unique PSI/ISI data management expert system that can be apart of PSI/ISI data management expert system that can be a part of PSI/ISI Total Support System(TSS) for Korean nuclear power plants

  7. Semi-automatic Term Extraction for an isiZulu Linguistic Terms ...

    African Journals Online (AJOL)

    user

    This paper advances the use of frequency analysis and the keyword analysis as strategies to extract terms for the compilation of the dictionary of isiZulu linguistic terms. The study uses the isiZulu. National Corpus (INC) of about 1,2 million tokens as a reference corpus as well as an LSP corpus of about 100,000 tokens as a ...

  8. Remote handling for an ISIS target change

    International Nuclear Information System (INIS)

    Broome, T.A.; Holding, M.

    1989-01-01

    During 1987 two ISIS targets were changed. This document describes the main features of the remote handling aspects of the work. All the work has to be carried out using remote handling techniques. The radiation level measured on the surface of the reflector when the second target had been removed was about 800 mGy/h demonstrating that hands on operations on any part of the target reflector moderator assembly is not practical. The target changes were the first large scale operations in the Target Station Remote Handling Cell and a great deal was learned about both equipment and working practices. Some general principles emerged which are applicable to other active handling tasks on facilities like ISIS and these are discussed below. 8 figs

  9. Flaw distribution development from vessel ISI data

    International Nuclear Information System (INIS)

    Foulds, J.R.; Kennedy, E.L.; Basin, S.L.; Rosinski, S.T.

    1991-01-01

    Previous attempts to develop flaw distributions for use in the structural integrity evaluation of pressurized water reactor (PWR) vessels have aimed at the estimation of a ''generic'' distribution applicable to all vessels. In contrast, this paper describes the analysis of vessel-specific in-service inspection (ISI) data for the development of a flaw distribution reliably representative of the condition of the particular vessel inspected. The application of the methodology may be extended to other vessels, but has been primarily developed for PWR reactor vessels. For this study, the flaw data analyzed included data obtained from three recently performed PWR vessel ISIs and from laboratory inspection of selected weldment sections of the Midland reactor vessel. The variability in both the character of the reviewed data (size range of flaws, number of flaws) and the UT (ultrasonic test) inspection system performance identified a need for analyzing the inspection results on a vessel-, or data set-specific basis. For this purpose, traditional histogram-based methods were inadequate, and a new methodology that can accept a very small number of flaws (typical of vessel-specific ISI results) and that includes consideration of inspection system flaw detection reliability, flaw sizing accuracy and flaw detection threshold, was developed. Results of the application of the methodology to each of the four PWR reactor vessel cases studied are presented and discussed

  10. The PRISMA spectrometer at ISIS

    International Nuclear Information System (INIS)

    Steigenberger, U.; Hagen, M.

    1990-01-01

    PRISMA stands for PRogetto dell'Istituto di Struttura dell MAteria del CNR. Under an international collaborative agreement signed in 1985 between SERC, the Science and Engineering Research Council, and the Consiglio Nazionale delle Ricerche (CNR), Italy, PRISMA was designed and manufactured by the ISM Laboratory of the CNR at Frascati for installation at ISIS, for use in inelastic neutron scattering experiments. (author)

  11. Future data acquisition at ISIS

    International Nuclear Information System (INIS)

    Pulford, W.C.A.; Quinton, S.P.H.; Johnson, M.W.; Norris, J.

    1989-01-01

    Over the past year ISIS beam intensity has increased steadily to 100 microamps during periods of good running. With the instrument users finding it comparatively easy to set up data-collection runs, we are facing an ever increasing volume of incoming data. Greatly improved detector technology, mainly involving large areas of zinc sulfide phosphor, are expected to contribute much to the capacity of new diffractometers as well as provide an enhancement path for many of the existing ones. It is clear that we are fast reaching the point where if we continue to use our current technology data collection techniques, our computer systems will no longer be able to migrate the data to long-term storage, let alone enable their analysis at a speed compatible with continuous use of the ISIS instruments. The most effect method to improve this situation is to reduce the volume of data flowing between the data acquisition electronics and the front end minicomputers, and to provide facilities to monitor data acquisition within the data acquisition electronics. Processing power must be incorporated closer to the point of data collection. Ways of doing this are discussed and evaluated. (author)

  12. Development of Intelligent Database Program for PSI/ISI Data Management of Nuclear Power Plant (Part II)

    International Nuclear Information System (INIS)

    Park, Un Su; Park, Ik Keun; Um, Byong Guk; Lee, Jong Po; Han, Chi Hyun

    2000-01-01

    In a previous paper, we have discussed the intelligent Windows 95-based data management program(IDPIN) which was developed for effective and efficient management of large amounts of pre-/in-service inspection(PSI/ISI) data of Kori nuclear power plants. The IDPIN program enables the prompt extraction of previously conducted PSI/ISI conditions and results so that the time-consuming data management, painstaking data processing and analysis of the past are avoided. In this study, the intelligent Windows based data management program(WS-IDPIN) has been developed as an effective data management of PSI/ISI data for the Wolsong nuclear power plants. The WS-IDPIN program includes the modules of comprehensive management and analysis of PSI/ISI results, statistical reliability assessment program of PSI/ISI results(depth and length sizing performance etc), standardization of UT report form and computerization of UT results. In addition, the program can be further developed as a unique PSI/ISI data management expert system which can be part of the PSI/ISI total support system for Korean nuclear power plants

  13. Characterization of γ-ray background at IMAT beamline of ISIS Spallation Neutron Source

    Science.gov (United States)

    Festa, G.; Andreani, C.; Arcidiacono, L.; Burca, G.; Kockelmann, W.; Minniti, T.; Senesi, R.

    2017-08-01

    The environmental γ -ray background on the IMAT beamline at ISIS Spallation Neutron Source, Target Station 2, is characterized via γ spectroscopy. The measurements include gamma exposure at the imaging detector position, along with the gamma background inside the beamline. Present results are discussed and compared with previous measurements recorded at INES and VESUVIO beamlines operating at Target Station 1. They provide new outcome for expanding and optimizing the PGAA experimental capability at the ISIS neutron source for the investigation of materials, engineering components and cultural heritage objects at the ISIS neutron source.

  14. Characterization of γ-ray background at IMAT beamline of ISIS Spallation Neutron Source

    International Nuclear Information System (INIS)

    Festa, G.; Andreani, C.; Arcidiacono, L.; Senesi, R.; Burca, G.; Kockelmann, W.; Minniti, T.

    2017-01-01

    The environmental γ -ray background on the IMAT beamline at ISIS Spallation Neutron Source, Target Station 2, is characterized via γ  spectroscopy. The measurements include gamma exposure at the imaging detector position, along with the gamma background inside the beamline. Present results are discussed and compared with previous measurements recorded at INES and VESUVIO beamlines operating at Target Station 1. They provide new outcome for expanding and optimizing the PGAA experimental capability at the ISIS neutron source for the investigation of materials, engineering components and cultural heritage objects at the ISIS neutron source.

  15. Uji Kualitas Air Minum Isi Ulang di Kecamatan Sukodono, Sidoarjo Ditinjau Dari Perilaku dan Pemeliharaan Alat

    Directory of Open Access Journals (Sweden)

    Yoga Ardy Pradana

    2013-09-01

    Full Text Available Seiring dengan kemajuan teknologi sekarang ini dan diiringi dengan semakin sibuknya aktivitas manusia maka masyarakat cenderung memilih cara yang lebih praktis dengan biaya relatif murah dalam memenuhi kebutuhan air minum yaitu dengan menggunakan air minum isi ulang  terutama di kecamatan Sukodono, Sidoarjo. Agar air minum isi ulang yang dikonsumsi oleh masyarakat di kecamatan Sukodono, Sidoarjo aman untuk dikonsumsi, maka perlu dilakukan uji kualitas apakah kandungan dalam air minum isi ulang sudah memenuhi Peraturan Menteri Kesehatan No 492/MENKES/PER/IV/2010 tantang persyaratan kualitas air minum. Parameter yang diuji meliputi Total Coliform, TDS, Kekeruhan dan Warna. Kualitas air minum isi ulang ditunjang oleh cara pemeliharaan peralatan produksi. Prosedur pemeliharaan alat dari masing-masing depo air minum isi ulang diperoleh melalui wawancara dan penggunaan kuesioner. Hasil uji laboratorium dari 8 depo air minum isi ulang ada yang belum memenuhi parameter Total Koliform sebanyak 5 depo. Berdasarkan hasil kuesioner 5 depo tersebut termasuk dalam kategori cukup, yang berarti masih kurang dalam melakukan pemeliharaan alat.

  16. IAEA Safeguards Information System (ISIS)

    International Nuclear Information System (INIS)

    1984-10-01

    Publication of this technical document should serve for better understanding of the technical and functional features of the IAEA Safeguards Information System (ISIS) within the Agency, as well as in the National Systems of accounting for and control of nuclear material. It will also serve as a foundation for further development and improvement of the design and modifications of the Safeguards Information System and its services as a function of Safeguards implementation

  17. Retorika Barack Hussein Obama Dan Susilo Bambang Yudhoyono Dalam Menanggapi Isu Isis Di Dunia

    Directory of Open Access Journals (Sweden)

    Livia

    2015-07-01

    Full Text Available This research discuss about the rhetoric performed by Barack Hussein Obama as President of the United States and Susilo Bambang Yudhoyono as President of the Republic of Indonesia in delivering feedback over the ISIS issue that circulating around the world. ISIS is an organization who commit acts of terrorism in the name of Islam. The United States is known as ‘anti-Islam’ country’s, while Indonesia has the largest Muslim population in the world. Therefore, author used Roland Barthes semiotic to reveal differences in this two figures seen from their rhetoric of verbal and non-verbal language. Thus, we can reveal how this two figures performed their rhetoric over the ISIS issue that conveyed to the international community. Penelitian ini membahas mengenai retorika yang dilakukan oleh Barack Hussein Obama selaku Presiden Amerika Serikat dan Susilo Bambang Yudhoyono selaku Presiden Republik Indonesia dalam memberikan tanggapan mengenai isu ISIS yang beredar di dunia. ISIS merupakan sebuah organisasi yang melakukan tindakan terorisme dengan mengatasnamakan Islam. Amerika Serikat merupakan negara yang dikenal sebagai negara ‘anti Islam’, sedangkan Indonesia merupakan negara dengan penduduk muslim terbanyak di dunia. Oleh karena itu, penulis menggunakan semiotik Roland Barthes untuk mengungkapkan perbedaan retorika kedua tokoh dilihat dari bahasa verbal dan non verbalnya. Dengan demikian, dapat terlihat seperti apa retorika yang dilakukan oleh kedua tokoh yang ingin disampaikan kepada masyarakat internasional terkait isu ISIS.

  18. Evaluation of robot performance: placement of rings with handles at ISIS

    International Nuclear Information System (INIS)

    Lefaure, C.; Seror, V.; Lochard, J.

    1989-07-01

    The first task performed by CEPN in the field of evaluating the robotics was to identify principal parameters to be taken into account for estimating the cost and the efficiency of such action. After this work, EDF-UTO demanded CEPN to develop a methodology for evaluating economic and dosimetry impacts of introducing robots or remote handling in operation and maintenance of PWR-900 and PWR-1300 plants. These operations are mostly originating from failures causing exposure of personnel. Objective of the first study presented in this report is to evaluate the value of replacing classic annual procedure of fixing the primary tubes of PWR steam generators by robot. Estimated value of collective dose was obtained by PANTHERE-RP and SEPTEN codes for dose calculation and DOSI-ANA for taking into account the duration of operation. It has been found that application of ISIS handle enable to reduce the collective dose approximately by a factor of 4 (5.2 H.rem for automated operation, compared to 23.5 H.rem for manual option) although the amount of work is increased by a factor of 3, meaning the work in the zone where exposure is significant (160 hours for automatized option compared to 59 hours of manual operation). Application od ISIS enable to decrease almost completely the exposure related to the phase of installing the support rings (0.3 H.rem with ISIS compared to 20 for the manual option). On the contrary, installation of ISIS cause additional collective exposure of 3 H.rem. This lead to a conclusion that application of ISIS can be justified if avoided doses are equal or more than 3 H.rem [fr

  19. ISIS Child Soldiers in Syria: The Structural and Predatory Recruitment, Enlistment, Pre-Training Indoctrination, Training, and Deployment

    OpenAIRE

    Asaad Almohammad

    2018-01-01

    Research on the engagement of children with the so-called Islamic State (a.k.a. ISIS) relies heavily on the analysis of obtained ISIS documents and ISIS-disseminated propaganda, leaving major elements of the recruitment and deployment process uncovered. Such ambiguities hinder future efforts aimed at dealing with ISIS’ child soldiers. As such, an intensive effort to compile data using interviews and naturalistic observations across ISIS-held territories in Syria was made to exhaustively explo...

  20. ISIS annual report for the financial year 1 April 1991 to 31 March 1992. V. 2

    International Nuclear Information System (INIS)

    Wilson, C.

    1992-07-01

    This, Volume 11 of the 1992 Annual Report of ISIS the neutron scattering facility at Rutherford Appleton Laboratory contains the Experimental Reports on those experiments carried out on ISIS in the year ending 31 March 1992. Included are Experimental Reports from work performed on 14 ISIS instruments (13 neutron and one muon beam), and the number and quality of these reports reflects very well upon the standard of experiments performed at the Facility. The continuing increase in productivity of ISIS, which has extended through the initial development stage of the source, demonstrates that much new science continues to be done at ISIS, and that with the development and provision of new instruments, the scientific output of the Facility will continue to show strong growth. These Experimental Reports are intended as interim summaries of the measurements made during an ISIS experiment and as such may not contain the final conclusions of the analysis. They do, however, give a general flavour of the range and type of science performed on each instrument. (author)

  1. Upgrades to the ISIS moderator configuration

    International Nuclear Information System (INIS)

    Taylor, A.D.

    1989-01-01

    The current ISIS moderator configuration, was designed in 1980 to provide a flexible set of beams for a hypothetical instrument suite. The use of fluid moderators at three different temperatures offering six faces to the instruments, has proved to be effective. In this paper we discuss an upgrade of these moderators in the light of the current and projected instrument configuration. (author)

  2. ISIS Training Reactor: A Reactor Dedicated to Education and Training for Students and Professionals

    International Nuclear Information System (INIS)

    Foulon, F.

    2014-01-01

    Conclusion: • INSTN strategy: complete theoretical courses by practical courses on the ISIS research reactor. • Training courses integrated both in Academic degree programs and continuing education. • 27 hours of training courses have been developed focusing on the practical and safety aspects of reactor operation. • The Education and Training activity became the main activity of ISIS reactor: 400 trainees/year; 360 hours/year; 40% in English. • Remote access to the Training courses: Internet Reactor Laboratory under development to be started from 2014 to broadcast training courses from ISIS reactor to guest institutions

  3. Magnetosphere VLF observation by satellite ISIS

    International Nuclear Information System (INIS)

    Ondo, Tadanori; Nakamura, Yoshikatsu; Watanabe, Shigeaki; Murakami, Toshimitsu

    1978-01-01

    On the basis of the VLF (50 Hz -- 30 kHz) electric field data from the satellite ISIS, the following works carried out in The Radio Research Laboratories are described: deuteron whistler and whistler duct, detection of plasmapause by LHR hiss, and the origin of 5 kHz hiss at low/middle latitudes. The deuteron whistlers are observable distinctly only at low latitude because of gyro-frequency and the frequency resolution of spectral analyzers. Whistler echo occurs when a whistler moves back and forth through a duct along the line of magnetic force, so it is considered that the ISIS satellite crosses the duct. The variation in ion composition around plasmapause obtained through LHR hiss is explainable by the plasamapause position and the magnetic storm effect on the plasamapause. Concerning the narrow band hiss of 5 kHz +- 1.0 kHz frequently observed on the ground at low/middle latitudes, it may occur around plasmapause, propagate through the ionosphere and then to the ground in waveguide mode, or otherwise, it may occur above the ionosphere and then propagate directly to the ground penetrating through the ionosphere. (J.P.N.)

  4. PK-ISIS: a new superconducting ECR ion source at Pantechnik

    International Nuclear Information System (INIS)

    Villari, A.C.; Bieth, C.; Bougy, W.; Brionne, N.; Donzel, X.; Gaubert, G.; Leroy, R.; Sineau, A.; Tasset, O.; Vallerand, C.; Thuillier, T.

    2012-01-01

    The new ECR ion source PK-ISIS was recently commissioned at Pantechnik. Three superconducting coils generate the axial magnetic field configuration while the radial magnetic field is done with multi-layer permanent magnets. Special care was devoted in the design of the hexapolar structure, allowing a maximum magnetic field of 1.32 T at the wall of the 82 mm diameter plasma chamber. The three superconducting coils using Low Temperature Superconducting wires are cooled by a single double stage cryo-cooler (4.2 K). Cryogen-free technology is used, providing reliability, easy maintenance at low cost. The maximum installed RF power (18.0 GHz) is of 2 kW. Metallic beams can be produced with an oven (T max = 1400 C) installed with an angle of 5 degrees with respect to the source axis or a sputtering system, mounted in the axis of the source. The beam extraction system is constituted of three electrodes in accel-decel configuration. The new source of Pantechnik is conceived for reaching optimum performances at 18 GHz RF frequencies. PK-ISIS delivers 5 to 10 times more beam intensity than the original PK-DELIS and/or shifting the charge state distribution to higher values. PK-ISIS is built with Low Temperature Superconducting wire technology (LTS), but keeps the He-free concept, extremely important for a reliable and easy operation. The radial field circuit is permanent magnet made. Finally, PK-ISIS is also conceived for using in a High-Voltage platform with minor power consumption. The paper is followed by the slides of the presentation. (A.C.)

  5. The ISIS pre-injector reconfiguration

    Energy Technology Data Exchange (ETDEWEB)

    Wood, T., E-mail: trevor.wood@stfc.ac.uk; Faircloth, D. C.; Lawrie, S. R.; Letchford, A. P.; Whitehead, M. O.; Pike, T.; Perkins, M. [ISIS Pulsed Spallation Neutron and Muon Facility, Science and Technology Facilities Council, Rutherford Appleton Laboratory, Harwell Oxford, Oxfordshire (United Kingdom)

    2016-02-15

    With the introduction of a new “low energy beams” group at ISIS, the decision was taken to expand the ion source area. This paper will explain what actions were taken, how this has improved the present working environment and how the space will be used to accommodate a medium energy beam transport (MEBT) section after the existing radio-frequency quadrupole. The MEBT will incorporate three 202.5 MHz re-bunching cavities and will achieve a transmission of 96% with minimal emittance growth.

  6. Translation and validation of a patient satisfaction survey: The isiXhosa version

    Directory of Open Access Journals (Sweden)

    Tania Steyl

    2013-08-01

    Full Text Available Background: Although the use of surveys has been supported for assessing understanding of health care service quality, it could also be argued that their main function is to quantify perceptions. The importance of assessing patient satisfaction in individuals’ own language has been highlighted in research. However, important culture-specific differences can be revealed during the adaptation process of a scale, and if not attended to can influence the validity ofthe scale. Objectives: The aim of this study was to assess the validity and reliability of the isiXhosa version of the Patient Survey for Quality of Care (PSQC in primary health care (PHC facilities in a selected district in the Western Cape, South Africa. Method: The PSQC was translated into isiXhosa by two independant translators and the translated back into English by a third translator. All three translators reviewed the back translation. Face and content validity of the scale were assessed. Fifteen isiXhosa-speaking clients with type 2 diabetes mellitus who had a mean age of 62.27 years (SD 10.33 and came from a randomly selected community health centre participated in the test-retest reliability. Results: Internal consistency of the scale was good (Cronbach alpha 0.70. Alpha values of individual items relating to quality of care as well as items flagged for inferior service quality were between 0.772 and 1.000, indicating good to high internal consistency. Conclusion: Results of this study indicated that the isiXhosa version of the PSQC was as reliable as the English version. It can be implemented at PHC level to assess isiXhosa-speaking patients’ satisfaction with health care services.

  7. Electron cloud observations at the ISIS Proton Synchrotron

    CERN Document Server

    Pertica, A.

    2013-04-22

    The build up of electron clouds inside a particle accelerator vacuum chamber can produce strong transverse and longitudinal beam instabilities which in turn can lead to high levels of beam loss often requiring the accelerator to be run below its design specification. To study the behaviour of electron clouds at the ISIS Proton Synchrotron, a Micro-Channel Plate (MCP) based electron cloud detector has been developed. The detector is based on the Retarding Field Analyser (RFA) design and consists of a retarding grid, which allows energy analysis of the electron signal, and a MCP assembly placed in front of the collector plate. The MCP assembly provides a current gain over the range 300 to 25K, thereby increasing the signal to noise ratio and dynamic range of the measurements. This paper presents the first electron cloud observations at the ISIS Proton Synchrotron. These results are compared against signals from a beam position monitor and a fast beam loss monitor installed at the same location.

  8. Intervention for bilingual speech sound disorders: A case study of an isiXhosa-English-speaking child.

    Science.gov (United States)

    Rossouw, Kate; Pascoe, Michelle

    2018-03-19

     Bilingualism is common in South Africa, with many children acquiring isiXhosa as a home language and learning English from a young age in nursery or crèche. IsiXhosa is a local language, part of the Bantu language family, widely spoken in the country. Aims: To describe changes in a bilingual child's speech following intervention based on a theoretically motivated and tailored intervention plan. Methods and procedures: This study describes a female isiXhosa-English bilingual child, named Gcobisa (pseudonym) (chronological age 4 years and 2 months) with a speech sound disorder. Gcobisa's speech was assessed and her difficulties categorised according to Dodd's (2005) diagnostic framework. From this, intervention was planned and the language of intervention was selected. Following intervention, Gcobisa's speech was reassessed. Outcomes and results: Gcobisa's speech was categorised as a consistent phonological delay as she presented with gliding of/l/in both English and isiXhosa, cluster reduction in English and several other age appropriate phonological processes. She was provided with 16 sessions of intervention using a minimal pairs approach, targeting the phonological process of gliding of/l/, which was not considered age appropriate for Gcobisa in isiXhosa when compared to the small set of normative data regarding monolingual isiXhosa development. As a result, the targets and stimuli were in isiXhosa while the main language of instruction was English. This reflects the language mismatch often faced by speech language therapists in South Africa. Gcobisa showed evidence of generalising the target phoneme to English words. Conclusions and implications: The data have theoretical implications regarding bilingual development of isiXhosa-English, as it highlights the ways bilingual development may differ from the monolingual development of this language pair. It adds to the small set of intervention studies investigating the changes in the speech of bilingual

  9. Intervention for bilingual speech sound disorders: A case study of an isiXhosa–English-speaking child

    Directory of Open Access Journals (Sweden)

    Kate Rossouw

    2018-03-01

    Full Text Available Background: Bilingualism is common in South Africa, with many children acquiring isiXhosa as a home language and learning English from a young age in nursery or crèche. IsiXhosa is a local language, part of the Bantu language family, widely spoken in the country.   Aims: To describe changes in a bilingual child’s speech following intervention based on a theoretically motivated and tailored intervention plan.   Methods and procedures: This study describes a female isiXhosa–English bilingual child, named Gcobisa (pseudonym (chronological age 4 years and 2 months with a speech sound disorder. Gcobisa’s speech was assessed and her difficulties categorised according to Dodd’s (2005 diagnostic framework. From this, intervention was planned and the language of intervention was selected. Following intervention, Gcobisa’s speech was reassessed.   Outcomes and results: Gcobisa’s speech was categorised as a consistent phonological delay as she presented with gliding of/l/in both English and isiXhosa, cluster reduction in English and several other age appropriate phonological processes. She was provided with 16 sessions of intervention using a minimal pairs approach, targeting the phonological process of gliding of/l/, which was not considered age appropriate for Gcobisa in isiXhosa when compared to the small set of normative data regarding monolingual isiXhosa development. As a result, the targets and stimuli were in isiXhosa while the main language of instruction was English. This reflects the language mismatch often faced by speech language therapists in South Africa. Gcobisa showed evidence of generalising the target phoneme to English words.   Conclusions and implications: The data have theoretical implications regarding bilingual development of isiXhosa–English, as it highlights the ways bilingual development may differ from the monolingual development of this language pair. It adds to the small set of intervention studies

  10. Consideration and recommendation on the performance qualification of ISI in China

    International Nuclear Information System (INIS)

    Wang Ruiping

    2004-01-01

    Though operation of domestic commercial nuclear power units has been ten years more, the reliability of in-service inspection (ISI), as an important means for operation safety, is a severe doubt problem. While rich experience has been gained from more than thirty year researches and investigations on the certification of performance of ISI, and those benefit back in foreign countries, the area in China is still a new. The operation safety issue pushes the considerations and actions. In the article the history of activities in the world, and some personal ideas and recommendations are presented. (author)

  11. Application of NDT and ISI to research reactor in the Czech Republic

    International Nuclear Information System (INIS)

    Peterka, F.

    2001-01-01

    Full text: The objectives of the proposed research project are: (a) to review the present status of ISI and NDT to VR-1 and LVR-15 research reactors. (b) to be involved in the development of the ISI programme for VR-1 and LVR-15 research reactors and medium and high power research reactors of WWER type. Dr. Peterka briefly described the activities on the VR-1 and LWR-15 reactors and presented an example of a procedure to apply liquid penetrant testing. (author)

  12. EDF'S ''OMF-structures'' RI-ISI process: overview of the methodology, applications and comparison with the other existing RI-ISI initiatives

    International Nuclear Information System (INIS)

    Codron, P.; Lauriot, B.; Dubreuil-Chambardel, A.

    2001-01-01

    The OMF-Structures process has been developed by EDF in order to optimise the maintenance of piping components. The principles of the OMF-Structures are consistent with the RCM concepts in EDF's OMF process (applied to active components). Several applications of this process have been performed. This paper also presents several applications which have been performed, notably on the AFW, RHR, and HPSI/LPSI systems of EDF's 900 MW PWR plants. These applications led to propose optimised preventive maintenance programs for these systems. These updated preventive maintenance programs confirmed and justified a large proportion of existing maintenance, despite some inspection tasks were suppressed and some inspection tasks were added. Globally, these new programs guarantee a better safety level, insuring that preventive maintenance is applied on piping segments where risks are concentrated. A comparative evaluation of the OMF-Structures process with the EPRI and WOG/ASME RI-ISI methodologies has been performed. This comparison demonstrated the consistence of the OMF-Structures principles and selection criteria with the other RI-ISI processes. (author)

  13. Add Deterrence to the Strategy Against ISIS

    Science.gov (United States)

    2017-03-31

    economic or social structures of a country or international organization.2 The U.S. 2015 National Military Strategy outlines an objective of...no way of determining their effectiveness. For example, the apparent random drone targeting of ISIS and Al Qaeda leadership from Pakistan to Yemen ...perception-shaping, cyber warfare, media operations, and legal investigative efforts to enhance legitimacy. A part of the strategy emphasizes publicly

  14. Java Image I/O for VICAR, PDS, and ISIS

    Science.gov (United States)

    Deen, Robert G.; Levoe, Steven R.

    2011-01-01

    This library, written in Java, supports input and output of images and metadata (labels) in the VICAR, PDS image, and ISIS-2 and ISIS-3 file formats. Three levels of access exist. The first level comprises the low-level, direct access to the file. This allows an application to read and write specific image tiles, lines, or pixels and to manipulate the label data directly. This layer is analogous to the C-language "VICAR Run-Time Library" (RTL), which is the image I/O library for the (C/C++/Fortran) VICAR image processing system from JPL MIPL (Multimission Image Processing Lab). This low-level library can also be used to read and write labeled, uncompressed images stored in formats similar to VICAR, such as ISIS-2 and -3, and a subset of PDS (image format). The second level of access involves two codecs based on Java Advanced Imaging (JAI) to provide access to VICAR and PDS images in a file-format-independent manner. JAI is supplied by Sun Microsystems as an extension to desktop Java, and has a number of codecs for formats such as GIF, TIFF, JPEG, etc. Although Sun has deprecated the codec mechanism (replaced by IIO), it is still used in many places. The VICAR and PDS codecs allow any program written using the JAI codec spec to use VICAR or PDS images automatically, with no specific knowledge of the VICAR or PDS formats. Support for metadata (labels) is included, but is format-dependent. The PDS codec, when processing PDS images with an embedded VIAR label ("dual-labeled images," such as used for MER), presents the VICAR label in a new way that is compatible with the VICAR codec. The third level of access involves VICAR, PDS, and ISIS Image I/O plugins. The Java core includes an "Image I/O" (IIO) package that is similar in concept to the JAI codec, but is newer and more capable. Applications written to the IIO specification can use any image format for which a plug-in exists, with no specific knowledge of the format itself.

  15. Business Models for NFC based mobile payments

    Directory of Open Access Journals (Sweden)

    Johannes Sang Un Chae

    2015-01-01

    Full Text Available Purpose: The purpose of the paper is to develop a business model framework for NFC based mobile payment solutions consisting of four mutually interdepended components: the value service, value network, value architecture, and value finance. Design: Using a comparative case study method, the paper investigates Google Wallet and ISIS Mobile Wallet and their underlying business models. Findings: Google Wallet and ISIS Mobile Wallet are focusing on providing an enhanced customer experience with their mobile wallet through a multifaceted value proposition. The delivery of its offering requires cooperation from multiple stakeholders and the creation of an ecosystem. Furthermore, they focus on the scalability of their value propositions. Originality / value: The paper offers an applicable business model framework that allows practitioners and academics to study current and future mobile payment approaches.

  16. Business Models for NFC Based Mobile Payments

    DEFF Research Database (Denmark)

    Chae, Johannes Sang-Un; Hedman, Jonas

    2015-01-01

    Purpose: The purpose of the paper is to develop a business model framework for NFC based mobile payment solutions consisting of four mutually interdepended components: the value service, value network, value architecture, and value finance. Design: Using a comparative case study method, the paper...... investigates Google Wallet and ISIS Mobile Wallet and their underlying business models. Findings: Google Wallet and ISIS Mobile Wallet are focusing on providing an enhanced customer experience with their mobile wallet through a multifaceted value proposition. The delivery of its offering requires cooperation...... from multiple stakeholders and the creation of an ecosystem. Furthermore, they focus on the scalability of their value propositions. Originality / value: The paper offers an applicable business model framework that allows practitioners and academics to study current and future mobile payment approaches....

  17. ISIS muons for materials and molecular science studies

    International Nuclear Information System (INIS)

    King, Philip J C; Cottrell, Stephen P; Hillier, Adrian D; Cox, Stephen F J; De Renzi, Roberto

    2013-01-01

    This paper marks the first 25 years of muon production at ISIS and the creation in that time of a facility dedicated to the use of these elementary particles as unique microscopic probes in condensed matter and molecular science. It introduces the basic techniques of muon spin rotation, relaxation and resonance, collectively known as μSR, that were already in use by specialist groups at other accelerator labs by the mid-1980s. It describes how these techniques have been implemented and made available at ISIS, beginning in 1987, and how they have evolved and improved since then. Ever widening applications embrace magnetism, superconductivity, interstitial diffusion and charge transport, semiconductors and dielectrics, chemical physics and radical chemistry. Over these first 25 years, a fully supported user facility has been established, open to all academic and industrial users. It presently comprises four scheduled instruments, optimized for different types of measurement, together with auxiliary equipment for radiofrequency or microwave spin manipulation and future plans for pump–probe laser excitation. (comment)

  18. Perilaku Masyarakat Kabupaten Belitung Terhadap Layanan Isi Ulang Pulsa Telepon Seluler Elektronik

    Directory of Open Access Journals (Sweden)

    Kasmad Ariansyah

    2012-12-01

    Full Text Available Telepon seluler prabayar merupakan telepon seluler yang pembayaran pulsanya dilakukan diawal dengan membeli voucher pulsa dengan nominal tertentu. Pada awalnya pulsa telepon seluler prabayar hanya dijual dalam bentuk kartu berbahan kertas dengan kode-kode tertentu diatasnya.  Sekarang kita sudah menemui layanan isi ulang pulsa secara elektronik. Penggunaan voucher telepon berbentuk fisik yang berbahan kertas, tidak sejalan dengan program pemerintah yang sedang menggalakkan paperless. Terlebih Jumlah pelanggan seluler di Indonesia yang demikian besar, pada awal 2012 ATSI mencatat  sekitar 240 juta orang Indonesia menggunakan layanan seluler dan sebagian besarnya adalah pelanggan prabayar. Penelitian ini bertujuan mendapatkan gambaran perilaku dan konstruk-konstruk yang mempengaruhi masyarakat Kabupaten Belitung terhadap layanan isi ulang pulsa telepon seluler secara elektronik dan diharapkan dapat menjadi salah satu masukan bagi penyusunan strategi meningkatkan adopsi layanan isi ulang secara elektronik. Temuan dari penelitian ini adalah konstruk perceived of usefullness dan personal innovativeness secara positif dan signifikan mempengaruhi minat berperilaku dalam menggunakan voucher elektronik pada masyarakat di Kabupaten Belitung. Sedangkan dua konstruk lainnya yaitu social influence dan perceived cost pengaruhnya tidak signifikan.

  19. Adoption of ASME Code Section XI for ISI to Research Reactors

    International Nuclear Information System (INIS)

    Tawfik, Y.E.; El-sesy, I.A.; Shaban, H.I.; Ibrahim, M.M.

    2002-01-01

    ETRR-2 (Second Egyptian thermal research reactor) is a multi-purpose, pool- type reactor with an open water surface and variable core arrangement. The core power is 22 MWth, cooled and moderated by light water and with beryllium reflectors. It contains plate- type fuel elements (MTR type, 19.7% enriched uranium) with aluminum clad. The ETRR-2 reactor consist of 57 systems and around 200 subsystems. These systems contain many mechanical components such as tanks, pipes, valves, pumps, heat exchangers, cooling tower, air compressors, and supports. In this present work, a trial was made to adopt the general requirements of ASME code, section XI to ETRR-2 research reactor. ASME (American Society of Mechanical Engineers) boiler and pressure vessel Code, section XI, provides requirements for in-service inspection (ISI) and in-service testing (IST) of components and systems, and repair/replacement activities in a nuclear power plant. Also, IAEA (International Atomic Energy Authority) has published some recommendations for ISI for research reactors similar to that rules and requirements specified in ASME. The complete ISI program requires several steps that have to be performed in sequence. These steps are described in many logic flow charts (LFC's). These logic flow charts include; the general LFC's for all steps required to complete ISI program, the LFC's for examination requirements, the LFC's for flaw evaluation modules, and the LFC's for acceptability of welds for class 1 components. This program includes, also, the inspection program for welded parts of the reactor components during its lifetime. This inspection program is applied for each system and subsystem of ETRR-2 reactor. It includes the examination area type, the component type, the part to be examined, the weld type, the examination method, the inspection program schedule, and the detailed figures of the welded components. (authors)

  20. Improving the Automatic Inversion of Digital ISIS-2 Ionogram Reflection Traces into Topside Vertical Electron-Density Profiles

    Science.gov (United States)

    Benson, R. F.; Truhlik, V.; Huang, X.; Wang, Y.; Bilitza, D.

    2011-01-01

    The topside-sounders on the four satellites of the International Satellites for Ionospheric Studies (ISIS) program were designed as analog systems. The resulting ionograms were displayed on 35-mm film for analysis by visual inspection. Each of these satellites, launched between 1962 and 1971, produced data for 10 to 20 years. A number of the original telemetry tapes from this large data set have been converted directly into digital records. Software, known as the TOPside Ionogram Scalar with True-height (TOPIST) algorithm has been produced that enables the automatic inversion of ISIS-2 ionogram reflection traces into topside vertical electron-density profiles Ne(h). More than million digital Alouette/ISIS topside ionograms have been produced and over 300,000 are from ISIS 2. Many of these ISIS-2 ionograms correspond to a passive mode of operation for the detection of natural radio emissions and thus do not contain ionospheric reflection traces. TOPIST, however, is not able to produce Ne(h) profiles from all of the ISIS-2 ionograms with reflection traces because some of them did not contain frequency information. This information was missing due to difficulties encountered during the analog-to-digital conversion process in the detection of the ionogram frame-sync pulse and/or the frequency markers. Of the many digital topside ionograms that TOPIST was able to process, over 200 were found where direct comparisons could be made with Ne(h) profiles that were produced by manual scaling in the early days of the ISIS program. While many of these comparisons indicated excellent agreement (inversion process: (1) improve the quality of the digital ionogram database by remedying the missing frequency-information problem when possible, and (2) using the above-mentioned comparisons as teaching examples of how to improve the original TOPIST software.

  1. ISIS Child Soldiers in Syria: The Structural and Predatory Recruitment, Enlistment, Pre-Training Indoctrination, Training, and Deployment

    Directory of Open Access Journals (Sweden)

    Asaad Almohammad

    2018-02-01

    Full Text Available Research on the engagement of children with the so-called Islamic State (a.k.a. ISIS relies heavily on the analysis of obtained ISIS documents and ISIS-disseminated propaganda, leaving major elements of the recruitment and deployment process uncovered. Such ambiguities hinder future efforts aimed at dealing with ISIS’ child soldiers. As such, an intensive effort to compile data using interviews and naturalistic observations across ISIS-held territories in Syria was made to exhaustively explore the process of child recruitment and deployment by ISIS. Findings suggest that there are two methods of recruitment: predatory and structural. The enlistment, intensity of indoctrination, types of training, and nature of deployment were found to depend, to a high degree, on the type of recruitment (i.e., predatory or structural, and category of children based on their origin (i.e., local, Middle Eastern and North African [MENA], or foreign and if they are orphans. The data shows that the separation between children and adults’ roles/assignments is diminishing. After a thorough exploration of the elements of ISIS’ recruitment and deployment process, this paper argues its findings, implications, and limitations.

  2. International Scientific Publication in ISI Journals: Chances and Obstacles

    Science.gov (United States)

    Omer, Rawda Ahmed

    2015-01-01

    Recently, many universities have started to do their best to enhance their contribution in the scientific publication. Thus, researchers and faculty members have been offered many various financial and promotional incentives for publishing their papers in international journals, particularly the ISI ones. The present study aims to identify the…

  3. Lexical development of noun and predicate comprehension and production in isiZulu.

    Science.gov (United States)

    Nicolas, Ramona Kunene; Ahmed, Saaliha

    2016-07-28

    This study seeks to investigate the development of noun and predicate comprehension and production in isiZulu-speaking children between the ages of 25 and 36 months. It compares lexical comprehension and production in isiZulu, using an Italian developed and validated vocabulary assessment tool: The Picture Naming Game (PiNG) developed by Bello, Giannantoni, Pettenati, Stefanini and Caselli (2012). The PiNG tool includes four subtests, one each for subnoun comprehension (NC), noun production (NP), predicate comprehension (PC), and predicate production (PP). Children are shown these lexical items and then asked to show comprehension and produce certain lexical items. After adaptation into the South African context, the adapted version of PiNG was used to directly assess the lexical development of isiZulu with the three main objectives to (1) test the efficiency of the adaptation of a vocabulary tool to measure isiZulu comprehension and production development, (2) test previous findings done in many cross-linguistic comparisons that have found that both comprehension and production performance increase with age for a lesser-studied language, and (3) present our findings around the comprehension and production of the linguistic categories of nouns and predicates. An analysis of the results reported in this study show an age effect throughout the entire sample. Across all the age groups, the comprehension of the noun and predicate subtests was better performed than the production of noun and predicate subtests. With regard to lexical items, the responses of children showed an influence of various factors, including the late acquisition of items, possible problems with stimuli presented to them, and the possible input received by the children from their home environment.

  4. Lexical development of noun and predicate comprehension and production in isiZulu

    Directory of Open Access Journals (Sweden)

    Ramona Kunene Nicolas

    2016-07-01

    Full Text Available This study seeks to investigate the development of noun and predicate comprehension and production in isiZulu-speaking children between the ages of 25 and 36 months. It compares lexical comprehension and production in isiZulu, using an Italian developed and validated vocabulary assessment tool: The Picture Naming Game (PiNG developed by Bello, Giannantoni, Pettenati, Stefanini and Caselli (2012. The PiNG tool includes four subtests, one each for subnoun comprehension (NC, noun production (NP, predicate comprehension (PC, and predicate production (PP. Children are shown these lexical items and then asked to show comprehension and produce certain lexical items. After adaptation into the South African context, the adapted version of PiNG was used to directly assess the lexical development of isiZulu with the three main objectives to (1 test the efficiency of the adaptation of a vocabulary tool to measure isiZulu comprehension and production development, (2 test previous findings done in many cross-linguistic comparisons that have found that both comprehension and production performance increase with age for a lesser-studied language, and (3 present our findings around the comprehension and production of the linguistic categories of nouns and predicates. An analysis of the results reported in this study show an age effect throughout the entire sample. Across all the age groups, the comprehension of the noun and predicate subtests was better performed than the production of noun and predicate subtests. With regard to lexical items, the responses of children showed an influence of various factors, including the late acquisition of items, possible problems with stimuli presented to them, and the possible input received by the children from their home environment.

  5. ISIS status report

    International Nuclear Information System (INIS)

    Finney, J.L.

    1991-01-01

    Two years back, I reported at ICANS X that ISIS was running regularly at 100 μA, 750 MeV, with 9 scheduled neutron instruments and one muon beam line. Overall efficiency, measured as a percentage of time beam on target, was about 72%, and our stated priority was to improve reliability at 100 μA current. Over the past two years, major improvements have been made to several component parts of the system, and reliability so far in 1990 is just below 80%. Regular running periods at 100 μA have been achieved, with 100 μA average current achieved over a period of over a week. On 3 November 1989 a record integrated current over 24 hours of 2571 μA hrs was obtained. Trip rates have been significantly reduced. Three more neutron instruments are now scheduled, bringing the total to 12 neutron and 1 muon instruments. Around 350 neutron experiments were run in the 7 cycles of 1989, and about the same number are expected to be run in the 6 cycles of 1990. (author)

  6. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  7. PENGARUH SUBSTITUSI SILASE ISI RUMEN SAPI PADA PAKAN BASAL RUMPUT DAN KONSENTRAT TERHADAP KINERJA SAPI POTONG

    Directory of Open Access Journals (Sweden)

    Engkus Ainul Yakin

    2013-03-01

    Full Text Available Penelitian bertujuan untuk mengetahui pengaruh pemberian silase isi rumen sapi sebagai pakan pengganti rumput terhadap kinerja sapi potong. Sapi persilangan Simmental-Peranakan Ongole (SimPO jantan sebanyak 12 ekor, umur 1,5-2 tahun, digunakan dalam penelitian ini. Penelitian dilakukan selama 8 minggu (2 bulan dengan pemberian pakan sebesar 3% dari bobot badan berdasarkan bahan kering dan air minum diberikan secara ad libitum. Penelitian ini menggunakan Rancangan Acak Lengkap pola searah dilanjutkan Duncan’s New Multiple Range Test (DMRT. Perlakuan yang diberikan yaitu mengganti sebagian rumput dengan silase isi rumen sapi, yaitu P0 = pemberian pakan 100% rumput , P1= pemberian pakan 25% silase isi rumen sapi dan 75% rumput, dan P2 = pemberian pakan 50% silase isi rumen sapi dan 50% rumput. Imbangan pakan antara rumput dan konsentrat adalah 20% : 80%. Variabel yang diamati adalah konsumsi pakan, pertambahan bobot badan harian (PBBH, dan konversi pakan. Hasil penelitian menunjukkan bahwa perlakuan tidak berpengaruh nyata terhadap konsumsi bahan kering (BK (13,23±0,63 kg/ekor/hari, konsumsi bahan organik (BO (10,41±0,50 kg/ekor/hari, konsumsi total digestible nutrients (TDN (7,38±0,37 kg/ekor/hari, PBBH (0,95±0,04 kg/ekor/hari, dan konversi pakan (7,38±0,37. Perlakuan berpengaruh (P<0,05 terhadap konsumsi protein kasar (PK (P0 = 0,94±0,03, P1 = 1,00±0,06 dan P2 = 0,98±0,01, dan serat kasar (SK (P0 = 3,26±0,10, P1 = 3,44±0,22 dan P2 = 3,27±0,04. Disimpulkan bahwa penggantian sebagian rumput dengan silase isi rumen sampai 50% tidak mempengaruhi kinerja sapi potong. (Kata kunci: Isi rumen sapi, Sapi potong, Silase

  8. Limon Ekşisi Üretimi Üzerine Bir Araştırma

    Directory of Open Access Journals (Sweden)

    Filiz Uçan

    2015-02-01

    Full Text Available Bu çalışmada, limon ekşisi açık kazanda ve vakum altında olmak üzere iki farklı yöntemle üretilmiş, limon ekşilerinin bazı fiziksel ve kimyasal özellikleri incelenmiştir. Limon suyunun, limon ekşisine işlenmesiyle pH değerlerinde yaklaşık %50 azalma, titrasyon asitliğinde ise yaklaşık 8-10 kat artış belirlenmiştir. Açık kazanda üretilen limon ekşisi örneklerinde askorbik asit içeriği kaybının, vakumda üretilenlere göre %48.36 daha fazla olduğu belirlenmiştir. Limon ekşisi örneklerinde en yüksek toplam fenolik ve karotenoid madde içeriği açık kazanda üretilenlerde tespit edilmiştir. Her iki yöntem ile üretilen örneklerin L* ve Hueo değerlerinde azalışlar, a*, b* ve Croma* değerlerinde ise artışlar olmuştur. En yüksek esmerleşme indeksi ve HMF (hidroksimetilfurfural miktarı, açık kazanda üretilen örneklerde, en yüksek antioksidan aktivite değeri ise vakumda altında üretilen örneklerde tespit edilmiştir. Limon ekşisi örneklerinde tartarik, kuinik, okzalik, malik, sitrik ve süksinik olmak üzere 6 adet organik asit belirlenmiştir. Organik asit içerikleri en fazla vakum altında üretilen limon ekşisi örneklerinde belirlenmiştir.

  9. Development of the pulsed muon facility at ISIS

    International Nuclear Information System (INIS)

    Eaton, G.H.; Scott, C.A.; Williams, W.G.

    1994-01-01

    The ISIS pulsed surface muon facility at RAL is presently undergoing a major expansion to provide three experimental ports with simultaneous single muon pulses at 50 Hz. This upgrade, funded by the European Community (EC), is described together with recent development results which are relevant to its future scientific programme. These new beam lines are expected to be available for experiments in June 1993. (orig.)

  10. Literaure search for intermittent rivers research using ISI Web of Science

    Data.gov (United States)

    U.S. Environmental Protection Agency — The dataset is the bibliometric information included in the ISI Web of Science database of scientific literature. Table S2 accessible from the dataset link provides...

  11. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  12. La producción española en biblioteconomía y documentación (ISI 1995-2005 Spanish literature in library and information science (isi 1995-2005

    Directory of Open Access Journals (Sweden)

    Grupo Scimago

    2006-10-01

    Full Text Available La producción de un determinado país y una determinada disciplina en el ISI Web of Knowledge, es un claro indicador de la investigación de calidad que es capaz de generar ese país en esa disciplina. En el presente artículo se analiza la producción ISI española en la categoría “Information Science and Library Science” de los últimos once años (1995-2005. Se presentan datos de producción por revista, revistas citadas, producción/citación por instituciones y producción/citación por autor. Este trabajo es la actualización de un par de artículos anteriores que cubrían el periodo 1995-2004.The scientific production of a country in a field in the ISI Web of Knowledge, is an indicator of the quality research for this country and filed. This article analyse the Spanish literature in Information Science and Library Science in the last decade (1995-2005. It presents data about production by journal, cited journals, production/citation by institutions and production/citation by author. This paper is an upgrade of a couple of former articles of the period 1995-2004.

  13. A study on the improvement of ISI methods for a prestressed concrete containment building

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Jeong Moon; Choi, In Kil

    2001-12-01

    The ISI (In-Service Inspection) of a PCCV (Prestressed Concrete Containment Vessel) consists of the tendon ISI and the SIT (Structural Integrity Test) which evaluate the effective or residual prestress in the post-tensioned prestress system, and of the ILRT (Integrated Leakage Rate Test) which ensures the leak-tightness of a PCCV. The tendon system adopted in Korean PCCVs is either grouted or ungrouted one. The grouted tendon system was used in the Ulchin Unit 1 and 2 and the Wolsong Units 1-4, whereas the rest NPPs except Kori Unit 1 and 2 adopted an ungrouted tendon system. In this report, the issues were identified on the ISI of ungrouted tendon system and on the SIT of all the PCCVs. The ILRT issues are implicitly included in the SIT issues as the ILRT is performed in parallel with the SIT. Improvements were suggested on the issues identified after the analyses of the domestic and foreign experiences and researches.

  14. The high resolution powder diffractometer (HRPD) at ISIS - a user guide

    International Nuclear Information System (INIS)

    Ibberson, R.M.; David, W.I.F.; Knight, K.S.

    1992-05-01

    This guide is intended to give a short description of the High Resolution Powder Diffractometer, HRPD, at ISIS and to provide the basic information required in order to perform a routine powder diffraction experiment. (Author)

  15. [Henning v. Wistinghausen. Freimaurer in Estland. Ihre sozialstruktur am Beispiel der Revaler Loge "Isis" 1773-1820] / Paul Kaegbein

    Index Scriptorium Estoniae

    Kaegbein, Paul

    2007-01-01

    Arvustus: Henning v. Wistinghausen: Freimaurer in Estland. Ihre sozialstruktur am Beispiel der Revaler Loge "Isis" 1773-1820. In : Quatuor Coronati 42 (2005), lk. 287-305. Eesti vabamüürlaskonna sotsiaalsest koosseisust Tallinn loo̓i Isis (1773-1820) näitel

  16. On ISI effectiveness through inspection qualification

    International Nuclear Information System (INIS)

    Harutyunov, R.

    2000-01-01

    There are two units of WWER type in the ANPP. The results of the implementation of the IAEA qualification guidelines for the ANPP Primary Circuit for WWER are presented. The control methods according to the ISI Program are foreseen in the design and implemented during the preparation for the unit 2 restart. The result of control is plugging of more tubes than during the last operation period. During the next years in the presence of the blowdown water activity, the search on defective tubes was performed by Lumhydraulic methods and the tubes were plugged by welding plugs. In 1999 was performed the visual control on the Steam Generator 6 by WNIAES experts and by the ANPP experts from the Metal Laboratory. The result is confirmation of the irreversible process on erosive-corrosion destruction of feed waters distribution header; definition of the defects coordinates defined; detection of sediments within the SG vessel surfaces and in the head exchanged surface tubes. The purpose of the ISI effectiveness improvement is to discover the defects in the base metal and in the welds before developing into a problem at operating level or a safety problem. For the solution on the specific problems at the ANPP the project for technological co-operation with IAEA has been developed. It is necessary to organize training, certification, assessment methodology. The expected results after the project implementation are to establish the base for the equipment qualification body and staff certification; to upgrade the ANPP staff qualification; to prepare a group of experts, supported by ANRA, which to be also involved in the development of NDM national regulators

  17. Using the EPRI Risk-Informed ISI Methodology on Piping Systems in Forsmark 3

    International Nuclear Information System (INIS)

    O'Regan, Patrick; Moody, Jim; Loetman, Jan; Sandstedt, Johan

    2010-12-01

    The objective of this project was a pilot plant demonstration of the EPRI RI-ISI Methodology to selected systems at Forsmark, Unit 3 (F3). This scope of this study encompasses five systems and is based upon F3 implementation of SKIFs guidance as well as other consideration as documented in the PMT program. As described in section 2, five systems were selected for evaluation. These systems were selected because they allow this project to focus on a number of issues of interest in developing a RI-ISI methodology and RI-ISI program. This includes the following: - Several different types of degradation may be identified, - Several different types of 'consequence of failure' may be identified, - Different types of safety systems are evaluated - Non-safety systems are evaluated Using the results of this application, insights and comparisons between SKIFS and the EPRI methodologies' are provided including the following: - Consequence of pressure boundary failure (PBF) as described in Section 3.14. - Degradation mechanism evaluation as described in Section 4.8. - Risk ranking as described in Section 5. - Element selection for inspection as described in Section 6. - Risk impact as described in Section 7

  18. Using the EPRI Risk-Informed ISI Methodology on Piping Systems in Forsmark 3

    Energy Technology Data Exchange (ETDEWEB)

    O' Regan, Patrick (Electric Power Research Inst., Knoxville, TN (United States)); Moody, Jim (JHM Consulting, Strafford (United States)); Loetman, Jan (Forsmarks Kraftgrupp AB (Sweden)); Sandstedt, Johan (Risk Pilot AB, Stockholm (Sweden))

    2010-12-15

    The objective of this project was a pilot plant demonstration of the EPRI RI-ISI Methodology to selected systems at Forsmark, Unit 3 (F3). This scope of this study encompasses five systems and is based upon F3 implementation of SKIFs guidance as well as other consideration as documented in the PMT program. As described in section 2, five systems were selected for evaluation. These systems were selected because they allow this project to focus on a number of issues of interest in developing a RI-ISI methodology and RI-ISI program. This includes the following: - Several different types of degradation may be identified, - Several different types of 'consequence of failure' may be identified, - Different types of safety systems are evaluated - Non-safety systems are evaluated Using the results of this application, insights and comparisons between SKIFS and the EPRI methodologies' are provided including the following: - Consequence of pressure boundary failure (PBF) as described in Section 3.14. - Degradation mechanism evaluation as described in Section 4.8. - Risk ranking as described in Section 5. - Element selection for inspection as described in Section 6. - Risk impact as described in Section 7

  19. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  20. Applications of the ISI (Information Sciences Institute) Grapher

    Science.gov (United States)

    1988-06-01

    pictorially and manipulated using the !S Grapher. SFruits and Vegetabks 2 =J "K avocado bananas] date s , cherries ’egln S S g..1 :-:.hot potatoes Figure 7...called statecharts and higraphs, was implemented in a commercial system called Statement1 and is currently being marketed by Ad Cad, Inc [Ad Cad...undertaking to market the resulting product. It is due to their energy and efforts that the ISI Grapher is now commercially available to the public, the

  1. A global map of science based on the ISI subject categories

    NARCIS (Netherlands)

    Leydesdorff, L.; Rafols, I

    2009-01-01

    The decomposition of scientific literature into disciplinary and subdisciplinary structures is one of the core goals of scientometrics. How can we achieve a good decomposition? The ISI subject categories classify journals included in the Science Citation Index (SCI). The aggregated journal-journal

  2. Nuorisopsykiatrisessa hoitotyössä jaksaminen, kun itsellä alaikäisiä lapsia

    OpenAIRE

    Kuuslehto, Marianna; Niemi, Mari

    2014-01-01

    Tämän opinnäytetyön tarkoituksena oli kuvata sairaanhoitajien jaksamista nuorisopsykiatrisessa hoitotyössä, kun heillä itsellään on alaikäisiä lapsia. Opinnäytetyön tavoitteena on saada tietoa, millaisena sairaanhoitajat kokevat työssäjaksamisen nuorisopsykiatrisessa hoitotyössä, kun itsellä on alaikäisiä lapsia. Tavoitteena on myös saada tietoa sairaanhoitajien työssäjaksamisen keinoista ja nuorisopsykiatrisen työn kuormittavuustekijöistä. Opinnäytetytön avulla saatavaa tietoa voidaan hyödyn...

  3. Women’s connectivity in extreme networks

    Science.gov (United States)

    Manrique, Pedro; Cao, Zhenfeng; Gabriel, Andrew; Horgan, John; Gill, Paul; Qi, Hong; Restrepo, Elvira M.; Johnson, Daniela; Wuchty, Stefan; Song, Chaoming; Johnson, Neil

    2016-01-01

    A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying system’s robustness and survival. Our observations suggest new female-centric approaches that could be used to affect such networks. They also raise questions about how individual contributions in high-pressure systems are evaluated. PMID:27386564

  4. Development of PSI and ISI technique

    International Nuclear Information System (INIS)

    Chung, M.K.; Park, D.Y.; Choi, S.P.; Kim, H.J.; Moon, Y.S.; Shon, G.H.; Kim, T.S.

    1983-01-01

    This report describes the experimental results of the subjects selected from the PSI/ISI related problems which encountered by us in 1982. The main contents are 1) the characteristics of the typical ECT signals from the steam generator tubes of nuclear power plant and the results of ECT evaluation of Kori-1 steam generators, 2) the experimental result for the research for directional effects of ultrasonic transducers, 3) the basic experiment for the ultrasonic testing technique by immersion testing method, 4) how to write the scan plan of the mechanized ultrasonic testing for nuclear reactor. Attached appendix is a part of necessary materials for the scan plan of the mechanized ultrasonic testing for Kori-2 nuclear reactor. (Author)

  5. Oil Federalism In Iraq: Resource Curse, Patronage Networks and Stability. Case Studies of Baghdad, Kurdistan and the Advent of ISIS

    Science.gov (United States)

    Wahab, Bilal A.

    Petroleum wealth is the lifeblood of Iraq, with the potential to promote prosperity, or become a curse that destabilizes the country and interrupts its economic and political development. The management and sharing of petroleum wealth has been at the center of economic, political and security developments in Iraq since the country's invasion in 2003. This study analyzes Iraq's experiment with petrofederalism, the influence of different actors (e.g. international oil companies and ISIS), and the emergence of Iraqi Kurdistan as a petroregion. Using case study method, it demonstrates how patronage politics exacerbated resource curse in Iraq and resulted in instability.

  6. PENGEMBANGAN ISI KURIKULUM PENDIDIKAN TEKNIK ALAT BERAT BERBASIS KEBUTUHAN INDUSTRI

    Directory of Open Access Journals (Sweden)

    Mochamad Bruri Triyono

    2016-12-01

    Full Text Available Penelitian ini bertujuan untuk: (1 mengetahui rumusan kompetensi tenaga mekanik alat berat sesuai standar industri; (2 mengetahui kualifikasi tenaga instruktur alat berat yang dibutuhkan industri sesuai standar industri; (3 merumuskan isi kurikulum untuk materi ajar produktif untuk menciptakan tenaga kerja di bidang alat berat. Penelitian ini merupakan penelitian survei dengan model pilihan pengembangan kurikulum Task Analysis. Penelitian dilaksanakan di industri yang bergerak di bidang alat berat dan institusi pendidikan perguruan tinggi dan SMK yang bekerja sama dengan industri alat berat yaitu PT Thiess Contractors Indonesia, PT United Tractors Indonesia, dan PT Trakindo Utama. Hasil penelitian diperoleh bahwa: (1 kompetensi mekanik alat berat meliputi: menerapkan keselamatan dan kesehatan kerja, menguasai dasar mekanik alat berat, melaksanakan perawatan dan perbaikan engine, sistem hidrolik, powertrain, sistem vehicle control, serta sistem kelistrikan alat berat minimal pada level capable (di bawah supervisi; (2 kualifikasi tenaga instruktur alat berat meliputi: memiliki kemampuan mekanik alat berat level III, memiliki kemampuan mengelola pelatihan, memiliki pengalaman kerja, serta mendapatkan pelatihan instruktur; (3 isi kurikulum untuk materi ajar produktif mekanik alat berat meliputi: dasar mekanik alat berat dan keselamatan kerja, dasar engine, dasar hidrolik, dasar vehicle control, dasar kelistrikan, materi sistem engine lanjut, sistem hidrolik lanjut, sistem powertrain lanjut, sistem vehicle control lanjut, sistem kelistrikan lanjut, product training, serta electronic machine control. Kata kunci: kompetensi, instruktur alat berat, isi kurikulum, materi ajar   THE CONTENT CURRICULLUM DEVELOPMENT OF EDUCATION TECHNIC IN HEAVY EQUIPMENT BASED ON INDUSTRIAL NEEDS ABSTRACT This study aims to: (1 find out the formula of competency for heavy equipment mechanic based on industry needs, (2 determine the qualifications of instructors in heavy

  7. Inspection qualification as a tool to risk based ET ISI of VVER type SG tubes

    International Nuclear Information System (INIS)

    Horacek, L.

    2002-01-01

    A Pilot study on Eddy current inspection qualification of VVER 440 steam generator tubes, discussed in this paper, followed the ENIQ methodology principles and covered briefly the assumed scope of ET qualification, relevant elaborated qualification documents, known ISI limitations and a review of input information on component and defects determined for Eddy current inspection qualification of VVER 440 steam generator tubes. The information includes the fabrication of the test blocks with SG tube segments provided by intended defect simulations of realistic SCC type and basic data on the realistic SCC type defects manufacturing technology. Lessons learned from the development of manufacturing technology of SSC type of defects, regional blind tests, elaboration of the preliminary technical justification for Eddy current automated inspections, potential optimisation of inspection procedures, laboratory and practical open trials are summarised in the paper. The results of the Pilot study also especially in relation to POD curve being determined seem to be useful for practical operational ISI programme and Risk informed ISI decisions and the establishment of plugging criteria of VVER 440 and VVER 1000 type steam generator tubes. (orig.)

  8. Extricating the description of the grammar of isiXhosa from a ...

    African Journals Online (AJOL)

    A Eurocentric approach was the only possible point of departure for those originally attempting to set out the grammatical structure of isiXhosa. Not being mother-tongue speakers, their commendable efforts were inevitably done from the perspective of the grammar of European languages such as Latin and English.

  9. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    Camarinha-Matos, L.M.; Afsarmanesh, H.

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  10. ISIS's Destruction of Mosul's Historical Monuments: Between Media Spectacle and Religious Doctrine

    Czech Academy of Sciences Publication Activity Database

    Melčák, Miroslav; Beránek, Ondřej

    2017-01-01

    Roč. 6, č. 2 (2017), s. 389-415 ISSN 2045-5895 Institutional support: RVO:68378009 Keywords : taswiyat al-qubur * levelling of graves * Islamic State * isis * Islamic architecture * heritage destruction Subject RIV: AA - Philosophy ; Religion OBOR OECD: Religious studies

  11. Horizontal beams creation on a mean power reactor: Isis 700 kW

    International Nuclear Information System (INIS)

    Morin, C.

    1987-08-01

    To satisfy the requests of experimenters, two horizontal beams, tangential at core, have been created. After a brief recall of the Isis reactor the author describes the realized works and gives a summary description of the two beams equipment [fr

  12. The limits of simplification in translated isiZulu health texts | Ndlovu ...

    African Journals Online (AJOL)

    Simplification, defined as the practice of simplifying the language used in translation, is regarded as one of the universal features of translation. This article investigates the limitations of simplification encountered in efforts to make translated isiZulu health texts more accessible to the target readership. The focus is on public ...

  13. Development and testing of VTT approach to risk-informed in-service inspection methodology. Final report of SAFIR INTELI INPUT Project RI-ISI

    International Nuclear Information System (INIS)

    Cronvall, O.; Maennistoe, I.; Simola, K.

    2007-04-01

    This report summarises the results of a research project on risk-informed in-service inspection (RI-ISI) methodology conducted in the Finnish national nuclear energy research programme SAFIR (2003-2006). The purpose of this work was to increase the accuracy of risk estimates used in RI-ISI analyses of nuclear power plant (NPP) piping systems, and to quantitatively evaluate the effects of different piping inspection strategies on risk. Piping failure occurrences were sampled by using probabilistic fracture mechanics (PFM) analyses. The PFM results for crack growth were used to construct transition matrices for a discrete-time Markov process model, which in turn was applied to examine the effects of various inspection strategies on the failure probabilities and risks. The applicability of the developed quantitative risk matrix approach was examined as a pilot study performed to the Shut-down cooling piping system 321 in NPP unit OL1 of Teollisuuden Voima Oy (TVO). The analysed degradation mechanisms were stress corrosion cracking (SCC) and thermal fatigue induced cracking (in the mixing points). Here a new and rather straightforward approach was developed to model thermal fatigue induced cracking, which degradation mechanism is much more difficult to model than SCC. This study further demonstrated the usefulness of Markov analysis procedure development by VTT in RI-ISI applications. The most important results are the quantified comparisons of different inspections strategies. It was shown in this study that Markov models are useful for this purpose, when combined with PFM analyses. While the numerical results could benefit from further considerations of inspection reliability, this does not affect the feasibility of the method itself. The approach can be used to identify an optimal inspection strategy for achieving a balanced risk profile of piping segments. (orig.)

  14. A Critical Analysis of the Lemmatisation of Nouns and Verbs in isiZulu

    African Journals Online (AJOL)

    of isiZulu. The advantages versus disadvantages of lemmatising verbal and nominal stems, verbal .... imisebenzikazi (1) (imisebenzi+kazi) 'big jobs'. Affixes ...... of related items, new routes to the data, less dependency on alphabetical order,.

  15. Preparing isiXhosa home language teachers for the 21st century ...

    African Journals Online (AJOL)

    The article is based on data that was collected from Postgraduate Certificate in Education (PGCE) students taking isiXhosa (home language) as one of their teaching method subjects as part of their pre-service training. The data were collected by means of an open-ended questionnaire, semi-structured interviews and an ...

  16. Grammar rules for the isiZulu complex verb | Maria Keet | Southern ...

    African Journals Online (AJOL)

    The isiZulu verb is known for its morphological complexity, which is a subject of on-going linguistics research, as well as for prospects of computational use, such as controlled natural language interfaces, machine translation and spellcheckers. To this end, we seek to answer the question as to what the precise grammar ...

  17. VESUVIO--the double difference inverse geometry spectrometer at ISIS

    International Nuclear Information System (INIS)

    Mayers, J.; Tomkinson, J.; Abdul-Redah, T.; Stirling, W.G.; Andreani, C.; Senesi, R.; Nardone, M.; Colognesi, D.; Degiorgi, E.

    2004-01-01

    The VESUVIO spectrometer at the ISIS pulsed neutron source performs inelastic neutron scattering at high-energy and wave vector transfers, employing gold and uranium resonant foils. A factor of two improvement in the instrumental resolution has been achieved by making use of the double filter difference method. Experimental results are presented for measurements on polycrystalline Pb, which indicate that accurate measurements of single-particle momentum distribution n(p) in quantum fluids are now possible at eV energy transfers

  18. VESUVIO--the double difference inverse geometry spectrometer at ISIS

    Energy Technology Data Exchange (ETDEWEB)

    Mayers, J.; Tomkinson, J.; Abdul-Redah, T.; Stirling, W.G.; Andreani, C.; Senesi, R.; Nardone, M.; Colognesi, D.; Degiorgi, E

    2004-07-15

    The VESUVIO spectrometer at the ISIS pulsed neutron source performs inelastic neutron scattering at high-energy and wave vector transfers, employing gold and uranium resonant foils. A factor of two improvement in the instrumental resolution has been achieved by making use of the double filter difference method. Experimental results are presented for measurements on polycrystalline Pb, which indicate that accurate measurements of single-particle momentum distribution n(p) in quantum fluids are now possible at eV energy transfers.

  19. VESUVIO-the double difference inverse geometry spectrometer at ISIS

    Science.gov (United States)

    Mayers, J.; Tomkinson, J.; Abdul-Redah, T.; Stirling, W. G.; Andreani, C.; Senesi, R.; Nardone, M.; Colognesi, D.; Degiorgi, E.

    2004-07-01

    The VESUVIO spectrometer at the ISIS pulsed neutron source performs inelastic neutron scattering at high-energy and wave vector transfers, employing gold and uranium resonant foils. A factor of two improvement in the instrumental resolution has been achieved by making use of the double filter difference method. Experimental results are presented for measurements on polycrystalline Pb, which indicate that accurate measurements of single-particle momentum distribution n(p) in quantum fluids are now possible at eV energy transfers.

  20. Redesign of the Analysing Magnet in the ISIS H- Penning Ion Source

    International Nuclear Information System (INIS)

    Lawrie, S. R.; Faircloth, D. C.; Letchford, A. P.; Westall, M.; Whitehead, M. O.; Wood, T.; Pozimski, J.

    2009-01-01

    A full 3D electromagnetic finite element analysis and particle tracking study is undertaken of the ISIS Penning surface plasma H - ion source. The extraction electrode, 90 deg. analysing magnet, post-extraction acceleration gap and 700 mm of drift space have been modelled in CST Particle Studio 2008 to study the beam acceleration and transport at all points in the system. The analyzing magnet is found to have a sub-optimal field index, causing beam divergence and contributing the beam loss. Different magnet pole piece geometries are modelled and the effects of space charge investigated. The best design for the analysing magnet involves a shallower intersection angle and larger separation of the pole faces. This provides radial focusing to the beam, leading to less collimation. Three new sets of magnet poles are manufactured and tested on the Ion Source Development Rig to compare with predictions.

  1. RUTHERFORD/APPELTON: ISIS intensity record

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    The Rutherford Appleton Laboratory in the UK is home to the world's most intense pulsed neutron source. The heart of ISIS is a 50 Hz proton synchrotron accelerating two bunches of protons from 70 to 800 MeV. After extraction the protons, occupying a total pulse length of less than 0.5 microseconds, strike a heavy metal target: the neutrons generated are moderated and directed through channels in the shielding to any of 14 instruments for condensed matter studies. As neutrinos and muons are copious byproducts, major investments have also been made for investigations in these fields. Efficient charge exchange injection into the synchrotron at 70 MeV is achieved using negative hydrogen ions and an aluminium oxide stripping foil. Some particles are lost during trapping and the early acceleration period, but they are captured by graphite-covered beam collectors to reduce machine activation. Later acceleration and fast-extraction are virtually without loss

  2. A neighbourhood evolving network model

    International Nuclear Information System (INIS)

    Cao, Y.J.; Wang, G.Z.; Jiang, Q.Y.; Han, Z.X.

    2006-01-01

    Many social, technological, biological and economical systems are best described by evolved network models. In this short Letter, we propose and study a new evolving network model. The model is based on the new concept of neighbourhood connectivity, which exists in many physical complex networks. The statistical properties and dynamics of the proposed model is analytically studied and compared with those of Barabasi-Albert scale-free model. Numerical simulations indicate that this network model yields a transition between power-law and exponential scaling, while the Barabasi-Albert scale-free model is only one of its special (limiting) cases. Particularly, this model can be used to enhance the evolving mechanism of complex networks in the real world, such as some social networks development

  3. Profile analysis of neutron powder diffraction data at ISIS

    International Nuclear Information System (INIS)

    David, W.I.F.; Ibberson, R.M.; Matthewman, J.C.

    1992-05-01

    The aim of this manual is to document the current suite of time-of-flight neutron powder diffraction profile refinement programs available to ISIS users. Aspects of data collation and normalisation specific to the individual diffraction instruments are dealt with elsewhere. It will be assumed the user has produced a suitable data file (.DAT file) containing the profile data consisting of point by point values of the corrected diffraction profile across the pattern. The analysis of neutron powder diffraction data at ISIS by profile refinement utilises a suite of ''in-house'' written and supported programs based on the Cambridge Crystallography Subroutine Library (CCSL). A quick scan through the CCSL manual will give the user a general feel for the procedure to adopt in the use of the library and hence of the profile codes. The instructions documented in this handbook are complementary to those in the more specialist CCSL manual, and consequently go into no great detail regarding technical details of any of the CCSL routines. The programs may be run from each individual user account, for example [USER01], once the appropriate login procedure has been set-up by the instrument scientists. The programs are mostly activated by one line commands and only a basic knowledge of a VAX editor should be required; details can be found in the ''VAX primer'' available from Computer Support. (Author)

  4. The MICE Muon Beam on ISIS and the beam-line instrumentation of the Muon Ionization Cooling Experiment

    CERN Document Server

    Bogomilov, M.; Kolev, D.; Russinov, I.; Tsenov, R.; Vankova-Kirilova, G.; Wang, L.; Xu, F.Y.; Zheng, S.X.; Bertoni, R.; Bonesini, M.; Ferri, F.; Lucchini, G.; Mazza, R.; Paleari, F.; Strati, F.; Palladino, V.; Cecchet, G.; de Bari, A.; Capponi, M.; Cirillo, A.; Iaciofano, A.; Manfredini, A.; Parisi, M.; Orestano, D.; Pastore, F.; Tonazzo, A.; Tortora, L.; Mori, Y.; Kuno, Y.; Sakamoto, H.; Sato, A.; Yano, T.; Yoshida, M.; Ishimoto, S.; Suzuki, S.; Yoshimura, K.; Filthaut, F.; Garoby, R.; Gilardoni, S.; Gruber, P.; Hanke, K.; Haseroth, H.; Janot, P.; Lombardi, A.; Ramberger, S.; Vretenar, M.; Bene, P.; Blondel, A.; Cadoux, F.; Graulich, J.S.; Grichine, V.; Gschwendtner, E.; Masciocchi, F.; Sandstrom, R.; Verguilov, V.; Wisting, H.; Petitjean, C.; Seviour, R.; Alexander, J.; Charnley, G.; Collomb, N.; Griffiths, S.; Martlew, B.; Moss, A.; Mullacrane, I.; Oates, A.; Owens, P.; White, C.; York, S.; Adams, D.; Apsimon, R.; Barclay, P.; Baynham, D.E.; Bradshaw, T.W.; Courthold, M.; Drumm, P.; Edgecock, R.; Hayler, T.; Hills, M.; Ivaniouchenkov, Y.; Jones, A.; Lintern, A.; MacWaters, C.; Nelson, C.; Nichols, A.; Preece, R.; Ricciardi, S.; Rochford, J.H.; Rogers, C.; Spensley, W.; Tarrant, J.; Tilley, K.; Watson, S.; Wilson, A.; Forrest, D.; Soler, F.J.P.; Walaron, K.; Cooke, P.; Gamet, R.; Alekou, A.; Apollonio, M.; Barber, G.; Clark, D.; Clark, I.; Dobbs, A.; Dornan, P.; Fish, A.; Hare, R.; Greenwood, S.; Jamdagni, A.; Kasey, V.; Khaleeq, M.; Leaver, J.; Long, K.; McKigney, E.; Matsushita, T.; Pasternak, J.; Sashalmi, T.; Savidge, T.; Takahashi, M.; Blackmore, V.; Carlisle, T.; Cobb, J.H.; Lau, W.; Rayner, M.; Tunnell, C.D.; Witte, H.; Yang, S.; Booth, C.N.; Hodgson, P.; Howlett, L.; Nicholson, R.; Overton, E.; Robinson, M.; Smith, P.; Adey, D.; Back, J.; Boyd, S.; Harrison, P.; Ellis, M.; Kyberd, P.; Littlefield, M.; Nebrensky, J.J.; Bross, A.D.; Geer, S.; Neuffer, D.; Moretti, A.; Popovic, M.; Cummings, M.A.C.; Roberts, T.J.; DeMello, A.; Green, M.A.; Li, D.; Virostek, S.; Zisman, M.S.; Freemire, B.; Hanlet, P.; Huang, D.; Kafka, G.; Kaplan, D.M.; Snopok, P.; Torun, Y.; Blot, S.; Kim, Y.K.; Bravar, U.; Onel, Y.; Cline, D.; Fukui, Y.; Lee, K.; Yang, X.; Rimmer, R.A.; Cremaldi, L.M.; Gregoire, G.; Hart, T.L.; Sanders, D.A.; Summers, D.J.; Coney, L.; Fletcher, R.; Hanson, G.G.; Heidt, C.; Gallardo, J.; Kahn, S.; Kirk, H.; Palmer, R.B.

    2012-01-01

    The international Muon Ionization Cooling Experiment (MICE), which is under construction at the Rutherford Appleton Laboratory (RAL), will demonstrate the principle of ionization cooling as a technique for the reduction of the phase-space volume occupied by a muon beam. Ionization cooling channels are required for the Neutrino Factory and the Muon Collider. MICE will evaluate in detail the performance of a single lattice cell of the Feasibility Study 2 cooling channel. The MICE Muon Beam has been constructed at the ISIS synchrotron at RAL, and in MICE Step I, it has been characterized using the MICE beam-instrumentation system. In this paper, the MICE Muon Beam and beam-line instrumentation are described. The muon rate is presented as a function of the beam loss generated by the MICE target dipping into the ISIS proton beam. For a 1 V signal from the ISIS beam-loss monitors downstream of our target we obtain a 30 KHz muon rate, with a neglible pion contamination in the beam.

  5. The MICE Muon Beam on ISIS and the beam-line instrumentation of the Muon Ionization Cooling Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Bogomilov, M. [University of Sofia (Bulgaria); et al.

    2012-05-01

    The international Muon Ionization Cooling Experiment (MICE), which is under construction at the Rutherford Appleton Laboratory (RAL), will demonstrate the principle of ionization cooling as a technique for the reduction of the phase-space volume occupied by a muon beam. Ionization cooling channels are required for the Neutrino Factory and the Muon Collider. MICE will evaluate in detail the performance of a single lattice cell of the Feasibility Study 2 cooling channel. The MICE Muon Beam has been constructed at the ISIS synchrotron at RAL, and in MICE Step I, it has been characterized using the MICE beam-instrumentation system. In this paper, the MICE Muon Beam and beam-line instrumentation are described. The muon rate is presented as a function of the beam loss generated by the MICE target dipping into the ISIS proton beam. For a 1 V signal from the ISIS beam-loss monitors downstream of our target we obtain a 30 KHz instantaneous muon rate, with a neglible pion contamination in the beam.

  6. Use of advanced inspection technology during the ISI of a US-RPV

    Energy Technology Data Exchange (ETDEWEB)

    Buxbaum, S R; Pond, R B [Baltimore Gas and Electric Co., MD (United States); Stone, R M

    1988-12-31

    The Reactor Pressure Vessel (RPV) maintains a unique place among nuclear steam supply system components because its failure is unacceptable. The assumption of incredibility of vessel failure is a US Nuclear Regulatory Commission (USNRC) requirement of plant design and operation. Therefore, accurate detection and characterization of vessel flaws are essential. In order to meet the needs for improved pressure vessel inspection, EPRI assisted in the development of the Ultrasonic Data Recording and Processing System (UDRPS). The EPRI NDE Center has supported the transfer to industry through demonstration and documentation of the original system capability and by assisting utilities in their initial applications. Baltimore Gas and Electric (BG and E) purchased a second generation UDRPS and has used the system during the 10 year ISI at the Calvert Cliffs Nuclear Plant, Units 1 and 2. This presentation deals with the BG and E applications and the EPRI NDE Center support provided before and during the Calvert Cliffs ISI applications. (author).

  7. Bone-breaking bite force of Basilosaurus isis (Mammalia, Cetacea from the late Eocene of Egypt estimated by finite element analysis.

    Directory of Open Access Journals (Sweden)

    Eric Snively

    Full Text Available Bite marks suggest that the late Eocence archaeocete whale Basilosaurus isis (Birket Qarun Formation, Egypt fed upon juveniles of the contemporary basilosaurid Dorudon atrox. Finite element analysis (FEA of a nearly complete adult cranium of B. isis enables estimates of its bite force and tests the animal's capabilities for crushing bone. Two loadcases reflect different biting scenarios: 1 an intitial closing phase, with all adductors active and a full condylar reaction force; and 2 a shearing phase, with the posterior temporalis active and minimized condylar force. The latter is considered probable when the jaws were nearly closed because the preserved jaws do not articulate as the molariform teeth come into occulusion. Reaction forces with all muscles active indicate that B. isis maintained relatively greater bite force anteriorly than seen in large crocodilians, and exerted a maximum bite force of at least 16,400 N at its upper P3. Under the shearing scenario with minimized condylar forces, tooth reaction forces could exceed 20,000 N despite lower magnitudes of muscle force. These bite forces at the teeth are consistent with bone indentations on Dorudon crania, reatract-and-shear hypotheses of Basilosaurus bite function, and seizure of prey by anterior teeth as proposed for other archaeocetes. The whale's bite forces match those estimated for pliosaurus when skull lengths are equalized, suggesting similar tradeoffs of bite function and hydrodynamics. Reaction forces in B. isis were lower than maxima estimated for large crocodylians and carnivorous dinosaurs. However, comparison of force estimates from FEA and regression data indicate that B. isis exerted the largest bite forces yet estimated for any mammal, and greater force than expected from its skull width. Cephalic feeding biomechanics of Basilosaurus isis are thus consistent with habitual predation.

  8. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  9. The Worldviews Network: Innovative Strategies for Increasing Climate and Ecological Literacy in Your Community

    Science.gov (United States)

    Connolly, R.; Yu, K.; McConville, D.; Sickler, J.; "Irving, Lindsay", L. S.; Gardiner, N.; Hamilton, H.

    2011-12-01

    Informal science Institutions (ISI) are in the unique position to convene and support community dialogues surrounding local ecological impacts of global change. The Worldviews Network-a collaboration between museums, scientists, and community-based organizations-is developing and testing innovative approaches for promoting and encouraging ecological literacy with the American public. In this session, we will share strategies for sparking and sustaining dialogue and action in local communities through high-impact visual presentations and real-world examples of successful projects that are increasing the healthy functioning of regional and global ecosystems. Educating the public about interconnected global change issues can be a daunting task. ISIs can help communities by facilitating dialogues about realistic and regionally relevant approaches for systemically addressing global challenges. Managing the complexity of these challenges requires going far beyond the standard prescriptions for behavior change; it requires inspiring participants with positive examples of system-wide solutions as well as actively involving the audience in scientifically informed design processes. This session will demonstrate how you can implement and sustain these community dialogues, using real-world examples from our partners' national events. We present visualization story templates and a model for facilitating dialogues that can be adapted at your institution. Based on video and written assessment feedback from visitors of our first Worldviews events, we will present initial evaluation findings about the impact that these strategies are having on our audiences and ISI partners. These findings show that engaging the public and NGO partners in sustainability and design dialogues is a powerful way to maintain the relevance of ISIs within their communities.

  10. Coevolutionary modeling in network formation

    KAUST Repository

    Al-Shyoukh, Ibrahim

    2014-12-03

    Network coevolution, the process of network topology evolution in feedback with dynamical processes over the network nodes, is a common feature of many engineered and natural networks. In such settings, the change in network topology occurs at a comparable time scale to nodal dynamics. Coevolutionary modeling offers the possibility to better understand how and why network structures emerge. For example, social networks can exhibit a variety of structures, ranging from almost uniform to scale-free degree distributions. While current models of network formation can reproduce these structures, coevolutionary modeling can offer a better understanding of the underlying dynamics. This paper presents an overview of recent work on coevolutionary models of network formation, with an emphasis on the following three settings: (i) dynamic flow of benefits and costs, (ii) transient link establishment costs, and (iii) latent preferential attachment.

  11. Coevolutionary modeling in network formation

    KAUST Repository

    Al-Shyoukh, Ibrahim; Chasparis, Georgios; Shamma, Jeff S.

    2014-01-01

    Network coevolution, the process of network topology evolution in feedback with dynamical processes over the network nodes, is a common feature of many engineered and natural networks. In such settings, the change in network topology occurs at a comparable time scale to nodal dynamics. Coevolutionary modeling offers the possibility to better understand how and why network structures emerge. For example, social networks can exhibit a variety of structures, ranging from almost uniform to scale-free degree distributions. While current models of network formation can reproduce these structures, coevolutionary modeling can offer a better understanding of the underlying dynamics. This paper presents an overview of recent work on coevolutionary models of network formation, with an emphasis on the following three settings: (i) dynamic flow of benefits and costs, (ii) transient link establishment costs, and (iii) latent preferential attachment.

  12. The development of PSI, ISI technique for nuclear power plant

    International Nuclear Information System (INIS)

    Park, Day-Young; Kwak, Kyung-Jin; Chang, Kee-Ok; Hong, Soon-Shin; Lee, Jong-Po; Chung, Tae-Eon

    1985-01-01

    The analysis and sizing of detect signal is the most essential in PSI/ISI technique. Ultrasonic testing is the most versatile technique, and the knowledge of ultrsonic attenuation of metal component examined by ultrasonic testing is important to evaluate the signal appeared and to size the flaw of the component. Ultrasonic attenuation measurements were made by using the specimens made of AISI 4140 Carbon Steel with different grain size. Yield strength and ultimate tensile strength were also taken. This report also describes about the principle of multifrequency eddy current test method using two or more operating frequencies simultaneously, and about the simple experiment to read and identify precisely the combined signal caused by more test parameters. It was found that ultrasonic attenuation was increased with increasing grain size and ultrasonic frequency, and yield strength and ultimate tensile strength were decreased with increasing grain size. The results are applicable for ultrasonic testing of carbon steel components as reactor vessel or pressured vessel. The complicated eddy current signal outputs caused by more test parameters and undesirables variables can be identified using multifrequency eddy current test method. It is intended to use multifrequency ECT method for ISI and PSI of steam generator tubes from 1985. (Author)

  13. Modeling online social signed networks

    Science.gov (United States)

    Li, Le; Gu, Ke; Zeng, An; Fan, Ying; Di, Zengru

    2018-04-01

    People's online rating behavior can be modeled by user-object bipartite networks directly. However, few works have been devoted to reveal the hidden relations between users, especially from the perspective of signed networks. We analyze the signed monopartite networks projected by the signed user-object bipartite networks, finding that the networks are highly clustered with obvious community structure. Interestingly, the positive clustering coefficient is remarkably higher than the negative clustering coefficient. Then, a Signed Growing Network model (SGN) based on local preferential attachment is proposed to generate a user's signed network that has community structure and high positive clustering coefficient. Other structural properties of the modeled networks are also found to be similar to the empirical networks.

  14. Development of intelligent database program for PSI/ISI data management of nuclear power plant

    International Nuclear Information System (INIS)

    Um, Byong Guk; Park, Un Su; Park, Ik Keun; Park, Yun Won; Kang, Suk Chul

    1998-01-01

    An intelligent database program has been developed under fully compatible with windows 95 for the construction of total support system and the effective management of Pre-/In-Service Inspection data. Using the database program, it can be executed the analysis and multi-dimensional evaluation of the defects detected during PSI/ISI in the pipe and the pressure vessel of the nuclear power plants. And also it can be used to investigate the NDE data inspected repetitively and the contents of treatment, and to offer the fundamental data for application of evaluation data related to Fracture Mechanics Analysis(FMA). Furthermore, the PSI/ISI database loads and material properties can be utilized to secure the higher degree of safety, integrity, reliability, and life-prediction of components and systems in nuclear power plant.

  15. Reliability, factor analysis and internal consistency calculation of the Insomnia Severity Index (ISI) in French and in English among Lebanese adolescents.

    Science.gov (United States)

    Chahoud, M; Chahine, R; Salameh, P; Sauleau, E A

    2017-06-01

    Our goal is to validate and to verify the reliability of the French and English versions of the Insomnia Severity Index (ISI) in Lebanese adolescents. A cross-sectional study was implemented. 104 Lebanese students aged between 14 and 19 years participated in the study. The English version of the questionnaire was distributed to English-speaking students and the French version was administered to French-speaking students. A scale (1 to 7 with 1 = very well understood and 7 = not at all) was used to identify the level of the students' understanding of each instruction, question and answer of the ISI. The scale's structural validity was assessed. The factor structure of ISI was evaluated by principal component analysis. The internal consistency of this scale was evaluated by Cronbach's alpha. To assess test-retest reliability the intraclass correlation coefficient (ICC) was used. The principal component analysis confirmed the presence of a two-component factor structure in the English version and a three-component factor structure in the French version with eigenvalues > 1. The English version of the ISI had an excellent internal consistency (α = 0.90), while the French version had a good internal consistency (α = 0.70). The ICC presented an excellent agreement in the French version (ICC = 0.914, CI = 0.856-0.949) and a good agreement in the English one (ICC = 0.762, CI = 0.481-890). The Bland-Altman plots of the two versions of the ISI showed that the responses over two weeks' were comparable and very few outliers were detected. The results of our analyses reveal that both English and French versions of the ISI scale have good internal consistency and are reproducible and reliable. Therefore, it can be used to assess the prevalence of insomnia in Lebanese adolescents.

  16. Training courses on the use of neutron detection systems carried out on the ISIS research reactor

    International Nuclear Information System (INIS)

    Lescop, Bernard; Foulon, Francois

    2013-06-01

    Training courses on the use of the neutron detection systems for the control of the nuclear reactors are carried out by the National Institute for Nuclear Science using the ISIS research reactor. The study and the comprehension of the operation of these systems are facilitated by the use a research reactor in order to observe the electronic signals in real conditions. Thus, ISIS reactor offers a wide range of neutron fluxes and the level of power can be easily set to any value from zero to nominal power (700 kW). Different kinds of detectors (counters, ionization chambers), which operate in the different modes of detection (pulse, current and Campbelling) can be placed in the periphery of the core for the courses. The electronic signal can be analyzed at each step of the detection process. One goal of the courses is to understand the role of each component of the detection system: detector, cable and each electronic module. A comparison with the nuclear instrumentation used by the instrumentation and control of ISIS reactor is also made. This comparison is very useful to understand the role of the neutron instrumentation in terms of safety, availability, reliability and maintainability. (authors)

  17. Statistical Models for Social Networks

    NARCIS (Netherlands)

    Snijders, Tom A. B.; Cook, KS; Massey, DS

    2011-01-01

    Statistical models for social networks as dependent variables must represent the typical network dependencies between tie variables such as reciprocity, homophily, transitivity, etc. This review first treats models for single (cross-sectionally observed) networks and then for network dynamics. For

  18. Agent-based modeling and network dynamics

    CERN Document Server

    Namatame, Akira

    2016-01-01

    The book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The book begins with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling’s segregation model and Axelrod’s spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The book also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. The book reviews a number of pioneering and representative models in this family. Upon the gi...

  19. Localized 31PNMR spectroscopy with ISIS and surface coils

    International Nuclear Information System (INIS)

    Heindel, W.; Schreier, G.; Steinbrich, W.; Glathe, S.; Huttmann, P.

    1990-01-01

    A new method for image-guided localized phosphorus NMR spectroscopy of superficial tissues has been investigated using a 1.5 Tesla whole-body-MR-system. We used a surface coil combined with adiabatic excitation pulses and a modified ISIS sequence. This approach is related to imaging sequences and thus permits a flexible and accurate determination of the volume of interest from 'conventional' proton images. The scope and advantages of the method are demonstrated by phantom studies. Clinical applications to the liver, renal transplants, and the mediastinum are described. (orig.) [de

  20. Modeling Epidemic Network Failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova

    2013-01-01

    This paper presents the implementation of a failure propagation model for transport networks when multiple failures occur resulting in an epidemic. We model the Susceptible Infected Disabled (SID) epidemic model and validate it by comparing it to analytical solutions. Furthermore, we evaluate...... the SID model’s behavior and impact on the network performance, as well as the severity of the infection spreading. The simulations are carried out in OPNET Modeler. The model provides an important input to epidemic connection recovery mechanisms, and can due to its flexibility and versatility be used...... to evaluate multiple epidemic scenarios in various network types....

  1. First results from the MAPS spectrometer at ISIS

    International Nuclear Information System (INIS)

    Frost, C.D.; Perring, T.G.

    2001-01-01

    The scientific commissioning of MAPS, the new state-of-the-art neutron scattering instrument at ISIS, has just begun. The design of MAPS has been optimised for studies of coherent excitations in single-crystals. The principal innovation is the use of position sensitive detectors that provide close to continuos coverage over a large solid angle detector array in the forward direction. The technical description of the spectrometer is presented, and examples from the first scientific experiments are used to illustrate how the position sensitive detectors coupled with easy-to-use visualisation software is already beginning to have an impact in the measurement of excitations in single crystals. (author)

  2. First results from the MAPS spectrometer at ISIS

    Energy Technology Data Exchange (ETDEWEB)

    Frost, C.D.; Perring, T.G. [ISIS Facility, CLRC Rutherford Appleton Laboratory, Didcot, Oxon (United Kingdom)

    2001-03-01

    The scientific commissioning of MAPS, the new state-of-the-art neutron scattering instrument at ISIS, has just begun. The design of MAPS has been optimised for studies of coherent excitations in single-crystals. The principal innovation is the use of position sensitive detectors that provide close to continuos coverage over a large solid angle detector array in the forward direction. The technical description of the spectrometer is presented, and examples from the first scientific experiments are used to illustrate how the position sensitive detectors coupled with easy-to-use visualisation software is already beginning to have an impact in the measurement of excitations in single crystals. (author)

  3. The ISIS target

    International Nuclear Information System (INIS)

    Carne, A.; Broome, T.A.; Hogston, J.R.; Holding, M.

    1989-01-01

    This presentation discusses the two target failures that have occurred, gives the understanding of the causes and indicates the steps being taken to alleviate the problems. At the outset of the design it was understood that the target would have a finite lifetime, due to radiation damage effects, exacerbated by mechanical damage due to thermal cycling and fatigue. Estimates of target lifetime at full intensity are about 2 years for radiation damage swelling and about 10E4 gross thermal excursions. The latter number is the one which gives uncertainty in defining the life of the target, since it is dependent on the reliability of the accelerator and quality of the proton beam. The commissioning of an accelerator system and bringing it up to high beam intensities have their own special problems. There must be protection of components against uncontrolled beam loss, which produces thermal damage, prompt radiation and induced activity. Fast beam trips for beam loss protection, or equipment failures, result in quenches from high temperature in the target which get bigger with increasing beam intensity. But the target itself is a difficult device to make, taking about 12 months to manufacture. Further, changing one is a complex and time consuming task, not without its hazards. There is thus something of a balancing act to bring the accelerator towards specification before the target fails due to thermal cycling fatigue. In the early days of ISIS beam loss protection was the dominant consideration and the target was regarded somewhat as a sacrificial lamb to the goddess of machine reliability. 2 refs., 6 figs

  4. Current approaches to gene regulatory network modelling

    Directory of Open Access Journals (Sweden)

    Brazma Alvis

    2007-09-01

    Full Text Available Abstract Many different approaches have been developed to model and simulate gene regulatory networks. We proposed the following categories for gene regulatory network models: network parts lists, network topology models, network control logic models, and dynamic models. Here we will describe some examples for each of these categories. We will study the topology of gene regulatory networks in yeast in more detail, comparing a direct network derived from transcription factor binding data and an indirect network derived from genome-wide expression data in mutants. Regarding the network dynamics we briefly describe discrete and continuous approaches to network modelling, then describe a hybrid model called Finite State Linear Model and demonstrate that some simple network dynamics can be simulated in this model.

  5. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  6. Network bandwidth utilization forecast model on high bandwidth networks

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wuchert (William) [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sim, Alex [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-03-30

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2%. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  7. Neural Network-Based Receiver in Band-Limited Communication System with MPPSK Modulation

    Directory of Open Access Journals (Sweden)

    Wang Zixin

    2018-01-01

    Full Text Available As a type of the spectrally efficient modulation, the m-ary phase position shift keying (MPPSK has been considered to meet the increasing spectrum requirement in the future wireless system. To limit the signal bandwidth and cancel the out-band interference the band-pass filters are used, which introduce the waveform distortion and inter-symbol interference (ISI. Therefore, a single hidden-layer neural network (NN-based receiver is proposed to jointly equalize and demodulate the received signal. The impulse response of the system is static and the network parameters can be obtained after off-line training. The number of the hidden nodes is also determined through simulations. Simulation results show that the NN-based receiver works well in the communication system with different allocated bandwidths. By observing the modified confusion matrix, the false symbol decision is relevant to modulation index, waveform distortions and the ISI.

  8. RMBNToolbox: random models for biochemical networks

    Directory of Open Access Journals (Sweden)

    Niemi Jari

    2007-05-01

    Full Text Available Abstract Background There is an increasing interest to model biochemical and cell biological networks, as well as to the computational analysis of these models. The development of analysis methodologies and related software is rapid in the field. However, the number of available models is still relatively small and the model sizes remain limited. The lack of kinetic information is usually the limiting factor for the construction of detailed simulation models. Results We present a computational toolbox for generating random biochemical network models which mimic real biochemical networks. The toolbox is called Random Models for Biochemical Networks. The toolbox works in the Matlab environment, and it makes it possible to generate various network structures, stoichiometries, kinetic laws for reactions, and parameters therein. The generation can be based on statistical rules and distributions, and more detailed information of real biochemical networks can be used in situations where it is known. The toolbox can be easily extended. The resulting network models can be exported in the format of Systems Biology Markup Language. Conclusion While more information is accumulating on biochemical networks, random networks can be used as an intermediate step towards their better understanding. Random networks make it possible to study the effects of various network characteristics to the overall behavior of the network. Moreover, the construction of artificial network models provides the ground truth data needed in the validation of various computational methods in the fields of parameter estimation and data analysis.

  9. Behavior and Particularities of Academic Production on “Management Accounting” Published in the Database ISI WEB of Science Core Collection Between 1985 and 2014

    Directory of Open Access Journals (Sweden)

    Henrique César Melo Ribeiro

    2017-03-01

    Full Text Available The objective in this study was to analyze the behavior and the particularities of the academic production on the theme Management Accounting published in the ISI Web of Science Core Collection from 1985 to 2014. Methodologically, this research used the bibliometric and sociometric analysis techniques. The main results were: evolution of the theme as from 2007; Accounting, Organizations and Society and Management Accounting Research, which were the journals that most published on the subject “Management Accounting”; Lukka, K. was the most prolific author; the University of Turku was the institution that stood out; and the United States of America was emphasized in the production on that theme. In relation to the co-authorship networks, their low degree density was observed, leading to a high degree centrality and betweenness. And the themes that were highlighted in this study were: education; accounting teaching and research; Cost management; Management control; strategic management; and management accounting system. It is concluded in a macro way that this study evidenced inherent and contemporary information on the subject “Management Accounting”, focusing on its nuances in the behavior and particularities of its academic production, published in ISI Web of Science Core Collection from 1985 till 2014.

  10. What is the difference between a 2, 3, 4, or 5 °C world and how good are we at telling this difference? Results from ISI-MIP the first Inter-Sectoral Impact Model Intercomparison Project

    Science.gov (United States)

    Frieler, K.; Huber, V.; Piontek, F.; Schewe, J.; Serdeczny, O.; Warszawski, L.

    2012-12-01

    The Inter-sectoral Impact Model Intercomparison Project (ISI-MIP) aims to synthesize the state-of-the-art knowledge of climate change impacts at different levels of global warming. Over 25 climate impact modelling teams from around the world, working within the agriculture, water, biomes, infrastructure and health sectors, are collaborating to find answers to the question "What is the difference between a 2, 3, 4, or 5 °C world and how good are we at telling this difference?". The analysis is based on common, bias-corrected climate projections, and socio-economic pathways. The first, fast-tracked phase of the ISI-MIP has a focus on global impact models. The project's experimental design is formulated to distinguish the uncertainty introduced by the impact models themselves, from the inherent uncertainty in the climate projections and the variety of plausible socio-economic futures. Novel metrics, developed to emphasize societal impacts, will be used to identify regional 'hot-spots' of climate change impacts, as well as to quantify the cross-sectoral impact of the increasing frequency of extreme events in future climates. We present here first results from the Fast-Track phase of the project covering impact simulations in the biomes, agriculture and water sectors, in which the societal impacts of climate change are quantified for different levels of global warming. We also discuss the design of the scenario set-up and impact indicators chosen to suit the unique cross-sectoral, multi-model nature of the project.

  11. L1 influence in the L2 acquisition of isiXhosa verb placement by ...

    African Journals Online (AJOL)

    1. Introduction. In second language (L2) acquisition research conducted within ..... versus Afrikaans-speaking beginner learners of isiXhosa, with regard to verb ..... Language contact within one home is also illustrated by the case of the four L1 ...

  12. Biological transportation networks: Modeling and simulation

    KAUST Repository

    Albi, Giacomo

    2015-09-15

    We present a model for biological network formation originally introduced by Cai and Hu [Adaptation and optimization of biological transport networks, Phys. Rev. Lett. 111 (2013) 138701]. The modeling of fluid transportation (e.g., leaf venation and angiogenesis) and ion transportation networks (e.g., neural networks) is explained in detail and basic analytical features like the gradient flow structure of the fluid transportation network model and the impact of the model parameters on the geometry and topology of network formation are analyzed. We also present a numerical finite-element based discretization scheme and discuss sample cases of network formation simulations.

  13. Inelastic instruments at the ISIS facility

    International Nuclear Information System (INIS)

    Taylor, A.D.

    1988-01-01

    This summarises the status of the inelastic spectrometers at the ISIS facility and gives some highlights from their scientific programme. The inelastic spectrometers HET, TFXA and IRIS are now being used routinely by UK and International research groups and have produced notable scientific results. Work has progressed steadily on eVS. The PRISMA spectrometer, the product of a collaboration between CNR, Italy and RAL, was installed this summer. Earlier this year an agreement was reached in principle between the Rutherford Appleton Laboratory and the University of Wurzburg (West Germany) to build a second spectrometer (ROTAX) for the study of coherent inelastic excitations. A more sophisticated technical concept than that of PRISMA, based on a nonuniformly rotating analyser, it will allow a greater flexibility in the choice of dynamic scans. Substantial progress has also been made on the design of MARI, the sister spectrometer to HET, which is being built as part of the UK-Japan collaboration on pulsed neutron scattering. (author)

  14. Generalized Network Psychometrics : Combining Network and Latent Variable Models

    NARCIS (Netherlands)

    Epskamp, S.; Rhemtulla, M.; Borsboom, D.

    2017-01-01

    We introduce the network model as a formal psychometric model, conceptualizing the covariance between psychometric indicators as resulting from pairwise interactions between observable variables in a network structure. This contrasts with standard psychometric models, in which the covariance between

  15. Topomapping of Mars with HRSC images, ISIS, and a commercial stereo workstation

    Science.gov (United States)

    Kirk, R. L.; Howington-Kraus, E.; Galuszka, D.; Redding, B.; Hare, T. M.

    either in SOCET SET or in ISIS after exporting the DTM data back to it. This workflow was modified slightly for HRSC to take advantage of the standard processing performed at the DLR. As the first step in DTM production, we import VICAR Level 2 files (radiometrically calibrated but still in the raw camera geometry) into ISIS where they can immediately be used or exported to SOCET SET. HRSC Level 3 and 4 products (DTMs and orthorectified images) can also be imported and used as map-projected data (e.g., Level 4 DTMs from DLR can be compared with those produced in SOCET SET). Our results for images from orbit h1235 (covering western Candor Chasma) and the adjacent orbits h0894, h0905, h0927 (Nanedi Valles), are encouraging even though we were unable to take full advantage of the multiple-line design of HRSC in the analysis. The version of SOCET SET used (5.2) does not allow for the introduction of constraints in the bundle adjustment to ensure that the images from a single HRSC orbit share the same trajectory and pointing history. We therefore computed offsets to the trajectory and pointing angles for each image of the set as if they were fully independent Furthermore, a limitation of the existing SOCET (and ISIS) pushbroom scanner sensor models is that the exposure time per line is taken as constant for each image. HRSC is generally operated so that the line time changes multiple times per orbit, requiring us to split each VICAR image into multiple files for processing. Because the segments of each image could not be constrained to have consistent adjustments, the DTM of Nanedi Valles produced from these image segments contained small discontinuities at the segment boundaries. This problem did not arise for Candor Chasma 2 because the entire study area was covered without changes in the time per image line. The latest release of SOCET SET (5.3) incorporates the ability to do constrained bundle adjustment and should solve these problems. In addition, we are modifying the

  16. Resultaten boomkorsurvey 2013: BTS met onderzoeksvaartuigen Isis en Tridens (interview met Ingeborg de Boois)

    NARCIS (Netherlands)

    Boois, de I.J.

    2013-01-01

    Van begin augustus tot half september heeft IMARES de boomkorsurvey (BTS) uitgevoerd met de onderzoeksschepen Isis en Tridens. Op 29 maart 2014 wordt een bijeenkomst georganiseerd voor geinteresseerden, waar de resultaten van zowel de BTS als de bedrijfssurvey gepresenteerd worden. De BTS wordt

  17. Bayesian Network Webserver: a comprehensive tool for biological network modeling.

    Science.gov (United States)

    Ziebarth, Jesse D; Bhattacharya, Anindya; Cui, Yan

    2013-11-01

    The Bayesian Network Webserver (BNW) is a platform for comprehensive network modeling of systems genetics and other biological datasets. It allows users to quickly and seamlessly upload a dataset, learn the structure of the network model that best explains the data and use the model to understand relationships between network variables. Many datasets, including those used to create genetic network models, contain both discrete (e.g. genotype) and continuous (e.g. gene expression traits) variables, and BNW allows for modeling hybrid datasets. Users of BNW can incorporate prior knowledge during structure learning through an easy-to-use structural constraint interface. After structure learning, users are immediately presented with an interactive network model, which can be used to make testable hypotheses about network relationships. BNW, including a downloadable structure learning package, is available at http://compbio.uthsc.edu/BNW. (The BNW interface for adding structural constraints uses HTML5 features that are not supported by current version of Internet Explorer. We suggest using other browsers (e.g. Google Chrome or Mozilla Firefox) when accessing BNW). ycui2@uthsc.edu. Supplementary data are available at Bioinformatics online.

  18. Eight challenges for network epidemic models

    Directory of Open Access Journals (Sweden)

    Lorenzo Pellis

    2015-03-01

    Full Text Available Networks offer a fertile framework for studying the spread of infection in human and animal populations. However, owing to the inherent high-dimensionality of networks themselves, modelling transmission through networks is mathematically and computationally challenging. Even the simplest network epidemic models present unanswered questions. Attempts to improve the practical usefulness of network models by including realistic features of contact networks and of host–pathogen biology (e.g. waning immunity have made some progress, but robust analytical results remain scarce. A more general theory is needed to understand the impact of network structure on the dynamics and control of infection. Here we identify a set of challenges that provide scope for active research in the field of network epidemic models.

  19. Complex networks-based energy-efficient evolution model for wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhu Hailin [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China)], E-mail: zhuhailin19@gmail.com; Luo Hong [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China); Peng Haipeng; Li Lixiang; Luo Qun [Information Secure Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876 (China)

    2009-08-30

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  20. Complex networks-based energy-efficient evolution model for wireless sensor networks

    International Nuclear Information System (INIS)

    Zhu Hailin; Luo Hong; Peng Haipeng; Li Lixiang; Luo Qun

    2009-01-01

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  1. Longitudinal analysis of meta-analysis literatures in the database of ISI Web of Science.

    Science.gov (United States)

    Zhu, Changtai; Jiang, Ting; Cao, Hao; Sun, Wenguang; Chen, Zhong; Liu, Jinming

    2015-01-01

    The meta-analysis is regarded as an important evidence for making scientific decision. The database of ISI Web of Science collected a great number of high quality literatures including meta-analysis literatures. However, it is significant to understand the general characteristics of meta-analysis literatures to outline the perspective of meta-analysis. In this present study, we summarized and clarified some features on these literatures in the database of ISI Web of Science. We retrieved the meta-analysis literatures in the database of ISI Web of Science including SCI-E, SSCI, A&HCI, CPCI-S, CPCI-SSH, CCR-E, and IC. The annual growth rate, literature category, language, funding, index citation, agencies and countries/territories of the meta-analysis literatures were analyzed, respectively. A total of 95,719 records, which account for 0.38% (99% CI: 0.38%-0.39%) of all literatures, were found in the database. From 1997 to 2012, the annual growth rate of meta-analysis literatures was 18.18%. The literatures involved in many categories, languages, fundings, citations, publication agencies, and countries/territories. Interestingly, the index citation frequencies of the meta-analysis were significantly higher than that of other type literatures such as multi-centre study, randomize controlled trial, cohort study, case control study, and cases report (Panalysis has been becoming more and more prominent in recent years. In future, in order to promote the validity of meta-analysis, the CONSORT and PRISMA standard should be continuously popularized in the field of evidence-based medicine.

  2. Brand Marketing Model on Social Networks

    Directory of Open Access Journals (Sweden)

    Jolita Jezukevičiūtė

    2014-04-01

    Full Text Available The paper analyzes the brand and its marketing solutions onsocial networks. This analysis led to the creation of improvedbrand marketing model on social networks, which will contributeto the rapid and cheap organization brand recognition, increasecompetitive advantage and enhance consumer loyalty. Therefore,the brand and a variety of social networks are becoming a hotresearch area for brand marketing model on social networks.The world‘s most successful brand marketing models exploratoryanalysis of a single case study revealed a brand marketingsocial networking tools that affect consumers the most. Basedon information analysis and methodological studies, develop abrand marketing model on social networks.

  3. Introducing Synchronisation in Deterministic Network Models

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Jessen, Jan Jakob; Nielsen, Jens Frederik D.

    2006-01-01

    The paper addresses performance analysis for distributed real time systems through deterministic network modelling. Its main contribution is the introduction and analysis of models for synchronisation between tasks and/or network elements. Typical patterns of synchronisation are presented leading...... to the suggestion of suitable network models. An existing model for flow control is presented and an inherent weakness is revealed and remedied. Examples are given and numerically analysed through deterministic network modelling. Results are presented to highlight the properties of the suggested models...

  4. Management of synchronized network activity by highly active neurons

    International Nuclear Information System (INIS)

    Shein, Mark; Raichman, Nadav; Ben-Jacob, Eshel; Volman, Vladislav; Hanein, Yael

    2008-01-01

    Increasing evidence supports the idea that spontaneous brain activity may have an important functional role. Cultured neuronal networks provide a suitable model system to search for the mechanisms by which neuronal spontaneous activity is maintained and regulated. This activity is marked by synchronized bursting events (SBEs)—short time windows (hundreds of milliseconds) of rapid neuronal firing separated by long quiescent periods (seconds). However, there exists a special subset of rapidly firing neurons whose activity also persists between SBEs. It has been proposed that these highly active (HA) neurons play an important role in the management (i.e. establishment, maintenance and regulation) of the synchronized network activity. Here, we studied the dynamical properties and the functional role of HA neurons in homogeneous and engineered networks, during early network development, upon recovery from chemical inhibition and in response to electrical stimulations. We found that their sequences of inter-spike intervals (ISI) exhibit long time correlations and a unimodal distribution. During the network's development and under intense inhibition, the observed activity follows a transition period during which mostly HA neurons are active. Studying networks with engineered geometry, we found that HA neurons are precursors (the first to fire) of the spontaneous SBEs and are more responsive to electrical stimulations

  5. The Isis operation: working in nuclear environment

    International Nuclear Information System (INIS)

    Hilmoine, R.

    1987-01-01

    After describing the upper internal support structures of the Chinon A3 reactor, difficulties of ISIS operation are presented. The different phases to sort out the problem are: in-core topography, conforming the full-scale mock-up to the repair area, learning on this mock-up and in-core reparation. Robots have a telescopic mast 11 m long, 0.22 m in diameter, completed by jointed arms reaching a radius of 2.7 m. The load carrying capacity is then 70 daN and the repeatability is 0.1 mm. Several tool heads are handled by the robot: telemeter and reconstruction, scouring, welding, screwing. A high level computerized control system is organized around central unit monitoring several local units. It allows automatic or semi-automatic working modes. Our experience in operation and possible improvements are described [fr

  6. Current activities and challenges of the European network for inspection and qualification (ENIQ)

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Oliver [European Commission, Joint Research Centre (JRC), Petten (Netherlands). Institute for Energy and Transport (IET); Martin, Etienne [EDF, St Denis (France). Direction Production Ingenierie; Booler, Russ [AMEC Clean Energy Europe, Warrington (United Kingdom); Zetterwall, Tommy [Swedish Qualification Centre, Taeby (Sweden); Walker, Tony [Rolls-Royce Submarines, Derby (United Kingdom)

    2014-10-15

    This article describes the development of the European Network for Inspection and Qualification (ENIQ) since the previous presentation of the network in the 2011 April/May edition of this journal, covering mainly the new technical challenges facing the network and resulting projects as well as the establishment of the new Task Group for Inspection Qualification Bodies. ENIQ is a utility-driven network dealing with the reliability and effectiveness of non-destructive testing (NDT) for nuclear power plants (NPP). ENIQ is recognised as one of the main contributors to today's global qualification codes and guidelines for in-service inspection (ISI) and has published nearly 50 documents. Among them are the 'European Methodology for Qualification of Non-Destructive Testing', the first qualification methodology based on technical justifications, the 'European Framework Document for Risk-Informed In-Service Inspection (RI-ISI)', and various recommend practices. In addition ENIQ has carried out two pilot studies and a number of surveys. In 2012, ENIQ joined the European based R and D association on Gen II and III reactors, NUGENIA, making ENIQ its 8{sup th} technical area. Following the entry into NUGENIA, ENIQ members have updated the ENIQ roadmap and included a number of new technical challenges facing its members in the near future. Also ENIQ established a third task group in 2013, the Task Group for Inspection Qualification Bodies (TGIQB), which should serve as an exchange forum for inspection qualification bodies. ENIQ is currently preparing or performing new projects and studies to tackle these challenges and new recommended practices and reports are likely to evolve from these projects, which will enable ENIQ to maintain its role as one of the main contributors to today's global qualification codes and guidelines for ISI.

  7. Current activities and challenges of the European network for inspection and qualification (ENIQ)

    International Nuclear Information System (INIS)

    Martin, Oliver; Martin, Etienne; Zetterwall, Tommy; Walker, Tony

    2014-01-01

    This article describes the development of the European Network for Inspection and Qualification (ENIQ) since the previous presentation of the network in the 2011 April/May edition of this journal, covering mainly the new technical challenges facing the network and resulting projects as well as the establishment of the new Task Group for Inspection Qualification Bodies. ENIQ is a utility-driven network dealing with the reliability and effectiveness of non-destructive testing (NDT) for nuclear power plants (NPP). ENIQ is recognised as one of the main contributors to today's global qualification codes and guidelines for in-service inspection (ISI) and has published nearly 50 documents. Among them are the 'European Methodology for Qualification of Non-Destructive Testing', the first qualification methodology based on technical justifications, the 'European Framework Document for Risk-Informed In-Service Inspection (RI-ISI)', and various recommend practices. In addition ENIQ has carried out two pilot studies and a number of surveys. In 2012, ENIQ joined the European based R and D association on Gen II and III reactors, NUGENIA, making ENIQ its 8 th technical area. Following the entry into NUGENIA, ENIQ members have updated the ENIQ roadmap and included a number of new technical challenges facing its members in the near future. Also ENIQ established a third task group in 2013, the Task Group for Inspection Qualification Bodies (TGIQB), which should serve as an exchange forum for inspection qualification bodies. ENIQ is currently preparing or performing new projects and studies to tackle these challenges and new recommended practices and reports are likely to evolve from these projects, which will enable ENIQ to maintain its role as one of the main contributors to today's global qualification codes and guidelines for ISI.

  8. Improvement of ISI techniques by multi-frequency eddy current testing method for steam generator tube in PWR plant

    International Nuclear Information System (INIS)

    Endo, Takashi; Kamimura, Takeo; Nishihara, Masatoshi; Araki, Yasuo; Fukui, Shigetaka.

    1982-05-01

    Eddy current flaw detection techniques are applied to the in-service inspection (ISI) of steam generator tubes in pressurized water reactors (PWR) plant. To improve the reliability and operating efficiency of the plants, efforts are being made to develop eddy current testing methods of various kinds. Multi-frequency eddy current testing method, one of new method, has recently been applied to actual heat exchanger tubes, contributing to the improvement of the detectability and signal evaluation of the ISI. The outline of multi-frequency eddy current testing method and its effects on the improvement of flaw detecting and signal evaluation accuracy are described. (author)

  9. Probabilistic Decision Making with Spikes: From ISI Distributions to Behaviour via Information Gain.

    Directory of Open Access Journals (Sweden)

    Javier A Caballero

    Full Text Available Computational theories of decision making in the brain usually assume that sensory 'evidence' is accumulated supporting a number of hypotheses, and that the first accumulator to reach threshold triggers a decision in favour of its associated hypothesis. However, the evidence is often assumed to occur as a continuous process whose origins are somewhat abstract, with no direct link to the neural signals - action potentials or 'spikes' - that must ultimately form the substrate for decision making in the brain. Here we introduce a new variant of the well-known multi-hypothesis sequential probability ratio test (MSPRT for decision making whose evidence observations consist of the basic unit of neural signalling - the inter-spike interval (ISI - and which is based on a new form of the likelihood function. We dub this mechanism s-MSPRT and show its precise form for a range of realistic ISI distributions with positive support. In this way we show that, at the level of spikes, the refractory period may actually facilitate shorter decision times, and that the mechanism is robust against poor choice of the hypothesized data distribution. We show that s-MSPRT performance is related to the Kullback-Leibler divergence (KLD or information gain between ISI distributions, through which we are able to link neural signalling to psychophysical observation at the behavioural level. Thus, we find the mean information needed for a decision is constant, thereby offering an account of Hick's law (relating decision time to the number of choices. Further, the mean decision time of s-MSPRT shows a power law dependence on the KLD offering an account of Piéron's law (relating reaction time to stimulus intensity. These results show the foundations for a research programme in which spike train analysis can be made the basis for predictions about behavior in multi-alternative choice tasks.

  10. Probabilistic Decision Making with Spikes: From ISI Distributions to Behaviour via Information Gain.

    Science.gov (United States)

    Caballero, Javier A; Lepora, Nathan F; Gurney, Kevin N

    2015-01-01

    Computational theories of decision making in the brain usually assume that sensory 'evidence' is accumulated supporting a number of hypotheses, and that the first accumulator to reach threshold triggers a decision in favour of its associated hypothesis. However, the evidence is often assumed to occur as a continuous process whose origins are somewhat abstract, with no direct link to the neural signals - action potentials or 'spikes' - that must ultimately form the substrate for decision making in the brain. Here we introduce a new variant of the well-known multi-hypothesis sequential probability ratio test (MSPRT) for decision making whose evidence observations consist of the basic unit of neural signalling - the inter-spike interval (ISI) - and which is based on a new form of the likelihood function. We dub this mechanism s-MSPRT and show its precise form for a range of realistic ISI distributions with positive support. In this way we show that, at the level of spikes, the refractory period may actually facilitate shorter decision times, and that the mechanism is robust against poor choice of the hypothesized data distribution. We show that s-MSPRT performance is related to the Kullback-Leibler divergence (KLD) or information gain between ISI distributions, through which we are able to link neural signalling to psychophysical observation at the behavioural level. Thus, we find the mean information needed for a decision is constant, thereby offering an account of Hick's law (relating decision time to the number of choices). Further, the mean decision time of s-MSPRT shows a power law dependence on the KLD offering an account of Piéron's law (relating reaction time to stimulus intensity). These results show the foundations for a research programme in which spike train analysis can be made the basis for predictions about behavior in multi-alternative choice tasks.

  11. Modeling Network Interdiction Tasks

    Science.gov (United States)

    2015-09-17

    118 xiii Table Page 36 Computation times for weighted, 100-node random networks for GAND Approach testing in Python ...in Python . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 38 Accuracy measures for weighted, 100-node random networks for GAND...networks [15:p. 1]. A common approach to modeling network interdiction is to formulate the problem in terms of a two-stage strategic game between two

  12. Simultaneous fits in ISIS on the example of GRO J1008-57

    Science.gov (United States)

    Kühnel, Matthias; Müller, Sebastian; Kreykenbohm, Ingo; Schwarm, Fritz-Walter; Grossberger, Christoph; Dauser, Thomas; Pottschmidt, Katja; Ferrigno, Carlo; Rothschild, Richard E.; Klochkov, Dmitry; Staubert, Rüdiger; Wilms, Joern

    2015-04-01

    Parallel computing and steadily increasing computation speed have led to a new tool for analyzing multiple datasets and datatypes: fitting several datasets simultaneously. With this technique, physically connected parameters of individual data can be treated as a single parameter by implementing this connection into the fit directly. We discuss the terminology, implementation, and possible issues of simultaneous fits based on the X-ray data analysis tool Interactive Spectral Interpretation System (ISIS). While all data modeling tools in X-ray astronomy allow in principle fitting data from multiple data sets individually, the syntax used in these tools is not often well suited for this task. Applying simultaneous fits to the transient X-ray binary GRO J1008-57, we find that the spectral shape is only dependent on X-ray flux. We determine time independent parameters such as, e.g., the folding energy E_fold, with unprecedented precision.

  13. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  14. Simulations of chopper jitter at the LET neutron spectrometer at the ISIS TS2

    DEFF Research Database (Denmark)

    Klenø, Kaspar Hewitt; Lefmann, Kim; Willendrup, Peter Kjær

    2014-01-01

    The effect of uncertainty in chopper phasing (jitter) has been investigated for the high-resolution time-of-flight spectrometer LET at the ISIS second target station. The investigation is carried out using virtual experiments, with the neutron simulation package McStas, where the chopper jitter i...

  15. Complex Networks in Psychological Models

    Science.gov (United States)

    Wedemann, R. S.; Carvalho, L. S. A. V. D.; Donangelo, R.

    We develop schematic, self-organizing, neural-network models to describe mechanisms associated with mental processes, by a neurocomputational substrate. These models are examples of real world complex networks with interesting general topological structures. Considering dopaminergic signal-to-noise neuronal modulation in the central nervous system, we propose neural network models to explain development of cortical map structure and dynamics of memory access, and unify different mental processes into a single neurocomputational substrate. Based on our neural network models, neurotic behavior may be understood as an associative memory process in the brain, and the linguistic, symbolic associative process involved in psychoanalytic working-through can be mapped onto a corresponding process of reconfiguration of the neural network. The models are illustrated through computer simulations, where we varied dopaminergic modulation and observed the self-organizing emergent patterns at the resulting semantic map, interpreting them as different manifestations of mental functioning, from psychotic through to normal and neurotic behavior, and creativity.

  16. Artificial neural network modelling

    CERN Document Server

    Samarasinghe, Sandhya

    2016-01-01

    This book covers theoretical aspects as well as recent innovative applications of Artificial Neural networks (ANNs) in natural, environmental, biological, social, industrial and automated systems. It presents recent results of ANNs in modelling small, large and complex systems under three categories, namely, 1) Networks, Structure Optimisation, Robustness and Stochasticity 2) Advances in Modelling Biological and Environmental Systems and 3) Advances in Modelling Social and Economic Systems. The book aims at serving undergraduates, postgraduates and researchers in ANN computational modelling. .

  17. Social networks and cooperation: a bibliometric study

    Directory of Open Access Journals (Sweden)

    Ana Paula Lopes

    2013-05-01

    Full Text Available The social network analysis involves social and behavioral science. The decentralization of productive activities, such as the formation of "network organizations" as a result of downsizing of large corporate structures of the past, marked by outsoucing and formation of alliances, shows the importance of this theme. The main objective of this paper is to analyze the theory of cooperation and social networks over a period of 24 years. For this, was performed a bibliometric study with content analysis. The database chosen for the initial sample search was ISI Web of Science. The search topics were “social network” and “cooperation”. Were analyzed 97 articles and their references, through networks of citations. The main identified research groups dealing with issues related to trust, strategic alliances, natural cooperation, game theory, social capital, intensity of interaction, reciprocity and innovation. It was found that the publications occurred in a large number of journals, which indicates that the theme is multidisciplinary, and only five journals published at least three articles. Although the first publication has occurred in 1987, was from 2006 that the publications effectively increased. The areas most related to the theme of the research were performance, evolution, management, graphics, model and game theory.

  18. Gossip spread in social network Models

    Science.gov (United States)

    Johansson, Tobias

    2017-04-01

    Gossip almost inevitably arises in real social networks. In this article we investigate the relationship between the number of friends of a person and limits on how far gossip about that person can spread in the network. How far gossip travels in a network depends on two sets of factors: (a) factors determining gossip transmission from one person to the next and (b) factors determining network topology. For a simple model where gossip is spread among people who know the victim it is known that a standard scale-free network model produces a non-monotonic relationship between number of friends and expected relative spread of gossip, a pattern that is also observed in real networks (Lind et al., 2007). Here, we study gossip spread in two social network models (Toivonen et al., 2006; Vázquez, 2003) by exploring the parameter space of both models and fitting them to a real Facebook data set. Both models can produce the non-monotonic relationship of real networks more accurately than a standard scale-free model while also exhibiting more realistic variability in gossip spread. Of the two models, the one given in Vázquez (2003) best captures both the expected values and variability of gossip spread.

  19. The Integrated Science Investigation of the Sun (ISIS): Energetic Particle Measurements for the Solar Probe Plus Mission

    Science.gov (United States)

    McComas, D. J.; Christian, E. R.; Wiedenbeck, M. E.; McNutt, R. L.; Cummings, A. C.; Desai, M. I.; Giacalone, J.; Hill, M. E.; Mewaldt, R. A.; Krimigis, SA. M.; hide

    2011-01-01

    One of the major goals of NASA's Solar Probe Plus (SPP) mission is to determine the mechanisms that accelerate and transport high-energy particles from the solar atmosphere out into the heliosphere. Processes such as coronal mass ejections and solar flares, which peak roughly every 11 years around solar maximum, release huge quantities of energized matter, magnetic fields and electromagnetic radiation into space. The high-energy particles, known as solar energetic particles or SEPs, present a serious radiation threat to human explorers living and working outside low-Earth orbit and to technological assets such as communications and scientific satellites in space. This talk describes the Integrated Science Investigation of the Sun (ISIS) - Energetic Particle Instrument suite. ISIS measures key properties such as intensities, energy spectra, composition, and angular distributions of the low-energy suprathermal source populations, as well as the more hazardous, higher energy particles ejected from the Sun. By making the first-ever direct measurements of the near-Sun regions where the acceleration takes place, ISIS will provide the critical measurements that, when integrated with other SPP instruments and with solar and interplanetary observations, will lead to a revolutionary new understanding of the Sun and major drivers of solar system space weather.

  20. Study of Scientific Production of Community Medicines' Department Indexed in ISI Citation Databases.

    Science.gov (United States)

    Khademloo, Mohammad; Khaseh, Ali Akbar; Siamian, Hasan; Aligolbandi, Kobra; Latifi, Mahsoomeh; Yaminfirooz, Mousa

    2016-10-01

    In the scientometric, the main criterion in determining the scientific position and ranking of the scientific centers, particularly the universities, is the rate of scientific production and innovation, and in all participations in the global scientific development. One of the subjects more involved in repeatedly dealt with science and technology and effective on the improvement of health is medical science fields. In this research using scientometric and citation analysis, we studied the rate of scientific productions in the field of community medicine, which is the numbers of articles published and indexed in ISI database from 2000 to 2010. This study is scientometric using the survey and analytical citation. The study samples included all of the articles in the ISI database from 2000 to 2010. For the data collection, the advance method of searching was used at the ISI database. The ISI analyses software and descriptive statistics were used for data analysis. Results showed that among the five top universities in producing documents, Tehran University of Medical Sciences with 88 (22.22%) documents are allocated to the first rank of scientific products. M. Askarian with 36 (90/9%) published documents; most of the scientific outputs in Community medicine, in the international arena is the most active author in this field. In collaboration with other writers, Iranian departments of Community Medicine with 27 published articles have the greatest participation with scholars of English authors. In the process of scientific outputs, the results showed that the scientific process was in its lowest in the years 2000 to 2004, and while the department of Community medicine in 2009 allocated most of the production process to itself. Iranian Journal of Public Health and Saudi Medical Journal each of them had 16 articles which had most participation rate in the publishing of community medicine's department. On the type of carrier, community medicine's department by

  1. Transnational Research Networks in Chinese Scientific Production. An Investigation on Health-Industry Related Sectors.

    Science.gov (United States)

    Rubini, Lauretta; Pollio, Chiara; Di Tommaso, Marco R

    2017-08-29

    Transnational research networks (TRN) are becoming increasingly complex. Such complexity may have both positive and negative effects on the quality of research. Our work studies the evolution over time of Chinese TRN and the role of complexity on the quality of Chinese research, given the leading role this country has recently acquired in international science. We focus on the fields of geriatrics and gerontology. We build an original dataset of all scientific publications of China in these areas in 2009, 2012 and 2015, starting from the ISI Web of Knowledge (ISI WoK) database. Using Social Network Analysis (SNA), we analyze the change in scientific network structure across time. Second, we design indices to control for the different aspects of networks complexity (number of authors, country heterogeneity and institutional heterogeneity) and we perform negative binomial regressions to identify the main determinants of research quality. Our analysis shows that research networks in the field of geriatrics and gerontology have gradually become wider in terms of countries and have become more balanced. Furthermore, our results identify that different forms of complexity have different impacts on quality, including a reciprocal moderating effect. In particular, according to our analysis, research quality benefits from complex research networks both in terms of countries and of types of institutions involved, but that such networks should be "compact" in terms of number of authors. Eventually, we suggest that complexity should be carefully taken into account when designing policies aimed at enhancing the quality of research.

  2. Brand Marketing Model on Social Networks

    OpenAIRE

    Jolita Jezukevičiūtė; Vida Davidavičienė

    2014-01-01

    The paper analyzes the brand and its marketing solutions onsocial networks. This analysis led to the creation of improvedbrand marketing model on social networks, which will contributeto the rapid and cheap organization brand recognition, increasecompetitive advantage and enhance consumer loyalty. Therefore,the brand and a variety of social networks are becoming a hotresearch area for brand marketing model on social networks.The world‘s most successful brand marketing models exploratoryanalys...

  3. A model of coauthorship networks

    Science.gov (United States)

    Zhou, Guochang; Li, Jianping; Xie, Zonglin

    2017-10-01

    A natural way of representing the coauthorship of authors is to use a generalization of graphs known as hypergraphs. A random geometric hypergraph model is proposed here to model coauthorship networks, which is generated by placing nodes on a region of Euclidean space randomly and uniformly, and connecting some nodes if the nodes satisfy particular geometric conditions. Two kinds of geometric conditions are designed to model the collaboration patterns of academic authorities and basic researches respectively. The conditions give geometric expressions of two causes of coauthorship: the authority and similarity of authors. By simulation and calculus, we show that the forepart of the degree distribution of the network generated by the model is mixture Poissonian, and the tail is power-law, which are similar to these of some coauthorship networks. Further, we show more similarities between the generated network and real coauthorship networks: the distribution of cardinalities of hyperedges, high clustering coefficient, assortativity, and small-world property

  4. Risiko Kegagalan pada Kualitas Produksi Air Minum Isi Ulang di Kecamatan Sukolilo Surabaya Menggunakan Failure Mode and Effect Analysis (FMEA

    Directory of Open Access Journals (Sweden)

    Egy Asri Yassin Utami

    2017-01-01

    Full Text Available Kebutuhan manusia terhadap air minum yang layak konsumsi semakin lama semakin berkembang sebanding dengan perkembangan penduduk yang kian lama kian meningkat. Untuk dapat memenuhi kebutuhan air minum sehari-hari, banyak industri yang membuka usaha air minum diantaranya adalah adanya depot air minum isi ulang (DAMIU. Pemilihan depot air minum isi ulang sebagai alternatif air minum menjadi risiko yang dapat membahayakan kesehatan jika kualitas depot air minum isi ulang masih diragukan. Penilitian ini menggunakan metode FMEA (Failure Mode and Effect Analysis untuk mencari prioritas terjadinya kegagalan dalam proses pengolahan air minum isi ulang. Risiko-risiko yang didapat harus memiliki nilai agar terukur sehingga ditemukan prioritas penanganan dan dicari upaya untuk perbaikan. Penilaian tersebut dikenal dengan nilai RPN (Risk Priority Number yaitu hasil pengalian dari tingkat keparahan (severity, frekuensi kejadian (occurrence dan tingkat deteksi (detection. Berdasarkan hasil analisa dan identifikasi menggunakan metode FMEA diketahui bahwa kegagalan yang terjadi pada sistem UV dengan 3 prioritas tertinggi yaitu penggunaan UV dengan nilai RPN 100, waktu kontak UV dengan nilai RPN 100 dan penggantian filter awal dengan nilai RPN 64. Pada sistem UV dan ozon, 3 prioritas tertinggi yaitu waktu kontak sistem ozon, waktu kontak UV dan penggunaan UV dengan masing-masing nilai RPN yaitu 100. Sedangkan pada sistem UV, ozon dan RO (Reverse Osmosis 3 prioritas tertinggi sama seperti dengan sistem UV dan ozon dengan nilai RPN yang berbeda yaitu lama pengoperasian dengan nilai 100, waktu kontak dan kesesuaian penggunaan UV dengan nilai 64.

  5. Brand marketing model on social networks

    OpenAIRE

    Jezukevičiūtė, Jolita; Davidavičienė, Vida

    2014-01-01

    Paper analyzes the brand and its marketing solutions on social networks. This analysis led to the creation of improved brand marketing model on social networks, which will contribute to the rapid and cheap organization brand recognition, increase competitive advantage and enhance consumer loyalty. Therefore, the brand and a variety of social networks are becoming a hot research area for brand marketing model on social networks. The world‘s most successful brand marketing models exploratory an...

  6. Nonlinear predictive control for adaptive adjustments of deep brain stimulation parameters in basal ganglia-thalamic network.

    Science.gov (United States)

    Su, Fei; Wang, Jiang; Niu, Shuangxia; Li, Huiyan; Deng, Bin; Liu, Chen; Wei, Xile

    2018-02-01

    The efficacy of deep brain stimulation (DBS) for Parkinson's disease (PD) depends in part on the post-operative programming of stimulation parameters. Closed-loop stimulation is one method to realize the frequent adjustment of stimulation parameters. This paper introduced the nonlinear predictive control method into the online adjustment of DBS amplitude and frequency. This approach was tested in a computational model of basal ganglia-thalamic network. The autoregressive Volterra model was used to identify the process model based on physiological data. Simulation results illustrated the efficiency of closed-loop stimulation methods (amplitude adjustment and frequency adjustment) in improving the relay reliability of thalamic neurons compared with the PD state. Besides, compared with the 130Hz constant DBS the closed-loop stimulation methods can significantly reduce the energy consumption. Through the analysis of inter-spike-intervals (ISIs) distribution of basal ganglia neurons, the evoked network activity by the closed-loop frequency adjustment stimulation was closer to the normal state. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. Merger of noun classes 3 and 1: A case study with bilingual isiXhosa ...

    African Journals Online (AJOL)

    Class reduction (the loss of a noun class) in Southern Bantu languages is an acknowledged but under-researched phenomenon. A recent study of isiXhosa concords suggests an incipient merger of noun classes 11 and 5, but no research to date has examined other possible concord mergers or concord flux in the ...

  8. Target-Centric Network Modeling

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence...... reporting formats, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling......, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues by dealing with multi-layered target networks that cut across political, economic, social, technological, and military issues...

  9. An Exegetical Note on Plutarch, Isis and Osiris 351E

    Directory of Open Access Journals (Sweden)

    Geert Roskam

    2015-06-01

    Full Text Available In this article, I deal with a short but complex sentence at the end of the first chapter of Plutarch’s Isis and Osiris. Plutarch there says that «the happiness of even the eternal life, which God has obtained as his portion, consists in the fact that the things that come to be do not, through knowledge, fail in advance» (351E. This obscure phrase implies, so I argue, that Plutarch’s providential God has a knowledge of particular contingencies and that this knowledge indeed contributes to his eternal blessedness without affecting His essence.

  10. A Complex Network Approach to Distributional Semantic Models.

    Directory of Open Access Journals (Sweden)

    Akira Utsumi

    Full Text Available A number of studies on network analysis have focused on language networks based on free word association, which reflects human lexical knowledge, and have demonstrated the small-world and scale-free properties in the word association network. Nevertheless, there have been very few attempts at applying network analysis to distributional semantic models, despite the fact that these models have been studied extensively as computational or cognitive models of human lexical knowledge. In this paper, we analyze three network properties, namely, small-world, scale-free, and hierarchical properties, of semantic networks created by distributional semantic models. We demonstrate that the created networks generally exhibit the same properties as word association networks. In particular, we show that the distribution of the number of connections in these networks follows the truncated power law, which is also observed in an association network. This indicates that distributional semantic models can provide a plausible model of lexical knowledge. Additionally, the observed differences in the network properties of various implementations of distributional semantic models are consistently explained or predicted by considering the intrinsic semantic features of a word-context matrix and the functions of matrix weighting and smoothing. Furthermore, to simulate a semantic network with the observed network properties, we propose a new growing network model based on the model of Steyvers and Tenenbaum. The idea underlying the proposed model is that both preferential and random attachments are required to reflect different types of semantic relations in network growth process. We demonstrate that this model provides a better explanation of network behaviors generated by distributional semantic models.

  11. QSAR modelling using combined simple competitive learning networks and RBF neural networks.

    Science.gov (United States)

    Sheikhpour, R; Sarram, M A; Rezaeian, M; Sheikhpour, E

    2018-04-01

    The aim of this study was to propose a QSAR modelling approach based on the combination of simple competitive learning (SCL) networks with radial basis function (RBF) neural networks for predicting the biological activity of chemical compounds. The proposed QSAR method consisted of two phases. In the first phase, an SCL network was applied to determine the centres of an RBF neural network. In the second phase, the RBF neural network was used to predict the biological activity of various phenols and Rho kinase (ROCK) inhibitors. The predictive ability of the proposed QSAR models was evaluated and compared with other QSAR models using external validation. The results of this study showed that the proposed QSAR modelling approach leads to better performances than other models in predicting the biological activity of chemical compounds. This indicated the efficiency of simple competitive learning networks in determining the centres of RBF neural networks.

  12. Macroeconomic potentials of intelligent networks in Germany. Abstract; Gesamtwirtschaftliche Potenziale intelligenter Netze in Deutschland. Kurzfassung

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Within the contribution under consideration the Fraunhofer Institute for Systems and Innovation Research ISI (Karlsruhe, Federal Republic of Germany) determines the total economic effects of intelligent networks for the German economy. For the first time, the contributions of the different areas (energy, health, traffic, education, administration) are shown detailed. On the whole, it arises a societal total benefit of intelligent networks of 55.7 billion Euro per year.

  13. Modeling Renewable Penertration Using a Network Economic Model

    Science.gov (United States)

    Lamont, A.

    2001-03-01

    This paper evaluates the accuracy of a network economic modeling approach in designing energy systems having renewable and conventional generators. The network approach models the system as a network of processes such as demands, generators, markets, and resources. The model reaches a solution by exchanging prices and quantity information between the nodes of the system. This formulation is very flexible and takes very little time to build and modify models. This paper reports an experiment designing a system with photovoltaic and base and peak fossil generators. The level of PV penetration as a function of its price and the capacities of the fossil generators were determined using the network approach and using an exact, analytic approach. It is found that the two methods agree very closely in terms of the optimal capacities and are nearly identical in terms of annual system costs.

  14. ISI system for MONJU primary heat transfer system (PHTS)

    International Nuclear Information System (INIS)

    Tagawa, Akihiro; Narisawa, Masataka; Ueda, Masashi; Yamashita, Takuya

    2007-01-01

    This paper describes the development of a new inspection robot for the in-service inspection (ISI) of the heat transfer system of the FBR MONJU. The inspection is carried out using a tire type for volumetric tests at elevated temperature (Atmosphere 55 degree C, Piping Surface 80 degree C) and irradiation dose condition (Dose Rate 10mSv/h, Piping Surface Dose Rate 15mSv/h). The inspection robot which took in a new tire type ultrasonic testing sensor and a new control method was developed. Detection goals that signal to noise ratio by over 2 for 50% thickness defect of wall were attained as a result of the functional test. (author)

  15. Environmental influences on the Indo-Pacific octocoral Isis hippuris Linnaeus 1758 (Alcyonacea: Isididae): genetic fixation or phenotypic plasticity?

    Science.gov (United States)

    Rowley, Sonia J; Pochon, Xavier; Watling, Les

    2015-01-01

    As conspicuous modular components of benthic marine habitats, gorgonian (sea fan) octocorals have perplexed taxonomists for centuries through their shear diversity, particularly throughout the Indo-Pacific. Phenotypic incongruence within and between seemingly unitary lineages across contrasting environments can provide the raw material to investigate processes of disruptive selection. Two distinct phenotypes of the Isidid Isis hippurisLinnaeus, 1758 partition between differing reef environments: long-branched bushy colonies on degraded reefs, and short-branched multi/planar colonies on healthy reefs within the Wakatobi Marine National Park (WMNP), Indonesia. Multivariate analyses reveal phenotypic traits between morphotypes were likely integrated primarily at the colony level with increased polyp density and consistently smaller sclerite dimensions at the degraded site. Sediment load and turbidity, hence light availability, primarily influenced phenotypic differences between the two sites. This distinct morphological dissimilarity between the two sites is a reliable indicator of reef health; selection primarily acting on colony morphology, porosity through branching structure, as well as sclerite diversity and size. ITS2 sequence and predicted RNA secondary structure further revealed intraspecific variation between I. hippuris morphotypes relative to such environments (ΦST = 0.7683, P < 0.001). This evidence suggests-but does not confirm-that I. hippuris morphotypes within the WMNP are two separate species; however, to what extent and taxonomic assignment requires further investigation across its full geographic distribution. Incongruence between colonies present in the WMNP with tenuously described Isis alternatives (Isis reticulataNutting, 1910, Isis minorbrachyblastaZou, Huang & Wang, 1991), questions the validity of such assignments. Furthermore, phylogenetic analyses confirm early taxonomic suggestion that the characteristic jointed axis of the Isididae is in

  16. Environmental influences on the Indo–Pacific octocoral Isis hippuris Linnaeus 1758 (Alcyonacea: Isididae): genetic fixation or phenotypic plasticity?

    Science.gov (United States)

    Pochon, Xavier; Watling, Les

    2015-01-01

    As conspicuous modular components of benthic marine habitats, gorgonian (sea fan) octocorals have perplexed taxonomists for centuries through their shear diversity, particularly throughout the Indo–Pacific. Phenotypic incongruence within and between seemingly unitary lineages across contrasting environments can provide the raw material to investigate processes of disruptive selection. Two distinct phenotypes of the Isidid Isis hippuris Linnaeus, 1758 partition between differing reef environments: long-branched bushy colonies on degraded reefs, and short-branched multi/planar colonies on healthy reefs within the Wakatobi Marine National Park (WMNP), Indonesia. Multivariate analyses reveal phenotypic traits between morphotypes were likely integrated primarily at the colony level with increased polyp density and consistently smaller sclerite dimensions at the degraded site. Sediment load and turbidity, hence light availability, primarily influenced phenotypic differences between the two sites. This distinct morphological dissimilarity between the two sites is a reliable indicator of reef health; selection primarily acting on colony morphology, porosity through branching structure, as well as sclerite diversity and size. ITS2 sequence and predicted RNA secondary structure further revealed intraspecific variation between I. hippuris morphotypes relative to such environments (ΦST = 0.7683, P < 0.001). This evidence suggests—but does not confirm—that I. hippuris morphotypes within the WMNP are two separate species; however, to what extent and taxonomic assignment requires further investigation across its full geographic distribution. Incongruence between colonies present in the WMNP with tenuously described Isis alternatives (Isis reticulata Nutting, 1910, Isis minorbrachyblasta Zou, Huang & Wang, 1991), questions the validity of such assignments. Furthermore, phylogenetic analyses confirm early taxonomic suggestion that the characteristic jointed axis of the

  17. Environmental influences on the Indo–Pacific octocoral Isis hippuris Linnaeus 1758 (Alcyonacea: Isididae: genetic fixation or phenotypic plasticity?

    Directory of Open Access Journals (Sweden)

    Sonia J. Rowley

    2015-08-01

    Full Text Available As conspicuous modular components of benthic marine habitats, gorgonian (sea fan octocorals have perplexed taxonomists for centuries through their shear diversity, particularly throughout the Indo–Pacific. Phenotypic incongruence within and between seemingly unitary lineages across contrasting environments can provide the raw material to investigate processes of disruptive selection. Two distinct phenotypes of the Isidid Isis hippuris Linnaeus, 1758 partition between differing reef environments: long-branched bushy colonies on degraded reefs, and short-branched multi/planar colonies on healthy reefs within the Wakatobi Marine National Park (WMNP, Indonesia. Multivariate analyses reveal phenotypic traits between morphotypes were likely integrated primarily at the colony level with increased polyp density and consistently smaller sclerite dimensions at the degraded site. Sediment load and turbidity, hence light availability, primarily influenced phenotypic differences between the two sites. This distinct morphological dissimilarity between the two sites is a reliable indicator of reef health; selection primarily acting on colony morphology, porosity through branching structure, as well as sclerite diversity and size. ITS2 sequence and predicted RNA secondary structure further revealed intraspecific variation between I. hippuris morphotypes relative to such environments (ΦST = 0.7683, P < 0.001. This evidence suggests—but does not confirm—that I. hippuris morphotypes within the WMNP are two separate species; however, to what extent and taxonomic assignment requires further investigation across its full geographic distribution. Incongruence between colonies present in the WMNP with tenuously described Isis alternatives (Isis reticulata Nutting, 1910, Isis minorbrachyblasta Zou, Huang & Wang, 1991, questions the validity of such assignments. Furthermore, phylogenetic analyses confirm early taxonomic suggestion that the characteristic jointed

  18. Deconstruction of Jihad Radicalism in Islamic Law: A Conceptual Proposal to Combat Isis Terrorism in Indonesia

    Directory of Open Access Journals (Sweden)

    Warkum Sumitro, SH, MH

    2015-02-01

    Full Text Available Islamic State of Iran and Syria (ISIS has become a global movement that penetrates into Indonesia. This movement leads back to the trauma of Indonesian nation to a series of destructive events of terrorism in the country. The meaning of jihad in Islam is hijacked by ISIS activists into violence and war against western infidels in their perspective. They do not care if their target is civilian or military. Meanwhile, the actual concept of jihad in Islam is essential jihad, namely jihad by striving earnestly to improve the quality of individual and community. A wrong interpretation of jihad can not only be solved by force because enforcement effort through violence leaves an endless conflict between terrorists and law enforcer. One conceptual proposal in combating terrorism in Indonesia is by deconstructing the perspective of the physical jihad into essential jihad.

  19. An evolving network model with community structure

    International Nuclear Information System (INIS)

    Li Chunguang; Maini, Philip K

    2005-01-01

    Many social and biological networks consist of communities-groups of nodes within which connections are dense, but between which connections are sparser. Recently, there has been considerable interest in designing algorithms for detecting community structures in real-world complex networks. In this paper, we propose an evolving network model which exhibits community structure. The network model is based on the inner-community preferential attachment and inter-community preferential attachment mechanisms. The degree distributions of this network model are analysed based on a mean-field method. Theoretical results and numerical simulations indicate that this network model has community structure and scale-free properties

  20. Multilevel method for modeling large-scale networks.

    Energy Technology Data Exchange (ETDEWEB)

    Safro, I. M. (Mathematics and Computer Science)

    2012-02-24

    Understanding the behavior of real complex networks is of great theoretical and practical significance. It includes developing accurate artificial models whose topological properties are similar to the real networks, generating the artificial networks at different scales under special conditions, investigating a network dynamics, reconstructing missing data, predicting network response, detecting anomalies and other tasks. Network generation, reconstruction, and prediction of its future topology are central issues of this field. In this project, we address the questions related to the understanding of the network modeling, investigating its structure and properties, and generating artificial networks. Most of the modern network generation methods are based either on various random graph models (reinforced by a set of properties such as power law distribution of node degrees, graph diameter, and number of triangles) or on the principle of replicating an existing model with elements of randomization such as R-MAT generator and Kronecker product modeling. Hierarchical models operate at different levels of network hierarchy but with the same finest elements of the network. However, in many cases the methods that include randomization and replication elements on the finest relationships between network nodes and modeling that addresses the problem of preserving a set of simplified properties do not fit accurately enough the real networks. Among the unsatisfactory features are numerically inadequate results, non-stability of algorithms on real (artificial) data, that have been tested on artificial (real) data, and incorrect behavior at different scales. One reason is that randomization and replication of existing structures can create conflicts between fine and coarse scales of the real network geometry. Moreover, the randomization and satisfying of some attribute at the same time can abolish those topological attributes that have been undefined or hidden from

  1. Research on the model of home networking

    Science.gov (United States)

    Yun, Xiang; Feng, Xiancheng

    2007-11-01

    It is the research hotspot of current broadband network to combine voice service, data service and broadband audio-video service by IP protocol to transport various real time and mutual services to terminal users (home). Home Networking is a new kind of network and application technology which can provide various services. Home networking is called as Digital Home Network. It means that PC, home entertainment equipment, home appliances, Home wirings, security, illumination system were communicated with each other by some composing network technology, constitute a networking internal home, and connect with WAN by home gateway. It is a new network technology and application technology, and can provide many kinds of services inside home or between homes. Currently, home networking can be divided into three kinds: Information equipment, Home appliances, Communication equipment. Equipment inside home networking can exchange information with outer networking by home gateway, this information communication is bidirectional, user can get information and service which provided by public networking by using home networking internal equipment through home gateway connecting public network, meantime, also can get information and resource to control the internal equipment which provided by home networking internal equipment. Based on the general network model of home networking, there are four functional entities inside home networking: HA, HB, HC, and HD. (1) HA (Home Access) - home networking connects function entity; (2) HB (Home Bridge) Home networking bridge connects function entity; (3) HC (Home Client) - Home networking client function entity; (4) HD (Home Device) - decoder function entity. There are many physical ways to implement four function entities. Based on theses four functional entities, there are reference model of physical layer, reference model of link layer, reference model of IP layer and application reference model of high layer. In the future home network

  2. Burst analysis tool for developing neuronal networks exhibiting highly varying action potential dynamics

    Directory of Open Access Journals (Sweden)

    Fikret Emre eKapucu

    2012-06-01

    Full Text Available In this paper we propose a firing statistics based neuronal network burst detection algorithm for neuronal networks exhibiting highly variable action potential dynamics. Electrical activity of neuronal networks is generally analyzed by the occurrences of spikes and bursts both in time and space. Commonly accepted analysis tools employ burst detection algorithms based on predefined criteria. However, maturing neuronal networks, such as those originating from human embryonic stem cells (hESC, exhibit highly variable network structure and time-varying dynamics. To explore the developing burst/spike activities of such networks, we propose a burst detection algorithm which utilizes the firing statistics based on interspike interval (ISI histograms. Moreover, the algorithm calculates interspike interval thresholds for burst spikes as well as for pre-burst spikes and burst tails by evaluating the cumulative moving average and skewness of the ISI histogram. Because of the adaptive nature of the proposed algorithm, its analysis power is not limited by the type of neuronal cell network at hand. We demonstrate the functionality of our algorithm with two different types of microelectrode array (MEA data recorded from spontaneously active hESC-derived neuronal cell networks. The same data was also analyzed by two commonly employed burst detection algorithms and the differences in burst detection results are illustrated. The results demonstrate that our method is both adaptive to the firing statistics of the network and yields successful burst detection from the data. In conclusion, the proposed method is a potential tool for analyzing of hESC-derived neuronal cell networks and thus can be utilized in studies aiming to understand the development and functioning of human neuronal networks and as an analysis tool for in vitro drug screening and neurotoxicity assays.

  3. SIMULTANEOUS FITS IN ISIS ON THE EXAMPLE OF GRO J1008–57

    Directory of Open Access Journals (Sweden)

    M. Kühnel

    2015-04-01

    Full Text Available Parallel computing and steadily increasing computation speed have led to a new tool for analyzing multiple datasets and datatypes: fitting several datasets simultaneously.  With this technique, physically connected parameters of individual data can be treated as a single parameter by implementing this connection directly into the fit. We discuss the terminology, implementation, and possible issues of simultaneous fits based on the Interactive Spectral Interpretation System (ISIS X-ray data analysis tool. While all data modeling tools in X-ray astronomy in principle allow data to be fitted individually from multiple data sets, the syntax used in these tools is not often well suited for this task. Applying simultaneous fits to the transient X-ray binary GRO J1008–57, we find that the spectral shape is only dependent on X-ray flux. We determine time independent parameters e.g., the folding energy Efold, with unprecedented precision.

  4. Network models in economics and finance

    CERN Document Server

    Pardalos, Panos; Rassias, Themistocles

    2014-01-01

    Using network models to investigate the interconnectivity in modern economic systems allows researchers to better understand and explain some economic phenomena. This volume presents contributions by known experts and active researchers in economic and financial network modeling. Readers are provided with an understanding of the latest advances in network analysis as applied to economics, finance, corporate governance, and investments. Moreover, recent advances in market network analysis  that focus on influential techniques for market graph analysis are also examined. Young researchers will find this volume particularly useful in facilitating their introduction to this new and fascinating field. Professionals in economics, financial management, various technologies, and network analysis, will find the network models presented in this book beneficial in analyzing the interconnectivity in modern economic systems.

  5. Complex networks under dynamic repair model

    Science.gov (United States)

    Chaoqi, Fu; Ying, Wang; Kun, Zhao; Yangjun, Gao

    2018-01-01

    Invulnerability is not the only factor of importance when considering complex networks' security. It is also critical to have an effective and reasonable repair strategy. Existing research on network repair is confined to the static model. The dynamic model makes better use of the redundant capacity of repaired nodes and repairs the damaged network more efficiently than the static model; however, the dynamic repair model is complex and polytropic. In this paper, we construct a dynamic repair model and systematically describe the energy-transfer relationships between nodes in the repair process of the failure network. Nodes are divided into three types, corresponding to three structures. We find that the strong coupling structure is responsible for secondary failure of the repaired nodes and propose an algorithm that can select the most suitable targets (nodes or links) to repair the failure network with minimal cost. Two types of repair strategies are identified, with different effects under the two energy-transfer rules. The research results enable a more flexible approach to network repair.

  6. Foreign Words as a Problem in Standardisation / Lexicography: English and Afrikaans Loan-words in isiXhosa*

    Directory of Open Access Journals (Sweden)

    Anja Drame

    2011-10-01

    Full Text Available

    Abstract: Languages are not static systems. They develop and change, add new items while others become outdated. These changes can be clearly observed in the lexicon especially. No language can afford to ignore or neglect foreign influence. Due to globalisation, especially English gains more and more influence on other (also European languages. In developing countries, the languages of the former colonisers also still have an enormous impact on the indigenous languages. Some of these nations are slowly heading towards endogenous language policies which demands the modernisation of the technical vocabulary. This is however a costly and time-consuming process. In this regard language planners often prefer borrowing from foreign sources as a quick and therefore cheap method. The first part of this paper deals with the discussion amongst linguists, sociolinguists and lexicographers about the extent to which foreign words should be allowed in an indigenous language. The second part looks at the example of isiXhosa, one of South Africa's eleven official languages, which is strongly influenced by foreign words, especially English and Afrikaans, and shows problems and methods of the integration of foreign words into the isiXhosa grammatical structure.

    Keywords: FOREIGN WORDS, ISIXHOSA, ENGLISH, AFRIKAANS, BAHASA INDONESIA, RUSSIAN, ESTONIAN, GERMAN, LANGUAGE POLICY, LANGUAGE PURISM, LSP, MORPHOLOGY, SEMANTICS, PHONOLOGY

    Zusammenfassung: Fremdwörter als Problem in der Standardisierung/Lexikographie: Englische und afrikaanse Lehnwörter in isiXhosa. Sprachen sindkeine statischen Systeme. Sie entwickeln und verändern sich, fügen neue Bestandteile hinzu,während andere veralten. Diese Vorgänge lassen sich besonders deutlich im Lexikon einer Sprachebeobachten. Keine Sprache kann es sich leisten fremde Einflüsse zu ignorieren oder zurückzuweisen.Aufgrund von Globalisation gewinnt vor allem das Englisch immer mehr Einfluss aufandere (auch

  7. Adaptive-network models of collective dynamics

    Science.gov (United States)

    Zschaler, G.

    2012-09-01

    Complex systems can often be modelled as networks, in which their basic units are represented by abstract nodes and the interactions among them by abstract links. This network of interactions is the key to understanding emergent collective phenomena in such systems. In most cases, it is an adaptive network, which is defined by a feedback loop between the local dynamics of the individual units and the dynamical changes of the network structure itself. This feedback loop gives rise to many novel phenomena. Adaptive networks are a promising concept for the investigation of collective phenomena in different systems. However, they also present a challenge to existing modelling approaches and analytical descriptions due to the tight coupling between local and topological degrees of freedom. In this work, which is essentially my PhD thesis, I present a simple rule-based framework for the investigation of adaptive networks, using which a wide range of collective phenomena can be modelled and analysed from a common perspective. In this framework, a microscopic model is defined by the local interaction rules of small network motifs, which can be implemented in stochastic simulations straightforwardly. Moreover, an approximate emergent-level description in terms of macroscopic variables can be derived from the microscopic rules, which we use to analyse the system's collective and long-term behaviour by applying tools from dynamical systems theory. We discuss three adaptive-network models for different collective phenomena within our common framework. First, we propose a novel approach to collective motion in insect swarms, in which we consider the insects' adaptive interaction network instead of explicitly tracking their positions and velocities. We capture the experimentally observed onset of collective motion qualitatively in terms of a bifurcation in this non-spatial model. We find that three-body interactions are an essential ingredient for collective motion to emerge

  8. Linear approximation model network and its formation via ...

    Indian Academy of Sciences (India)

    To overcome the deficiency of `local model network' (LMN) techniques, an alternative `linear approximation model' (LAM) network approach is proposed. Such a network models a nonlinear or practical system with multiple linear models fitted along operating trajectories, where individual models are simply networked ...

  9. U.S. Foreign Policy in Clinton and Trump’s presidential campaign. Discourses on ISIS in the media

    Directory of Open Access Journals (Sweden)

    Isabel Rodríguez Toribio

    2017-11-01

    Full Text Available During the last Race for the White House in the United States of America, ISIS terrorism has become the main concern among public opinion (Gallup, 2015. This issue has also been the most significant topic addressed in the campaign speeches on foreign policy. This article analyses Trump and Clinton’s discourses on ISIS within the media framework, as well as how this terrorist group and its acts are social constructed in the speeches. A qualitative methodology has been used. News published in the U.S. digital media, between November 2015 and February 2016, have been analysed through the critical discourse analysis theory. The main results of this research show how Trump has practiced a strategy based on provocation, discrimination and populism while Clinton has followed a much more argumentative and emotional path.

  10. Modelling the structure of complex networks

    DEFF Research Database (Denmark)

    Herlau, Tue

    networks has been independently studied as mathematical objects in their own right. As such, there has been both an increased demand for statistical methods for complex networks as well as a quickly growing mathematical literature on the subject. In this dissertation we explore aspects of modelling complex....... The next chapters will treat some of the various symmetries, representer theorems and probabilistic structures often deployed in the modelling complex networks, the construction of sampling methods and various network models. The introductory chapters will serve to provide context for the included written...

  11. Spatial Epidemic Modelling in Social Networks

    Science.gov (United States)

    Simoes, Joana Margarida

    2005-06-01

    The spread of infectious diseases is highly influenced by the structure of the underlying social network. The target of this study is not the network of acquaintances, but the social mobility network: the daily movement of people between locations, in regions. It was already shown that this kind of network exhibits small world characteristics. The model developed is agent based (ABM) and comprehends a movement model and a infection model. In the movement model, some assumptions are made about its structure and the daily movement is decomposed into four types: neighborhood, intra region, inter region and random. The model is Geographical Information Systems (GIS) based, and uses real data to define its geometry. Because it is a vector model, some optimization techniques were used to increase its efficiency.

  12. Modeling of fluctuating reaction networks

    International Nuclear Information System (INIS)

    Lipshtat, A.; Biham, O.

    2004-01-01

    Full Text:Various dynamical systems are organized as reaction networks, where the population size of one component affects the populations of all its neighbors. Such networks can be found in interstellar surface chemistry, cell biology, thin film growth and other systems. I cases where the populations of reactive species are large, the network can be modeled by rate equations which provide all reaction rates within mean field approximation. However, in small systems that are partitioned into sub-micron size, these populations strongly fluctuate. Under these conditions rate equations fail and the master equation is needed for modeling these reactions. However, the number of equations in the master equation grows exponentially with the number of reactive species, severely limiting its feasibility for complex networks. Here we present a method which dramatically reduces the number of equations, thus enabling the incorporation of the master equation in complex reaction networks. The method is examplified in the context of reaction network on dust grains. Its applicability for genetic networks will be discussed. 1. Efficient simulations of gas-grain chemistry in interstellar clouds. Azi Lipshtat and Ofer Biham, Phys. Rev. Lett. 93 (2004), 170601. 2. Modeling of negative autoregulated genetic networks in single cells. Azi Lipshtat, Hagai B. Perets, Nathalie Q. Balaban and Ofer Biham, Gene: evolutionary genomics (2004), In press

  13. Deterministic ripple-spreading model for complex networks.

    Science.gov (United States)

    Hu, Xiao-Bing; Wang, Ming; Leeson, Mark S; Hines, Evor L; Di Paolo, Ezequiel

    2011-04-01

    This paper proposes a deterministic complex network model, which is inspired by the natural ripple-spreading phenomenon. The motivations and main advantages of the model are the following: (i) The establishment of many real-world networks is a dynamic process, where it is often observed that the influence of a few local events spreads out through nodes, and then largely determines the final network topology. Obviously, this dynamic process involves many spatial and temporal factors. By simulating the natural ripple-spreading process, this paper reports a very natural way to set up a spatial and temporal model for such complex networks. (ii) Existing relevant network models are all stochastic models, i.e., with a given input, they cannot output a unique topology. Differently, the proposed ripple-spreading model can uniquely determine the final network topology, and at the same time, the stochastic feature of complex networks is captured by randomly initializing ripple-spreading related parameters. (iii) The proposed model can use an easily manageable number of ripple-spreading related parameters to precisely describe a network topology, which is more memory efficient when compared with traditional adjacency matrix or similar memory-expensive data structures. (iv) The ripple-spreading model has a very good potential for both extensions and applications.

  14. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  15. Link Between RI-ISI and Inspection Qualification: Relationship between Defect Detection Rate and Margin of Detection

    International Nuclear Information System (INIS)

    Shepherd, Barrie; Goujon, Sophie; Whittle, John

    2007-01-01

    Quantitative risk-informed in-service inspection (RI-ISI) requires a quantitative measurement of inspection effectiveness if the risk change associated with an inspection is to be determined. Knowing the probability of detection (POD) as a function of defect depth (through wall dimension) would provide ideal information. However the main in-service inspection method for nuclear plant is ultrasonics, for which defect detection capability depends on a wide variety of parameters besides defect depth, such as defect orientation, roughness, location, shape etc. In recognition of this the European approach to inspection qualification is generally based on some combination of technical justification, and practical trials on a relatively limited number of defects. This inspection qualification process involves demonstrating that defects of concern will generate responses in excess of the specified recording level or noise, depending on the inspection. It is not currently designed to quantify the probability with which defects will be detected. The work described in this report has been performed in order to help address the problem of how the information generated during inspection qualification can be used as an input for RI-ISI. The approach adopted has been to recognise that as the defect response increases above the recording or noise level, the probability of detecting defects is likely to increase. The work therefore involved an investigation of the relationship between POD (strictly speaking defect detection rate) and margin of detection. It involved blind manual and automated ultrasonic trials on artificial defects in test plates designed to generate a range of signal responses. The detection rate for defects which provided signals at a particular level above noise or above a recording level was then measured. A relationship between defect detection rate and margin of detection has been established based on these trials. In addition to establishing a stronger link

  16. Memory-induced resonancelike suppression of spike generation in a resonate-and-fire neuron model

    Science.gov (United States)

    Mankin, Romi; Paekivi, Sander

    2018-01-01

    The behavior of a stochastic resonate-and-fire neuron model based on a reduction of a fractional noise-driven generalized Langevin equation (GLE) with a power-law memory kernel is considered. The effect of temporally correlated random activity of synaptic inputs, which arise from other neurons forming local and distant networks, is modeled as an additive fractional Gaussian noise in the GLE. Using a first-passage-time formulation, in certain system parameter domains exact expressions for the output interspike interval (ISI) density and for the survival probability (the probability that a spike is not generated) are derived and their dependence on input parameters, especially on the memory exponent, is analyzed. In the case of external white noise, it is shown that at intermediate values of the memory exponent the survival probability is significantly enhanced in comparison with the cases of strong and weak memory, which causes a resonancelike suppression of the probability of spike generation as a function of the memory exponent. Moreover, an examination of the dependence of multimodality in the ISI distribution on input parameters shows that there exists a critical memory exponent αc≈0.402 , which marks a dynamical transition in the behavior of the system. That phenomenon is illustrated by a phase diagram describing the emergence of three qualitatively different structures of the ISI distribution. Similarities and differences between the behavior of the model at internal and external noises are also discussed.

  17. Neural network modeling of emotion

    Science.gov (United States)

    Levine, Daniel S.

    2007-03-01

    This article reviews the history and development of computational neural network modeling of cognitive and behavioral processes that involve emotion. The exposition starts with models of classical conditioning dating from the early 1970s. Then it proceeds toward models of interactions between emotion and attention. Then models of emotional influences on decision making are reviewed, including some speculative (not and not yet simulated) models of the evolution of decision rules. Through the late 1980s, the neural networks developed to model emotional processes were mainly embodiments of significant functional principles motivated by psychological data. In the last two decades, network models of these processes have become much more detailed in their incorporation of known physiological properties of specific brain regions, while preserving many of the psychological principles from the earlier models. Most network models of emotional processes so far have dealt with positive and negative emotion in general, rather than specific emotions such as fear, joy, sadness, and anger. But a later section of this article reviews a few models relevant to specific emotions: one family of models of auditory fear conditioning in rats, and one model of induced pleasure enhancing creativity in humans. Then models of emotional disorders are reviewed. The article concludes with philosophical statements about the essential contributions of emotion to intelligent behavior and the importance of quantitative theories and models to the interdisciplinary enterprise of understanding the interactions of emotion, cognition, and behavior.

  18. Transnational Research Networks in Chinese Scientific Production. An Investigation on Health-Industry Related Sectors

    Directory of Open Access Journals (Sweden)

    Lauretta Rubini

    2017-08-01

    Full Text Available Transnational research networks (TRN are becoming increasingly complex. Such complexity may have both positive and negative effects on the quality of research. Our work studies the evolution over time of Chinese TRN and the role of complexity on the quality of Chinese research, given the leading role this country has recently acquired in international science. We focus on the fields of geriatrics and gerontology. We build an original dataset of all scientific publications of China in these areas in 2009, 2012 and 2015, starting from the ISI Web of Knowledge (ISI WoK database. Using Social Network Analysis (SNA, we analyze the change in scientific network structure across time. Second, we design indices to control for the different aspects of networks complexity (number of authors, country heterogeneity and institutional heterogeneity and we perform negative binomial regressions to identify the main determinants of research quality. Our analysis shows that research networks in the field of geriatrics and gerontology have gradually become wider in terms of countries and have become more balanced. Furthermore, our results identify that different forms of complexity have different impacts on quality, including a reciprocal moderating effect. In particular, according to our analysis, research quality benefits from complex research networks both in terms of countries and of types of institutions involved, but that such networks should be “compact” in terms of number of authors. Eventually, we suggest that complexity should be carefully taken into account when designing policies aimed at enhancing the quality of research.

  19. An acoustical model based monitoring network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der

    2010-01-01

    In this paper the approach for an acoustical model based monitoring network is demonstrated. This network is capable of reconstructing a noise map, based on the combination of measured sound levels and an acoustic model of the area. By pre-calculating the sound attenuation within the network the

  20. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  1. Shadows of the past and threats of the future: ISIS anxiety among grandchildren of Holocaust survivors.

    Science.gov (United States)

    Hoffman, Yaakov; Shrira, Amit

    2017-07-01

    The current study examined intergenerational transmission of trauma in grandchildren of Holocaust survivors. While many typically do not find evidence for such effects, careful reading of the relevant literature suggests conditions under which such effects may be obtained. Following, we made use of three factors. First, we took the number of grandparents exposed to the Holocaust into account. Second, we examined participants who were exposed to present terror and displayed posttraumatic stress disorder (PTSD) symptoms. Third, we measured anxiety of a future ISIS threat, which in its genocidal nature is reminiscent of the Holocaust. Results reveal that grandchildren having all four grandparents who survived the Holocaust in conjunction with them directly experiencing PTSD symptoms demonstrated greater ISIS anxiety than other groups. Results are discussed in reference to various conditions that may determine the likelihood of intergenerational transmission of trauma emerging. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  2. A critical analysis of ‘face’-managing factors in isiZulu idioms

    Directory of Open Access Journals (Sweden)

    M.R. Masubelele

    2015-11-01

    Full Text Available People have an inherent need to communicate. They communicate out of need as well as for leisure. Human speech abounds with unpleasant and undesirable statements that could embarrass and even humiliate those spoken to or oneself. Brown and Levinson assert that unpleasant and undesirable statements have the potential to threaten the ‘face’ or self-esteem of the other person or persons. They define ‘face’ as the public self-image that every member of society wants to claim for themself. Simply put, ‘facework’ refers to ways people cooperatively attempt to promote both the other’s and their own sense of self-esteem in a conversation. As linguistic speech forms, idioms perform a variety of functions in a language. Not only do they make speech more colourful, but they also perform a communicative function in that they tend to soften the embarrassment and humiliation that often accompanies unpleasant and undesirable statements in speech. IsiZulu idioms will be examined in this article to establish to what extent they could contribute to managing ‘face’ issues. Examples of idioms will be drawn from C.L.S. Nyembezi and O.E.H. Nxumalo’s work Inqolobane Yesizwe. The facework theory as espoused by Brown and Levinson will underpin this discussion on isiZulu idioms.

  3. Auroral kilometric radiation source region observations from ISIS 1

    International Nuclear Information System (INIS)

    Benson, R.F.

    1981-01-01

    The ISIS 1 observations of the high-frequency portion of the auroral kilometric radiation (AKR) spectrum are considered, that is, from the minimum frequency encountered for the extraordinary mode cut-off (approximately 450 kHz) to the upper frequency cut-off (approximately 800 kHz). AKR is found to be generated in the extraordinary mode just above the local cutoff frequency and to emanate in a direction that is nearly perpendicular to the magnetic field. It occurs within local depletions of electron density, where the ratio of plasma frequency to cyclotron frequency is below 0.2. The density depletion is restricted to altitudes above approximately 2,000 km, and the upper AKR frequency limit corresponds to the extraordinary cutoff frequency at this altitude

  4. Improving the Automatic Inversion of Digital Alouette/ISIS Ionogram Reflection Traces into Topside Electron Density Profiles

    Science.gov (United States)

    Benson, Robert F.; Truhlik, Vladimir; Huang, Xueqin; Wang, Yongli; Bilitza, Dieter

    2012-01-01

    The topside sounders of the International Satellites for Ionospheric Studies (ISIS) program were designed as analog systems. The resulting ionograms were displayed on 35 mm film for analysis by visual inspection. Each of these satellites, launched between 1962 and 1971, produced data for 10 to 20 years. A number of the original telemetry tapes from this large data set have been converted directly into digital records. Software, known as the Topside Ionogram Scalar With True-Height (TOPIST) algorithm, has been produced and used for the automatic inversion of the ionogram reflection traces on more than 100,000 ISIS-2 digital topside ionograms into topside vertical electron density profiles Ne(h). Here we present some topside ionospheric solar cycle variations deduced from the TOPIST database to illustrate the scientific benefit of improving and expanding the topside ionospheric Ne(h) database. The profile improvements will be based on improvements in the TOPIST software motivated by direct comparisons between TOPIST profiles and profiles produced by manual scaling in the early days of the ISIS program. The database expansion will be based on new software designed to overcome limitations in the original digital topside ionogram database caused by difficulties encountered during the analog-to-digital conversion process in the detection of the ionogram frame sync pulse and/or the frequency markers. This improved and expanded TOPIST topside Ne(h) database will greatly enhance investigations into both short- and long-term ionospheric changes, e.g., the observed topside ionospheric responses to magnetic storms, induced by interplanetary magnetic clouds, and solar cycle variations, respectively.

  5. Modeling the interdependent network based on two-mode networks

    Science.gov (United States)

    An, Feng; Gao, Xiangyun; Guan, Jianhe; Huang, Shupei; Liu, Qian

    2017-10-01

    Among heterogeneous networks, there exist obviously and closely interdependent linkages. Unlike existing research primarily focus on the theoretical research of physical interdependent network model. We propose a two-layer interdependent network model based on two-mode networks to explore the interdependent features in the reality. Specifically, we construct a two-layer interdependent loan network and develop several dependent features indices. The model is verified to enable us to capture the loan dependent features of listed companies based on loan behaviors and shared shareholders. Taking Chinese debit and credit market as case study, the main conclusions are: (1) only few listed companies shoulder the main capital transmission (20% listed companies occupy almost 70% dependent degree). (2) The control of these key listed companies will be more effective of avoiding the spreading of financial risks. (3) Identifying the companies with high betweenness centrality and controlling them could be helpful to monitor the financial risk spreading. (4) The capital transmission channel among Chinese financial listed companies and Chinese non-financial listed companies are relatively strong. However, under greater pressure of demand of capital transmission (70% edges failed), the transmission channel, which constructed by debit and credit behavior, will eventually collapse.

  6. Entropy Characterization of Random Network Models

    Directory of Open Access Journals (Sweden)

    Pedro J. Zufiria

    2017-06-01

    Full Text Available This paper elaborates on the Random Network Model (RNM as a mathematical framework for modelling and analyzing the generation of complex networks. Such framework allows the analysis of the relationship between several network characterizing features (link density, clustering coefficient, degree distribution, connectivity, etc. and entropy-based complexity measures, providing new insight on the generation and characterization of random networks. Some theoretical and computational results illustrate the utility of the proposed framework.

  7. The model of social crypto-network

    Directory of Open Access Journals (Sweden)

    Марк Миколайович Орел

    2015-06-01

    Full Text Available The article presents the theoretical model of social network with the enhanced mechanism of privacy policy. It covers the problems arising in the process of implementing the mentioned type of network. There are presented the methods of solving problems arising in the process of building the social network with privacy policy. It was built a theoretical model of social networks with enhanced information protection methods based on information and communication blocks

  8. Towards reproducible descriptions of neuronal network models.

    Directory of Open Access Journals (Sweden)

    Eilen Nordlie

    2009-08-01

    Full Text Available Progress in science depends on the effective exchange of ideas among scientists. New ideas can be assessed and criticized in a meaningful manner only if they are formulated precisely. This applies to simulation studies as well as to experiments and theories. But after more than 50 years of neuronal network simulations, we still lack a clear and common understanding of the role of computational models in neuroscience as well as established practices for describing network models in publications. This hinders the critical evaluation of network models as well as their re-use. We analyze here 14 research papers proposing neuronal network models of different complexity and find widely varying approaches to model descriptions, with regard to both the means of description and the ordering and placement of material. We further observe great variation in the graphical representation of networks and the notation used in equations. Based on our observations, we propose a good model description practice, composed of guidelines for the organization of publications, a checklist for model descriptions, templates for tables presenting model structure, and guidelines for diagrams of networks. The main purpose of this good practice is to trigger a debate about the communication of neuronal network models in a manner comprehensible to humans, as opposed to machine-readable model description languages. We believe that the good model description practice proposed here, together with a number of other recent initiatives on data-, model-, and software-sharing, may lead to a deeper and more fruitful exchange of ideas among computational neuroscientists in years to come. We further hope that work on standardized ways of describing--and thinking about--complex neuronal networks will lead the scientific community to a clearer understanding of high-level concepts in network dynamics, and will thus lead to deeper insights into the function of the brain.

  9. Designing Network-based Business Model Ontology

    DEFF Research Database (Denmark)

    Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz

    2015-01-01

    Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....

  10. An Improved Car-Following Model in Vehicle Networking Based on Network Control

    Directory of Open Access Journals (Sweden)

    D. Y. Kong

    2014-01-01

    Full Text Available Vehicle networking is a system to realize information interoperability between vehicles and people, vehicles and roads, vehicles and vehicles, and cars and transport facilities, through the network information exchange, in order to achieve the effective monitoring of the vehicle and traffic flow. Realizing information interoperability between vehicles and vehicles, which can affect the traffic flow, is an important application of network control system (NCS. In this paper, a car-following model using vehicle networking theory is established, based on network control principle. The car-following model, which is an improvement of the traditional traffic model, describes the traffic in vehicle networking condition. The impact that vehicle networking has on the traffic flow is quantitatively assessed in a particular scene of one-way, no lane changing highway. The examples show that the capacity of the road is effectively enhanced by using vehicle networking.

  11. Multiplicative Attribute Graph Model of Real-World Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Myunghwan [Stanford Univ., CA (United States); Leskovec, Jure [Stanford Univ., CA (United States)

    2010-10-20

    Large scale real-world network data, such as social networks, Internet andWeb graphs, is ubiquitous in a variety of scientific domains. The study of such social and information networks commonly finds patterns and explain their emergence through tractable models. In most networks, especially in social networks, nodes also have a rich set of attributes (e.g., age, gender) associatedwith them. However, most of the existing network models focus only on modeling the network structure while ignoring the features of nodes in the network. Here we present a class of network models that we refer to as the Multiplicative Attribute Graphs (MAG), which naturally captures the interactions between the network structure and node attributes. We consider a model where each node has a vector of categorical features associated with it. The probability of an edge between a pair of nodes then depends on the product of individual attributeattribute similarities. The model yields itself to mathematical analysis as well as fit to real data. We derive thresholds for the connectivity, the emergence of the giant connected component, and show that the model gives rise to graphs with a constant diameter. Moreover, we analyze the degree distribution to show that the model can produce networks with either lognormal or power-law degree distribution depending on certain conditions.

  12. Developing Personal Network Business Models

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    2006-01-01

    The aim of the paper is to examine the issue of business modeling in relation to personal networks, PNs. The paper builds on research performed on business models in the EU 1ST MAGNET1 project (My personal Adaptive Global NET). The paper presents the Personal Network concept and briefly reports...

  13. Early Detection of Autism Spectrum Disorder in Young isiZulu-Speaking Children in South Africa

    Science.gov (United States)

    Chambers, Nola J.; Wetherby, Amy M.; Stronach, Sheri T.; Njongwe, Nonyameko; Kauchali, Shuaib; Grinker, Richard R.

    2017-01-01

    Culturally appropriate tools are needed for detecting symptoms of autism spectrum disorder in young South African children. The objectives of this study were to (1) adapt and translate into isiZulu existing measures for detecting early signs of autism spectrum disorder, (2) use the measures to characterize and compare behavioural profiles of young…

  14. A novel Direct Small World network model

    Directory of Open Access Journals (Sweden)

    LIN Tao

    2016-10-01

    Full Text Available There is a certain degree of redundancy and low efficiency of existing computer networks.This paper presents a novel Direct Small World network model in order to optimize networks.In this model,several nodes construct a regular network.Then,randomly choose and replot some nodes to generate Direct Small World network iteratively.There is no change in average distance and clustering coefficient.However,the network performance,such as hops,is improved.The experiments prove that compared to traditional small world network,the degree,average of degree centrality and average of closeness centrality are lower in Direct Small World network.This illustrates that the nodes in Direct Small World networks are closer than Watts-Strogatz small world network model.The Direct Small World can be used not only in the communication of the community information,but also in the research of epidemics.

  15. A review of the radiological safety of the ISIS accelerator - A paper prepared for the advanced reactor safety topical meeting, Orlando, Florida (USA) June 1997

    International Nuclear Information System (INIS)

    Wright, P.

    1997-01-01

    This paper describes the current radiological safety aspects of operation of ISIS accelerator components and spallation targets. Improvements in the design of a new facility with higher power are also suggested for each main component. General comments on the regulatory and organisational aspects are made. Regulation is by European Union and British Legislation. Specific ISIS components described are the ion source, linear accelerator, synchrotron, target station, experimental beam lines and radioactive materials stores. The reliability of tantalum and uranium targets is discussed. Environmental discharges of tritium and other nuclides can become a limiting factor in accelerator operation. Methods of discharge monitoring at ISIS are explained and suggestions for improvements are outlined. Waste accumulation, associated doses and costs are described. 3 refs

  16. Non-consensus Opinion Models on Complex Networks

    Science.gov (United States)

    Li, Qian; Braunstein, Lidia A.; Wang, Huijuan; Shao, Jia; Stanley, H. Eugene; Havlin, Shlomo

    2013-04-01

    Social dynamic opinion models have been widely studied to understand how interactions among individuals cause opinions to evolve. Most opinion models that utilize spin interaction models usually produce a consensus steady state in which only one opinion exists. Because in reality different opinions usually coexist, we focus on non-consensus opinion models in which above a certain threshold two opinions coexist in a stable relationship. We revisit and extend the non-consensus opinion (NCO) model introduced by Shao et al. (Phys. Rev. Lett. 103:01870, 2009). The NCO model in random networks displays a second order phase transition that belongs to regular mean field percolation and is characterized by the appearance (above a certain threshold) of a large spanning cluster of the minority opinion. We generalize the NCO model by adding a weight factor W to each individual's original opinion when determining their future opinion (NCO W model). We find that as W increases the minority opinion holders tend to form stable clusters with a smaller initial minority fraction than in the NCO model. We also revisit another non-consensus opinion model based on the NCO model, the inflexible contrarian opinion (ICO) model (Li et al. in Phys. Rev. E 84:066101, 2011), which introduces inflexible contrarians to model the competition between two opinions in a steady state. Inflexible contrarians are individuals that never change their original opinion but may influence the opinions of others. To place the inflexible contrarians in the ICO model we use two different strategies, random placement and one in which high-degree nodes are targeted. The inflexible contrarians effectively decrease the size of the largest rival-opinion cluster in both strategies, but the effect is more pronounced under the targeted method. All of the above models have previously been explored in terms of a single network, but human communities are usually interconnected, not isolated. Because opinions propagate not

  17. Following a Military Defeat of ISIS in Syria and Iraq: What Happens Next after the Military Victory and the Return of Foreign Fighters?

    Directory of Open Access Journals (Sweden)

    Anne Speckhard

    2017-02-01

    Full Text Available In the struggle against ISIS and the so-called Islamic State, the United States and its allies continue to achieve significant military victories, as evidenced by the ongoing efforts to liberate the city of Mosul in Iraq. What happens next with the returning or migrating foreign fighters and with whatever remains of ISIS’ influence in the digital battle space where up to this point it has been winning? Evidence of the group inspiring, remotely recruiting and directing attacks in Europe and elsewhere, and its continued ability to attract foreign fighters to the actual battlefield makes it clear that ISIS may be losing the ground war in Syria and Iraq but winning in the other areas, especially in the digital battle space. The authors highlight the importance of creating compelling counter-narratives and products that compete with the prolific ISIS online campaigns.

  18. A Partnership Training Program in Breast Cancer Diagnosis: Concept Development of the Next Generation Diagnostic Breast Imaging Using Digital Image Library and Networking Techniques

    National Research Council Canada - National Science Library

    Chouikha, Mohamed F

    2004-01-01

    ...); and Georgetown University (Image Science and Information Systems, ISIS). In this partnership training program, we will train faculty and students in breast cancer imaging, digital image database library techniques and network communication strategy...

  19. A comprehensive probabilistic analysis model of oil pipelines network based on Bayesian network

    Science.gov (United States)

    Zhang, C.; Qin, T. X.; Jiang, B.; Huang, C.

    2018-02-01

    Oil pipelines network is one of the most important facilities of energy transportation. But oil pipelines network accident may result in serious disasters. Some analysis models for these accidents have been established mainly based on three methods, including event-tree, accident simulation and Bayesian network. Among these methods, Bayesian network is suitable for probabilistic analysis. But not all the important influencing factors are considered and the deployment rule of the factors has not been established. This paper proposed a probabilistic analysis model of oil pipelines network based on Bayesian network. Most of the important influencing factors, including the key environment condition and emergency response are considered in this model. Moreover, the paper also introduces a deployment rule for these factors. The model can be used in probabilistic analysis and sensitive analysis of oil pipelines network accident.

  20. The Human Drones of Isis: How 21st Century Terrorism Uses Remote Warfare

    Science.gov (United States)

    2017-06-01

    AQ Al Qaeda BRI Brigade of Research and Intervention CET Central European Time CJTF-OIR Combined Joint Task Force—Operation Inherent Resolve CT...article published in the academic journal Decision Analysis17 examines ISIS strategy and breaks down its various components. Table 1 outlines what the... Journal of Contemporary Research in Business 3, no. 3 (July 2011): 481–486. Higgins, Andrew. “Attacks in Paris.” New York Times. Accessed December

  1. Measurement of the para-hydrogen concentration in the ISIS moderators using neutron transmission and thermal conductivity

    Science.gov (United States)

    Romanelli, Giovanni; Rudić, Svemir; Zanetti, Matteo; Andreani, Carla; Fernandez-Alonso, Felix; Gorini, Giuseppe; Krzystyniak, Maciej; Škoro, Goran

    2018-04-01

    We present an experimental study to determine the para-hydrogen concentration in the hydrogen moderators at the ISIS pulsed neutron and muon source. The experimental characterisation is based on neutron transmission experiments performed on the VESUVIO spectrometer, and thermal conductivity measurements using the TOSCA para-hydrogen rig. A reliable estimation of the level of para-hydrogen concentration in the hydrogen moderators is of crucial importance in the framework of a current project to completely refurbish the first target station at ISIS. Moreover, we report a new measurement of the total neutron cross section for normal hydrogen at 15 K on the broad energy range 3 meV -10 eV suggesting a revision of the most recent nuclear libraries for incident neutron energies lower than 10 meV. Finally, we characterise systematic errors affecting the para-hydrogen level estimation due to conversion from para to ortho hydrogen, as a function of the time a batch of gas spends in every component of our gas panel and apparatus.

  2. Network structure exploration via Bayesian nonparametric models

    International Nuclear Information System (INIS)

    Chen, Y; Wang, X L; Xiang, X; Tang, B Z; Bu, J Z

    2015-01-01

    Complex networks provide a powerful mathematical representation of complex systems in nature and society. To understand complex networks, it is crucial to explore their internal structures, also called structural regularities. The task of network structure exploration is to determine how many groups there are in a complex network and how to group the nodes of the network. Most existing structure exploration methods need to specify either a group number or a certain type of structure when they are applied to a network. In the real world, however, the group number and also the certain type of structure that a network has are usually unknown in advance. To explore structural regularities in complex networks automatically, without any prior knowledge of the group number or the certain type of structure, we extend a probabilistic mixture model that can handle networks with any type of structure but needs to specify a group number using Bayesian nonparametric theory. We also propose a novel Bayesian nonparametric model, called the Bayesian nonparametric mixture (BNPM) model. Experiments conducted on a large number of networks with different structures show that the BNPM model is able to explore structural regularities in networks automatically with a stable, state-of-the-art performance. (paper)

  3. Homophyly/Kinship Model: Naturally Evolving Networks

    Science.gov (United States)

    Li, Angsheng; Li, Jiankou; Pan, Yicheng; Yin, Xianchen; Yong, Xi

    2015-10-01

    It has been a challenge to understand the formation and roles of social groups or natural communities in the evolution of species, societies and real world networks. Here, we propose the hypothesis that homophyly/kinship is the intrinsic mechanism of natural communities, introduce the notion of the affinity exponent and propose the homophyly/kinship model of networks. We demonstrate that the networks of our model satisfy a number of topological, probabilistic and combinatorial properties and, in particular, that the robustness and stability of natural communities increase as the affinity exponent increases and that the reciprocity of the networks in our model decreases as the affinity exponent increases. We show that both homophyly/kinship and reciprocity are essential to the emergence of cooperation in evolutionary games and that the homophyly/kinship and reciprocity determined by the appropriate affinity exponent guarantee the emergence of cooperation in evolutionary games, verifying Darwin’s proposal that kinship and reciprocity are the means of individual fitness. We propose the new principle of structure entropy minimisation for detecting natural communities of networks and verify the functional module property and characteristic properties by a healthy tissue cell network, a citation network, some metabolic networks and a protein interaction network.

  4. Modeling, robust and distributed model predictive control for freeway networks

    NARCIS (Netherlands)

    Liu, S.

    2016-01-01

    In Model Predictive Control (MPC) for traffic networks, traffic models are crucial since they are used as prediction models for determining the optimal control actions. In order to reduce the computational complexity of MPC for traffic networks, macroscopic traffic models are often used instead of

  5. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  6. Tool wear modeling using abductive networks

    Science.gov (United States)

    Masory, Oren

    1992-09-01

    A tool wear model based on Abductive Networks, which consists of a network of `polynomial' nodes, is described. The model relates the cutting parameters, components of the cutting force, and machining time to flank wear. Thus real time measurements of the cutting force can be used to monitor the machining process. The model is obtained by a training process in which the connectivity between the network's nodes and the polynomial coefficients of each node are determined by optimizing a performance criteria. Actual wear measurements of coated and uncoated carbide inserts were used for training and evaluating the established model.

  7. MERLIN, a new high count rate spectrometer at ISIS

    International Nuclear Information System (INIS)

    Bewley, R.I.; Eccleston, R.S.; McEwen, K.A.; Hayden, S.M.; Dove, M.T.; Bennington, S.M.; Treadgold, J.R.; Coleman, R.L.S.

    2006-01-01

    MERLIN is designed to be a high intensity, medium energy resolution spectrometer. As such, it will complement the high-resolution MAPS spectrometer at ISIS. MERLIN will utilise all the latest advances in technology with a supermirror guide to enhance flux as well as 3 m long position-sensitive detectors in a vacuum making it ideal for single-crystal users. The detector bank will cover a massive π steradians of solid angle with an angular range from -45 o to +135 o degrees in the horizontal plane and ±30 o degrees in the vertical plane. This will allow large swathes of Q,ω space to be accessed in a single run. The instrument will be ready for commissioning in February 2006. This paper presents details of design and performance of this new instrument

  8. Biological transportation networks: Modeling and simulation

    KAUST Repository

    Albi, Giacomo; Artina, Marco; Foransier, Massimo; Markowich, Peter A.

    2015-01-01

    We present a model for biological network formation originally introduced by Cai and Hu [Adaptation and optimization of biological transport networks, Phys. Rev. Lett. 111 (2013) 138701]. The modeling of fluid transportation (e.g., leaf venation

  9. Synergistic effects in threshold models on networks

    Science.gov (United States)

    Juul, Jonas S.; Porter, Mason A.

    2018-01-01

    Network structure can have a significant impact on the propagation of diseases, memes, and information on social networks. Different types of spreading processes (and other dynamical processes) are affected by network architecture in different ways, and it is important to develop tractable models of spreading processes on networks to explore such issues. In this paper, we incorporate the idea of synergy into a two-state ("active" or "passive") threshold model of social influence on networks. Our model's update rule is deterministic, and the influence of each meme-carrying (i.e., active) neighbor can—depending on a parameter—either be enhanced or inhibited by an amount that depends on the number of active neighbors of a node. Such a synergistic system models social behavior in which the willingness to adopt either accelerates or saturates in a way that depends on the number of neighbors who have adopted that behavior. We illustrate that our model's synergy parameter has a crucial effect on system dynamics, as it determines whether degree-k nodes are possible or impossible to activate. We simulate synergistic meme spreading on both random-graph models and networks constructed from empirical data. Using a heterogeneous mean-field approximation, which we derive under the assumption that a network is locally tree-like, we are able to determine which synergy-parameter values allow degree-k nodes to be activated for many networks and for a broad family of synergistic models.

  10. Modeling geomagnetic induced currents in Australian power networks

    Science.gov (United States)

    Marshall, R. A.; Kelly, A.; Van Der Walt, T.; Honecker, A.; Ong, C.; Mikkelsen, D.; Spierings, A.; Ivanovich, G.; Yoshikawa, A.

    2017-07-01

    Geomagnetic induced currents (GICs) have been considered an issue for high-latitude power networks for some decades. More recently, GICs have been observed and studied in power networks located in lower latitude regions. This paper presents the results of a model aimed at predicting and understanding the impact of geomagnetic storms on power networks in Australia, with particular focus on the Queensland and Tasmanian networks. The model incorporates a "geoelectric field" determined using a plane wave magnetic field incident on a uniform conducting Earth, and the network model developed by Lehtinen and Pirjola (1985). Model results for two intense geomagnetic storms of solar cycle 24 are compared with transformer neutral monitors at three locations within the Queensland network and one location within the Tasmanian network. The model is then used to assess the impacts of the superintense geomagnetic storm of 29-31 October 2003 on the flow of GICs within these networks. The model results show good correlation with the observations with coefficients ranging from 0.73 to 0.96 across the observing sites. For Queensland, modeled GIC magnitudes during the superstorm of 29-31 October 2003 exceed 40 A with the larger GICs occurring in the south-east section of the network. Modeled GICs in Tasmania for the same storm do not exceed 30 A. The larger distance spans and general east-west alignment of the southern section of the Queensland network, in conjunction with some relatively low branch resistance values, result in larger modeled GICs despite Queensland being a lower latitude network than Tasmania.

  11. Modeling Distillation Column Using ARX Model Structure and Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Reza Pirmoradi

    2012-04-01

    Full Text Available Distillation is a complex and highly nonlinear industrial process. In general it is not always possible to obtain accurate first principles models for high-purity distillation columns. On the other hand the development of first principles models is usually time consuming and expensive. To overcome these problems, empirical models such as neural networks can be used. One major drawback of empirical models is that the prediction is valid only inside the data domain that is sufficiently covered by measurement data. Modeling distillation columns by means of neural networks is reported in literature by using recursive networks. The recursive networks are proper for modeling purpose, but such models have the problems of high complexity and high computational cost. The objective of this paper is to propose a simple and reliable model for distillation column. The proposed model uses feed forward neural networks which results in a simple model with less parameters and faster training time. Simulation results demonstrate that predictions of the proposed model in all regions are close to outputs of the dynamic model and the error in negligible. This implies that the model is reliable in all regions.

  12. Fast neutron irradiation tests of flash memories used in space environment at the ISIS spallation neutron source

    Directory of Open Access Journals (Sweden)

    C. Andreani

    2018-02-01

    Full Text Available This paper presents a neutron accelerated study of soft errors in advanced electronic devices used in space missions, i.e. Flash memories performed at the ChipIr and VESUVIO beam lines at the ISIS spallation neutron source. The two neutron beam lines are set up to mimic the space environment spectra and allow neutron irradiation tests on Flash memories in the neutron energy range above 10 MeV and up to 800 MeV. The ISIS neutron energy spectrum is similar to the one occurring in the atmospheric as well as in space and planetary environments, with intensity enhancements varying in the range 108- 10 9 and 106- 10 7 respectively. Such conditions are suitable for the characterization of the atmospheric, space and planetary neutron radiation environments, and are directly applicable for accelerated tests of electronic components as demonstrated here in benchmark measurements performed on flash memories.

  13. Fast neutron irradiation tests of flash memories used in space environment at the ISIS spallation neutron source

    Science.gov (United States)

    Andreani, C.; Senesi, R.; Paccagnella, A.; Bagatin, M.; Gerardin, S.; Cazzaniga, C.; Frost, C. D.; Picozza, P.; Gorini, G.; Mancini, R.; Sarno, M.

    2018-02-01

    This paper presents a neutron accelerated study of soft errors in advanced electronic devices used in space missions, i.e. Flash memories performed at the ChipIr and VESUVIO beam lines at the ISIS spallation neutron source. The two neutron beam lines are set up to mimic the space environment spectra and allow neutron irradiation tests on Flash memories in the neutron energy range above 10 MeV and up to 800 MeV. The ISIS neutron energy spectrum is similar to the one occurring in the atmospheric as well as in space and planetary environments, with intensity enhancements varying in the range 108- 10 9 and 106- 10 7 respectively. Such conditions are suitable for the characterization of the atmospheric, space and planetary neutron radiation environments, and are directly applicable for accelerated tests of electronic components as demonstrated here in benchmark measurements performed on flash memories.

  14. Feature network models for proximity data : statistical inference, model selection, network representations and links with related models

    NARCIS (Netherlands)

    Frank, Laurence Emmanuelle

    2006-01-01

    Feature Network Models (FNM) are graphical structures that represent proximity data in a discrete space with the use of features. A statistical inference theory is introduced, based on the additivity properties of networks and the linear regression framework. Considering features as predictor

  15. Brain functional networks. Correlation analysis with clinical indexes in patients with diabetic retinopathy

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Hui; Zhang, Yu; Hu, Su; Wang, Ximing; Li, Yonggang; Hu, Chunhong [The First Affiliated Hospital of Soochow University, Department of Radiology, Suzhou, Jiangsu (China); Lai, Lillian [LAC+USC Medical Center, Department of Neuroradiology, Los Angeles, CA (United States); Shen, Hailin [Suzhou Kowloon Hospital, Shanghai Jiao Tong University Medical School, Department of Radiology, Suzhou, Jiangsu (China)

    2017-11-15

    The relationship between parameters of brain functional networks and clinical indexes is unclear so far in patients with diabetic retinopathy (DR). This paper is to investigate this. Twenty-one patients with different grades of DR and 21 age- and sex-matched healthy controls were enrolled from August 2012 to September 2014. The clinical indexes recorded included DR grade, duration of diabetes, HbA1c, diabetic foot screen, fasting plasma glucose, insulin, Homa-β, Homa-IR, insulin sensitive index (ISI), Mini-Mental State Examination (MMSE), and patient sex and age. Subjects were scanned using 3-T MR with blood-oxygen-level-dependent and 3D-FSPGR sequences. MR data was analyzed via preprocessing and functional network construction, and quantified indexes of network (clustering coefficient, characteristic path length, global efficiency, degree distribution, and small worldness) were evaluated. Statistics consisted of ANOVA and correlation. There were significant differences between patients and controls among clustering coefficient, characteristic path length, degree distribution, and small worldness parameters (P < 0.05). MMSE scores negatively correlated with characteristic path length, and Hb1Ac negatively correlated with small worldness. MMSE, duration of diabetes, diabetic foot screen, fasting plasma glucose, insulin, Homa-β, Homa-IR, ISI, DR grade, and patient age, except from Hb1Ac, correlated with degree distribution in certain brain areas. Brain functional networks are altered, specifically in the areas of visual function and cognition, and these alterations may reflect the severity of visual weakness and cognitive decline in DR patients. Moreover, the brain networks may be affected both by long-standing and instant clinical factors. (orig.)

  16. Brain functional networks. Correlation analysis with clinical indexes in patients with diabetic retinopathy

    International Nuclear Information System (INIS)

    Dai, Hui; Zhang, Yu; Hu, Su; Wang, Ximing; Li, Yonggang; Hu, Chunhong; Lai, Lillian; Shen, Hailin

    2017-01-01

    The relationship between parameters of brain functional networks and clinical indexes is unclear so far in patients with diabetic retinopathy (DR). This paper is to investigate this. Twenty-one patients with different grades of DR and 21 age- and sex-matched healthy controls were enrolled from August 2012 to September 2014. The clinical indexes recorded included DR grade, duration of diabetes, HbA1c, diabetic foot screen, fasting plasma glucose, insulin, Homa-β, Homa-IR, insulin sensitive index (ISI), Mini-Mental State Examination (MMSE), and patient sex and age. Subjects were scanned using 3-T MR with blood-oxygen-level-dependent and 3D-FSPGR sequences. MR data was analyzed via preprocessing and functional network construction, and quantified indexes of network (clustering coefficient, characteristic path length, global efficiency, degree distribution, and small worldness) were evaluated. Statistics consisted of ANOVA and correlation. There were significant differences between patients and controls among clustering coefficient, characteristic path length, degree distribution, and small worldness parameters (P < 0.05). MMSE scores negatively correlated with characteristic path length, and Hb1Ac negatively correlated with small worldness. MMSE, duration of diabetes, diabetic foot screen, fasting plasma glucose, insulin, Homa-β, Homa-IR, ISI, DR grade, and patient age, except from Hb1Ac, correlated with degree distribution in certain brain areas. Brain functional networks are altered, specifically in the areas of visual function and cognition, and these alterations may reflect the severity of visual weakness and cognitive decline in DR patients. Moreover, the brain networks may be affected both by long-standing and instant clinical factors. (orig.)

  17. Nonparametric Bayesian Modeling of Complex Networks

    DEFF Research Database (Denmark)

    Schmidt, Mikkel Nørgaard; Mørup, Morten

    2013-01-01

    an infinite mixture model as running example, we go through the steps of deriving the model as an infinite limit of a finite parametric model, inferring the model parameters by Markov chain Monte Carlo, and checking the model?s fit and predictive performance. We explain how advanced nonparametric models......Modeling structure in complex networks using Bayesian nonparametrics makes it possible to specify flexible model structures and infer the adequate model complexity from the observed data. This article provides a gentle introduction to nonparametric Bayesian modeling of complex networks: Using...

  18. Modelling and designing electric energy networks

    International Nuclear Information System (INIS)

    Retiere, N.

    2003-11-01

    The author gives an overview of his research works in the field of electric network modelling. After a brief overview of technological evolutions from the telegraph to the all-electric fly-by-wire aircraft, he reports and describes various works dealing with a simplified modelling of electric systems and with fractal simulation. Then, he outlines the challenges for the design of electric networks, proposes a design process, gives an overview of various design models, methods and tools, and reports an application in the design of electric networks for future jumbo jets

  19. AS Migration and Optimization of the Power Integrated Data Network

    Science.gov (United States)

    Zhou, Junjie; Ke, Yue

    2018-03-01

    In the transformation process of data integration network, the impact on the business has always been the most important reference factor to measure the quality of network transformation. With the importance of the data network carrying business, we must put forward specific design proposals during the transformation, and conduct a large number of demonstration and practice to ensure that the transformation program meets the requirements of the enterprise data network. This paper mainly demonstrates the scheme of over-migrating point-to-point access equipment in the reconstruction project of power data comprehensive network to migrate the BGP autonomous domain to the specified domain defined in the industrial standard, and to smooth the intranet OSPF protocol Migration into ISIS agreement. Through the optimization design, eventually making electric power data network performance was improved on traffic forwarding, traffic forwarding path optimized, extensibility, get larger, lower risk of potential loop, the network stability was improved, and operational cost savings, etc.

  20. Isis, the Shadow of the West (Mediterranean 2017: The roots of hatred

    Directory of Open Access Journals (Sweden)

    Fulvio Marchese

    2018-03-01

    Full Text Available International terrorism is one of today’s chief threats to the socio-economic stability of Western countries. It is generally perceived as alien to the Western lifestyle and it is often explained away as the sorry outcome of psychosis or fanaticism. In what follows, I endeavour to show how, in a globalised world such as ours, there are no truly alien phenomena, and Isis itself can be better understood in light of global causal patterns. I conclude by indicating a possible constructive approach in our difficult times.

  1. The performance of prototype position-sensitive neutron detectors on SXD at ISIS

    International Nuclear Information System (INIS)

    Wilson, C.C.

    1989-02-01

    The performance of two position-sensitive neutron detector designed for use on the single crystal diffractometer (SXD) at ISIS is assessed. The two detectors examined were the Anger camera 6 Li-glass scintillator PSD and a prototype fibre-optic encoded PSD based on 6 Li-doped ZnS plastic scintillator. The latter detector is found to be both simpler to fabricate and to produce better results on the evidence to date. A summary of some of the expected science from SXD and the performance of the detectors with respect to this is also given. (author)

  2. RAUHALAN KOULUN KUUDESLUOKKALAISTEN TAPATURMIEN KAR-TOITUS JA ENNALTAEHKÄISY 2010 – 2011

    OpenAIRE

    Vesalainen, Kati; Tani, Sanna

    2011-01-01

    Tämän opinnäytetyön tarkoituksena on ollut kartoittaa Rauhalan koulun kuudensien luokkien oppilaille sattuneet tapaturmat kuluneen vuoden ajalta, sekä oppilaiden turvallisuusvälineiden käyttö. Opinnäytetyö on osa Ehkäise tapaturmat- poikkihallinnollista hanketta 2009 – 2015. Etelä – Kymenlaakson alue sai 2008 mahdollisuuden lähteä tähän hankkeeseen pilottialueena mukaan. Hankkeen tarkoituksena on lähestyä tapaturmien ehkäisyä yhteisöllisestä näkökulmasta sekä paneutua paikallisiin tapaturmien...

  3. Bayesian Subset Modeling for High-Dimensional Generalized Linear Models

    KAUST Repository

    Liang, Faming

    2013-06-01

    This article presents a new prior setting for high-dimensional generalized linear models, which leads to a Bayesian subset regression (BSR) with the maximum a posteriori model approximately equivalent to the minimum extended Bayesian information criterion model. The consistency of the resulting posterior is established under mild conditions. Further, a variable screening procedure is proposed based on the marginal inclusion probability, which shares the same properties of sure screening and consistency with the existing sure independence screening (SIS) and iterative sure independence screening (ISIS) procedures. However, since the proposed procedure makes use of joint information from all predictors, it generally outperforms SIS and ISIS in real applications. This article also makes extensive comparisons of BSR with the popular penalized likelihood methods, including Lasso, elastic net, SIS, and ISIS. The numerical results indicate that BSR can generally outperform the penalized likelihood methods. The models selected by BSR tend to be sparser and, more importantly, of higher prediction ability. In addition, the performance of the penalized likelihood methods tends to deteriorate as the number of predictors increases, while this is not significant for BSR. Supplementary materials for this article are available online. © 2013 American Statistical Association.

  4. Modelling traffic congestion using queuing networks

    Indian Academy of Sciences (India)

    Flow-density curves; uninterrupted traffic; Jackson networks. ... ness - also suffer from a big handicap vis-a-vis the Indian scenario: most of these models do .... more well-known queuing network models and onsite data, a more exact Road Cell ...

  5. Recurrent neural network based hybrid model for reconstructing gene regulatory network.

    Science.gov (United States)

    Raza, Khalid; Alam, Mansaf

    2016-10-01

    One of the exciting problems in systems biology research is to decipher how genome controls the development of complex biological system. The gene regulatory networks (GRNs) help in the identification of regulatory interactions between genes and offer fruitful information related to functional role of individual gene in a cellular system. Discovering GRNs lead to a wide range of applications, including identification of disease related pathways providing novel tentative drug targets, helps to predict disease response, and also assists in diagnosing various diseases including cancer. Reconstruction of GRNs from available biological data is still an open problem. This paper proposes a recurrent neural network (RNN) based model of GRN, hybridized with generalized extended Kalman filter for weight update in backpropagation through time training algorithm. The RNN is a complex neural network that gives a better settlement between biological closeness and mathematical flexibility to model GRN; and is also able to capture complex, non-linear and dynamic relationships among variables. Gene expression data are inherently noisy and Kalman filter performs well for estimation problem even in noisy data. Hence, we applied non-linear version of Kalman filter, known as generalized extended Kalman filter, for weight update during RNN training. The developed model has been tested on four benchmark networks such as DNA SOS repair network, IRMA network, and two synthetic networks from DREAM Challenge. We performed a comparison of our results with other state-of-the-art techniques which shows superiority of our proposed model. Further, 5% Gaussian noise has been induced in the dataset and result of the proposed model shows negligible effect of noise on results, demonstrating the noise tolerance capability of the model. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Modeling, Optimization & Control of Hydraulic Networks

    DEFF Research Database (Denmark)

    Tahavori, Maryamsadat

    2014-01-01

    . The nonlinear network model is derived based on the circuit theory. A suitable projection is used to reduce the state vector and to express the model in standard state-space form. Then, the controllability of nonlinear nonaffine hydraulic networks is studied. The Lie algebra-based controllability matrix is used......Water supply systems consist of a number of pumping stations, which deliver water to the customers via pipeline networks and elevated reservoirs. A huge amount of drinking water is lost before it reaches to end-users due to the leakage in pipe networks. A cost effective solution to reduce leakage...... in water network is pressure management. By reducing the pressure in the water network, the leakage can be reduced significantly. Also it reduces the amount of energy consumption in water networks. The primary purpose of this work is to develop control algorithms for pressure control in water supply...

  7. A random spatial network model based on elementary postulates

    Science.gov (United States)

    Karlinger, Michael R.; Troutman, Brent M.

    1989-01-01

    A model for generating random spatial networks that is based on elementary postulates comparable to those of the random topology model is proposed. In contrast to the random topology model, this model ascribes a unique spatial specification to generated drainage networks, a distinguishing property of some network growth models. The simplicity of the postulates creates an opportunity for potential analytic investigations of the probabilistic structure of the drainage networks, while the spatial specification enables analyses of spatially dependent network properties. In the random topology model all drainage networks, conditioned on magnitude (number of first-order streams), are equally likely, whereas in this model all spanning trees of a grid, conditioned on area and drainage density, are equally likely. As a result, link lengths in the generated networks are not independent, as usually assumed in the random topology model. For a preliminary model evaluation, scale-dependent network characteristics, such as geometric diameter and link length properties, and topologic characteristics, such as bifurcation ratio, are computed for sets of drainage networks generated on square and rectangular grids. Statistics of the bifurcation and length ratios fall within the range of values reported for natural drainage networks, but geometric diameters tend to be relatively longer than those for natural networks.

  8. Modeling Network Traffic in Wavelet Domain

    Directory of Open Access Journals (Sweden)

    Sheng Ma

    2004-12-01

    Full Text Available This work discovers that although network traffic has the complicated short- and long-range temporal dependence, the corresponding wavelet coefficients are no longer long-range dependent. Therefore, a "short-range" dependent process can be used to model network traffic in the wavelet domain. Both independent and Markov models are investigated. Theoretical analysis shows that the independent wavelet model is sufficiently accurate in terms of the buffer overflow probability for Fractional Gaussian Noise traffic. Any model, which captures additional correlations in the wavelet domain, only improves the performance marginally. The independent wavelet model is then used as a unified approach to model network traffic including VBR MPEG video and Ethernet data. The computational complexity is O(N for developing such wavelet models and generating synthesized traffic of length N, which is among the lowest attained.

  9. Implementing network constraints in the EMPS model

    Energy Technology Data Exchange (ETDEWEB)

    Helseth, Arild; Warland, Geir; Mo, Birger; Fosso, Olav B.

    2010-02-15

    This report concerns the coupling of detailed market and network models for long-term hydro-thermal scheduling. Currently, the EPF model (Samlast) is the only tool available for this task for actors in the Nordic market. A new prototype for solving the coupled market and network problem has been developed. The prototype is based on the EMPS model (Samkjoeringsmodellen). Results from the market model are distributed to a detailed network model, where a DC load flow detects if there are overloads on monitored lines or intersections. In case of overloads, network constraints are generated and added to the market problem. Theoretical and implementation details for the new prototype are elaborated in this report. The performance of the prototype is tested against the EPF model on a 20-area Nordic dataset. (Author)

  10. Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Lan Liu

    2017-01-01

    Full Text Available As the adoption of Software Defined Networks (SDNs grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the nodes between subnets. We also find that there exists a mobility rate threshold qc. The network malware will spread in the SDN when the mobility rate q>qc. The malware will survive when q>qc and perish when qmodel is effective, and the results may help to decide the SDN control strategy to defend against network malware and provide a theoretical basis to reduce and prevent network security incidents.

  11. Creating, generating and comparing random network models with NetworkRandomizer.

    Science.gov (United States)

    Tosadori, Gabriele; Bestvina, Ivan; Spoto, Fausto; Laudanna, Carlo; Scardoni, Giovanni

    2016-01-01

    Biological networks are becoming a fundamental tool for the investigation of high-throughput data in several fields of biology and biotechnology. With the increasing amount of information, network-based models are gaining more and more interest and new techniques are required in order to mine the information and to validate the results. To fill the validation gap we present an app, for the Cytoscape platform, which aims at creating randomised networks and randomising existing, real networks. Since there is a lack of tools that allow performing such operations, our app aims at enabling researchers to exploit different, well known random network models that could be used as a benchmark for validating real, biological datasets. We also propose a novel methodology for creating random weighted networks, i.e. the multiplication algorithm, starting from real, quantitative data. Finally, the app provides a statistical tool that compares real versus randomly computed attributes, in order to validate the numerical findings. In summary, our app aims at creating a standardised methodology for the validation of the results in the context of the Cytoscape platform.

  12. Stochastic Boolean networks: An efficient approach to modeling gene regulatory networks

    Directory of Open Access Journals (Sweden)

    Liang Jinghang

    2012-08-01

    Full Text Available Abstract Background Various computational models have been of interest due to their use in the modelling of gene regulatory networks (GRNs. As a logical model, probabilistic Boolean networks (PBNs consider molecular and genetic noise, so the study of PBNs provides significant insights into the understanding of the dynamics of GRNs. This will ultimately lead to advances in developing therapeutic methods that intervene in the process of disease development and progression. The applications of PBNs, however, are hindered by the complexities involved in the computation of the state transition matrix and the steady-state distribution of a PBN. For a PBN with n genes and N Boolean networks, the complexity to compute the state transition matrix is O(nN22n or O(nN2n for a sparse matrix. Results This paper presents a novel implementation of PBNs based on the notions of stochastic logic and stochastic computation. This stochastic implementation of a PBN is referred to as a stochastic Boolean network (SBN. An SBN provides an accurate and efficient simulation of a PBN without and with random gene perturbation. The state transition matrix is computed in an SBN with a complexity of O(nL2n, where L is a factor related to the stochastic sequence length. Since the minimum sequence length required for obtaining an evaluation accuracy approximately increases in a polynomial order with the number of genes, n, and the number of Boolean networks, N, usually increases exponentially with n, L is typically smaller than N, especially in a network with a large number of genes. Hence, the computational efficiency of an SBN is primarily limited by the number of genes, but not directly by the total possible number of Boolean networks. Furthermore, a time-frame expanded SBN enables an efficient analysis of the steady-state distribution of a PBN. These findings are supported by the simulation results of a simplified p53 network, several randomly generated networks and a

  13. Network interconnections: an architectural reference model

    NARCIS (Netherlands)

    Butscher, B.; Lenzini, L.; Morling, R.; Vissers, C.A.; Popescu-Zeletin, R.; van Sinderen, Marten J.; Heger, D.; Krueger, G.; Spaniol, O.; Zorn, W.

    1985-01-01

    One of the major problems in understanding the different approaches in interconnecting networks of different technologies is the lack of reference to a general model. The paper develops the rationales for a reference model of network interconnection and focuses on the architectural implications for

  14. The development of neutron detectors for the GEM instrument at ISIS

    International Nuclear Information System (INIS)

    Rhodes, N.J.; Johnson, M.W.; Schooneveld, E.M.

    2001-01-01

    GEM is a new General Materials diffractometer now being commissioned at ISIS. To meet its broad based scientific programme GEM requires a large area position sensitive detector which covers a wide range of scattering angles and exhibits a high neutron count rate stability. This paper discusses the design of a ZnS/ 6 Li fibre coupled detector array that meets the GEM requirements. Typical detector characteristics are documented together with the current status of the project. Two thirds of the detector array are operational and from the results obtained to date it is already obvious that the impact of this instrument on neutron scattering studies will be profound. (author)

  15. User guide for the POLARIS powder diffractometer at ISIS

    International Nuclear Information System (INIS)

    Hull, S.; Mayers, J.

    1989-11-01

    The POLARIS spectrometer at ISIS is currently being scheduled for use as a high intensity, medium resolution powder diffractometer. The particularly high neutron flux on POLARIS enables experiments to be performed with comparatively short counting times or on small sample volumes. This ability has been exploited during kinetic experiments of phase changes, where diffraction data is collected whilst the furnace is heating up. The provision of a large detector bank at 2 θ ∼ 90 0 is particularly important for studies of powder samples at high pressures. This scattering geometry has significant advantages for experiments of this kind, as suitable collimation of the incident and outgoing beams eliminates scattering from the surrounding pressure transmitting medium. This guide is intended to give a short description of the POLARIS powder diffractometer and to provide the basic information required to perform a powder diffraction experiment. (author)

  16. A general evolving model for growing bipartite networks

    International Nuclear Information System (INIS)

    Tian, Lixin; He, Yinghuan; Liu, Haijun; Du, Ruijin

    2012-01-01

    In this Letter, we propose and study an inner evolving bipartite network model. Significantly, we prove that the degree distribution of two different kinds of nodes both obey power-law form with adjustable exponents. Furthermore, the joint degree distribution of any two nodes for bipartite networks model is calculated analytically by the mean-field method. The result displays that such bipartite networks are nearly uncorrelated networks, which is different from one-mode networks. Numerical simulations and empirical results are given to verify the theoretical results. -- Highlights: ► We proposed a general evolving bipartite network model which was based on priority connection, reconnection and breaking edges. ► We prove that the degree distribution of two different kinds of nodes both obey power-law form with adjustable exponents. ► The joint degree distribution of any two nodes for bipartite networks model is calculated analytically by the mean-field method. ► The result displays that such bipartite networks are nearly uncorrelated networks, which is different from one-mode networks.

  17. Evaluating ADS, ISI Web of Knowledge and Scopus in the Context of Two Astronomy Libraries in Spain

    Science.gov (United States)

    Gomez, M.; Merida Martín, F.

    2007-10-01

    We present the results of a comparative analysis of ADS, ISI Web of Knowledge and Scopus in the context of two astronomical libraries as well as the results of a patron survey conducted to determine how patrons use these services to get the information they need.

  18. Model of community emergence in weighted social networks

    Science.gov (United States)

    Kumpula, J. M.; Onnela, J.-P.; Saramäki, J.; Kertész, J.; Kaski, K.

    2009-04-01

    Over the years network theory has proven to be rapidly expanding methodology to investigate various complex systems and it has turned out to give quite unparalleled insight to their structure, function, and response through data analysis, modeling, and simulation. For social systems in particular the network approach has empirically revealed a modular structure due to interplay between the network topology and link weights between network nodes or individuals. This inspired us to develop a simple network model that could catch some salient features of mesoscopic community and macroscopic topology formation during network evolution. Our model is based on two fundamental mechanisms of network sociology for individuals to find new friends, namely cyclic closure and focal closure, which are mimicked by local search-link-reinforcement and random global attachment mechanisms, respectively. In addition we included to the model a node deletion mechanism by removing all its links simultaneously, which corresponds for an individual to depart from the network. Here we describe in detail the implementation of our model algorithm, which was found to be computationally efficient and produce many empirically observed features of large-scale social networks. Thus this model opens a new perspective for studying such collective social phenomena as spreading, structure formation, and evolutionary processes.

  19. A quantum-implementable neural network model

    Science.gov (United States)

    Chen, Jialin; Wang, Lingli; Charbon, Edoardo

    2017-10-01

    A quantum-implementable neural network, namely quantum probability neural network (QPNN) model, is proposed in this paper. QPNN can use quantum parallelism to trace all possible network states to improve the result. Due to its unique quantum nature, this model is robust to several quantum noises under certain conditions, which can be efficiently implemented by the qubus quantum computer. Another advantage is that QPNN can be used as memory to retrieve the most relevant data and even to generate new data. The MATLAB experimental results of Iris data classification and MNIST handwriting recognition show that much less neuron resources are required in QPNN to obtain a good result than the classical feedforward neural network. The proposed QPNN model indicates that quantum effects are useful for real-life classification tasks.

  20. Analisis Isi SMS Iklan Layanan Telekomunikasi Operator Telkomsel, Indosat dan Xl berdasarkan Etika Pariwara Indonesia Periode 2013

    Directory of Open Access Journals (Sweden)

    Danang Trijayanto

    2014-09-01

    Full Text Available Perkembangan teknologi komunikasi merevolusi aktivitas pemasaran ke mobile marketing, salah satunya adalah dengan SMS advertising. Badan usaha yang cenderung menggunakan cara pemasaran tersebut adalah operator selular dengan iklan produk layanan telekomunikasinya. Permasalahannya adalah strategi pemasaran produk telekomunikasi yang cenderung banyak merugikan pelanggan karena ketidaksesuaian antara isi iklan dan produk yang diperoleh, yang dipengaruhi oleh kelengkapan dan kejelasan informasi produk. Salah satu aturan yang menjadi dasar dalam aktivitas SMS advertising adalah berdasarkan Etika Pariwara Indonesia.  Penelitian  ini   meneliti  bagaimanakah  Penerapan aturan tersebut terhadap isi SMS iklan produk telekomunikasi yang dikirimkan oleh provider selular GSM prabayar pada bulan Juli hingga Nopember 2013.  Hasil  Penelitian menunjukkan bahwa dalam mengiklankan produk telekomunikasi melalui SMS advertising, para operator selular belum menerapkan regulasi dan etika pemasaran dengan baik. Kekurangan informasi yang belum lengkap terdapat pada informasi syarat kontrak yang menjadi informasi dasar hak dan kewajiban yang harus dipenuhi oleh pelanggan.

  1. Modeling acquaintance networks based on balance theory

    Directory of Open Access Journals (Sweden)

    Vukašinović Vida

    2014-09-01

    Full Text Available An acquaintance network is a social structure made up of a set of actors and the ties between them. These ties change dynamically as a consequence of incessant interactions between the actors. In this paper we introduce a social network model called the Interaction-Based (IB model that involves well-known sociological principles. The connections between the actors and the strength of the connections are influenced by the continuous positive and negative interactions between the actors and, vice versa, the future interactions are more likely to happen between the actors that are connected with stronger ties. The model is also inspired by the social behavior of animal species, particularly that of ants in their colony. A model evaluation showed that the IB model turned out to be sparse. The model has a small diameter and an average path length that grows in proportion to the logarithm of the number of vertices. The clustering coefficient is relatively high, and its value stabilizes in larger networks. The degree distributions are slightly right-skewed. In the mature phase of the IB model, i.e., when the number of edges does not change significantly, most of the network properties do not change significantly either. The IB model was found to be the best of all the compared models in simulating the e-mail URV (University Rovira i Virgili of Tarragona network because the properties of the IB model more closely matched those of the e-mail URV network than the other models

  2. Mathematical Modelling Plant Signalling Networks

    KAUST Repository

    Muraro, D.

    2013-01-01

    During the last two decades, molecular genetic studies and the completion of the sequencing of the Arabidopsis thaliana genome have increased knowledge of hormonal regulation in plants. These signal transduction pathways act in concert through gene regulatory and signalling networks whose main components have begun to be elucidated. Our understanding of the resulting cellular processes is hindered by the complex, and sometimes counter-intuitive, dynamics of the networks, which may be interconnected through feedback controls and cross-regulation. Mathematical modelling provides a valuable tool to investigate such dynamics and to perform in silico experiments that may not be easily carried out in a laboratory. In this article, we firstly review general methods for modelling gene and signalling networks and their application in plants. We then describe specific models of hormonal perception and cross-talk in plants. This mathematical analysis of sub-cellular molecular mechanisms paves the way for more comprehensive modelling studies of hormonal transport and signalling in a multi-scale setting. © EDP Sciences, 2013.

  3. Ripple-Spreading Network Model Optimization by Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Xiao-Bing Hu

    2013-01-01

    Full Text Available Small-world and scale-free properties are widely acknowledged in many real-world complex network systems, and many network models have been developed to capture these network properties. The ripple-spreading network model (RSNM is a newly reported complex network model, which is inspired by the natural ripple-spreading phenomenon on clam water surface. The RSNM exhibits good potential for describing both spatial and temporal features in the development of many real-world networks where the influence of a few local events spreads out through nodes and then largely determines the final network topology. However, the relationships between ripple-spreading related parameters (RSRPs of RSNM and small-world and scale-free topologies are not as obvious or straightforward as in many other network models. This paper attempts to apply genetic algorithm (GA to tune the values of RSRPs, so that the RSNM may generate these two most important network topologies. The study demonstrates that, once RSRPs are properly tuned by GA, the RSNM is capable of generating both network topologies and therefore has a great flexibility to study many real-world complex network systems.

  4. Constitutive modelling of composite biopolymer networks.

    Science.gov (United States)

    Fallqvist, B; Kroon, M

    2016-04-21

    The mechanical behaviour of biopolymer networks is to a large extent determined at a microstructural level where the characteristics of individual filaments and the interactions between them determine the response at a macroscopic level. Phenomena such as viscoelasticity and strain-hardening followed by strain-softening are observed experimentally in these networks, often due to microstructural changes (such as filament sliding, rupture and cross-link debonding). Further, composite structures can also be formed with vastly different mechanical properties as compared to the individual networks. In this present paper, we present a constitutive model presented in a continuum framework aimed at capturing these effects. Special care is taken to formulate thermodynamically consistent evolution laws for dissipative effects. This model, incorporating possible anisotropic network properties, is based on a strain energy function, split into an isochoric and a volumetric part. Generalisation to three dimensions is performed by numerical integration over the unit sphere. Model predictions indicate that the constitutive model is well able to predict the elastic and viscoelastic response of biological networks, and to an extent also composite structures. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Seven decades of history of science: I. Bernard Cohen (1914-2003), second editor of Isis.

    Science.gov (United States)

    Dauben, Joseph W; Gleason, Mary Louise; Smith, George E

    2009-03-01

    I. Bernard Cohen (1914-2003), the first American to receive a Ph.D. in history of science, was a Harvard undergraduate ('37) and then a Ph.D. student and protégé of George Sarton, founder of Isis and the History of Science Society. He went on to succeed Sarton as editor of Isis (1952-1958) and, later, president of the Society (1961-1962); he was also a president of the International Union of the History and Philosophy of Science. Cohen was an internationally recognized Newton scholar; his interests were encyclopedic, ranging from science and public policy to the history of computers, with several decades as a special consultant for history of computing with IBM. Among his hundreds of publications were such major books as Franklin and Newton (1956), The Birth of a New Physics (1959; rpt., 1985), The Newtonian Revolution (1980), Revolution in Science (1985), Science and the Founding Fathers (1995), Howard Aiken: Portrait of a Computer Pioneer (1999), and his last book, The Triumph of Numbers (2005), not to mention two jointly authored contributions, the variorum edition and new English translation of Newton's Principia, which will surely still be read a century from now.

  6. Bayesian latent feature modeling for modeling bipartite networks with overlapping groups

    DEFF Research Database (Denmark)

    Jørgensen, Philip H.; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2016-01-01

    Bi-partite networks are commonly modelled using latent class or latent feature models. Whereas the existing latent class models admit marginalization of parameters specifying the strength of interaction between groups, existing latent feature models do not admit analytical marginalization...... by the notion of community structure such that the edge density within groups is higher than between groups. Our model further assumes that entities can have different propensities of generating links in one of the modes. The proposed framework is contrasted on both synthetic and real bi-partite networks...... feature representations in bipartite networks provides a new framework for accounting for structure in bi-partite networks using binary latent feature representations providing interpretable representations that well characterize structure as quantified by link prediction....

  7. A Search Model with a Quasi-Network

    DEFF Research Database (Denmark)

    Ejarque, Joao Miguel

    This paper adds a quasi-network to a search model of the labor market. Fitting the model to an average unemployment rate and to other moments in the data implies the presence of the network is not noticeable in the basic properties of the unemployment and job finding rates. However, the network...

  8. Mathematical model for spreading dynamics of social network worms

    International Nuclear Information System (INIS)

    Sun, Xin; Liu, Yan-Heng; Han, Jia-Wei; Liu, Xue-Jie; Li, Bin; Li, Jin

    2012-01-01

    In this paper, a mathematical model for social network worm spreading is presented from the viewpoint of social engineering. This model consists of two submodels. Firstly, a human behavior model based on game theory is suggested for modeling and predicting the expected behaviors of a network user encountering malicious messages. The game situation models the actions of a user under the condition that the system may be infected at the time of opening a malicious message. Secondly, a social network accessing model is proposed to characterize the dynamics of network users, by which the number of online susceptible users can be determined at each time step. Several simulation experiments are carried out on artificial social networks. The results show that (1) the proposed mathematical model can well describe the spreading dynamics of social network worms; (2) weighted network topology greatly affects the spread of worms; (3) worms spread even faster on hybrid social networks

  9. A comprehensive multi-local-world model for complex networks

    International Nuclear Information System (INIS)

    Fan Zhengping; Chen Guanrong; Zhang Yunong

    2009-01-01

    The nodes in a community within a network are much more connected to each other than to the others outside the community in the same network. This phenomenon has been commonly observed from many real-world networks, ranging from social to biological even to technical networks. Meanwhile, the number of communities in some real-world networks, such as the Internet and most social networks, are evolving with time. To model this kind of networks, the present Letter proposes a multi-local-world (MLW) model to capture and describe their essential topological properties. Based on the mean-field theory, the degree distribution of this model is obtained analytically, showing that the generated network has a novel topological feature as being not completely random nor completely scale-free but behaving somewhere between them. As a typical application, the MLW model is applied to characterize the Internet against some other models such as the BA, GBA, Fitness and HOT models, demonstrating the superiority of the new model.

  10. Agent based modeling of energy networks

    International Nuclear Information System (INIS)

    Gonzalez de Durana, José María; Barambones, Oscar; Kremers, Enrique; Varga, Liz

    2014-01-01

    Highlights: • A new approach for energy network modeling is designed and tested. • The agent-based approach is general and no technology dependent. • The models can be easily extended. • The range of applications encompasses from small to large energy infrastructures. - Abstract: Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed

  11. Thermal conductivity model for nanofiber networks

    Science.gov (United States)

    Zhao, Xinpeng; Huang, Congliang; Liu, Qingkun; Smalyukh, Ivan I.; Yang, Ronggui

    2018-02-01

    Understanding thermal transport in nanofiber networks is essential for their applications in thermal management, which are used extensively as mechanically sturdy thermal insulation or high thermal conductivity materials. In this study, using the statistical theory and Fourier's law of heat conduction while accounting for both the inter-fiber contact thermal resistance and the intrinsic thermal resistance of nanofibers, an analytical model is developed to predict the thermal conductivity of nanofiber networks as a function of their geometric and thermal properties. A scaling relation between the thermal conductivity and the geometric properties including volume fraction and nanofiber length of the network is revealed. This model agrees well with both numerical simulations and experimental measurements found in the literature. This model may prove useful in analyzing the experimental results and designing nanofiber networks for both high and low thermal conductivity applications.

  12. Thermal conductivity model for nanofiber networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhao, Xinpeng [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309, USA; Huang, Congliang [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309, USA; School of Electrical and Power Engineering, China University of Mining and Technology, Xuzhou 221116, China; Liu, Qingkun [Department of Physics, University of Colorado, Boulder, Colorado 80309, USA; Smalyukh, Ivan I. [Department of Physics, University of Colorado, Boulder, Colorado 80309, USA; Materials Science and Engineering Program, University of Colorado, Boulder, Colorado 80309, USA; Yang, Ronggui [Department of Mechanical Engineering, University of Colorado, Boulder, Colorado 80309, USA; Materials Science and Engineering Program, University of Colorado, Boulder, Colorado 80309, USA; Buildings and Thermal Systems Center, National Renewable Energy Laboratory, Golden, Colorado 80401, USA

    2018-02-28

    Understanding thermal transport in nanofiber networks is essential for their applications in thermal management, which are used extensively as mechanically sturdy thermal insulation or high thermal conductivity materials. In this study, using the statistical theory and Fourier's law of heat conduction while accounting for both the inter-fiber contact thermal resistance and the intrinsic thermal resistance of nanofibers, an analytical model is developed to predict the thermal conductivity of nanofiber networks as a function of their geometric and thermal properties. A scaling relation between the thermal conductivity and the geometric properties including volume fraction and nanofiber length of the network is revealed. This model agrees well with both numerical simulations and experimental measurements found in the literature. This model may prove useful in analyzing the experimental results and designing nanofiber networks for both high and low thermal conductivity applications.

  13. Infinite Multiple Membership Relational Modeling for Complex Networks

    DEFF Research Database (Denmark)

    Mørup, Morten; Schmidt, Mikkel Nørgaard; Hansen, Lars Kai

    Learning latent structure in complex networks has become an important problem fueled by many types of networked data originating from practically all fields of science. In this paper, we propose a new non-parametric Bayesian multiplemembership latent feature model for networks. Contrary to existing...... multiplemembership models that scale quadratically in the number of vertices the proposedmodel scales linearly in the number of links admittingmultiple-membership analysis in large scale networks. We demonstrate a connection between the single membership relational model and multiple membership models and show...

  14. Modeling Epidemics Spreading on Social Contact Networks.

    Science.gov (United States)

    Zhang, Zhaoyang; Wang, Honggang; Wang, Chonggang; Fang, Hua

    2015-09-01

    Social contact networks and the way people interact with each other are the key factors that impact on epidemics spreading. However, it is challenging to model the behavior of epidemics based on social contact networks due to their high dynamics. Traditional models such as susceptible-infected-recovered (SIR) model ignore the crowding or protection effect and thus has some unrealistic assumption. In this paper, we consider the crowding or protection effect and develop a novel model called improved SIR model. Then, we use both deterministic and stochastic models to characterize the dynamics of epidemics on social contact networks. The results from both simulations and real data set conclude that the epidemics are more likely to outbreak on social contact networks with higher average degree. We also present some potential immunization strategies, such as random set immunization, dominating set immunization, and high degree set immunization to further prove the conclusion.

  15. Port Hamiltonian modeling of Power Networks

    NARCIS (Netherlands)

    van Schaik, F.; van der Schaft, Abraham; Scherpen, Jacquelien M.A.; Zonetti, Daniele; Ortega, R

    2012-01-01

    In this talk a full nonlinear model for the power network in port–Hamiltonian framework is derived to study its stability properties. For this we use the modularity approach i.e., we first derive the models of individual components in power network as port-Hamiltonian systems and then we combine all

  16. Graphical Model Theory for Wireless Sensor Networks

    International Nuclear Information System (INIS)

    Davis, William B.

    2002-01-01

    Information processing in sensor networks, with many small processors, demands a theory of computation that allows the minimization of processing effort, and the distribution of this effort throughout the network. Graphical model theory provides a probabilistic theory of computation that explicitly addresses complexity and decentralization for optimizing network computation. The junction tree algorithm, for decentralized inference on graphical probability models, can be instantiated in a variety of applications useful for wireless sensor networks, including: sensor validation and fusion; data compression and channel coding; expert systems, with decentralized data structures, and efficient local queries; pattern classification, and machine learning. Graphical models for these applications are sketched, and a model of dynamic sensor validation and fusion is presented in more depth, to illustrate the junction tree algorithm

  17. A Simplified Network Model for Travel Time Reliability Analysis in a Road Network

    Directory of Open Access Journals (Sweden)

    Kenetsu Uchida

    2017-01-01

    Full Text Available This paper proposes a simplified network model which analyzes travel time reliability in a road network. A risk-averse driver is assumed in the simplified model. The risk-averse driver chooses a path by taking into account both a path travel time variance and a mean path travel time. The uncertainty addressed in this model is that of traffic flows (i.e., stochastic demand flows. In the simplified network model, the path travel time variance is not calculated by considering all travel time covariance between two links in the network. The path travel time variance is calculated by considering all travel time covariance between two adjacent links in the network. Numerical experiments are carried out to illustrate the applicability and validity of the proposed model. The experiments introduce the path choice behavior of a risk-neutral driver and several types of risk-averse drivers. It is shown that the mean link flows calculated by introducing the risk-neutral driver differ as a whole from those calculated by introducing several types of risk-averse drivers. It is also shown that the mean link flows calculated by the simplified network model are almost the same as the flows calculated by using the exact path travel time variance.

  18. DISE Summary Report (1992)

    Science.gov (United States)

    1994-03-01

    Specification and Network Time Protocol(NTP) over the Implementation. RFC-o 119, Network OSI Remote Operations Service. RFC- Working Group, September...approximately ISIS implements a powerful model of 94% of the total computation time. distributed computation known as modelo Timing results are

  19. Stochastic actor-oriented models for network change

    NARCIS (Netherlands)

    Snijders, T.A.B.

    1996-01-01

    A class of models is proposed for longitudinal network data. These models are along the lines of methodological individualism: actors use heuristics to try to achieve their individual goals, subject to constraints. The current network structure is among these constraints. The models are continuous

  20. Hybrid neural network bushing model for vehicle dynamics simulation

    International Nuclear Information System (INIS)

    Sohn, Jeong Hyun; Lee, Seung Kyu; Yoo, Wan Suk

    2008-01-01

    Although the linear model was widely used for the bushing model in vehicle suspension systems, it could not express the nonlinear characteristics of bushing in terms of the amplitude and the frequency. An artificial neural network model was suggested to consider the hysteretic responses of bushings. This model, however, often diverges due to the uncertainties of the neural network under the unexpected excitation inputs. In this paper, a hybrid neural network bushing model combining linear and neural network is suggested. A linear model was employed to represent linear stiffness and damping effects, and the artificial neural network algorithm was adopted to take into account the hysteretic responses. A rubber test was performed to capture bushing characteristics, where sine excitation with different frequencies and amplitudes is applied. Random test results were used to update the weighting factors of the neural network model. It is proven that the proposed model has more robust characteristics than a simple neural network model under step excitation input. A full car simulation was carried out to verify the proposed bushing models. It was shown that the hybrid model results are almost identical to the linear model under several maneuvers

  1. Linear and nonlinear methods in modeling the aqueous solubility of organic compounds.

    Science.gov (United States)

    Catana, Cornel; Gao, Hua; Orrenius, Christian; Stouten, Pieter F W

    2005-01-01

    Solubility data for 930 diverse compounds have been analyzed using linear Partial Least Square (PLS) and nonlinear PLS methods, Continuum Regression (CR), and Neural Networks (NN). 1D and 2D descriptors from MOE package in combination with E-state or ISIS keys have been used. The best model was obtained using linear PLS for a combination between 22 MOE descriptors and 65 ISIS keys. It has a correlation coefficient (r2) of 0.935 and a root-mean-square error (RMSE) of 0.468 log molar solubility (log S(w)). The model validated on a test set of 177 compounds not included in the training set has r2 0.911 and RMSE 0.475 log S(w). The descriptors were ranked according to their importance, and at the top of the list have been found the 22 MOE descriptors. The CR model produced results as good as PLS, and because of the way in which cross-validation has been done it is expected to be a valuable tool in prediction besides PLS model. The statistics obtained using nonlinear methods did not surpass those got with linear ones. The good statistic obtained for linear PLS and CR recommends these models to be used in prediction when it is difficult or impossible to make experimental measurements, for virtual screening, combinatorial library design, and efficient leads optimization.

  2. Mathematical model of highways network optimization

    Science.gov (United States)

    Sakhapov, R. L.; Nikolaeva, R. V.; Gatiyatullin, M. H.; Makhmutov, M. M.

    2017-12-01

    The article deals with the issue of highways network design. Studies show that the main requirement from road transport for the road network is to ensure the realization of all the transport links served by it, with the least possible cost. The goal of optimizing the network of highways is to increase the efficiency of transport. It is necessary to take into account a large number of factors that make it difficult to quantify and qualify their impact on the road network. In this paper, we propose building an optimal variant for locating the road network on the basis of a mathematical model. The article defines the criteria for optimality and objective functions that reflect the requirements for the road network. The most fully satisfying condition for optimality is the minimization of road and transport costs. We adopted this indicator as a criterion of optimality in the economic-mathematical model of a network of highways. Studies have shown that each offset point in the optimal binding road network is associated with all other corresponding points in the directions providing the least financial costs necessary to move passengers and cargo from this point to the other corresponding points. The article presents general principles for constructing an optimal network of roads.

  3. Neural network modeling of associative memory: Beyond the Hopfield model

    Science.gov (United States)

    Dasgupta, Chandan

    1992-07-01

    A number of neural network models, in which fixed-point and limit-cycle attractors of the underlying dynamics are used to store and associatively recall information, are described. In the first class of models, a hierarchical structure is used to store an exponentially large number of strongly correlated memories. The second class of models uses limit cycles to store and retrieve individual memories. A neurobiologically plausible network that generates low-amplitude periodic variations of activity, similar to the oscillations observed in electroencephalographic recordings, is also described. Results obtained from analytic and numerical studies of the properties of these networks are discussed.

  4. Sparsity in Model Gene Regulatory Networks

    International Nuclear Information System (INIS)

    Zagorski, M.

    2011-01-01

    We propose a gene regulatory network model which incorporates the microscopic interactions between genes and transcription factors. In particular the gene's expression level is determined by deterministic synchronous dynamics with contribution from excitatory interactions. We study the structure of networks that have a particular '' function '' and are subject to the natural selection pressure. The question of network robustness against point mutations is addressed, and we conclude that only a small part of connections defined as '' essential '' for cell's existence is fragile. Additionally, the obtained networks are sparse with narrow in-degree and broad out-degree, properties well known from experimental study of biological regulatory networks. Furthermore, during sampling procedure we observe that significantly different genotypes can emerge under mutation-selection balance. All the preceding features hold for the model parameters which lay in the experimentally relevant range. (author)

  5. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  6. Gigabit Network Communications Research, Quarterly R and D Report Number 10

    Science.gov (United States)

    1993-03-01

    EDTIC- ELECTE .SSEP01O3IS" EU * Sponsored by Advanced Research Projects Agency (DoD) Computer Systems Technology Office Gigabit Network Communications... Information ", Xylogics Inc., January 1993. RFC 1389: Malkin, G. (Xylogics Inc.), and F. Baker (Advanced Computer Communications), "RIP Version 2 MIB...Reynolds, J.K., "BOOTP Vendor Information Extensions", USC/ISI, January 1993. RFC 1396: Crocker, S., "The Process for Organization of Internet Standards

  7. Crisis of interspike intervals in Hodgkin-Huxley model

    International Nuclear Information System (INIS)

    Jin Wuyin; Xu Jianxue; Wu Ying; Hong Ling; Wei Yaobing

    2006-01-01

    The bifurcations of the chaotic attractor in a Hodgkin-Huxley (H-H) model under stimulation of periodic signal is presented in this work, where the frequency of signal is taken as the controlling parameter. The chaotic behavior is realized over a wide range of frequency and is visualized by using interspike intervals (ISIs). Many kinds of abrupt undergoing changes of the ISIs are observed in different frequency regions, such as boundary crisis, interior crisis and merging crisis displaying alternately along with the changes of external signal frequency. And there are logistic-like bifurcation behaviors, e.g., periodic windows and fractal structures in ISIs dynamics. The saddle-node bifurcations resulting in collapses of chaos to period-6 orbit in dynamics of ISIs are identified

  8. Optimal transportation networks models and theory

    CERN Document Server

    Bernot, Marc; Morel, Jean-Michel

    2009-01-01

    The transportation problem can be formalized as the problem of finding the optimal way to transport a given measure into another with the same mass. In contrast to the Monge-Kantorovitch problem, recent approaches model the branched structure of such supply networks as minima of an energy functional whose essential feature is to favour wide roads. Such a branched structure is observable in ground transportation networks, in draining and irrigation systems, in electrical power supply systems and in natural counterparts such as blood vessels or the branches of trees. These lectures provide mathematical proof of several existence, structure and regularity properties empirically observed in transportation networks. The link with previous discrete physical models of irrigation and erosion models in geomorphology and with discrete telecommunication and transportation models is discussed. It will be mathematically proven that the majority fit in the simple model sketched in this volume.

  9. Northern emporia and maritime networks. Modelling past communication using archaeological network analysis

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2015-01-01

    preserve patterns of thisinteraction. Formal network analysis and modelling holds the potential to identify anddemonstrate such patterns, where traditional methods often prove inadequate. Thearchaeological study of communication networks in the past, however, calls for radically different analytical...... this is not a problem of network analysis, but network synthesis: theclassic problem of cracking codes or reconstructing black-box circuits. It is proposedthat archaeological approaches to network synthesis must involve a contextualreading of network data: observations arising from individual contexts, morphologies...

  10. Road network safety evaluation using Bayesian hierarchical joint model.

    Science.gov (United States)

    Wang, Jie; Huang, Helai

    2016-05-01

    Safety and efficiency are commonly regarded as two significant performance indicators of transportation systems. In practice, road network planning has focused on road capacity and transport efficiency whereas the safety level of a road network has received little attention in the planning stage. This study develops a Bayesian hierarchical joint model for road network safety evaluation to help planners take traffic safety into account when planning a road network. The proposed model establishes relationships between road network risk and micro-level variables related to road entities and traffic volume, as well as socioeconomic, trip generation and network density variables at macro level which are generally used for long term transportation plans. In addition, network spatial correlation between intersections and their connected road segments is also considered in the model. A road network is elaborately selected in order to compare the proposed hierarchical joint model with a previous joint model and a negative binomial model. According to the results of the model comparison, the hierarchical joint model outperforms the joint model and negative binomial model in terms of the goodness-of-fit and predictive performance, which indicates the reasonableness of considering the hierarchical data structure in crash prediction and analysis. Moreover, both random effects at the TAZ level and the spatial correlation between intersections and their adjacent segments are found to be significant, supporting the employment of the hierarchical joint model as an alternative in road-network-level safety modeling as well. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Modeling online social networks based on preferential linking

    International Nuclear Information System (INIS)

    Hu Hai-Bo; Chen Jun; Guo Jin-Li

    2012-01-01

    We study the phenomena of preferential linking in a large-scale evolving online social network and find that the linear preference holds for preferential creation, preferential acceptance, and preferential attachment. Based on the linear preference, we propose an analyzable model, which illustrates the mechanism of network growth and reproduces the process of network evolution. Our simulations demonstrate that the degree distribution of the network produced by the model is in good agreement with that of the real network. This work provides a possible bridge between the micro-mechanisms of network growth and the macrostructures of online social networks

  12. Stabilization of model-based networked control systems

    Energy Technology Data Exchange (ETDEWEB)

    Miranda, Francisco [CIDMA, Universidade de Aveiro, Aveiro (Portugal); Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); Abreu, Carlos [Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); CMEMS-UMINHO, Universidade do Minho, Braga (Portugal); Mendes, Paulo M. [CMEMS-UMINHO, Universidade do Minho, Braga (Portugal)

    2016-06-08

    A class of networked control systems called Model-Based Networked Control Systems (MB-NCSs) is considered. Stabilization of MB-NCSs is studied using feedback controls and simulation of stabilization for different feedbacks is made with the purpose to reduce the network trafic. The feedback control input is applied in a compensated model of the plant that approximates the plant dynamics and stabilizes the plant even under slow network conditions. Conditions for global exponential stabilizability and for the choosing of a feedback control input for a given constant time between the information moments of the network are derived. An optimal control problem to obtain an optimal feedback control is also presented.

  13. Discrete dynamic modeling of cellular signaling networks.

    Science.gov (United States)

    Albert, Réka; Wang, Rui-Sheng

    2009-01-01

    Understanding signal transduction in cellular systems is a central issue in systems biology. Numerous experiments from different laboratories generate an abundance of individual components and causal interactions mediating environmental and developmental signals. However, for many signal transduction systems there is insufficient information on the overall structure and the molecular mechanisms involved in the signaling network. Moreover, lack of kinetic and temporal information makes it difficult to construct quantitative models of signal transduction pathways. Discrete dynamic modeling, combined with network analysis, provides an effective way to integrate fragmentary knowledge of regulatory interactions into a predictive mathematical model which is able to describe the time evolution of the system without the requirement for kinetic parameters. This chapter introduces the fundamental concepts of discrete dynamic modeling, particularly focusing on Boolean dynamic models. We describe this method step-by-step in the context of cellular signaling networks. Several variants of Boolean dynamic models including threshold Boolean networks and piecewise linear systems are also covered, followed by two examples of successful application of discrete dynamic modeling in cell biology.

  14. Neural network tagging in a toy model

    International Nuclear Information System (INIS)

    Milek, Marko; Patel, Popat

    1999-01-01

    The purpose of this study is a comparison of Artificial Neural Network approach to HEP analysis against the traditional methods. A toy model used in this analysis consists of two types of particles defined by four generic properties. A number of 'events' was created according to the model using standard Monte Carlo techniques. Several fully connected, feed forward multi layered Artificial Neural Networks were trained to tag the model events. The performance of each network was compared to the standard analysis mechanisms and significant improvement was observed

  15. Modeling Temporal Behavior in Large Networks: A Dynamic Mixed-Membership Model

    Energy Technology Data Exchange (ETDEWEB)

    Rossi, R; Gallagher, B; Neville, J; Henderson, K

    2011-11-11

    Given a large time-evolving network, how can we model and characterize the temporal behaviors of individual nodes (and network states)? How can we model the behavioral transition patterns of nodes? We propose a temporal behavior model that captures the 'roles' of nodes in the graph and how they evolve over time. The proposed dynamic behavioral mixed-membership model (DBMM) is scalable, fully automatic (no user-defined parameters), non-parametric/data-driven (no specific functional form or parameterization), interpretable (identifies explainable patterns), and flexible (applicable to dynamic and streaming networks). Moreover, the interpretable behavioral roles are generalizable, computationally efficient, and natively supports attributes. We applied our model for (a) identifying patterns and trends of nodes and network states based on the temporal behavior, (b) predicting future structural changes, and (c) detecting unusual temporal behavior transitions. We use eight large real-world datasets from different time-evolving settings (dynamic and streaming). In particular, we model the evolving mixed-memberships and the corresponding behavioral transitions of Twitter, Facebook, IP-Traces, Email (University), Internet AS, Enron, Reality, and IMDB. The experiments demonstrate the scalability, flexibility, and effectiveness of our model for identifying interesting patterns, detecting unusual structural transitions, and predicting the future structural changes of the network and individual nodes.

  16. Training courses on neutron detection systems on the ISIS research reactor: on-site and through internet training

    Energy Technology Data Exchange (ETDEWEB)

    Lescop, B.; Badeau, G.; Ivanovic, S.; Foulon, F. [National Institute for Nuclear science and Technology French Atomic Energy and Alternative Energies Commission (CEA), Saclay Research Center, 91191 Gif-sur-Yvette (France)

    2015-07-01

    Today, ISIS research reactor is an essential tool for Education and Training programs organized by the National Institute for Nuclear Science and Technology (INSTN) from CEA. In the field of nuclear instrumentation, the INSTN offers both, theoretical courses and training courses on the use of neutron detection systems taking advantage of the ISIS research reactor for the supply of a wide range of neutron fluxes. This paper describes the content of the training carried out on the use of neutron detectors and detection systems, on-site or remote. The ISIS reactor is a 700 kW open core pool type reactor. The facility is very flexible since neutron detectors can be inserted into the core or its vicinity, and be used at different levels of power according to the needs of the course. Neutron fluxes, typically ranging from 1 to 10{sup 12} n/cm{sup 2}.s, can be obtained for the characterisation of the neutron detectors and detection systems. For the monitoring of the neutron density at low level of power, the Instrumentation and Control (I and C) system of the reactor is equipped with two detection systems, named BN1 and BN2. Each way contains a fission chamber, type CFUL01, connected to an electronic system type SIREX.The system works in pulse mode and exhibits two outputs: the counting rate and the doubling time. For the high level of power, the I and C is equipped with two detection systems HN1 and HN2.Each way contain a boron ionization chamber (type CC52) connected to an electronics system type SIREX. The system works in current mode and has two outputs: the current and the doubling time. For each mode, the trainees can observe and measure the signal at the different stages of the electronic system, with an oscilloscope. They can understand the role of each component of the detection system: detector, cable and each electronic block. The limitation of the detection modes and their operating range can be established from the measured signal. The trainees can also

  17. Training courses on neutron detection systems on the ISIS research reactor: on-site and through internet training

    International Nuclear Information System (INIS)

    Lescop, B.; Badeau, G.; Ivanovic, S.; Foulon, F.

    2015-01-01

    Today, ISIS research reactor is an essential tool for Education and Training programs organized by the National Institute for Nuclear Science and Technology (INSTN) from CEA. In the field of nuclear instrumentation, the INSTN offers both, theoretical courses and training courses on the use of neutron detection systems taking advantage of the ISIS research reactor for the supply of a wide range of neutron fluxes. This paper describes the content of the training carried out on the use of neutron detectors and detection systems, on-site or remote. The ISIS reactor is a 700 kW open core pool type reactor. The facility is very flexible since neutron detectors can be inserted into the core or its vicinity, and be used at different levels of power according to the needs of the course. Neutron fluxes, typically ranging from 1 to 10 12 n/cm 2 .s, can be obtained for the characterisation of the neutron detectors and detection systems. For the monitoring of the neutron density at low level of power, the Instrumentation and Control (I and C) system of the reactor is equipped with two detection systems, named BN1 and BN2. Each way contains a fission chamber, type CFUL01, connected to an electronic system type SIREX.The system works in pulse mode and exhibits two outputs: the counting rate and the doubling time. For the high level of power, the I and C is equipped with two detection systems HN1 and HN2.Each way contain a boron ionization chamber (type CC52) connected to an electronics system type SIREX. The system works in current mode and has two outputs: the current and the doubling time. For each mode, the trainees can observe and measure the signal at the different stages of the electronic system, with an oscilloscope. They can understand the role of each component of the detection system: detector, cable and each electronic block. The limitation of the detection modes and their operating range can be established from the measured signal. The trainees can also modify the

  18. Improved Maximum Parsimony Models for Phylogenetic Networks.

    Science.gov (United States)

    Van Iersel, Leo; Jones, Mark; Scornavacca, Celine

    2018-05-01

    Phylogenetic networks are well suited to represent evolutionary histories comprising reticulate evolution. Several methods aiming at reconstructing explicit phylogenetic networks have been developed in the last two decades. In this article, we propose a new definition of maximum parsimony for phylogenetic networks that permits to model biological scenarios that cannot be modeled by the definitions currently present in the literature (namely, the "hardwired" and "softwired" parsimony). Building on this new definition, we provide several algorithmic results that lay the foundations for new parsimony-based methods for phylogenetic network reconstruction.

  19. AMES, NESC and ENIQ: European networks in the field of structural integrity involving NDE and inspection effectiveness assessment

    International Nuclear Information System (INIS)

    Crutzen, S.; Hurst, R.; Debarberis, L.; Lemaitre, P.; Eriksen, B.

    1999-01-01

    Three European networks on structural integrity aspects of ageing nuclear components are presently managed by the Institute for Advanced Materials of the Joint Research Centre of the European Commission: AMES (Ageing Materials Evaluation and Studies), ENIQ (European Network for Inspection Qualification) and NESC (Network for Evaluating Steel Components). All three networks involve actions, which aim at the effectiveness and reliability assessment of NDE techniques and of inspection procedures: Either for materials damage detection and characterisation or for defect detection and evaluation. This paper is describing very generally the objectives of the three networks and is then concentrating on the results obtained in ENIQ, which are relevant with ISI and regulatory issues. (orig./DGE)

  20. The use of isiXhosa children’s poetry as a tool to integrate literacy, mathematics and life skills in Foundation Phase: Grade R-3

    Directory of Open Access Journals (Sweden)

    Nozuko Gxekwa

    2017-12-01

    Full Text Available Literature helps us understand and make sense of the world around us. It is a part of education, which broadens one’s mind about how to understand, transfer knowledge and provide meaningful and authentic learning. Thus, this article aims to highlight how some elements of isiXhosa children’s poetry can be used to help pre-service teachers to teach and integrate mathematics and life skills with literacy in Foundation Phase (FP. This approach of using poems for integration strengthens concepts and skills in more than one subject area. The theoretical framework that informed the article is integrative learning. The data in this article were generated through non-participant classroom observations and non-structured interviews with the participants of the study and the researchers adopted the interpretative phenomenological analysis method for data analysis. This article was prompted by findings of lack of understanding of integrative teaching and learning and lack of teaching resources in isiXhosa to enhance integrative teaching and learning in FP intervention undertaken with 25 first year isiXhosa-speaking FP students.

  1. Equity venture capital platform model based on complex network

    Science.gov (United States)

    Guo, Dongwei; Zhang, Lanshu; Liu, Miao

    2018-05-01

    This paper uses the small-world network and the random-network to simulate the relationship among the investors, construct the network model of the equity venture capital platform to explore the impact of the fraud rate and the bankruptcy rate on the robustness of the network model while observing the impact of the average path length and the average agglomeration coefficient of the investor relationship network on the income of the network model. The study found that the fraud rate and bankruptcy rate exceeded a certain threshold will lead to network collapse; The bankruptcy rate has a great influence on the income of the platform; The risk premium exists, and the average return is better under a certain range of bankruptcy risk; The structure of the investor relationship network has no effect on the income of the investment model.

  2. Resolving structural variability in network models and the brain.

    Directory of Open Access Journals (Sweden)

    Florian Klimm

    2014-03-01

    Full Text Available Large-scale white matter pathways crisscrossing the cortex create a complex pattern of connectivity that underlies human cognitive function. Generative mechanisms for this architecture have been difficult to identify in part because little is known in general about mechanistic drivers of structured networks. Here we contrast network properties derived from diffusion spectrum imaging data of the human brain with 13 synthetic network models chosen to probe the roles of physical network embedding and temporal network growth. We characterize both the empirical and synthetic networks using familiar graph metrics, but presented here in a more complete statistical form, as scatter plots and distributions, to reveal the full range of variability of each measure across scales in the network. We focus specifically on the degree distribution, degree assortativity, hierarchy, topological Rentian scaling, and topological fractal scaling--in addition to several summary statistics, including the mean clustering coefficient, the shortest path-length, and the network diameter. The models are investigated in a progressive, branching sequence, aimed at capturing different elements thought to be important in the brain, and range from simple random and regular networks, to models that incorporate specific growth rules and constraints. We find that synthetic models that constrain the network nodes to be physically embedded in anatomical brain regions tend to produce distributions that are most similar to the corresponding measurements for the brain. We also find that network models hardcoded to display one network property (e.g., assortativity do not in general simultaneously display a second (e.g., hierarchy. This relative independence of network properties suggests that multiple neurobiological mechanisms might be at play in the development of human brain network architecture. Together, the network models that we develop and employ provide a potentially useful

  3. A Network Contention Model for the Extreme-scale Simulator

    Energy Technology Data Exchange (ETDEWEB)

    Engelmann, Christian [ORNL; Naughton III, Thomas J [ORNL

    2015-01-01

    The Extreme-scale Simulator (xSim) is a performance investigation toolkit for high-performance computing (HPC) hardware/software co-design. It permits running a HPC application with millions of concurrent execution threads, while observing its performance in a simulated extreme-scale system. This paper details a newly developed network modeling feature for xSim, eliminating the shortcomings of the existing network modeling capabilities. The approach takes a different path for implementing network contention and bandwidth capacity modeling using a less synchronous and accurate enough model design. With the new network modeling feature, xSim is able to simulate on-chip and on-node networks with reasonable accuracy and overheads.

  4. Innovative research of AD HOC network mobility model

    Science.gov (United States)

    Chen, Xin

    2017-08-01

    It is difficult for researchers of AD HOC network to conduct actual deployment during experimental stage as the network topology is changeable and location of nodes is unfixed. Thus simulation still remains the main research method of the network. Mobility model is an important component of AD HOC network simulation. It is used to describe the movement pattern of nodes in AD HOC network (including location and velocity, etc.) and decides the movement trail of nodes, playing as the abstraction of the movement modes of nodes. Therefore, mobility model which simulates node movement is an important foundation for simulation research. In AD HOC network research, mobility model shall reflect the movement law of nodes as truly as possible. In this paper, node generally refers to the wireless equipment people carry. The main research contents include how nodes avoid obstacles during movement process and the impacts of obstacles on the mutual relation among nodes, based on which a Node Self Avoiding Obstacle, i.e. NASO model is established in AD HOC network.

  5. Building functional networks of spiking model neurons.

    Science.gov (United States)

    Abbott, L F; DePasquale, Brian; Memmesheimer, Raoul-Martin

    2016-03-01

    Most of the networks used by computer scientists and many of those studied by modelers in neuroscience represent unit activities as continuous variables. Neurons, however, communicate primarily through discontinuous spiking. We review methods for transferring our ability to construct interesting networks that perform relevant tasks from the artificial continuous domain to more realistic spiking network models. These methods raise a number of issues that warrant further theoretical and experimental study.

  6. Blind I/Q imbalance and nonlinear ISI mitigation in Nyquist-SCM direct detection system with cascaded widely linear and Volterra equalizer

    Science.gov (United States)

    Liu, Na; Ju, Cheng

    2018-02-01

    Nyquist-SCM signal after fiber transmission, direct detection (DD), and analog down-conversion suffers from linear ISI, nonlinear ISI, and I/Q imbalance, simultaneously. Theoretical analysis based on widely linear (WL) and Volterra series is given to explain the relationship and interaction of these three interferences. A blind equalization algorithm, cascaded WL and Volterra equalizer, is designed to mitigate these three interferences. Furthermore, the feasibility of the proposed cascaded algorithm is experimentally demonstrated based on a 40-Gbps data rate 16-quadrature amplitude modulation (QAM) virtual single sideband (VSSB) Nyquist-SCM DD system over 100-km standard single mode fiber (SSMF) transmission. In addition, the performances of conventional strictly linear equalizer, WL equalizer, Volterra equalizer, and cascaded WL and Volterra equalizer are experimentally evaluated, respectively.

  7. ISIS annual report for the financial year 1 April 1988 to 31 March 1989

    International Nuclear Information System (INIS)

    1989-07-01

    Over the past year, to 31st March 1989, ISIS has not only maintained its position as the world's most powerful pulsed neutron - and muon -source, but has made further notable strides forward. The operating current has increased, reliability has improved significantly, new instruments have come into operation, and new science has underlined yet again the major advantages of pulsed spallation sources. A new management structure was put in place during the year, and several bilateral agreements were finalised. (author)

  8. SPLAI: Computational Finite Element Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ruzana Ishak

    2006-01-01

    Full Text Available Wireless sensor network refers to a group of sensors, linked by a wireless medium to perform distributed sensing task. The primary interest is their capability in monitoring the physical environment through the deployment of numerous tiny, intelligent, wireless networked sensor nodes. Our interest consists of a sensor network, which includes a few specialized nodes called processing elements that can perform some limited computational capabilities. In this paper, we propose a model called SPLAI that allows the network to compute a finite element problem where the processing elements are modeled as the nodes in the linear triangular approximation problem. Our model also considers the case of some failures of the sensors. A simulation model to visualize this network has been developed using C++ on the Windows environment.

  9. A preliminary comparative study of the electron-cloud effect for the PSR, ISIS, and the ESS

    International Nuclear Information System (INIS)

    Furman, M.A.; Pivi, M.T.F.

    2003-01-01

    We present preliminary electron-cloud simulation results for the Proton Storage Ring (PSR) at LANL, ISIS at RAL, and the European Spallation Source (ESS). For each storage ring, we simulate the build-up and dissipation of the electron cloud (EC) in a representative field-free section of the vacuum chamber. For all three cases, we choose the same residual gas temperature, secondary emission yield (SEY), and secondary emission spectrum. Other variables such as proton loss rate, bunch profile, intensity and energy, residual gas pressure and chamber geometry, are set at the corresponding values for each machine. Under these assumptions, we conclude that, of the three machines, the PSR is the most severely affected by the electron cloud effect (ECE), followed by the ESS, with ISIS a distant third. We illustrate a strong sensitivity of the ECE to the longitudinal bunch profile by choosing two different shapes for the case of the PSR, and a weak sensitivity to residual gas pressure. This preliminary study does not address the ECE in other regions of the machine, nor the beam instability that might arise from the EC

  10. Campus network security model study

    Science.gov (United States)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  11. Effects of the ISIS Recommender System for Navigation Support in Self-Organised Learning Networks

    Science.gov (United States)

    Drachsler, Hendrik; Hummel, Hans; van den Berg, Bert; Eshuis, Jannes; Waterink, Wim; Nadolski, Rob; Berlanga, Adriana; Boers, Nanda; Koper, Rob

    2009-01-01

    The need to support users of the Internet with the selection of information is becoming more important. Learners in complex, self-organising Learning Networks have similar problems and need guidance to find and select most suitable learning activities, in order to attain their lifelong learning goals in the most efficient way. Several research…

  12. Functional model of biological neural networks.

    Science.gov (United States)

    Lo, James Ting-Ho

    2010-12-01

    A functional model of biological neural networks, called temporal hierarchical probabilistic associative memory (THPAM), is proposed in this paper. THPAM comprises functional models of dendritic trees for encoding inputs to neurons, a first type of neuron for generating spike trains, a second type of neuron for generating graded signals to modulate neurons of the first type, supervised and unsupervised Hebbian learning mechanisms for easy learning and retrieving, an arrangement of dendritic trees for maximizing generalization, hardwiring for rotation-translation-scaling invariance, and feedback connections with different delay durations for neurons to make full use of present and past informations generated by neurons in the same and higher layers. These functional models and their processing operations have many functions of biological neural networks that have not been achieved by other models in the open literature and provide logically coherent answers to many long-standing neuroscientific questions. However, biological justifications of these functional models and their processing operations are required for THPAM to qualify as a macroscopic model (or low-order approximate) of biological neural networks.

  13. Impact of "JOBM": ISI Impact Factor Places the "Journal of Organizational Behavior Management" Third in Applied Psychology

    Science.gov (United States)

    Hantula, Donald A.

    2006-01-01

    The ISI Impact Factor for "JOBM" is 1.793, placing it third in the JCR rankings for journals in applied psychology with a sharply accelerating linear trend over the past 5 years. This article reviews the Impact Factor and raises questions regarding its reliability and validity and then considers a citation analysis of "JOBM" in light of the…

  14. NIMROD-ISiS, a versatile tool for studying the isotopic degree of freedom in heavy ion collisions

    International Nuclear Information System (INIS)

    Wuenschel, S.; Hagel, K.; Wada, R.; Natowitz, J.B.; Yennello, S.J.; Kohley, Z.; Bottosso, C.; May, L.W.; Smith, W.B.; Shetty, D.V.; Stein, B.C.; Soisson, S.N.; Prete, G.

    2009-01-01

    The upgraded NIMROD-ISiS 4π detector array is described. The array is composed of 228 detector modules annularly arranged into 14 rings. Telescopes of Si-CsI and Si-Si-CsI provide excellent isotopic resolution throughout the detector array. To enhance event characterization, the entire charged particle array is housed inside the TAMU Neutron Ball.

  15. Stability of a neural network model with small-world connections

    International Nuclear Information System (INIS)

    Li Chunguang; Chen Guanrong

    2003-01-01

    Small-world networks are highly clustered networks with small distances among the nodes. There are many biological neural networks that present this kind of connection. There are no special weightings in the connections of most existing small-world network models. However, this kind of simply connected model cannot characterize biological neural networks, in which there are different weights in synaptic connections. In this paper, we present a neural network model with weighted small-world connections and further investigate the stability of this model

  16. Combinatorial explosion in model gene networks

    Science.gov (United States)

    Edwards, R.; Glass, L.

    2000-09-01

    The explosive growth in knowledge of the genome of humans and other organisms leaves open the question of how the functioning of genes in interacting networks is coordinated for orderly activity. One approach to this problem is to study mathematical properties of abstract network models that capture the logical structures of gene networks. The principal issue is to understand how particular patterns of activity can result from particular network structures, and what types of behavior are possible. We study idealized models in which the logical structure of the network is explicitly represented by Boolean functions that can be represented by directed graphs on n-cubes, but which are continuous in time and described by differential equations, rather than being updated synchronously via a discrete clock. The equations are piecewise linear, which allows significant analysis and facilitates rapid integration along trajectories. We first give a combinatorial solution to the question of how many distinct logical structures exist for n-dimensional networks, showing that the number increases very rapidly with n. We then outline analytic methods that can be used to establish the existence, stability and periods of periodic orbits corresponding to particular cycles on the n-cube. We use these methods to confirm the existence of limit cycles discovered in a sample of a million randomly generated structures of networks of 4 genes. Even with only 4 genes, at least several hundred different patterns of stable periodic behavior are possible, many of them surprisingly complex. We discuss ways of further classifying these periodic behaviors, showing that small mutations (reversal of one or a few edges on the n-cube) need not destroy the stability of a limit cycle. Although these networks are very simple as models of gene networks, their mathematical transparency reveals relationships between structure and behavior, they suggest that the possibilities for orderly dynamics in such

  17. Continuum Modeling of Biological Network Formation

    KAUST Repository

    Albi, Giacomo

    2017-04-10

    We present an overview of recent analytical and numerical results for the elliptic–parabolic system of partial differential equations proposed by Hu and Cai, which models the formation of biological transportation networks. The model describes the pressure field using a Darcy type equation and the dynamics of the conductance network under pressure force effects. Randomness in the material structure is represented by a linear diffusion term and conductance relaxation by an algebraic decay term. We first introduce micro- and mesoscopic models and show how they are connected to the macroscopic PDE system. Then, we provide an overview of analytical results for the PDE model, focusing mainly on the existence of weak and mild solutions and analysis of the steady states. The analytical part is complemented by extensive numerical simulations. We propose a discretization based on finite elements and study the qualitative properties of network structures for various parameter values.

  18. Modelling the impact of social network on energy savings

    International Nuclear Information System (INIS)

    Du, Feng; Zhang, Jiangfeng; Li, Hailong; Yan, Jinyue; Galloway, Stuart; Lo, Kwok L.

    2016-01-01

    Highlights: • Energy saving propagation along a social network is modelled. • This model consists of a time evolving weighted directed network. • Network weights and information decay are applied in savings calculation. - Abstract: It is noted that human behaviour changes can have a significant impact on energy consumption, however, qualitative study on such an impact is still very limited, and it is necessary to develop the corresponding mathematical models to describe how much energy savings can be achieved through human engagement. In this paper a mathematical model of human behavioural dynamic interactions on a social network is derived to calculate energy savings. This model consists of a weighted directed network with time evolving information on each node. Energy savings from the whole network is expressed as mathematical expectation from probability theory. This expected energy savings model includes both direct and indirect energy savings of individuals in the network. The savings model is obtained by network weights and modified by the decay of information. Expected energy savings are calculated for cases where individuals in the social network are treated as a single information source or multiple sources. This model is tested on a social network consisting of 40 people. The results show that the strength of relations between individuals is more important to information diffusion than the number of connections individuals have. The expected energy savings of optimally chosen node can be 25.32% more than randomly chosen nodes at the end of the second month for the case of single information source in the network, and 16.96% more than random nodes for the case of multiple information sources. This illustrates that the model presented in this paper can be used to determine which individuals will have the most influence on the social network, which in turn provides a useful guide to identify targeted customers in energy efficiency technology rollout

  19. Settings in Social Networks : a Measurement Model

    NARCIS (Netherlands)

    Schweinberger, Michael; Snijders, Tom A.B.

    2003-01-01

    A class of statistical models is proposed that aims to recover latent settings structures in social networks. Settings may be regarded as clusters of vertices. The measurement model is based on two assumptions. (1) The observed network is generated by hierarchically nested latent transitive

  20. An endogenous model of the credit network

    Science.gov (United States)

    He, Jianmin; Sui, Xin; Li, Shouwei

    2016-01-01

    In this paper, an endogenous credit network model of firm-bank agents is constructed. The model describes the endogenous formation of firm-firm, firm-bank and bank-bank credit relationships. By means of simulations, the model is capable of showing some obvious similarities with empirical evidence found by other scholars: the upper-tail of firm size distribution can be well fitted with a power-law; the bank size distribution can be lognormally distributed with a power-law tail; the bank in-degrees of the interbank credit network as well as the firm-bank credit network fall into two-power-law distributions.

  1. A last updating evolution model for online social networks

    Science.gov (United States)

    Bu, Zhan; Xia, Zhengyou; Wang, Jiandong; Zhang, Chengcui

    2013-05-01

    As information technology has advanced, people are turning to electronic media more frequently for communication, and social relationships are increasingly found on online channels. However, there is very limited knowledge about the actual evolution of the online social networks. In this paper, we propose and study a novel evolution network model with the new concept of “last updating time”, which exists in many real-life online social networks. The last updating evolution network model can maintain the robustness of scale-free networks and can improve the network reliance against intentional attacks. What is more, we also found that it has the “small-world effect”, which is the inherent property of most social networks. Simulation experiment based on this model show that the results and the real-life data are consistent, which means that our model is valid.

  2. Mathematical modelling of complex contagion on clustered networks

    Science.gov (United States)

    O'sullivan, David J.; O'Keeffe, Gary; Fennell, Peter; Gleeson, James

    2015-09-01

    The spreading of behavior, such as the adoption of a new innovation, is influenced bythe structure of social networks that interconnect the population. In the experiments of Centola (Science, 2010), adoption of new behavior was shown to spread further and faster across clustered-lattice networks than across corresponding random networks. This implies that the “complex contagion” effects of social reinforcement are important in such diffusion, in contrast to “simple” contagion models of disease-spread which predict that epidemics would grow more efficiently on random networks than on clustered networks. To accurately model complex contagion on clustered networks remains a challenge because the usual assumptions (e.g. of mean-field theory) regarding tree-like networks are invalidated by the presence of triangles in the network; the triangles are, however, crucial to the social reinforcement mechanism, which posits an increased probability of a person adopting behavior that has been adopted by two or more neighbors. In this paper we modify the analytical approach that was introduced by Hebert-Dufresne et al. (Phys. Rev. E, 2010), to study disease-spread on clustered networks. We show how the approximation method can be adapted to a complex contagion model, and confirm the accuracy of the method with numerical simulations. The analytical results of the model enable us to quantify the level of social reinforcement that is required to observe—as in Centola’s experiments—faster diffusion on clustered topologies than on random networks.

  3. Mathematical modelling of complex contagion on clustered networks

    Directory of Open Access Journals (Sweden)

    David J. P. O'Sullivan

    2015-09-01

    Full Text Available The spreading of behavior, such as the adoption of a new innovation, is influenced bythe structure of social networks that interconnect the population. In the experiments of Centola (Science, 2010, adoption of new behavior was shown to spread further and faster across clustered-lattice networks than across corresponding random networks. This implies that the complex contagion effects of social reinforcement are important in such diffusion, in contrast to simple contagion models of disease-spread which predict that epidemics would grow more efficiently on random networks than on clustered networks. To accurately model complex contagion on clustered networks remains a challenge because the usual assumptions (e.g. of mean-field theory regarding tree-like networks are invalidated by the presence of triangles in the network; the triangles are, however, crucial to the social reinforcement mechanism, which posits an increased probability of a person adopting behavior that has been adopted by two or more neighbors. In this paper we modify the analytical approach that was introduced by Hebert-Dufresne et al. (Phys. Rev. E, 2010, to study disease-spread on clustered networks. We show how the approximation method can be adapted to a complex contagion model, and confirm the accuracy of the method with numerical simulations. The analytical results of the model enable us to quantify the level of social reinforcement that is required to observe—as in Centola’s experiments—faster diffusion on clustered topologies than on random networks.

  4. Phenomenological network models: Lessons for epilepsy surgery.

    Science.gov (United States)

    Hebbink, Jurgen; Meijer, Hil; Huiskamp, Geertjan; van Gils, Stephan; Leijten, Frans

    2017-10-01

    The current opinion in epilepsy surgery is that successful surgery is about removing pathological cortex in the anatomic sense. This contrasts with recent developments in epilepsy research, where epilepsy is seen as a network disease. Computational models offer a framework to investigate the influence of networks, as well as local tissue properties, and to explore alternative resection strategies. Here we study, using such a model, the influence of connections on seizures and how this might change our traditional views of epilepsy surgery. We use a simple network model consisting of four interconnected neuronal populations. One of these populations can be made hyperexcitable, modeling a pathological region of cortex. Using model simulations, the effect of surgery on the seizure rate is studied. We find that removal of the hyperexcitable population is, in most cases, not the best approach to reduce the seizure rate. Removal of normal populations located at a crucial spot in the network, the "driver," is typically more effective in reducing seizure rate. This work strengthens the idea that network structure and connections may be more important than localizing the pathological node. This can explain why lesionectomy may not always be sufficient. © 2017 The Authors. Epilepsia published by Wiley Periodicals, Inc. on behalf of International League Against Epilepsy.

  5. Dynamic thermo-hydraulic model of district cooling networks

    International Nuclear Information System (INIS)

    Oppelt, Thomas; Urbaneck, Thorsten; Gross, Ulrich; Platzer, Bernd

    2016-01-01

    Highlights: • A dynamic thermo-hydraulic model for district cooling networks is presented. • The thermal modelling is based on water segment tracking (Lagrangian approach). • Thus, numerical errors and balance inaccuracies are avoided. • Verification and validation studies proved the reliability of the model. - Abstract: In the present paper, the dynamic thermo-hydraulic model ISENA is presented which can be applied for answering different questions occurring in design and operation of district cooling networks—e.g. related to economic and energy efficiency. The network model consists of a quasistatic hydraulic model and a transient thermal model based on tracking water segments through the whole network (Lagrangian method). Applying this approach, numerical errors and balance inaccuracies can be avoided which leads to a higher quality of results compared to other network models. Verification and validation calculations are presented in order to show that ISENA provides reliable results and is suitable for practical application.

  6. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  7. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  8. Lexical and grammatical development in trilingual speakers of isiXhosa, English and Afrikaans

    Directory of Open Access Journals (Sweden)

    Anneke P. Potgieter

    2016-05-01

    Full Text Available Background: There is a dearth of normative data on linguistic development among child speakers of Southern African languages, especially in the case of the multilingual children who constitute the largest part of this population. This inevitably impacts on the accuracy of developmental assessments of such speakers. Already negative lay opinion on the effect of early multilingualism on language development rates could be exacerbated by the lack of developmental data, ultimately affecting choices regarding home and school language policies. Objectives: To establish whether trilinguals necessarily exhibit developmental delay when compared to monolinguals and, if so, whether this delay (1 occurs in terms of both lexical and grammatical development; and (2 in all three the trilinguals’ languages, regardless of input quantity. Method: Focusing on isiXhosa, South African English and Afrikaans, the study involved a comparison of 11 four-year-old developing trilinguals’ acquisition of vocabulary and passive constructions with that of 10 age-matched monolingual speakers of each language. Results: The trilinguals proved to be monolingual-like in their lexical development in the language to which, on average, they had been exposed most over time, that is, isiXhosa. No developmental delay was found in the trilinguals’ acquisition of passive constructions, regardless of the language of testing. Conclusion: As previously found for bilingual development, necessarily reduced quantity of exposure does not hinder lexical development in the trilinguals’ input dominant language. The overall lack of delay in their acquisition of the passive is interpreted as possible evidence of cross-linguistic bootstrapping and support for early multilingual exposure.

  9. Lexical and grammatical development in trilingual speakers of isiXhosa, English and Afrikaans

    Science.gov (United States)

    2016-01-01

    Background There is a dearth of normative data on linguistic development among child speakers of Southern African languages, especially in the case of the multilingual children who constitute the largest part of this population. This inevitably impacts on the accuracy of developmental assessments of such speakers. Already negative lay opinion on the effect of early multilingualism on language development rates could be exacerbated by the lack of developmental data, ultimately affecting choices regarding home and school language policies. Objectives To establish whether trilinguals necessarily exhibit developmental delay when compared to monolinguals and, if so, whether this delay (1) occurs in terms of both lexical and grammatical development; and (2) in all three the trilinguals’ languages, regardless of input quantity. Method Focusing on isiXhosa, South African English and Afrikaans, the study involved a comparison of 11 four-year-old developing trilinguals’ acquisition of vocabulary and passive constructions with that of 10 age-matched monolingual speakers of each language. Results The trilinguals proved to be monolingual-like in their lexical development in the language to which, on average, they had been exposed most over time, that is, isiXhosa. No developmental delay was found in the trilinguals’ acquisition of passive constructions, regardless of the language of testing. Conclusion As previously found for bilingual development, necessarily reduced quantity of exposure does not hinder lexical development in the trilinguals’ input dominant language. The overall lack of delay in their acquisition of the passive is interpreted as possible evidence of cross-linguistic bootstrapping and support for early multilingual exposure. PMID:27245133

  10. Lexical and grammatical development in trilingual speakers of isiXhosa, English and Afrikaans.

    Science.gov (United States)

    Potgieter, Anneke P

    2016-05-20

    There is a dearth of normative data on linguistic development among child speakers of Southern African languages, especially in the case of the multilingual children who constitute the largest part of this population. This inevitably impacts on the accuracy of developmental assessments of such speakers. Already negative lay opinion on the effect of early multilingualism on language development rates could be exacerbated by the lack of developmental data, ultimately affecting choices regarding home and school language policies. To establish whether trilinguals necessarily exhibit developmental delay when compared to monolinguals and, if so, whether this delay (1) occurs in terms of both lexical and grammatical development; and (2) in all three the trilinguals' languages, regardless of input quantity. Focusing on isiXhosa, South African English and Afrikaans, the study involved a comparison of 11 four-year-old developing trilinguals' acquisition of vocabulary and passive constructions with that of 10 age-matched monolingual speakers of each language. The trilinguals proved to be monolingual-like in their lexical development in the language to which, on average, they had been exposed most over time, that is, isiXhosa. No developmental delay was found in the trilinguals' acquisition of passive constructions, regardless of the language of testing. As previously found for bilingual development, necessarily reduced quantity of exposure does not hinder lexical development in the trilinguals' input dominant language. The overall lack of delay in their acquisition of the passive is interpreted as possible evidence of cross-linguistic bootstrapping and support for early multilingual exposure.

  11. Application of thin-film breakdown counters for characterization of neutron field of the VESUVIO instrument at the ISIS spallation source

    Science.gov (United States)

    Smirnov, A. N.; Pietropaolo, A.; Prokofiev, A. V.; Rodionova, E. E.; Frost, C. D.; Ansell, S.; Schooneveld, E. M.; Gorini, G.

    2012-09-01

    The high-energy neutron field of the VESUVIO instrument at the ISIS facility has been characterized using the technique of thin-film breakdown counters (TFBC). The technique utilizes neutron-induced fission reactions of natU and 209Bi with detection of fission fragments by TFBCs. Experimentally determined count rates of the fragments are ≈50% higher than those calculated using spectral neutron flux simulated with the MCNPX code. This work is a part of the project to develop ChipIr, a new dedicated facility for the accelerated testing of electronic components and systems for neutron-induced single event effects in the new Target Station 2 at ISIS. The TFBC technique has shown to be applicable for on-line monitoring of the neutron flux in the neutron energy range 1-800 MeV at the position of the device under test (DUT).

  12. Application of thin-film breakdown counters for characterization of neutron field of the VESUVIO instrument at the ISIS spallation source

    International Nuclear Information System (INIS)

    Smirnov, A.N.; Pietropaolo, A.; Prokofiev, A.V.; Rodionova, E.E.; Frost, C.D.; Ansell, S.; Schooneveld, E.M.; Gorini, G.

    2012-01-01

    The high-energy neutron field of the VESUVIO instrument at the ISIS facility has been characterized using the technique of thin-film breakdown counters (TFBC). The technique utilizes neutron-induced fission reactions of nat U and 209 Bi with detection of fission fragments by TFBCs. Experimentally determined count rates of the fragments are ≈50% higher than those calculated using spectral neutron flux simulated with the MCNPX code. This work is a part of the project to develop ChipIr, a new dedicated facility for the accelerated testing of electronic components and systems for neutron-induced single event effects in the new Target Station 2 at ISIS. The TFBC technique has shown to be applicable for on-line monitoring of the neutron flux in the neutron energy range 1–800 MeV at the position of the device under test (DUT).

  13. Joint Modelling of Structural and Functional Brain Networks

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther; Herlau, Tue; Mørup, Morten

    -parametric Bayesian network model which allows for joint modelling and integration of multiple networks. We demonstrate the model’s ability to detect vertices that share structure across networks jointly in functional MRI (fMRI) and diffusion MRI (dMRI) data. Using two fMRI and dMRI scans per subject, we establish...

  14. Performance modeling of network data services

    Energy Technology Data Exchange (ETDEWEB)

    Haynes, R.A.; Pierson, L.G.

    1997-01-01

    Networks at major computational organizations are becoming increasingly complex. The introduction of large massively parallel computers and supercomputers with gigabyte memories are requiring greater and greater bandwidth for network data transfers to widely dispersed clients. For networks to provide adequate data transfer services to high performance computers and remote users connected to them, the networking components must be optimized from a combination of internal and external performance criteria. This paper describes research done at Sandia National Laboratories to model network data services and to visualize the flow of data from source to sink when using the data services.

  15. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  16. An evolving model of online bipartite networks

    Science.gov (United States)

    Zhang, Chu-Xu; Zhang, Zi-Ke; Liu, Chuang

    2013-12-01

    Understanding the structure and evolution of online bipartite networks is a significant task since they play a crucial role in various e-commerce services nowadays. Recently, various attempts have been tried to propose different models, resulting in either power-law or exponential degree distributions. However, many empirical results show that the user degree distribution actually follows a shifted power-law distribution, the so-called Mandelbrot’s law, which cannot be fully described by previous models. In this paper, we propose an evolving model, considering two different user behaviors: random and preferential attachment. Extensive empirical results on two real bipartite networks, Delicious and CiteULike, show that the theoretical model can well characterize the structure of real networks for both user and object degree distributions. In addition, we introduce a structural parameter p, to demonstrate that the hybrid user behavior leads to the shifted power-law degree distribution, and the region of power-law tail will increase with the increment of p. The proposed model might shed some lights in understanding the underlying laws governing the structure of real online bipartite networks.

  17. Models as Tools of Analysis of a Network Organisation

    Directory of Open Access Journals (Sweden)

    Wojciech Pająk

    2013-06-01

    Full Text Available The paper presents models which may be applied as tools of analysis of a network organisation. The starting point of the discussion is defining the following terms: supply chain and network organisation. Further parts of the paper present basic assumptions analysis of a network organisation. Then the study characterises the best known models utilised in analysis of a network organisation. The purpose of the article is to define the notion and the essence of network organizations and to present the models used for their analysis.

  18. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  19. Modeling and optimization of an electric power distribution network ...

    African Journals Online (AJOL)

    Modeling and optimization of an electric power distribution network planning system using ... of the network was modelled with non-linear mathematical expressions. ... given feasible locations, re-conductoring of existing feeders in the network, ...

  20. Measurements of attenuation lengths through concrete and iron for neutrons produced by 800-MeV proton on tantalum target at ISIS

    CERN Document Server

    Nunomiya, T; Wright, P; Nakamura, T; Kim, E; Kurosawa, T; Taniguchi, S; Sasaki, M; Iwase, H; Uwamino, Y; Shibata, T; Ito, S; Perry, D R

    2002-01-01

    A deep penetration experiment through a thick bulk shield was performed at an intense spallation neutron source facility, ISIS, of the Rutherford Appleton Laboratory (RAL), United Kingdom. ISIS is a 800 MeV-200 mu A proton accelerator facility. Neutrons are produced from a tantalum target, and are shielded with approximately 3-m thick steel and 1-m thick ordinary concrete. On top of the shield, we measured the neutron flux attenuation through concrete and iron shields, which were additionally placed up to 120-cm and 60-cm thickness, respectively, using activation detectors of graphite and bismuth. The attenuation lengths of concrete and iron for high-energy neutrons above 20 MeV were obtained from the sup 1 sup 2 C(n, 2n) sup 1 sup 1 C reaction of graphite.

  1. A network security situation prediction model based on wavelet neural network with optimized parameters

    Directory of Open Access Journals (Sweden)

    Haibo Zhang

    2016-08-01

    Full Text Available The security incidents ion networks are sudden and uncertain, it is very hard to precisely predict the network security situation by traditional methods. In order to improve the prediction accuracy of the network security situation, we build a network security situation prediction model based on Wavelet Neural Network (WNN with optimized parameters by the Improved Niche Genetic Algorithm (INGA. The proposed model adopts WNN which has strong nonlinear ability and fault-tolerance performance. Also, the parameters for WNN are optimized through the adaptive genetic algorithm (GA so that WNN searches more effectively. Considering the problem that the adaptive GA converges slowly and easily turns to the premature problem, we introduce a novel niche technology with a dynamic fuzzy clustering and elimination mechanism to solve the premature convergence of the GA. Our final simulation results show that the proposed INGA-WNN prediction model is more reliable and effective, and it achieves faster convergence-speed and higher prediction accuracy than the Genetic Algorithm-Wavelet Neural Network (GA-WNN, Genetic Algorithm-Back Propagation Neural Network (GA-BPNN and WNN.

  2. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  3. Modeling Temporal Evolution and Multiscale Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2013-01-01

    Many real-world networks exhibit both temporal evolution and multiscale structure. We propose a model for temporally correlated multifurcating hierarchies in complex networks which jointly capture both effects. We use the Gibbs fragmentation tree as prior over multifurcating trees and a change......-point model to account for the temporal evolution of each vertex. We demonstrate that our model is able to infer time-varying multiscale structure in synthetic as well as three real world time-evolving complex networks. Our modeling of the temporal evolution of hierarchies brings new insights...

  4. The Kuramoto model in complex networks

    Science.gov (United States)

    Rodrigues, Francisco A.; Peron, Thomas K. DM.; Ji, Peng; Kurths, Jürgen

    2016-01-01

    Synchronization of an ensemble of oscillators is an emergent phenomenon present in several complex systems, ranging from social and physical to biological and technological systems. The most successful approach to describe how coherent behavior emerges in these complex systems is given by the paradigmatic Kuramoto model. This model has been traditionally studied in complete graphs. However, besides being intrinsically dynamical, complex systems present very heterogeneous structure, which can be represented as complex networks. This report is dedicated to review main contributions in the field of synchronization in networks of Kuramoto oscillators. In particular, we provide an overview of the impact of network patterns on the local and global dynamics of coupled phase oscillators. We cover many relevant topics, which encompass a description of the most used analytical approaches and the analysis of several numerical results. Furthermore, we discuss recent developments on variations of the Kuramoto model in networks, including the presence of noise and inertia. The rich potential for applications is discussed for special fields in engineering, neuroscience, physics and Earth science. Finally, we conclude by discussing problems that remain open after the last decade of intensive research on the Kuramoto model and point out some promising directions for future research.

  5. Transmission network expansion planning based on hybridization model of neural networks and harmony search algorithm

    Directory of Open Access Journals (Sweden)

    Mohammad Taghi Ameli

    2012-01-01

    Full Text Available Transmission Network Expansion Planning (TNEP is a basic part of power network planning that determines where, when and how many new transmission lines should be added to the network. So, the TNEP is an optimization problem in which the expansion purposes are optimized. Artificial Intelligence (AI tools such as Genetic Algorithm (GA, Simulated Annealing (SA, Tabu Search (TS and Artificial Neural Networks (ANNs are methods used for solving the TNEP problem. Today, by using the hybridization models of AI tools, we can solve the TNEP problem for large-scale systems, which shows the effectiveness of utilizing such models. In this paper, a new approach to the hybridization model of Probabilistic Neural Networks (PNNs and Harmony Search Algorithm (HSA was used to solve the TNEP problem. Finally, by considering the uncertain role of the load based on a scenario technique, this proposed model was tested on the Garver’s 6-bus network.

  6. Mathematical Modelling Plant Signalling Networks

    KAUST Repository

    Muraro, D.; Byrne, H.M.; King, J.R.; Bennett, M.J.

    2013-01-01

    methods for modelling gene and signalling networks and their application in plants. We then describe specific models of hormonal perception and cross-talk in plants. This mathematical analysis of sub-cellular molecular mechanisms paves the way for more

  7. Evaluation of EOR Processes Using Network Models

    DEFF Research Database (Denmark)

    Winter, Anatol; Larsen, Jens Kjell; Krogsbøll, Anette

    1998-01-01

    The report consists of the following parts: 1) Studies of wetting properties of model fluids and fluid mixtures aimed at an optimal selection of candidates for micromodel experiments. 2) Experimental studies of multiphase transport properties using physical models of porous networks (micromodels......) including estimation of their "petrophysical" properties (e.g. absolute permeability). 3) Mathematical modelling and computer studies of multiphase transport through pore space using mathematical network models. 4) Investigation of link between pore-scale and macroscopic recovery mechanisms....

  8. Modeling Insurgent Network Structure and Dynamics

    Science.gov (United States)

    Gabbay, Michael; Thirkill-Mackelprang, Ashley

    2010-03-01

    We present a methodology for mapping insurgent network structure based on their public rhetoric. Indicators of cooperative links between insurgent groups at both the leadership and rank-and-file levels are used, such as joint policy statements or joint operations claims. In addition, a targeting policy measure is constructed on the basis of insurgent targeting claims. Network diagrams which integrate these measures of insurgent cooperation and ideology are generated for different periods of the Iraqi and Afghan insurgencies. The network diagrams exhibit meaningful changes which track the evolution of the strategic environment faced by insurgent groups. Correlations between targeting policy and network structure indicate that insurgent targeting claims are aimed at establishing a group identity among the spectrum of rank-and-file insurgency supporters. A dynamical systems model of insurgent alliance formation and factionalism is presented which evolves the relationship between insurgent group dyads as a function of their ideological differences and their current relationships. The ability of the model to qualitatively and quantitatively capture insurgent network dynamics observed in the data is discussed.

  9. Spatial-temporal modeling of malware propagation in networks.

    Science.gov (United States)

    Chen, Zesheng; Ji, Chuanyi

    2005-09-01

    Network security is an important task of network management. One threat to network security is malware (malicious software) propagation. One type of malware is called topological scanning that spreads based on topology information. The focus of this work is on modeling the spread of topological malwares, which is important for understanding their potential damages, and for developing countermeasures to protect the network infrastructure. Our model is motivated by probabilistic graphs, which have been widely investigated in machine learning. We first use a graphical representation to abstract the propagation of malwares that employ different scanning methods. We then use a spatial-temporal random process to describe the statistical dependence of malware propagation in arbitrary topologies. As the spatial dependence is particularly difficult to characterize, the problem becomes how to use simple (i.e., biased) models to approximate the spatially dependent process. In particular, we propose the independent model and the Markov model as simple approximations. We conduct both theoretical analysis and extensive simulations on large networks using both real measurements and synthesized topologies to test the performance of the proposed models. Our results show that the independent model can capture temporal dependence and detailed topology information and, thus, outperforms the previous models, whereas the Markov model incorporates a certain spatial dependence and, thus, achieves a greater accuracy in characterizing both transient and equilibrium behaviors of malware propagation.

  10. Flood routing modelling with Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    R. Peters

    2006-01-01

    Full Text Available For the modelling of the flood routing in the lower reaches of the Freiberger Mulde river and its tributaries the one-dimensional hydrodynamic modelling system HEC-RAS has been applied. Furthermore, this model was used to generate a database to train multilayer feedforward networks. To guarantee numerical stability for the hydrodynamic modelling of some 60 km of streamcourse an adequate resolution in space requires very small calculation time steps, which are some two orders of magnitude smaller than the input data resolution. This leads to quite high computation requirements seriously restricting the application – especially when dealing with real time operations such as online flood forecasting. In order to solve this problem we tested the application of Artificial Neural Networks (ANN. First studies show the ability of adequately trained multilayer feedforward networks (MLFN to reproduce the model performance.

  11. Facility for fast neutron irradiation tests of electronics at the ISIS spallation neutron source

    International Nuclear Information System (INIS)

    Andreani, C.; Pietropaolo, A.; Salsano, A.; Gorini, G.; Tardocchi, M.; Paccagnella, A.; Gerardin, S.; Frost, C. D.; Ansell, S.; Platt, S. P.

    2008-01-01

    The VESUVIO beam line at the ISIS spallation neutron source was set up for neutron irradiation tests in the neutron energy range above 10 MeV. The neutron flux and energy spectrum were shown, in benchmark activation measurements, to provide a neutron spectrum similar to the ambient one at sea level, but with an enhancement in intensity of a factor of 10 7 . Such conditions are suitable for accelerated testing of electronic components, as was demonstrated here by measurements of soft error rates in recent technology field programable gate arrays

  12. An evolving network model with modular growth

    International Nuclear Information System (INIS)

    Zou Zhi-Yun; Liu Peng; Lei Li; Gao Jian-Zhi

    2012-01-01

    In this paper, we propose an evolving network model growing fast in units of module, according to the analysis of the evolution characteristics in real complex networks. Each module is a small-world network containing several interconnected nodes and the nodes between the modules are linked by preferential attachment on degree of nodes. We study the modularity measure of the proposed model, which can be adjusted by changing the ratio of the number of inner-module edges and the number of inter-module edges. In view of the mean-field theory, we develop an analytical function of the degree distribution, which is verified by a numerical example and indicates that the degree distribution shows characteristics of the small-world network and the scale-free network distinctly at different segments. The clustering coefficient and the average path length of the network are simulated numerically, indicating that the network shows the small-world property and is affected little by the randomness of the new module. (interdisciplinary physics and related areas of science and technology)

  13. Calidad metodológica de ensayos clínicos sobre periodoncia publicados en revistas ISI

    Directory of Open Access Journals (Sweden)

    Katherine Morales

    Full Text Available Objetivo: Describir la calidad metodológica de los ensayos clínicos de periodoncia en revistas indexadas en el Institute for Scientific Information. Material y métodos: Estudio observacional descriptivo en el que se evaluaron los ensayos clínicos publicados entre Enero de 2008 y Diciembre de 2012, de las cuatro revistas de periodoncia indexadas a ISI, con mayor factor de impacto en los últimos 5 años según Journal Citation Reports. Se realizó una estrategia de búsqueda en PubMed para cada revista. Sólo los ensayos clínicos fueron seleccionados para el análisis cualitativo por medio de una escala de calidad metodológica. Los datos fueron analizados utilizando el paquete estadístico SPSS Statistics 20 para Windows (IBM., Chicago, USA. y presentados mediante estadística descriptiva. Resultados: De las revistas que cumplieron los criterios de selección, Journal of Clinical Periodontology, Journal of Periodontology, Journal of Periodontal Research e International Journal of Periodontics & Restorative Dentistry, se analizaron 387 ensayos clínicos. De los 24 puntos máximos obtenibles de la escala, la media alcanzada por los manuscritos evaluados fue de 17,45 puntos. Conclusión: La calidad metódológica de los ensayos clínicos en periodoncia, indexados en revistas ISI, fue deficiente.

  14. A fusion networking model for smart grid power distribution backbone communication network based on PTN

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available In current communication network for distribution in Chinese power grid systems, the fiber communication backbone network for distribution and TD-LTE power private wireless backhaul network of power grid are both bearing by the SDH optical transmission network, which also carries the communication network of transformer substation and main electric. As the data traffic of the distribution communication and TD-LTE power private wireless network grow rapidly in recent years, it will have a big impact with the SDH network’s bearing capacity which is mainly used for main electric communication in high security level. This paper presents a fusion networking model which use a multiple-layer PTN network as the unified bearing of the TD-LTE power private wireless backhaul network and fiber communication backbone network for distribution. Network dataflow analysis shows that this model can greatly reduce the capacity pressure of the traditional SDH network as well as ensure the reliability of the transmission of the communication network for distribution and TD-LTE power private wireless network.

  15. UAV Trajectory Modeling Using Neural Networks

    Science.gov (United States)

    Xue, Min

    2017-01-01

    Massive small unmanned aerial vehicles are envisioned to operate in the near future. While there are lots of research problems need to be addressed before dense operations can happen, trajectory modeling remains as one of the keys to understand and develop policies, regulations, and requirements for safe and efficient unmanned aerial vehicle operations. The fidelity requirement of a small unmanned vehicle trajectory model is high because these vehicles are sensitive to winds due to their small size and low operational altitude. Both vehicle control systems and dynamic models are needed for trajectory modeling, which makes the modeling a great challenge, especially considering the fact that manufactures are not willing to share their control systems. This work proposed to use a neural network approach for modelling small unmanned vehicle's trajectory without knowing its control system and bypassing exhaustive efforts for aerodynamic parameter identification. As a proof of concept, instead of collecting data from flight tests, this work used the trajectory data generated by a mathematical vehicle model for training and testing the neural network. The results showed great promise because the trained neural network can predict 4D trajectories accurately, and prediction errors were less than 2:0 meters in both temporal and spatial dimensions.

  16. Modeling Evolution on Nearly Neutral Network Fitness Landscapes

    Science.gov (United States)

    Yakushkina, Tatiana; Saakian, David B.

    2017-08-01

    To describe virus evolution, it is necessary to define a fitness landscape. In this article, we consider the microscopic models with the advanced version of neutral network fitness landscapes. In this problem setting, we suppose a fitness difference between one-point mutation neighbors to be small. We construct a modification of the Wright-Fisher model, which is related to ordinary infinite population models with nearly neutral network fitness landscape at the large population limit. From the microscopic models in the realistic sequence space, we derive two versions of nearly neutral network models: with sinks and without sinks. We claim that the suggested model describes the evolutionary dynamics of RNA viruses better than the traditional Wright-Fisher model with few sequences.

  17. Application of thin-film breakdown counters for characterization of neutron field of the VESUVIO instrument at the ISIS spallation source

    Energy Technology Data Exchange (ETDEWEB)

    Smirnov, A.N. [V.G. Khlopin Radium Institute, St. Petersburg (Russian Federation); Pietropaolo, A., E-mail: antonino.pietropaolo@roma2.infn.it [CNISM UdR Tor Vergata, and Centro NAST Roma, Italy Scientifica 1 I-00133 Roma Italy (Italy); Prokofiev, A.V. [The Svedberg Laboratory, Uppsala University, Uppsala (Sweden); Rodionova, E.E. [V.G. Khlopin Radium Institute, St. Petersburg (Russian Federation); Frost, C.D.; Ansell, S.; Schooneveld, E.M. [ISIS Facility, Rutherford Appleton Laboratory, Chilton (United Kingdom); Gorini, G. [Dipartimento di Fisica ' G. Occhialini,' Universita degli Studi di Milano-Bicocca, Milano (Italy)

    2012-09-21

    The high-energy neutron field of the VESUVIO instrument at the ISIS facility has been characterized using the technique of thin-film breakdown counters (TFBC). The technique utilizes neutron-induced fission reactions of {sup nat}U and {sup 209}Bi with detection of fission fragments by TFBCs. Experimentally determined count rates of the fragments are Almost-Equal-To 50% higher than those calculated using spectral neutron flux simulated with the MCNPX code. This work is a part of the project to develop ChipIr, a new dedicated facility for the accelerated testing of electronic components and systems for neutron-induced single event effects in the new Target Station 2 at ISIS. The TFBC technique has shown to be applicable for on-line monitoring of the neutron flux in the neutron energy range 1-800 MeV at the position of the device under test (DUT).

  18. Model for the growth of the world airline network

    Science.gov (United States)

    Verma, T.; Araújo, N. A. M.; Nagler, J.; Andrade, J. S.; Herrmann, H. J.

    2016-06-01

    We propose a probabilistic growth model for transport networks which employs a balance between popularity of nodes and the physical distance between nodes. By comparing the degree of each node in the model network and the World Airline Network (WAN), we observe that the difference between the two is minimized for α≈2. Interestingly, this is the value obtained for the node-node correlation function in the WAN. This suggests that our model explains quite well the growth of airline networks.

  19. Security Modeling on the Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.

  20. Modeling the propagation of mobile malware on complex networks

    Science.gov (United States)

    Liu, Wanping; Liu, Chao; Yang, Zheng; Liu, Xiaoyang; Zhang, Yihao; Wei, Zuxue

    2016-08-01

    In this paper, the spreading behavior of malware across mobile devices is addressed. By introducing complex networks to model mobile networks, which follows the power-law degree distribution, a novel epidemic model for mobile malware propagation is proposed. The spreading threshold that guarantees the dynamics of the model is calculated. Theoretically, the asymptotic stability of the malware-free equilibrium is confirmed when the threshold is below the unity, and the global stability is further proved under some sufficient conditions. The influences of different model parameters as well as the network topology on malware propagation are also analyzed. Our theoretical studies and numerical simulations show that networks with higher heterogeneity conduce to the diffusion of malware, and complex networks with lower power-law exponents benefit malware spreading.

  1. Quebec mental health services networks: models and implementation

    Directory of Open Access Journals (Sweden)

    Marie-Josée Fleury

    2005-06-01

    Full Text Available Purpose: In the transformation of health care systems, the introduction of integrated service networks is considered to be one of the main solutions for enhancing efficiency. In the last few years, a wealth of literature has emerged on the topic of services integration. However, the question of how integrated service networks should be modelled to suit different implementation contexts has barely been touched. To fill that gap, this article presents four models for the organization of mental health integrated networks. Data sources: The proposed models are drawn from three recently published studies on mental health integrated services in the province of Quebec (Canada with the author as principal investigator. Description: Following an explanation of the concept of integrated service network and a description of the Quebec context for mental health networks, the models, applicable in all settings: rural, urban or semi-urban, and metropolitan, and summarized in four figures, are presented. Discussion and conclusion: To apply the models successfully, the necessity of rallying all the actors of a system, from the strategic, tactical and operational levels, according to the type of integration involved: functional/administrative, clinical and physician-system is highlighted. The importance of formalizing activities among organizations and actors in a network and reinforcing the governing mechanisms at the local level is also underlined. Finally, a number of integration strategies and key conditions of success to operationalize integrated service networks are suggested.

  2. Network Design Models for Container Shipping

    DEFF Research Database (Denmark)

    Reinhardt, Line Blander; Kallehauge, Brian; Nielsen, Anders Nørrelund

    This paper presents a study of the network design problem in container shipping. The paper combines the network design and fleet assignment problem into a mixed integer linear programming model minimizing the overall cost. The major contributions of this paper is that the time of a vessel route...... is included in the calculation of the capacity and that a inhomogeneous fleet is modeled. The model also includes the cost of transshipment which is one of the major cost for the shipping companies. The concept of pseudo simple routes is introduced to expand the set of feasible routes. The linearization...

  3. Dynamic Evolution Model Based on Social Network Services

    Science.gov (United States)

    Xiong, Xi; Gou, Zhi-Jian; Zhang, Shi-Bin; Zhao, Wen

    2013-11-01

    Based on the analysis of evolutionary characteristics of public opinion in social networking services (SNS), in the paper we propose a dynamic evolution model, in which opinions are coupled with topology. This model shows the clustering phenomenon of opinions in dynamic network evolution. The simulation results show that the model can fit the data from a social network site. The dynamic evolution of networks accelerates the opinion, separation and aggregation. The scale and the number of clusters are influenced by confidence limit and rewiring probability. Dynamic changes of the topology reduce the number of isolated nodes, while the increased confidence limit allows nodes to communicate more sufficiently. The two effects make the distribution of opinion more neutral. The dynamic evolution of networks generates central clusters with high connectivity and high betweenness, which make it difficult to control public opinions in SNS.

  4. An example of the use of robotics in French nuclear power plants the ISIS robot

    International Nuclear Information System (INIS)

    Seguy, J.; Thirion, H.

    1988-01-01

    The authors report how Robotics in French nuclear power plants (NPP) is used to solve maintenance problems. One of the most typical example of the use of robotics in French NPP is the ISIS robot. The first generation of this robot has performed the repair of corroded upper internal structures in Chinon A3 gaz cooled reactor. Two robots of this type have successfully welded more than 200 repair parts in the core without major failure during more than 12,000 hours

  5. A growing social network model in geographical space

    Science.gov (United States)

    Antonioni, Alberto; Tomassini, Marco

    2017-09-01

    In this work we propose a new model for the generation of social networks that includes their often ignored spatial aspects. The model is a growing one and links are created either taking space into account, or disregarding space and only considering the degree of target nodes. These two effects can be mixed linearly in arbitrary proportions through a parameter. We numerically show that for a given range of the combination parameter, and for given mean degree, the generated network class shares many important statistical features with those observed in actual social networks, including the spatial dependence of connections. Moreover, we show that the model provides a good qualitative fit to some measured social networks.

  6. Hybrid simulation models of production networks

    CERN Document Server

    Kouikoglou, Vassilis S

    2001-01-01

    This book is concerned with a most important area of industrial production, that of analysis and optimization of production lines and networks using discrete-event models and simulation. The book introduces a novel approach that combines analytic models and discrete-event simulation. Unlike conventional piece-by-piece simulation, this method observes a reduced number of events between which the evolution of the system is tracked analytically. Using this hybrid approach, several models are developed for the analysis of production lines and networks. The hybrid approach combines speed and accuracy for exceptional analysis of most practical situations. A number of optimization problems, involving buffer design, workforce planning, and production control, are solved through the use of hybrid models.

  7. Network Modeling and Simulation A Practical Perspective

    CERN Document Server

    Guizani, Mohsen; Khan, Bilal

    2010-01-01

    Network Modeling and Simulation is a practical guide to using modeling and simulation to solve real-life problems. The authors give a comprehensive exposition of the core concepts in modeling and simulation, and then systematically address the many practical considerations faced by developers in modeling complex large-scale systems. The authors provide examples from computer and telecommunication networks and use these to illustrate the process of mapping generic simulation concepts to domain-specific problems in different industries and disciplines. Key features: Provides the tools and strate

  8. Performance modeling, stochastic networks, and statistical multiplexing

    CERN Document Server

    Mazumdar, Ravi R

    2013-01-01

    This monograph presents a concise mathematical approach for modeling and analyzing the performance of communication networks with the aim of introducing an appropriate mathematical framework for modeling and analysis as well as understanding the phenomenon of statistical multiplexing. The models, techniques, and results presented form the core of traffic engineering methods used to design, control and allocate resources in communication networks.The novelty of the monograph is the fresh approach and insights provided by a sample-path methodology for queueing models that highlights the importan

  9. Switching performance of OBS network model under prefetched real traffic

    Science.gov (United States)

    Huang, Zhenhua; Xu, Du; Lei, Wen

    2005-11-01

    Optical Burst Switching (OBS) [1] is now widely considered as an efficient switching technique in building the next generation optical Internet .So it's very important to precisely evaluate the performance of the OBS network model. The performance of the OBS network model is variable in different condition, but the most important thing is that how it works under real traffic load. In the traditional simulation models, uniform traffics are usually generated by simulation software to imitate the data source of the edge node in the OBS network model, and through which the performance of the OBS network is evaluated. Unfortunately, without being simulated by real traffic, the traditional simulation models have several problems and their results are doubtable. To deal with this problem, we present a new simulation model for analysis and performance evaluation of the OBS network, which uses prefetched IP traffic to be data source of the OBS network model. The prefetched IP traffic can be considered as real IP source of the OBS edge node and the OBS network model has the same clock rate with a real OBS system. So it's easy to conclude that this model is closer to the real OBS system than the traditional ones. The simulation results also indicate that this model is more accurate to evaluate the performance of the OBS network system and the results of this model are closer to the actual situation.

  10. Modeling and control of magnetorheological fluid dampers using neural networks

    Science.gov (United States)

    Wang, D. H.; Liao, W. H.

    2005-02-01

    Due to the inherent nonlinear nature of magnetorheological (MR) fluid dampers, one of the challenging aspects for utilizing these devices to achieve high system performance is the development of accurate models and control algorithms that can take advantage of their unique characteristics. In this paper, the direct identification and inverse dynamic modeling for MR fluid dampers using feedforward and recurrent neural networks are studied. The trained direct identification neural network model can be used to predict the damping force of the MR fluid damper on line, on the basis of the dynamic responses across the MR fluid damper and the command voltage, and the inverse dynamic neural network model can be used to generate the command voltage according to the desired damping force through supervised learning. The architectures and the learning methods of the dynamic neural network models and inverse neural network models for MR fluid dampers are presented, and some simulation results are discussed. Finally, the trained neural network models are applied to predict and control the damping force of the MR fluid damper. Moreover, validation methods for the neural network models developed are proposed and used to evaluate their performance. Validation results with different data sets indicate that the proposed direct identification dynamic model using the recurrent neural network can be used to predict the damping force accurately and the inverse identification dynamic model using the recurrent neural network can act as a damper controller to generate the command voltage when the MR fluid damper is used in a semi-active mode.

  11. Analysis and logical modeling of biological signaling transduction networks

    Science.gov (United States)

    Sun, Zhongyao

    The study of network theory and its application span across a multitude of seemingly disparate fields of science and technology: computer science, biology, social science, linguistics, etc. It is the intrinsic similarities embedded in the entities and the way they interact with one another in these systems that link them together. In this dissertation, I present from both the aspect of theoretical analysis and the aspect of application three projects, which primarily focus on signal transduction networks in biology. In these projects, I assembled a network model through extensively perusing literature, performed model-based simulations and validation, analyzed network topology, and proposed a novel network measure. The application of network modeling to the system of stomatal opening in plants revealed a fundamental question about the process that has been left unanswered in decades. The novel measure of the redundancy of signal transduction networks with Boolean dynamics by calculating its maximum node-independent elementary signaling mode set accurately predicts the effect of single node knockout in such signaling processes. The three projects as an organic whole advance the understanding of a real system as well as the behavior of such network models, giving me an opportunity to take a glimpse at the dazzling facets of the immense world of network science.

  12. UAV Trajectory Modeling Using Neural Networks

    Science.gov (United States)

    Xue, Min

    2017-01-01

    Large amount of small Unmanned Aerial Vehicles (sUAVs) are projected to operate in the near future. Potential sUAV applications include, but not limited to, search and rescue, inspection and surveillance, aerial photography and video, precision agriculture, and parcel delivery. sUAVs are expected to operate in the uncontrolled Class G airspace, which is at or below 500 feet above ground level (AGL), where many static and dynamic constraints exist, such as ground properties and terrains, restricted areas, various winds, manned helicopters, and conflict avoidance among sUAVs. How to enable safe, efficient, and massive sUAV operations at the low altitude airspace remains a great challenge. NASA's Unmanned aircraft system Traffic Management (UTM) research initiative works on establishing infrastructure and developing policies, requirement, and rules to enable safe and efficient sUAVs' operations. To achieve this goal, it is important to gain insights of future UTM traffic operations through simulations, where the accurate trajectory model plays an extremely important role. On the other hand, like what happens in current aviation development, trajectory modeling should also serve as the foundation for any advanced concepts and tools in UTM. Accurate models of sUAV dynamics and control systems are very important considering the requirement of the meter level precision in UTM operations. The vehicle dynamics are relatively easy to derive and model, however, vehicle control systems remain unknown as they are usually kept by manufactures as a part of intellectual properties. That brings challenges to trajectory modeling for sUAVs. How to model the vehicle's trajectories with unknown control system? This work proposes to use a neural network to model a vehicle's trajectory. The neural network is first trained to learn the vehicle's responses at numerous conditions. Once being fully trained, given current vehicle states, winds, and desired future trajectory, the neural

  13. Modeling GMPLS and Optical MPLS Networks

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann; Wessing, Henrik

    2003-01-01

    . The MPLS concept is attractive because it can work as a unifying control structure. covering all technologies. This paper describes how a novel scheme for optical MPLS and circuit switched GMPLS based networks can incorporated in such multi-domain, MPLS-based scenarios and how it could be modeled. Network...

  14. Steady state analysis of Boolean molecular network models via model reduction and computational algebra.

    Science.gov (United States)

    Veliz-Cuba, Alan; Aguilar, Boris; Hinkelmann, Franziska; Laubenbacher, Reinhard

    2014-06-26

    A key problem in the analysis of mathematical models of molecular networks is the determination of their steady states. The present paper addresses this problem for Boolean network models, an increasingly popular modeling paradigm for networks lacking detailed kinetic information. For small models, the problem can be solved by exhaustive enumeration of all state transitions. But for larger models this is not feasible, since the size of the phase space grows exponentially with the dimension of the network. The dimension of published models is growing to over 100, so that efficient methods for steady state determination are essential. Several methods have been proposed for large networks, some of them heuristic. While these methods represent a substantial improvement in scalability over exhaustive enumeration, the problem for large networks is still unsolved in general. This paper presents an algorithm that consists of two main parts. The first is a graph theoretic reduction of the wiring diagram of the network, while preserving all information about steady states. The second part formulates the determination of all steady states of a Boolean network as a problem of finding all solutions to a system of polynomial equations over the finite number system with two elements. This problem can be solved with existing computer algebra software. This algorithm compares favorably with several existing algorithms for steady state determination. One advantage is that it is not heuristic or reliant on sampling, but rather determines algorithmically and exactly all steady states of a Boolean network. The code for the algorithm, as well as the test suite of benchmark networks, is available upon request from the corresponding author. The algorithm presented in this paper reliably determines all steady states of sparse Boolean networks with up to 1000 nodes. The algorithm is effective at analyzing virtually all published models even those of moderate connectivity. The problem for

  15. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  16. PROJECT ACTIVITY ANALYSIS WITHOUT THE NETWORK MODEL

    Directory of Open Access Journals (Sweden)

    S. Munapo

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper presents a new procedure for analysing and managing activity sequences in projects. The new procedure determines critical activities, critical path, start times, free floats, crash limits, and other useful information without the use of the network model. Even though network models have been successfully used in project management so far, there are weaknesses associated with the use. A network is not easy to generate, and dummies that are usually associated with it make the network diagram complex – and dummy activities have no meaning in the original project management problem. The network model for projects can be avoided while still obtaining all the useful information that is required for project management. What are required are the activities, their accurate durations, and their predecessors.

    AFRIKAANSE OPSOMMING: Die navorsing beskryf ’n nuwerwetse metode vir die ontleding en bestuur van die sekwensiële aktiwiteite van projekte. Die voorgestelde metode bepaal kritiese aktiwiteite, die kritieke pad, aanvangstye, speling, verhasing, en ander groothede sonder die gebruik van ’n netwerkmodel. Die metode funksioneer bevredigend in die praktyk, en omseil die administratiewe rompslomp van die tradisionele netwerkmodelle.

  17. Reliability, factor analysis and internal consistency calculation of the Insomnia Severity Index (ISI in French and in English among Lebanese adolescents

    Directory of Open Access Journals (Sweden)

    M. Chahoud

    2017-06-01

    Conclusion: The results of our analyses reveal that both English and French versions of the ISI scale have good internal consistency and are reproducible and reliable. Therefore, it can be used to assess the prevalence of insomnia in Lebanese adolescents.

  18. Modelling, Synthesis, and Configuration of Networks-on-Chips

    DEFF Research Database (Denmark)

    Stuart, Matthias Bo

    This thesis presents three contributions in two different areas of network-on-chip and system-on-chip research: Application modelling and identifying and solving different optimization problems related to two specific network-on-chip architectures. The contribution related to application modelling...... is an analytical method for deriving the worst-case traffic pattern caused by an application and the cache-coherence protocol in a cache-coherent shared-memory system. The contributions related to network-on-chip optimization problems consist of two parts: The development and evaluation of six heuristics...... for solving the network synthesis problem in the MANGO network-on-chip, and the identification and formalization of the ReNoC configuration problem together with three heuristics for solving it....

  19. Constraints and entropy in a model of network evolution

    Science.gov (United States)

    Tee, Philip; Wakeman, Ian; Parisis, George; Dawes, Jonathan; Kiss, István Z.

    2017-11-01

    Barabási-Albert's "Scale Free" model is the starting point for much of the accepted theory of the evolution of real world communication networks. Careful comparison of the theory with a wide range of real world networks, however, indicates that the model is in some cases, only a rough approximation to the dynamical evolution of real networks. In particular, the exponent γ of the power law distribution of degree is predicted by the model to be exactly 3, whereas in a number of real world networks it has values between 1.2 and 2.9. In addition, the degree distributions of real networks exhibit cut offs at high node degree, which indicates the existence of maximal node degrees for these networks. In this paper we propose a simple extension to the "Scale Free" model, which offers better agreement with the experimental data. This improvement is satisfying, but the model still does not explain why the attachment probabilities should favor high degree nodes, or indeed how constraints arrive in non-physical networks. Using recent advances in the analysis of the entropy of graphs at the node level we propose a first principles derivation for the "Scale Free" and "constraints" model from thermodynamic principles, and demonstrate that both preferential attachment and constraints could arise as a natural consequence of the second law of thermodynamics.

  20. Artificial Neural Network Modeling of an Inverse Fluidized Bed ...

    African Journals Online (AJOL)

    A Radial Basis Function neural network has been successfully employed for the modeling of the inverse fluidized bed reactor. In the proposed model, the trained neural network represents the kinetics of biological decomposition of pollutants in the reactor. The neural network has been trained with experimental data ...

  1. A source-controlled data center network model.

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  2. A source-controlled data center network model

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS. PMID:28328925

  3. Modeling integrated cellular machinery using hybrid Petri-Boolean networks.

    Directory of Open Access Journals (Sweden)

    Natalie Berestovsky

    Full Text Available The behavior and phenotypic changes of cells are governed by a cellular circuitry that represents a set of biochemical reactions. Based on biological functions, this circuitry is divided into three types of networks, each encoding for a major biological process: signal transduction, transcription regulation, and metabolism. This division has generally enabled taming computational complexity dealing with the entire system, allowed for using modeling techniques that are specific to each of the components, and achieved separation of the different time scales at which reactions in each of the three networks occur. Nonetheless, with this division comes loss of information and power needed to elucidate certain cellular phenomena. Within the cell, these three types of networks work in tandem, and each produces signals and/or substances that are used by the others to process information and operate normally. Therefore, computational techniques for modeling integrated cellular machinery are needed. In this work, we propose an integrated hybrid model (IHM that combines Petri nets and Boolean networks to model integrated cellular networks. Coupled with a stochastic simulation mechanism, the model simulates the dynamics of the integrated network, and can be perturbed to generate testable hypotheses. Our model is qualitative and is mostly built upon knowledge from the literature and requires fine-tuning of very few parameters. We validated our model on two systems: the transcriptional regulation of glucose metabolism in human cells, and cellular osmoregulation in S. cerevisiae. The model produced results that are in very good agreement with experimental data, and produces valid hypotheses. The abstract nature of our model and the ease of its construction makes it a very good candidate for modeling integrated networks from qualitative data. The results it produces can guide the practitioner to zoom into components and interconnections and investigate them

  4. A Model for Telestrok Network Evaluation

    DEFF Research Database (Denmark)

    Storm, Anna; Günzel, Franziska; Theiss, Stephan

    2011-01-01

    analysis lacking, current telestroke reimbursement by third-party payers is limited to special contracts and not included in the regular billing system. Based on a systematic literature review and expert interviews with health care economists, third-party payers and neurologists, a Markov model...... was developed from the third-party payer perspective. In principle, it enables telestroke networks to conduct cost-effectiveness studies, because the majority of the required data can be extracted from health insurance companies’ databases and the telestroke network itself. The model presents a basis...

  5. Mixture models with entropy regularization for community detection in networks

    Science.gov (United States)

    Chang, Zhenhai; Yin, Xianjun; Jia, Caiyan; Wang, Xiaoyang

    2018-04-01

    Community detection is a key exploratory tool in network analysis and has received much attention in recent years. NMM (Newman's mixture model) is one of the best models for exploring a range of network structures including community structure, bipartite and core-periphery structures, etc. However, NMM needs to know the number of communities in advance. Therefore, in this study, we have proposed an entropy regularized mixture model (called EMM), which is capable of inferring the number of communities and identifying network structure contained in a network, simultaneously. In the model, by minimizing the entropy of mixing coefficients of NMM using EM (expectation-maximization) solution, the small clusters contained little information can be discarded step by step. The empirical study on both synthetic networks and real networks has shown that the proposed model EMM is superior to the state-of-the-art methods.

  6. Citation Analysis of Hepatitis Monthly by Journal Citation Report (ISI), Google Scholar, and Scopus.

    Science.gov (United States)

    Miri, Seyyed Mohammad; Raoofi, Azam; Heidari, Zahra

    2012-09-01

    Citation analysis as one of the most widely used methods of bibliometrics can be used for computing the various impact measures for scholars based on data from citation databases. Journal Citation Reports (JCR) from Thomson Reuters provides annual report in the form of impact factor (IF) for each journal. We aimed to evaluate the citation parameters of Hepatitis Monthly by JCR in 2010 and compare them with GS and Sc. All articles of Hepat Mon published in 2009 and 2008 which had been cited in 2010 in three databases including WoS, Sc and GS gathered in a spreadsheet. The IFs were manually calculated. Among the 104 total published articles the accuracy rates of GS and Sc in recording the total number of articles was 96% and 87.5%. There was a difference between IFs among the three databases (0.793 in ISI [Institute for Scientific Information], 0.945 in Sc and 0.85 GS). The missing rate of citations in ISI was 4% totally. Original articles were the main cited types, whereas, guidelines and clinical challenges were the least ones. None of the three databases succeed to record all articles published in the journal. Despite high sensitivity of GS comparing to Sc, it cannot be a reliable source for indexing since GS has lack of screening in the data collection and low specificity. Using an average of three IFs is suggested to find the correct IF. Editors should be more aware on the role of original articles in increasing IF and the potential efficacy of review articles in long term impact factor.

  7. The International Trade Network: weighted network analysis and modelling

    International Nuclear Information System (INIS)

    Bhattacharya, K; Mukherjee, G; Manna, S S; Saramäki, J; Kaski, K

    2008-01-01

    Tools of the theory of critical phenomena, namely the scaling analysis and universality, are argued to be applicable to large complex web-like network structures. Using a detailed analysis of the real data of the International Trade Network we argue that the scaled link weight distribution has an approximate log-normal distribution which remains robust over a period of 53 years. Another universal feature is observed in the power-law growth of the trade strength with gross domestic product, the exponent being similar for all countries. Using the 'rich-club' coefficient measure of the weighted networks it has been shown that the size of the rich-club controlling half of the world's trade is actually shrinking. While the gravity law is known to describe well the social interactions in the static networks of population migration, international trade, etc, here for the first time we studied a non-conservative dynamical model based on the gravity law which excellently reproduced many empirical features of the ITN

  8. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  9. Modelling and predicting biogeographical patterns in river networks

    Directory of Open Access Journals (Sweden)

    Sabela Lois

    2016-04-01

    Full Text Available Statistical analysis and interpretation of biogeographical phenomena in rivers is now possible using a spatially explicit modelling framework, which has seen significant developments in the past decade. I used this approach to identify a spatial extent (geostatistical range in which the abundance of the parasitic freshwater pearl mussel (Margaritifera margaritifera L. is spatially autocorrelated in river networks. I show that biomass and abundance of host fish are a likely explanation for the autocorrelation in mussel abundance within a 15-km spatial extent. The application of universal kriging with the empirical model enabled precise prediction of mussel abundance within segments of river networks, something that has the potential to inform conservation biogeography. Although I used a variety of modelling approaches in my thesis, I focus here on the details of this relatively new spatial stream network model, thus advancing the study of biogeographical patterns in river networks.

  10. Modeling polyvinyl chloride Plasma Modification by Neural Networks

    Science.gov (United States)

    Wang, Changquan

    2018-03-01

    Neural networks model were constructed to analyze the connection between dielectric barrier discharge parameters and surface properties of material. The experiment data were generated from polyvinyl chloride plasma modification by using uniform design. Discharge voltage, discharge gas gap and treatment time were as neural network input layer parameters. The measured values of contact angle were as the output layer parameters. A nonlinear mathematical model of the surface modification for polyvinyl chloride was developed based upon the neural networks. The optimum model parameters were obtained by the simulation evaluation and error analysis. The results of the optimal model show that the predicted value is very close to the actual test value. The prediction model obtained here are useful for discharge plasma surface modification analysis.

  11. Degree distribution of a new model for evolving networks

    Indian Academy of Sciences (India)

    on intuitive but realistic consideration that nodes are added to the network with both preferential and random attachments. The degree distribution of the model is between a power-law and an exponential decay. Motivated by the features of network evolution, we introduce a new model of evolving networks, incorporating the ...

  12. Lukasiewicz-Topos Models of Neural Networks, Cell Genome and Interactome Nonlinear Dynamic Models

    CERN Document Server

    Baianu, I C

    2004-01-01

    A categorical and Lukasiewicz-Topos framework for Lukasiewicz Algebraic Logic models of nonlinear dynamics in complex functional systems such as neural networks, genomes and cell interactomes is proposed. Lukasiewicz Algebraic Logic models of genetic networks and signaling pathways in cells are formulated in terms of nonlinear dynamic systems with n-state components that allow for the generalization of previous logical models of both genetic activities and neural networks. An algebraic formulation of variable 'next-state functions' is extended to a Lukasiewicz Topos with an n-valued Lukasiewicz Algebraic Logic subobject classifier description that represents non-random and nonlinear network activities as well as their transformations in developmental processes and carcinogenesis.

  13. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  14. Stochastic network interdiction optimization via capacitated network reliability modeling and probabilistic solution discovery

    International Nuclear Information System (INIS)

    Ramirez-Marquez, Jose Emmanuel; Rocco S, Claudio M.

    2009-01-01

    This paper introduces an evolutionary optimization approach that can be readily applied to solve stochastic network interdiction problems (SNIP). The network interdiction problem solved considers the minimization of the cost associated with an interdiction strategy such that the maximum flow that can be transmitted between a source node and a sink node for a fixed network design is greater than or equal to a given reliability requirement. Furthermore, the model assumes that the nominal capacity of each network link and the cost associated with their interdiction can change from link to link and that such interdiction has a probability of being successful. This version of the SNIP is for the first time modeled as a capacitated network reliability problem allowing for the implementation of computation and solution techniques previously unavailable. The solution process is based on an evolutionary algorithm that implements: (1) Monte-Carlo simulation, to generate potential network interdiction strategies, (2) capacitated network reliability techniques to analyze strategies' source-sink flow reliability and, (3) an evolutionary optimization technique to define, in probabilistic terms, how likely a link is to appear in the final interdiction strategy. Examples for different sizes of networks are used throughout the paper to illustrate the approach

  15. Generalized Tavis-Cummings models and quantum networks

    Science.gov (United States)

    Gorokhov, A. V.

    2018-04-01

    The properties of quantum networks based on generalized Tavis-Cummings models are theoretically investigated. We have calculated the information transfer success rate from one node to another in a simple model of a quantum network realized with two-level atoms placed in the cavities and interacting with an external laser field and cavity photons. The method of dynamical group of the Hamiltonian and technique of corresponding coherent states were used for investigation of the temporal dynamics of the two nodes model.

  16. Using structural equation modeling for network meta-analysis.

    Science.gov (United States)

    Tu, Yu-Kang; Wu, Yun-Chun

    2017-07-14

    Network meta-analysis overcomes the limitations of traditional pair-wise meta-analysis by incorporating all available evidence into a general statistical framework for simultaneous comparisons of several treatments. Currently, network meta-analyses are undertaken either within the Bayesian hierarchical linear models or frequentist generalized linear mixed models. Structural equation modeling (SEM) is a statistical method originally developed for modeling causal relations among observed and latent variables. As random effect is explicitly modeled as a latent variable in SEM, it is very flexible for analysts to specify complex random effect structure and to make linear and nonlinear constraints on parameters. The aim of this article is to show how to undertake a network meta-analysis within the statistical framework of SEM. We used an example dataset to demonstrate the standard fixed and random effect network meta-analysis models can be easily implemented in SEM. It contains results of 26 studies that directly compared three treatment groups A, B and C for prevention of first bleeding in patients with liver cirrhosis. We also showed that a new approach to network meta-analysis based on the technique of unrestricted weighted least squares (UWLS) method can also be undertaken using SEM. For both the fixed and random effect network meta-analysis, SEM yielded similar coefficients and confidence intervals to those reported in the previous literature. The point estimates of two UWLS models were identical to those in the fixed effect model but the confidence intervals were greater. This is consistent with results from the traditional pairwise meta-analyses. Comparing to UWLS model with common variance adjusted factor, UWLS model with unique variance adjusted factor has greater confidence intervals when the heterogeneity was larger in the pairwise comparison. The UWLS model with unique variance adjusted factor reflects the difference in heterogeneity within each comparison

  17. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  18. Vortex network community based reduced-order force model

    Science.gov (United States)

    Gopalakrishnan Meena, Muralikrishnan; Nair, Aditya; Taira, Kunihiko

    2017-11-01

    We characterize the vortical wake interactions by utilizing network theory and cluster-based approaches, and develop a data-inspired unsteady force model. In the present work, the vortical interaction network is defined by nodes representing vortical elements and the edges quantified by induced velocity measures amongst the vortices. The full vorticity field is reduced to a finite number of vortical clusters based on network community detection algorithm, which serves as a basis for a skeleton network that captures the essence of the wake dynamics. We use this reduced representation of the wake to develop a data-inspired reduced-order force model that can predict unsteady fluid forces on the body. The overall formulation is demonstrated for laminar flows around canonical bluff body wake and stalled flow over an airfoil. We also show the robustness of the present network-based model against noisy data, which motivates applications towards turbulent flows and experimental measurements. Supported by the National Science Foundation (Grant 1632003).

  19. Social network models predict movement and connectivity in ecological landscapes

    Science.gov (United States)

    Fletcher, Robert J.; Acevedo, M.A.; Reichert, Brian E.; Pias, Kyle E.; Kitchens, Wiley M.

    2011-01-01

    Network analysis is on the rise across scientific disciplines because of its ability to reveal complex, and often emergent, patterns and dynamics. Nonetheless, a growing concern in network analysis is the use of limited data for constructing networks. This concern is strikingly relevant to ecology and conservation biology, where network analysis is used to infer connectivity across landscapes. In this context, movement among patches is the crucial parameter for interpreting connectivity but because of the difficulty of collecting reliable movement data, most network analysis proceeds with only indirect information on movement across landscapes rather than using observed movement to construct networks. Statistical models developed for social networks provide promising alternatives for landscape network construction because they can leverage limited movement information to predict linkages. Using two mark-recapture datasets on individual movement and connectivity across landscapes, we test whether commonly used network constructions for interpreting connectivity can predict actual linkages and network structure, and we contrast these approaches to social network models. We find that currently applied network constructions for assessing connectivity consistently, and substantially, overpredict actual connectivity, resulting in considerable overestimation of metapopulation lifetime. Furthermore, social network models provide accurate predictions of network structure, and can do so with remarkably limited data on movement. Social network models offer a flexible and powerful way for not only understanding the factors influencing connectivity but also for providing more reliable estimates of connectivity and metapopulation persistence in the face of limited data.

  20. Social network models predict movement and connectivity in ecological landscapes.

    Science.gov (United States)

    Fletcher, Robert J; Acevedo, Miguel A; Reichert, Brian E; Pias, Kyle E; Kitchens, Wiley M

    2011-11-29

    Network analysis is on the rise across scientific disciplines because of its ability to reveal complex, and often emergent, patterns and dynamics. Nonetheless, a growing concern in network analysis is the use of limited data for constructing networks. This concern is strikingly relevant to ecology and conservation biology, where network analysis is used to infer connectivity across landscapes. In this context, movement among patches is the crucial parameter for interpreting connectivity but because of the difficulty of collecting reliable movement data, most network analysis proceeds with only indirect information on movement across landscapes rather than using observed movement to construct networks. Statistical models developed for social networks provide promising alternatives for landscape network construction because they can leverage limited movement information to predict linkages. Using two mark-recapture datasets on individual movement and connectivity across landscapes, we test whether commonly used network constructions for interpreting connectivity can predict actual linkages and network structure, and we contrast these approaches to social network models. We find that currently applied network constructions for assessing connectivity consistently, and substantially, overpredict actual connectivity, resulting in considerable overestimation of metapopulation lifetime. Furthermore, social network models provide accurate predictions of network structure, and can do so with remarkably limited data on movement. Social network models offer a flexible and powerful way for not only understanding the factors influencing connectivity but also for providing more reliable estimates of connectivity and metapopulation persistence in the face of limited data.

  1. Dynamic Pathloss Model for Place and Time Itinerant Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena; Prasad, Ramjee

    2018-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......t Future mobile communication networks are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network planning...... depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  2. BRS Isis: new seedless grape cultivar for the tropical viticulture in Northeastern of Brazil.

    OpenAIRE

    LEAO, P. C. de S.; NUNES, B. T. G.; SOUZA, E. M. C. de; REGO, J. I. de S.; NASCIMENTO, J. H. B. do

    2016-01-01

    The aim of this study was to characterize the yield components of the grape BRS Isis grown in tropical conditions of the São Francisco Valley. The work was carried out during five growing seasons (2013–2015) in Petrolina, PE. The phenological cycle was 127 days between pruning to harvest. It was obtained 65.8% of sprouting on the rootstock IAC 313 and 60.4% on ‘SO4’. The bud fertility rates were high, around 1.00 bunches per shoot. The average production per plant was 20.63 kg on ‘SO4’ and 18...

  3. A complex network based model for detecting isolated communities in water distribution networks

    Science.gov (United States)

    Sheng, Nan; Jia, Youwei; Xu, Zhao; Ho, Siu-Lau; Wai Kan, Chi

    2013-12-01

    Water distribution network (WDN) is a typical real-world complex network of major infrastructure that plays an important role in human's daily life. In this paper, we explore the formation of isolated communities in WDN based on complex network theory. A graph-algebraic model is proposed to effectively detect the potential communities due to pipeline failures. This model can properly illustrate the connectivity and evolution of WDN during different stages of contingency events, and identify the emerging isolated communities through spectral analysis on Laplacian matrix. A case study on a practical urban WDN in China is conducted, and the consistency between the simulation results and the historical data are reported to showcase the feasibility and effectiveness of the proposed model.

  4. Infection dynamics on spatial small-world network models

    Science.gov (United States)

    Iotti, Bryan; Antonioni, Alberto; Bullock, Seth; Darabos, Christian; Tomassini, Marco; Giacobini, Mario

    2017-11-01

    The study of complex networks, and in particular of social networks, has mostly concentrated on relational networks, abstracting the distance between nodes. Spatial networks are, however, extremely relevant in our daily lives, and a large body of research exists to show that the distances between nodes greatly influence the cost and probability of establishing and maintaining a link. A random geometric graph (RGG) is the main type of synthetic network model used to mimic the statistical properties and behavior of many social networks. We propose a model, called REDS, that extends energy-constrained RGGs to account for the synergic effect of sharing the cost of a link with our neighbors, as is observed in real relational networks. We apply both the standard Watts-Strogatz rewiring procedure and another method that conserves the degree distribution of the network. The second technique was developed to eliminate unwanted forms of spatial correlation between the degree of nodes that are affected by rewiring, limiting the effect on other properties such as clustering and assortativity. We analyze both the statistical properties of these two network types and their epidemiological behavior when used as a substrate for a standard susceptible-infected-susceptible compartmental model. We consider and discuss the differences in properties and behavior between RGGs and REDS as rewiring increases and as infection parameters are changed. We report considerable differences both between the network types and, in the case of REDS, between the two rewiring schemes. We conclude that REDS represent, with the application of these rewiring mechanisms, extremely useful and interesting tools in the study of social and epidemiological phenomena in synthetic complex networks.

  5. Efficient Neural Network Modeling for Flight and Space Dynamics Simulation

    Directory of Open Access Journals (Sweden)

    Ayman Hamdy Kassem

    2011-01-01

    Full Text Available This paper represents an efficient technique for neural network modeling of flight and space dynamics simulation. The technique will free the neural network designer from guessing the size and structure for the required neural network model and will help to minimize the number of neurons. For linear flight/space dynamics systems, the technique can find the network weights and biases directly by solving a system of linear equations without the need for training. Nonlinear flight dynamic systems can be easily modeled by training its linearized models keeping the same network structure. The training is fast, as it uses the linear system knowledge to speed up the training process. The technique is tested on different flight/space dynamic models and showed promising results.

  6. A three-dimensional computational model of collagen network mechanics.

    Directory of Open Access Journals (Sweden)

    Byoungkoo Lee

    Full Text Available Extracellular matrix (ECM strongly influences cellular behaviors, including cell proliferation, adhesion, and particularly migration. In cancer, the rigidity of the stromal collagen environment is thought to control tumor aggressiveness, and collagen alignment has been linked to tumor cell invasion. While the mechanical properties of collagen at both the single fiber scale and the bulk gel scale are quite well studied, how the fiber network responds to local stress or deformation, both structurally and mechanically, is poorly understood. This intermediate scale knowledge is important to understanding cell-ECM interactions and is the focus of this study. We have developed a three-dimensional elastic collagen fiber network model (bead-and-spring model and studied fiber network behaviors for various biophysical conditions: collagen density, crosslinker strength, crosslinker density, and fiber orientation (random vs. prealigned. We found the best-fit crosslinker parameter values using shear simulation tests in a small strain region. Using this calibrated collagen model, we simulated both shear and tensile tests in a large linear strain region for different network geometry conditions. The results suggest that network geometry is a key determinant of the mechanical properties of the fiber network. We further demonstrated how the fiber network structure and mechanics evolves with a local formation, mimicking the effect of pulling by a pseudopod during cell migration. Our computational fiber network model is a step toward a full biomechanical model of cellular behaviors in various ECM conditions.

  7. PageRank model of opinion formation on Ulam networks

    Science.gov (United States)

    Chakhmakhchyan, L.; Shepelyansky, D.

    2013-12-01

    We consider a PageRank model of opinion formation on Ulam networks, generated by the intermittency map and the typical Chirikov map. The Ulam networks generated by these maps have certain similarities with such scale-free networks as the World Wide Web (WWW), showing an algebraic decay of the PageRank probability. We find that the opinion formation process on Ulam networks has certain similarities but also distinct features comparing to the WWW. We attribute these distinctions to internal differences in network structure of the Ulam and WWW networks. We also analyze the process of opinion formation in the frame of generalized Sznajd model which protects opinion of small communities.

  8. Analysis and Comparison of Typical Models within Distribution Network Design

    DEFF Research Database (Denmark)

    Jørgensen, Hans Jacob; Larsen, Allan; Madsen, Oli B.G.

    This paper investigates the characteristics of typical optimisation models within Distribution Network Design. During the paper fourteen models known from the literature will be thoroughly analysed. Through this analysis a schematic approach to categorisation of distribution network design models...... for educational purposes. Furthermore, the paper can be seen as a practical introduction to network design modelling as well as a being an art manual or recipe when constructing such a model....

  9. Neural network modeling for near wall turbulent flow

    International Nuclear Information System (INIS)

    Milano, Michele; Koumoutsakos, Petros

    2002-01-01

    A neural network methodology is developed in order to reconstruct the near wall field in a turbulent flow by exploiting flow fields provided by direct numerical simulations. The results obtained from the neural network methodology are compared with the results obtained from prediction and reconstruction using proper orthogonal decomposition (POD). Using the property that the POD is equivalent to a specific linear neural network, a nonlinear neural network extension is presented. It is shown that for a relatively small additional computational cost nonlinear neural networks provide us with improved reconstruction and prediction capabilities for the near wall velocity fields. Based on these results advantages and drawbacks of both approaches are discussed with an outlook toward the development of near wall models for turbulence modeling and control

  10. Overview of the IAEA's activity on ISI qualification

    International Nuclear Information System (INIS)

    Trampus, P.

    2000-01-01

    The IAEA Subprogram on Nuclear Power Planning, Implementation and Performance is presented. It's objective is to assist Member States in: planning nuclear power programmes in an integrated manner considering all necessary factors; systematically improving overall performance and competitiveness of NPPs trough entire service life with due regard to safety; applying technological/engineering best practices including QA/QM in all areas of nuclear power utilisation. International working group on life management of NPPs (IWG-LMNPP) has been established in 1975 with 26 Member States and 2 international organizations in order to provide the Director General with advice and opinions and the Member States with information, recommendations and support in life management issues.The technical co-operation program RER/4/020 'Advanced NDT of Primary Circuit Components' is presented.The pilot study is aimed to provide the participating Member States with practical advice how to apply the IAEA's qualification methodology. The target application is Technical Justification for UT of WWER-1000 RPV shell weld (unit 5 of 'Kozloduy NPP). The concept is to simulate the qualification process through assistance to establish qualification for a real NPP component, using real ISI, in a real regulatory environment. Interim results for Bulgaria are reported and further tasks are outlined

  11. Network modelling methods for FMRI.

    Science.gov (United States)

    Smith, Stephen M; Miller, Karla L; Salimi-Khorshidi, Gholamreza; Webster, Matthew; Beckmann, Christian F; Nichols, Thomas E; Ramsey, Joseph D; Woolrich, Mark W

    2011-01-15

    There is great interest in estimating brain "networks" from FMRI data. This is often attempted by identifying a set of functional "nodes" (e.g., spatial ROIs or ICA maps) and then conducting a connectivity analysis between the nodes, based on the FMRI timeseries associated with the nodes. Analysis methods range from very simple measures that consider just two nodes at a time (e.g., correlation between two nodes' timeseries) to sophisticated approaches that consider all nodes simultaneously and estimate one global network model (e.g., Bayes net models). Many different methods are being used in the literature, but almost none has been carefully validated or compared for use on FMRI timeseries data. In this work we generate rich, realistic simulated FMRI data for a wide range of underlying networks, experimental protocols and problematic confounds in the data, in order to compare different connectivity estimation approaches. Our results show that in general correlation-based approaches can be quite successful, methods based on higher-order statistics are less sensitive, and lag-based approaches perform very poorly. More specifically: there are several methods that can give high sensitivity to network connection detection on good quality FMRI data, in particular, partial correlation, regularised inverse covariance estimation and several Bayes net methods; however, accurate estimation of connection directionality is more difficult to achieve, though Patel's τ can be reasonably successful. With respect to the various confounds added to the data, the most striking result was that the use of functionally inaccurate ROIs (when defining the network nodes and extracting their associated timeseries) is extremely damaging to network estimation; hence, results derived from inappropriate ROI definition (such as via structural atlases) should be regarded with great caution. Copyright © 2010 Elsevier Inc. All rights reserved.

  12. A Network-Individual-Resource Model for HIV Prevention

    Science.gov (United States)

    Johnson, Blair T.; Redding, Colleen A.; DiClemente, Ralph J.; Mustanski, Brian S.; Dodge, Brian M.; Sheeran, Paschal; Warren, Michelle R.; Zimmerman, Rick S.; Fisher, William A.; Conner, Mark T.; Carey, Michael P.; Fisher, Jeffrey D.; Stall, Ronald D.; Fishbein, Martin

    2014-01-01

    HIV is transmitted through dyadic exchanges of individuals linked in transitory or permanent networks of varying sizes. To optimize prevention efficacy, a complementary theoretical perspective that bridges key individual level elements with important network elements can be a foundation for developing and implementing HIV interventions with outcomes that are more sustainable over time and have greater dissemination potential. Toward that end, we introduce a Network-Individual-Resource (NIR) model for HIV prevention that recognizes how exchanges of resources between individuals and their networks underlies and sustains HIV-risk behaviors. Individual behavior change for HIV prevention, then, may be dependent on increasing the supportiveness of that individual's relevant networks for such change. Among other implications, an NIR model predicts that the success of prevention efforts depends on whether the prevention efforts (1) prompt behavior changes that can be sustained by the resources the individual or their networks possess; (2) meet individual and network needs and are consistent with the individual's current situation/developmental stage; (3) are trusted and valued; and (4) target high HIV-prevalence networks. PMID:20862606

  13. Short-Term Load Forecasting Model Based on Quantum Elman Neural Networks

    Directory of Open Access Journals (Sweden)

    Zhisheng Zhang

    2016-01-01

    Full Text Available Short-term load forecasting model based on quantum Elman neural networks was constructed in this paper. The quantum computation and Elman feedback mechanism were integrated into quantum Elman neural networks. Quantum computation can effectively improve the approximation capability and the information processing ability of the neural networks. Quantum Elman neural networks have not only the feedforward connection but also the feedback connection. The feedback connection between the hidden nodes and the context nodes belongs to the state feedback in the internal system, which has formed specific dynamic memory performance. Phase space reconstruction theory is the theoretical basis of constructing the forecasting model. The training samples are formed by means of K-nearest neighbor approach. Through the example simulation, the testing results show that the model based on quantum Elman neural networks is better than the model based on the quantum feedforward neural network, the model based on the conventional Elman neural network, and the model based on the conventional feedforward neural network. So the proposed model can effectively improve the prediction accuracy. The research in the paper makes a theoretical foundation for the practical engineering application of the short-term load forecasting model based on quantum Elman neural networks.

  14. Runoff Modelling in Urban Storm Drainage by Neural Networks

    DEFF Research Database (Denmark)

    Rasmussen, Michael R.; Brorsen, Michael; Schaarup-Jensen, Kjeld

    1995-01-01

    A neural network is used to simulate folw and water levels in a sewer system. The calibration of th neural network is based on a few measured events and the network is validated against measureed events as well as flow simulated with the MOUSE model (Lindberg and Joergensen, 1986). The neural...... network is used to compute flow or water level at selected points in the sewer system, and to forecast the flow from a small residential area. The main advantages of the neural network are the build-in self calibration procedure and high speed performance, but the neural network cannot be used to extract...... knowledge of the runoff process. The neural network was found to simulate 150 times faster than e.g. the MOUSE model....

  15. Analyzing energy consumption of wireless networks. A model-based approach

    Energy Technology Data Exchange (ETDEWEB)

    Yue, Haidi

    2013-03-04

    During the last decades, wireless networking has been continuously a hot topic both in academy and in industry. Many different wireless networks have been introduced like wireless local area networks, wireless personal networks, wireless ad hoc networks, and wireless sensor networks. If these networks want to have a long term usability, the power consumed by the wireless devices in each of these networks needs to be managed efficiently. Hence, a lot of effort has been carried out for the analysis and improvement of energy efficiency, either for a specific network layer (protocol), or new cross-layer designs. In this thesis, we apply model-based approach for the analysis of energy consumption of different wireless protocols. The protocols under consideration are: one leader election protocol, one routing protocol, and two medium access control protocols. By model-based approach we mean that all these four protocols are formalized as some formal models, more precisely, as discrete-time Markov chains (DTMCs), Markov decision processes (MDPs), or stochastic timed automata (STA). For the first two models, DTMCs and MDPs, we model them in PRISM, a prominent model checker for probabilistic model checking, and apply model checking technique to analyze them. Model checking belongs to the family of formal methods. It discovers exhaustively all possible (reachable) states of the models, and checks whether these models meet a given specification. Specifications are system properties that we want to study, usually expressed by some logics, for instance, probabilistic computer tree logic (PCTL). However, while model checking relies on rigorous mathematical foundations and automatically explores the entire state space of a model, its applicability is also limited by the so-called state space explosion problem -- even systems of moderate size often yield models with an exponentially larger state space that thwart their analysis. Hence for the STA models in this thesis, since there

  16. Feed forward neural networks modeling for K-P interactions

    International Nuclear Information System (INIS)

    El-Bakry, M.Y.

    2003-01-01

    Artificial intelligence techniques involving neural networks became vital modeling tools where model dynamics are difficult to track with conventional techniques. The paper make use of the feed forward neural networks (FFNN) to model the charged multiplicity distribution of K-P interactions at high energies. The FFNN was trained using experimental data for the multiplicity distributions at different lab momenta. Results of the FFNN model were compared to that generated using the parton two fireball model and the experimental data. The proposed FFNN model results showed good fitting to the experimental data. The neural network model performance was also tested at non-trained space and was found to be in good agreement with the experimental data

  17. Learning and Model-checking Networks of I/O Automata

    DEFF Research Database (Denmark)

    Mao, Hua; Jaeger, Manfred

    2012-01-01

    We introduce a new statistical relational learning (SRL) approach in which models for structured data, especially network data, are constructed as networks of communicating nite probabilistic automata. Leveraging existing automata learning methods from the area of grammatical inference, we can...... learn generic models for network entities in the form of automata templates. As is characteristic for SRL techniques, the abstraction level aorded by learning generic templates enables one to apply the learned model to new domains. A main benet of learning models based on nite automata lies in the fact...

  18. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  19. Disruption of River Networks in Nature and Models

    Science.gov (United States)

    Perron, J. T.; Black, B. A.; Stokes, M.; McCoy, S. W.; Goldberg, S. L.

    2017-12-01

    Many natural systems display especially informative behavior as they respond to perturbations. Landscapes are no exception. For example, longitudinal elevation profiles of rivers responding to changes in uplift rate can reveal differences among erosional mechanisms that are obscured while the profiles are in equilibrium. The responses of erosional river networks to perturbations, including disruption of their network structure by diversion, truncation, resurfacing, or river capture, may be equally revealing. In this presentation, we draw attention to features of disrupted erosional river networks that a general model of landscape evolution should be able to reproduce, including the consequences of different styles of planetary tectonics and the response to heterogeneous bedrock structure and deformation. A comparison of global drainage directions with long-wavelength topography on Earth, Mars, and Saturn's moon Titan reveals the extent to which persistent and relatively rapid crustal deformation has disrupted river networks on Earth. Motivated by this example and others, we ask whether current models of river network evolution adequately capture the disruption of river networks by tectonic, lithologic, or climatic perturbations. In some cases the answer appears to be no, and we suggest some processes that models may be missing.

  20. Growth of cortical neuronal network in vitro: Modeling and analysis

    International Nuclear Information System (INIS)

    Lai, P.-Y.; Jia, L. C.; Chan, C. K.

    2006-01-01

    We present a detailed analysis and theoretical growth models to account for recent experimental data on the growth of cortical neuronal networks in vitro [Phys. Rev. Lett. 93, 088101 (2004)]. The experimentally observed synchronized firing frequency of a well-connected neuronal network is shown to be proportional to the mean network connectivity. The growth of the network is consistent with the model of an early enhanced growth of connection, but followed by a retarded growth once the synchronized cluster is formed. Microscopic models with dominant excluded volume interactions are consistent with the observed exponential decay of the mean connection probability as a function of the mean network connectivity. The biological implications of the growth model are also discussed

  1. Biochemical Network Stochastic Simulator (BioNetS: software for stochastic modeling of biochemical networks

    Directory of Open Access Journals (Sweden)

    Elston Timothy C

    2004-03-01

    Full Text Available Abstract Background Intrinsic fluctuations due to the stochastic nature of biochemical reactions can have large effects on the response of biochemical networks. This is particularly true for pathways that involve transcriptional regulation, where generally there are two copies of each gene and the number of messenger RNA (mRNA molecules can be small. Therefore, there is a need for computational tools for developing and investigating stochastic models of biochemical networks. Results We have developed the software package Biochemical Network Stochastic Simulator (BioNetS for efficientlyand accurately simulating stochastic models of biochemical networks. BioNetS has a graphical user interface that allows models to be entered in a straightforward manner, and allows the user to specify the type of random variable (discrete or continuous for each chemical species in the network. The discrete variables are simulated using an efficient implementation of the Gillespie algorithm. For the continuous random variables, BioNetS constructs and numerically solvesthe appropriate chemical Langevin equations. The software package has been developed to scale efficiently with network size, thereby allowing large systems to be studied. BioNetS runs as a BioSpice agent and can be downloaded from http://www.biospice.org. BioNetS also can be run as a stand alone package. All the required files are accessible from http://x.amath.unc.edu/BioNetS. Conclusions We have developed BioNetS to be a reliable tool for studying the stochastic dynamics of large biochemical networks. Important features of BioNetS are its ability to handle hybrid models that consist of both continuous and discrete random variables and its ability to model cell growth and division. We have verified the accuracy and efficiency of the numerical methods by considering several test systems.

  2. Keystone Business Models for Network Security Processors

    Directory of Open Access Journals (Sweden)

    Arthur Low

    2013-07-01

    Full Text Available Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing” models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.

  3. [Peruvian scientific production in medicine and collaboration networks, analysis of the Science Citation Index 2000-2009].

    Science.gov (United States)

    Huamaní, Charles; Mayta-Tristán, Percy

    2010-09-01

    To describe the Peruvian scientific production in indexed journals in the Institute for Scientific Information (ISI) and the characteristics of the institutional collaborative networks. All papers published in the ISI database (Clinical Medicine collection) were included during 2000 to 2009 with at least one author with a Peruvian affiliation. The publication trend, address of corresponding author, type of article, institution, city (only for Peru), and country were evaluated. The collaborative networks were analized using the Pajek® software. 1210 papers were found, increasing from 61 in 2000 to 200 in 2009 (average of 121 articles/year). 30.4% articles included a corresponding author from a Peruvian institution. The average of authors per article was 8.3. Original articles represented 82.1% of total articles. Infectious diseases-related journals concentrated most of the articles. The main countries that collaborate with Peru are: USA (60.4%), England (12.9%), and Brazil (8.0%). Lima concentrated 94.7% of the publications and three regions (Huancavelica, Moquegua and Tacna) did not register any publication. Only two universities published more than one article/year and four institutions published more than 10 articles/year. Universidad Peruana Cayetano Heredia published 45% of the total number of articles, being the most productive institution and which concentrated the most number of collaborations with foreign institutions. The ministry of Health--including all dependencies--published 37.3% of the total number of publications. There is a higher level of collaboration with foreign institutions rather than local institutions. The Peruvian scientific production in medicine represented in the ISI database is very low but growing, and is concentrated in Lima and in a few institutions. The most productive Peruvian institutions collaborate more intensively with foreign journals rather than local institutions.

  4. A comprehensive Network Security Risk Model for process control networks.

    Science.gov (United States)

    Henry, Matthew H; Haimes, Yacov Y

    2009-02-01

    The risk of cyber attacks on process control networks (PCN) is receiving significant attention due to the potentially catastrophic extent to which PCN failures can damage the infrastructures and commodity flows that they support. Risk management addresses the coupled problems of (1) reducing the likelihood that cyber attacks would succeed in disrupting PCN operation and (2) reducing the severity of consequences in the event of PCN failure or manipulation. The Network Security Risk Model (NSRM) developed in this article provides a means of evaluating the efficacy of candidate risk management policies by modeling the baseline risk and assessing expectations of risk after the implementation of candidate measures. Where existing risk models fall short of providing adequate insight into the efficacy of candidate risk management policies due to shortcomings in their structure or formulation, the NSRM provides model structure and an associated modeling methodology that captures the relevant dynamics of cyber attacks on PCN for risk analysis. This article develops the NSRM in detail in the context of an illustrative example.

  5. Modeling documents with Generative Adversarial Networks

    OpenAIRE

    Glover, John

    2016-01-01

    This paper describes a method for using Generative Adversarial Networks to learn distributed representations of natural language documents. We propose a model that is based on the recently proposed Energy-Based GAN, but instead uses a Denoising Autoencoder as the discriminator network. Document representations are extracted from the hidden layer of the discriminator and evaluated both quantitatively and qualitatively.

  6. A Webometric Analysis of ISI Medical Journals Using Yahoo, AltaVista, and All the Web Search Engines

    Directory of Open Access Journals (Sweden)

    Zohreh Zahedi

    2010-12-01

    Full Text Available The World Wide Web is an important information source for scholarly communications. Examining the inlinks via webometrics studies has attracted particular interests among information researchers. In this study, the number of inlinks to 69 ISI medical journals retrieved by Yahoo, AltaVista, and All The web Search Engines were examined via a comparative and Webometrics study. For data analysis, SPSS software was employed. Findings revealed that British Medical Journal website attracted the most links of all in the three search engines. There is a significant correlation between the number of External links and the ISI impact factor. The most significant correlation in the three search engines exists between external links of Yahoo and AltaVista (100% and the least correlation is found between external links of All The web & the number of pages of AltaVista (0.51. There is no significant difference between the internal links & the number of pages found by the three search engines. But in case of impact factors, significant differences are found between these three search engines. So, the study shows that journals with higher impact factor attract more links to their websites. It also indicates that the three search engines are significantly different in terms of total links, outlinks and web impact factors

  7. A small-world network model of facial emotion recognition.

    Science.gov (United States)

    Takehara, Takuma; Ochiai, Fumio; Suzuki, Naoto

    2016-01-01

    Various models have been proposed to increase understanding of the cognitive basis of facial emotions. Despite those efforts, interactions between facial emotions have received minimal attention. If collective behaviours relating to each facial emotion in the comprehensive cognitive system could be assumed, specific facial emotion relationship patterns might emerge. In this study, we demonstrate that the frameworks of complex networks can effectively capture those patterns. We generate 81 facial emotion images (6 prototypes and 75 morphs) and then ask participants to rate degrees of similarity in 3240 facial emotion pairs in a paired comparison task. A facial emotion network constructed on the basis of similarity clearly forms a small-world network, which features an extremely short average network distance and close connectivity. Further, even if two facial emotions have opposing valences, they are connected within only two steps. In addition, we show that intermediary morphs are crucial for maintaining full network integration, whereas prototypes are not at all important. These results suggest the existence of collective behaviours in the cognitive systems of facial emotions and also describe why people can efficiently recognize facial emotions in terms of information transmission and propagation. For comparison, we construct three simulated networks--one based on the categorical model, one based on the dimensional model, and one random network. The results reveal that small-world connectivity in facial emotion networks is apparently different from those networks, suggesting that a small-world network is the most suitable model for capturing the cognitive basis of facial emotions.

  8. DAILY RAINFALL-RUNOFF MODELLING BY NEURAL NETWORKS ...

    African Journals Online (AJOL)

    K. Benzineb, M. Remaoun

    2016-09-01

    Sep 1, 2016 ... The hydrologic behaviour modelling of w. Journal of ... i Ouahrane's basin from rainfall-runoff relation which is non-linea networks ... will allow checking efficiency of formal neural networks for flows simulation in semi-arid zone.

  9. Energy Consumption Model and Measurement Results for Network Coding-enabled IEEE 802.11 Meshed Wireless Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Rasmussen, Ulrik Wilken; Hundebøll, Martin

    2012-01-01

    This paper presents an energy model and energy measurements for network coding enabled wireless meshed networks based on IEEE 802.11 technology. The energy model and the energy measurement testbed is limited to a simple Alice and Bob scenario. For this toy scenario we compare the energy usages...... for a system with and without network coding support. While network coding reduces the number of radio transmissions, the operational activity on the devices due to coding will be increased. We derive an analytical model for the energy consumption and compare it to real measurements for which we build...... a flexible, low cost tool to be able to measure at any given node in a meshed network. We verify the precision of our tool by comparing it to a sophisticated device. Our main results in this paper are the derivation of an analytical energy model, the implementation of a distributed energy measurement testbed...

  10. Continuum Modeling of Biological Network Formation

    KAUST Repository

    Albi, Giacomo; Burger, Martin; Haskovec, Jan; Markowich, Peter A.; Schlottbom, Matthias

    2017-01-01

    We present an overview of recent analytical and numerical results for the elliptic–parabolic system of partial differential equations proposed by Hu and Cai, which models the formation of biological transportation networks. The model describes

  11. ISIS annual report for the financial year 1 April 1991 to 31 March 1992. V. 1

    International Nuclear Information System (INIS)

    Wilson, C.

    1992-07-01

    Volume 1 of the 1992 Annual Report of ISIS, the neutron scattering facility based at the Rutherford Appleton Laboratory contains details of the work of the Facility over the past year. In addition to reports on the status of the accelerator and instruments, instrument developments, support facilities, publications etc, Volume 1 contains summaries of the science performed, often with reference to reports contained in the current volume. In addition, there are more extended articles highlighting a range of recently performed experiments. (author)

  12. Multiple Social Networks, Data Models and Measures for

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2017-01-01

    Multiple Social Network Analysis is a discipline defining models, measures, methodologies, and algorithms to study multiple social networks together as a single social system. It is particularly valuable when the networks are interconnected, e.g., the same actors are present in more than one...

  13. Neural networks in economic modelling : An empirical study

    NARCIS (Netherlands)

    Verkooijen, W.J.H.

    1996-01-01

    This dissertation addresses the statistical aspects of neural networks and their usability for solving problems in economics and finance. Neural networks are discussed in a framework of modelling which is generally accepted in econometrics. Within this framework a neural network is regarded as a

  14. Randomizing growing networks with a time-respecting null model

    Science.gov (United States)

    Ren, Zhuo-Ming; Mariani, Manuel Sebastian; Zhang, Yi-Cheng; Medo, Matúš

    2018-05-01

    Complex networks are often used to represent systems that are not static but grow with time: People make new friendships, new papers are published and refer to the existing ones, and so forth. To assess the statistical significance of measurements made on such networks, we propose a randomization methodology—a time-respecting null model—that preserves both the network's degree sequence and the time evolution of individual nodes' degree values. By preserving the temporal linking patterns of the analyzed system, the proposed model is able to factor out the effect of the system's temporal patterns on its structure. We apply the model to the citation network of Physical Review scholarly papers and the citation network of US movies. The model reveals that the two data sets are strikingly different with respect to their degree-degree correlations, and we discuss the important implications of this finding on the information provided by paradigmatic node centrality metrics such as indegree and Google's PageRank. The randomization methodology proposed here can be used to assess the significance of any structural property in growing networks, which could bring new insights into the problems where null models play a critical role, such as the detection of communities and network motifs.

  15. Modeling and optimization of cloud-ready and content-oriented networks

    CERN Document Server

    Walkowiak, Krzysztof

    2016-01-01

    This book focuses on modeling and optimization of cloud-ready and content-oriented networks in the context of different layers and accounts for specific constraints following from protocols and technologies used in a particular layer. It addresses a wide range of additional constraints important in contemporary networks, including various types of network flows, survivability issues, multi-layer networking, and resource location. The book presents recent existing and new results in a comprehensive and cohesive way. The contents of the book are organized in five chapters, which are mostly self-contained. Chapter 1 briefly presents information on cloud computing and content-oriented services, and introduces basic notions and concepts of network modeling and optimization. Chapter 2 covers various optimization problems that arise in the context of connection-oriented networks. Chapter 3 focuses on modeling and optimization of Elastic Optical Networks. Chapter 4 is devoted to overlay networks. The book concludes w...

  16. An adaptive wavelet-network model for forecasting daily total solar-radiation

    International Nuclear Information System (INIS)

    Mellit, A.; Benghanem, M.; Kalogirou, S.A.

    2006-01-01

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet-networks are feed-forward networks using wavelets as activation functions. Wavelet-networks have been used successfully in various engineering applications such as classification, identification and control problems. In this paper, the use of adaptive wavelet-network architecture in finding a suitable forecasting model for predicting the daily total solar-radiation is investigated. Total solar-radiation is considered as the most important parameter in the performance prediction of renewable energy systems, particularly in sizing photovoltaic (PV) power systems. For this purpose, daily total solar-radiation data have been recorded during the period extending from 1981 to 2001, by a meteorological station in Algeria. The wavelet-network model has been trained by using either the 19 years of data or one year of the data. In both cases the total solar radiation data corresponding to year 2001 was used for testing the model. The network was trained to accept and handle a number of unusual cases. Results indicate that the model predicts daily total solar-radiation values with a good accuracy of approximately 97% and the mean absolute percentage error is not more than 6%. In addition, the performance of the model was compared with different neural network structures and classical models. Training algorithms for wavelet-networks require smaller numbers of iterations when compared with other neural networks. The model can be used to fill missing data in weather databases. Additionally, the proposed model can be generalized and used in different locations and for other weather data, such as sunshine duration and ambient temperature. Finally, an application using the model for sizing a PV-power system is presented in order to confirm the validity of this model

  17. Bayesian network modelling of upper gastrointestinal bleeding

    Science.gov (United States)

    Aisha, Nazziwa; Shohaimi, Shamarina; Adam, Mohd Bakri

    2013-09-01

    Bayesian networks are graphical probabilistic models that represent causal and other relationships between domain variables. In the context of medical decision making, these models have been explored to help in medical diagnosis and prognosis. In this paper, we discuss the Bayesian network formalism in building medical support systems and we learn a tree augmented naive Bayes Network (TAN) from gastrointestinal bleeding data. The accuracy of the TAN in classifying the source of gastrointestinal bleeding into upper or lower source is obtained. The TAN achieves a high classification accuracy of 86% and an area under curve of 92%. A sensitivity analysis of the model shows relatively high levels of entropy reduction for color of the stool, history of gastrointestinal bleeding, consistency and the ratio of blood urea nitrogen to creatinine. The TAN facilitates the identification of the source of GIB and requires further validation.

  18. The Jackson Queueing Network Model Built Using Poisson Measures. Application To A Bank Model

    Directory of Open Access Journals (Sweden)

    Ciuiu Daniel

    2014-07-01

    Full Text Available In this paper we will build a bank model using Poisson measures and Jackson queueing networks. We take into account the relationship between the Poisson and the exponential distributions, and we consider for each credit/deposit type a node where shocks are modeled as the compound Poisson processes. The transmissions of the shocks are modeled as moving between nodes in Jackson queueing networks, the external shocks are modeled as external arrivals, and the absorption of shocks as departures from the network.

  19. A game theory-based trust measurement model for social networks.

    Science.gov (United States)

    Wang, Yingjie; Cai, Zhipeng; Yin, Guisheng; Gao, Yang; Tong, Xiangrong; Han, Qilong

    2016-01-01

    In social networks, trust is a complex social network. Participants in online social networks want to share information and experiences with as many reliable users as possible. However, the modeling of trust is complicated and application dependent. Modeling trust needs to consider interaction history, recommendation, user behaviors and so on. Therefore, modeling trust is an important focus for online social networks. We propose a game theory-based trust measurement model for social networks. The trust degree is calculated from three aspects, service reliability, feedback effectiveness, recommendation credibility, to get more accurate result. In addition, to alleviate the free-riding problem, we propose a game theory-based punishment mechanism for specific trust and global trust, respectively. We prove that the proposed trust measurement model is effective. The free-riding problem can be resolved effectively through adding the proposed punishment mechanism.

  20. Articles with authors affiliated to Brazilian institutions published from 1994 to 2003 with 100 or more citations: I - the weight of international collaboration and the role of the networks

    Directory of Open Access Journals (Sweden)

    Abel L. Packer

    2006-12-01

    Full Text Available Articles with 100 citations or more in the scientific literature and with at least one author with Brazilian affiliation, were identified in the Thomson-ISI (Institute for Scientific Information Web of Science bibliometric database, covering a 10-year period, from 1994 to 2003; 248 (0.23% out of a total of 109,916 articles with Brazilian affiliation were identified. This study was primarily carried out to identify thematic nuclei of excellence in research that had major impact in the international literature (Meneghini and Packer 2006. The regional and institutional affiliation distributions of these articles follow approximately that of the total of Brazilian articles in the ISI database. However, some significant deviations are observed derived from the outstanding performance of a few groups responsible for the publication of the HC-ISI (Highly cited ISI papers. The international collaboration and the network organization of work played a fundamental role in these results. It is evident that the role played by organizations in research networks as well as the international collaborations exerted strong influence in the impact of these articles, although with distinct amplitude in the different fields.Foram identificados os artigos com um mínimo de 100 citações na literatura científica e com ao menos uma filiação brasileira, segundo a base bibliométrica Thomsom ISI, no período de 10 anos entre 1994 e 2003. Dos 109.916 artigos com filiação brasileira neste período, 248 apresentaram 100 ou mais citações, ou seja, 0,23% do total. Este levantamento foi feito primordialmente para identificar núcleos temáticos de excelência em pesquisa que tiveram maior impacto na literatura internacional (veja Meneghini and Packer 2006. As distribuições regional e institucional das afiliações desses artigos mais citados seguem aproximadamente aquela do total de artigos brasileiros na base ISI. No entanto, notam-se alguns desvios significativos

  1. Fundamentals of complex networks models, structures and dynamics

    CERN Document Server

    Chen, Guanrong; Li, Xiang

    2014-01-01

    Complex networks such as the Internet, WWW, transportationnetworks, power grids, biological neural networks, and scientificcooperation networks of all kinds provide challenges for futuretechnological development. In particular, advanced societies havebecome dependent on large infrastructural networks to an extentbeyond our capability to plan (modeling) and to operate (control).The recent spate of collapses in power grids and ongoing virusattacks on the Internet illustrate the need for knowledge aboutmodeling, analysis of behaviors, optimized planning and performancecontrol in such networks. F

  2. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  3. Small-World and Scale-Free Network Models for IoT Systems

    Directory of Open Access Journals (Sweden)

    Insoo Sohn

    2017-01-01

    Full Text Available It is expected that Internet of Things (IoT revolution will enable new solutions and business for consumers and entrepreneurs by connecting billions of physical world devices with varying capabilities. However, for successful realization of IoT, challenges such as heterogeneous connectivity, ubiquitous coverage, reduced network and device complexity, enhanced power savings, and enhanced resource management have to be solved. All these challenges are heavily impacted by the IoT network topology supported by massive number of connected devices. Small-world networks and scale-free networks are important complex network models with massive number of nodes and have been actively used to study the network topology of brain networks, social networks, and wireless networks. These models, also, have been applied to IoT networks to enhance synchronization, error tolerance, and more. However, due to interdisciplinary nature of the network science, with heavy emphasis on graph theory, it is not easy to study the various tools provided by complex network models. Therefore, in this paper, we attempt to introduce basic concepts of graph theory, including small-world networks and scale-free networks, and provide system models that can be easily implemented to be used as a powerful tool in solving various research problems related to IoT.

  4. Hidden long evolutionary memory in a model biochemical network

    Science.gov (United States)

    Ali, Md. Zulfikar; Wingreen, Ned S.; Mukhopadhyay, Ranjan

    2018-04-01

    We introduce a minimal model for the evolution of functional protein-interaction networks using a sequence-based mutational algorithm, and apply the model to study neutral drift in networks that yield oscillatory dynamics. Starting with a functional core module, random evolutionary drift increases network complexity even in the absence of specific selective pressures. Surprisingly, we uncover a hidden order in sequence space that gives rise to long-term evolutionary memory, implying strong constraints on network evolution due to the topology of accessible sequence space.

  5. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  6. The hippocampal network model: A transdiagnostic metaconnectomic approach

    Directory of Open Access Journals (Sweden)

    Eithan Kotkowski

    Full Text Available Purpose: The hippocampus plays a central role in cognitive and affective processes and is commonly implicated in neurodegenerative diseases. Our study aimed to identify and describe a hippocampal network model (HNM using trans-diagnostic MRI data from the BrainMap® database. We used meta-analysis to test the network degeneration hypothesis (NDH (Seeley et al., 2009 by identifying structural and functional covariance in this hippocampal network. Methods: To generate our network model, we used BrainMap's VBM database to perform a region-to-whole-brain (RtWB meta-analysis of 269 VBM experiments from 165 published studies across a range of 38 psychiatric and neurological diseases reporting hippocampal gray matter density alterations. This step identified 11 significant gray matter foci, or nodes. We subsequently used meta-analytic connectivity modeling (MACM to define edges of structural covariance between nodes from VBM data as well as functional covariance using the functional task-activation database, also from BrainMap. Finally, we applied a correlation analysis using Pearson's r to assess the similarities and differences between the structural and functional covariance models. Key findings: Our hippocampal RtWB meta-analysis reported consistent and significant structural covariance in 11 key regions. The subsequent structural and functional MACMs showed a strong correlation between HNM nodes with a significant structural-functional covariance correlation of r = .377 (p = .000049. Significance: This novel method of studying network covariance using VBM and functional meta-analytic techniques allows for the identification of generalizable patterns of functional and structural abnormalities pertaining to the hippocampus. In accordance with the NDH, this framework could have major implications in studying and predicting spatial disease patterns using network-based assays. Keywords: Anatomic likelihood estimation, ALE, BrainMap, Functional

  7. Copula-based modeling of degree-correlated networks

    International Nuclear Information System (INIS)

    Raschke, Mathias; Schläpfer, Markus; Trantopoulos, Konstantinos

    2014-01-01

    Dynamical processes on complex networks such as information exchange, innovation diffusion, cascades in financial networks or epidemic spreading are highly affected by their underlying topologies as characterized by, for instance, degree–degree correlations. Here, we introduce the concept of copulas in order to generate random networks with an arbitrary degree distribution and a rich a priori degree–degree correlation (or ‘association’) structure. The accuracy of the proposed formalism and corresponding algorithm is numerically confirmed, while the method is tested on a real-world network of yeast protein–protein interactions. The derived network ensembles can be systematically deployed as proper null models, in order to unfold the complex interplay between the topology of real-world networks and the dynamics on top of them. (paper)

  8. Modelling of the PROTO-II crossover network

    International Nuclear Information System (INIS)

    Proulx, G.A.; Lackner, H.; Spence, P.; Wright, T.P.

    1985-01-01

    In order to drive a double ring, symmetrically fed bremsstrahlung diode, the PROTO II accelerator was redesigned. The radially converging triplate water line was reconfigured to drive two radial converging triplate lines in parallel. The four output lines were connected to the two input lines via an electrically enclosed tubular crossover network. Low-voltage Time Domain Reflectrometry (TDR) experiments were conducted on a full scale water immersed model of one section of the crossover network as an aid in this design. A lumped element analysis of the power flow through the network was inadequate in explaining the observed wave transmission and reflection characteristics. A more detailed analysis was performed with a circuit code in which we considered both localized lump-element and transmission line features of the crossover network. Experimental results of the model tests are given and compared with the circuit simulations. 7 figs

  9. Dynamic Modeling of Cell-Free Biochemical Networks Using Effective Kinetic Models

    Directory of Open Access Journals (Sweden)

    Joseph A. Wayman

    2015-03-01

    Full Text Available Cell-free systems offer many advantages for the study, manipulation and modeling of metabolism compared to in vivo processes. Many of the challenges confronting genome-scale kinetic modeling can potentially be overcome in a cell-free system. For example, there is no complex transcriptional regulation to consider, transient metabolic measurements are easier to obtain, and we no longer have to consider cell growth. Thus, cell-free operation holds several significant advantages for model development, identification and validation. Theoretically, genome-scale cell-free kinetic models may be possible for industrially important organisms, such as E. coli, if a simple, tractable framework for integrating allosteric regulation with enzyme kinetics can be formulated. Toward this unmet need, we present an effective biochemical network modeling framework for building dynamic cell-free metabolic models. The key innovation of our approach is the integration of simple effective rules encoding complex allosteric regulation with traditional kinetic pathway modeling. We tested our approach by modeling the time evolution of several hypothetical cell-free metabolic networks. We found that simple effective rules, when integrated with traditional enzyme kinetic expressions, captured complex allosteric patterns such as ultrasensitivity or non-competitive inhibition in the absence of mechanistic information. Second, when integrated into network models, these rules captured classic regulatory patterns such as product-induced feedback inhibition. Lastly, we showed, at least for the network architectures considered here, that we could simultaneously estimate kinetic parameters and allosteric connectivity from synthetic data starting from an unbiased collection of possible allosteric structures using particle swarm optimization. However, when starting with an initial population that was heavily enriched with incorrect structures, our particle swarm approach could converge

  10. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  11. A network of networks model to study phase synchronization using structural connection matrix of human brain

    Science.gov (United States)

    Ferrari, F. A. S.; Viana, R. L.; Reis, A. S.; Iarosz, K. C.; Caldas, I. L.; Batista, A. M.

    2018-04-01

    The cerebral cortex plays a key role in complex cortical functions. It can be divided into areas according to their function (motor, sensory and association areas). In this paper, the cerebral cortex is described as a network of networks (cortex network), we consider that each cortical area is composed of a network with small-world property (cortical network). The neurons are assumed to have bursting properties with the dynamics described by the Rulkov model. We study the phase synchronization of the cortex network and the cortical networks. In our simulations, we verify that synchronization in cortex network is not homogeneous. Besides, we focus on the suppression of neural phase synchronization. Synchronization can be related to undesired and pathological abnormal rhythms in the brain. For this reason, we consider the delayed feedback control to suppress the synchronization. We show that delayed feedback control is efficient to suppress synchronous behavior in our network model when an appropriate signal intensity and time delay are defined.

  12. Network modelling of fluid retention behaviour in unsaturated soils

    Directory of Open Access Journals (Sweden)

    Athanasiadis Ignatios

    2016-01-01

    Full Text Available The paper describes discrete modelling of the retention behaviour of unsaturated porous materials. A network approach is used within a statistical volume element (SVE, suitable for subsequent use in hydro-mechanical analysis and incorporation within multi-scale numerical modelling. The soil pore structure is modelled by a network of cylindrical pipes connecting spheres, with the spheres representing soil voids and the pipes representing inter-connecting throats. The locations of pipes and spheres are determined by a Voronoi tessellation of the domain. Original aspects of the modelling include a form of periodic boundary condition implementation applied for the first time to this type of network, a new pore volume scaling technique to provide more realistic modelling and a new procedure for initiating drying or wetting paths in a network model employing periodic boundary conditions. Model simulations, employing two linear cumulative probability distributions to represent the distributions of sphere and pipe radii, are presented for the retention behaviour reported from a mercury porosimetry test on a sandstone.

  13. A model for evolution of overlapping community networks

    Science.gov (United States)

    Karan, Rituraj; Biswal, Bibhu

    2017-05-01

    A model is proposed for the evolution of network topology in social networks with overlapping community structure. Starting from an initial community structure that is defined in terms of group affiliations, the model postulates that the subsequent growth and loss of connections is similar to the Hebbian learning and unlearning in the brain and is governed by two dominant factors: the strength and frequency of interaction between the members, and the degree of overlap between different communities. The temporal evolution from an initial community structure to the current network topology can be described based on these two parameters. It is possible to quantify the growth occurred so far and predict the final stationary state to which the network is likely to evolve. Applications in epidemiology or the spread of email virus in a computer network as well as finding specific target nodes to control it are envisaged. While facing the challenge of collecting and analyzing large-scale time-resolved data on social groups and communities one faces the most basic questions: how do communities evolve in time? This work aims to address this issue by developing a mathematical model for the evolution of community networks and studying it through computer simulation.

  14. A large deformation viscoelastic model for double-network hydrogels

    Science.gov (United States)

    Mao, Yunwei; Lin, Shaoting; Zhao, Xuanhe; Anand, Lallit

    2017-03-01

    We present a large deformation viscoelasticity model for recently synthesized double network hydrogels which consist of a covalently-crosslinked polyacrylamide network with long chains, and an ionically-crosslinked alginate network with short chains. Such double-network gels are highly stretchable and at the same time tough, because when stretched the crosslinks in the ionically-crosslinked alginate network rupture which results in distributed internal microdamage which dissipates a substantial amount of energy, while the configurational entropy of the covalently-crosslinked polyacrylamide network allows the gel to return to its original configuration after deformation. In addition to the large hysteresis during loading and unloading, these double network hydrogels also exhibit a substantial rate-sensitive response during loading, but exhibit almost no rate-sensitivity during unloading. These features of large hysteresis and asymmetric rate-sensitivity are quite different from the response of conventional hydrogels. We limit our attention to modeling the complex viscoelastic response of such hydrogels under isothermal conditions. Our model is restricted in the sense that we have limited our attention to conditions under which one might neglect any diffusion of the water in the hydrogel - as might occur when the gel has a uniform initial value of the concentration of water, and the mobility of the water molecules in the gel is low relative to the time scale of the mechanical deformation. We also do not attempt to model the final fracture of such double-network hydrogels.

  15. A Network Model of Interpersonal Alignment in Dialog

    Directory of Open Access Journals (Sweden)

    Alexander Mehler

    2010-06-01

    Full Text Available In dyadic communication, both interlocutors adapt to each other linguistically, that is, they align interpersonally. In this article, we develop a framework for modeling interpersonal alignment in terms of the structural similarity of the interlocutors’ dialog lexica. This is done by means of so-called two-layer time-aligned network series, that is, a time-adjusted graph model. The graph model is partitioned into two layers, so that the interlocutors’ lexica are captured as subgraphs of an encompassing dialog graph. Each constituent network of the series is updated utterance-wise. Thus, both the inherent bipartition of dyadic conversations and their gradual development are modeled. The notion of alignment is then operationalized within a quantitative model of structure formation based on the mutual information of the subgraphs that represent the interlocutor’s dialog lexica. By adapting and further developing several models of complex network theory, we show that dialog lexica evolve as a novel class of graphs that have not been considered before in the area of complex (linguistic networks. Additionally, we show that our framework allows for classifying dialogs according to their alignment status. To the best of our knowledge, this is the first approach to measuring alignment in communication that explores the similarities of graph-like cognitive representations.

  16. Energy model for rumor propagation on social networks

    Science.gov (United States)

    Han, Shuo; Zhuang, Fuzhen; He, Qing; Shi, Zhongzhi; Ao, Xiang

    2014-01-01

    With the development of social networks, the impact of rumor propagation on human lives is more and more significant. Due to the change of propagation mode, traditional rumor propagation models designed for word-of-mouth process may not be suitable for describing the rumor spreading on social networks. To overcome this shortcoming, we carefully analyze the mechanisms of rumor propagation and the topological properties of large-scale social networks, then propose a novel model based on the physical theory. In this model, heat energy calculation formula and Metropolis rule are introduced to formalize this problem and the amount of heat energy is used to measure a rumor’s impact on a network. Finally, we conduct track experiments to show the evolution of rumor propagation, make comparison experiments to contrast the proposed model with the traditional models, and perform simulation experiments to study the dynamics of rumor spreading. The experiments show that (1) the rumor propagation simulated by our model goes through three stages: rapid growth, fluctuant persistence and slow decline; (2) individuals could spread a rumor repeatedly, which leads to the rumor’s resurgence; (3) rumor propagation is greatly influenced by a rumor’s attraction, the initial rumormonger and the sending probability.

  17. GraphCrunch 2: Software tool for network modeling, alignment and clustering.

    Science.gov (United States)

    Kuchaiev, Oleksii; Stevanović, Aleksandar; Hayes, Wayne; Pržulj, Nataša

    2011-01-19

    Recent advancements in experimental biotechnology have produced large amounts of protein-protein interaction (PPI) data. The topology of PPI networks is believed to have a strong link to their function. Hence, the abundance of PPI data for many organisms stimulates the development of computational techniques for the modeling, comparison, alignment, and clustering of networks. In addition, finding representative models for PPI networks will improve our understanding of the cell just as a model of gravity has helped us understand planetary motion. To decide if a model is representative, we need quantitative comparisons of model networks to real ones. However, exact network comparison is computationally intractable and therefore several heuristics have been used instead. Some of these heuristics are easily computable "network properties," such as the degree distribution, or the clustering coefficient. An important special case of network comparison is the network alignment problem. Analogous to sequence alignment, this problem asks to find the "best" mapping between regions in two networks. It is expected that network alignment might have as strong an impact on our understanding of biology as sequence alignment has had. Topology-based clustering of nodes in PPI networks is another example of an important network analysis problem that can uncover relationships between interaction patterns and phenotype. We introduce the GraphCrunch 2 software tool, which addresses these problems. It is a significant extension of GraphCrunch which implements the most popular random network models and compares them with the data networks with respect to many network properties. Also, GraphCrunch 2 implements the GRAph ALigner algorithm ("GRAAL") for purely topological network alignment. GRAAL can align any pair of networks and exposes large, dense, contiguous regions of topological and functional similarities far larger than any other existing tool. Finally, GraphCruch 2 implements an

  18. GraphCrunch 2: Software tool for network modeling, alignment and clustering

    Directory of Open Access Journals (Sweden)

    Hayes Wayne

    2011-01-01

    Full Text Available Abstract Background Recent advancements in experimental biotechnology have produced large amounts of protein-protein interaction (PPI data. The topology of PPI networks is believed to have a strong link to their function. Hence, the abundance of PPI data for many organisms stimulates the development of computational techniques for the modeling, comparison, alignment, and clustering of networks. In addition, finding representative models for PPI networks will improve our understanding of the cell just as a model of gravity has helped us understand planetary motion. To decide if a model is representative, we need quantitative comparisons of model networks to real ones. However, exact network comparison is computationally intractable and therefore several heuristics have been used instead. Some of these heuristics are easily computable "network properties," such as the degree distribution, or the clustering coefficient. An important special case of network comparison is the network alignment problem. Analogous to sequence alignment, this problem asks to find the "best" mapping between regions in two networks. It is expected that network alignment might have as strong an impact on our understanding of biology as sequence alignment has had. Topology-based clustering of nodes in PPI networks is another example of an important network analysis problem that can uncover relationships between interaction patterns and phenotype. Results We introduce the GraphCrunch 2 software tool, which addresses these problems. It is a significant extension of GraphCrunch which implements the most popular random network models and compares them with the data networks with respect to many network properties. Also, GraphCrunch 2 implements the GRAph ALigner algorithm ("GRAAL" for purely topological network alignment. GRAAL can align any pair of networks and exposes large, dense, contiguous regions of topological and functional similarities far larger than any other

  19. Queueing Models for Mobile Ad Hoc Networks

    NARCIS (Netherlands)

    de Haan, Roland

    2009-01-01

    This thesis presents models for the performance analysis of a recent communication paradigm: \\emph{mobile ad hoc networking}. The objective of mobile ad hoc networking is to provide wireless connectivity between stations in a highly dynamic environment. These dynamics are driven by the mobility of

  20. A Mathematical Model to Improve the Performance of Logistics Network

    Directory of Open Access Journals (Sweden)

    Muhammad Izman Herdiansyah

    2012-01-01

    Full Text Available The role of logistics nowadays is expanding from just providing transportation and warehousing to offering total integrated logistics. To remain competitive in the global market environment, business enterprises need to improve their logistics operations performance. The improvement will be achieved when we can provide a comprehensive analysis and optimize its network performances. In this paper, a mixed integer linier model for optimizing logistics network performance is developed. It provides a single-product multi-period multi-facilities model, as well as the multi-product concept. The problem is modeled in form of a network flow problem with the main objective to minimize total logistics cost. The problem can be solved using commercial linear programming package like CPLEX or LINDO. Even in small case, the solver in Excel may also be used to solve such model.Keywords: logistics network, integrated model, mathematical programming, network optimization