WorldWideScience

Sample records for layered niche networks

  1. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause....../receive interference. The way to deal with this problem in distributed wireless networks is usage of MAC-layer mechanisms that make a spatial reservation of the shared wireless medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In this paper, we investigate two-way relaying in presence...

  2. Physical layer network coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Popovski, Petar; Yomo, Hiroyuki

    2014-01-01

    Physical layer network coding (PLNC) has been proposed to improve throughput of the two-way relay channel, where two nodes communicate with each other, being assisted by a relay node. Most of the works related to PLNC are focused on a simple three-node model and they do not take into account...

  3. Detecting spatial ontogenetic niche shifts in complex dendritic ecological networks

    Science.gov (United States)

    Fields, William R.; Grant, Evan; Lowe, Winsor H.

    2017-01-01

    Ontogenetic niche shifts (ONS) are important drivers of population and community dynamics, but they can be difficult to identify for species with prolonged larval or juvenile stages, or for species that inhabit continuous habitats. Most studies of ONS focus on single transitions among discrete habitat patches at local scales. However, for species with long larval or juvenile periods, affinity for particular locations within connected habitat networks may differ among cohorts. The resulting spatial patterns of distribution can result from a combination of landscape-scale habitat structure, position of a habitat patch within a network, and local habitat characteristics—all of which may interact and change as individuals grow. We estimated such spatial ONS for spring salamanders (Gyrinophilus porphyriticus), which have a larval period that can last 4 years or more. Using mixture models to identify larval cohorts from size frequency data, we fit occupancy models for each age class using two measures of the branching structure of stream networks and three measures of stream network position. Larval salamander cohorts showed different preferences for the position of a site within the stream network, and the strength of these responses depended on the basin-wide spatial structure of the stream network. The isolation of a site had a stronger effect on occupancy in watersheds with more isolated headwater streams, while the catchment area, which is associated with gradients in stream habitat, had a stronger effect on occupancy in watersheds with more paired headwater streams. Our results show that considering the spatial structure of habitat networks can provide new insights on ONS in long-lived species.

  4. Microcosms metacommunities in river network: niche effects and biodiversity

    Science.gov (United States)

    Giometto, A.; Carrara, F.; Altermatt, F.; Rinaldo, A.

    2012-04-01

    Many highly diverse landscapes exhibit hierarchical spatial structures that are shaped by geomorphological processes. Riverine ecosystems, among the most diverse habitats on Earth, represent an outstanding example of such mechanisms. In these landscapes, in which connectivity directly influences metacommunity processes, habitat capacity contributes to control biodiversity at several levels. A previous study has already highlighted the effect of connectivity on species distribution at local and regional scales, but habitat capacity was kept uniform. We studied the interaction of connectivity and habitat capacity in an aquatic microcosm experiment, in which microbial communities were grown in 36-well culture plates connected by dispersal. Dispersal occurred by periodic transfer of culture medium among connected local communities, following river network topology. The effect of habitat capacity in these landscapes was investigated by comparing three different spatial configurations of local community volumes: 1. Power law distributed volumes, according to drainage area. 2. Spatial random permutation of the volumes in the above configuration. 3. Equal distribution of volumes (preserving the total volume with respect to the above configurations). The net effect of habitat capacity on community composition was isolated in a control treatment in which communities were kept isolated for the whole duration of the experiment. In all treatments we observed that varying volumes induced niche effects: some protozoan species preferentially occupied larger nodes (systematically in isolation). Nevertheless, there is evidence that position along the network played a significant role in shaping biodiversity patterns. Size distribution measurements for each community were taken with a CASY cell counter, and species abundances data on log scale precision were collected by direct microscope observation.

  5. Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm

    Institute of Scientific and Technical Information of China (English)

    Zu Yun-Xiao; Zhou Jie

    2012-01-01

    Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm is proposed,and a fitness function is provided.Simulations are conducted using the adaptive niche immune genetic algorithm,the simulated annealing algorithm,the quantum genetic algorithm and the simple genetic algorithm,respectively.The results show that the adaptive niche immune genetic algorithm performs better than the other three algorithms in terms of the multi-user cognitive radio network resource allocation,and has quick convergence speed and strong global searching capability,which effectively reduces the system power consumption and bit error rate.

  6. Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm

    Science.gov (United States)

    Zu, Yun-Xiao; Zhou, Jie

    2012-01-01

    Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm is proposed, and a fitness function is provided. Simulations are conducted using the adaptive niche immune genetic algorithm, the simulated annealing algorithm, the quantum genetic algorithm and the simple genetic algorithm, respectively. The results show that the adaptive niche immune genetic algorithm performs better than the other three algorithms in terms of the multi-user cognitive radio network resource allocation, and has quick convergence speed and strong global searching capability, which effectively reduces the system power consumption and bit error rate.

  7. Engineering interpenetrating network hydrogels as biomimetic cell niche with independently tunable biochemical and mechanical properties.

    Science.gov (United States)

    Tong, Xinming; Yang, Fan

    2014-02-01

    Hydrogels have been widely used as artificial cell niche to mimic extracellular matrix with tunable properties. However, changing biochemical cues in hydrogels developed-to-date would often induce simultaneous changes in mechanical properties, which do not support mechanistic studies on stem cell-niche interactions. Here we report the development of a PEG-based interpenetrating network (IPN), which is composed of two polymer networks that can independently and simultaneously crosslink to form hydrogels in a cell-friendly manner. The resulting IPN hydrogel allows independently tunable biochemical and mechanical properties, as well as stable and more homogeneous presentation of biochemical ligands in 3D than currently available methods. We demonstrate the potential of our IPN platform for elucidating stem cell-niche interactions by modulating osteogenic differentiation of human adipose-derived stem cells. The versatility of such IPN hydrogels is further demonstrated using three distinct and widely used polymers to form the mechanical network while keeping the biochemical network constant.

  8. Extended evolution: A conceptual framework for integrating regulatory networks and niche construction.

    Science.gov (United States)

    Laubichler, Manfred D; Renn, Jürgen

    2015-11-01

    This paper introduces a conceptual framework for the evolution of complex systems based on the integration of regulatory network and niche construction theories. It is designed to apply equally to cases of biological, social and cultural evolution. Within the conceptual framework we focus especially on the transformation of complex networks through the linked processes of externalization and internalization of causal factors between regulatory networks and their corresponding niches and argue that these are an important part of evolutionary explanations. This conceptual framework extends previous evolutionary models and focuses on several challenges, such as the path-dependent nature of evolutionary change, the dynamics of evolutionary innovation and the expansion of inheritance systems.

  9. Survivability in Layered Networks

    Science.gov (United States)

    2011-02-01

    Waterloo, Waterloo, ON, 1985. [25] Guo- Ray Cai and Yu-Geng Sun. The minimum augmentation of any graph to a k-edge-connected graph. Networks, 19(1):151...December 1989. [54] J. Hastad. Clique is hard to approximate within n(-). Acta Math., 182:105- 142, 1999. 198 [55] Tsan-Sheng Hsu, Torsten Suel, Roberto

  10. Rainwater Harvesting and Social Networks: Visualising Interactions for Niche Governance, Resilience and Sustainability

    Directory of Open Access Journals (Sweden)

    Sarah Ward

    2016-11-01

    Full Text Available Visualising interactions across urban water systems to explore transition and change processes requires the development of methods and models at different scales. This paper contributes a model representing the network interactions of rainwater harvesting (RWH infrastructure innovators and other organisations in the UK RWH niche to identify how resilience and sustainability feature within niche governance in practice. The RWH network interaction model was constructed using a modified participatory social network analysis (SNA. The SNA was further analysed through the application of a two-part analytical framework based on niche management and the safe, resilient and sustainable (‘Safe and SuRe’ framework. Weak interactions between some RWH infrastructure innovators and other organisations highlighted reliance on a limited number of persuaders to influence the regime and landscape, which were underrepresented. Features from niche creation and management were exhibited by the RWH network interaction model, though some observed characteristics were not represented. Additional Safe and SuRe features were identified covering diverse innovation, responsivity, no protection, unconverged expectations, primary influencers, polycentric or adaptive governance and multiple learning-types. These features enable RWH infrastructure innovators and other organisations to reflect on improving resilience and sustainability, though further research in other sectors would be useful to verify and validate observation of the seven features.

  11. The Networks and Niches of International Political Economy

    DEFF Research Database (Denmark)

    Seabrooke, Leonard; Young, Kevin L.

    2017-01-01

    We analyze the organizational logics of how social clustering operates within International Political Economy (IPE). Using a variety of new data on IPE publishing, teaching, and conference attendance, we use network analysis and community detection to understand social clustering within the field...

  12. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    Directory of Open Access Journals (Sweden)

    Salvador Climent

    2014-01-01

    Full Text Available This survey aims to provide a comprehensive overview of the current researchon underwater wireless sensor networks, focusing on the lower layers of the communicationstack, and envisions future trends and challenges. It analyzes the current state-of-the-art onthe physical, medium access control and routing layers. It summarizes their security threadsand surveys the currently proposed studies. Current envisioned niches for further advances inunderwater networks research range from efficient, low-power algorithms and

  13. Cross-layer design in optical networks

    CERN Document Server

    Brandt-Pearce, Maïté; Demeester, Piet; Saradhi, Chava

    2013-01-01

    Optical networks have become an integral part of the communications infrastructure needed to support society’s demand for high-speed connectivity.  Cross-Layer Design in Optical Networks addresses topics in optical network design and analysis with a focus on physical-layer impairment awareness and network layer service requirements, essential for the implementation and management of robust scalable networks.  The cross-layer treatment includes bottom-up impacts of the physical and lambda layers, such as dispersion, noise, nonlinearity, crosstalk, dense wavelength packing, and wavelength line rates, as well as top-down approaches to handle physical-layer impairments and service requirements.

  14. Network Composition from Multi-layer Data

    CERN Document Server

    Lerman, Kristina; Yan, Xiaoran

    2016-01-01

    It is common for people to access multiple social networks, for example, using phone, email, and social media. Together, the multi-layer social interactions form a "integrated social network." How can we extend well developed knowledge about single-layer networks, including vertex centrality and community structure, to such heterogeneous structures? In this paper, we approach these challenges by proposing a principled framework of network composition based on a unified dynamical process. Mathematically, we consider the following abstract problem: Given multi-layer network data and additional parameters for intra and inter-layer dynamics, construct a (single) weighted network that best integrates the joint process. We use transformations of dynamics to unify heterogeneous layers under a common dynamics. For inter-layer compositions, we will consider several cases as the inter-layer dynamics plays different roles in various social or technological networks. Empirically, we provide examples to highlight the usef...

  15. Sparse coding for layered neural networks

    Science.gov (United States)

    Katayama, Katsuki; Sakata, Yasuo; Horiguchi, Tsuyoshi

    2002-07-01

    We investigate storage capacity of two types of fully connected layered neural networks with sparse coding when binary patterns are embedded into the networks by a Hebbian learning rule. One of them is a layered network, in which a transfer function of even layers is different from that of odd layers. The other is a layered network with intra-layer connections, in which the transfer function of inter-layer is different from that of intra-layer, and inter-layered neurons and intra-layered neurons are updated alternately. We derive recursion relations for order parameters by means of the signal-to-noise ratio method, and then apply the self-control threshold method proposed by Dominguez and Bollé to both layered networks with monotonic transfer functions. We find that a critical value αC of storage capacity is about 0.11|a ln a| -1 ( a≪1) for both layered networks, where a is a neuronal activity. It turns out that the basin of attraction is larger for both layered networks when the self-control threshold method is applied.

  16. Niche-dependent development of functional neuronal networks from embryonic stem cell-derived neural populations

    Directory of Open Access Journals (Sweden)

    Siebler Mario

    2009-08-01

    Full Text Available Abstract Background The present work was performed to investigate the ability of two different embryonic stem (ES cell-derived neural precursor populations to generate functional neuronal networks in vitro. The first ES cell-derived neural precursor population was cultivated as free-floating neural aggregates which are known to form a developmental niche comprising different types of neural cells, including neural precursor cells (NPCs, progenitor cells and even further matured cells. This niche provides by itself a variety of different growth factors and extracellular matrix proteins that influence the proliferation and differentiation of neural precursor and progenitor cells. The second population was cultivated adherently in monolayer cultures to control most stringently the extracellular environment. This population comprises highly homogeneous NPCs which are supposed to represent an attractive way to provide well-defined neuronal progeny. However, the ability of these different ES cell-derived immature neural cell populations to generate functional neuronal networks has not been assessed so far. Results While both precursor populations were shown to differentiate into sufficient quantities of mature NeuN+ neurons that also express GABA or vesicular-glutamate-transporter-2 (vGlut2, only aggregate-derived neuronal populations exhibited a synchronously oscillating network activity 2–4 weeks after initiating the differentiation as detected by the microelectrode array technology. Neurons derived from homogeneous NPCs within monolayer cultures did merely show uncorrelated spiking activity even when differentiated for up to 12 weeks. We demonstrated that these neurons exhibited sparsely ramified neurites and an embryonic vGlut2 distribution suggesting an inhibited terminal neuronal maturation. In comparison, neurons derived from heterogeneous populations within neural aggregates appeared as fully mature with a dense neurite network and punctuated

  17. Mathematical Formulation of Multi-Layer Networks

    CERN Document Server

    De Domenico, Manlio; Cozzo, Emanuele; Kivelä, Mikko; Moreno, Yamir; Porter, Mason A; Gòmez, Sergio; Arenas, Alex

    2013-01-01

    A network representation is useful for describing the structure of a large variety of complex systems. However, most real and engineered systems have multiple subsystems and layers of connectivity, and the data produced by such systems is very rich. Achieving a deep understanding of such systems necessitates generalizing "traditional" network theory, and the newfound deluge of data now makes it possible to test increasingly general frameworks for the study of networks. In particular, although adjacency matrices are useful to describe traditional single-layer networks, such a representation is insufficient for the analysis and description of multiplex and time-dependent networks. One must therefore develop a more general mathematical framework to cope with the challenges posed by multi-layer complex systems. In this paper, we introduce a tensorial framework to study multi-layer networks, and we discuss the generalization of several important network descriptors and dynamical processes ---including degree centr...

  18. Inter-layer synchronization in multiplex networks of identical layers

    Energy Technology Data Exchange (ETDEWEB)

    Sevilla-Escoboza, R. [Centro Universitario de los Lagos, Universidad de Guadalajara, Jalisco 47460 (Mexico); Sendiña-Nadal, I.; Leyva, I.; Buldú, J. M. [Complex Systems Group & GISC, Universidad Rey Juan Carlos, 28933 Móstoles, Madrid (Spain); Center for Biomedical Technology, Universidad Politécnica de Madrid, 28223 Pozuelo de Alarcón, Madrid (Spain); Gutiérrez, R. [School of Physics and Astronomy, University of Nottingham, Nottingham NG7 2RD (United Kingdom); Boccaletti, S. [CNR-Institute of Complex Systems, Via Madonna del Piano, 10, 50019 Sesto Fiorentino, Florence (Italy); The Italian Embassy in Israel, 25 Hamered st., 68125 Tel Aviv (Israel)

    2016-06-15

    Inter-layer synchronization is a distinctive process of multiplex networks whereby each node in a given layer evolves synchronously with all its replicas in other layers, irrespective of whether or not it is synchronized with the other units of the same layer. We analytically derive the necessary conditions for the existence and stability of such a state, and verify numerically the analytical predictions in several cases where such a state emerges. We further inspect its robustness against a progressive de-multiplexing of the network, and provide experimental evidence by means of multiplexes of nonlinear electronic circuits affected by intrinsic noise and parameter mismatch.

  19. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  20. Interactions between Niche and Regime: An Analysis of Learning and Innovation Networks for Sustainable Agriculture across Europe

    Science.gov (United States)

    Ingram, Julie; Maye, Damian; Kirwan, James; Curry, Nigel; Kubinakova, Katarina

    2015-01-01

    Purpose: This paper aims to reveal, and contribute to an understanding of, the processes that connect learning and innovation networks in sustainable agriculture to elements of the mainstream agricultural regime. Drawing on the innovations and transition literature, the paper frames the analysis around niche-regime interaction using the notion of…

  1. Synchronization in networks with multiple interaction layers

    CERN Document Server

    del Genio, Charo I; Bonamassa, Ivan; Boccaletti, Stefano

    2016-01-01

    The structure of many real-world systems is best captured by networks consisting of several interaction layers. Understanding how a multi-layered structure of connections affects the synchronization properties of dynamical systems evolving on top of it is a highly relevant endeavour in mathematics and physics, and has potential applications to several societally relevant topics, such as power grids engineering and neural dynamics. We propose a general framework to assess stability of the synchronized state in networks with multiple interaction layers, deriving a necessary condition that generalizes the Master Stability Function approach. We validate our method applying it to a network of R\\"ossler oscillators with a double layer of interactions, and show that highly rich phenomenology emerges. This includes cases where the stability of synchronization can be induced even if both layers would have individually induced unstable synchrony, an effect genuinely due to the true multi-layer structure of the interact...

  2. Layer-layer competition in multiplex complex networks

    CERN Document Server

    Gómez-Gardeñes, Jesús; Gutiérrez, Gerardo; Arenas, Alex; Gómez, Sergio

    2015-01-01

    The coexistence of multiple types of interactions within social, technological and biological networks has moved the focus of the physics of complex systems towards a multiplex description of the interactions between their constituents. This novel approach has unveiled that the multiplex nature of complex systems has strong influence in the emergence of collective states and their critical properties. Here we address an important issue that is intrinsic to the coexistence of multiple means of interactions within a network: their competition. To this aim, we study a two-layer multiplex in which the activity of users can be localized in each of the layer or shared between them, favoring that neighboring nodes within a layer focus their activity on the same layer. This framework mimics the coexistence and competition of multiple communication channels, in a way that the prevalence of a particular communication platform emerges as a result of the localization of users activity in one single interaction layer. Our...

  3. Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers.

    Science.gov (United States)

    Climent, Salvador; Sanchez, Antonio; Capella, Juan Vicente; Meratnia, Nirvana; Serrano, Juan Jose

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control and routing layers. It summarizes their security threads and surveys the currently proposed studies. Current envisioned niches for further advances in underwater networks research range from efficient, low-power algorithms and modulations to intelligent, energy-aware routing and medium access control protocols.

  4. Wireless Network Coding with Local Network Views: Coded Layer Scheduling

    CERN Document Server

    Vahid, Alireza; Avestimehr, A Salman; Sabharwal, Ashutosh

    2011-01-01

    One of the fundamental challenges in the design of distributed wireless networks is the large dynamic range of network state. Since continuous tracking of global network state at all nodes is practically impossible, nodes can only acquire limited local views of the whole network to design their transmission strategies. In this paper, we study multi-layer wireless networks and assume that each node has only a limited knowledge, namely 1-local view, where each S-D pair has enough information to perform optimally when other pairs do not interfere, along with connectivity information for rest of the network. We investigate the information-theoretic limits of communication with such limited knowledge at the nodes. We develop a novel transmission strategy, namely Coded Layer Scheduling, that solely relies on 1-local view at the nodes and incorporates three different techniques: (1) per layer interference avoidance, (2) repetition coding to allow overhearing of the interference, and (3) network coding to allow inter...

  5. Degree-layer theory of network topology

    CERN Document Server

    Zhou, Bin; Zhe, He

    2014-01-01

    The network topology can be described by the number of nodes and the interconnections among them. The degree of a node in a network is the number of connections it has to other nodes and the degree distribution is the probability distribution of these degrees over the whole network. Therefore, the degree is very important structural parameter of network topology. However, given the number of nodes and the degree of each node in a network, the topology of the network cannot be determined. Therefore, we propose the degree-layer theory of network topology to describe deeply the network topology. First, we propose the concept of degree-tree with the breadth-first search tree. The degrees of all nodes are layered and have a hierarchical structure. Second,the degree-layer theory is described in detail. Two new concepts are defined in the theory. An index is proposed to quantitatively distinguish the two network topologies. It also can quantitatively measure the stability of network topology built by a model mechani...

  6. Genetic basis for developmental homeostasis of germline stem cell niche number: a network of Tramtrack-Group nuclear BTB factors.

    Directory of Open Access Journals (Sweden)

    Mathieu Bartoletti

    Full Text Available The potential to produce new cells during adult life depends on the number of stem cell niches and the capacity of stem cells to divide, and is therefore under the control of programs ensuring developmental homeostasis. However, it remains generally unknown how the number of stem cell niches is controlled. In the insect ovary, each germline stem cell (GSC niche is embedded in a functional unit called an ovariole. The number of ovarioles, and thus the number of GSC niches, varies widely among species. In Drosophila, morphogenesis of ovarioles starts in larvae with the formation of terminal filaments (TFs, each made of 8-10 cells that pile up and sort in stacks. TFs constitute organizers of individual germline stem cell niches during larval and early pupal development. In the Drosophila melanogaster subgroup, the number of ovarioles varies interspecifically from 8 to 20. Here we show that pipsqueak, Trithorax-like, batman and the bric-à-brac (bab locus, all encoding nuclear BTB/POZ factors of the Tramtrack Group, are involved in limiting the number of ovarioles in D. melanogaster. At least two different processes are differentially perturbed by reducing the function of these genes. We found that when the bab dose is reduced, sorting of TF cells into TFs was affected such that each TF contains fewer cells and more TFs are formed. In contrast, psq mutants exhibited a greater number of TF cells per ovary, with a normal number of cells per TF, thereby leading to formation of more TFs per ovary than in the wild type. Our results indicate that two parallel genetic pathways under the control of a network of nuclear BTB factors are combined in order to negatively control the number of germline stem cell niches.

  7. Genetic basis for developmental homeostasis of germline stem cell niche number: a network of Tramtrack-Group nuclear BTB factors.

    Science.gov (United States)

    Bartoletti, Mathieu; Rubin, Thomas; Chalvet, Fabienne; Netter, Sophie; Dos Santos, Nicolas; Poisot, Emilie; Paces-Fessy, Mélanie; Cumenal, Delphine; Peronnet, Frédérique; Pret, Anne-Marie; Théodore, Laurent

    2012-01-01

    The potential to produce new cells during adult life depends on the number of stem cell niches and the capacity of stem cells to divide, and is therefore under the control of programs ensuring developmental homeostasis. However, it remains generally unknown how the number of stem cell niches is controlled. In the insect ovary, each germline stem cell (GSC) niche is embedded in a functional unit called an ovariole. The number of ovarioles, and thus the number of GSC niches, varies widely among species. In Drosophila, morphogenesis of ovarioles starts in larvae with the formation of terminal filaments (TFs), each made of 8-10 cells that pile up and sort in stacks. TFs constitute organizers of individual germline stem cell niches during larval and early pupal development. In the Drosophila melanogaster subgroup, the number of ovarioles varies interspecifically from 8 to 20. Here we show that pipsqueak, Trithorax-like, batman and the bric-à-brac (bab) locus, all encoding nuclear BTB/POZ factors of the Tramtrack Group, are involved in limiting the number of ovarioles in D. melanogaster. At least two different processes are differentially perturbed by reducing the function of these genes. We found that when the bab dose is reduced, sorting of TF cells into TFs was affected such that each TF contains fewer cells and more TFs are formed. In contrast, psq mutants exhibited a greater number of TF cells per ovary, with a normal number of cells per TF, thereby leading to formation of more TFs per ovary than in the wild type. Our results indicate that two parallel genetic pathways under the control of a network of nuclear BTB factors are combined in order to negatively control the number of germline stem cell niches.

  8. Modeling MAC layer for powerline communications networks

    Science.gov (United States)

    Hrasnica, Halid; Haidine, Abdelfatteh

    2001-02-01

    The usage of electrical power distribution networks for voice and data transmission, called Powerline Communications, becomes nowadays more and more attractive, particularly in the telecommunication access area. The most important reasons for that are the deregulation of the telecommunication market and a fact that the access networks are still property of former monopolistic companies. In this work, first we analyze a PLC network and system structure as well as a disturbance scenario in powerline networks. After that, we define a logical structure of the powerline MAC layer and propose the reservation MAC protocols for the usage in the PLC network which provides collision free data transmission. This makes possible better network utilization and realization of QoS guarantees which can make PLC networks competitive to other access technologies.

  9. Signaling Networks among Stem Cell Precursors, Transit-Amplifying Progenitors, and their Niche in Developing Hair Follicles

    Directory of Open Access Journals (Sweden)

    Amélie Rezza

    2016-03-01

    Full Text Available The hair follicle (HF is a complex miniorgan that serves as an ideal model system to study stem cell (SC interactions with the niche during growth and regeneration. Dermal papilla (DP cells are required for SC activation during the adult hair cycle, but signal exchange between niche and SC precursors/transit-amplifying cell (TAC progenitors that regulates HF morphogenetic growth is largely unknown. Here we use six transgenic reporters to isolate 14 major skin and HF cell populations. With next-generation RNA sequencing, we characterize their transcriptomes and define unique molecular signatures. SC precursors, TACs, and the DP niche express a plethora of ligands and receptors. Signaling interaction network analysis reveals a bird’s-eye view of pathways implicated in epithelial-mesenchymal interactions. Using a systematic tissue-wide approach, this work provides a comprehensive platform, linked to an interactive online database, to identify and further explore the SC/TAC/niche crosstalk regulating HF growth.

  10. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  11. Chaotic behavior of a layered neural network

    Energy Technology Data Exchange (ETDEWEB)

    Derrida, B.; Meir, R.

    1988-09-15

    We consider the evolution of configurations in a layered feed-forward neural network. Exact expressions for the evolution of the distance between two configurations are obtained in the thermodynamic limit. Our results show that the distance between two arbitrarily close configurations always increases, implying chaotic behavior, even in the phase of good retrieval.

  12. A Developed Network Layer Handover Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ali Safa Sadiq

    2015-02-01

    Full Text Available This paper proposes an Advanced Mobility Handover (AMH scheme based on Wireless Local Area Networks (WLANs by developing a network layer handover procedure which triggers messages to be sent to the next access point. The proposed AMH scheme performs the network handover process, which is represented by binding update procedure in advance during the time mobile node is still connected to the current AP in the link layer. Furthermore, a unique home IPv6 address is developed to maintain an IP communication with other corresponding nodes without a care-of-address during mobile node$'$s roaming process. This can contribute significantly to reducing network layer handover delays and signaling costs by eliminate the process of obtaining a new care-of-address and processing the handover of network layer in advance while the mobile node is still communicating with the current access point. Eventually, the conducted OMNET++ simulated scenario shows that the proposed AMH scheme performs the best in terms of reducing the handover delay as compared to the state of the art.

  13. Using Expectation Maximization and Resource Overlap Techniques to Classify Species According to Their Niche Similarities in Mutualistic Networks

    Directory of Open Access Journals (Sweden)

    Hugo Fort

    2015-11-01

    Full Text Available Mutualistic networks in nature are widespread and play a key role in generating the diversity of life on Earth. They constitute an interdisciplinary field where physicists, biologists and computer scientists work together. Plant-pollinator mutualisms in particular form complex networks of interdependence between often hundreds of species. Understanding the architecture of these networks is of paramount importance for assessing the robustness of the corresponding communities to global change and management strategies. Advances in this problem are currently limited mainly due to the lack of methodological tools to deal with the intrinsic complexity of mutualisms, as well as the scarcity and incompleteness of available empirical data. One way to uncover the structure underlying complex networks is to employ information theoretical statistical inference methods, such as the expectation maximization (EM algorithm. In particular, such an approach can be used to cluster the nodes of a network based on the similarity of their node neighborhoods. Here, we show how to connect network theory with the classical ecological niche theory for mutualistic plant-pollinator webs by using the EM algorithm. We apply EM to classify the nodes of an extensive collection of mutualistic plant-pollinator networks according to their connection similarity. We find that EM recovers largely the same clustering of the species as an alternative recently proposed method based on resource overlap, where one considers each party as a consuming resource for the other party (plants providing food to animals, while animals assist the reproduction of plants. Furthermore, using the EM algorithm, we can obtain a sequence of successfully-refined classifications that enables us to identify the fine-structure of the ecological network and understand better the niche distribution both for plants and animals. This is an example of how information theoretical methods help to systematize and

  14. Information Extraction from Large-Multi-Layer Social Networks

    Science.gov (United States)

    2015-08-06

    paper we introduce a novel method to extract information from such multi-layer networks, where each type of link forms its own layer. Using the concept...Approved for public release; distribution is unlimited. Information extraction from large-multi-layer social networks The views, opinions and/or findings...Information extraction from large-multi-layer social networks Report Title Social networks often encode community structure using multiple distinct

  15. A multi-layer network of the sovereign securities market

    OpenAIRE

    Carlos León; Jhonatan Pérez; Luc Renneboog

    2014-01-01

    We study the network of Colombian sovereign securities settlements. With data from the settlement market infrastructure we study financial institutions’ transactions from three different trading and registering individual networks that we combine into a multi-layer network. Examining this network of networks enables us to confirm that (i) studying isolated single-layer trading and registering networks yields a misleading perspective on the relations between and risks induced by participating ...

  16. BMP-SHH signaling network controls epithelial stem cell fate via regulation of its niche in the developing tooth.

    Science.gov (United States)

    Li, Jingyuan; Feng, Jifan; Liu, Yang; Ho, Thach-Vu; Grimes, Weston; Ho, Hoang Anh; Park, Shery; Wang, Songlin; Chai, Yang

    2015-04-20

    During embryogenesis, ectodermal stem cells adopt different fates and form diverse ectodermal organs, such as teeth, hair follicles, mammary glands, and salivary glands. Interestingly, these ectodermal organs differ in their tissue homeostasis, which leads to differential abilities for continuous growth postnatally. Mouse molars lose the ability to grow continuously, whereas incisors retain this ability. In this study, we found that a BMP-Smad4-SHH-Gli1 signaling network may provide a niche supporting transient Sox2+ dental epithelial stem cells in mouse molars. This mechanism also plays a role in continuously growing mouse incisors. The differential fate of epithelial stem cells in mouse molars and incisors is controlled by this BMP/SHH signaling network, which partially accounts for the different postnatal growth potential of molars and incisors. Collectively, our study highlights the importance of crosstalk between two signaling pathways, BMP and SHH, in regulating the fate of epithelial stem cells during organogenesis.

  17. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  18. An ensemble perspective on multi-layer networks

    CERN Document Server

    Wider, Nicolas; Scholtes, Ingo; Schweitzer, Frank

    2015-01-01

    We study properties of multi-layered, interconnected networks from an ensemble perspective, i.e. we analyze ensembles of multi-layer networks that share similar aggregate characteristics. Using a diffusive process that evolves on a multi-layer network, we analyze how the speed of diffusion depends on the aggregate characteristics of both intra- and inter-layer connectivity. Through a block-matrix model representing the distinct layers, we construct transition matrices of random walkers on multi-layer networks, and estimate expected properties of multi-layer networks using a mean-field approach. In addition, we quantify and explore conditions on the link topology that allow to estimate the ensemble average by only considering aggregate statistics of the layers. Our approach can be used when only partial information is available, like it is usually the case for real-world multi-layer complex systems.

  19. THE RATIONAL BEHIND THE SERVAL NETWORK LAYER FOR RESILIENT COMMUNICATIONS

    Directory of Open Access Journals (Sweden)

    Paul Gardner-Stephen

    2013-01-01

    Full Text Available The Internet Protocol is the dominant network protocol used in public networks today and has proven to be highly effective for wired networks and wireless networks alike, provided network address allocation can be coordinated. Mesh networks consisting of highly mobile devices present new challenges, especially when the assumption of coordination does not apply. One situation where coordination is not readily possible is ad-hoc networks in isolated areas and in disaster zones, both of which are characterized by deprivation of infrastructure. This study describes our realizations of several problems that IPv4 and IPv6 networking faces in such contexts and provides a brief description of an alternative network architecture for such situations, the Serval Network Layer and provides some of the reasoning behind the design decisions made. The Serval Network Layer is implemented as an open-source user-space network layer with strong intrinsic security characteristics and is able to be deployed without any centralized coordination.

  20. Power Control in Multi-Layer Cellular Networks

    CERN Document Server

    Davaslioglu, Kemal

    2012-01-01

    We investigate the possible performance gains of power control in multi-layer cellular systems where microcells and picocells are distributed within macrocells. Although multilayers in cellular networks help increase system capacity and coverage, and can reduce total energy consumption; they cause interference, reducing the performance of the network. Therefore, downlink transmit power levels of multi-layer hierarchical cellular networks need to be controlled in order to fully exploit their benefits. In this work, we present an analytical derivation to determine optimum power levels for two-layer cellular networks and generalize our solution to multi-layer cellular networks. We also simulate our results in a typical multi-layer network setup and observe significant power savings compared to single-layer cellular networks.

  1. Application-Network Cross Layer Multi-variable Cost Function for Application Layer Multicast of Multimedia Delivery over Convergent Networks

    OpenAIRE

    Le, Tien Anh; Nguyen, Hang; Nguyen, Manh Cuong

    2015-01-01

    International audience; Application layer multicast (ALM) algorithms are either similar or conceptually based on network layer multicast's cost functions. In this research work, a new application-network cross layer multi-variable cost function is proposed. It optimizes the variable requirements and available resources from both the application and the network layers. It can dynamically update the available resources required for reaching a particular node on the ALM's media distribution tree...

  2. Layered neural networks with non-monotonic transfer functions

    Science.gov (United States)

    Katayama, Katsuki; Sakata, Yasuo; Horiguchi, Tsuyoshi

    2003-01-01

    We investigate storage capacity and generalization ability for two types of fully connected layered neural networks with non-monotonic transfer functions; random patterns are embedded into the networks by a Hebbian learning rule. One of them is a layered network in which a non-monotonic transfer function of even layers is different from that of odd layers. The other is a layered network with intra-layer connections, in which the non-monotonic transfer function of inter-layer is different from that of intra-layer, and inter-layered neurons and intra-layered neurons are updated alternately. We derive recursion relations for order parameters for those layered networks by the signal-to-noise ratio method. We clarify that the storage capacity and the generalization ability for those layered networks are enhanced in comparison with those with a conventional monotonic transfer function when non-monotonicity of the transfer functions is selected optimally. We also point out that some chaotic behavior appears in the order parameters for the layered networks when non-monotonicity of the transfer functions increases.

  3. Design considerations for energy efficient, resilient, multi-layer networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Hansen, Line Pyndt; Ruepp, Sarah Renée

    2016-01-01

    This work investigates different network design considerations with respect to energy-efficiency, under green-field resilient multi-layer network deployment. The problem of energy efficient, reliable multi-layer network design is known to result in different trade-offs between key performance...... in multi-layer networks and performance measures such as network resource utilization, availability, agility to traffic fluctuations and energy consumption. A green-field network deployment scenario is considered, where different resiliency methods, design methodologies and grooming strategies are applied...

  4. Growing Multiplex Networks with Arbitrary Number of Layers

    CERN Document Server

    Fotouhi, Babak

    2015-01-01

    This paper focuses on the problem of growing multiplex networks. Currently, the results on the inter-layer degree distribution of growing multiplex networks present in the literature pertain to the case of two layers, and are confined to the special case of homogeneous growth. In the present paper, we obtain closed-form solutions for the inter-layer degree distribution of heterogeneously growing multilayer networks with arbitrary number of layers in the steady state. Heterogeneous growth means that each incoming node establishes different numbers of links in different layers. We first briefly consider the problem for two layers: we consider the cases of preferential attachment and uniform attachment separately, and we obtain closed-form expressions for the inter-layer degree distribution and expected degree distributions in each layer. Then for both attachment schemes, we generalize the problem to $M$ layers, and provide solutions for the joint degree distribution across all layers.

  5. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    CERN Document Server

    Lee, Kyu-Min

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can c...

  6. Layered learning of soccer robot based on artificial neural network

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Discusses the application of artificial neural network for MIROSOT, introduces a layered model of BP network of soccer robot for learning basic behavior and cooperative behavior, and concludes from experimental results that the model is effective.

  7. Pattern Synchronization in a Two-Layer Neuronal Network

    Institute of Scientific and Technical Information of China (English)

    SUN Xiao-Juan; LU Qi-Shao

    2009-01-01

    Pattern synchronization in a two-layer neuronal network is studied.For a single-layer network of Rulkov map neurons,there are three kinds of patterns induced by noise.Additive noise can induce ordered patterns at some intermediate noise intensities in a resonant way;however,for small and large noise intensities there exist excitable patterns and disordered patterns,respectively.For a neuronal network coupled by two single-layer networks with noise intensity differences between layers,we find that the two-layer network can achieve synchrony as the interlayer coupling strength increases.The synchronous states strongly depend on the interlayer coupling strength and the noise intensity difference between layers.

  8. Coevolution of Cooperation and Layer Selection Strategy in Multiplex Networks

    Directory of Open Access Journals (Sweden)

    Katsuki Hayashi

    2016-11-01

    Full Text Available Recently, the emergent dynamics in multiplex networks, composed of layers of multiple networks, has been discussed extensively in network sciences. However, little is still known about whether and how the evolution of strategy for selecting a layer to participate in can contribute to the emergence of cooperative behaviors in multiplex networks of social interactions. To investigate these issues, we constructed a coevolutionary model of cooperation and layer selection strategies in which each an individual selects one layer from multiple layers of social networks and plays the Prisoner’s Dilemma with neighbors in the selected layer. We found that the proportion of cooperative strategies increased with increasing the number of layers regardless of the degree of dilemma, and this increase occurred due to a cyclic coevolution process of game strategies and layer selection strategies. We also showed that the heterogeneity of links among layers is a key factor for multiplex networks to facilitate the evolution of cooperation, and such positive effects on cooperation were observed regardless of the difference in the stochastic properties of network topologies.

  9. Improved efficient routing strategy on two-layer complex networks

    Science.gov (United States)

    Ma, Jinlong; Han, Weizhan; Guo, Qing; Zhang, Shuai; Wang, Junfang; Wang, Zhihao

    2016-10-01

    The traffic dynamics of multi-layer networks has become a hot research topic since many networks are comprised of two or more layers of subnetworks. Due to its low traffic capacity, the traditional shortest path routing (SPR) protocol is susceptible to congestion on two-layer complex networks. In this paper, we propose an efficient routing strategy named improved global awareness routing (IGAR) strategy which is based on the betweenness centrality of nodes in the two layers. With the proposed strategy, the routing paths can bypass hub nodes of both layers to enhance the transport efficiency. Simulation results show that the IGAR strategy can bring much better traffic capacity than the SPR and the global awareness routing (GAR) strategies. Because of the significantly improved traffic performance, this study is helpful to alleviate congestion of the two-layer complex networks.

  10. A layer reduction based community detection algorithm on multiplex networks

    Science.gov (United States)

    Wang, Xiaodong; Liu, Jing

    2017-04-01

    Detecting hidden communities is important for the analysis of complex networks. However, many algorithms have been designed for single layer networks (SLNs) while just a few approaches have been designed for multiplex networks (MNs). In this paper, we propose an algorithm based on layer reduction for detecting communities on MNs, which is termed as LRCD-MNs. First, we improve a layer reduction algorithm termed as neighaggre to combine similar layers and keep others separated. Then, we use neighaggre to find the community structure hidden in MNs. Experiments on real-life networks show that neighaggre can obtain higher relative entropy than the other algorithm. Moreover, we apply LRCD-MNs on some real-life and synthetic multiplex networks and the results demonstrate that, although LRCD-MNs does not have the advantage in terms of modularity, it can obtain higher values of surprise, which is used to evaluate the quality of partitions of a network.

  11. Research on Multi-Layer Distributed HF Radio Network Structure

    Institute of Scientific and Technical Information of China (English)

    Hui Dai; Chun-Jiang Wang; Quan Yu

    2008-01-01

    High frequency (HF) transmission is an important communication techniques. However, conventional point-to-point transmission can be easily destroyed, which limits its utilization in practice. HF networking communication has the capability against demolishment. The network structure is one of the key factors for HF networking communication. In this paper, a novel analysis method of the network connectedness based on the eigenvalue is derived, and a multi-layer distributed HF radio network structure is proposed. Both the theore tical analysis and the computer simulation results verify that the application of the proposed network structure in the HF radio communication can improve the anti demolishment ability of the HF network efficiently.

  12. Plant stem cell niches.

    Science.gov (United States)

    Aichinger, Ernst; Kornet, Noortje; Friedrich, Thomas; Laux, Thomas

    2012-01-01

    Multicellular organisms possess pluripotent stem cells to form new organs, replenish the daily loss of cells, or regenerate organs after injury. Stem cells are maintained in specific environments, the stem cell niches, that provide signals to block differentiation. In plants, stem cell niches are situated in the shoot, root, and vascular meristems-self-perpetuating units of organ formation. Plants' lifelong activity-which, as in the case of trees, can extend over more than a thousand years-requires that a robust regulatory network keep the balance between pluripotent stem cells and differentiating descendants. In this review, we focus on current models in plant stem cell research elaborated during the past two decades, mainly in the model plant Arabidopsis thaliana. We address the roles of mobile signals on transcriptional modules involved in balancing cell fates. In addition, we discuss shared features of and differences between the distinct stem cell niches of Arabidopsis.

  13. Learning Processes of Layered Neural Networks

    OpenAIRE

    Fujiki, Sumiyoshi; FUJIKI, Nahomi, M.

    1995-01-01

    A positive reinforcement type learning algorithm is formulated for a stochastic feed-forward neural network, and a learning equation similar to that of the Boltzmann machine algorithm is obtained. By applying a mean field approximation to the same stochastic feed-forward neural network, a deterministic analog feed-forward network is obtained and the back-propagation learning rule is re-derived.

  14. Vulnerability of multi-layer networks under malware spreading

    CERN Document Server

    Vida, Rafael; Cuenda, Sara

    2013-01-01

    Computer viruses are evolving by developing spreading mechanisms based on the use of multiple vectors of propagation. The use of the social network as an extra vector of attack to penetrate the security measures in IP networks is improving the effectiveness of the malware, and have therefore been used by the most aggressive viruses, like Conficker and Stuxnet. In this work we use multi-layer networks to model the propagation of these kind of viruses. In particular, we study the propagation of a SIS model on a multi-layer network where the state of each node is layer-independent and the dynamics in each network follows either a contact process or a reactive process, with different propagation rates. We show that the interplay between the layers leads to a non-trivial dynamics, with an epidemic onset that may trigger before it triggers in each isolated network. We apply this study to the case of a real two-layer network: a Spanish scientific community of Statistical Physics, formed by a social network of scient...

  15. Pareto distance for multi-layer network analysis

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    Social Network Analysis has been historically applied to single networks, e.g., interaction networks between co-workers. However, the advent of on-line social network sites has emphasized the stratified structure of our social experience. Individuals usually spread their identities over multiple...... services, e.g., Facebook, Twitter, LinkedIn and Foursquare. As a result, the analysis of on-line social networks requires a wider scope and, more technically speaking, models for the representation of this fragmented scenario. The recent introduction of more realistic layered models has however determined...... new research problems related to the extension of traditional single-layer network measures. In this paper we take a step forward over existing approaches by defining a new concept of geodesic distance that includes heterogeneous networks and connections with very limited assumptions regarding...

  16. Cross-Layer Protocols for Multimedia Communications over Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    In the last few years, the Internet throughput, usage and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks together with increased computational power have opened the door for a new breed of applications to be created, namely real-time multimedia applications. Delivering real-time multimedia traffic over a complex network like the Internet is a particularly challenging task since these applications have strict quality-of-service (QoS) requirements on bandwidth, delay, and delay jitter. Traditional Internet protocol (IP)-based best effort service is not able to meet these stringent requirements. The time-varying nature of wireless channels and resource constrained wireless devices make the problem even more difficult. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer and link layer. Cross layer design i...

  17. Inter-layer synchronization in non-identical multi-layer networks.

    Science.gov (United States)

    Leyva, I; Sevilla-Escoboza, R; Sendiña-Nadal, I; Gutiérrez, R; Buldú, J M; Boccaletti, S

    2017-04-04

    Inter-layer synchronization is a dynamical process occurring in multi-layer networks composed of identical nodes. This process emerges when all layers are synchronized, while nodes in each layer do not necessarily evolve in unison. So far, the study of such inter-layer synchronization has been restricted to the case in which all layers have an identical connectivity structure. When layers are not identical, the inter-layer synchronous state is no longer a stable solution of the system. Nevertheless, when layers differ in just a few links, an approximate treatment is still feasible, and allows one to gather information on whether and how the system may wander around an inter-layer synchronous configuration. We report the details of an approximate analytical treatment for a two-layer multiplex, which results in the introduction of an extra inertial term accounting for structural differences. Numerical validation of the predictions highlights the usefulness of our approach, especially for small or moderate topological differences in the intra-layer coupling. Moreover, we identify a non-trivial relationship connecting the betweenness centrality of the missing links and the intra-layer coupling strength. Finally, by the use of multiplexed layers of electronic circuits, we study the inter-layer synchronization as a function of the removed links.

  18. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  19. Layer aggregation and reducibility of multilayer interconnected networks

    CERN Document Server

    De Domenico, M; Arenas, A; Latora, V

    2014-01-01

    Many complex systems can be represented as networks composed by distinct layers, interacting and depending on each others. For example, in biology, a good description of the full protein-protein interactome requires, for some organisms, up to seven distinct network layers, with thousands of protein-protein interactions each. A fundamental open question is then how much information is really necessary to accurately represent the structure of a multilayer complex system, and if and when some of the layers can indeed be aggregated. Here we introduce a method, based on information theory, to reduce the number of layers in multilayer networks, while minimizing information loss. We validate our approach on a set of synthetic benchmarks, and prove its applicability to an extended data set of protein-genetic interactions, showing cases where a strong reduction is possible and cases where it is not. Using this method we can describe complex systems with an optimal trade--off between accuracy and complexity.

  20. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  1. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network.

    Science.gov (United States)

    Lee, Kyu-Min; Goh, K-I

    2016-05-23

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems.

  2. Niche explosion.

    Science.gov (United States)

    Normark, Benjamin B; Johnson, Norman A

    2011-05-01

    The following syndrome of features occurs in several groups of phytophagous insects: (1) wingless females, (2) dispersal by larvae, (3) woody hosts, (4) extreme polyphagy, (5) high abundance, resulting in status as economic pests, (6) invasiveness, and (7) obligate parthenogenesis in some populations. If extreme polyphagy is defined as feeding on 20 or more families of hostplants, this syndrome is found convergently in several species of bagworm moths, tussock moths, root weevils, and 5 families of scale insects. We hypothesize that extreme polyphagy in these taxa results from "niche explosion", a positive feedback loop connecting large population size to broad host range. The niche explosion has a demographic component (sometimes called the "amplification effect" in studies of pathogens) as well as a population-genetic component, due mainly to the increased effectiveness of natural selection in larger populations. The frequent origins of parthenogenesis in extreme polyphages are, in our interpretation, a consequence of this increased effectiveness of natural selection and consequent reduced importance of sexuality. The niche explosion hypothesis makes detailed predictions about the comparative genomics and population genetics of extreme polyphages and related specialists. It has a number of potentially important implications, including an explanation for the lack of observed trade-offs between generalists and specialists, a re-interpretation of the ecological correlates of parthenogenesis, and a general expectation that Malthusian population explosions may be amplified by Darwinian effects.

  3. Asymmetrically interacting spreading dynamics on complex layered networks

    CERN Document Server

    Wang, Wei; Yang, Hui; Do, Younghae; Lai, Ying-Cheng; Lee, GyuWon

    2014-01-01

    The spread of disease through a physical-contact network and the spread of information about the disease on a communication network are two intimately related dynamical processes. We investigate the asymmetrical interplay between the two types of spreading dynamics, each occurring on its own layer, by focusing on the two fundamental quantities underlying any spreading process: epidemic threshold and the final infection ratio. We find that an epidemic outbreak on the contact layer can induce an outbreak on the communication layer, and information spreading can effectively raise the epidemic threshold. When structural correlation exists between the two layers, the information threshold remains unchanged but the epidemic threshold can be enhanced, making the contact layer more resilient to epidemic outbreak. We develop a physical theory to understand the intricate interplay between the two types of spreading dynamics.

  4. Asymmetrically interacting spreading dynamics on complex layered networks

    Science.gov (United States)

    Wang, Wei; Tang, Ming; Yang, Hui; Younghae Do; Lai, Ying-Cheng; Lee, Gyuwon

    2014-05-01

    The spread of disease through a physical-contact network and the spread of information about the disease on a communication network are two intimately related dynamical processes. We investigate the asymmetrical interplay between the two types of spreading dynamics, each occurring on its own layer, by focusing on the two fundamental quantities underlying any spreading process: epidemic threshold and the final infection ratio. We find that an epidemic outbreak on the contact layer can induce an outbreak on the communication layer, and information spreading can effectively raise the epidemic threshold. When structural correlation exists between the two layers, the information threshold remains unchanged but the epidemic threshold can be enhanced, making the contact layer more resilient to epidemic outbreak. We develop a physical theory to understand the intricate interplay between the two types of spreading dynamics.

  5. Performance Analysis of MAC Layer Protocols in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hameeza Ahmed

    2014-10-01

    Full Text Available Media Access Control (MAC layer protocols have a critical role in making a typical Wireless Sensor Network (WSN more reliable and efficient. Choice of MAC layer protocol and other factors including number of nodes, mobility, traffic rate and playground size dictates the performance of a particular WSN. In this paper, the performance of an experimental WSN is evaluated using different MAC layer protocols. In this experiment, a WSN is created using OMNeT++ MiXiM network simulator and its performance in terms of packet delivery ratio and mean latency is evaluated. The simulation results show that IEEE 802.11 MAC layer protocol performs better than CSMA, B-MAC and IEEE 802.15.4 MAC layer protocols. In the considered scenario, IEEE 802.15.4 is ranked second in performance, followed by CSMA and B-MAC.

  6. Collaboration Layer for Robots in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Borch, Ole; Madsen, Per Printz; Broberg, Jacob Honor´e

    2009-01-01

    In many applications multiple robots in Mobile Ad-hoc Networks are required to collaborate in order to solve a task. This paper shows by proof of concept that a Collaboration Layer can be modelled and designed to handle the collaborative communication, which enables robots in small to medium size...... networks to solve tasks collaboratively. In this proposal the Collaboration Layer is modelled to handle service and position discovery, group management, and synchronisation among robots, but the layer is also designed to be extendable. Based on this model of the Collaboration Layer, generic services....... A prototype of the Collaboration Layer has been developed to run in a simulated environment and tested in an evaluation scenario. In the scenario five robots solve the tasks of vacuum cleaning and entrance guarding, which involves the ability to discover potential co-workers, form groups, shift from one group...

  7. Architecture of a Personal Network service layer

    NARCIS (Netherlands)

    Joosten, H.J.M.; Hartog, F.T.H. den; Selgert, F.

    2009-01-01

    We describe a basic service architecture that extends the currently dominant device-oriented approach of Personal Networks (PNs). It specifies functionality for runtime selection and execution of appropriate service components available in the PN, resulting in a highly dynamic, personalized, and

  8. A Cross-Layer PEP for DVB-RCS Networks

    Science.gov (United States)

    Giambene, Giovanni; Hadzic, Snezana

    The aim of this paper is to consider the problems of TCP performance in broadband GEO satellite networks and to propose a cross-layer approach for a transport-layer PEP that makes spoofing actions on ACKs to modify them in case the satellite network is congested. This approach is investigated here from the signaling standpoint with a special attention to the BSM reference model and considering a specific GEO satellite network architecture based on the DVB-S2/-RCS standards. The proposed PEP can prevent congestion in the satellite network, thus allowing a better TCP performance. This work has been carried out within the framework of the EU SatNEx II FP6 Network of Excellence.

  9. Investigating physics learning with layered student interaction networks

    DEFF Research Database (Denmark)

    Bruun, Jesper; Traxler, Adrienne

    Centrality in student interaction networks (SINs) can be linked to variables like grades [1], persistence [2], and participation [3]. Recent efforts in the field of network science have been done to investigate layered - or multiplex - networks as mathematical objects [4]. These networks can be e......, this study investigates how target entropy [5,1] and pagerank [6,7] are affected when we take time and modes of interaction into account. We present our preliminary models and results and outline our future work in this area....

  10. A Layered Social and Operational Network Analysis

    Science.gov (United States)

    2007-03-01

    method for incorporating triad relationships, time, and location into social network studies. Utilizing the basic eigenvector centrality, the method...were carried out by two cooperating al-Qaeda cells against the US embassies in Nairobi, Kenya and Dar es Salaam, Tanzania (Champagne, 2005). This...Abdullah Mohammed, Azzam (Suicide Bomber) • Dar es Salaam, Tanzania Cell: Fahad Mohammed Ally Msalam, Mustafa Mohammed Fadhil, Khalfan Khamis

  11. Architecture of a Personal Network Service Layer

    Science.gov (United States)

    Joosten, Rieks; den Hartog, Frank; Selgert, Franklin

    We describe a basic service architecture that extends the currently dominant device-oriented approach of Personal Networks (PNs). It specifies functionality for runtime selection and execution of appropriate service components available in the PN, resulting in a highly dynamic, personalized, and context-aware provisioning of PN services to the user. The architectural model clearly connects the responsibilities of the various business roles with the individual properties (resources) of the PN Entities involved.

  12. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  13. Pareto distance for multi-layer network analysis

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    services, e.g., Facebook, Twitter, LinkedIn and Foursquare. As a result, the analysis of on-line social networks requires a wider scope and, more technically speaking, models for the representation of this fragmented scenario. The recent introduction of more realistic layered models has however determined...... on the nature of the connections required by the Pareto distance may in theory result in a large number of potential shortest paths between pairs of nodes. However, an experimental computation of distances on multi-layer networks of increasing size shows an interesting and non-trivial stable behavior....

  14. Competitive dynamics of lexical innovations in multi-layer networks

    CERN Document Server

    Javarone, Marco Alberto

    2013-01-01

    We study the introduction of lexical innovations in a community of language users. Lexical innovations, i.e., new terms added in the people's vocabulary, have an important role in the process of language evolution. Nowadays, the information spreading takes place over different networks, as online/offline social networks, the World Wide Web and other information networks. The whole system, composed by networks of different nature, can be represented as a multi-layer network. In this context, the spreading of lexical innovations has a peculiar behavior. In particular, a lexical innovation can generate incomprehensions when used without providing its meaning and, in this case, more than one meaning can emerge in the population. Therefore, lexical innovations cannot be considered as simple informations. We develop a model to analyze this scenario by using a multi-layer network composed of a social network and a media network. This latter represents the set of all information systems of a society, e.g., television...

  15. Training two-layered feedforward networks with variable projection method.

    Science.gov (United States)

    Kim, C T; Lee, J J

    2008-02-01

    The variable projection (VP) method for separable nonlinear least squares (SNLLS) is presented and incorporated into the Levenberg-Marquardt optimization algorithm for training two-layered feedforward neural networks. It is shown that the Jacobian of variable projected networks can be computed by simple modification of the backpropagation algorithm. The suggested algorithm is efficient compared to conventional techniques such as conventional Levenberg-Marquardt algorithm (LMA), hybrid gradient algorithm (HGA), and extreme learning machine (ELM).

  16. Efficient Convolutional Neural Network with Binary Quantization Layer

    OpenAIRE

    Ravanbakhsh, Mahdyar; Mousavi, Hossein; Nabi, Moin; Marcenaro, Lucio; Regazzoni, Carlo

    2016-01-01

    In this paper we introduce a novel method for segmentation that can benefit from general semantics of Convolutional Neural Network (CNN). Our segmentation proposes visually and semantically coherent image segments. We use binary encoding of CNN features to overcome the difficulty of the clustering on the high-dimensional CNN feature space. These binary encoding can be embedded into the CNN as an extra layer at the end of the network. This results in real-time segmentation. To the best of our ...

  17. Cross-Layer Design in Wireless Cognitive Networks (Postprint)

    Science.gov (United States)

    2010-06-01

    24,2010 at 14:07:59 UTC from IEEE Xplore . Restrictions apply. 1 can be obtained by sharing of information across the layers of the protocol stack...Downloaded on June 24,2010 at 14:07:59 UTC from IEEE Xplore . Restrictions apply. 2 2. Cognitive Networks A cognitive infrastructure consists...24,2010 at 14:07:59 UTC from IEEE Xplore . Restrictions apply. 3 [16] discussed cognitive network management using reinforcement learning for

  18. Quantum photonic network and physical layer security.

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-08-06

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  19. Quantum photonic network and physical layer security

    Science.gov (United States)

    Sasaki, Masahide; Endo, Hiroyuki; Fujiwara, Mikio; Kitamura, Mitsuo; Ito, Toshiyuki; Shimizu, Ryosuke; Toyoshima, Morio

    2017-06-01

    Quantum communication and quantum cryptography are expected to enhance the transmission rate and the security (confidentiality of data transmission), respectively. We study a new scheme which can potentially bridge an intermediate region covered by these two schemes, which is referred to as quantum photonic network. The basic framework is information theoretically secure communications in a free space optical (FSO) wiretap channel, in which an eavesdropper has physically limited access to the main channel between the legitimate sender and receiver. We first review a theoretical framework to quantify the optimal balance of the transmission efficiency and the security level under power constraint and at finite code length. We then present experimental results on channel characterization based on 10 MHz on-off keying transmission in a 7.8 km terrestrial FSO wiretap channel. This article is part of the themed issue 'Quantum technology for the 21st century'.

  20. On the Selection of Physical Layer Optimized Network Topologies for the Zigbee Network

    Directory of Open Access Journals (Sweden)

    Manpreet

    2016-01-01

    Full Text Available Zigbee standard has been designed for low data rate, low cost and limited power applications for short-range wireless communication. The successful implementation of Zigbee based network depends on the suitable selection of physical (PHY layer and medium access control (MAC layer parameters. In this work the PHY layer parameters have been optimized for star, tree and mesh topologies. The performance investigations have been carried out for different frequency band and data rate and different bandwidth (BW in each of standard topologies. Through extensive simulations, QoS parameters like throughput, network load and delay have been evaluated to achieve optimal performance of physical layer.

  1. Two-Layer Feedback Neural Networks with Associative Memories

    Institute of Scientific and Technical Information of China (English)

    WU Gui-Kun; ZHAO Hong

    2008-01-01

    We construct a two-layer feedback neural network by a Monte Carlo based algorithm to store memories as fixed-point attractors or as limit-cycle attractors. Special attention is focused on comparing the dynamics of the network with limit-cycle attractors and with fixed-point attractors. It is found that the former has better retrieval property than the latter. Particularly, spurious memories may be suppressed completely when the memories are stored as a long-limit cycle. Potential application of limit-cycle-attractor networks is discussed briefly.

  2. A primer on physical-layer network coding

    CERN Document Server

    Liew, Soung Chang; Zhang, Shengli

    2015-01-01

    The concept of physical-layer network coding (PNC) was proposed in 2006 for application in wireless networks. Since then it has developed into a subfield of communications and networking with a wide following. This book is a primer on PNC. It is the outcome of a set of lecture notes for a course for beginning graduate students at The Chinese University of Hong Kong. The target audience is expected to have some prior background knowledge in communication theory and wireless communications, but not working knowledge at the research level. Indeed, a goal of this book/course is to allow the reader

  3. Physical-layer network coding in coherent optical OFDM systems.

    Science.gov (United States)

    Guan, Xun; Chan, Chun-Kit

    2015-04-20

    We present the first experimental demonstration and characterization of the application of optical physical-layer network coding in coherent optical OFDM systems. It combines two optical OFDM frames to share the same link so as to enhance system throughput, while individual OFDM frames can be recovered with digital signal processing at the destined node.

  4. Competitive dynamics of lexical innovations in multi-layer networks

    Science.gov (United States)

    Javarone, Marco Alberto

    2014-04-01

    We study the introduction of lexical innovations into a community of language users. Lexical innovations, i.e. new term added to people's vocabulary, plays an important role in the process of language evolution. Nowadays, information is spread through a variety of networks, including, among others, online and offline social networks and the World Wide Web. The entire system, comprising networks of different nature, can be represented as a multi-layer network. In this context, lexical innovations diffusion occurs in a peculiar fashion. In particular, a lexical innovation can undergo three different processes: its original meaning is accepted; its meaning can be changed or misunderstood (e.g. when not properly explained), hence more than one meaning can emerge in the population. Lastly, in the case of a loan word, it can be translated into the population language (i.e. defining a new lexical innovation or using a synonym) or into a dialect spoken by part of the population. Therefore, lexical innovations cannot be considered simply as information. We develop a model for analyzing this scenario using a multi-layer network comprising a social network and a media network. The latter represents the set of all information systems of a society, e.g. television, the World Wide Web and radio. Furthermore, we identify temporal directed edges between the nodes of these two networks. In particular, at each time-step, nodes of the media network can be connected to randomly chosen nodes of the social network and vice versa. In doing so, information spreads through the whole system and people can share a lexical innovation with their neighbors or, in the event they work as reporters, by using media nodes. Lastly, we use the concept of "linguistic sign" to model lexical innovations, showing its fundamental role in the study of these dynamics. Many numerical simulations have been performed to analyze the proposed model and its outcomes.

  5. A Comparison of Link Layer Attacks on Wireless Sensor Networks

    CERN Document Server

    Mohammadi, Shahriar; 10.5121/jgraphhoc.2011.3103

    2011-01-01

    Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional networks security techniques are unusable on WSNs [2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer a...

  6. Transmission of cultural traits in layered ego-centric networks

    CERN Document Server

    Palchykov, Vasyl; Kertész, Janos

    2014-01-01

    Although a number of models have been developed to investigate the emergence of culture and evolutionary phases in social systems, one important aspect has not been emphasized enough. This is the structure of the underlying network of social relations serving as channels to transmit cultural traits and thus expected to play a crucial role in the evolutionary processes in social systems. In this paper we contribute to the understanding of the role of the network structure by developing a layered ego-centric network structure based model, inspired by the social brain hypothesis, to study transmission of cultural traits and their evolution in social network. For this model we first find analytical results in the spirit of mean-field approximation and then to validate the results we compare them with the results of extensive numerical simulations.

  7. Prediction of Double Layer Grids' Maximum Deflection Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Reza K. Moghadas

    2008-01-01

    Full Text Available Efficient neural networks models are trained to predict the maximum deflection of two-way on two-way grids with variable geometrical parameters (span and height as well as cross-sectional areas of the element groups. Backpropagation (BP and Radial Basis Function (RBF neural networks are employed for the mentioned purpose. The inputs of the neural networks are the length of the spans, L, the height, h and cross-sectional areas of the all groups, A and the outputs are maximum deflections of the corresponding double layer grids, respectively. The numerical results indicate that the RBF neural network is better than BP in terms of training time and performance generality.

  8. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  9. MAC Layer Resource Allocation for Wireless Body Area Networks

    Institute of Scientific and Technical Information of China (English)

    Qinghua Shen; Xuemin Sherman Shen; Tom HLuan; Jing Liu

    2014-01-01

    Wireless body area networks (WBANs) can provide low-cost, timely healthcare services and are expected to be widely used for e-healthcare in hospitals. In a hospital, space is often limited and multiple WBANs have to coexist in an area and share the same channel in order to provide healthcare services to different patients. This causes severe interference between WBANs that could significantly reduce the network throughput and increase the amount of power consumed by sensors placed on the body. There-fore, an efficient channel-resource allocation scheme in the medium access control (MAC) layer is crucial. In this paper, we devel-op a centralized MAC layer resource allocation scheme for a WBAN. We focus on mitigating the interference between WBANs and reducing the power consumed by sensors. Channel and buffer state are reported by smartphones deployed in each WBAN, and channel access allocation is performed by a central controller to maximize network throughput. Sensors have strict limitations in terms of energy consumption and computing capability and cannot provide all the necessary information for channel allocation in a timely manner. This deteriorates network performance. We exploit the temporal correlation of the body area channel in order to minimize the number of channel state reports necessary. We view the network design as a partly observable optimization prob-lem and develop a myopic policy, which we then simulate in Matlab.

  10. The learning problem of multi-layer neural networks.

    Science.gov (United States)

    Ban, Jung-Chao; Chang, Chih-Hung

    2013-10-01

    This manuscript considers the learning problem of multi-layer neural networks (MNNs) with an activation function which comes from cellular neural networks. A systematic investigation of the partition of the parameter space is provided. Furthermore, the recursive formula of the transition matrix of an MNN is obtained. By implementing the well-developed tools in the symbolic dynamical systems, the topological entropy of an MNN can be computed explicitly. A novel phenomenon, the asymmetry of a topological diagram that was seen in Ban, Chang, Lin, and Lin (2009) [J. Differential Equations 246, pp. 552-580, 2009], is revealed.

  11. Mesoscopic Structures Reveal the Network Between the Layers of Multiplex Datasets

    CERN Document Server

    Iacovacci, Jacopo; Bianconi, Ginestra

    2015-01-01

    Multiplex networks describe a large variety of complex systems, whose elements (nodes) can be connected by different types of interactions forming different layers (networks) of the multiplex. Multiplex networks include social networks, transportation networks or biological networks in the cell or in the brain. Extracting relevant information from these networks is of crucial importance for solving challenging inference problems and for characterizing the multiplex networks microscopic and mesoscopic structure. Here we propose an information theory method to extract the network between the layers of multiplex datasets, forming a "network of networks". We build an indicator function, based on the entropy of network ensembles, to characterize the mesoscopic similarities between the layers of a multiplex network and we use clustering techniques to characterize the communities present in this network of networks. We apply the proposed method to study the Multiplex Collaboration Network formed by scientists collab...

  12. A Comparison of Link Layer Attacks on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shahriar Mohammadi

    2011-03-01

    Full Text Available Wireless sensor networks (WSNs have many potential applications [1, 5] and unique challenges. Theyusually consist of hundreds or thousands small sensor nodes such as MICA2, which operateautonomously; conditions such as cost, invisible deployment and many application domains, lead to smallsize and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] andmost of traditional networks security techniques are unusable on WSNs [2]; due to wireless and sharednature of communication channel, untrusted transmissions, deployment in open environments, unattendednature and limited resources [1]. So, security is a vital requirement for these networks; but we have todesign a proper security mechanism that attends to WSN's constraints and requirements. In this paper, wefocus on security of WSNs, divide it (the WSNs security into four categories and will consider them,include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' linklayer attacks and a comparison of them. This work enables us to identify the purpose and capabilities ofthe attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paperdiscusses known approaches of security detection and defensive mechanisms against the link layerattacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively

  13. Energy management and multi-layer control of networked microgrids

    Science.gov (United States)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  14. Enhanced performance based on cross-layer design from physical to transport layers for multihop wireless networks

    Institute of Scientific and Technical Information of China (English)

    CHEN Guang-quan; SONG Mei; ZHANG Yong; SONG Jun-de

    2010-01-01

    This paper puts forward a novel cognitive cross-layer design algorithms for multihop wireless networks optimization across physical,mediam access control(MAC),network and transport layers.As is well known,the conventional layered-protocol architecture can not provide optimal performance for wireless networks,and cross-layer design is becoming increasingly important for improving the performance of wireless networks.In this study,we formulate a specific network utility maximization(NUM)problem that we believe is appropriate for multihop wireless networks.By using the dual algorithm,the NUM problem has been optimal decomposed and solved with a novel distributed cross-layer design algorithm from physical to transport layers.Our solution enjoys the benefits of cross-layer optimization while maintaining the simplicity and modularity of the traditional layered architecture.The proposed cross-layer design can guarantee the end-to-end goals of data flows while fully utilizing network resources.Computer simulations have evaluated an enhanced performance of the proposed algorithm at both average source rate and network throughput.Meanwhile,the proposed algorithm has low implementation complexity for practical reality.

  15. Cross-layer optimization in ultra wideband networks

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Ultra wideband (UWB) network brings both chance and challenge to personal area wireless communications. Compared with other IEEE 802 small range wireless protocols (such as WLAN and Bluetooth), UWB has both extremely high bandwidth (up to 480 Mbps) and low radiation. Moreover, the structured MAC layer of UWB is the fundamental difference to WLAN. The top one is that only when two UWB devices belong to the same piconet can they communicate with each other directly, which means that we must jointly consider topology formation and routing when deploying UWB networks because the interaction between routing and topology formation makes separate optimization ineffective. This paper tries to optimize UWB network from a cross-layer point of view. Specifically, given device spatial distribution and traffic requirement, we want to form piconets and determine routing jointly, to maximize the overall throughput. We formulate the problem of joint optimization to mixed-integer programming and give a practical lower bound that is very close to the theoretical upper bound in our simulation. Furthermore, our lower bound is much better than an algorithm that only considers topology formation in UWB networks.

  16. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2015-05-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other\\'s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network\\'s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network\\'s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. © 2015 IEEE.

  17. Desert shrub responses to experimental modification of precipitation seasonality and soil depth: relationship to the two-layer model and ecohydrological niche

    Science.gov (United States)

    Germino, Matthew J.; Reinhardt, Keith

    2013-01-01

    1. Ecohydrological niches are important for understanding plant community responses to climate shifts, particularly in dry lands. According to the two-layer hypothesis, selective use of deep-soil water increases growth or persistence of woody species during warm and dry summer periods and thereby contributes to their coexistence with shallow-rooted herbs in dry ecosystems. The resource-pool hypothesis further suggests that shallow-soil water benefits growth of all plants while deep-soil water primarily enhances physiological maintenance and survival of woody species. Few studies have directly tested these by manipulating deep-soil water availability and observing the long-term outcomes. 2. We predicted that factors promoting infiltration and storage of water in deep soils, specifically greater winter precipitation and soil depth, would enhance Artemisia tridentata (big sagebrush) in cold, winter-wet/summer-dry desert. Sagebrush responses to 20 years of winter irrigation were compared to summer- or no irrigation, on plots having relatively deep or shallow soils (2 m vs. 1 m depths). 3. Winter irrigation increased sagebrush cover, and crown and canopy volumes, but not density (individuals/plot) compared to summer or no irrigation, on deep-soil plots. On shallow-soil plots, winter irrigation surprisingly decreased shrub cover and size, and summer irrigation had no effect. Furthermore, multiple regression suggested that the variations in growth were related (i) firstly to water in shallow soils (0-0.2 m) and secondly to deeper soils (> 1 m deep) and (ii) more by springtime than by midsummer soil water. Water-use efficiency increased considerably on shallow soils without irrigation and was lowest with winter irrigation. 4. Synthesis. Sagebrush was more responsive to the seasonal timing of precipitation than to total annual precipitation. Factors that enhanced deep-water storage (deeper soils plus more winter precipitation) led to increases in Artemisia tridentata that

  18. Collaborative multi-layer network coding for cellular cognitive radio networks

    KAUST Repository

    Sorour, Sameh

    2013-06-01

    In this paper, we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in underlay cellular cognitive radio networks. This scheme allows the collocated primary and cognitive radio base-stations to collaborate with each other, in order to minimize their own and each other\\'s packet recovery overheads, and thus improve their throughput, without any coordination between them. This non-coordinated collaboration is done using a novel multi-layer instantly decodable network coding scheme, which guarantees that each network\\'s help to the other network does not result in any degradation in its own performance. It also does not cause any violation to the primary networks interference thresholds in the same and adjacent cells. Yet, our proposed scheme both guarantees the reduction of the recovery overhead in collocated primary and cognitive radio networks, and allows early recovery of their packets compared to non-collaborative schemes. Simulation results show that a recovery overhead reduction of 15% and 40% can be achieved by our proposed scheme in the primary and cognitive radio networks, respectively, compared to the corresponding non-collaborative scheme. © 2013 IEEE.

  19. CCMP-AES Model with DSR routing protocol to secure Link layer and Network layer in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    Dr.G.Padmavathi

    2010-08-01

    Full Text Available Mobile Adhoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of established infrastructure. Mobile Adhoc network are vulnerable to attacks compared to wired networks due to limited physical security, volatilenetwork topologies, power-constrained operations, intrinsic requirement of mutual trust among all nodes. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc networks. Particularly Blackhole attack is one such severe attack against ad hoc routing protocols which is a challenging one to defend against. The proposed model combines the On demand routing protocol DSR with CCMP-AES mode to defend against black hole attack and it also provides confidentiality and authentication of packets in both routing and link layers of MANET. The primary focus of this work is to provide security mechanisms while transmitting data frames in a node to node manner. The security protocol CCMP-AES working in data link layerkeeps data frame from eavesdropping, interception, alteration, or dropping from unauthorized party along the route from the source to the destination. The simulation is done for different number of mobile nodes using network simulator qualnet 5.0. The proposedmodel has shown better results in terms of Total bytes received, packet delivery ratio, throughput, End to End delay and Average jitter.

  20. A declarative approach to multi-layer path finding based on semantic network descriptions

    NARCIS (Netherlands)

    Xu, L.; Dijkstra, F.; Marchal, D.; Taal, A.; Grosso, P.; de Laat, C.

    2009-01-01

    With the increasing demand for dynamic network connections between multiple research networks, a number of issues on multi-layer hybrid networks need to be addressed, such as network representation, path finding, and path provisioning. This paper focuses on solving the multi-layer path finding probl

  1. Multi-Layer and Recursive Neural Networks for Metagenomic Classification.

    Science.gov (United States)

    Ditzler, Gregory; Polikar, Robi; Rosen, Gail

    2015-09-01

    Recent advances in machine learning, specifically in deep learning with neural networks, has made a profound impact on fields such as natural language processing, image classification, and language modeling; however, feasibility and potential benefits of the approaches to metagenomic data analysis has been largely under-explored. Deep learning exploits many layers of learning nonlinear feature representations, typically in an unsupervised fashion, and recent results have shown outstanding generalization performance on previously unseen data. Furthermore, some deep learning methods can also represent the structure in a data set. Consequently, deep learning and neural networks may prove to be an appropriate approach for metagenomic data. To determine whether such approaches are indeed appropriate for metagenomics, we experiment with two deep learning methods: i) a deep belief network, and ii) a recursive neural network, the latter of which provides a tree representing the structure of the data. We compare these approaches to the standard multi-layer perceptron, which has been well-established in the machine learning community as a powerful prediction algorithm, though its presence is largely missing in metagenomics literature. We find that traditional neural networks can be quite powerful classifiers on metagenomic data compared to baseline methods, such as random forests. On the other hand, while the deep learning approaches did not result in improvements to the classification accuracy, they do provide the ability to learn hierarchical representations of a data set that standard classification methods do not allow. Our goal in this effort is not to determine the best algorithm in terms accuracy-as that depends on the specific application-but rather to highlight the benefits and drawbacks of each of the approach we discuss and provide insight on how they can be improved for predictive metagenomic analysis.

  2. Re-examining "temporal niche".

    Science.gov (United States)

    Smarr, Benjamin L; Schwartz, Michael D; Wotus, Cheryl; de la Iglesia, Horacio O

    2013-07-01

    The circadian system temporally organizes physiology and behavior throughout the 24-h day. At the core of this organization lies a network of multiple circadian oscillators located within the central nervous system as well as in virtually every peripheral organ. These oscillators define a 24-h temporal landscape of mutually interacting circadian rhythms that is known as the temporal niche of a species. This temporal niche is constituted by the collective phases of all biological rhythms emerging from this multi-oscillatory system. We review evidence showing that under different environmental conditions, this system can adopt different harmonic configurations. Thus, the classic chronobiological approach of searching for "the" circadian phase of an animal-typically by studying circadian rhythms of locomotor activity-represents a narrow look into the circadian system of an animal. We propose that the study of hormonal rhythms may lead to a more insightful assessment of a species' temporal niche.

  3. ROPAS: Cross-Layer Cognitive Architecture for Mobile UWB Networks

    Institute of Scientific and Technical Information of China (English)

    Chittabrata Ghosh; Bin Xie; Dharma P. Agrawal

    2008-01-01

    The allocation of bandwidth to unlicensed users, without significantly increasing the interference on the existing licensed users, is a challenge for Ultra Wideband (UWB) networks. Our research work presents a novel Rake Optimization and Power Aware Scheduling (ROPAS) architecture for UWB networks. Since UWB communication is rich in multipath effects, a Rake receiver is used for path diversity. Our idea of developing an optimized Rake receiver in our ROPA Sarchitecture stems from the intention of reducing the computation complexity in terms of the number of multiplications and additions needed for the weight derivation attached to each finger of the Rake receiver. Our proposed work uses the Cognitive Radio (CR) for dynamic channel allocation among the requesting users while limiting the average power transmitted in each sub-band. In our proposed novel ROPAS architecture, dynamic channel allocation is achieved by a CR-based cross-layer design between the PHY and Medium Access Control (MAC) layers. Additionally, the maximum number of parallel transmissions within a frame interval is formulated as an optimization problem. This optimal decision is based on the distance parameter between a transmitter-receiver pair, bit error rate and frequency of request by a particular application. Moreover, the optimization problem improvises a differentiation technique among the requesting applications by incorporating priority levels among user applications. This provides fairness and higher throughput among services with varying power constraint and data rates required for a UWB network.

  4. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-05-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other’s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network’s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network’s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. Furthermore, with the use of fractional cooperation, the average recovery overhead is further reduced by around 5% for the primary network and around 10% for the secondary network when a high fractional cooperation probability is used.

  5. Ecological niche of plant pathogens

    Directory of Open Access Journals (Sweden)

    Ecaterina Fodor

    2011-02-01

    Full Text Available Disease ecology is a new approach to the understanding of the spread and dynamics of pathogens in natural and man-made environments. Defining and describing the ecological niche of the pathogens is one of the major tasks for ecological theory, as well as for practitioners preoccupied with the control and forecasting of established and emerging diseases. Niche theory has been periodically revised, not including in an explicit way the pathogens. However, many progresses have been achieved in niche modeling of disease spread, but few attempts were made to construct a theoretical frame for the ecological niche of pathogens. The paper is a review of the knowledge accumulated during last decades in the niche theory of pathogens and proposes an ecological approach in research. It quest for new control methods in what concerns forest plant pathogens, with a special emphasis on fungi like organisms of the genus Phytophthora. Species of Phytophthora are the most successful plant pathogens of the moment, affecting forest and agricultural systems worldwide, many of them being invasive alien organisms in many ecosystems. The hyperspace of their ecological niche is defined by hosts, environment and human interference, as main axes. To select most important variables within the hyperspace, is important for the understanding of the complex role of pathogens in the ecosystems as well as for control programs. Biotic relationships within ecosystem of host-pathogen couple are depicted by ecological network and specific metrics attached to this. The star shaped network is characterized by few high degree nodes, by short path lengths and relatively low connectivity, premises for a rapid disturbance spread.

  6. Ecological niche of plant pathogens

    Directory of Open Access Journals (Sweden)

    Ecaterina Fodor

    2011-06-01

    Full Text Available Disease ecology is a new approach to the understanding of the spread and dynamics of pathogens in natural and man-made environments. Defining and describing the ecological niche of the pathogens is one of the major tasks for ecological theory, as well as for practitioners preoccupied with the control and forecasting of established and emerging diseases. Niche theory has been periodically revised, not including in an explicit way the pathogens. However, many progresses have been achieved in niche modeling of disease spread, but few attempts were made to construct a theoretical frame for the ecological niche of pathogens. The paper is a review of the knowledge accumulated during last decades in the niche theory of pathogens and proposes an ecological approach in research. It quest for new control methods in what concerns forest plant pathogens, with a special emphasis on fungi like organisms of the genus Phytophthora. Species of Phytophthora are the most successful plant pathogens of the moment, affecting forest and agricultural systems worldwide, many of them being invasive alien organisms in many ecosystems. The hyperspace of their ecological niche is defined by hosts, environment and human interference, as main axes. To select most important variables within the hyperspace, is important the understanding of the complex role of pathogens in the ecosystems as well as for control programs. Biotic relationships within ecosystem of host-pathogen couple are depicted by ecological network and specific metrics attached to this. The star shaped network is characterized by few high degree nodes, by short path lengths and relatively low connectivity, premises for a rapid disturbance spread. 

  7. The probabilistic niche model reveals substantial variation in the niche structure of empirical food webs.

    Science.gov (United States)

    Williams, Richard J; Purves, Drew W

    2011-09-01

    The structure of food webs, complex networks of interspecies feeding interactions, plays a crucial role in ecosystem resilience and function, and understanding food web structure remains a central problem in ecology. Previous studies have shown that key features of empirical food webs can be reproduced by low-dimensional "niche" models. Here we examine the form and variability of food web niche structure by fitting a probabilistic niche model to 37 empirical food webs, a much larger number of food webs than used in previous studies. The model relaxes previous assumptions about parameter distributions and hierarchy and returns parameter estimates for each species in each web. The model significantly outperforms previous niche model variants and also performs well for several webs where a body-size-based niche model performs poorly, implying that traits other than body size are important in structuring these webs' niche space. Parameter estimates frequently violate previous models' assumptions: in 19 of 37 webs, parameter values are not significantly hierarchical, 32 of 37 webs have nonuniform niche value distributions, and 15 of 37 webs lack a correlation between niche width and niche position. Extending the model to a two-dimensional niche space yields networks with a mixture of one- and two-dimensional niches and provides a significantly better fit for webs with a large number of species and links. These results confirm that food webs are strongly niche-structured but reveal substantial variation in the form of the niche structuring, a result with fundamental implications for ecosystem resilience and function.

  8. Physical Layer Design in Wireless Sensor Networks for Fading Mitigation

    Directory of Open Access Journals (Sweden)

    Nuo Chen

    2013-09-01

    Full Text Available This paper presents the theoretical analysis, simulation results and suggests design in digital technology of a physical layer for wireless sensor networks. The proposed design is able to mitigate fading inside communication channel. To mitigate fading the chip interleaving technique is proposed. For the proposed theoretical model of physical layer, a rigorous mathematical analysis is conducted, where all signals are presented and processed in discrete time domain form which is suitable for further direct processing necessary for devices design in digital technology. Three different channels are used to investigate characteristics of the physical layer: additive white Gaussian noise channel (AWGN, AWG noise and flat fading channel and AWG noise and flat fading channel with interleaver and deinterleaver blocks in the receiver and transmitter respectively. Firstly, the mathematical model of communication system representing physical layer is developed based on the discrete time domain signal representation and processing. In the existing theory, these signals and their processing are represented in continuous time form, which is not suitable for direct implementation in digital technology. Secondly, the expressions for the probability of chip, symbol and bit error are derived. Thirdly, the communication system simulators are developed in MATLAB. The simulation results confirmed theoretical findings.

  9. Cross Layer Interference Management in Wireless Biomedical Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil G. Spanakis

    2014-04-01

    Full Text Available Interference, in wireless networks, is a central phenomenon when multiple uncoordinated links share a common communication medium. The study of the interference channel was initiated by Shannon in 1961 and since then this problem has been thoroughly elaborated at the Information theoretic level but its characterization still remains an open issue. When multiple uncoordinated links share a common medium the effect of interference is a crucial limiting factor for network performance. In this work, using cross layer cooperative communication techniques, we study how to compensate interference in the context of wireless biomedical networks, where many links transferring biomedical or other health related data may be formed and suffer from all other interfering transmissions, to allow successful receptions and improve the overall network performance. We define the interference limited communication range to be the critical communication region around a receiver, with a number of surrounding interfering nodes, within which a successful communication link can be formed. Our results indicate that we can achieve more successful transmissions by adapting the transmission rate and power, to the path loss exponent, and the selected mode of the underline communication technique allowing interference mitigation and when possible lower power consumption and increase achievable transmission rates.

  10. Why do niches develop in Caesarean uterine scars? Hypotheses on the aetiology of niche development.

    Science.gov (United States)

    Vervoort, A J M W; Uittenbogaard, L B; Hehenkamp, W J K; Brölmann, H A M; Mol, B W J; Huirne, J A F

    2015-12-01

    Caesarean section (CS) results in the occurrence of the phenomenon 'niche'. A 'niche' describes the presence of a hypoechoic area within the myometrium of the lower uterine segment, reflecting a discontinuation of the myometrium at the site of a previous CS. Using gel or saline instillation sonohysterography, a niche is identified in the scar in more than half of the women who had had a CS, most with the uterus closed in one single layer, without closure of the peritoneum. An incompletely healed scar is a long-term complication of the CS and is associated with more gynaecological symptoms than is commonly acknowledged. Approximately 30% of women with a niche report spotting at 6-12 months after their CS. Other reported symptoms in women with a niche are dysmenorrhoea, chronic pelvic pain and dyspareunia. Given the association between a niche and gynaecological symptoms, obstetric complications and potentially with subfertility, it is important to elucidate the aetiology of niche development after CS in order to develop preventive strategies. Based on current published data and our observations during sonographic, hysteroscopic and laparoscopic evaluations of niches we postulate some hypotheses on niche development. Possible factors that could play a role in niche development include a very low incision through cervical tissue, inadequate suturing technique during closure of the uterine scar, surgical interventions that increase adhesion formation or patient-related factors that impair wound healing or increase inflammation or adhesion formation.

  11. Designing Two-Layer Optical Networks with Statistical Multiplexing

    Science.gov (United States)

    Addis, B.; Capone, A.; Carello, G.; Malucelli, F.; Fumagalli, M.; Pedrin Elli, E.

    The possibility of adding multi-protocol label switching (MPLS) support to transport networks is considered an important opportunity by telecom carriers that want to add packet services and applications to their networks. However, the question that arises is whether it is suitable to have MPLS nodes just at the edge of the network to collect packet traffic from users, or also to introduce MPLS facilities on a subset of the core nodes in order to exploit packet switching flexibility and multiplexing, thus providing induction of a better bandwidth allocation. In this article, we address this complex decisional problem with the support of a mathematical programming approach. We consider two-layer networks where MPLS is overlaid on top of transport networks-synchronous digital hierarchy (SDH) or wavelength division multiplexing (WDM)-depending on the required link speed. The discussions' decisions take into account the trade-off between the cost of adding MPLS support in the core nodes and the savings in the link bandwidth allocation due to the statistical multiplexing and the traffic grooming effects induced by MPLS nodes. The traffic matrix specifies for each point-to-point request a pair of values: a mean traffic value and an additional one. Using this traffic model, the effect of statistical multiplexing on a link allows the allocation of a capacity equal to the sum of all the mean values of the traffic demands routed on the link and only the highest additional one. The proposed approach is suitable to solve real instances in reasonable time.

  12. STUDY ON STRATEGY OF DYNAMIC JOINT ROUTING AND RESOURCE ALLOCATION IN LAYERED OPTICAL TRANSPORT NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Su Yang; Xu Zhanqi; Zhao Ruiqin; Liu Zengji

    2008-01-01

    A layered network model for optical transport networks is proposed in this paper, which involves Internet Protocol (IP), Synchronous Digital Hierarchy (SDH) and Wavelength Division Multiplexing (WDM) layers. The strategy of Dynamic Joint Routing and Resource Allocation (DJRRA) and its algorithm description are also presented for the proposed layered network model. DJRRA optimizes the bandwidth usage of interface links between different layers and the logic links inside all layers. The simulation results show that DJRRA can reduce the blocking probability and increase network throughput effectively, which is in contrast to the classical separate sequential routing and resource allocation solutions.

  13. Layer Winner-Take-All neural networks based on existing competitive structures.

    Science.gov (United States)

    Chen, C M; Yang, J F

    2000-01-01

    In this paper, we propose generalized layer winner-take-all (WTA) neural networks based on the suggested full WTA networks, which can be extended from any existing WTA structure with a simple weighted-and-sum neuron. With modular regularity and local connection, the layer WTA network in either hierarchical or recursive structure is suitable for a large number of competitors. The complexity and convergence performances of layer and direct WTA neural networks are analyzed. Simulation results and theoretical analyzes verify that the layer WTA neural networks with extendibility outperform their original direct WTA structures in aspects of low complexity and fast convergence.

  14. Cross-Layer Design Approach for Power Control in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    A. Sarfaraz Ahmed

    2015-03-01

    Full Text Available In mobile ad hoc networks, communication among mobile nodes occurs through wireless medium The design of ad hoc network protocol, generally based on a traditional “layered approach”, has been found ineffective to deal with receiving signal strength (RSS-related problems, affecting the physical layer, the network layer and transport layer. This paper proposes a design approach, deviating from the traditional network design, toward enhancing the cross-layer interaction among different layers, namely physical, MAC and network. The Cross-Layer design approach for Power control (CLPC would help to enhance the transmission power by averaging the RSS values and to find an effective route between the source and the destination. This cross-layer design approach was tested by simulation (NS2 simulator and its performance over AODV was found to be better.

  15. Supervised Learning of Logical Operations in Layered Spiking Neural Networks with Spike Train Encoding

    CERN Document Server

    Grüning, André

    2011-01-01

    Few algorithms for supervised training of spiking neural networks exist that can deal with patterns of multiple spikes, and their computational properties are largely unexplored. We demonstrate in a set of simulations that the ReSuMe learning algorithm can be successfully applied to layered neural networks. Input and output patterns are encoded as spike trains of multiple precisely timed spikes, and the network learns to transform the input trains into target output trains. This is done by combining the ReSuMe learning algorithm with multiplicative scaling of the connections of downstream neurons. We show in particular that layered networks with one hidden layer can learn the basic logical operations, including Exclusive-Or, while networks without hidden layer cannot, mirroring an analogous result for layered networks of rate neurons. While supervised learning in spiking neural networks is not yet fit for technical purposes, exploring computational properties of spiking neural networks advances our understand...

  16. A physical layer perspective on access network sharing

    Science.gov (United States)

    Pfeiffer, Thomas

    2015-12-01

    Unlike in copper or wireless networks, there is no sharing of resources in fiber access networks yet, other than bit stream access or cable sharing, in which the fibers of a cable are let to one or multiple operators. Sharing optical resources on a single fiber among multiple operators or different services has not yet been applied. While this would allow for a better exploitation of installed infrastructures, there are operational issues which still need to be resolved, before this sharing model can be implemented in networks. Operating multiple optical systems and services over a common fiber plant, autonomously and independently from each other, can result in mutual distortions on the physical layer. These distortions will degrade the performance of the involved systems, unless precautions are taken in the infrastructure hardware to eliminate or to reduce them to an acceptable level. Moreover, the infrastructure needs to be designed such as to support different system technologies and to ensure a guaranteed quality of the end-to-end connections. In this paper, suitable means are proposed to be introduced in fiber access infrastructures that will allow for shared utilization of the fibers while safeguarding the operational needs and business interests of the involved parties.

  17. Null Models and Modularity Based Community Detection in Multi-Layer Networks

    CERN Document Server

    Paul, Subhadeep

    2016-01-01

    Multi-layer networks are networks on a set of entities (nodes) with multiple types of relations (edges) among them where each type of relation/interaction is represented as a network layer. As with single layer networks, community detection is an important task in multi-layer networks. A large group of popular community detection methods in networks are based on optimizing a quality function known as the modularity score, which is a measure of presence of modules or communities in networks. Hence a first step in community detection is defining a suitable modularity score that is appropriate for the network in question. Here we introduce several multi-layer network modularity measures under different null models of the network, motivated by empirical observations in networks from a diverse field of applications. In particular we define the multi-layer configuration model, the multi-layer expected degree model and their various modifications as null models for multi-layer networks to derive different modulariti...

  18. Ecological niches of open ocean phytoplankton taxa

    DEFF Research Database (Denmark)

    Brun, Philipp Georg; Vogt, Meike; Payne, Mark;

    2015-01-01

    We characterize the realized ecological niches of 133 phytoplankton taxa in the open ocean based on observations from the MAREDAT initiative and a statistical species distribution model (MaxEnt). The models find that the physical conditions (mixed layer depth, temperature, light) govern large...... conditions in the open ocean. Our estimates of the realized niches roughly match the predictions of Reynolds' C-S-R model for the global ocean, namely that taxa classified as nutrient stress tolerant have niches at lower nutrient and higher irradiance conditions than light stress tolerant taxa. Yet...

  19. Integrating cross-frequency and within band functional networks in resting-state MEG: A multi-layer network approach.

    Science.gov (United States)

    Tewarie, Prejaas; Hillebrand, Arjan; van Dijk, Bob W; Stam, Cornelis J; O'Neill, George C; Van Mieghem, Piet; Meier, Jil M; Woolrich, Mark W; Morris, Peter G; Brookes, Matthew J

    2016-11-15

    Neuronal oscillations exist across a broad frequency spectrum, and are thought to provide a mechanism of interaction between spatially separated brain regions. Since ongoing mental activity necessitates the simultaneous formation of multiple networks, it seems likely that the brain employs interactions within multiple frequency bands, as well as cross-frequency coupling, to support such networks. Here, we propose a multi-layer network framework that elucidates this pan-spectral picture of network interactions. Our network consists of multiple layers (frequency-band specific networks) that influence each other via inter-layer (cross-frequency) coupling. Applying this model to MEG resting-state data and using envelope correlations as connectivity metric, we demonstrate strong dependency between within layer structure and inter-layer coupling, indicating that networks obtained in different frequency bands do not act as independent entities. More specifically, our results suggest that frequency band specific networks are characterised by a common structure seen across all layers, superimposed by layer specific connectivity, and inter-layer coupling is most strongly associated with this common mode. Finally, using a biophysical model, we demonstrate that there are two regimes of multi-layer network behaviour; one in which different layers are independent and a second in which they operate highly dependent. Results suggest that the healthy human brain operates at the transition point between these regimes, allowing for integration and segregation between layers. Overall, our observations show that a complete picture of global brain network connectivity requires integration of connectivity patterns across the full frequency spectrum.

  20. Multi-Layered Neural Networks Infer Fundamental Stellar Parameters

    CERN Document Server

    Verma, Kuldeep; Bhattacharya, Jishnu; Antia, H M; Krishnamurthy, Ganapathy

    2016-01-01

    The advent of space-based observatories such as CoRoT and Kepler has enabled the testing of our understanding of stellar evolution on thousands of stars. Evolutionary models typically require five input parameters, the mass, initial Helium abundance, initial metallicity, mixing-length (assumed to be constant over time) and the age to which the star must be evolved. These parameters are also very useful in characterizing the associated planets and in studying galactic archaeology. How to obtain the parameters from observations rapidly and accurately, specifically in the context of surveys of thousands of stars, is an outstanding question, one that has eluded straightforward resolution. For a given star, we typically measure the effective temperature and surface metallicity spectroscopically and low-degree oscillation frequencies through space observatories. Here we demonstrate that statistical learning, using multi-layered neural networks, is successful in determining the evolutionary parameters based on spect...

  1. Optimal Decoding Algorithm for Asynchronous Physical-Layer Network Coding

    CERN Document Server

    Lu, Lu; Zhang, Shengli

    2011-01-01

    A key issue in physical-layer network coding (PNC) is how to deal with the asynchrony between signals transmitted by multiple transmitters. That is, symbols transmitted by different transmitters could arrive at the receiver with symbol misalignment as well as relative carrier-phase offset. In this paper, 1) we propose and investigate a general framework based on belief propagation (BP) that can effectively deal with symbol and phase asynchronies; 2) we show that for BPSK and QPSK modulations, our BP method can significantly reduce the SNR penalty due to asynchrony compared with prior methods; 3) we find that symbol misalignment makes the system performance less sensitive and more robust against carrier-phase offset. Observation 3) has the following practical implication. It is relatively easier to control symbol timing than carrier-phase offset. Our results indicate that if we could control the symbol offset in PNC, it would actually be advantageous to deliberately introduce symbol misalignment to desensitize...

  2. A cross-layer communication framework for wireless networked control systems

    NARCIS (Netherlands)

    Israr, N.; Scanlon, W.G.; Irwin, G.W.

    2009-01-01

    This paper presents a robust, dynamic cross-layer wireless communication architecture for wireless networked control systems. Each layer in the proposed protocol architecture contributes to the overall goal of reliable, energy efficient communication. The protocol stack also features a

  3. Partial disjoint path for multi-layer protection in GMPLS networks

    OpenAIRE

    Urra i Fàbregas, Anna; Calle Ortega, Eusebi; Marzo i Lázaro, Josep Lluís

    2005-01-01

    In this paper, different recovery methods applied at different network layers and time scales are used in order to enhance the network reliability. Each layer deploys its own fault management methods. However, current recovery methods are applied to only a specific layer. New protection schemes, based on the proposed partial disjoint path algorithm, are defined in order to avoid protection duplications in a multi-layer scenario. The new protection schemes also encompass shared segment backup ...

  4. Algebraic Approach to Physical-Layer Network Coding

    CERN Document Server

    Feng, Chen; Kschischang, Frank R

    2011-01-01

    The problem of designing physical-layer network coding (PNC) schemes via lattice partitions is considered. Building on the compute-and-forward (C&F) relaying strategy of Nazer and Gastpar, who demonstrated its asymptotic gain using information-theoretic tools, an algebraic approach is taken to show its potential in practical, non-asymptotic, settings. A general framework is developed for studying lattice-partition-based PNC schemes---called lattice network coding (LNC) schemes for short---by making a direct connection between C&F and module theory. In particular, a generic LNC scheme is presented that makes no assumptions on the underlying lattice partition. C&F is re-interpreted in this framework, and several generalized constructions of LNC schemes are given based on the generic LNC scheme. Next, the error performance of LNC schemes is analyzed, with a particular focus on hypercube-shaped LNC schemes. The error probability of this class of LNC schemes is related to certain geometric parameters o...

  5. Circadian KaiC phosphorylation: a multi-layer network.

    Directory of Open Access Journals (Sweden)

    Congxin Li

    2009-11-01

    Full Text Available Circadian KaiC phosphorylation in cyanobacteria reconstituted in vitro recently initiates a series of studies experimentally and theoretically to explore its mechanism. In this paper, we report a dynamic diversity in hexameric KaiC phosphoforms using a multi-layer reaction network based on the nonequivalence of the dual phosphorylation sites (S431 and T432 in each KaiC subunit. These diverse oscillatory profiles can generate a kaleidoscopic phase modulation pattern probably responsible for the genome-wide transcription rhythms directly and/or indirectly in cyanobacteria. Particularly, our model reveals that a single KaiC hexamer is an energy-based, phosphorylation-dependent and self-regulated circadian oscillator modulated by KaiA and KaiB. We suggest that T432 is the main regulator for the oscillation amplitude, while S431 is the major phase regulator. S431 and T432 coordinately control the phosphorylation period. Robustness of the Kai network was examined by mixing samples in different phases, and varying protein concentrations and temperature. Similar results were obtained regardless of the deterministic or stochastic method employed. Therefore, the dynamic diversities and robustness of Kai oscillator make it a qualified core pacemaker that controls the cellular processes in cyanobacteria pervasively and accurately.

  6. Extraverts Have Larger Social Network Layers But Do Not Feel Emotionally Closer to Individuals at Any Layer

    NARCIS (Netherlands)

    Pollet, Thomas V.; Roberts, Sam G. B.; Dunbar, Robin I. M.

    2011-01-01

    Previous studies showed that extraversion influences social network size. However, it is unclear how extraversion affects the size of different layers of the network, and how extraversion relates to the emotional intensity of social relationships. We examined the relationships between extraversion,

  7. A multi-layered network of the (Colombian) sovereign securities market

    NARCIS (Netherlands)

    Renneboog, Luc; Leon Rincon, Carlos; Pérez, Jhonatan; Alexandrova-Kabadjova, Bilana; Diehl, Martin; Heuver, Richard; Martinez-Jaramillo, Serafín

    2015-01-01

    We study the network of Colombian sovereign securities settlements. With data from the settlement market infrastructure we study financial institutions’ transactions from three different trading and registering individual networks that we combine into a multi-layer network. Examining this network of

  8. Self-Organized Information Processing in Neuronal Networks: Replacing Layers in Deep Networks by Dynamics

    Science.gov (United States)

    Kirst, Christoph

    It is astonishing how the sub-parts of a brain co-act to produce coherent behavior. What are mechanism that coordinate information processing and communication and how can those be changed flexibly in order to cope with variable contexts? Here we show that when information is encoded in the deviations around a collective dynamical reference state of a recurrent network the propagation of these fluctuations is strongly dependent on precisely this underlying reference. Information here 'surfs' on top of the collective dynamics and switching between states enables fast and flexible rerouting of information. This in turn affects local processing and consequently changes in the global reference dynamics that re-regulate the distribution of information. This provides a generic mechanism for self-organized information processing as we demonstrate with an oscillatory Hopfield network that performs contextual pattern recognition. Deep neural networks have proven to be very successful recently. Here we show that generating information channels via collective reference dynamics can effectively compress a deep multi-layer architecture into a single layer making this mechanism a promising candidate for the organization of information processing in biological neuronal networks.

  9. C-LOAD POWER CONTROL PROTOCOL-CROSS-LAYER DESIGN OF A NETWORK LAYER LOAD POWER CONTROL PROTOCOL IN WIRELESS AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    A. Arivoli

    2014-01-01

    Full Text Available In wireless ad hoc network scenario, Cross-layer design is emerging, important in wireless ad hoc network and the power control methods. Power control is the intelligent selection of transmit power in a communication to achieve the better performance within the system. Cross-layer is used to sharing the information between the layers. Physical to Transport layer information are shared in this protocol, due to this cross-layering is designed to optimize the power control. CLD using LOADPOWER (LOADPOW control protocol is reduce the overall end-end delay and the energy consumption using transmission power. The novelty of this work deals with both low and high transmission power control methodologies. So many power control schemes are dealt in MAC layer but this work, Power control protocol was done in network layer and it plays a vital role. A MAC approach to power control only does a local optimization whereas network layer is capable of global optimization. Simulation was done in NS-2 simulator with the performance metrics as improved throughput, energy consumption and end-end delay. The key concept is to improve the throughput, saves energy by sending all the packets with optimal transmission power according to the network load. A comparison of few protocols with Load Power Control Protocol (LPCP was implemented and got the better performances using NS-2 simulator.

  10. 基于生态位的网络信息传播噪声分析%Network Information Transmission Noises Analysis Based on the Ecological Niche

    Institute of Scientific and Technical Information of China (English)

    原小玲; 吉萍

    2012-01-01

    信息的不同生态位都可以产生噪声,包括信源噪声、信道噪声与信宿噪声。本文对不同生态位的噪声、不同的产生原因进行了分析。%Information on different ecological niches can produce noises, including noises from information source , from information channel and from ferent information ecological niche. information sink. The paper analyzes the reasons of the noises produced in different information ecological niche.

  11. Mesoscopic structures reveal the network between the layers of multiplex data sets

    Science.gov (United States)

    Iacovacci, Jacopo; Wu, Zhihao; Bianconi, Ginestra

    2015-10-01

    Multiplex networks describe a large variety of complex systems, whose elements (nodes) can be connected by different types of interactions forming different layers (networks) of the multiplex. Multiplex networks include social networks, transportation networks, or biological networks in the cell or in the brain. Extracting relevant information from these networks is of crucial importance for solving challenging inference problems and for characterizing the multiplex networks microscopic and mesoscopic structure. Here we propose an information theory method to extract the network between the layers of multiplex data sets, forming a "network of networks." We build an indicator function, based on the entropy of network ensembles, to characterize the mesoscopic similarities between the layers of a multiplex network, and we use clustering techniques to characterize the communities present in this network of networks. We apply the proposed method to study the Multiplex Collaboration Network formed by scientists collaborating on different subjects and publishing in the American Physical Society journals. The analysis of this data set reveals the interplay between the collaboration networks and the organization of knowledge in physics.

  12. Mesoscopic structures reveal the network between the layers of multiplex data sets.

    Science.gov (United States)

    Iacovacci, Jacopo; Wu, Zhihao; Bianconi, Ginestra

    2015-10-01

    Multiplex networks describe a large variety of complex systems, whose elements (nodes) can be connected by different types of interactions forming different layers (networks) of the multiplex. Multiplex networks include social networks, transportation networks, or biological networks in the cell or in the brain. Extracting relevant information from these networks is of crucial importance for solving challenging inference problems and for characterizing the multiplex networks microscopic and mesoscopic structure. Here we propose an information theory method to extract the network between the layers of multiplex data sets, forming a "network of networks." We build an indicator function, based on the entropy of network ensembles, to characterize the mesoscopic similarities between the layers of a multiplex network, and we use clustering techniques to characterize the communities present in this network of networks. We apply the proposed method to study the Multiplex Collaboration Network formed by scientists collaborating on different subjects and publishing in the American Physical Society journals. The analysis of this data set reveals the interplay between the collaboration networks and the organization of knowledge in physics.

  13. Exploring multi-layer flow network of international trade based on flow distances

    CERN Document Server

    Shen, Bin; Zheng, Qiuhua

    2015-01-01

    Based on the approach of flow distances, the international trade flow system is studied from the perspective of multi-layer flow network. A model of multi-layer flow network is proposed for modelling and analyzing multiple types of flows in flow systems. Then, flow distances are introduced, and symmetric minimum flow distance is presented. Subsequently, we discuss the establishment of the multi-layer flow networks of international trade from two coupled viewpoints, i.e., the viewpoint of commodity flow and that of money flow. Thus, the multi-layer flow networks of international trade is explored. First, trading "trophic levels" are adopted to depict positions that economies occupied in the flow network. We find that the distributions of trading "trophic levels" have the similar clustering pattern for different types of commodity, and there are some regularities between money flow network and commodity flow network. Second, we find that active and competitive countries trade a wide spectrum of products, while ...

  14. Cardiac stem cell niches

    Directory of Open Access Journals (Sweden)

    Annarosa Leri

    2014-11-01

    Full Text Available The critical role that stem cell niches have in cardiac homeostasis and myocardial repair following injury is the focus of this review. Cardiac niches represent specialized microdomains where the quiescent and activated state of resident stem cells is regulated. Alterations in niche function with aging and cardiac diseases result in abnormal sites of cardiomyogenesis and inadequate myocyte formation. The relevance of Notch1 signaling, gap-junction formation, HIF-1α and metabolic state in the regulation of stem cell growth and differentiation within the cardiac niches are discussed.

  15. Path finding using the multi-layer network description language

    NARCIS (Netherlands)

    Dijkstra, F.; van der Ham, J.; Grosso, P.; de Laat, C.

    2008-01-01

    Research networks are providing their users with dedicated network connections. Users want these connects to go through different domains, so the research networks are challenged to find valid network connections through multiple domains. The challenge arises if the different network domains use dif

  16. Integrated Survivability Strategies of IP/GMPLS/Optical Multi-layer Network

    Institute of Scientific and Technical Information of China (English)

    ZHAO Ji-jun; JI Yue-feng; XU Da-xiong

    2003-01-01

    In last decade,due to that the popularity of the internet, data-central traffic kept growing,some emerging networking requirements have been posed on the today's telecommunication networks,especially in the area of network survivability.Obviously,as a key networking problem,network reliability will be more and more important.The integration of different technologies such as ATM,SDH,and WDM in multilayer transport networks raises many questions regarding the coordination of the individual network layers.This problem is referred as multilayer network survivability.The integrated multilayer network survivability is investingated as well as the representation of an interworking strategy between different single layer survivability schemes in IP via generalized multi-protocol label switching over optical network.

  17. Learning text representation using recurrent convolutional neural network with highway layers

    OpenAIRE

    Wen, Ying; Zhang, Weinan; Luo, Rui; Wang, Jun

    2016-01-01

    Recently, the rapid development of word embedding and neural networks has brought new inspiration to various NLP and IR tasks. In this paper, we describe a staged hybrid model combining Recurrent Convolutional Neural Networks (RCNN) with highway layers. The highway network module is incorporated in the middle takes the output of the bi-directional Recurrent Neural Network (Bi-RNN) module in the first stage and provides the Convolutional Neural Network (CNN) module in the last stage with the i...

  18. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    Energy Technology Data Exchange (ETDEWEB)

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  19. Two-layer networked learning control using self-learning fuzzy control algorithms

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Since the existing single-layer networked control systems have some inherent limitations and cannot effectively handle the problems associated with unreliable networks, a novel two-layer networked learning control system (NLCS) is proposed in this paper. Its lower layer has a number of local controllers that are operated independently, and its upper layer has a learning agent that communicates with the independent local controllers in the lower layer. To implement such a system, a packet-discard strategy is firstly developed to deal with network-induced delay and data packet loss. A cubic spline interpolator is then employed to compensate the lost data. Finally, the output of the learning agent based on a novel radial basis function neural network (RBFNN) is used to update the parameters of fuzzy controllers. A nonlinear heating, ventilation and air-conditioning (HVAC) system is used to demonstrate the feasibility and effectiveness of the proposed system.

  20. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  1. Can we neglect the multi-layer structure of functional networks?

    CERN Document Server

    Zanin, Massimiliano

    2015-01-01

    Functional networks, i.e. networks representing dynamic relationships between the components of a complex system, have been instrumental for our understanding of, among others, the human brain. Due to limited data availability, the multi-layer nature of numerous functional networks has hitherto been neglected, and nodes are endowed with a single type of links even when multiple relationships coexist at different physical levels. A relevant problem is the assessment of the benefits yielded by studying a multi-layer functional network, against the simplicity guaranteed by the reconstruction and use of the corresponding single layer projection. Here, I tackle this issue by using as a test case, the functional network representing the dynamics of delay propagation through European airports. Neglecting the multi-layer structure of a functional network has dramatic consequences on our understanding of the underlying system, a fact to be taken into account when a projection is the only available information.

  2. High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks

    Science.gov (United States)

    2013-08-26

    hoc networks ( MANETS ) under practical assumptions. Several problems were posed and solved that provide insight into when and how interference alignment...REPORT High Throughput via Cross-Layer Interference Alignment for Mobile Ad Hoc Networks 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Recent...investigations into the fundamental limits of mobile ad hoc networks have produced a physical layer method for approaching their capacity. This strategy, known

  3. Purpose-Driven Communities in Multiplex Networks: Thresholding User-Engaged Layer Aggregation

    Science.gov (United States)

    2016-06-01

    category sorting (Noordin example). . . . . . . 58 ix Figure 3.14 Step 3: Community detection algorithm (Noordin example). . . . 58 Figure 3.15 Step 4...methodology on a 4-layer Biological network, in which each layer represents information from a different subset of genes or proteins. The multiplex modularity...explanation of these topological characteristics terms, see Lewis ’ book, Network science: Theory and applications [48]. 3.1.1 Noordin Top Network The

  4. A one-layer recurrent neural network for support vector machine learning.

    Science.gov (United States)

    Xia, Youshen; Wang, Jun

    2004-04-01

    This paper presents a one-layer recurrent neural network for support vector machine (SVM) learning in pattern classification and regression. The SVM learning problem is first converted into an equivalent formulation, and then a one-layer recurrent neural network for SVM learning is proposed. The proposed neural network is guaranteed to obtain the optimal solution of support vector classification and regression. Compared with the existing two-layer neural network for the SVM classification, the proposed neural network has a low complexity for implementation. Moreover, the proposed neural network can converge exponentially to the optimal solution of SVM learning. The rate of the exponential convergence can be made arbitrarily high by simply turning up a scaling parameter. Simulation examples based on benchmark problems are discussed to show the good performance of the proposed neural network for SVM learning.

  5. The Complexity of Recognition in the Single-Layered PLN Network with Feedback Connections

    Institute of Scientific and Technical Information of China (English)

    1993-01-01

    Regarding a single-layered PLN network with feedback connections as an associative memory network,the complexity of recognitions is discussed.We have the main result:if the size of the network N is m,then the complexity of recognition is an exponential function of m.The necessary condition under which the complexity of recognition is polynomial is given.

  6. Endothelial protein C receptor-expressing hematopoietic stem cells reside in the perisinusoidal niche in fetal liver.

    Science.gov (United States)

    Iwasaki, Hiroko; Arai, Fumio; Kubota, Yoshiaki; Dahl, Maria; Suda, Toshio

    2010-07-29

    Hematopoietic stem cells (HSCs) are maintained in specialized niches in adult bone marrow. However, niche and HSC maintenance mechanism in fetal liver (FL) still remains unclear. Here, we investigated the niche and the molecular mechanism of HSC maintenance in mouse FL using HSCs expressing endothelial protein C receptor (EPCR). The antiapoptotic effect of activated protein C (APC) on EPCR(+) HSCs and the expression of protease-activated receptor 1 (Par-1) mRNA in these cells suggested the involvement of the cytoprotective APC/EPCR/Par-1 pathway in HSC maintenance. Immunohistochemistry revealed that EPCR(+) cells were localized adjacent to, or integrated in, the Lyve-1(+) sinusoidal network, where APC and extracellular matrix (ECM) are abundant, suggesting that HSCs in FL were maintained in the APC- and ECM-rich perisinusoidal niche. EPCR(+) HSCs were in a relatively slow cycling state, consistent with their high expression levels of p57 and p18. Furthermore, the long-term reconstitution activity of EPCR(+) HSCs decreased significantly after short culture but not when cocultured with feeder layer of FL-derived Lyve-1(+) cells, which suggests that the maintenance of the self-renewal activity of FL HSCs largely depended on the interaction with the perisinusoidal niche. In conclusion, EPCR(+) HSCs resided in the perisinusoidal niche in mouse FL.

  7. Cross-Layer Approach to Multiuser H.264 Video Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fan Li

    2010-04-01

    Full Text Available This paper presents a novel cross-layer approach to multiuser H.264/AVC video stream transmission over wireless networks. We consider the joint optimization of three layers of the protocol stacks: the application (APP layer, the media access control (MAC layer and the physical (PHY layer. At the APP layer, the contribution of each packet to the perceptual video quality is evaluated by distortion effect of the packet loss, which is estimated by a Packet Relative Importance Index (PRII. At the MAC layer and the PHY layer, the Gilbert-Elliott (GE model is employed to describe the time-varying nature of the wireless networks. An objective function for cross-layer optimization is developed based on the layered abstracted parameters from the APP layer, the MAC layer and the PHY layer. Our goal is to maximize the perceptual quality of the video transmitted through the wireless network with constraint of the limited resources. Simulation results show that the proposed scheme performs significantly than the conventional scheduling schemes for video transmission.

  8. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...

  9. Synchronization and Inter-Layer Interactions of Noise-Driven Neural Networks.

    Science.gov (United States)

    Yuniati, Anis; Mai, Te-Lun; Chen, Chi-Ming

    2017-01-01

    In this study, we used the Hodgkin-Huxley (HH) model of neurons to investigate the phase diagram of a developing single-layer neural network and that of a network consisting of two weakly coupled neural layers. These networks are noise driven and learn through the spike-timing-dependent plasticity (STDP) or the inverse STDP rules. We described how these networks transited from a non-synchronous background activity state (BAS) to a synchronous firing state (SFS) by varying the network connectivity and the learning efficacy. In particular, we studied the interaction between a SFS layer and a BAS layer, and investigated how synchronous firing dynamics was induced in the BAS layer. We further investigated the effect of the inter-layer interaction on a BAS to SFS repair mechanism by considering three types of neuron positioning (random, grid, and lognormal distributions) and two types of inter-layer connections (random and preferential connections). Among these scenarios, we concluded that the repair mechanism has the largest effect for a network with the lognormal neuron positioning and the preferential inter-layer connections.

  10. Synchronization and Inter-Layer Interactions of Noise-Driven Neural Networks

    Science.gov (United States)

    Yuniati, Anis; Mai, Te-Lun; Chen, Chi-Ming

    2017-01-01

    In this study, we used the Hodgkin-Huxley (HH) model of neurons to investigate the phase diagram of a developing single-layer neural network and that of a network consisting of two weakly coupled neural layers. These networks are noise driven and learn through the spike-timing-dependent plasticity (STDP) or the inverse STDP rules. We described how these networks transited from a non-synchronous background activity state (BAS) to a synchronous firing state (SFS) by varying the network connectivity and the learning efficacy. In particular, we studied the interaction between a SFS layer and a BAS layer, and investigated how synchronous firing dynamics was induced in the BAS layer. We further investigated the effect of the inter-layer interaction on a BAS to SFS repair mechanism by considering three types of neuron positioning (random, grid, and lognormal distributions) and two types of inter-layer connections (random and preferential connections). Among these scenarios, we concluded that the repair mechanism has the largest effect for a network with the lognormal neuron positioning and the preferential inter-layer connections. PMID:28197088

  11. A path finding implementation for multi-layer network

    NARCIS (Netherlands)

    Dijkstra, F.; Ham, J.J. van der; Grosso, P.; Laat, C. de

    2009-01-01

    The goal of the OptIPuter project is to tightly couple research applications with dynamically allocated paths. Since OptIPuter is a multi-disciplinary project, the paths through the network often span multiple network domains, and the applications are challenged to find valid network connections thr

  12. A path finding implementation for multi-layer networks

    NARCIS (Netherlands)

    Dijkstra, F.; van der Ham, J.; Grosso, P.; de Laat, C.

    2009-01-01

    The goal of the OptIPuter project is to tightly couple research applications with dynamically allocated paths. Since OptIPuter is a multi-disciplinary project, the paths through the network often span multiple network domains, and the applications are challenged to find valid network connections thr

  13. Framework for path finding in multi-layer transport networks

    NARCIS (Netherlands)

    F. Dijkstra

    2009-01-01

    In only a few decades the use of computer networks has dramatically increased. Today, networks are ubiquitous in society: they are used for surfing, email and financial transactions. The capacity of the network has increased so much, that it is now possible to transfer massive data sets that recentl

  14. Combining multi-layered bitmap files using network specific hardware

    Science.gov (United States)

    DuBois, David H.; DuBois, Andrew J.; Davenport, Carolyn Connor

    2012-02-28

    Images and video can be produced by compositing or alpha blending a group of image layers or video layers. Increasing resolution or the number of layers results in increased computational demands. As such, the available computational resources limit the images and videos that can be produced. A computational architecture in which the image layers are packetized and streamed through processors can be easily scaled so to handle many image layers and high resolutions. The image layers are packetized to produce packet streams. The packets in the streams are received, placed in queues, and processed. For alpha blending, ingress queues receive the packetized image layers which are then z sorted and sent to egress queues. The egress queue packets are alpha blended to produce an output image or video.

  15. Object recognition using deep convolutional neural networks with complete transfer and partial frozen layers

    Science.gov (United States)

    Kruithof, Maarten C.; Bouma, Henri; Fischer, Noëlle M.; Schutte, Klamer

    2016-10-01

    Object recognition is important to understand the content of video and allow flexible querying in a large number of cameras, especially for security applications. Recent benchmarks show that deep convolutional neural networks are excellent approaches for object recognition. This paper describes an approach of domain transfer, where features learned from a large annotated dataset are transferred to a target domain where less annotated examples are available as is typical for the security and defense domain. Many of these networks trained on natural images appear to learn features similar to Gabor filters and color blobs in the first layer. These first-layer features appear to be generic for many datasets and tasks while the last layer is specific. In this paper, we study the effect of copying all layers and fine-tuning a variable number. We performed an experiment with a Caffe-based network on 1000 ImageNet classes that are randomly divided in two equal subgroups for the transfer from one to the other. We copy all layers and vary the number of layers that is fine-tuned and the size of the target dataset. We performed additional experiments with the Keras platform on CIFAR-10 dataset to validate general applicability. We show with both platforms and both datasets that the accuracy on the target dataset improves when more target data is used. When the target dataset is large, it is beneficial to freeze only a few layers. For a large target dataset, the network without transfer learning performs better than the transfer network, especially if many layers are frozen. When the target dataset is small, it is beneficial to transfer (and freeze) many layers. For a small target dataset, the transfer network boosts generalization and it performs much better than the network without transfer learning. Learning time can be reduced by freezing many layers in a network.

  16. A Relatively Optimal Cross-layer Routing Algorithm in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Yue Lu

    2011-10-01

    Full Text Available Routing in Wireless Network is challenging because of the unpredictable behavior of the medium and the proactive effect of interference. All of these factors lead to poor performance in multi-hop wireless mesh networks specially with the conventional routing. In order to exploit all the advantages that the wireless medium offers, new routing metrics must be explored. These metrics should come from across-layer approach in order to make the routing layer aware of the local issues of the underling layers and even change some parameters of the PHY layer. In the paper, we explore three primitive physical layer parameters: bite error rate(BER, interference, and transmission power. We define the metric so that the network layer can correctly find paths that offer: low levels of bite error rate ,reliability in terms of packet success rate, and relatively low power.

  17. Geometric correlations in real multiplex networks: multidimensional communities, trans-layer link prediction, and efficient navigation

    CERN Document Server

    Kleineberg, Kaj-Kolja; Serrano, M Angeles; Papadopoulos, Fragkiskos

    2016-01-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the individual layers. We find that these correlations are strong in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate: (i) the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers; (ii) accurate trans-layer link prediction, where connections in one layer can be predicted by observing the hidden geometric space of another layer; and (iii) efficient targeted navigation in the multilayer system using only local knowledge, which outperforms naviga...

  18. Frequency Assignment for Joint Aerial Layer Network High-Capacity Backbone

    Science.gov (United States)

    2017-08-11

    ARL-TR-8093•AUG 2017 US Army Research Laboratory Frequency Assignment for Joint Aerial Layer Network High-Capacity Backbone by Peng Wang and Brian...2017 US Army Research Laboratory Frequency Assignment for Joint Aerial Layer Network High-Capacity Backbone by Peng Wang and Brian Henz Computational...Rev. 8/98)    Prescribed by ANSI Std. Z39.18 August 2017 Technical Report Frequency Assignment for Joint Aerial Layer Network High-Capacity Backbone

  19. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Tom [USC; Ghani, Nasir [UNM; Boyd, Eric [UCAID

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  20. Evolution of pollination niches in a generalist plant clade.

    Science.gov (United States)

    Gómez, José María; Perfectti, Francisco; Abdelaziz, Mohamed; Lorite, Juan; Muñoz-Pajares, Antonio Jesús; Valverde, Javier

    2015-01-01

    It is widely assumed that floral diversification occurs by adaptive shifts between pollination niches. In contrast to specialized flowers, identifying pollination niches of generalist flowers is a challenge. Consequently, how generalist pollination niches evolve is largely unknown. We apply tools from network theory and comparative methods to investigate the evolution of pollination niches among generalist species belonging to the genus Erysimum. These species have similar flowers. We found that the studied species may be grouped in several multidimensional niches separated not by a shift of pollinators, but instead by quantitative variation in the relative abundance of pollinator functional groups. These pollination niches did not vary in generalization degree; we did not find any evolutionary trend toward specialization within the studied clade. Furthermore, the evolution of pollination niche fitted to a Brownian motion model without phylogenetic signal, and was characterized by frequent events of niche convergences and divergences. We presume that the evolution of Erysimum pollination niches has occurred mostly by recurrent shifts between slightly different generalized pollinator assemblages varying spatially as a mosaic and without any change in specialization degree. Most changes in pollination niches do not prompt floral divergence, a reason why adaptation to pollinators is uncommon in generalist plants. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  1. Securing Physical and network layer using SNAuth-SPMAODV with DSSS for Mobile adhoc networks in Military Scenario

    Directory of Open Access Journals (Sweden)

    D.Devi Aruna

    2012-06-01

    Full Text Available A mobile ad hoc network is an infrastructure less network, fast emerging today for deployment in variety of applications. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc networks. Particularly Denial of Service attack is one such severe attack against network and physical layer which is a challenging one to defend against in military communication environments.. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes and network layer is responsible to provide security services for both routing information and data message. This paper consider military scenarios and evaluate the performance of Security-enhanced-Multipath AODV (Ad hoc On-demand Distance Vector Routing routing protocol called SNAuth-SPMAODV (Secure Neighbor Authentication Strict Priority Multipath Ad hoc On-demand Distance Vector Routing with spread spectrum technology Direct Sequence Spread Spectrum (DSSS to defend against signal jamming denial-of-service attacks in physical layer and network layer for MANET.The protocol discovers multiple paths between sender and receiver nodes without introducing extra packets into the network and authenticates the neighbor offering robustness in a secured MANET. SNAuth-SPMAODV with DSSS is found to be a good security solution even with its known security problems. The simulation is done using network simulator Qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, Routing overhead and Average jitter.

  2. A Hybrid Networking Model for the Access Layer of the Communication Network for Distribution in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wang Hao

    2016-01-01

    Full Text Available The access layer in the communication network for distribution is an important link in the automation of smart distribution power grid. In current access layer of communication network for distribution in Chinese power grid systems, several communication methods like optical fiber, mediumvoltage carrier communication, 1.8GHz TD-LTE power private wireless network, 230MHz TD-LTE power private wireless network, public wireless network are constructed concurrently and running simultaneously in an identical power supply area. This traditional networking model will cause repeated construction and operation and maintenance difficulties in the communication network of power grid. On the basis of giving a detailed analysis of the radio link budget of TD-LTE power private wireless network in two frequencies, this paper present a multi-communication methods hybrid networking model, which gives a clear boundary for different communication methods based on the isoline with equal signal strength of the TD-LTE power private wireless network and accomplish the optimization of communication resources for distribution.

  3. A Novel Improved DSR Algorithm Based on Cross-Layer Mechanism in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Yue Lu

    2010-07-01

    Full Text Available Routing in Wireless Networks is challenging because of the unpredictable behavior of the medium and the random variations in channel condition. All of these factors lead to poor performance in multi-hop wireless mesh networks specially with the conventional routing. In order to exploit all the advantages that the wireless medium offers, new routing metrics must be explored. These metrics should come from across-layer approach in order to make the routing layer aware of the local issues of the underling layers.In this paper we investigate a new cross-layer routing metric that takes into account available bandwidth as well as the number of retransmissions, thus aiming to minimize end-to-end delay. The experimental results show that the proposed cross-layer metric improves the performance of routing in terms of end-to-end delay and network throughput by selecting paths with high available bandwidth while also avoiding areas of MAC congestion.

  4. Cross-Layer Interaction in Wireless Ad Hoc Networks: A Practical Example

    Science.gov (United States)

    Gauthier, Vincent; Marot, Michel; Becker, Monique

    This paper presents the design and the performance evaluation of a joined process between the PHY (PHYsical) layer and routing layer in multi-hop wireless ad hoc networks. This cross-layer interaction between the PHY and routing layers allows each node in an ad hoc network to evaluate the performance of each path in its routing table in terms of Bit Error Rate (BER) and to classify each path accordingly. Routing information from poor quality links are not forwarded leading to the selection of high quality links during the routing process. An implementation of our cross-layer algorithm based on Ad-hoc On-demand Distance Vector (AODV) is presented along with simulation results showing significant improvements in terms of additional throughput and lower BER. Furthermore, inherent of our mechanism's design, the network overhead introduced by routing protocols is reduced..

  5. Enhanced detectability of community structure in multilayer networks through layer aggregation

    CERN Document Server

    Taylor, Dane; Stanley, Natalie; Mucha, Peter J

    2015-01-01

    Community detection is a central pursuit for understanding the structure and function of biological, social and technological networks, and it is important to understand the fundamental limitations on detectability. Many systems are naturally represented by a multilayer network in which edges exist in multiple layers that encode different--but potentially related--types of interactions. Using random matrix theory for stochastic block models, we analyze detectability limitations for multilayer networks and find that by aggregating together similar layers, it is possible to identify structure that is undetectable in a single layer. We explore this phenomenon for several aggregation methods including summation of the layers' adjacency matrices, for which detectability limit vanishes with increasing number of layers, L, decaying as O(L^{-1/2}). Interestingly, we find a similar scaling behavior when the summation is thresholded at an optimal value, supporting the common--but not well understood--practice of thresh...

  6. Layer-crossing overhead and information spreading in multiplex social networks

    CERN Document Server

    Min, Byungjoon

    2013-01-01

    We propose and study a model of information or disease spreading on multiplex social networks, in which agents interact or communicate through multiple channels (layers), say online vs. offline, and there exists a layer-switching overhead for transmission across the interaction layers. The model is characterized by the path-dependent transmissibility over a contact, that is dynamically determined dependent on both incoming and outgoing transmission layers due to the switching overhead. We formulate a generalized theory with a mapping to deal with such a path-dependent transmissibility, and demonstrate that network multiplexity can bring about non-additive and non-monotonic effects in spreading dynamics. Our results suggest that explicit consideration of multiplexity can be crucial in realistic modeling of spreading processes on social networks in an era of ever-diversifying social interaction layers.

  7. Enhanced Detectability of Community Structure in Multilayer Networks through Layer Aggregation

    Science.gov (United States)

    Taylor, Dane; Shai, Saray; Stanley, Natalie; Mucha, Peter J.

    2016-06-01

    Many systems are naturally represented by a multilayer network in which edges exist in multiple layers that encode different, but potentially related, types of interactions, and it is important to understand limitations on the detectability of community structure in these networks. Using random matrix theory, we analyze detectability limitations for multilayer (specifically, multiplex) stochastic block models (SBMs) in which L layers are derived from a common SBM. We study the effect of layer aggregation on detectability for several aggregation methods, including summation of the layers' adjacency matrices for which we show the detectability limit vanishes as O (L-1 /2) with increasing number of layers, L . Importantly, we find a similar scaling behavior when the summation is thresholded at an optimal value, providing insight into the common—but not well understood—practice of thresholding pairwise-interaction data to obtain sparse network representations.

  8. A Survey on Cross-Layer Design Frameworks for Multimedia Applications over Wireless Networks

    CERN Document Server

    Sen, Jaydip

    2010-01-01

    In the last few years, the Internet throughput, usage and reliability have increased almost exponentially. The introduction of broadband wireless mobile ad hoc networks (MANETs) and cellular networks together with increased computational power have opened the door for a new breed of applications to be created, namely real-time multimedia applications. Delivering real-time multimedia traffic over a complex network like the Internet is a particularly challenging task since these applications have strict quality -of-service (QoS) requirements on bandwidth, delay, and delay jitter. Traditional IP-based best effort service will not be able to meet these stringent requirements. The time-varying nature of wireless channels and resource constrained wireless devices make the problem even more difficult. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer and link layer. Cross layer design is a well-known...

  9. Optimizing Airborne Networking Performance with Cross-Layer Design Approach

    Science.gov (United States)

    2009-06-01

    Padhye, and B. Zill , “Comparison of routing metrics for static multi-hop wireless networks," in ACM SIGCOMM, August 2004. [16] R. Draves, J. Padhye...and B. Zill , “Routing in multi-radio, multi-hop wireless mesh networks," in ACM MobiCom, September 2004. [17] N. Gogate, D. Chung, S. Panwar, Y

  10. Reference Architecture for Multi-Layer Software Defined Optical Data Center Networks

    Directory of Open Access Journals (Sweden)

    Casimer DeCusatis

    2015-09-01

    Full Text Available As cloud computing data centers grow larger and networking devices proliferate; many complex issues arise in the network management architecture. We propose a framework for multi-layer; multi-vendor optical network management using open standards-based software defined networking (SDN. Experimental results are demonstrated in a test bed consisting of three data centers interconnected by a 125 km metropolitan area network; running OpenStack with KVM and VMW are components. Use cases include inter-data center connectivity via a packet-optical metropolitan area network; intra-data center connectivity using an optical mesh network; and SDN coordination of networking equipment within and between multiple data centers. We create and demonstrate original software to implement virtual network slicing and affinity policy-as-a-service offerings. Enhancements to synchronous storage backup; cloud exchanges; and Fibre Channel over Ethernet topologies are also discussed.

  11. Hierarchical Supervisor and Agent Routing Algorithm in LEO/MEO Double-layered Optical Satellite Network

    Science.gov (United States)

    Li, Yongjun; Zhao, Shanghong

    2016-09-01

    A novel routing algorithm (Hierarchical Supervisor and Agent Routing Algorithm, HSARA) for LEO/MEO (low earth orbit/medium earth orbit) double-layered optical satellite network is brought forward. The so-called supervisor (MEO satellite) is designed for failure recovery and network management. LEO satellites are grouped according to the virtual managed field of MEO which is different from coverage area of MEO satellite in RF satellite network. In each LEO group, one LEO satellite which has maximal persistent link with its supervisor is called the agent. A LEO group is updated when this optical inter-orbit links between agent LEO satellite and the corresponding MEO satellite supervisor cuts off. In this way, computations of topology changes and LEO group updating can be decreased. Expense of routing is integration of delay and wavelength utilization. HSARA algorithm simulations are implemented and the results are as follows: average network delay of HSARA can reduce 21 ms and 31.2 ms compared with traditional multilayered satellite routing and single-layer LEO satellite respectively; LEO/MEO double-layered optical satellite network can cover polar region which cannot be covered by single-layered LEO satellite and throughput is 1% more than that of single-layered LEO satellite averagely. Therefore, exact global coverage can be achieved with this double-layered optical satellite network.

  12. CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks

    CERN Document Server

    Aguilar, Teck; Gauthier, Vincent; Afifi, Hossam; Wang, Chin-Liang; 10.1109/TWC.2011.060711.100480

    2012-01-01

    Cooperative relaying has been proposed as a promising transmission technique that effectively creates spatial diversity through the cooperation among spatially distributed nodes. However, to achieve efficient communications while gaining full benefits from cooperation, more interactions at higher protocol layers, particularly the MAC (Medium Access Control) and network layers, are vitally required. This is ignored in most existing articles that mainly focus on physical (PHY)-layer relaying techniques. In this paper, we propose a novel cross-layer framework involving two levels of joint design---a MAC-network cross-layer design for forwarder selection (or termed routing) and a MAC-PHY for relay selection---over symbol-wise varying channels. Based on location knowledge and contention processes, the proposed cross-layer protocol, CoopGeo, aims at providing an efficient, distributed approach to select next hops and optimal relays along a communication path. Simulation results demonstrate that CoopGeo not only ope...

  13. Process optimization of gravure printed light-emitting polymer layers by a neural network approach

    NARCIS (Netherlands)

    Michels, J.J.; Winter, S.H.P.M. de; Symonds, L.H.G.

    2009-01-01

    We demonstrate that artificial neural network modeling is a viable tool to predict the processing dependence of gravure printed light-emitting polymer layers for flexible OLED lighting applications. The (local) thickness of gravure printed light-emitting polymer (LEP) layers was analyzed using micro

  14. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Science.gov (United States)

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  15. Process optimization of gravure printed light-emitting polymer layers by a neural network approach

    NARCIS (Netherlands)

    Michels, J.J.; Winter, S.H.P.M. de; Symonds, L.H.G.

    2009-01-01

    We demonstrate that artificial neural network modeling is a viable tool to predict the processing dependence of gravure printed light-emitting polymer layers for flexible OLED lighting applications. The (local) thickness of gravure printed light-emitting polymer (LEP) layers was analyzed using

  16. Cross-Layer Designs in Coded Wireless Fading Networks with Multicast

    CERN Document Server

    Rajawat, Ketan; Giannakis, Georgios B

    2010-01-01

    A cross-layer design along with an optimal resource allocation framework is formulated for wireless fading networks, where the nodes are allowed to perform network coding. The aim is to jointly optimize end-to-end transport layer rates, network code design variables, broadcast link flows, link capacities, average power consumption, and short-term power allocation policies. As in the routing paradigm where nodes simply forward packets, the cross-layer optimization problem with network coding is non-convex in general. It is proved however, that with network coding, dual decomposition for multicast is optimal so long as the fading at each wireless link is a continuous random variable. This lends itself to provably convergent subgradient algorithms, which not only admit a layered-architecture interpretation but also optimally integrate network coding in the protocol stack. The dual algorithm is also paired with a scheme that yields near-optimal network design variables, namely multicast end-to-end rates, network ...

  17. Characterization of pore network structure in catalyst layers of polymer electrolyte fuel cells

    OpenAIRE

    El Hannach, Mohamed; Soboleva, Tatyana; Malek, Kourosh; Franco, Alejandro A.; Prat, Marc; Pauchet, Joël; Holdcroft, Steven

    2014-01-01

    International audience; We model and validate the effect of ionomer content and Pt nanoparticles on nanoporous structure of catalyst layers in polymer electrolyte fuel cells. By employing Pore network modeling technique and analytical solutions, we analyze and reproduce experimental N2-adsorption isotherms of carbon, Pt/ carbon and catalyst layers with various ionomer contents. The porous catalyst layer structures comprise of Ketjen Black carbon, Pt and Nafion ionomer. The experimental pore s...

  18. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    OpenAIRE

    Mukherjee, Amitav; Fakoorian, S. A. A.; Huang, Jing; Swindlehurst, A. Lee

    2010-01-01

    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless commu...

  19. Reciprocity in spatial evolutionary public goods game on double-layered network

    Science.gov (United States)

    Kim, Jinho; Yook, Soon-Hyung; Kim, Yup

    2016-08-01

    Spatial evolutionary games have mainly been studied on a single, isolated network. However, in real world systems, many interaction topologies are not isolated but many different types of networks are inter-connected to each other. In this study, we investigate the spatial evolutionary public goods game (SEPGG) on double-layered random networks (DRN). Based on the mean-field type arguments and numerical simulations, we find that SEPGG on DRN shows very rich interesting phenomena, especially, depending on the size of each layer, intra-connectivity, and inter-connected couplings, the network reciprocity of SEPGG on DRN can be drastically enhanced through the inter-connected coupling. Furthermore, SEPGG on DRN can provide a more general framework which includes the evolutionary dynamics on multiplex networks and inter-connected networks at the same time.

  20. A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

    Directory of Open Access Journals (Sweden)

    Syed S. Rizvi

    2009-11-01

    Full Text Available Extensive studies have been carried out for reducing the handover time of wireless mobile network at medium access control (MAC layer. However, none of them show the impact of reduced handover timeon the overall performance of wireless mobile networks. This paper presents a quantitative analysis to show the impact of reduced handover time on the performance of wireless mobile networks. The proposed quantitative model incorporates many critical performance parameters involve in reducing the handover time for wireless mobile networks. In addition, we analyze the use of active scanning technique with comparatively shorter beacon interval time in a handoff process. Our experiments verify that the activescanning can reduce the overall handover time at MAC layer if comparatively shorter beacon intervals are utilized for packet transmission. The performance measures adopted in this paper for experimental verifications are network throughput under different network loads.

  1. Cooperative Jamming for Physical Layer Security in Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Neeli R.; Prasad, Ramjee

    2012-01-01

    Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This work proposes a novel cooperative jamming mechanism for scalable networks like Wireless Sensor Networks (WSNs) which makes use of friendly interference to confuse the eavesdropper...... work as cooperative jamming sources to increase the equivocation of the eavesdropper. In this work, eavesdropper’s equivocation is compared with the main channel in terms of mutual information and secrecy capacity....

  2. Cross Layer Interference Management in Wireless Biomedical Networks

    OpenAIRE

    Spanakis, Emmanouil G.; Vangelis Sakkalis; Kostas Marias; Apostolos Traganitis

    2014-01-01

    Interference, in wireless networks, is a central phenomenon when multiple uncoordinated links share a common communication medium. The study of the interference channel was initiated by Shannon in 1961 and since then this problem has been thoroughly elaborated at the Information theoretic level but its characterization still remains an open issue. When multiple uncoordinated links share a common medium the effect of interference is a crucial limiting factor for network performance. In this wo...

  3. Coefficient of Restitution based Cross Layer Interference Aware Routing Protocol in Wireless Mesh Networks

    OpenAIRE

    V, Sarasvathi; Saha, Snehanshu; N.Ch.S.N.Iyengar; Koti, Mahalaxmi

    2015-01-01

    In Multi-Radio Multi-Channel (MRMC) Wireless Mesh Networks (WMN), Partially Overlapped Channels (POC) has been used to increase the parallel transmission. But adjacent channel interference is very severe in MRMC environment; it decreases the network throughput very badly. In this paper, we propose a Coefficient of Restitution based Cross layer Interference aware Routing protocol (CoRCiaR) to improve TCP performance in Wireless Mesh Networks. This approach comprises of two-steps: Initially, th...

  4. Layer-switching cost and optimality in information spreading on multiplex networks.

    Science.gov (United States)

    Min, Byungjoon; Gwak, Sang-Hwan; Lee, Nanoom; Goh, K-I

    2016-02-18

    We study a model of information spreading on multiplex networks, in which agents interact through multiple interaction channels (layers), say online vs. offline communication layers, subject to layer-switching cost for transmissions across different interaction layers. The model is characterized by the layer-wise path-dependent transmissibility over a contact, that is dynamically determined dependently on both incoming and outgoing transmission layers. We formulate an analytical framework to deal with such path-dependent transmissibility and demonstrate the nontrivial interplay between the multiplexity and spreading dynamics, including optimality. It is shown that the epidemic threshold and prevalence respond to the layer-switching cost non-monotonically and that the optimal conditions can change in abrupt non-analytic ways, depending also on the densities of network layers and the type of seed infections. Our results elucidate the essential role of multiplexity that its explicit consideration should be crucial for realistic modeling and prediction of spreading phenomena on multiplex social networks in an era of ever-diversifying social interaction layers.

  5. 网络层支持主机移动的研究%Research on Network Layer Host Mobility Support

    Institute of Scientific and Technical Information of China (English)

    赵阿群; 吴国新; 顾冠群

    2000-01-01

    The development of computing techniques and communication techniques and requirements of personal communication make mobile computing and wireless networks possible and indispensable. Novel network environment offers new challenges to traditional network protocols. Especially, as middle layer protocols in the network architecture,the network layer protocols cannot support host mobility because of the hierarchical addressing and routing mechanisms and static name and address binding.New functions and protocols must be added in order to support host mobility in the network layer. In this paper we summarize the impact of host mobility on network protocols ,the problems of traditional protocols to support host mobility ,the architecture and practical schemes to support host mobility in the network layer ,and the emphases ,current status and direction of network layer host mobility support.

  6. Cross-Layer Protocol Combining Tree Routing and TDMA Slotting in Wireless Sensor Networks

    Science.gov (United States)

    Bai, Ronggang; Ji, Yusheng; Lin, Zhiting; Wang, Qinghua; Zhou, Xiaofang; Qu, Yugui; Zhao, Baohua

    Being different from other networks, the load and direction of data traffic for wireless sensor networks are rather predictable. The relationships between nodes are cooperative rather than competitive. These features allow the design approach of a protocol stack to be able to use the cross-layer interactive way instead of a hierarchical structure. The proposed cross-layer protocol CLWSN optimizes the channel allocation in the MAC layer using the information from the routing tables, reduces the conflicting set, and improves the throughput. Simulations revealed that it outperforms SMAC and MINA in terms of delay and energy consumption.

  7. Inferring topologies via driving-based generalized synchronization of two-layer networks

    Science.gov (United States)

    Wang, Yingfei; Wu, Xiaoqun; Feng, Hui; Lu, Jun-an; Xu, Yuhua

    2016-05-01

    The interaction topology among the constituents of a complex network plays a crucial role in the network’s evolutionary mechanisms and functional behaviors. However, some network topologies are usually unknown or uncertain. Meanwhile, coupling delays are ubiquitous in various man-made and natural networks. Hence, it is necessary to gain knowledge of the whole or partial topology of a complex dynamical network by taking into consideration communication delay. In this paper, topology identification of complex dynamical networks is investigated via generalized synchronization of a two-layer network. Particularly, based on the LaSalle-type invariance principle of stochastic differential delay equations, an adaptive control technique is proposed by constructing an auxiliary layer and designing proper control input and updating laws so that the unknown topology can be recovered upon successful generalized synchronization. Numerical simulations are provided to illustrate the effectiveness of the proposed method. The technique provides a certain theoretical basis for topology inference of complex networks. In particular, when the considered network is composed of systems with high-dimension or complicated dynamics, a simpler response layer can be constructed, which is conducive to circuit design. Moreover, it is practical to take into consideration perturbations caused by control input. Finally, the method is applicable to infer topology of a subnetwork embedded within a complex system and locate hidden sources. We hope the results can provide basic insight into further research endeavors on understanding practical and economical topology inference of networks.

  8. Inferring the mesoscale structure of layered, edge-valued, and time-varying networks

    Science.gov (United States)

    Peixoto, Tiago P.

    2015-10-01

    Many network systems are composed of interdependent but distinct types of interactions, which cannot be fully understood in isolation. These different types of interactions are often represented as layers, attributes on the edges, or as a time dependence of the network structure. Although they are crucial for a more comprehensive scientific understanding, these representations offer substantial challenges. Namely, it is an open problem how to precisely characterize the large or mesoscale structure of network systems in relation to these additional aspects. Furthermore, the direct incorporation of these features invariably increases the effective dimension of the network description, and hence aggravates the problem of overfitting, i.e., the use of overly complex characterizations that mistake purely random fluctuations for actual structure. In this work, we propose a robust and principled method to tackle these problems, by constructing generative models of modular network structure, incorporating layered, attributed and time-varying properties, as well as a nonparametric Bayesian methodology to infer the parameters from data and select the most appropriate model according to statistical evidence. We show that the method is capable of revealing hidden structure in layered, edge-valued, and time-varying networks, and that the most appropriate level of granularity with respect to the additional dimensions can be reliably identified. We illustrate our approach on a variety of empirical systems, including a social network of physicians, the voting correlations of deputies in the Brazilian national congress, the global airport network, and a proximity network of high-school students.

  9. Traffic dynamics on two-layer complex networks with limited delivering capacity

    Science.gov (United States)

    Ma, Jinlong; Han, Weizhan; Guo, Qing; Wang, Zhenyong

    2016-08-01

    The traffic dynamics of multi-layer networks has attracted a great deal of interest since many real networks are comprised of two or more layers of subnetworks. Due to its low traffic capacity, the average delivery capacity allocation strategy is susceptible to congestion with the wildly used shortest path routing protocol on two-layer complex networks. In this paper, we introduce a delivery capacity allocation strategy into the traffic dynamics on two-layer complex networks and focus on its effect on the traffic capacity measured by the critical point Rc of phase transition from free flow to congestion. When the total nodes delivering capacity is fixed, the delivering capacity of each node in physical layer is assigned to the degree distributions of both the physical and logical layers. Simulation results show that the proposed strategy can bring much better traffic capacity than that with the average delivery capacity allocation strategy. Because of the significantly improved traffic performance, this work may be useful for optimal design of networked traffic dynamics.

  10. Solving Nonlinearly Separable Classifications in a Single-Layer Neural Network.

    Science.gov (United States)

    Conaway, Nolan; Kurtz, Kenneth J

    2017-03-01

    Since the work of Minsky and Papert ( 1969 ), it has been understood that single-layer neural networks cannot solve nonlinearly separable classifications (i.e., XOR). We describe and test a novel divergent autoassociative architecture capable of solving nonlinearly separable classifications with a single layer of weights. The proposed network consists of class-specific linear autoassociators. The power of the model comes from treating classification problems as within-class feature prediction rather than directly optimizing a discriminant function. We show unprecedented learning capabilities for a simple, single-layer network (i.e., solving XOR) and demonstrate that the famous limitation in acquiring nonlinearly separable problems is not just about the need for a hidden layer; it is about the choice between directly predicting classes or learning to classify indirectly by predicting features.

  11. The Hematopoietic Niche in Myeloproliferative Neoplasms

    Directory of Open Access Journals (Sweden)

    Annette H. Schmitt-Graeff

    2015-01-01

    Full Text Available Specialized microanatomical areas of the bone marrow provide the signals that are mandatory for the maintenance and regulation of hematopoietic stem cells (HSCs and progenitor cells. A complex microenvironment adjacent to the marrow vasculature (vascular niche and close to the endosteum (endosteal niche harbors multiple cell types including mesenchymal stromal cells and their derivatives such as CAR cells expressing high levels of chemokines C-X-C motif ligand 12 and early osteoblastic lineage cells, endothelial cells, and megakaryocytes. The characterization of the cellular and molecular networks operating in the HSC niche has opened new perspectives for the understanding of the bidirectional cross-talk between HSCs and stromal cell populations in normal and malignant conditions. A structural and functional remodeling of the niche may contribute to the development of myeloproliferative neoplasms (MPN. Malignant HSCs may alter the function and survival of MSCs that do not belong to the neoplastic clone. For example, a regression of nestin+ MSCs by apoptosis has been attributed to neuroglial damage in MPN. Nonneoplastic MSCs in turn can promote aggressiveness and drug resistance of malignant cells. In the future, strategies to counteract the pathological interaction between the niche and neoplastic HSCs may offer additional treatment strategies for MPN patients.

  12. Scalable Ad Hoc Networks for Arbitrary-Cast: Practical Broadcast-Relay Transmission Strategy Leveraging Physical-Layer Network Coding

    Directory of Open Access Journals (Sweden)

    Cai Kai

    2008-01-01

    Full Text Available Abstract The capacity of wireless ad hoc networks is constrained by the interference of concurrent transmissions among nodes. Instead of only trying to avoid the interference, physical-layer network coding (PNC is a new approach that embraces the interference initiatively. We employ a network form of interference cancellation, with the PNC approach, and propose the multihop, broadcast-relay transmission strategy in linear, rectangular, and hexagonal networks. The theoretical analysis shows that it gains the transmission efficiency by the factors of 2.5 for the rectangular networks and 2 for the hexagonal networks. We also propose a practical signal recovery algorithm in the physical layer to deal with the influence of multipath fading channels and time synchronization errors, as well as to use media access control (MAC protocols that support the simultaneous receptions. This transmission strategy obtains the same efficiency from one-to-one communication to one-to-many. By our approach, the number of the users/terminals of the network has better scalability, and the overall network throughput is improved.

  13. A Fusion Face Recognition Approach Based on 7-Layer Deep Learning Neural Network

    Directory of Open Access Journals (Sweden)

    Jianzheng Liu

    2016-01-01

    Full Text Available This paper presents a method for recognizing human faces with facial expression. In the proposed approach, a motion history image (MHI is employed to get the features in an expressive face. The face can be seen as a kind of physiological characteristic of a human and the expressions are behavioral characteristics. We fused the 2D images of a face and MHIs which were generated from the same face’s image sequences with expression. Then the fusion features were used to feed a 7-layer deep learning neural network. The previous 6 layers of the whole network can be seen as an autoencoder network which can reduce the dimension of the fusion features. The last layer of the network can be seen as a softmax regression; we used it to get the identification decision. Experimental results demonstrated that our proposed method performs favorably against several state-of-the-art methods.

  14. Dynamics of learning near singularities in layered networks.

    Science.gov (United States)

    Wei, Haikun; Zhang, Jun; Cousseau, Florent; Ozeki, Tomoko; Amari, Shun-Ichi

    2008-03-01

    We explicitly analyze the trajectories of learning near singularities in hierarchical networks, such as multilayer perceptrons and radial basis function networks, which include permutation symmetry of hidden nodes, and show their general properties. Such symmetry induces singularities in their parameter space, where the Fisher information matrix degenerates and odd learning behaviors, especially the existence of plateaus in gradient descent learning, arise due to the geometric structure of singularity. We plot dynamic vector fields to demonstrate the universal trajectories of learning near singularities. The singularity induces two types of plateaus, the on-singularity plateau and the near-singularity plateau, depending on the stability of the singularity and the initial parameters of learning. The results presented in this letter are universally applicable to a wide class of hierarchical models. Detailed stability analysis of the dynamics of learning in radial basis function networks and multilayer perceptrons will be presented in separate work.

  15. Non-trivial Inter-layer Degree Correlations in Heterogeneously Growing Multiplex Networks

    CERN Document Server

    Fotouhi, Babak

    2014-01-01

    The multiplex network growth literature has been confined to homogeneous growth hitherto, where the number of links that each new incoming node establishes is the same across layers. This paper focuses on heterogeneous growth. We first analyze the case of two preferentially growing layers and find a closed-form expression for the inter-layer degree distribution, and demonstrate that non-trivial inter-layer degree correlations emerge in the steady state. Then we focus on the case of uniform growth. Surprisingly, inter-layer correlations arise in the random case, too. Also, we observe that the expression for the average layer-2 degree of nodes whose layer-1 degree is k, is identical for the uniform and preferential schemes. Throughout, theoretical predictions are corroborated using Monte Carlo simulations.

  16. Cross Layer QoS Provisioning in Home Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Brewka, Lukasz Jerzy; Ruepp, Sarah Renée

    2011-01-01

    Access (TDMA). By adopting OW MAC to the widely supported Universal Plug and Play – Quality of Service (UPnP-QoS) Architecture in the simulated home domain, algorithms for cross layer mapping QoS requirements are proposed. Compared to utilizing WLAN MAC, our scheme is able to provide guaranteed Qo...

  17. May the Best Meme Win!: New Exploration of Competitive Epidemic Spreading over Arbitrary Multi-Layer Networks

    CERN Document Server

    Sahneh, Faryad Darabi

    2013-01-01

    This study extends SIS\\ epidemic model for single virus propagation over an arbitrary graph to SI$_{1}$SI$_{2}$S epidemic model of two exclusive, competing viruses over a two-layer network with generic structure, where network layers represent the distinct transmission routes of the viruses. We find analytical results determining extinction, mutual exclusion, and coexistence of the viruses by introducing concepts of survival threshold and winning threshold. Furthermore, we show possibility of coexistence in SIS-type competitive spreading over multilayer networks. Not only we prove a coexistence region rigorously, we are able to quantitate it via interrelation of central nodes across the network layers. None or small overlapping of central nodes of each layer is the key determinant of coexistence. Specifically, coexistence is impossible if network layers are identical, while it is possible if the network layers have distinct dominant eigenvectors and node degree vectors. We employ a novel multilayer network ge...

  18. Cross Layered Multi-Meshed Tree Scheme for Cognitive Networks

    Science.gov (United States)

    2011-06-01

    routing AODV or DSR can be used. SHARP proactive routing protocol ... AODV . The first is a proactive routing protocol and the second is a reactive routing protocol . We use the proactive routing protocol OLSR to evaluate...connectivity challenges posed by MANETs such as Airborne Networks are the ‘ routing ’ and ‘medium access control’ (MAC) protocols . Such protocols

  19. Multi-Layered Feedforward Neural Networks for Image Segmentation

    Science.gov (United States)

    1991-12-01

    the Gram-Schmidt Network ...................... 80 xi Preface WILLIAM SHAKESPEARE 1564-1616 Is this a dagger which I see before me, The handle toward...but a dagger of the mind, a false creation, proceeding from the heat-oppressed brain? MACBETH Act Two, Scene One The difference between mysticism and

  20. Inferring the mesoscale structure of layered, edge-valued and time-varying networks

    CERN Document Server

    Peixoto, Tiago P

    2015-01-01

    Many network systems are composed of interdependent but distinct types of interactions, which cannot be fully understood in isolation. These different types of interactions are often represented as layers, attributes on the edges or as a time-dependence of the network structure. Although they are crucial for a more comprehensive scientific understanding, these representations offer substantial challenges. Namely, it is an open problem how to precisely characterize the large or mesoscale structure of network systems in relation to these additional aspects. Furthermore, the direct incorporation of these features invariably increases the effective dimension of the network description, and hence aggravates the problem of overfitting, i.e. the use of overly-complex characterizations that mistake purely random fluctuations for actual structure. In this work, we propose a robust and principled method to tackle these problems, by constructing generative models of modular network structure, incorporating layered, attr...

  1. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning.

  2. A Microfluidic Pore Network Approach to Investigate Water Transport in Fuel Cell Porous Transport Layers

    CERN Document Server

    Bazylak, A; Markicevic, B; Sinton, D; Djilali, N

    2008-01-01

    Pore network modelling has traditionally been used to study displacement processes in idealized porous media related to geological flows, with applications ranging from groundwater hydrology to enhanced oil recovery. Very recently, pore network modelling has been applied to model the gas diffusion layer (GDL) of a polymer electrolyte membrane (PEM) fuel cell. Discrete pore network models have the potential to elucidate transport phenomena in the GDL with high computational efficiency, in contrast to continuum or molecular dynamics modelling that require extensive computational resources. However, the challenge in studying the GDL with pore network modelling lies in defining the network parameters that accurately describe the porous media as well as the conditions of fluid invasion that represent realistic transport processes. In this work, we discuss the first stage of developing and validating a GDL-representative pore network model. We begin with a two-dimensional pore network model with a single mobile pha...

  3. Usage of neural network to predict aluminium oxide layer thickness.

    Science.gov (United States)

    Michal, Peter; Vagaská, Alena; Gombár, Miroslav; Kmec, Ján; Spišák, Emil; Kučerka, Daniel

    2015-01-01

    This paper shows an influence of chemical composition of used electrolyte, such as amount of sulphuric acid in electrolyte, amount of aluminium cations in electrolyte and amount of oxalic acid in electrolyte, and operating parameters of process of anodic oxidation of aluminium such as the temperature of electrolyte, anodizing time, and voltage applied during anodizing process. The paper shows the influence of those parameters on the resulting thickness of aluminium oxide layer. The impact of these variables is shown by using central composite design of experiment for six factors (amount of sulphuric acid, amount of oxalic acid, amount of aluminium cations, electrolyte temperature, anodizing time, and applied voltage) and by usage of the cubic neural unit with Levenberg-Marquardt algorithm during the results evaluation. The paper also deals with current densities of 1 A · dm(-2) and 3 A · dm(-2) for creating aluminium oxide layer.

  4. Design and Study of Cognitive Network Physical Layer Simulation Platform

    Directory of Open Access Journals (Sweden)

    Yongli An

    2014-01-01

    Full Text Available Cognitive radio technology has received wide attention for its ability to sense and use idle frequency. IEEE 802.22 WRAN, the first to follow the standard in cognitive radio technology, is featured by spectrum sensing and wireless data transmission. As far as wireless transmission is concerned, the availability and implementation of a mature and robust physical layer algorithm are essential to high performance. For the physical layer of WRAN using OFDMA technology, this paper proposes a synchronization algorithm and at the same time provides a public platform for the improvement and verification of that new algorithm. The simulation results show that the performance of the platform is highly close to the theoretical value.

  5. Physical-Layer Network Coding for VPN in TDM-PON

    Science.gov (United States)

    Wang, Qike; Tse, Kam-Hon; Chen, Lian-Kuan; Liew, Soung-Chang

    2012-12-01

    We experimentally demonstrate a novel optical physical-layer network coding (PNC) scheme over time-division multiplexing (TDM) passive optical network (PON). Full-duplex error-free communications between optical network units (ONUs) at 2.5 Gb/s are shown for all-optical virtual private network (VPN) applications. Compared to the conventional half-duplex communications set-up, our scheme can increase the capacity by 100% with power penalty smaller than 3 dB. Synchronization of two ONUs is not required for the proposed VPN scheme

  6. Usage of Neural Network to Predict Aluminium Oxide Layer Thickness

    OpenAIRE

    2015-01-01

    This paper shows an influence of chemical composition of used electrolyte, such as amount of sulphuric acid in electrolyte, amount of aluminium cations in electrolyte and amount of oxalic acid in electrolyte, and operating parameters of process of anodic oxidation of aluminium such as the temperature of electrolyte, anodizing time, and voltage applied during anodizing process. The paper shows the influence of those parameters on the resulting thickness of aluminium oxide layer. The impact of...

  7. A Framework for Supporting Survivability, Network Planning and Cross-Layer Optimization in Future Multi-Domain Terabit Networks

    Energy Technology Data Exchange (ETDEWEB)

    Baldin, Ilya [Renaissance Computing Inst. (RENCI), Chapel Hill, NC (United States); Huang, Shu [Renaissance Computing Inst. (RENCI), Chapel Hill, NC (United States); Gopidi, Rajesh [Univ. of North Carolina, Chapel Hill, NC (United States)

    2015-01-28

    This final project report describes the accomplishments, products and publications from the award. It includes the overview of the project goals to devise a framework for managing resources in multi-domain, multi-layer networks, as well the details of the mathematical problem formulation and the description of the prototype built to prove the concept.

  8. Pore-Network Modeling of Water and Vapor Transport in the Micro Porous Layer and Gas Diffusion Layer of a Polymer Electrolyte Fuel Cell

    NARCIS (Netherlands)

    Qin, C.; Hassanizadeh, S.M.; van Oosterhout, L.M.

    2016-01-01

    In the cathode side of a polymer electrolyte fuel cell (PEFC), a micro porous layer (MPL) added between the catalyst layer (CL) and the gas diffusion layer (GDL) plays an important role in water management. In this work, by using both quasi-static and dynamic pore-network models, water and vapor tra

  9. Visual cortical mechanisms of perceptual grouping: interacting layers, networks, columns, and maps.

    Science.gov (United States)

    Ross, W D; Grossberg, S; Mingolla, E

    2000-07-01

    The visual cortex has a laminar organization whose circuits form functional columns in cortical maps. How this laminar architecture supports visual percepts is not well understood. A neural model proposes how the laminar circuits of V1 and V2 generate perceptual groupings that maintain sensitivity to the contrasts and spatial organization of scenic cues. The model can decisively choose which groupings cohere and survive, even while balanced excitatory and inhibitory interactions preserve contrast-sensitive measures of local boundary likelihood or strength. In the model, excitatory inputs from lateral geniculate nucleus (LGN) activate layers 4 and 6 of V1. Layer 6 activates an on-center off-surround network of inputs to layer 4. Together these layer 4 inputs preserve analog sensitivity to LGN input contrasts. Layer 4 cells excite pyramidal cells in layer 2/3, which activate monosynaptic long-range horizontal excitatory connections between layer 2/3 pyramidal cells, and short-range disynaptic inhibitory connections mediated by smooth stellate cells. These interactions support inward perceptual grouping between two or more boundary inducers, but not outward grouping from a single inducer. These boundary signals feed back to layer 4 via the layer 6-to-4 on-center off-surround network. This folded feedback joins cells in different layers into functional columns while selecting winning groupings. Layer 6 in V1 also sends top-down signals to LGN using an on-center off-surround network, which suppresses LGN cells that do not receive feedback, while selecting, enhancing, and synchronizing activity of those that do. The model is used to simulate psychophysical and neurophysiological data about perceptual grouping, including various Gestalt grouping laws.

  10. Resource Allocation and Cross Layer Control in Wireless Networks

    Science.gov (United States)

    2006-08-25

    of links are called matchings. This special case has been used extensively in the literature on crossbar constrained packet switches, where the...delay in the network, while the virtual queues play a role in determin- ing the transient time or � learning time� required for the system to approach...under arrival tra¢ c patterns that might be the worst possible within a certain family of arrival patterns , for instance all possible arrival patterns

  11. Physical layer secret key generation for fiber-optical networks.

    Science.gov (United States)

    Kravtsov, Konstantin; Wang, Zhenxing; Trappe, Wade; Prucnal, Paul R

    2013-10-07

    We propose and experimentally demonstrate a method for generating and sharing a secret key using phase fluctuations in fiber optical links. The obtained key can be readily used to support secure communication between the parties. The security of our approach is based on a fundamental asymmetry associated with the optical physical layer: the sophistication of tools needed by an eavesdropping adversary to subvert the key establishment is significantly greater and more costly than the complexity needed by the legitimate parties to implement the scheme. In this sense, the method is similar to the classical asymmetric algorithms (Diffie-Hellman, RSA, etc.).

  12. The Fault Location Method Research of Three-Layer Network System

    Directory of Open Access Journals (Sweden)

    Hu Shaolin

    2012-09-01

    Full Text Available The fault location technology research of three-layer network system structure dynamic has important theoretic value and apparent engineering application value on exploring the fault detection and localization of the complex structure dynamic system. In this article, the method of failure propagation and adverse inference are adopted, the fault location algorithm of the three-layer structure dynamic network system is established on the basis of the concept of association matrix and the calculating method are proposed, and the simulation calculation confirmed the reliability of this paper. The results of the research can be used for the fault diagnosis of the hierarchical control system?testing of the engineering software and the analysis of the failure effects of layered network of all kinds and other different fields.

  13. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  14. Cross-Layer Design and Optimization for Wireless Sensor Networks

    Science.gov (United States)

    2006-03-01

    overlapping Table 4. IEEE 802.15.4 and IEEE 802.11b channel assignments within the 2.4 GHz ISM frequency band. Measurement readings of the packet...implement the OA in software. For example, the OA can be written in NesC programming language and implemented on TinyOS platform. As the Micaz motes...Christophe Le Martret, “Overview of the WIDENS Architecture: A Wireless Ad Hoc Network for Public Safety,” IEEE SECON 2004, Oct 2004. [23] Jamal N

  15. Channel estimation for physical layer network coding systems

    CERN Document Server

    Gao, Feifei; Wang, Gongpu

    2014-01-01

    This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the performa

  16. Cross-Layer Design for Two-Way Relaying Networks with Multiple Antennas

    Directory of Open Access Journals (Sweden)

    zhuo wu

    2015-10-01

    Full Text Available In this paper, we developed a cross-layer design for two-way relaying (TWR networks with multiple antennas, where two single antenna source nodes exchange information with the aid of one multiple antenna relay node. The proposed cross-layer design considers adaptive modulation (AM and space-time block coding (STBC at the physical layer with an automatic repeat request (ARQ protocol at the data link layer, in order to maximize the spectral efficiency under specific delay and packet error ratio (PER constraints. An MMSE-interference cancellation (IC receiver is employed at the relay node, to remove the interference in the fist phase of the TWR transmission. The transmission mode is updated for each phase of the TWR transmission on a frame-by-frame basis, to match the time-varying channel conditions and exploit the system performance and throughput gain. Simulation results show that retransmission at the data link layer could alleviate rigorous error-control requirements at the physical layer, and thereby allows higher data transmission. As a result, cross-layer design helps to achieve considerable system spectral efficiency gain for TWR networks, compared to those without cross-layer design.

  17. A Layered Zone Routing Algorithm in Ad Hoc Network Based on Matrix of Adjacency Connection

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; LI Feng; SHI Xiu-jin; HUO Jia-zhen

    2007-01-01

    The hybrid routing protocol has received more attention recently than the proactive and the reactive, especially for large-scale and highly dynamic connection, in mobile ad hoc network. A crucial reason is that zone-layered is being utilized in the complex systems. A hybrid routing algorithm which is layered zone based on adjacency connection(LZBAC) is put forward under the background of a few members in network with steady position and link. The algorithm modifies storage structure of nodes and improves routing mechanism. The theoretical analysis and simulation testing testify that the algorithm costs shorter time of route finding and less delay than others.

  18. Multi-Layer Mobility Load Balancing in a Heterogeneous LTE Network

    DEFF Research Database (Denmark)

    Fotiadis, Panagiotis; Polignano, Michele; Laselva, Daniela;

    2012-01-01

    This paper analyzes the behavior of a distributed Mobility Load Balancing (MLB) scheme in a multi-layer 3GPP (3rd Generation Partnership Project) Long Term Evolution (LTE) deployment with different User Equipment (UE) densities in certain network areas covered with pico cells. Target of the study...... user performance. Results have shown that the proposed MLB scheme can significantly improve the overall network resources utilization by eliminating potential load imbalances amongst the deployment layers and consequently enhance user experience. However this occurs at the cost of increased Radio Link...

  19. Explicit Rate Adjustment (ERA: Responsiveness, Network Utilization Efficiency and Fairness for Layered Multicast

    Directory of Open Access Journals (Sweden)

    Somnuk PUANGPRONPITAG

    2005-08-01

    Full Text Available To provide layered multicast with responsiveness, efficiency in network utilization, scalability and fairness (including inter-protocol fairness, intra-protocol fairness, intra-session fairness and TCP-friendliness for layered multicast, we propose in this paper a new multicast congestion control, called Explicit Rate Adjustment (ERA. Our protocol uses an algorithm relying on TCP throughput equation and Packet-bunch Probe techniques to detect optimal bandwidth utilization; then adjusts the reception rate accordingly. We have built ERA into a network simulator (ns2 and demonstrate via simulations that the goals are reached.

  20. Q-learning-based cross-layer Learning Engine design for cognitive radio network

    Science.gov (United States)

    Liu, Congbin; Jiang, Hong; Yang, Yanchao; Ma, Jinghui

    2013-03-01

    In cognitive radio (CR) networks, Learning Engine has considerable significance on dynamic spectrum access (DSA) and implementation of cognitive function. In this paper, a cross-layer learning engine design scheme is proposed by jointly considering physical-layer dynamic channel selection, modulation and coding scheme, data-link layer frame length in CR networks, with the purpose to maximize system throughput and simultaneously meet heterogeneous Quality of Service (QoS) requirements. The wireless fading channel is modeled as a continuous state space Markov decision process (MDP) and the licensed network activity is abstracted as a finite-state one. We introduce Q-learning algorithm to realize the function of learning from state space and adapt wireless environment. And meanwhile a large scale Qfunction approximator based on support vector machine (SVM) is employed to effectively reduce storage requirement and decrease the operation complexity. A cross-layer learning engine communication platform is realized by using Matlab simulator. the simulation results demonstrate that while lacking system prior knowledge, the learning engine can effectively achieve configuration function by system cross-layer learning approach, and furthermore, it can converge to the best—i.e., realize reconfiguration function in CR networks while meeting users' QoS.

  1. Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

    OpenAIRE

    Cumanan, Kanapathippillai; Xing, Hong; Xu, Peng; Zheng, Gan; Dai, Xuchu; Nallanathan, Arumugam; Ding, Zhiguo; Karagiannidis, George K.

    2016-01-01

    Physical layer security has been recently recognizedas a promising new design paradigm to provide security inwireless networks. In addition to the existing conventional cryp-tographic methods, physical layer security exploits the dynamicsof fading channels to enhance secured wireless links. In thisapproach, jamming plays a key role by generating noise signalsto confuse the potential eavesdroppers, and significantly improvesquality and reliability of secure communications between legitimate te...

  2. Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks

    OpenAIRE

    Cumanan, Kanapathippillai; Xing, Hong; Xu, Peng; Zheng, Gan; Dai, Xuchu; Nallanathan, Arumugam; Ding, Zhiguo; Karagiannidis, George K.

    2017-01-01

    Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitima...

  3. Neural network model for the efficient calculation of Green's functions in layered media

    CERN Document Server

    Soliman, E A; El-Gamal, M A; 10.1002/mmce.10066

    2003-01-01

    In this paper, neural networks are employed for fast and efficient calculation of Green's functions in a layered medium. Radial basis function networks (RBFNs) are effectively trained to estimate the coefficients and the exponents that represent a Green's function in the discrete complex image method (DCIM). Results show very good agreement with the DCIM, and the trained RBFNs are very fast compared with the corresponding DCIM. (23 refs).

  4. Adaptive control of chaotic systems based on a single layer neural network

    Energy Technology Data Exchange (ETDEWEB)

    Shen Liqun [Space Control and Inertia Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)], E-mail: liqunshen@gmail.com; Wang Mao [Space Control and Inertia Technology Research Center, Harbin Institute of Technology, Harbin 150001 (China)

    2007-08-27

    This Letter presents an adaptive neural network control method for the chaos control problem. Based on a single layer neural network, the dynamic about the unstable fixed period point of the chaotic system can be adaptively identified without detailed information about the chaotic system. And the controlled chaotic system can be stabilized on the unstable fixed period orbit. Simulation results of Henon map and Lorenz system verify the effectiveness of the proposed control method.

  5. The Multidimensional Nutritional Niche.

    Science.gov (United States)

    Machovsky-Capuska, Gabriel E; Senior, Alistair M; Simpson, Stephen J; Raubenheimer, David

    2016-05-01

    The dietary generalist-specialist distinction plays a pivotal role in theoretical and applied ecology, conservation, invasion biology, and evolution and yet the concept remains poorly characterised. Diets, which are commonly used to define niche breadth, are almost exclusively considered in terms of foods, with little regard for the mixtures of nutrients and other compounds they contain. We use nutritional geometry (NG) to integrate nutrition with food-level approaches to the dietary niche and illustrate the application of our framework in the important context of invasion biology. We use an example that involves a model with four hypothetical nonexclusive scenarios. We additionally show how this approach can provide fresh theoretical insight into the ways nutrition and food choices impact trait evolution and trophic interactions.

  6. Dynamic Subchannel Assignment-Based Cross-Layer MAC and Network Protocol for Multihop Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Khanh Nguyen Quang

    2013-01-01

    Full Text Available The paper presents a dynamic subchannel assignment algorithm based on orthogonal frequency division multiple access technology operating in the time division duplexing and a new cross-layer design based on a proposed routing protocol jointed with the MAC protocol. The proposed dynamic sub-channel assignment algorithm provides a new interference avoidance mechanism which solves several drawbacks of existing radio resource allocation techniques in wireless networks using OFDMA/TDD, such as the hidden node and exposed node problems, mobility, and cochannels interference in frequency (CCI. Besides, in wireless networks, when a route is established, the radio resource allocation problems may decrease the end to end performance proportionally with the length of each route. The contention at MAC layer may cause the routing protocol at network layer to respond by finding new routes and routing table updates. The proposed routing protocol is jointed with the MAC protocol based on dynamic sub-channel assignment to ensure that the quality of service in multihop ad hoc networks is significantly improved.

  7. The Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Díaz, Vicente Hernández

    2015-01-01

    Recently, the cross-layer design for the wireless sensor network communication protocol has become more and more important and popular. Considering the disadvantages of the traditional cross-layer routing algorithms, in this paper we propose a new fuzzy logic-based routing algorithm, named the Balanced Cross-layer Fuzzy Logic (BCFL) routing algorithm. In BCFL, we use the cross-layer parameters’ dispersion as the fuzzy logic inference system inputs. Moreover, we give each cross-layer parameter a dynamic weight according the value of the dispersion. For getting a balanced solution, the parameter whose dispersion is large will have small weight, and vice versa. In order to compare it with the traditional cross-layer routing algorithms, BCFL is evaluated through extensive simulations. The simulation results show that the new routing algorithm can handle the multiple constraints without increasing the complexity of the algorithm and can achieve the most balanced performance on selecting the next hop relay node. Moreover, the Balanced Cross-layer Fuzzy Logic routing algorithm can adapt to the dynamic changing of the network conditions and topology effectively. PMID:26266412

  8. The Balanced Cross-Layer Design Routing Algorithm in Wireless Sensor Networks Using Fuzzy Logic.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Hernández Díaz, Vicente

    2015-08-10

    Recently, the cross-layer design for the wireless sensor network communication protocol has become more and more important and popular. Considering the disadvantages of the traditional cross-layer routing algorithms, in this paper we propose a new fuzzy logic-based routing algorithm, named the Balanced Cross-layer Fuzzy Logic (BCFL) routing algorithm. In BCFL, we use the cross-layer parameters' dispersion as the fuzzy logic inference system inputs. Moreover, we give each cross-layer parameter a dynamic weight according the value of the dispersion. For getting a balanced solution, the parameter whose dispersion is large will have small weight, and vice versa. In order to compare it with the traditional cross-layer routing algorithms, BCFL is evaluated through extensive simulations. The simulation results show that the new routing algorithm can handle the multiple constraints without increasing the complexity of the algorithm and can achieve the most balanced performance on selecting the next hop relay node. Moreover, the Balanced Cross-layer Fuzzy Logic routing algorithm can adapt to the dynamic changing of the network conditions and topology effectively.

  9. Energy Efficient Cross-Layer Transmission Model for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xin Yang

    2017-01-01

    Full Text Available The performance of mobile wireless sensor networks (MWSN witnessed a significant improvement in recent years, such as throughput, transmission delay, and collision detection. However, MWSN still suffers from high energy consumption, since most of the sensors or users in MWSN are based on passive devices. In order to remedy this problem, in this paper we present a Cross-layer Energy Efficiency (CEE model for MWSN. CEE is a cross-layer model which contains three layers. It utilizes nodes location information in network layer, medium access control (MAC protocol in MAC layer (sublayer of data link layer, and full-duplex interfaces in physical (PHY layer. The CEE model offers a number of advantages in regard to energy efficiency, throughput improvement, low delay, and power control compared to existing models. According to the performance evaluation, the proposed transmission model effectively reduces energy consumption and improves other transmission performances. Also, it has been proved that the proposed model can be used in practical MWSN as Internet of things (IoT.

  10. Network structure within the cerebellar input layer enables lossless sparse encoding.

    Science.gov (United States)

    Billings, Guy; Piasini, Eugenio; Lőrincz, Andrea; Nusser, Zoltan; Silver, R Angus

    2014-08-20

    The synaptic connectivity within neuronal networks is thought to determine the information processing they perform, yet network structure-function relationships remain poorly understood. By combining quantitative anatomy of the cerebellar input layer and information theoretic analysis of network models, we investigated how synaptic connectivity affects information transmission and processing. Simplified binary models revealed that the synaptic connectivity within feedforward networks determines the trade-off between information transmission and sparse encoding. Networks with few synaptic connections per neuron and network-activity-dependent threshold were optimal for lossless sparse encoding over the widest range of input activities. Biologically detailed spiking network models with experimentally constrained synaptic conductances and inhibition confirmed our analytical predictions. Our results establish that the synaptic connectivity within the cerebellar input layer enables efficient lossless sparse encoding. Moreover, they provide a functional explanation for why granule cells have approximately four dendrites, a feature that has been evolutionarily conserved since the appearance of fish. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. [Research on Early Identification of Bipolar Disorder Based on Multi-layer Perceptron Neural Network].

    Science.gov (United States)

    Zhang, Haowei; Gao, Yanni; Yuan, Chengmei; Liu, Ying; Ding, Yuqing

    2015-06-01

    Multi-layer perceptron (MLP) neural network belongs to multi-layer feedforward neural network, and has the ability and characteristics of high intelligence. It can realize the complex nonlinear mapping by its own learning through the network. Bipolar disorder is a serious mental illness with high recurrence rate, high self-harm rate and high suicide rate. Most of the onset of the bipolar disorder starts with depressive episode, which can be easily misdiagnosed as unipolar depression and lead to a delayed treatment so as to influence the prognosis. The early identifica- tion of bipolar disorder is of great importance for patients with bipolar disorder. Due to the fact that the process of early identification of bipolar disorder is nonlinear, we in this paper discuss the MLP neural network application in early identification of bipolar disorder. This study covered 250 cases, including 143 cases with recurrent depression and 107 cases with bipolar disorder, and clinical features were statistically analyzed between the two groups. A total of 42 variables with significant differences were screened as the input variables of the neural network. Part of the samples were randomly selected as the learning sample, and the other as the test sample. By choosing different neu- ral network structures, all results of the identification of bipolar disorder were relatively good, which showed that MLP neural network could be used in the early identification of bipolar disorder.

  12. A One-Layer Recurrent Neural Network for Real-Time Portfolio Optimization With Probability Criterion.

    Science.gov (United States)

    Liu, Qingshan; Dang, Chuangyin; Huang, Tingwen

    2013-02-01

    This paper presents a decision-making model described by a recurrent neural network for dynamic portfolio optimization. The portfolio-optimization problem is first converted into a constrained fractional programming problem. Since the objective function in the programming problem is not convex, the traditional optimization techniques are no longer applicable for solving this problem. Fortunately, the objective function in the fractional programming is pseudoconvex on the feasible region. It leads to a one-layer recurrent neural network modeled by means of a discontinuous dynamic system. To ensure the optimal solutions for portfolio optimization, the convergence of the proposed neural network is analyzed and proved. In fact, the neural network guarantees to get the optimal solutions for portfolio-investment advice if some mild conditions are satisfied. A numerical example with simulation results substantiates the effectiveness and illustrates the characteristics of the proposed neural network.

  13. A TWO-LAYER RECURRENT NEURAL NETWORK BASED APPROACH FOR OVERLAY MULTICAST

    Institute of Scientific and Technical Information of China (English)

    Liu Shidong; Zhang Shunyi; Zhou Jinquan; Qiu Gong'an

    2008-01-01

    Overlay multicast has become one of the most promising multicast solutions for IP network, and Neutral Network(NN) has been a good candidate for searching optimal solutions to the constrained shortest routing path in virtue of its powerful capacity for parallel computation. Though traditional Hopfield NN can tackle the optimization problem, it is incapable of dealing with large scale networks due to the large number of neurons. In this paper, a neural network for overlay multicast tree computation is presented to reliably implement routing algorithm in real time. The neural network is constructed as a two-layer recurrent architecture, which is comprised of Independent Variable Neurons (IDVN) and Dependent Variable Neurons (DVN), according to the independence of the decision variables associated with the edges in directed graph. Compared with the heuristic routing algorithms, it is characterized as shorter computational time, fewer neurons, and better precision.

  14. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    NARCIS (Netherlands)

    Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, N.; Serrano, J.J.

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control an

  15. Predicting Subsurface Soil Layering and Landslide Risk with Artificial Neural Networks

    DEFF Research Database (Denmark)

    Farrokhzad, Farzad; Barari, Amin; Ibsen, Lars Bo

    2011-01-01

    This paper is concerned principally with the application of ANN model in geotechnical engineering. In particular the application for subsurface soil layering and landslide analysis is discussed in more detail. Three ANN models are trained using the required geotechnical data obtained from...... networks are capable of predicting variations in the soil profile and assessing the landslide hazard with an acceptable level of confidence....

  16. Learning behavior and temporary minima of two-layer neural networks

    NARCIS (Netherlands)

    Annema, Anne J.; Hoen, Klaas; Hoen, Klaas; Wallinga, Hans

    1994-01-01

    This paper presents a mathematical analysis of the occurrence of temporary minima during training of a single-output, two-layer neural network, with learning according to the back-propagation algorithm. A new vector decomposition method is introduced, which simplifies the mathematical analysis of

  17. Zero Cost Function Training Algorithms for Three-Layered Feedforward Neural Networks

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper, two theorems are proved for zero cost function (or precise I/O map ping) training algorithms about three-layered feedforward neural networks. Two training algorithms based on Moore-Penrose pseudoinverse (MPPI) matrix together with corresponding structure design guidelines are also proposed.

  18. A survey on multimedia-based cross-layer optimization in visual sensor networks.

    Science.gov (United States)

    Costa, Daniel G; Guedes, Luiz Affonso

    2011-01-01

    Visual sensor networks (VSNs) comprised of battery-operated electronic devices endowed with low-resolution cameras have expanded the applicability of a series of monitoring applications. Those types of sensors are interconnected by ad hoc error-prone wireless links, imposing stringent restrictions on available bandwidth, end-to-end delay and packet error rates. In such context, multimedia coding is required for data compression and error-resilience, also ensuring energy preservation over the path(s) toward the sink and improving the end-to-end perceptual quality of the received media. Cross-layer optimization may enhance the expected efficiency of VSNs applications, disrupting the conventional information flow of the protocol layers. When the inner characteristics of the multimedia coding techniques are exploited by cross-layer protocols and architectures, higher efficiency may be obtained in visual sensor networks. This paper surveys recent research on multimedia-based cross-layer optimization, presenting the proposed strategies and mechanisms for transmission rate adjustment, congestion control, multipath selection, energy preservation and error recovery. We note that many multimedia-based cross-layer optimization solutions have been proposed in recent years, each one bringing a wealth of contributions to visual sensor networks.

  19. Cross-layer active predictive congestion control protocol for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Xu, Xiaofeng; Feng, Renjian; Wu, Yinfeng

    2009-01-01

    In wireless sensor networks (WSNs), there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC) for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node's neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  20. Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yinfeng Wu

    2009-10-01

    Full Text Available In wireless sensor networks (WSNs, there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node‟s neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  1. Constraints of nonresponding flows based on cross layers in the networks

    Science.gov (United States)

    Zhou, Zhi-Chao; Xiao, Yang; Wang, Dong

    2016-02-01

    In the active queue management (AQM) scheme, core routers cannot manage and constrain user datagram protocol (UDP) data flows by the sliding window control mechanism in the transport layer due to the nonresponsive nature of such traffic flows. However, the UDP traffics occupy a large part of the network service nowadays which brings a great challenge to the stability of the more and more complex networks. To solve the uncontrollable problem, this paper proposes a cross layers random early detection (CLRED) scheme, which can control the nonresponding UDP-like flows rate effectively when congestion occurs in the access point (AP). The CLRED makes use of the MAC frame acknowledgement (ACK) transmitting congestion information to the sources nodes and utilizes the back-off windows of the MAC layer throttling data rate. Consequently, the UDP-like flows data rate can be restrained timely by the sources nodes in order to alleviate congestion in the complex networks. The proposed CLRED can constrain the nonresponsive flows availably and make the communication expedite, so that the network can sustain stable. The simulation results of network simulator-2 (NS2) verify the proposed CLRED scheme.

  2. Cross-Layer Algorithms for QoS Enhancement in Wireless Multimedia Sensor Networks

    Science.gov (United States)

    Saxena, Navrati; Roy, Abhishek; Shin, Jitae

    A lot of emerging applications like advanced telemedicine and surveillance systems, demand sensors to deliver multimedia content with precise level of QoS enhancement. Minimizing energy in sensor networks has been a much explored research area but guaranteeing QoS over sensor networks still remains an open issue. In this letter we propose a cross-layer approach combining Network and MAC layers, for QoS enhancement in wireless multimedia sensor networks. In the network layer a statistical estimate of sensory QoS parameters is performed and a nearoptimal genetic algorithmic solution is proposed to solve the NP-complete QoS-routing problem. On the other hand the objective of the proposed MAC algorithm is to perform the QoS-based packet classification and automatic adaptation of the contention window. Simulation results demonstrate that the proposed protocol is capable of providing lower delay and better throughput, at the cost of reasonable energy consumption, in comparison with other existing sensory QoS protocols.

  3. Unraveling the impacts of IXP in internet ecosystem using bi-layered network

    Science.gov (United States)

    Fan, Zhongyan; Tang, Wallace K. S.

    2016-08-01

    The Internet is a huge complex network, consisting of tens thousands of Autonomous Systems (ASes). Being a logical fabric of the Internet, the AS-level topology serves as a manageable and useful vehicle for the study of Internet characteristics. However, Internet exchange points (IXPs) have been ignored in previous studies despite of being one of the primary mechanisms for AS interconnections and playing an important role for improving data traffic. In this paper, a novel bi-layered network model is proposed to present an IXP-AS topology. The bi-layered network is built based on the actual architecture, from which a comprehensive study of current AS ecosystem and the impacts of IXP can be made. As revealed by network metrics applied onto the bi-layered network, IXP is always of higher centrality as compared with ASes, well matching its role. By comparing the results in 2009 and 2014, rapid growth in IXP number, membership and impacts are noticed. There are over 98% source-destination pairs routes (with shortest path routing protocol) affected by IXP in 2014. Our results also show that, being an IXP member is more favorable than being a non-member, hence it attracts many ASes, especially those with low centrality, in recent years.

  4. Effect of externality in multiplex networks on one-layer synchronization

    Science.gov (United States)

    Jiang, Xin; Li, Meng; Zheng, Zhiming; Ma, Yifang; Ma, Lili

    2015-06-01

    Synchronization phenomenon plays an important role in the dynamic process on complex networks. In this letter, we consider synchronization under multiplex structures and explore the effect of external parts on the multilayered Kuramoto model with positive correlation between frequencies and degree. We show that large and strong mixing parts of the external layer may put off synchronization while the coupling strength of external layers has an accelerating, but limited, influence on synchronization. In particular, an explosive synchronization can be obtained by weakening the co-evolution coupling strength. The transition tends to be smooth when the co-evolution coupling strength increases. Our findings indicate that externality from multiplex networks, especially the mixing parts, and the co-evolution coupling strength should be of importance for synchronization on one certain layer.

  5. The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines.

    Science.gov (United States)

    Ding, Xu; Shi, Lei; Han, Jianghong; Lu, Jingting

    2016-01-28

    Wireless sensor networks deployed in coal mines could help companies provide workers working in coal mines with more qualified working conditions. With the underground information collected by sensor nodes at hand, the underground working conditions could be evaluated more precisely. However, sensor nodes may tend to malfunction due to their limited energy supply. In this paper, we study the cross-layer optimization problem for wireless rechargeable sensor networks implemented in coal mines, of which the energy could be replenished through the newly-brewed wireless energy transfer technique. The main results of this article are two-fold: firstly, we obtain the optimal relay nodes' placement according to the minimum overall energy consumption criterion through the Lagrange dual problem and KKT conditions; secondly, the optimal strategies for recharging locomotives and wireless sensor networks are acquired by solving a cross-layer optimization problem. The cyclic nature of these strategies is also manifested through simulations in this paper.

  6. Predicting Anticancer Drug Responses Using a Dual-Layer Integrated Cell Line-Drug Network Model.

    Directory of Open Access Journals (Sweden)

    Naiqian Zhang

    Full Text Available The ability to predict the response of a cancer patient to a therapeutic agent is a major goal in modern oncology that should ultimately lead to personalized treatment. Existing approaches to predicting drug sensitivity rely primarily on profiling of cancer cell line panels that have been treated with different drugs and selecting genomic or functional genomic features to regress or classify the drug response. Here, we propose a dual-layer integrated cell line-drug network model, which uses both cell line similarity network (CSN data and drug similarity network (DSN data to predict the drug response of a given cell line using a weighted model. Using the Cancer Cell Line Encyclopedia (CCLE and Cancer Genome Project (CGP studies as benchmark datasets, our single-layer model with CSN or DSN and only a single parameter achieved a prediction performance comparable to the previously generated elastic net model. When using the dual-layer model integrating both CSN and DSN, our predicted response reached a 0.6 Pearson correlation coefficient with observed responses for most drugs, which is significantly better than the previous results using the elastic net model. We have also applied the dual-layer cell line-drug integrated network model to fill in the missing drug response values in the CGP dataset. Even though the dual-layer integrated cell line-drug network model does not specifically model mutation information, it correctly predicted that BRAF mutant cell lines would be more sensitive than BRAF wild-type cell lines to three MEK1/2 inhibitors tested.

  7. Layered vanadyl (IV) nitroprusside: Magnetic interaction through a network of hydrogen bonds

    Energy Technology Data Exchange (ETDEWEB)

    Gil, D.M. [Instituto de Química Física, Facultad de Bioquímica, Química y Farmacia, Universidad Nacional de Tucumán, San Lorenzo 456, T4000CAN San Miguel de Tucumán (Argentina); Osiry, H. [Centro de Investigación en Ciencia Aplicada y Tecnología Avanzada, Unidad Legaria, Instituto Politécnico Nacional, México (Mexico); Pomiro, F.; Varetti, E.L. [CEQUINOR (CONICET-UNLP), Facultad de Ciencias Exactas, Universidad Nacional de La Plata, 47 and 115, 1900, La Plata (Argentina); Carbonio, R.E. [INFIQC – CONICET, Departamento de Físico Química, Facultad de Ciencias Químicas, Universidad Nacional de Córdoba, Haya de la Torre esq, Medina Allende, Ciudad Universitaria, X5000HUA Córdoba (Argentina); Alejandro, R.R. [Centro de Investigación en Ciencia Aplicada y Tecnología Avanzada, Unidad Legaria, Instituto Politécnico Nacional, México (Mexico); Ben Altabef, A. [INQUINOA-UNT-CONICET, Instituto de Química Física, Facultad de Bioquímica, Química y Farmacia, Universidad Nacional de Tucumán, San Lorenzo 456, T4000CAN San Miguel de Tucumán (Argentina); and others

    2016-07-15

    The hydrogen bond and π-π stacking are two non-covalent interactions able to support cooperative magnetic ordering between paramagnetic centers. This contribution reports the crystal structure and related magnetic properties for VO[Fe(CN){sub 5}NO]·2H{sub 2}O, which has a layered structure. This solid crystallizes with an orthorhombic unit cell, in the Pna2{sub 1} space group, with cell parameters a=14.1804(2), b=10.4935(1), c=7.1722(8) Å and four molecules per unit cell (Z=4). Its crystal structure was solved and refined from powder X-ray diffraction data. Neighboring layers remain linked through a network of hydrogen bonds involving a water molecule coordinated to the axial position for the V atom and the unbridged axial NO and CN ligands. An uncoordinated water molecule is found forming a triple bridge between these last two ligands and the coordinated water molecule. The magnetic measurements, recorded down to 2 K, shows a ferromagnetic interaction between V atoms located at neighboring layers, with a Curie-Weiss constant of 3.14 K. Such ferromagnetic behavior was interpreted as resulting from a superexchange interaction through the network of strong OH····O{sub H2O}, OH····N{sub CN}, and OH····O{sub NO} hydrogen bonds that connects neighboring layers. The interaction within the layer must be of antiferromagnetic nature and it was detected close to 2 K. - Graphical abstract: Coordination environment for the metals in vanadyl (II) nitroprusside dihydrate. Display Omitted - Highlights: • Crystal structure of vanadyl nitroprusside dehydrate. • Network of hydrogen bonds. • Magnetic interactions through a network of hydrogen bonds. • Layered transition metal nitroprussides.

  8. Cross-Layer Techniques for Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Yufeng Shan

    2005-02-01

    Full Text Available Real-time streaming media over wireless networks is a challenging proposition due to the characteristics of video data and wireless channels. In this paper, we propose a set of cross-layer techniques for adaptive real-time video streaming over wireless networks. The adaptation is done with respect to both channel and data. The proposed novel packetization scheme constructs the application layer packet in such a way that it is decomposed exactly into an integer number of equal-sized radio link protocol (RLP packets. FEC codes are applied within an application packet at the RLP packet level rather than across different application packets and thus reduce delay at the receiver. A priority-based ARQ, together with a scheduling algorithm, is applied at the application layer to retransmit only the corrupted RLP packets within an application layer packet. Our approach combines the flexibility and programmability of application layer adaptations, with low delay and bandwidth efficiency of link layer techniques. Socket-level simulations are presented to verify the effectiveness of our approach.

  9. A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Tzu-Chieh Tsai

    2009-01-01

    Full Text Available In recent years, Wireless Mesh Networks (WMNs technologies have received significant attentions. WMNs not only accede to the advantages of ad hoc networks but also provide hierarchical multi-interface architecture. Transmission power control and routing path selections are critical issues in the past researches of multihop networks. Variable transmission power levels lead to different network connectivity and interference. Further, routing path selections among different radio interfaces will also produce different intra-/interflow interference. These features tightly affect the network performance. Most of the related works on the routing protocol design do not consider transmission power control and multi-interface environment simultaneously. In this paper, we proposed a cross-layer routing protocol called M2iRi2 which coordinates transmission power control and intra-/interflow interference considerations as routing metrics. Each radio interface calculates the potential tolerable-added transmission interference in the physical layer. When the route discovery starts, the M2iRi2 will adopt the appropriate power level to evaluate each interface quality along paths. The simulation results demonstrate that our design can enhance both network throughput and end-to-end delay.

  10. Dynamics of comb-of-comb-network polymers in random layered flows

    Science.gov (United States)

    Katyal, Divya; Kant, Rama

    2016-12-01

    We analyze the dynamics of comb-of-comb-network polymers in the presence of external random flows. The dynamics of such structures is evaluated through relevant physical quantities, viz., average square displacement (ASD) and the velocity autocorrelation function (VACF). We focus on comparing the dynamics of the comb-of-comb network with the linear polymer. The present work displays an anomalous diffusive behavior of this flexible network in the random layered flows. The effect of the polymer topology on the dynamics is analyzed by varying the number of generations and branch lengths in these networks. In addition, we investigate the influence of external flow on the dynamics by varying flow parameters, like the flow exponent α and flow strength Wα. Our analysis highlights two anomalous power-law regimes, viz., subdiffusive (intermediate-time polymer stretching and flow-induced diffusion) and superdiffusive (long-time flow-induced diffusion). The anomalous long-time dynamics is governed by the temporal exponent ν of ASD, viz., ν =2 -α /2 . Compared to a linear polymer, the comb-of-comb network shows a shorter crossover time (from the subdiffusive to superdiffusive regime) but a reduced magnitude of ASD. Our theory displays an anomalous VACF in the random layered flows that scales as t-α /2. We show that the network with greater total mass moves faster.

  11. Dynamics of comb-of-comb-network polymers in random layered flows.

    Science.gov (United States)

    Katyal, Divya; Kant, Rama

    2016-12-01

    We analyze the dynamics of comb-of-comb-network polymers in the presence of external random flows. The dynamics of such structures is evaluated through relevant physical quantities, viz., average square displacement (ASD) and the velocity autocorrelation function (VACF). We focus on comparing the dynamics of the comb-of-comb network with the linear polymer. The present work displays an anomalous diffusive behavior of this flexible network in the random layered flows. The effect of the polymer topology on the dynamics is analyzed by varying the number of generations and branch lengths in these networks. In addition, we investigate the influence of external flow on the dynamics by varying flow parameters, like the flow exponent α and flow strength W_{α}. Our analysis highlights two anomalous power-law regimes, viz., subdiffusive (intermediate-time polymer stretching and flow-induced diffusion) and superdiffusive (long-time flow-induced diffusion). The anomalous long-time dynamics is governed by the temporal exponent ν of ASD, viz., ν=2-α/2. Compared to a linear polymer, the comb-of-comb network shows a shorter crossover time (from the subdiffusive to superdiffusive regime) but a reduced magnitude of ASD. Our theory displays an anomalous VACF in the random layered flows that scales as t^{-α/2}. We show that the network with greater total mass moves faster.

  12. Analysis of physical layer performance of hybrid optical-wireless access network

    Science.gov (United States)

    Shaddad, R. Q.; Mohammad, A. B.; Al-hetar, A. M.

    2011-09-01

    The hybrid optical-wireless access network (HOWAN) is a favorable architecture for next generation access network. It is an optimal combination of an optical backhaul and a wireless front-end for an efficient access network. In this paper, the HOWAN architecture is designed based on a wavelengths division multiplexing/time division multiplexing passive optical network (WDM/TDM PON) at the optical backhaul and a wireless fidelity (WiFi) technology at the wireless front-end. The HOWAN is proposed that can provide blanket coverage of broadband and flexible connection for end-users. Most of the existing works, based on performance evaluation are concerned on network layer aspects. This paper reports physical layer performance in terms of the bit error rate (BER), eye diagram, and signal-to-noise ratio (SNR) of the communication system. It accommodates 8 wavelength channels with 32 optical network unit/wireless access points (ONU/APs). It is demonstrated that downstream and upstream of 2 Gb/s can be achieved by optical backhaul for each wavelength channel along optical fiber length of 20 km and a data rate of 54 Mb/s per ONU/AP along a 50 m outdoor wireless link.

  13. A two-layer recurrent neural network for nonsmooth convex optimization problems.

    Science.gov (United States)

    Qin, Sitian; Xue, Xiaoping

    2015-06-01

    In this paper, a two-layer recurrent neural network is proposed to solve the nonsmooth convex optimization problem subject to convex inequality and linear equality constraints. Compared with existing neural network models, the proposed neural network has a low model complexity and avoids penalty parameters. It is proved that from any initial point, the state of the proposed neural network reaches the equality feasible region in finite time and stays there thereafter. Moreover, the state is unique if the initial point lies in the equality feasible region. The equilibrium point set of the proposed neural network is proved to be equivalent to the Karush-Kuhn-Tucker optimality set of the original optimization problem. It is further proved that the equilibrium point of the proposed neural network is stable in the sense of Lyapunov. Moreover, from any initial point, the state is proved to be convergent to an equilibrium point of the proposed neural network. Finally, as applications, the proposed neural network is used to solve nonlinear convex programming with linear constraints and L1 -norm minimization problems.

  14. ML-IKE: a multi-layer IKE protocol for TCP performance enhancement in wireless networks

    Science.gov (United States)

    Zhang, Ya-Hang; Cheng, Bo-Wen; Qing, Si-Han; Zou, Guang-Nan; Wen, Wei-Ping

    2009-12-01

    To solve the conflict between TCP accelerating technology based on PEP middle node and IPSec protocol used in the Satellite Network, NASA and the Hughes Research Laboratory (HRL) each independently proposed a solution named Multilayer IPsec protocol which can integrate IPSec with TCP PEPs. The problem is: Traditional IKE protocol can't work with Multilayer IPSec protocol. In this study, the traditional IKE main mode and quick mode are enhanced for layered IPSec protocol, and an improved layered key distribution protocol: ML-IKE is proposed. This key distribution protocol is used for key exchange between peers and middle node, so that different nodes have different security associations (SA), and different security associations correspond to different IP packet fields, so different SA nodes have different authorization to different IP packet fields. ML-IKE protocol is suitable for layered IPSec, thus layered IPSec can be used for automatic key distribution and update.

  15. DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile Adhoc Network

    Directory of Open Access Journals (Sweden)

    G.Padmavathi

    2012-02-01

    Full Text Available The wireless and dynamic nature of mobile ad hoc networks (MANETs leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication endpoints. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.

  16. A cross-layer duty cycle MAC protocol supporting a pipeline feature for wireless sensor networks.

    Science.gov (United States)

    Tong, Fei; Xie, Rong; Shu, Lei; Kim, Young-Chon

    2011-01-01

    Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs) such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC) for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  17. Trans-Omics: How To Reconstruct Biochemical Networks Across Multiple 'Omic' Layers.

    Science.gov (United States)

    Yugi, Katsuyuki; Kubota, Hiroyuki; Hatano, Atsushi; Kuroda, Shinya

    2016-04-01

    We propose 'trans-omic' analysis for reconstructing global biochemical networks across multiple omic layers by use of both multi-omic measurements and computational data integration. We introduce technologies for connecting multi-omic data based on prior knowledge of biochemical interactions and characterize a biochemical trans-omic network by concepts of a static and dynamic nature. We introduce case studies of metabolism-centric trans-omic studies to show how to reconstruct a biochemical trans-omic network by connecting multi-omic data and how to analyze it in terms of the static and dynamic nature. We propose a trans-ome-wide association study (trans-OWAS) connecting phenotypes with trans-omic networks that reflect both genetic and environmental factors, which can characterize several complex lifestyle diseases as breakdowns in the trans-omic system.

  18. A Programmable Architecture for Layered Multimedia Streams in IPv6 Networks

    Directory of Open Access Journals (Sweden)

    Brendan McAllister

    2010-01-01

    Full Text Available A new configurable architecture is presented that offers multiple levels of video playback by accommodating variable levels of network utilization and bandwidth. By utilizing scalable MPEG-4 encoding at the network edge and using specific video delivery protocols, media streaming components are merged to fully optimize video playback for IPv6 networks, thus improving QoS. This is achieved by introducing “programmable network functionality” (PNF which splits layered video transmission and distributes it evenly over available bandwidth, reducing packet loss and delay caused by out-of-profile DiffServ classes. An FPGA design is given which gives improved performance, e.g. link utilization, end-to-end delay, and that during congestion, improves on-time delivery of video frames by up to 80% when compared to current “static” DiffServ.

  19. A one-layer recurrent neural network for constrained nonconvex optimization.

    Science.gov (United States)

    Li, Guocheng; Yan, Zheng; Wang, Jun

    2015-01-01

    In this paper, a one-layer recurrent neural network is proposed for solving nonconvex optimization problems subject to general inequality constraints, designed based on an exact penalty function method. It is proved herein that any neuron state of the proposed neural network is convergent to the feasible region in finite time and stays there thereafter, provided that the penalty parameter is sufficiently large. The lower bounds of the penalty parameter and convergence time are also estimated. In addition, any neural state of the proposed neural network is convergent to its equilibrium point set which satisfies the Karush-Kuhn-Tucker conditions of the optimization problem. Moreover, the equilibrium point set is equivalent to the optimal solution to the nonconvex optimization problem if the objective function and constraints satisfy given conditions. Four numerical examples are provided to illustrate the performances of the proposed neural network.

  20. Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting

    Directory of Open Access Journals (Sweden)

    Nischay Bahl

    2012-07-01

    Full Text Available This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal. Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network, and, the constant shadowing approach is a better fit for a static network, both, under static as well as mobile jammer environments, as compared to the log normal one. An improvement in sink-node packet delivery ratio by 15.02 % and 16.58 % was observed with static and mobile jammer environments respectively, under multicasting and constant shadowing mean of 8.0. Further, average sink-node packet delivery ratio with constant shadowing shows an improvement of 4.15% and 5.94%, using static and mobile jammer environment respectively, in comparison to the values obtained under log normal shadowing based network.

  1. Circumbinary Habitability Niches

    CERN Document Server

    Mason, Paul A; Cuartas-Restrepo, Pablo A; Clark, Joni M

    2014-01-01

    Binaries could provide the best niches for life in the galaxy. Though counterintuitive, this assertion follows directly from stellar tidal interaction theory and the evolution of lower mass stars. There is strong evidence that chromospheric activity of rapidly rotating young stars may be high enough to cause mass loss from atmospheres of potentially habitable planets. The removal of atmospheric water is most critical. Tidal breaking in binaries could help reduce magnetic dynamo action and thereby chromospheric activity in favor of life. We call this the Binary Habitability Mechanism (BHM), that we suggest allows for water retention at levels comparable to or better than Earth. We discuss novel advantages that life may exploit, in these cases, and suggest that life may even thrive on some circumbinary planets. We find that while many binaries do not benefit from BHM, high quality niches do exist for various combinations of stars between 0.55 and 1.0 solar masses. For a given pair of stellar masses, BHM operate...

  2. A High-Efficiency Uneven Cluster Deployment Algorithm Based on Network Layered for Event Coverage in UWSNs

    Directory of Open Access Journals (Sweden)

    Shanen Yu

    2016-12-01

    Full Text Available Most existing deployment algorithms for event coverage in underwater wireless sensor networks (UWSNs usually do not consider that network communication has non-uniform characteristics on three-dimensional underwater environments. Such deployment algorithms ignore that the nodes are distributed at different depths and have different probabilities for data acquisition, thereby leading to imbalances in the overall network energy consumption, decreasing the network performance, and resulting in poor and unreliable late network operation. Therefore, in this study, we proposed an uneven cluster deployment algorithm based network layered for event coverage. First, according to the energy consumption requirement of the communication load at different depths of the underwater network, we obtained the expected value of deployment nodes and the distribution density of each layer network after theoretical analysis and deduction. Afterward, the network is divided into multilayers based on uneven clusters, and the heterogeneous communication radius of nodes can improve the network connectivity rate. The recovery strategy is used to balance the energy consumption of nodes in the cluster and can efficiently reconstruct the network topology, which ensures that the network has a high network coverage and connectivity rate in a long period of data acquisition. Simulation results show that the proposed algorithm improves network reliability and prolongs network lifetime by significantly reducing the blind movement of overall network nodes while maintaining a high network coverage and connectivity rate.

  3. Layer-specific chromatin accessibility landscapes reveal regulatory networks in adult mouse visual cortex

    Science.gov (United States)

    Gray, Lucas T; Yao, Zizhen; Nguyen, Thuc Nghi; Kim, Tae Kyung; Zeng, Hongkui; Tasic, Bosiljka

    2017-01-01

    Mammalian cortex is a laminar structure, with each layer composed of a characteristic set of cell types with different morphological, electrophysiological, and connectional properties. Here, we define chromatin accessibility landscapes of major, layer-specific excitatory classes of neurons, and compare them to each other and to inhibitory cortical neurons using the Assay for Transposase-Accessible Chromatin with high-throughput sequencing (ATAC-seq). We identify a large number of layer-specific accessible sites, and significant association with genes that are expressed in specific cortical layers. Integration of these data with layer-specific transcriptomic profiles and transcription factor binding motifs enabled us to construct a regulatory network revealing potential key layer-specific regulators, including Cux1/2, Foxp2, Nfia, Pou3f2, and Rorb. This dataset is a valuable resource for identifying candidate layer-specific cis-regulatory elements in adult mouse cortex. DOI: http://dx.doi.org/10.7554/eLife.21883.001 PMID:28112643

  4. A Combined Solution for Routing and Medium Access Control Layer Attacks in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    R. Murugan

    2010-01-01

    Full Text Available Problem statement: In Mobile Ad hoc Network (MANET, both the routing layer and the Medium Access Control (MAC layer are vulnerable to several attacks. There are very few techniques to detect and isolate the attacks of both these layers simultaneously. In this study, we developed a combined solution for routing and MAC layer attacks. Approach: Our approach, makes use of three techniques simultaneously which consists of a cumulative frequency based detection technique for detecting MAC layers attacks, data forwarding behavior based detection technique for detecting packet drops and message authentication code based technique for packet modification. Results: Our combined solution presents a reputation value for detecting the malicious nodes and isolates them from further network participation till its revocation. Our approach periodically checks all nodes, including the isolated nodes, at regular time period λ. A node which recovers from its misbehaving condition is revoked to its normal condition after the time period λ. Conclusion/Recommendations: By simulation results, we show that our combined solution provides more security by increased packet delivery ratio and reduced packet drops. We also shown that our approach has less overhead compared to the existing technique.

  5. Reverse-feeding effect of epidemic by propagators in two-layered networks

    Science.gov (United States)

    Dayu, Wu; Yanping, Zhao; Muhua, Zheng; Jie, Zhou; Zonghua, Liu

    2016-02-01

    Epidemic spreading has been studied for a long time and is currently focused on the spreading of multiple pathogens, especially in multiplex networks. However, little attention has been paid to the case where the mutual influence between different pathogens comes from a fraction of epidemic propagators, such as bisexual people in two separated groups of heterosexual and homosexual people. We here study this topic by presenting a network model of two layers connected by impulsive links, in contrast to the persistent links in each layer. We let each layer have a distinct pathogen and their interactive infection is implemented by a fraction of propagators jumping between the corresponding pairs of nodes in the two layers. By this model we show that (i) the propagators take the key role to transmit pathogens from one layer to the other, which significantly influences the stabilized epidemics; (ii) the epidemic thresholds will be changed by the propagators; and (iii) a reverse-feeding effect can be expected when the infective rate is smaller than its threshold of isolated spreading. A theoretical analysis is presented to explain the numerical results. Project supported by the National Natural Science Foundation of China (Grant Nos. 11135001, 11375066, and 11405059) and the National Basic Key Program of China (Grant No. 2013CB834100).

  6. Network-adaptive HD MPEG-2 video streaming with cross-layered channel monitoring in WLAN

    Institute of Scientific and Technical Information of China (English)

    PARK Sanghoon; YOON Hayoung; KIM Jongwon

    2006-01-01

    In this paper, we propose a practical design and implementation of network-adaptive high definition (HD) MPEG-2video streaming combined with cross-layered channel monitoring (CLM) over the IEEE 802.1 la wireless local area network (WLAN). For wireless channel monitoring, we adopt a cross-layered approach, where an access point (AP) periodically measures lower layers such as medium access control (MAC) and physical (PHY) transmission information (e.g., MAC layer loss rate) and then sends the monitored information to the streaming server application. The adaptive streaming server with the CLM scheme reacts more quickly and efficiently to the fluctuating wireless channel than the end-to-end application-layer monitoring (E2EM)scheme. The streaming server dynamically performs priority-based frame dropping to adjust the sending rate according to the measured wireless channel condition. For this purpose, the proposed streaming system nicely provides frame-based prioritized packetization by using a real-time stream parsing module. Various evaluation results over an IEEE 802.1 la WLAN testbed are provided to verify the intended Quality of Service (QoS) adaptation capability. Experimental results showed that the proposed system can mitigate the quality degradation of video streaming due to the fluctuations of time-varying channel.

  7. Cross-Layer Optimization of MIMO-Based Mesh Networks with Gaussian Vector Broadcast Channels

    CERN Document Server

    Liu, Jia

    2007-01-01

    MIMO technology is one of the most significant advances in the past decade to increase channel capacity and has a great potential to improve network capacity for mesh networks. In a MIMO-based mesh network, the links outgoing from each node sharing the common communication spectrum can be modeled as a Gaussian vector broadcast channel. Recently, researchers showed that ``dirty paper coding'' (DPC) is the optimal transmission strategy for Gaussian vector broadcast channels. So far, there has been little study on how this fundamental result will impact the cross-layer design for MIMO-based mesh networks. To fill this gap, we consider the problem of jointly optimizing DPC power allocation in the link layer at each node and multihop/multipath routing in a MIMO-based mesh networks. It turns out that this optimization problem is a very challenging non-convex problem. To address this difficulty, we transform the original problem to an equivalent problem by exploiting the channel duality. For the transformed problem,...

  8. Two-layer wireless distributed sensor/control network based on RF

    Science.gov (United States)

    Feng, Li; Lin, Yuchi; Zhou, Jingjing; Dong, Guimei; Xia, Guisuo

    2006-11-01

    A project of embedded Wireless Distributed Sensor/Control Network (WDSCN) based on RF is presented after analyzing the disadvantages of traditional measure and control system. Because of high-cost and complexity, such wireless techniques as Bluetooth and WiFi can't meet the needs of WDSCN. The two-layer WDSCN is designed based on RF technique, which operates in the ISM free frequency channel with low power and high transmission speed. Also the network is low cost, portable and moveable, integrated with the technologies of computer network, sensor, microprocessor and wireless communications. The two-layer network topology is selected in the system; a simple but efficient self-organization net protocol is designed to fit the periodic data collection, event-driven and store-and-forward. Furthermore, adaptive frequency hopping technique is adopted for anti-jamming apparently. The problems about power reduction and synchronization of data in wireless system are solved efficiently. Based on the discussion above, a measure and control network is set up to control such typical instruments and sensors as temperature sensor and signal converter, collect data, and monitor environmental parameters around. This system works well in different rooms. Experiment results show that the system provides an efficient solution to WDSCN through wireless links, with high efficiency, low power, high stability, flexibility and wide working range.

  9. MIMO Channel Estimation and Equalization Using Three-Layer Neural Networks with Feedback

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper describes a channel estimation and equalization algorithm using three-layer artificial neural networks (ANNs) with feedback for multiple input multiple output wireless communication systems.An ANN structure with feedback was designed to use different learning algorithms in the different ANN layers. This actually forms a Turbo iteration process between the different algorithms which effectively improves the estimation performance of the channel equalizer. Simulation results show that this channel equalization algorithm has better computational efficiency and faster convergence than higher order statistics based algorithms.

  10. Thickness gauging of thin layers by laser ultrasonics and neural network

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, F; Jenot, F; Ouaftouh, M; Duquennoy, M; Ourak, M, E-mail: Fabien.lefevre@univ-valenciennes.fr [Institut d' Electronique de Microelectronique et de Nanotechnologie Departement Opto-Acousto-Electronique (UMR CNRS 8520), Universite de Valenciennes, Le Mont Houy, 59313 Valenciennes Cedex 09 (France)

    2011-01-01

    Non destructive testing has been performed on a thin indium layer deposited on a two inches silicon wafer. Guided waves were generated and studied using a laser ultrasonic setup, and a two-dimensional Fourier transform technique was employed to obtain the dispersion curves. The inverse problem, in other words the determination of the layer thickness and the elastic constants of the substrate, has been solved by means of a feedforward neural network. These parameters were then evaluated simultaneously, the dispersion curves being entirely fitted. The experimental results show a good agreement with the theoretical model. This inversion method was found to be prompt and easy to automate.

  11. A One-Layer Recurrent Neural Network for Pseudoconvex Optimization Problems With Equality and Inequality Constraints.

    Science.gov (United States)

    Qin, Sitian; Yang, Xiudong; Xue, Xiaoping; Song, Jiahui

    2017-10-01

    Pseudoconvex optimization problem, as an important nonconvex optimization problem, plays an important role in scientific and engineering applications. In this paper, a recurrent one-layer neural network is proposed for solving the pseudoconvex optimization problem with equality and inequality constraints. It is proved that from any initial state, the state of the proposed neural network reaches the feasible region in finite time and stays there thereafter. It is also proved that the state of the proposed neural network is convergent to an optimal solution of the related problem. Compared with the related existing recurrent neural networks for the pseudoconvex optimization problems, the proposed neural network in this paper does not need the penalty parameters and has a better convergence. Meanwhile, the proposed neural network is used to solve three nonsmooth optimization problems, and we make some detailed comparisons with the known related conclusions. In the end, some numerical examples are provided to illustrate the effectiveness of the performance of the proposed neural network.

  12. Cross-layering in an Industrial Wireless Sensor Network: Case Study of OCARI

    Directory of Open Access Journals (Sweden)

    Khaldoun Al Agha

    2009-08-01

    Full Text Available Wireless sensor networks are adapted to monitoring applications. Specific solutions have to be developed for industrial environments in order to deal with the harsh radio conditions and the QoS (quality of service requirements of industrial applications. In this paper, we present the main protocols used in the OCARI project, and we describe their use of cross-layering techniques. We show how it enables us to improve the performance of the network. For each protocol, we give a performance evaluation of its main characteristic.

  13. Prototyping and Performance Analysis of a QoS MAC Layer for Industrial Wireless Network

    CERN Document Server

    Bossche, Adrien Van Den; Campo, Eric

    2008-01-01

    Today's industrial sensor networks require strong reliability and guarantees on messages delivery. These needs are even more important in real time applications like control/command, such as robotic wireless communications where strong temporal constraints are critical. For these reasons, classical random-based Medium Access Control (MAC) protocols present a non-null frame collision probability. In this paper we present an original full deterministic MAC-layer for industrial wireless network and its performance evaluation thanks to the development of a material prototype.

  14. Highly Accurate Multi-layer Perceptron Neural Network for Air Data System

    Directory of Open Access Journals (Sweden)

    H. S. Krishna

    2009-11-01

    Full Text Available The error backpropagation multi-layer perceptron algorithm is revisited. This algorithm is used to train and validate two models of three-layer neural networks that can be used to calibrate a 5-hole pressure probe. This paper addresses Occam's Razor problem as it describes the adhoc training methodology applied to improve accuracy and sensitivity. The trained outputs from 5-4-3 feed-forward network architecture with jump connection are comparable to second decimal digit (~0.05 accuracy, hitherto unreported in literature.Defence Science Journal, 2009, 59(6, pp.670-674, DOI:http://dx.doi.org/10.14429/dsj.59.1574

  15. Neighbor Discovery in a Wireless Sensor Network: Multipacket Reception Capability and Physical-Layer Signal Processing

    CERN Document Server

    Jeon, Jeongho

    2011-01-01

    In randomly deployed networks, such as sensor networks, an important problem for each node is to discover its \\textit{neighbor} nodes so that the connectivity amongst nodes can be established. In this paper, we consider this problem by incorporating the physical layer parameters in contrast to the most of the previous work which assumed a collision channel. Specifically, the pilot signals that nodes transmit are successfully decoded if the strength of the received signal relative to the interference is sufficiently high. Thus, each node must extract signal parameter information from the superposition of an unknown number of received signals. This problem falls naturally in the purview of random set theory (RST) which generalizes standard probability theory by assigning \\textit{sets}, rather than values, to random outcomes. The contributions in the paper are twofold: first, we introduce the realistic effect of physical layer considerations in the evaluation of the performance of \\textit{logical} discovery algo...

  16. Advanced Measurements of the Aggregation Capability of the MPT Network Layer Multipath Communication Library

    Directory of Open Access Journals (Sweden)

    Gábor Lencse

    2015-05-01

    Full Text Available The MPT network layer multipath communicationlibrary is a novel solution for several problems including IPv6transition, reliable data transmission using TCP, real-time transmissionusing UDP and also wireless network layer routingproblems. MPT can provide an IPv4 or an IPv6 tunnel overone or more IPv4 or IPv6 communication channels. MPT canalso aggregate the capacity of multiple physical channels. In thispaper, the channel aggregation capability of the MPT libraryis measured up to twelve 100Mbps speed channels. Differentscenarios are used: both IPv4 and IPv6 are used as the underlyingand also as the encapsulated protocols and also both UDP andTCP are used as transport protocols. In addition, measurementsare taken with both 32-bit and 64-bit version of the MPT library.In all cases, the number of the physical channels is increased from1 to 12 and the aggregated throughput is measured.

  17. Power and Subcarrier Allocation for Physical-Layer Security in OFDMA-based Broadband Wireless Networks

    CERN Document Server

    Wang, Xiaowei; Mo, Jianhua; Xu, Youyun

    2011-01-01

    Providing physical-layer security for mobile users in future broadband wireless networks is of both theoretical and practical importance. In this paper, we formulate an analytical framework for resource allocation in a downlink OFDMA-based broadband network with coexistence of secure users (SU) and normal users (NU). The SU's require secure data transmission at the physical layer while the NU's are served with conventional best-effort data traffic. The problem is formulated as joint power and subcarrier allocation with the objective of maximizing average aggregate information rate of all NU's while maintaining an average secrecy rate for each individual SU under a total transmit power constraint for the base station. We solve this problem in an asymptotically optimal manner using dual decomposition. Our analysis shows that an SU becomes a candidate competing for a subcarrier only if its channel gain on this subcarrier is the largest among all and exceeds the second largest by a certain threshold. Furthermore,...

  18. Modeling Liner Shipping Service Selection and Container Flows using a Multi-layer Network

    DEFF Research Database (Denmark)

    Karsten, Christian Vad; Balakrishnan, Anant

    We introduce a new formulation for the tactical planning problem facing container shipping companies of selecting the best subset of sailing routes from a given pool of candidate routes so as to maximize profit. Since most containers are sent directly or transshipped at most twice in current liner...... shipping networks, we impose limits on the number of transshipments for each container (which most previous models do not incorporate). Our multi-layer multi-commodity model associates one commodity with each container origin port, and decides the route for each commodity on a logical network layer whose...... arcs represent segments (pairs of ports between which a container can use a single service). This approach, combined with commodity flow variables that are indexed by segment sequence permits us to incorporate the transshipment limits while also tracking the commodity’s outflow from the system...

  19. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks (WPA

  20. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  1. Passing Corrupt Data Across Network Layers: An Overview of Recent Developments and Issues

    Directory of Open Access Journals (Sweden)

    Michael Welzl

    2005-02-01

    Full Text Available Recent Internet developments seem to make a point for passing corrupt data from the link to the network layer and above instead of ensuring data integrity with a checksum and ARQ. We give an overview of these efforts (the UDP Lite and DCCP protocols and explain which circumstances would justify delivery of erroneous data; clearly, the missing piece in the puzzle is efficient and meaningful interlayer communication.

  2. Practical Privacy in WDM Networks with All-Optical Layered Encryption

    OpenAIRE

    Engelmann, Anna; Jukan, Admela

    2016-01-01

    Privacy in form of anonymous communication could be comparably both faster and harder to break in optical routers than in today's anonymous IP networks based on The Onion Routing (Tor). Implementing the practical privacy alloptically,however, is not straightforward, as it requires key generation in each anonymization node to avoid distribution of long keys, and layered encryption, both at the optical line rate. Due to the unavailability of cryptographically strong optical key generation and e...

  3. Design of a Virtual Component Neutral Network-on-Chip Transaction Layer

    CERN Document Server

    Martin, Philippe

    2011-01-01

    Research studies have demonstrated the feasibility and advantages of Network-on-Chip (NoC) over traditional bus-based architectures but have not focused on compatibility communication standards. This paper describes a number of issues faced when designing a VC-neutral NoC, i.e. compatible with standards such as AHB 2.0, AXI, VCI, OCP, and various other proprietary protocols, and how a layered approach to communication helps solve these issues.

  4. Cross-Layer Handover Scheme for Multimedia Communications in Next Generation Wireless Networks

    OpenAIRE

    Lin Chun-Cheng; Deng Der-Jiunn; Tang Yuliang; Kou Guannan

    2010-01-01

    In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS) of next generation network, a multiprotocol combined handover mechanism is proposed in this paper. We combine SIP (Session Initiation Protocol), FMIP (Fast Mobile IPv6 Protocol), and MIH (Media Independent Handover) protocols by cross-layer design and optimize those protocols' signaling flows to improve the performance of vertical handover. Theoretical analysis and simulation results illustr...

  5. The niche of envy

    DEFF Research Database (Denmark)

    Quintanilla, Laura; Jensen de López, Kristine M.

    2013-01-01

    Envy is the religion of the mediocre. It comforts them, it responds to the worries that gnaw at them and finally it rots their souls, allowing them to justify their meanings and their greed until they believe these to be virtues.—Carlos Ruiz Zafón “The niche of envy” is a cross-disciplinary attempt...... to capture and understand the complex and self-conscious emotion of envy as unfolded within social relationships and cultural settings. One of our main interests concerns how children come to understand envy in ontogenesis. Accordingly, we review existing theoretical approaches to understanding envy...... and introduce preliminary data about children’s understanding of envy. This paper consists of three sections. In the first section, we define envy by introducing the conditions and components that form part of it. We emphasize the fact that envy is a complex and embodied emotion, which embraces a triadic...

  6. MAC-Layer Active Dropping for Real-Time Video Streaming in 4G Access Networks

    KAUST Repository

    She, James

    2010-12-01

    This paper introduces a MAC-layer active dropping scheme to achieve effective resource utilization, which can satisfy the application-layer delay for real-time video streaming in time division multiple access based 4G broadband wireless access networks. When a video frame is not likely to be reconstructed within the application-layer delay bound at a receiver for the minimum decoding requirement, the MAC-layer protocol data units of such video frame will be proactively dropped before the transmission. An analytical model is developed to evaluate how confident a video frame can be delivered within its application-layer delay bound by jointly considering the effects of time-varying wireless channel, minimum decoding requirement of each video frame, data retransmission, and playback buffer. Extensive simulations with video traces are conducted to prove the effectiveness of the proposed scheme. When compared to conventional cross-layer schemes using prioritized-transmission/retransmission, the proposed scheme is practically implementable for more effective resource utilization, avoiding delay propagation, and achieving better video qualities under certain conditions.

  7. The influence on Mass Media Ecological Niche Caused by the Innovation of Tri- Networks Convergence%“三网融合”对我国传媒生态位的影响

    Institute of Scientific and Technical Information of China (English)

    罗卫光

    2012-01-01

    我国已经进入"三网融合"试点阶段,"三网融合"对传媒生态位产生潜在影响:一是促进传媒物理生态位变迁,实现各类媒介的"时空趋同";二是革新传媒的营养生态位,改变生态营养单一的状况,丰富传媒的食物链;三是革新传媒的政治生态位,淡化传媒管制的行政色彩,凸显市场力量。这将带来传媒生态危机,诸如版权问题、内容同质化及信息安全等问题。在这种趋势下,再造生产流程、实行制播分离,采取生态位分离、细分、整合、创新等策略是应对传媒生态位变迁的有效举措。%Nowadays China has come to a stage of experimenting tri-network convergence which would lead to the transformation of mass media ecological niche through extending the nerve of the media to realize the assimilation without limitation of time and space,changing the condition of lacking various ecological nutrition,strengthening the regulation on market force of mass media while weakening its influence of administration force.Tri-network convergence also causes media ecological crisis such as infringing upon copyright,the assimilation of communication content,the safety of information.It is an effective solution to solve the problem by reforming the process of information production,separating the fabrication and transmission of programme,and dividing,integrating,and creating ecological niche.

  8. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  9. Risks of an epidemic in a two-layered railway-local area traveling network

    Science.gov (United States)

    Ruan, Zhongyuan; Hui, Pakming; Lin, Haiqing; Liu, Zonghua

    2013-01-01

    In view of the huge investments into the construction of high speed rails systems in USA, Japan, and China, we present a two-layer traveling network model to study the risks that the railway network poses in case of an epidemic outbreak. The model consists of two layers with one layer representing the railway network and the other representing the local-area transportation subnetworks. To reveal the underlying mechanism, we also study a simplified model that focuses on how a major railway affects an epidemic. We assume that the individuals, when they travel, take on the shortest path to the destination and become non-travelers upon arrival. When an infection process co-evolves with the traveling dynamics, the railway serves to gather a crowd, transmit the disease, and spread infected agents to local area subnetworks. The railway leads to a faster initial increase in infected agents and a higher steady state infection, and thus poses risks; and frequent traveling leads to a more severe infection. These features revealed in simulations are in agreement with analytic results of a simplified version of the model.

  10. Self-healing sandwich structures incorporating an interfacial layer with vascular network

    Science.gov (United States)

    Chen, Chunlin; Peters, Kara; Li, Yulong

    2013-02-01

    A self-healing capability specifically targeted for sandwich composite laminates based on interfacial layers with built-in vascular networks is presented. The self-healing occurs at the facesheet-core interface through an additional interfacial layer to seal facesheet cracks and rebond facesheet-core regions. The efficacy of introducing the self-healing system at the facesheet-core interface is evaluated through four-point bend and edgewise compression testing of representative foam core sandwich composite specimens with impact induced damage. The self-healing interfacial layer partially restored the specific initial stiffness, doubling the residual initial stiffness as compared to the control specimen after the impact event. The restoration of the ultimate specific skin strength was less successful. The results also highlight the critical challenge in self-healing of sandwich composites, which is to rebond facesheets which have separated from the core material.

  11. Study on Three-layered Grid Conceptual Prototype Using Ecological Network Computing Environment

    Institute of Scientific and Technical Information of China (English)

    GAO Lei; DING Yong-sheng; REN Li-hong

    2004-01-01

    Next generation grid systems where the emphasis shifts to distributed global collaboration, a service-oriented approach and information layer issues exhibit a strong sense of automation. Requirements for these systems resemble the self-organizing and the healing properties of natural ecosystems. Some key ecological concepts and mechanisms are introduced into the design for the third generation grid computing architectures by inspiration of this resemblance. Also, an Ecological Network-based Computing Environment (ENCE) platform is designed in this paper. Based on the ENCE platform, a grid-computing model of three-layered grid conceptual prototype that embeds the ENCE layers is presented from the viewpoint of implementation. The implementation model should be useful to the design of the third generation grid systems.

  12. ANODR-ECC Key Management protocol with TELNET to secure Application and Network layer for Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    G.Padmavathi

    2012-02-01

    Full Text Available A mobile ad hoc network (MANETs is a self-organizing network that consists of mobile nodes that are connected through wireless media. A number of unique features, such as lack of infrastructural or central administrative supports, dynamic network topologies, open communication channels, and limited device capabilities and bandwidths, have made secure, reliable and efficient routing operations in MANET a challenging task. The ultimate goal of the security solutions for MANET is to provide security services, such as authentication, confidentiality, integrity, anonymity, and availability to mobile users. To achieve the goals, the security solution need for entire protocol stack. . The proposed protocol ANODRECC with Telnet provide application layer security and it ensures route anonymity and location privacy and is robust against eavesdropping attack.For route anonymity, it prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, it ensures that adversaries cannot discover the real identities of local transmitters. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has exposed improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio and Average jitter.

  13. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  14. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  15. Fault-tolerant and QoS based Network Layer for Security Management

    Directory of Open Access Journals (Sweden)

    Mohamed Naceur Abdelkrim

    2013-07-01

    Full Text Available Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets.

  16. Cross-layer ultrasound video streaming over mobile WiMAX and HSUPA networks.

    Science.gov (United States)

    Alinejad, Ali; Philip, Nada Y; Istepanian, Robert S H

    2012-01-01

    It is well known that the evolution of 4G-based mobile multimedia network systems will contribute significantly to future mobile healthcare (m-health) applications that require high bandwidth and fast data rates. Central to the success of such emerging applications is the compatibility of broadband networks, such as mobile Worldwide Interoperability For Microwave Access (WiMAX) and High-Speed Uplink Packet Access (HSUPA), and especially their rate adaption issues combined with the acceptable real-time medical quality of service requirements. In this paper, we address the relevant challenges of cross-layer design requirements for real-time rate adaptation of ultrasound video streaming in mobile WiMAX and HSUPA networks. A comparative performance analysis of such approach is validated in two experimental m-health test bed systems for both mobile WiMAX and HSUPA networks. The experimental results have shown an improved performance of mobile WiMAX compared to the HSUPA using the same cross-layer optimization approach.

  17. A Layer-Cluster Key Agreement Protocol for Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Li-ping; CUI Guo-hua; LEI Jian-yun; XU Jing-fang; LU She-jie

    2008-01-01

    Mobile ad hoc networks create additional challenges for implementing the group key establishment due to resource constraints on nodes and dynamic changes on topology. The nodes in mobile ad hoc networks are usually low power devices that run on battery power. As a result, the costs of the node resources should be minimized when constructing a group key agreement protocol so that the battery life could be prolonged. To achieve this goal, in this paper we propose a security efficient group key agreement protocol based on Burmester-Desmedt (BD) scheme and layer-cluster group model, referred to as LCKM-BD, which is appropriate for large mobile ad hoc networks. In the layer-cluster group model, BD scheme is employed to establish group key, which can not only meet security demands of mobile ad hoc networks but also improve executing performance. Finally, the proposed protocol LCKM-BD are compared with BD, TGDH (tree-based group Diffe-Hellman), and GDH (group Diffie-Hellman) group key agreement protocols. The analysis results show that our protocol can significantly decrease both the computational overhead and communication costs with respect to these comparable protocols.

  18. Cross-layer design for intrusion detection and data security in wireless ad hoc sensor networks

    Science.gov (United States)

    Hortos, William S.

    2007-09-01

    A wireless ad hoc sensor network is a configuration for area surveillance that affords rapid, flexible deployment in arbitrary threat environments. There is no infrastructure support and sensor nodes communicate with each other only when they are in transmission range. The nodes are severely resource-constrained, with limited processing, memory and power capacities and must operate cooperatively to fulfill a common mission in typically unattended modes. In a wireless sensor network (WSN), each sensor at a node can observe locally some underlying physical phenomenon and sends a quantized version of the observation to sink (destination) nodes via wireless links. Since the wireless medium can be easily eavesdropped, links can be compromised by intrusion attacks from nodes that may mount denial-of-service attacks or insert spurious information into routing packets, leading to routing loops, long timeouts, impersonation, and node exhaustion. A cross-layer design based on protocol-layer interactions is proposed for detection and identification of various intrusion attacks on WSN operation. A feature set is formed from selected cross-layer parameters of the WSN protocol to detect and identify security threats due to intrusion attacks. A separate protocol is not constructed from the cross-layer design; instead, security attributes and quantified trust levels at and among nodes established during data exchanges complement customary WSN metrics of energy usage, reliability, route availability, and end-to-end quality-of-service (QoS) provisioning. Statistical pattern recognition algorithms are applied that use observed feature-set patterns observed during network operations, viewed as security audit logs. These algorithms provide the "best" network global performance in the presence of various intrusion attacks. A set of mobile (software) agents distributed at the nodes implement the algorithms, by moving among the layers involved in the network response at each active node

  19. Layer 1 VPN services in distributed next-generation SONET/SDH networks with inverse multiplexing

    Science.gov (United States)

    Ghani, N.; Muthalaly, M. V.; Benhaddou, D.; Alanqar, W.

    2006-05-01

    Advances in next-generation SONET/SDH along with GMPLS control architectures have enabled many new service provisioning capabilities. In particular, a key services paradigm is the emergent Layer 1 virtual private network (L1 VPN) framework, which allows multiple clients to utilize a common physical infrastructure and provision their own 'virtualized' circuit-switched networks. This precludes expensive infrastructure builds and increases resource utilization for carriers. Along these lines, a novel L1 VPN services resource management scheme for next-generation SONET/SDH networks is proposed that fully leverages advanced virtual concatenation and inverse multiplexing features. Additionally, both centralized and distributed GMPLS-based implementations are also tabled to support the proposed L1 VPN services model. Detailed performance analysis results are presented along with avenues for future research.

  20. High Performance Hybrid Two Layer Router Architecture for FPGAs Using Network On Chip

    CERN Document Server

    Ezhumalai, P; Arun, C; Sakthivel, P; Sridharan, D

    2010-01-01

    Networks on Chip is a recent solution paradigm adopted to increase the performance of Multicore designs. The key idea is to interconnect various computation modules (IP cores) in a network fashion and transport packets simultaneously across them, thereby gaining performance. In addition to improving performance by having multiple packets in flight, NoCs also present a host of other advantages including scalability, power efficiency, and component reuse through modular design. This work focuses on design and development of high performance communication architectures for FPGAs using NoCs Once completely developed, the above methodology could be used to augment the current FPGA design flow for implementing multicore SoC applications. We design and implement an NoC framework for FPGAs, MultiClock OnChip Network for Reconfigurable Systems (MoCReS). We propose a novel microarchitecture for a hybrid two layer router that supports both packetswitched communications, across its local and directional ports, as well as...

  1. A one-layer recurrent neural network for constrained nonsmooth invex optimization.

    Science.gov (United States)

    Li, Guocheng; Yan, Zheng; Wang, Jun

    2014-02-01

    Invexity is an important notion in nonconvex optimization. In this paper, a one-layer recurrent neural network is proposed for solving constrained nonsmooth invex optimization problems, designed based on an exact penalty function method. It is proved herein that any state of the proposed neural network is globally convergent to the optimal solution set of constrained invex optimization problems, with a sufficiently large penalty parameter. In addition, any neural state is globally convergent to the unique optimal solution, provided that the objective function and constraint functions are pseudoconvex. Moreover, any neural state is globally convergent to the feasible region in finite time and stays there thereafter. The lower bounds of the penalty parameter and convergence time are also estimated. Two numerical examples are provided to illustrate the performances of the proposed neural network.

  2. Denial of Service (DoS Attacks at Network Layer in WSN

    Directory of Open Access Journals (Sweden)

    Sunil Ghildiyal,

    2015-11-01

    Full Text Available Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire, flood and record the data and to forward meaningful data to the center head node for observation, resulting an advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc. but applications based on these sensors demand on-time collection of information or data and then to send same on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link layer and particularly at network layer in details with some suggestions against attacks.

  3. Competition of simple and complex adoption on multi-layer networks

    CERN Document Server

    Czaplicka, Agnieszka; Miguel, Maxi San

    2016-01-01

    We consider the competition of two different mechanisms for adoption processes, named as simple and complex adoption. When considered separately, these mechanisms lead, respectively, to a continuous and a first order phase transitions from a non-adoption to an adoption phase. We couple the two adoption processes in a complex network with two interconnected layers. Dynamics in one of the layers is governed by a threshold model (complex adoption), where nodes change their internal states based on the global state of their neighborhood. In an isolated layer the transition occurs for a critical value $\\theta_c$ of the individual threshold for adoption. The second layer follows SIS rules of dynamics (simple adoption), where the state of the nodes change by binary interactions with neighbors. The transition in an isolated SIS layer occurs for a critical value $\\lambda_c$ of the individual probability of adoption. We find that the transition points and also the nature of the transitions are modified in the coupled d...

  4. Shifting Niches for Community Structure Detection

    DEFF Research Database (Denmark)

    Grappiolo, Corrado; Togelius, Julian; Yannakakis, Georgios N.

    2013-01-01

    in complete networks, this approach seems to scale badly due to solutions with the wrong number of communities dominating the population. The new algorithm is based on a niching model, where separate compartments of the population contain candidate solutions with different numbers of communities. We......We present a new evolutionary algorithm for com- munity structure detection in both undirected and unweighted (sparse) graphs and fully connected weighted digraphs (complete networks). Previous investigations have found that, although evolutionary computation can identify community structure...... experimentally compare the new algorithm to the well-known algorithms of Pizzuti and Tasgin, and find that we outperform those algorithms for sparse graphs under some conditions, and drastically outperform them on complete networks under all tested conditions....

  5. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Qingchun Ren

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  6. Meta-food-chains as a many-layer epidemic process on networks

    CERN Document Server

    Barter, Edmund

    2015-01-01

    Notable recent works have focused on the multi-layer properties of coevolving diseases. We point out that very similar systems play an important role in population ecology. Specifically we study a meta food-web model that was recently proposed by Pillai et al. This model describes a network of species connected by feeding interactions, which spread over a network of spatial patches. Focusing on the essential case, where the network of feeding interactions is a chain, we develop an analytical approach for the computation of the degree distributions of colonized spatial patches for the different species in the chain. This framework allows us to address ecologically relevant questions. Considering configuration model ensembles of spatial networks, we find that there is an upper bound for the fraction of patches that a given species can occupy, which depends only on the networks mean degree. For a given mean degree there is then an optimal degree distribution that comes closest to the upper bound. Notably scale-f...

  7. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.

    Science.gov (United States)

    Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang

    2015-09-25

    Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  8. Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2015-09-01

    Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.

  9. Security risk assessment of the primary layer of wavelength division multiplexing passive optical network

    Science.gov (United States)

    Koudelka, Petr; Siska, Petr; Latal, Jan; Poboril, Radek; Hajek, Lukas; Kepak, Stanislav; Vasinek, Vladimir

    2015-01-01

    Next-generation passive optical access networks come to the fore nowadays. These optical next-generation networks are the response to the increasing qualitative requirements from end users. Technologies using Time Division Multiplexing include NG-PON (XG-PON 1 and XG-PON 2) and 10GEPON. Their advantage is the applicability to older topologies, which are operated by the original technology of passive optical access networks. Wavelength Division Multiplexing Passive Optical Network (WDM-PON) is an alternative also belonging to next-generation networks. Time Division Multiplexing is in this case replaced by Wavelength Division Multiplexing. Certain variants of WDM-PON use a combination of broadband light source, optical circulator, optical phased array and tunable FP laser. Construction of the terminal units (ONU) is advantageous because it can always tune in to the appropriate wavelength in the given optical DWDM channel (100 GHz). The disadvantage is the increased security risk on the primary layer due to channel crosstalk in an optical phased array (AWG). The aim of this paper is to assess the degree of security risk in real conditions. The article includes both simulation and real measurements in C + L bands with 100 GHz DWDM spacing.

  10. Self-Assembly of Single-Layer CoAl-Layered Double Hydroxide Nanosheets on 3D Graphene Network Used as Highly Efficient Electrocatalyst for Oxygen Evolution Reaction.

    Science.gov (United States)

    Ping, Jianfeng; Wang, Yixian; Lu, Qipeng; Chen, Bo; Chen, Junze; Huang, Ying; Ma, Qinglang; Tan, Chaoliang; Yang, Jian; Cao, Xiehong; Wang, Zhijuan; Wu, Jian; Ying, Yibin; Zhang, Hua

    2016-09-01

    A non-noble metal based 3D porous electrocatalyst is prepared by self-assembly of the liquid-exfoliated single-layer CoAl-layered double hydroxide nanosheets (CoAl-NSs) onto 3D graphene network, which exhibits higher catalytic activity and better stability for electrochemical oxygen evolution reaction compared to the commercial IrO2 nanoparticle-based 3D porous electrocatalyst.

  11. Research on Performance Evaluation of Biological Database based on Layered Queuing Network Model under the Cloud Computing Environment

    OpenAIRE

    Zhengbin Luo; Dongmei Sun

    2013-01-01

    To evaluate the performance of biological database based on layered queuing network model and under cloud computing environment is a premise, as well as an important step for biological database optimization. Based on predecessors’ researches concerning computer software and hardware performance evaluation under cloud environment, the study has further constructed a model system to evaluate the performance of biological database based on layered queuing network model and under cloud environme...

  12. A Hybrid Constructive Algorithm for Single-Layer Feedforward Networks Learning.

    Science.gov (United States)

    Wu, Xing; Rózycki, Paweł; Wilamowski, Bogdan M

    2015-08-01

    Single-layer feedforward networks (SLFNs) have been proven to be a universal approximator when all the parameters are allowed to be adjustable. It is widely used in classification and regression problems. The SLFN learning involves two tasks: determining network size and training the parameters. Most current algorithms could not be satisfactory to both sides. Some algorithms focused on construction and only tuned part of the parameters, which may not be able to achieve a compact network. Other gradient-based optimization algorithms focused on parameters tuning while the network size has to be preset by the user. Therefore, trial-and-error approach has to be used to search the optimal network size. Because results of each trial cannot be reused in another trial, it costs much computation. In this paper, a hybrid constructive (HC)algorithm is proposed for SLFN learning, which can train all the parameters and determine the network size simultaneously. At first, by combining Levenberg-Marquardt algorithm and least-square method, a hybrid algorithm is presented for training SLFN with fixed network size. Then,with the hybrid algorithm, an incremental constructive scheme is proposed. A new randomly initialized neuron is added each time when the training entrapped into local minima. Because the training continued on previous results after adding new neurons, the proposed HC algorithm works efficiently. Several practical problems were given for comparison with other popular algorithms. The experimental results demonstrated that the HC algorithm worked more efficiently than those optimization methods with trial and error, and could achieve much more compact SLFN than those construction algorithms.

  13. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  14. Cross-Layer Design for End-to-End Throughput Maximization and Fairness in MIMO Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Jain-Shing Liu

    2010-01-01

    Full Text Available MIMO links can significantly improve network throughput by supporting multiple concurrent data streams between a pair of nodes and suppressing wireless interference. In this paper, we study joint rate control, routing, and scheduling in MIMO-based multihop wireless networks, which are traditionally known as transport layer, network layer, and MAC layer issues, respectively. Our aim is to find a rate allocation along with a flow allocation and a transmission schedule for a set of end-to-end communication sessions so as to maximize the network throughput and also to achieve the proportional or weighted fairness among these sessions. To this end, we develop Transmission Mode Generating Algorithms (TMGAs, and Linear Programming- (LP- and Convex Programming- (CP- based optimization schemes for the MIMO networks. The performances of the proposed schemes are verified by simulation experiments, and the results show that the different schemes have different performance benefits when achieving a tradeoff between throughput and fairness.

  15. A no-go theorem for one-layer feedforward networks.

    Science.gov (United States)

    Giusti, Chad; Itskov, Vladimir

    2014-11-01

    It is often hypothesized that a crucial role for recurrent connections in the brain is to constrain the set of possible response patterns, thereby shaping the neural code. This implies the existence of neural codes that cannot arise solely from feedforward processing. We set out to find such codes in the context of one-layer feedforward networks and identified a large class of combinatorial codes that indeed cannot be shaped by the feedforward architecture alone. However, these codes are difficult to distinguish from codes that share the same sets of maximal activity patterns in the presence of subtractive noise. When we coarsened the notion of combinatorial neural code to keep track of only maximal patterns, we found the surprising result that all such codes can in fact be realized by one-layer feedforward networks. This suggests that recurrent or many-layer feedforward architectures are not necessary for shaping the (coarse) combinatorial features of neural codes. In particular, it is not possible to infer a computational role for recurrent connections from the combinatorics of neural response patterns alone. Our proofs use mathematical tools from classical combinatorial topology, such as the nerve lemma and the existence of an inverse nerve. An unexpected corollary of our main result is that any prescribed (finite) homotopy type can be realized by a subset of the form [Formula: see text], where Ρ is a polyhedron.

  16. Using Layer Recurrent Neural Network to Generate Pseudo Random Number Sequences

    Directory of Open Access Journals (Sweden)

    Veena Desai

    2012-03-01

    Full Text Available Pseudo Random Numbers (PRNs are required for many cryptographic applications. This paper proposes a new method for generating PRNs using Layer Recurrent Neural Network (LRNN. The proposed technique generates PRNs from the weight matrix obtained from the layer weights of the LRNN. The LRNN random number generator (RNG uses a short keyword as a seed and generates a long sequence as a pseudo PRN sequence. The number of bits generated in the PRN sequence depends on the number of neurons in the input layer of the LRNN. The generated PRN sequence changes, with a change in the training function of the LRNN .The sequences generated are a function of the keyword, initial state of network and the training function. In our implementation the PRN sequences have been generated using 3 training functions: 1Scaled Gradient Descent 2Levenberg-Marquartz (TRAINLM and 3 TRAINBGF. The generated sequences are tested for randomness using ENT and NIST test suites. The ENT test can be applied for sequences of small size. NIST has 16 tests to test random numbers. The LRNN generated PRNs pass in 11 tests, show no observations for 4 tests, and fail in 1 test when subjected to NIST .This paper presents the test results for random number sequence ranging from 25 bits to 1000 bits, generated using LRNN.

  17. A robust cross-layer metric for routing protocol in mobile wireless ad hoc networks

    Science.gov (United States)

    Mucchi, Lorenzo; Chisci, Luigi; Fabbrini, Luca; Giovannetti, Giulio

    2012-12-01

    In a mobile ad-hoc network (MANET) where Mobile Nodes (MNs) self-organize to ensure the communication over radio links, routing protocols clearly play a significant role. In future MANETs, protocols should provide routing under full mobility, power constraints, fast time-varying channels, and nodes subject to high loading. In this article, a novel robust routing protocol, named distributed X-layer fastest path (DXFP), is proposed. The protocol is based on a cross-layer metric which is robust against the time-variations of the network as far as topology (mobility), congestion of the nodes and channel quality (fading, power constraints) are concerned. All these features are integrated in a single physical cost, i.e., the network crossing time, which has to be minimized. Furthermore, several routes from source to destination are stored for a given data flow to efficiently face the disconnections which frequently occur in MANETs. It is shown that the DXFP protocol, though locally operating in a fully distributed way within the MNs, provides, for each data flow, the optimum routes according to the considered metric. The DXFP protocol has been compared with two of the most commonly used routing protocols for MANETs, i.e., dynamic source routing and ad hoc on-demand distance vector, showing significant improvements in performance and robustness.

  18. Linking two distinct layered networks of nanosized {Ln18} and {Cu24} wheels through isonicotinate ligands.

    Science.gov (United States)

    Cheng, Jian-Wen; Zhang, Jie; Zheng, Shou-Tian; Yang, Guo-Yu

    2008-01-01

    A new series of heterolanthanide(III)-copper(I) wheel-cluster complexes [Ln6(micro3-O)2](IN)18-[Cu8(micro4-I)2(micro2-I)3].H3O (IN=isonicotinate; Ln=Y 1, Nd 2, Dy 3, Gd 4, Sm 5, Eu 6, Tb 7) were prepared by hydrothermal reaction at low pH. X-ray crystallographic studies reveal that two unusual trinuclear [Ln3(micro3-O)] and tetranuclear [Cu4(micro4-I)] cores are successfully used as secondary building units to make two different nanosized wheels [Ln18(micro3-O)6(CO2)48](6-), {Ln18}, and [Cu24(micro4-I)6(micro2-I)12]6+, {Cu24}, with 12-rings and a diameter of 26.7 and 26.4 A, respectively. The wheels are further assembled into two-dimensional (2D) {Ln18} and {Cu24} networks, the linkages between two distinct layered networks of {Ln18} and {Cu24} wheels by IN pillars along the c axis giving a series of unprecedented three-dimensional (3D) sandwich frameworks. To our knowledge, compounds 1-7 are the first examples containing two different layered networks of nanosized Ln and transition metal (TM) wheels in wheel-cluster chemistry. The IR, UV/Vis, thermogravimetric analysis (TGA), luminescent, and magnetic properties of these complexes were also studied.

  19. The pitfalls of niche marketing.

    Science.gov (United States)

    Raynor, M E

    1992-01-01

    Corporate marketers have jumped on the micromarketing bandwagon, but many have discovered that the path to profits contains a number of potholes. This article details three companies' niche marketing mistakes; the author suggests how to avoid them.

  20. A Cross-Layer Approach in Sensing and Resource Allocation for Multimedia Transmission over Cognitive UWB Networks

    NARCIS (Netherlands)

    Aripin, N.M.; Rashid, R.A.; Fisal, N.; Lo, A.C.C.; Ariffin, S.H.S.; Yusof, S.K.S.

    2010-01-01

    We propose an MAC centric cross-layer approach to address the problem of multimedia transmission over cognitive Ultra Wideband (C-UWB) networks. Several fundamental design issues, which are related to application (APP), medium access control (MAC), and physical (PHY) layer, are discussed. Although s

  1. TO IMPROVE THE TCP PERFORMANCE USING CROSS LAYER IN WIRED CUM WIRELESS NETWORK.

    Directory of Open Access Journals (Sweden)

    KANNADASAN. R

    2012-04-01

    Full Text Available Recent development mostly based on the high speed internet access of large amount of data at any time over wireless network. Packets loss can also occur due to link failure in wired cum wireless environment. To reduce the loss rate, packet delay, retransmission time, Wi-Max is proposed with cross layer design. In this paper, to improve the performance TCP in the WI-MAX flow its estimating bandwidth of the each packet, reduce the RTT in retransmission which gives more data transfer rate and also reduce the packet drop ratio. Some layers are merging their functions and provide traffic flow with ARQ in Wi-Max. Each node provides information through Access Point which can uplink and downlink feedback about packet as an ACK or NACK. Retransmission mechanism is used for NACK to resend the lost frame through the access point.

  2. Coordinated Multi-layer Multi-domain Optical Network (COMMON) for Large-Scale Science Applications (COMMON)

    Energy Technology Data Exchange (ETDEWEB)

    Vokkarane, Vinod [University of Massachusetts

    2013-09-01

    We intend to implement a Coordinated Multi-layer Multi-domain Optical Network (COMMON) Framework for Large-scale Science Applications. In the COMMON project, specific problems to be addressed include 1) anycast/multicast/manycast request provisioning, 2) deployable OSCARS enhancements, 3) multi-layer, multi-domain quality of service (QoS), and 4) multi-layer, multidomain path survivability. In what follows, we outline the progress in the above categories (Year 1, 2, and 3 deliverables).

  3. Physical Layer Secret-Key Generation Scheme for Transportation Security Sensor Network.

    Science.gov (United States)

    Yang, Bin; Zhang, Jianfeng

    2017-06-28

    Wireless Sensor Networks (WSNs) are widely used in different disciplines, including transportation systems, agriculture field environment monitoring, healthcare systems, and industrial monitoring. The security challenge of the wireless communication link between sensor nodes is critical in WSNs. In this paper, we propose a new physical layer secret-key generation scheme for transportation security sensor network. The scheme is based on the cooperation of all the sensor nodes, thus avoiding the key distribution process, which increases the security of the system. Different passive and active attack models are analyzed in this paper. We also prove that when the cooperative node number is large enough, even when the eavesdropper is equipped with multiple antennas, the secret-key is still secure. Numerical results are performed to show the efficiency of the proposed scheme.

  4. Double hidden layer RBF process neural network based online prediction of steam turbine exhaust enthalpy

    Institute of Scientific and Technical Information of China (English)

    GONG Huanchun

    2014-01-01

    In order to diagnose the unit economic performance online,the radial basis function (RBF) process neural network with two hidden layers was introduced to online prediction of steam turbine exhaust enthalpy.Thus,the model reflecting complicated relationship between the steam turbine exhaust enthalpy and the relative operation parameters was established.Moreover,the enthalpy of final stage extraction steam and exhaust from a 300 MW unit turbine was taken as the example to perform the online calculation. The results show that,the average relative error of this method is less than 1%,so the accuracy of this al-gorithm is higher than that of the BP neutral network.Furthermore,this method has advantages of high convergence rate,simple structure and high accuracy.

  5. [Input layer self-construction neural network and its use in multivariant calibration of infrared spectra].

    Science.gov (United States)

    Gao, J B; Hu, X Y; Hu, D C

    2001-12-01

    In order to solve the problems of feature extraction and calibration modelling in the area of quantitatively infrared spectra analysis, an input layer self-constructive neural network (ILSC-NN) is proposed. Before the NN training process, the training data is firstly analyzed and some prior knowledge about the problem is obtained. During the training process, the number of the input neurons is determined adaptively based on the prior knowledge. Meantime, the network parameters are also determined. This algorithm of the NN model helps to increase the efficiency of calibration modelling. The test experiment of quantitative analysis using simulated spectral data showed that this modelling method could not only achieve efficient wavelength selection, but also remarkably reduce the random and non-linear noises.

  6. Interfacial and Network Characteristics of Silicon Nanoparticle Layers Used in Printed Electronics

    Science.gov (United States)

    Männl, Ulrich; Chuvilin, Andrey; Magunje, Batsirai; Ohieku Jonah, Emmanuel; Härting, Margit; Britton, David Thomas

    2013-05-01

    In printed electronics the use of semiconducting silicon nanoparticles allows more than the simple printing of conductive materials. It gives the possibility of fabricating robust and inexpensive, active and reactive components like temperature sensors which are shown as an example. In our approach high quality silicon nanoparticles with stable, essentially oxide-free surfaces are used to replace the pigment in water-based graphic inks, which on curing have unique semiconducting properties, arising from the transport of charge through a percolation network of crystalline silicon nanoparticles. In this study scanning electron microscopy (SEM) and high-resolution transmission electron microscopy (HRTEM) were employed to investigate the mesoscale structure of the particle network and, more importantly the structure of the interface between particles. An intimate contact between lattice planes of different particles was observed, without the presence of an intervening oxide layer.

  7. Cross-Layer Handover Scheme for Multimedia Communications in Next Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Chun-Cheng

    2010-01-01

    Full Text Available In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS of next generation network, a multiprotocol combined handover mechanism is proposed in this paper. We combine SIP (Session Initiation Protocol, FMIP (Fast Mobile IPv6 Protocol, and MIH (Media Independent Handover protocols by cross-layer design and optimize those protocols' signaling flows to improve the performance of vertical handover. Theoretical analysis and simulation results illustrate that our proposed mechanism performs better than the original SIP and MIH combined handover mechanism in terms of service interruption time and packet loss.

  8. Conception and FPGA implementation of IEEE 802.11s mesh network MAC layer transmitter

    CERN Document Server

    Chaari, Lamia; Kamoun, Lotfi

    2010-01-01

    This paper proposes, a hardware implementation of Wireless Mesh Networks (WMN) medium Access Controller (MAC) layer transmitter. In the literature a lot of works are focused on WMN routing protocol as well as performance analysis and software integration of WMN units, however few works deals with WMN hardware implementation. In this field our contribution is to conceive and to implements on FPGA a WMN MAC transmitter module. Our implementation, written in hardware description language (HDL) is based on the IEEE 802.11 s standard. The hardware implementation retains a good performance in speed.

  9. Joint Design of Physical-Layer Network Coding and Channel Coding

    CERN Document Server

    Zhang, Shengli

    2008-01-01

    Physical-layer Network Coding (PNC) can significantly improve the throughput of wireless two way relay channel (TWRC) by allowing the two end nodes to transmit messages to the relay simultaneously. To achieve reliable communication, channel coding could be applied on top of PNC. This paper investigates link-by-link channel-coded PNC, in which a critical process at the relay is to transform the superimposed channel-coded packets received from the two end nodes plus noise, Y3=X1+X2+W3, to the network-coded combination of the source packets, S1 XOR S2 . This is in distinct to the traditional multiple-access problem, in which the goal is to obtain S1 and S2 separately. The transformation from Y3 to (S1 XOR S2) is referred to as the Channel-decoding-Network-Coding process (CNC) in that it involves both channel decoding and network coding operations. A contribution of this paper is the insight that in designing CNC, we should first (i) channel-decode Y3 to the superimposed source symbols S1+S2 before (ii) transform...

  10. BICM-ID with Physical Layer Network Coding in TWR Free Space Optical Communication Links

    Directory of Open Access Journals (Sweden)

    Alaa A. Saeed Al-Rubaie

    2017-07-01

    Full Text Available Physical layer network coding (PNC is a promising technique to improve the network throughput in a two-way relay (TWR channel for two users to exchange messages across a wireless network. The PNC technique incorporating a TWR channel is embraced by a free space optical (FSO communication link for full utilization of network resources, namely TWR-FSO PNC. In this paper, bit interleaved coded modulation with iterative decoding (BICM-ID is adopted to combat the deleterious effect of the turbulence channel by saving the message being transmitted to increase the reliability of the system. Moreover, based on this technique, comparative studies between end-to-end BICM-ID code, non-iterative convolutional coded and uncoded systems are carried out. Furthermore, this paper presents the extrinsic information transfer (ExIT charts to evaluate the performance of BICM-ID code combined with the TWR-FSO PNC system. The simulation results show that the proposed scheme can achieve a significant bit error rate (BER performance improvement through the introduction of an iterative process between a soft demapper and decoder. Similarly, Monte Carlo simulation results are provided to support the findings. Subsequently, the ExIT functions of the two receiver components are thoroughly analysed for a variety of parameters under the influence of a turbulence-induced channel fading, demonstrating the convergence behaviour of BICM-ID to enable the TWR-FSO PNC system, effectively mitigating the impact of the fading turbulence channel.

  11. Hypothetical Pattern Recognition Design Using Multi-Layer Perceptorn Neural Network For Supervised Learning

    Directory of Open Access Journals (Sweden)

    Md. Abdullah-al-mamun

    2015-08-01

    Full Text Available Abstract Humans are capable to identifying diverse shape in the different pattern in the real world as effortless fashion due to their intelligence is grow since born with facing several learning process. Same way we can prepared an machine using human like brain called Artificial Neural Network that can be recognize different pattern from the real world object. Although the various techniques is exists to implementation the pattern recognition but recently the artificial neural network approaches have been giving the significant attention. Because the approached of artificial neural network is like a human brain that is learn from different observation and give a decision the previously learning rule. Over the 50 years research now a days pattern recognition for machine learning using artificial neural network got a significant achievement. For this reason many real world problem can be solve by modeling the pattern recognition process. The objective of this paper is to present the theoretical concept for pattern recognition design using Multi-Layer Perceptorn neural networkin the algorithm of artificial Intelligence as the best possible way of utilizing available resources to make a decision that can be a human like performance.

  12. Performance Analysis of Adaptive Physical Layer Network Coding for Wireless Two-way Relaying

    CERN Document Server

    Muralidharan, Vijayvaradharaj T

    2012-01-01

    The analysis of modulation schemes for the physical layer network-coded two way relaying scenario is presented which employs two phases: Multiple access (MA) phase and Broadcast (BC) phase. It was shown by Koike-Akino et. al. that adaptively changing the network coding map used at the relay according to the channel conditions greatly reduces the impact of multiple access interference which occurs at the relay during the MA phase. Depending on the signal set used at the end nodes, deep fades occur for a finite number of channel fade states referred as the singular fade states. The singular fade states fall into the following two classes: The ones which are caused due to channel outage and whose harmful effect cannot be mitigated by adaptive network coding are referred as the \\textit{non-removable singular fade states}. The ones which occur due to the choice of the signal set and whose harmful effects can be removed by a proper choice of the adaptive network coding map are referred as the \\textit{removable} sin...

  13. Cross-layer Framework for Fine-grained Channel Access in Next Generation High-density WiFi Networks

    OpenAIRE

    ZHAO, HAITAO; Zhang, Shaojie; Garcia-Palacios, Francisco

    2016-01-01

    Densely deployed WiFi networks will play a crucial role in providing the capacity for next generation mobile internet. However, due to increasing interference, overlapped channels in WiFi networks and throughput efficiency degradation, densely deployed WiFi networks is not a guarantee to obtain higher throughput. An emergent challenge is how to efficiently utilize scarce spectrum resources, by matching physical layer resources to traffic demand. In this aspect, access control allocation strat...

  14. Deep Learning and Developmental Learning: Emergence of Fine-to-Coarse Conceptual Categories at Layers of Deep Belief Network.

    Science.gov (United States)

    Sadeghi, Zahra

    2016-09-01

    In this paper, I investigate conceptual categories derived from developmental processing in a deep neural network. The similarity matrices of deep representation at each layer of neural network are computed and compared with their raw representation. While the clusters generated by raw representation stand at the basic level of abstraction, conceptual categories obtained from deep representation shows a bottom-up transition procedure. Results demonstrate a developmental course of learning from specific to general level of abstraction through learned layers of representations in a deep belief network.

  15. Cross-Layer Throughput Optimization in Cognitive Radio Networks with SINR Constraints

    Directory of Open Access Journals (Sweden)

    Miao Ma

    2010-01-01

    Full Text Available Recently, there have been some research works in the design of cross-layer protocols for cognitive radio (CR networks, where the Protocol Model is used to model the radio interference. In this paper we consider a multihop multi-channel CR network. We use a more realistic Signal-to-Interference-plus-Noise Ratio (SINR model for radio interference and study the following cross-layer throughput optimization problem: (1 Given a set of secondary users with random but fixed location, and a set of traffic flows, what is the max-min achievable throughput? (2 To achieve the optimum, how to choose the set of active links, how to assign the channels to each active link, and how to route the flows? To the end, we present a formal mathematical formulation with the objective of maximizing the minimum end-to-end flow throughput. Since the formulation is in the forms of mixed integer nonlinear programming (MINLP, which is generally a hard problem, we develop a heuristic method by solving a relaxation of the original problem, followed by rounding and simple local optimization. Simulation results show that the heuristic approach performs very well, that is, the solutions obtained by the heuristic are very close to the global optimum obtained via LINGO.

  16. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  17. OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Massin R

    2010-01-01

    Full Text Available Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wireless communications, in particular due to the wireless medium inherent unreliability, and to the desired flexibility, which entails complex protocol procedures. In that context simulation is an important tool to understand and design the protocols that manage the wireless networks. This paper introduces a new simulation framework based on the OMNeT++ simulator whose goal is to enable the study of data and multimedia content transmission over hybrid wired/wireless ad hoc networks, as well as the design of innovative radio access schemes. To achieve this goal, the complete protocol stack from the application to the physical layer is simulated, and the real bits and bytes of the messages transferred on the radio channel are exchanged. To ensure that this framework is reusable and extensible in future studies and projects, a modular software and protocol architecture has been defined. Although still in progress, our work has already provided some valuable results concerning cross layer HARQ/MAC protocol performance and video transmission over the wireless channel, as illustrated by results examples.

  18. A Cross Layer Based Scalable Channel Slot Re-Utilization Technique for Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Asha C N

    2016-04-01

    Full Text Available Due to tremendous growth of the wireless based appl ication services are increasing the demand for wireless communication techniques that use band width more effectively. Channel slot re- utilization in multi-radio wireless mesh networks i s a very challenging problem. WMNs have been adopted as back haul to connect various networ ks such as Wi-Fi (802.11, WI-MAX (802.16e etc. to the internet. The slot re-utiliza tion technique proposed so far suffer due to high collision due to improper channel slot usage approx imation error. To overcome this here the author propose the cross layer optimization techniq ue by designing a device classification based channel slot re-utilization routing strategy which considers the channel slot and node information from various layers and use some of the se parameters to approximate the risk involve in channel slot re-utilization in order to improve the QoS of the network. The simulation and analytical results show the effectiveness of ou r proposed approach in term of channel slot re-utilization efficiency and thus helps in reducin g latency for data transmission and reduce channel slot collision.

  19. Handwritten Multiscript Pin Code Recognition System having Multiple hidden layers using Back Propagation Neural Network

    Directory of Open Access Journals (Sweden)

    Stuti Asthana Rakesh K Bhujade Niresh Sharma Rajdeep Singh

    2011-10-01

    Full Text Available India is a country where multiple languages are spoken depending upon the place where people live as well as their mother tongue. For example ,a person living in tamilnadu is more familiar in writing/speaking Tamil as compared to Hindi or any other language. Usually due to this problem , sometimes people write pincode in the combination of two different numeric scripting, mainly the local language (which depend on the location or the mother tongue and the official language (which may be national language hindi or international language english.In this paper, we are concentrating on this problem of recognizing multiscript number recognition using artificial neural network on postcard, keeping accuracy as a chief criteria. This work has been tested on five different popular Indian scripts namely Hindi, Urdu, Tamil ,English and Telugu. Experiments were performed on samples by using two hidden layers having 250 neurons each and the results revealed that with the use of proper combination of number of neurons and number of layers in the neural network, accuracy upto 96% can be achieved under ideal condition.

  20. Using Multi-input-layer Wavelet Neural Network to Model Product Quality of Continuous Casting Furnace and Hot Rolling Mill

    Institute of Scientific and Technical Information of China (English)

    HuanqinLi; JieCheng; BaiwuWan

    2004-01-01

    A new architecture of wavelet neural network with multi-input-layer is proposed and implemented for modeling a class of large-scale industrial processes. Because the processes are very complicated and the number of technological parameters, which determine the final product quality, is quite large, and these parameters do not make actions at the same time but work in different procedures, the conventional feed-forward neural networks cannot model this set of problems efficiently. The network presented in this paper has several input-layers according to the sequence of work procedure in large-scale industrial production processes. The performance of such networks is analyzed and the network is applied to model the steel plate quality of continuous casting furnace and hot rolling mill. Simulation results indicate that the developed methodology is competent and has well prospects to this set of problems.

  1. Respiratory signal prediction based on adaptive boosting and multi-layer perceptron neural network

    Science.gov (United States)

    Sun, W. Z.; Jiang, M. Y.; Ren, L.; Dang, J.; You, T.; Yin, F.-F.

    2017-09-01

    To improve the prediction accuracy of respiratory signals using adaptive boosting and multi-layer perceptron neural network (ADMLP-NN) for gated treatment of moving target in radiation therapy. The respiratory signals acquired using a real-time position management (RPM) device from 138 previous 4DCT scans were retrospectively used in this study. The ADMLP-NN was composed of several artificial neural networks (ANNs) which were used as weaker predictors to compose a stronger predictor. The respiratory signal was initially smoothed using a Savitzky-Golay finite impulse response smoothing filter (S-G filter). Then, several similar multi-layer perceptron neural networks (MLP-NNs) were configured to estimate future respiratory signal position from its previous positions. Finally, an adaptive boosting (Adaboost) decision algorithm was used to set weights for each MLP-NN based on the sample prediction error of each MLP-NN. Two prediction methods, MLP-NN and ADMLP-NN (MLP-NN plus adaptive boosting), were evaluated by calculating correlation coefficient and root-mean-square-error between true and predicted signals. For predicting 500 ms ahead of prediction, average correlation coefficients were improved from 0.83 (MLP-NN method) to 0.89 (ADMLP-NN method). The average of root-mean-square-error (relative unit) for 500 ms ahead of prediction using ADMLP-NN were reduced by 27.9%, compared to those using MLP-NN. The preliminary results demonstrate that the ADMLP-NN respiratory prediction method is more accurate than the MLP-NN method and can improve the respiration prediction accuracy.

  2. Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    N. Chilamkurti

    2009-01-01

    Full Text Available The Dynamic Source Routing (DSR algorithm computes a new route when packet loss occurs. DSR does not have an in-built mechanism to determine whether the packet loss was the result of congestion or node failure causing DSR to compute a new route. This leads to inefficient energy utilization when DSR is used in wireless sensor networks. In this work, we exploit cross-layer optimization techniques that extend DSR to improve its routing energy efficiency by minimizing the frequency of recomputed routes. Our proposed approach enables DSR to initiate a route discovery only when link failure occurs. We conducted extensive simulations to evaluate the performance of our proposed cross-layer DSR routing protocol. The simulation results obtained with our extended DSR routing protocol show that the frequency with which new routes are recomputed is 50% lower compared with the traditional DSR protocol. This improvement is attributed to the fact that, with our proposed cross-layer DSR, we distinguish between congestion and link failure conditions, and new routes are recalculated only for the latter.

  3. A novel approach to ECG classification based upon two-layered HMMs in body sensor networks.

    Science.gov (United States)

    Liang, Wei; Zhang, Yinlong; Tan, Jindong; Li, Yang

    2014-03-27

    This paper presents a novel approach to ECG signal filtering and classification. Unlike the traditional techniques which aim at collecting and processing the ECG signals with the patient being still, lying in bed in hospitals, our proposed algorithm is intentionally designed for monitoring and classifying the patient's ECG signals in the free-living environment. The patients are equipped with wearable ambulatory devices the whole day, which facilitates the real-time heart attack detection. In ECG preprocessing, an integral-coefficient-band-stop (ICBS) filter is applied, which omits time-consuming floating-point computations. In addition, two-layered Hidden Markov Models (HMMs) are applied to achieve ECG feature extraction and classification. The periodic ECG waveforms are segmented into ISO intervals, P subwave, QRS complex and T subwave respectively in the first HMM layer where expert-annotation assisted Baum-Welch algorithm is utilized in HMM modeling. Then the corresponding interval features are selected and applied to categorize the ECG into normal type or abnormal type (PVC, APC) in the second HMM layer. For verifying the effectiveness of our algorithm on abnormal signal detection, we have developed an ECG body sensor network (BSN) platform, whereby real-time ECG signals are collected, transmitted, displayed and the corresponding classification outcomes are deduced and shown on the BSN screen.

  4. Explicit solutions to analytical models of cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2009-05-01

    The work is based on the interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. A multivariate point process (MVPP) model of discrete random events in WSNs establishes stochastic characteristics of optimal cross-layer protocols. In previous work by the author, discreteevent, cross-layer interactions in the MANET protocol are modeled in very general analytical terms with a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Characterization of the "best" cross-layer designs for the MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Assumptions on WSN characteristics simplify the dynamic programming conditions to yield mathematically tractable descriptions for the optimal routing protocols. Modeling limitations on the determination of closed-form solutions versus iterative explicit solutions for ad hoc WSN controls are presented.

  5. A Novel Approach to ECG Classification Based upon Two-Layered HMMs in Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2014-03-01

    Full Text Available This paper presents a novel approach to ECG signal filtering and classification. Unlike the traditional techniques which aim at collecting and processing the ECG signals with the patient being still, lying in bed in hospitals, our proposed algorithm is intentionally designed for monitoring and classifying the patient’s ECG signals in the free-living environment. The patients are equipped with wearable ambulatory devices the whole day, which facilitates the real-time heart attack detection. In ECG preprocessing, an integral-coefficient-band-stop (ICBS filter is applied, which omits time-consuming floating-point computations. In addition, two-layered Hidden Markov Models (HMMs are applied to achieve ECG feature extraction and classification. The periodic ECG waveforms are segmented into ISO intervals, P subwave, QRS complex and T subwave respectively in the first HMM layer where expert-annotation assisted Baum-Welch algorithm is utilized in HMM modeling. Then the corresponding interval features are selected and applied to categorize the ECG into normal type or abnormal type (PVC, APC in the second HMM layer. For verifying the effectiveness of our algorithm on abnormal signal detection, we have developed an ECG body sensor network (BSN platform, whereby real-time ECG signals are collected, transmitted, displayed and the corresponding classification outcomes are deduced and shown on the BSN screen.

  6. A Three-layered Self-Organizing Map Neural Network for Clustering Analysis

    Directory of Open Access Journals (Sweden)

    Sheng-Chai Chi

    2003-12-01

    Full Text Available In the commercial world today, holding the effective information through information technology (IT and the internet is a very important indicator of whether an enterprise has competitive advantage in business. Clustering analysis, a technique for data mining or data analysis in databases, has been widely applied in various areas. Its purpose is to segment the individuals in the same population according to their characteristics. In this research, an enhanced three-layered self-organizing map neural network, called 3LSOM, is developed to overcome the drawback of the conventional two-layered SOM through sight-inspection after the mapping process. To further verify its feasibility, the proposed model is applied to two common problems: the identification of four given groups of work-part images and the clustering of a machine/part incidence matrix. The experimental results prove that the data that belong to the same group can be mapped to the same neuron on the output layer of the 3LSOM. Its performance in clustering accuracy is good and is also comparable with that of the FSOM, FCM and k-Means.

  7. A spiking network model of cerebellar Purkinje cells and molecular layer interneurons exhibiting irregular firing

    Directory of Open Access Journals (Sweden)

    William eLennon

    2014-12-01

    Full Text Available While the anatomy of the cerebellar microcircuit is well studied, how it implements cerebellar function is not understood. A number of models have been proposed to describe this mechanism but few emphasize the role of the vast network Purkinje cells (PKJs form with the molecular layer interneurons (MLIs – the stellate and basket cells. We propose a model of the MLI-PKJ network composed of simple spiking neurons incorporating the major anatomical and physiological features. In computer simulations, the model reproduces the irregular firing patterns observed in PKJs and MLIs in vitro and a shift toward faster, more regular firing patterns when inhibitory synaptic currents are blocked. In the model, the time between PKJ spikes is shown to be proportional to the amount of feedforward inhibition from an MLI on average. The two key elements of the model are: (1 spontaneously active PKJs and MLIs due to an endogenous depolarizing current, and (2 adherence to known anatomical connectivity along a parasagittal strip of cerebellar cortex. We propose this model to extend previous spiking network models of the cerebellum and for further computational investigation into the role of irregular firing and MLIs in cerebellar learning and function.

  8. 3D Polygon Mesh Compression with Multi Layer Feed Forward Neural Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil Piperakis

    2003-06-01

    Full Text Available In this paper, an experiment is conducted which proves that multi layer feed forward neural networks are capable of compressing 3D polygon meshes. Our compression method not only preserves the initial accuracy of the represented object but also enhances it. The neural network employed includes the vertex coordinates, the connectivity and normal information in one compact form, converting the discrete and surface polygon representation into an analytic, solid colloquial. Furthermore, the 3D object in its compressed neural form can be directly - without decompression - used for rendering. The neural compression - representation is viable to 3D transformations without the need of any anti-aliasing techniques - transformations do not disrupt the accuracy of the geometry. Our method does not su.er any scaling problem and was tested with objects of 300 to 107 polygons - such as the David of Michelangelo - achieving in all cases an order of O(b3 less bits for the representation than any other commonly known compression method. The simplicity of our algorithm and the established mathematical background of neural networks combined with their aptness for hardware implementation can establish this method as a good solution for polygon compression and if further investigated, a novel approach for 3D collision, animation and morphing.

  9. Layered Label Propagation: A MultiResolution Coordinate-Free Ordering for Compressing Social Networks

    CERN Document Server

    Boldi, Paolo; Santini, Massimo; Vigna, Sebastiano

    2010-01-01

    We continue the line of research on graph compression started with WebGraph, but we move our focus to the compression of social networks in a proper sense (e.g., LiveJournal): the approaches that have been used for a long time to compress web graphs rely on a specific ordering of the nodes (lexicographical URL ordering) whose extension to general social networks is not trivial. In this paper, we propose a solution that mixes clusterings and orders, and devise a new algorithm, called Layered Label Propagation, that builds on previous work on scalable clustering and can be used to reorder very large graphs (billions of nodes). Our implementation uses overdecomposition to perform aggressively on multi-core architecture, making it possible to reorder graphs of more than 600 millions nodes in a few hours. Experiments performed on a wide array of web graphs and social networks show that combining the order produced by the proposed algorithm with the WebGraph compression framework provides a major increase in compre...

  10. iBole:A Hybrid Multi-Layer Architecture for Doctor Recommendation in Medical Social Networks

    Institute of Scientific and Technical Information of China (English)

    宫继兵; 王立; 孙胜涛; 彭思维

    2015-01-01

    In this paper, we try to systematically study how to perform doctor recommendation in medical social net-works (MSNs). Specifically, employing a real-world medical dataset as the source in our work, we propose iBole, a novel hybrid multi-layer architecture, to solve this problem. First, we mine doctor-patient relationships/ties via a time-constraint probability factor graph model (TPFG). Second, we extract network features for ranking nodes. Finally, we propose RWR-Model, a doctor recommendation model via the random walk with restart method. Our real-world experiments validate the effectiveness of the proposed methods. Experimental results show that we obtain good accuracy in mining doctor-patient relationships from the network, and the doctor recommendation performance is better than that of the baseline algorithms:traditional Ranking SVM (RSVM) and the individual doctor recommendation model (IDR-Model). The results of our RWR-Model are more reasonable and satisfactory than those of the baseline approaches.

  11. Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sanjeev Puri

    2012-06-01

    Full Text Available In dynamic insensitive application specific network, WSN consists of hundred and thousands of sensor nodes densely deployed in the sensor field. Majority of sensor nodes are static having power limitations, low network throughput, message transfer delays and computation power limits that are major obstacles. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major sources of QoS degradation in WSNs. The potential applications of the WSNs typically range from those in defense, military, environmental monitoring, health monitoring and civilian surveillance applications etc. All of these applications being omnipresent in nature necessitate appropriate heavy secure mechanisms to ensure the data security and privacy. On the other hand, the WSN nodes, being extremely resource constrained, it is really challenging to devise the WSNs security protocols. So need to propose dynamic high level cross layer security mechanism for detecting various attacks and the countermeasures taken to avoid the same without comprising any network resources.

  12. HyberLoc: Providing Physical Layer Location Privacy in Hybrid Sensor Networks

    CERN Document Server

    El-Badry, Rania; Youssef, Moustafa

    2010-01-01

    In many hybrid wireless sensor networks' applications, sensor nodes are deployed in hostile environments where trusted and un-trusted nodes co-exist. In anchor-based hybrid networks, it becomes important to allow trusted nodes to gain full access to the location information transmitted in beacon frames while, at the same time, prevent un-trusted nodes from using this information. The main challenge is that un-trusted nodes can measure the physical signal transmitted from anchor nodes, even if these nodes encrypt their transmission. Using the measured signal strength, un-trusted nodes can still tri-laterate the location of anchor nodes. In this paper, we propose HyberLoc, an algorithm that provides anchor physical layer location privacy in anchor-based hybrid sensor networks. The idea is for anchor nodes to dynamically change their transmission power following a certain probability distribution, degrading the localization accuracy at un-trusted nodes while maintaining high localization accuracy at trusted node...

  13. Cross-Layer Scheme to Control Contention Window for Per-Flow in Asymmetric Multi-Hop Networks

    Science.gov (United States)

    Giang, Pham Thanh; Nakagawa, Kenji

    The IEEE 802.11 MAC standard for wireless ad hoc networks adopts Binary Exponential Back-off (BEB) mechanism to resolve bandwidth contention between stations. BEB mechanism controls the bandwidth allocation for each station by choosing a back-off value from one to CW according to the uniform random distribution, where CW is the contention window size. However, in asymmetric multi-hop networks, some stations are disadvantaged in opportunity of access to the shared channel and may suffer severe throughput degradation when the traffic load is large. Then, the network performance is degraded in terms of throughput and fairness. In this paper, we propose a new cross-layer scheme aiming to solve the per-flow unfairness problem and achieve good throughput performance in IEEE 802.11 multi-hop ad hoc networks. Our cross-layer scheme collects useful information from the physical, MAC and link layers of own station. This information is used to determine the optimal Contention Window (CW) size for per-station fairness. We also use this information to adjust CW size for each flow in the station in order to achieve per-flow fairness. Performance of our cross-layer scheme is examined on various asymmetric multi-hop network topologies by using Network Simulator (NS-2).

  14. Assessing artificial neural networks coupled with waveletanalysis for multi-layer soil moisture dynamics pr

    Institute of Scientific and Technical Information of China (English)

    2016-01-01

    Soil moisture simulation and prediction in semi-arid regions are important for agricultural production, soil conservation andclimate change. However, considerable heterogeneity in the spatial distribution of soil moisture, and poor ability of distributedhydrological models to estimate it, severely impact the use of soil moisture models in research and practical applications. Inthis study, a newly-developed technique of coupled (WA-ANN) wavelet analysis (WA) and artificial neural network (ANN)was applied for a multi-layer soil moisture simulation in the Pailugou catchment of the Qilian Mountains, Gansu Province,China. Datasets included seven meteorological factors: air and land surface temperatures, relative humidity, global radiation,atmospheric pressure, wind speed, precipitation, and soil water content at 20, 40, 60, 80, 120 and 160 cm. To investigate theeffectiveness of WA-ANN, ANN was applied by itself to conduct a comparison. Three main findings of this study were: (1)ANN and WA-ANN provided a statistically reliable and robust prediction of soil moisture in both the root zone and deepestsoil layer studied (NSE 〉0.85, NSE means Nash-Sutcliffe Efficiency coefficient); (2) when input meteorological factors weretransformed using maximum signal to noise ratio (SNR) and one-dimensional auto de-noising algorithm (heursure) in WA,the coupling technique improved the performance of ANN especially for soil moisture at 160 cm depth; (3) the results ofmulti-layer soil moisture prediction indicated that there may be different sources of water at different soil layers, and this canbe used as an indicator of the maximum impact depth of meteorological factors on the soil water content at this study site. Weconclude that our results show that appropriate simulation methodology can provide optimal simulation with a minimumdistortion of the raw-time series; the new method used here is applicable to soil sciences and management

  15. Assessing artificial neural networks coupled with wavelet analysis for multi-layer soil moisture dynamics prediction

    Institute of Scientific and Technical Information of China (English)

    JunJun Yang; ZhiBin He; WeiJun Zhao; Jun Du; LongFei Chen; Xi Zhu

    2016-01-01

    Soil moisture simulation and prediction in semi-arid regions are important for agricultural production, soil conservation and climate change. However, considerable heterogeneity in the spatial distribution of soil moisture, and poor ability of distributed hydrological models to estimate it, severely impact the use of soil moisture models in research and practical applications. In this study, a newly-developed technique of coupled (WA-ANN) wavelet analysis (WA) and artificial neural network (ANN) was applied for a multi-layer soil moisture simulation in the Pailugou catchment of the Qilian Mountains, Gansu Province, China. Datasets included seven meteorological factors: air and land surface temperatures, relative humidity, global radiation, atmospheric pressure, wind speed, precipitation, and soil water content at 20, 40, 60, 80, 120 and 160 cm. To investigate the effectiveness of WA-ANN, ANN was applied by itself to conduct a comparison. Three main findings of this study were: (1) ANN and WA-ANN provided a statistically reliable and robust prediction of soil moisture in both the root zone and deepest soil layer studied (NSE >0.85, NSE means Nash-Sutcliffe Efficiency coefficient); (2) when input meteorological factors were transformed using maximum signal to noise ratio (SNR) and one-dimensional auto de-noising algorithm (heursure) in WA, the coupling technique improved the performance of ANN especially for soil moisture at 160 cm depth; (3) the results of multi-layer soil moisture prediction indicated that there may be different sources of water at different soil layers, and this can be used as an indicator of the maximum impact depth of meteorological factors on the soil water content at this study site. We conclude that our results show that appropriate simulation methodology can provide optimal simulation with a minimum distortion of the raw-time series; the new method used here is applicable to soil sciences and management applications.

  16. Adaptive link layer security architecture for telecommand communications in space networks

    Institute of Scientific and Technical Information of China (English)

    Lei Zhang; Chengjin An; Susanna Spinsante; Chaojing Tang

    2014-01-01

    Impressive advances in space technology are en-abling complex missions, with potential y significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive re-engineering of many of the protocols usual y adopted in terrestrial networks; among them, security solutions are to be deeply re-viewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based require-ments, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especial y when facing malicious attacks against frame transmission.

  17. Joint optimization of physical layer parameters and routing in wireless mesh networks

    KAUST Repository

    Tobagi, Fouad A.

    2010-06-01

    Achieving the best performance in a wireless mesh network requires striking the right balance between the performance of links carrying traffic and the extent of spatial reuse of the wireless medium. The performance of a link depends on its transmit power and data rate as well as the level of interference caused by concurrent transmissions in the network; the latter is function of the Energy Detect (ED) threshold that determines when a node may access the medium. Which links in the network carry traffic is determined by the routing function; routing selects paths according to a link metric that reflects the relative performance of links (e.g., the expected transmission time of a packet on the link). In this paper, we seek to maximize end-to-end network throughput by jointly optimizing physical layer parameters and routing. We consider a random topology with a uniform node density. We consider that the signal attenuation between a pair of nodes is determined by a power law path loss model with an exponent equal to 3. Our findings are as follows. Consider first that the same transmit power and same data rate are used on all links. For any transmit power, data rate and ED threshold setting, the highest feasible load is obtained when the level of interference experienced by links used by routing is the highest possible. For a given transmit power and data rate setting, there is an optimum ED threshold that maximizes network performance. At the optimum ED threshold and maximum load, the range of link lengths used by routing is the lowest possible given the topology and routing metric used. With an ED threshold higher than the optimum, the same range of links is used by routing; however, the highest feasible load in this case is lower due to the fact that concurrent transmitters are allowed to be closer. With a lower ED threshold, concurrent transmitters are forced to be farther apart, and thus longer links become more attractive; as a result, the range of link lengths

  18. Photonic layer security in fiber-optic networks and optical OFDM transmission

    Science.gov (United States)

    Wang, Zhenxing

    Currently the Internet is experiencing an explosive growth in the world. Such growth leads to an increased data transmission rate demand in fiber-optical networks. Optical orthogonal frequency multiplexing (OFDM) is considered as a promising solution to achieve data rate beyond 100Gb/s per wavelength channel. In the meanwhile, because of extensive data transmission and sharing, data security has become an important problem and receives considerable attention in current research literature. This thesis focuses on data security issues at the physical layer of optical networks involving code-division multiple access (CDMA) systems and steganography methods. The thesis also covers several implementation issues in optical OFDM transmission. Optical CDMA is regarded as a good candidate to provide photonic layer security in multi-access channels. In this thesis we provide a systematic analysis of the security performance of incoherent optical CDMA codes. Based on the analysis, we proposed and experimentally demonstrated several methods to improve the security performance of the optical CDMA systems, such as applying all-optical encryption, and code hopping using nonlinear wavelength conversion. Moreover, we demonstrate that the use of wireless CDMA codes in optical systems can enhance the security in one single-user end-to-end optical channel. Optical steganography is another method to provide photonic data security and involves hiding the existence of data transmissions. In the thesis, we demonstrate that an optical steganography channel can exist in phase modulated public channels as well as traditional on-off-keying (OOK) modulated channels, without data synchronization. We also demonstrate an optical steganography system with enhanced security by utilizing temporal phase modulation techniques. Additionally, as one type of an overlay channel, the optical steganography technology can carry the sensor data collected by wireless sensor network on top of public optical

  19. Research on Performance Evaluation of Biological Database based on Layered Queuing Network Model under the Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Zhengbin Luo

    2013-06-01

    Full Text Available To evaluate the performance of biological database based on layered queuing network model and under cloud computing environment is a premise, as well as an important step for biological database optimization. Based on predecessors’ researches concerning computer software and hardware performance evaluation under cloud environment, the study has further constructed a model system to evaluate the performance of biological database based on layered queuing network model and under cloud environment. Moreover, traditional layered queuing network model is also optimized and upgraded in this process. After having constructed the performance evaluation system, the study applies laboratory experiment method to test the validity of the constructed performance model. Shown by the test result, this model is effective in evaluating the performance of biological system under cloud environment and the predicted result is quite close to the tested result. This has demonstrated the validity of the model in evaluating the performance of biological database.

  20. Asymptotic Delay Analysis for Cross-Layer Delay-Based Routing in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Philippe Jacquet

    2007-01-01

    Full Text Available This paper addresses the problem of the evaluation of the delay distribution via analytical means in IEEE 802.11 wireless ad hoc networks. We show that the asymptotic delay distribution can be expressed as a power law. Based on the latter result, we present a cross-layer delay estimation protocol and we derive new delay-distribution-based routing algorithms, which are well adapted to the QoS requirements of real-time multimedia applications. In fact, multimedia services are not sensitive to average delays, but rather to the asymptotic delay distributions. Indeed, video streaming applications drop frames when they are received beyond a delay threshold, determined by the buffer size. Although delay-distribution-based routing is an NP-hard problem, we show that it can be solved in polynomial time when the delay threshold is large, because of the asymptotic power law distribution of the link delays.

  1. NETRAWALM: NETWORK BASED RESOURCE AWARE APPLICATION LAYER MULTICAST FOR MULTIPARTY VIDEO CONFERENCE

    Directory of Open Access Journals (Sweden)

    T. Ruso

    2011-10-01

    Full Text Available IP Multicast is one of the most absolute method for large bandwidth Internet applications such as videoconference, IPTV, E-Learning and Telemedicine etc., But due to security and management reason IPMulticast is not enabled in Internet backbone routers. To achieve these challenges, lot of ApplicationLayer Multicast (ALM has been proposed. All the existing protocols such as NICE, ZIGZAG and OMNIare trying to reduce average delay by forming a Multicast tree. But still that problem has not beenaddressed fully. We are proposing a new protocol called NetRawALM, which will address the averagedelay, Reliability between nodes, Scalability of conference, Heterogeneity and resilient data distributionfor real time multimedia applications by constructing the Network based Resource aware Multicast treealgorithm. This is very dynamic and decentralised. The proposed architecture is a LAN aware; it is usedto reduce Internet Traffic.

  2. Netrawalm: Network Based Resource Aware Application Layer Multicast for Multiparty Video Conference

    CERN Document Server

    Ruso, T

    2011-01-01

    IP Multicast is one of the most absolute method for large bandwidth Internet applications such as video conference, IPTV, E-Learning and Telemedicine etc., But due to security and management reason IP Multicast is not enabled in Internet backbone routers. To achieve these challenges, lot of Application Layer Multicast (ALM) has been proposed. All the existing protocols such as NICE, ZIGZAG and OMNI are trying to reduce average delay by forming a Multicast tree. But still that problem has not been addressed fully. We are proposing a new protocol called NetRawALM, which will address the average delay, Reliability between nodes, Scalability of conference, Heterogeneity and resilient data distribution for real time multimedia applications by constructing the Network based Resource aware Multicast tree algorithm. This is very dynamic and decentralised. The proposed architecture is a LAN aware; it is used to reduce Internet Traffic.

  3. A Mobile Picture Tagging System Using Tree-Structured Layered Bayesian Networks

    Directory of Open Access Journals (Sweden)

    Young-Seol Lee

    2013-01-01

    Full Text Available Advances in digital media technology have increased in multimedia content. Tagging is one of the most effective methods to manage a great volume of multimedia content. However, manual tagging has limitations such as human fatigue and subjective and ambiguous keywords. In this paper, we present an automatic tagging method to generate semantic annotation on a mobile phone. In order to overcome the constraints of the mobile environment, the method uses two layered Bayesian networks. In contrast to existing techniques, this approach attempts to design probabilistic models with fixed tree structures and intermediate nodes. To evaluate the performance of this method, an experiment is conducted with data collected over a month. The result shows the efficiency and effectiveness of our proposed method. Furthermore, a simple graphic user interface is developed to visualize and evaluate recognized activities and probabilities.

  4. Identification of Determinants for Globalization of SMEs using Multi-Layer Perceptron Neural Networks

    Directory of Open Access Journals (Sweden)

    Umar Draz

    2016-01-01

    Full Text Available SMEs (Small and Medium Sized Enterprises sector is facing problems relating to implementation of international quality standards. These SMEs need to identify factors affecting business success abroad for intelligent allocation of resources to the process of internationalization. In this paper, MLP NN (Multi-Layer Perceptron Neural Network has been used for identifying relative importance of key variables related to firm basics, manufacturing, quality inspection labs and level of education in determining the exporting status of Pakistani SMEs. A survey has been conducted for scoring out the pertinent variables in SMEs and coded in MLP NNs. It is found that ?firm registered with OEM (Original Equipment Manufacturer and ?size of firm? are the most important in determining exporting status of SMEs followed by other variables. For internationalization, the results aid policy makers in formulating strategies

  5. Cross-Layer Control with Worst Case Delay Guarantees in Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Shu Fan

    2016-01-01

    Full Text Available The delay guarantee is a challenge to meet different real-time requirements in applications of backpressure-based wireless multihop networks, and therefore, researchers are interested in the possibility of providing bounded end-to-end delay. In this paper, a new cross-layer control algorithm with worst case delay guarantees is proposed. The utility maximization algorithm is developed using a Lyapunov optimization framework. Virtual queues that ensure the worst case delay of nondropped packets are designed. It is proved through rigorous theoretical analyses and verified by simulations that the time average overall utility achieved by the new algorithm can be arbitrarily close to the optimal solution with finite queue backlogs. The simulation results evaluated with Matlab show that the proposed algorithm achieves higher throughput utility with fewer data dropped compared with the existing work.

  6. Resilience by Structural Entrenchment: Dynamics of Single-Layer and Multiplex Networks Following Sudden Changes to Tie Costs

    CERN Document Server

    Smaldino, Paul E; Maoz, Zeev

    2016-01-01

    We examine a model of network formation in single-layer and multiplex networks in which individuals have positive incentives for social ties, closed triangles, and spillover edges. In particular, we investigate the influence of shocks to the network in which the cost of social ties changes after an initial equilibrium. We highlight the emergence of structural entrenchment, a new concept we define as the persistence of structural features, such as closed triangles and spillover edges, which are formed under historically different conditions from those currently incentivizing the creation of new social ties or the destruction of existing ties. This work has broad implications for understanding path dependence in the structure and dynamics of single-layer and multiplex networks.

  7. Exosomes as novel regulators of adult neurogenic niches

    Directory of Open Access Journals (Sweden)

    Luis Federico Batiz

    2016-01-01

    Full Text Available Adult neurogenesis has been convincingly demonstrated in two regions of the mammalian brain: the sub-granular zone (SGZ of the dentate gyrus (DG in the hippocampus, and the sub-ventricular zone (SVZ of the lateral ventricles. SGZ newborn neurons are destined to the granular cell layer of the DG, while new neurons from the SVZ neurons migrate rostrally into the olfactory bulb. The process of adult neurogenesis persists throughout life and is supported by a pool of neural stem cells (NSCs, which reside in a unique and specialized microenvironment known as neurogenic niche. Neurogenic niches are structured by a complex organization of different cell types, including the NSC-neuron lineage, glial cells and vascular cells. Thus, cell-to-cell communication plays a key role in the dynamic modulation of homeostasis and plasticity of the adult neurogenic process. Specific cell-cell contacts and extracellular signals originated locally provide the necessary support and regulate the balance between self-renewal and differentiation of NSCs. Furthermore, extracellular signals originated at distant locations, including other brain regions or systemic organs, may reach the niche through the cerebrospinal fluid or the vasculature and influence its nature. The role of several secreted molecules, such as cytokines, growth factors, neurotransmitters, and hormones, in the biology of adult NSCs, has been systematically addressed. Interestingly, in addition to these well-recognized signals, a novel type of intercellular messengers has been identified recently: the extracellular vesicles (EVs. EVs, and particularly exosomes, are implicated in the transfer of mRNAs, microRNAs (miRNAs, proteins and lipids between cells and thus are able to modify the function of recipient cells. Exosomes appear to play a significant role in different stem cell niches such as the mesenchymal stem cell niche, cancer stem cell niche and pre-metastatic niche; however, their roles in adult

  8. A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Wu Jieyi

    2005-01-01

    Full Text Available Most reactive routing protocols in MANETs employ a random delay between rebroadcasting route requests (RREQ in order to avoid "broadcast storms." However this can lead to problems such as "next hop racing" and "rebroadcast redundancy." In addition to this, existing routing protocols for MANETs usually take a single routing strategy for all flows. This may lead to inefficient use of resources. In this paper we propose a cross-layer route discovery framework (CRDF to address these problems by exploiting the cross-layer information. CRDF solves the above problems efficiently and enables a new technique: routing strategy automation (RoSAuto. RoSAuto refers to the technique that each source node automatically decides the routing strategy based on the application requirements and each intermediate node further adapts the routing strategy so that the network resource usage can be optimized. To demonstrate the effectiveness and the efficiency of CRDF, we design and evaluate a macrobian route discovery strategy under CRDF.

  9. A constructive algorithm to solve "convex recursive deletion" (CoRD) classification problems via two-layer perceptron networks.

    Science.gov (United States)

    Cabrelli, C; Molter, U; Shonkwiler, R

    2000-01-01

    A sufficient condition that a region be classifiable by a two-layer feedforward neural net (a two-layer perceptron) using threshold activation functions is that either it be a convex polytope or that intersected with the complement of a convex polytope in its interior, or that intersected with the complement of a convex polytope in its interior or ... recursively. These have been called convex recursive deletion (CoRD) regions.We give a simple algorithm for finding the weights and thresholds in both layers for a feedforward net that implements such a region. The results of this work help in understanding the relationship between the decision region of a perceptron and its corresponding geometry in input space. Our construction extends in a simple way to the case that the decision region is the disjoint union of CoRD regions (requiring three layers). Therefore this work also helps in understanding how many neurons are needed in the second layer of a general three-layer network. In the event that the decision region of a network is known and is the union of CoRD regions, our results enable the calculation of the weights and thresholds of the implementing network directly and rapidly without the need for thousands of backpropagation iterations.

  10. Achievable Throughput-Based MAC Layer Handoff in IEEE 802.11 Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Wu Haitao

    2009-01-01

    Full Text Available We propose a MAC layer handoff mechanism for IEEE 802.11 Wireless Local Area Networks (WLAN to give benefit to bandwidth-greedy applications at STAs. The proposed mechanism determines an optimal AP with the maximum achievable throughput rather than the best signal condition by estimating the AP's bandwidth with a new on-the-fly measurement method, Transient Frame Capture (TFC, and predicting the actual throughput could be achieved at STAs. Since the TFC is employed based on the promiscuous mode of WLAN NIC, STAs can avoid the service degradation through the current associated AP. In addition, the proposed mechanism is a client-only solution which does not require any modification of network protocol on APs. To evaluate the performance of the proposed mechanism, we develop an analytic model to estimate reliable and accurate bandwidth of the AP and demonstrate through testbed measurement with various experimental study methods. We also validate the fairness of the proposed mechanism through simulation studies.

  11. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

    Science.gov (United States)

    Shim, Kyusung; Do, Nhu Tri; An, Beongku

    2017-01-01

    In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks. PMID:28212286

  12. NCSA: A New Protocol for Random Multiple Access Based on Physical Layer Network Coding

    CERN Document Server

    Bui, Huyen Chi; Boucheret, Marie-Laure

    2010-01-01

    This paper introduces a random multiple access method for satellite communications, named Network Coding-based Slotted Aloha (NCSA). The goal is to improve diversity of data bursts on a slotted-ALOHA-like channel thanks to error correcting codes and Physical-layer Network Coding (PNC). This scheme can be considered as a generalization of the Contention Resolution Diversity Slotted Aloha (CRDSA) where the different replicas of this system are replaced by the different parts of a single word of an error correcting code. The performance of this scheme is first studied through a density evolution approach. Then, simulations confirm the CRDSA results by showing that, for a time frame of $400$ slots, the achievable total throughput is greater than $0.7\\times C$, where $C$ is the maximal throughput achieved by a centralized scheme. This paper is a first analysis of the proposed scheme which open several perspectives. The most promising approach is to integrate collided bursts into the decoding process in order to im...

  13. Fuzzy Logic based Handoff Latency Reduction Mechanism in Layer 2 of Heterogeneous Mobile IPv6 Networks

    Science.gov (United States)

    Anwar, Farhat; Masud, Mosharrof H.; Latif, Suhaimi A.

    2013-12-01

    Mobile IPv6 (MIPv6) is one of the pioneer standards that support mobility in IPv6 environment. It has been designed to support different types of technologies for providing seamless communications in next generation network. However, MIPv6 and subsequent standards have some limitations due to its handoff latency. In this paper, a fuzzy logic based mechanism is proposed to reduce the handoff latency of MIPv6 for Layer 2 (L2) by scanning the Access Points (APs) while the Mobile Node (MN) is moving among different APs. Handoff latency occurs when the MN switches from one AP to another in L2. Heterogeneous network is considered in this research in order to reduce the delays in L2. Received Signal Strength Indicator (RSSI) and velocity of the MN are considered as the input of fuzzy logic technique. This technique helps the MN to measure optimum signal quality from APs for the speedy mobile node based on fuzzy logic input rules and makes a list of interfaces. A suitable interface from the list of available interfaces can be selected like WiFi, WiMAX or GSM. Simulation results show 55% handoff latency reduction and 50% packet loss improvement in L2 compared to standard to MIPv6.

  14. A CROSS-LAYERED PATH STABILITY BASED ROUTING PROTOCOL FOR WiMAX NETWORKS

    Directory of Open Access Journals (Sweden)

    M. Deva Priya

    2013-01-01

    Full Text Available In IEEE 802.16, a Subscriber Station (SS is battery powered with limited capacity. A SS can be made to operate for longer durations by deploying power saving features or by using relay stations. Multi-hop communication conserves power, but finding an optimal path to the destination is monotonous. Path stability indicates how stable a path is and how long it can support communication. Identifying stable paths helps in reducing the control traffic, number of connection disruptions and also in conserving power. In this study, Greedy Perimeter Stateless Routing (GPSR and Link-St Ability and Energy aware Routing (LAER designed for Mobile Ad hoc NET works (MANETs are implemented for WiMAX networks and their performance is evaluated. Further, a novel Cross-layered Path Stability based Routing protocol (CPSR is proposed to find a stable path based on Residual Energy (RE, Received Signal Strength Indicator (RSSI and Signal-to-Noise Ratio (SNR. The total energy consumed is minimized, thus maximizing the network lifetime.

  15. Cross-Layer Modeling of Randomly Spread CDMA Using Stochastic Network Calculus

    CERN Document Server

    Mahmood, Kashif; Jiang, Yuming

    2011-01-01

    Code-division multiple-access (CDMA) has the potential to support traffic sources with a wide range of quality of service (QoS) requirements. The traffic carrying capacity of CDMA channels under QoS constraints (such as delay guarantee) is, however, less well-understood. In this work, we propose a method based on stochastic network calculus and large system analysis to quantify the maximum traffic that can be carried by a multiuser CDMA network under the QoS constraints. At the physical layer, we have linear minimum-mean square error receivers and adaptive modulation and coding, while the channel service process is modeled by using a finite-state Markov chain. We study the impact of delay requirements, violation probability and the user load on the traffic carrying capacity under different signal strengths. A key insight provided by the numerical results is as to how much one has to back-off from capacity under the different delay requirements.

  16. A linear approach for sparse coding by a two-layer neural network

    CERN Document Server

    Montalto, Alessandro; Prevete, Roberto

    2015-01-01

    Many approaches to transform classification problems from non-linear to linear by feature transformation have been recently presented in the literature. These notably include sparse coding methods and deep neural networks. However, many of these approaches require the repeated application of a learning process upon the presentation of unseen data input vectors, or else involve the use of large numbers of parameters and hyper-parameters, which must be chosen through cross-validation, thus increasing running time dramatically. In this paper, we propose and experimentally investigate a new approach for the purpose of overcoming limitations of both kinds. The proposed approach makes use of a linear auto-associative network (called SCNN) with just one hidden layer. The combination of this architecture with a specific error function to be minimized enables one to learn a linear encoder computing a sparse code which turns out to be as similar as possible to the sparse coding that one obtains by re-training the neura...

  17. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks

    Directory of Open Access Journals (Sweden)

    Kyusung Shim

    2017-02-01

    Full Text Available In this paper, we study the physical layer security (PLS of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC technique and the selection combining (SC technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP, closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

  18. Performance Analysis of Physical Layer Security of Opportunistic Scheduling in Multiuser Multirelay Cooperative Networks.

    Science.gov (United States)

    Shim, Kyusung; Do, Nhu Tri; An, Beongku

    2017-02-15

    In this paper, we study the physical layer security (PLS) of opportunistic scheduling for uplink scenarios of multiuser multirelay cooperative networks. To this end, we propose a low-complexity, yet comparable secrecy performance source relay selection scheme, called the proposed source relay selection (PSRS) scheme. Specifically, the PSRS scheme first selects the least vulnerable source and then selects the relay that maximizes the system secrecy capacity for the given selected source. Additionally, the maximal ratio combining (MRC) technique and the selection combining (SC) technique are considered at the eavesdropper, respectively. Investigating the system performance in terms of secrecy outage probability (SOP), closed-form expressions of the SOP are derived. The developed analysis is corroborated through Monte Carlo simulation. Numerical results show that the PSRS scheme significantly improves the secure ability of the system compared to that of the random source relay selection scheme, but does not outperform the optimal joint source relay selection (OJSRS) scheme. However, the PSRS scheme drastically reduces the required amount of channel state information (CSI) estimations compared to that required by the OJSRS scheme, specially in dense cooperative networks.

  19. Cross Layer Optimization Based on Rate Distribution in Multirate Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Honggang Wang

    2007-01-01

    Full Text Available It is important to increase the Wireless Sensor Network (WSN lifetime, due to its limited energy resource, while meeting the constraints of applications. Recent Advances for In-Network Processing (INP motivate many WSN applications which are based on multi rate and distributed signal processing, and therefore require the support of rate-based routing as well as MAC and link layer de-signs to maximize the WSN lifetime. We propose a new scheme called “Rate Distribution (RateD”, in which the application rate constraints are distributed in the WSN based on an optimized routing scheme. An optimal RateD was achieved by forming optimal data flows under rate constraints, which was an NP-complete problem. To reduce the complexity, a near optimization solution formed and ana-lyzed, and a practical rate-based routing selection based on rate assignment also proposed to achieve effective rate distributions. The simulation shows that this scheme significantly extends the WSN life-time for INP applications.

  20. A design philosophy for multi-layer neural networks with applications to robot control

    Science.gov (United States)

    Vadiee, Nader; Jamshidi, MO

    1989-01-01

    A system is proposed which receives input information from many sensors that may have diverse scaling, dimension, and data representations. The proposed system tolerates sensory information with faults. The proposed self-adaptive processing technique has great promise in integrating the techniques of artificial intelligence and neural networks in an attempt to build a more intelligent computing environment. The proposed architecture can provide a detailed decision tree based on the input information, information stored in a long-term memory, and the adapted rule-based knowledge. A mathematical model for analysis will be obtained to validate the cited hypotheses. An extensive software program will be developed to simulate a typical example of pattern recognition problem. It is shown that the proposed model displays attention, expectation, spatio-temporal, and predictory behavior which are specific to the human brain. The anticipated results of this research project are: (1) creation of a new dynamic neural network structure, and (2) applications to and comparison with conventional multi-layer neural network structures. The anticipated benefits from this research are vast. The model can be used in a neuro-computer architecture as a building block which can perform complicated, nonlinear, time-varying mapping from a multitude of input excitory classes to an output or decision environment. It can be used for coordinating different sensory inputs and past experience of a dynamic system and actuating signals. The commercial applications of this project can be the creation of a special-purpose neuro-computer hardware which can be used in spatio-temporal pattern recognitions in such areas as air defense systems, e.g., target tracking, and recognition. Potential robotics-related applications are trajectory planning, inverse dynamics computations, hierarchical control, task-oriented control, and collision avoidance.

  1. A one-layer recurrent neural network with a discontinuous hard-limiting activation function for quadratic programming.

    Science.gov (United States)

    Liu, Q; Wang, J

    2008-04-01

    In this paper, a one-layer recurrent neural network with a discontinuous hard-limiting activation function is proposed for quadratic programming. This neural network is capable of solving a large class of quadratic programming problems. The state variables of the neural network are proven to be globally stable and the output variables are proven to be convergent to optimal solutions as long as the objective function is strictly convex on a set defined by the equality constraints. In addition, a sequential quadratic programming approach based on the proposed recurrent neural network is developed for general nonlinear programming. Simulation results on numerical examples and support vector machine (SVM) learning show the effectiveness and performance of the neural network.

  2. Water transport in the gas diffusion layer of a polymer electrolyte fuel cell : Dynamic Pore-Network Modeling

    NARCIS (Netherlands)

    Qin, C.

    2015-01-01

    The pore-scale modeling is a powerful tool for increasing our understanding of water transport in the fibrous gas diffusion layer (GDL) of a polymer electrolyte fuel cell (PEFC). In this work, a new dynamic pore-network model for air-water flow in the GDL is developed. It incorporates water vapor tr

  3. Evolution of climate niches in European mammals?

    Science.gov (United States)

    Dormann, Carsten F; Gruber, Bernd; Winter, Marten; Herrmann, Dirk

    2010-04-23

    Our ability to predict consequences of climate change is severely impaired by the lack of knowledge on the ability of species to adapt to changing environmental conditions. We used distribution data for 140 mammal species in Europe, together with data on climate, land cover and topography, to derive a statistical description of their realized climate niche. We then compared climate niche overlap of pairs of species, selected on the basis of phylogenetic information. In contrast to expectations, related species were not similar in their climate niche. Rather, even species pairs that had a common ancestor less than 1 Ma already display very high climate niche distances. We interpret our finding as a strong interspecific competitive constraint on the realized niche, rather than a rapid evolution of the fundamental niche. If correct, our results imply a very limited usefulness of climate niche models for the prediction of future mammal distributions.

  4. Analytical Models of Cross-Layer Protocol Optimization in Real-Time Wireless Sensor Ad Hoc Networks

    Science.gov (United States)

    Hortos, William S.

    The real-time interactions among the nodes of a wireless sensor network (WSN) to cooperatively process data from multiple sensors are modeled. Quality-of-service (QoS) metrics are associated with the quality of fused information: throughput, delay, packet error rate, etc. Multivariate point process (MVPP) models of discrete random events in WSNs establish stochastic characteristics of optimal cross-layer protocols. Discrete-event, cross-layer interactions in mobile ad hoc network (MANET) protocols have been modeled using a set of concatenated design parameters and associated resource levels by the MVPPs. Characterization of the "best" cross-layer designs for a MANET is formulated by applying the general theory of martingale representations to controlled MVPPs. Performance is described in terms of concatenated protocol parameters and controlled through conditional rates of the MVPPs. Modeling limitations to determination of closed-form solutions versus explicit iterative solutions for ad hoc WSN controls are examined.

  5. A cross-layer scheme for medium access control with QoS guaranteeing for Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2006-01-01

    Ample medium access control (MAC) protocols for Ad hoc networks have been proposed. However, most of them do not take into account the interactions between the physical (PHY) layer and the MAC layers. Therefore, their efficiency and feasibility are greatly limited. In this article, we present a novel MAC protocol for Ad hoc networks according to the idea of cross-layer design. The proposed protocol combines an MAC protocol termed dual busy tone multiple access (DBTMA) with Orthogonal frequency division multiplexing (OFDM) system in IEEE 802.11a standard. The analysis showed that the proposed protocol provides higher throughput and is more flexible than previous MAC protocols. In addition, it can provide Quality of Service(QoS) guarantee to the packets with different delay requirements in the presence of hidden terminals.

  6. On Energy Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    CERN Document Server

    Comaniciu, Cristina

    2007-01-01

    In this paper, a hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  7. An optimized recursive learning algorithm for three-layer feedforward neural networks for mimo nonlinear system identifications

    CERN Document Server

    Sha, Daohang

    2010-01-01

    Back-propagation with gradient method is the most popular learning algorithm for feed-forward neural networks. However, it is critical to determine a proper fixed learning rate for the algorithm. In this paper, an optimized recursive algorithm is presented for online learning based on matrix operation and optimization methods analytically, which can avoid the trouble to select a proper learning rate for the gradient method. The proof of weak convergence of the proposed algorithm also is given. Although this approach is proposed for three-layer, feed-forward neural networks, it could be extended to multiple layer feed-forward neural networks. The effectiveness of the proposed algorithms applied to the identification of behavior of a two-input and two-output non-linear dynamic system is demonstrated by simulation experiments.

  8. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Poor HVincent

    2007-01-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  9. The development of a knowledge base in an expert system based on the four-layer perceptron neural network

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Owing to continuous production lines with large amount of consecutive controls, various control signals and huge logistic relations, this paper introduced the methods and principles of the development of knowledge base in a fault diagnosis expert system that was based on machine learning by the four-layer perceptron neural network. An example was presented. By combining differential function with not differentia function and back propagation of error with back propagation of expectation, the four-layer perceptron neural network was established. And it was good for solving such a bottleneck problem in knowledge acquisition in expert system and enhancing real-time on-line diagnosis. A method of synthetic back propagation was designed, which broke the limit to non-differentiable function in BP neural network.

  10. Foundations of implementing the competitive layer model by Lotka-Volterra recurrent neural networks.

    Science.gov (United States)

    Yi, Zhang

    2010-03-01

    The competitive layer model (CLM) can be described by an optimization problem. The problem can be further formulated by an energy function, called the CLM energy function, in the subspace of nonnegative orthant. The set of minimum points of the CLM energy function forms the set of solutions of the CLM problem. Solving the CLM problem means to find out such solutions. Recurrent neural networks (RNNs) can be used to implement the CLM to solve the CLM problem. The key point is to make the set of minimum points of the CLM energy function just correspond to the set of stable attractors of the recurrent neural networks. This paper proposes to use Lotka-Volterra RNNs (LV RNNs) to implement the CLM. The contribution of this paper is to establish foundations of implementing the CLM by LV RNNs. The contribution mainly contains three parts. The first part is on the CLM energy function. Necessary and sufficient conditions for minimum points of the CLM energy function are established by detailed study. The second part is on the convergence of the proposed model of the LV RNNs. It is proven that interesting trajectories are convergent. The third part is the most important. It proves that the set of stable attractors of the proposed LV RNN just equals the set of minimum points of the CLM energy function in the nonnegative orthant. Thus, the LV RNNs can be used to solve the problem of the CLM. It is believed that by establishing such basic rigorous theories, more and interesting applications of the CLM can be found.

  11. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  12. Mapping of potential neurogenic niche in the human temporal lobe

    Directory of Open Access Journals (Sweden)

    Adriano Barreto Nogueira

    2014-10-01

    Full Text Available The subgranular zone (SGZ of the dentate gyrus and the subventricular zone (SVZ are known neurogenic niches in adult mammals. Nonetheless, the existence of neurogenic niches in adult humans is controversial. We hypothesized that mapping neurogenic niches in the human temporal lobe could clarify this issue. Neurogenic niches and neurogenesis were investigated in 28 temporal lobes via immunostaining for nestin and doublecortin (DCX, respectively. Nestin was observed in a continuous layer formed by the SVZ, the subpial zone of the medial temporal lobe and the SGZ, terminating in the subiculum. In the subiculum, remarkable DCX expression was observed through the principal efferent pathway of the hippocampus to the fimbria. A possible explanation for the results is that the SVZ, the subpial zone of the medial temporal lobe and the SGZ form a unit containing neural stem cells that differentiate into neurons in the subiculum. Curiously, the area previously identified as the human rostral migratory stream may in truth be the fornix, which contains axons that originate in the subiculum. This study suggests that neurogenesis may occur in an orchestrated manner in a broad area of the human temporal lobe.

  13. Storage capacity and learning algorithms for two-layer neural networks

    Science.gov (United States)

    Engel, A.; Köhler, H. M.; Tschepke, F.; Vollmayr, H.; Zippelius, A.

    1992-05-01

    A two-layer feedforward network of McCulloch-Pitts neurons with N inputs and K hidden units is analyzed for N-->∞ and K finite with respect to its ability to implement p=αN random input-output relations. Special emphasis is put on the case where all hidden units are coupled to the output with the same strength (committee machine) and the receptive fields of the hidden units either enclose all input units (fully connected) or are nonoverlapping (tree structure). The storage capacity is determined generalizing Gardner's treatment [J. Phys. A 21, 257 (1988); Europhys. Lett. 4, 481 (1987)] of the single-layer perceptron. For the treelike architecture, a replica-symmetric calculation yields αc~ √K for a large number K of hidden units. This result violates an upper bound derived by Mitchison and Durbin [Biol. Cybern. 60, 345 (1989)]. One-step replica-symmetry breaking gives lower values of αc. In the fully connected committee machine there are in general correlations among different hidden units. As the limit of capacity is approached, the hidden units are anticorrelated: One hidden unit attempts to learn those patterns which have not been learned by the others. These correlations decrease as 1/K, so that for K-->∞ the capacity per synapse is the same as for the tree architecture, whereas for small K we find a considerable enhancement for the storage per synapse. Numerical simulations were performed to explicitly construct solutions for the tree as well as the fully connected architecture. A learning algorithm is suggested. It is based on the least-action algorithm, which is modified to take advantage of the two-layer structure. The numerical simulations yield capacities p that are slightly more than twice the number of degrees of freedom, while the fully connected net can store relatively more patterns than the tree. Various generalizations are discussed. Variable weights from hidden to output give the same results for the storage capacity as does the committee

  14. How is the rate of climatic-niche evolution related to climatic-niche breadth?

    Science.gov (United States)

    Fisher-Reid, M Caitlin; Kozak, Kenneth H; Wiens, John J

    2012-12-01

    The rate of climatic-niche evolution is important to many research areas in ecology, evolution, and conservation biology, including responses of species to global climate change, spread of invasive species, speciation, biogeography, and patterns of species richness. Previous studies have implied that clades with higher rates of climatic-niche evolution among species should have species with narrower niche breadths, but there is also evidence suggesting the opposite pattern. However, the relationships between rate and breadth have not been explicitly analyzed. Here, we examine the relationships between the rate of climatic-niche evolution and climatic-niche breadth using phylogenetic and climatic data for 250 species in the salamander family Plethodontidae, a group showing considerable variation in both rates of climatic-niche evolution and climatic-niche breadths. Contrary to some expectations, we find no general relationship between climatic-niche breadth and the rate of climatic-niche evolution. Climatic-niche breadths for some ecologically important climatic variables considered separately (temperature seasonality and annual precipitation) do show significant relationships with the rate of climatic-niche evolution, but rates are faster in clades in which species have broader (not narrower) niche breadths. In summary, our results show that narrower niche breadths are not necessarily associated with faster rates of niche evolution. © 2012 The Author(s). Evolution© 2012 The Society for the Study of Evolution.

  15. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  16. Selective Route Based on SNR with Cross-Layer Scheme in Wireless Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Istikmal

    2017-01-01

    Full Text Available In this study, we developed network and throughput formulation models and proposed new method of the routing protocol algorithm with a cross-layer scheme based on signal-to-noise ratio (SNR. This method is an enhancement of routing protocol ad hoc on-demand distance vector (AODV. This proposed scheme uses selective route based on the SNR threshold in the reverse route mechanism. We developed AODV SNR-selective route (AODV SNR-SR for a mechanism better than AODV SNR, that is, the routing protocol that used average or sum of path SNR, and also better than AODV which is hop-count-based. We also used selective reverse route based on SNR mechanism, replacing the earlier method to avoid routing overhead. The simulation results show that AODV SNR-SR outperforms AODV SNR and AODV in terms of throughput, end-to-end delay, and routing overhead. This proposed method is expected to support Device-to-Device (D2D communications that are concerned with the quality of the channel awareness in the development of the future Fifth Generation (5G.

  17. Cross-Layer MIMO Transceiver Optimization for Multimedia Streaming in Interference Networks

    Science.gov (United States)

    Zhang, Fan; Lau, Vincent K. N.

    2014-03-01

    In this paper, we consider dynamic precoder/decorrelator optimization for multimedia streaming in MIMO interference networks. We propose a truly cross-layer framework in the sense that the optimization objective is the application level performance metrics for multimedia streaming, namely the playback interruption and buffer overflow probabilities. The optimization variables are the MIMO precoders/decorrelators at the transmitters and the receivers, which are adaptive to both the instantaneous channel condition and the playback queue length. The problem is a challenging multi-dimensional stochastic optimization problem and brute-force solution has exponential complexity. By exploiting the underlying timescale separation and special structure in the problem, we derive a closed-form approximation of the value function based on continuous time perturbation. Using this approximation, we propose a low complexity dynamic MIMO precoder/decorrelator control algorithm by solving an equivalent weighted MMSE problem. We also establish the technical conditions for asymptotic optimality of the low complexity control algorithm. Finally, the proposed scheme is compared with various baselines through simulations and it is shown that significant performance gain can be achieved.

  18. A single-layer network unsupervised feature learning method for white matter hyperintensity segmentation

    Science.gov (United States)

    Vijverberg, Koen; Ghafoorian, Mohsen; van Uden, Inge W. M.; de Leeuw, Frank-Erik; Platel, Bram; Heskes, Tom

    2016-03-01

    Cerebral small vessel disease (SVD) is a disorder frequently found among the old people and is associated with deterioration in cognitive performance, parkinsonism, motor and mood impairments. White matter hyperintensities (WMH) as well as lacunes, microbleeds and subcortical brain atrophy are part of the spectrum of image findings, related to SVD. Accurate segmentation of WMHs is important for prognosis and diagnosis of multiple neurological disorders such as MS and SVD. Almost all of the published (semi-)automated WMH detection models employ multiple complex hand-crafted features, which require in-depth domain knowledge. In this paper we propose to apply a single-layer network unsupervised feature learning (USFL) method to avoid hand-crafted features, but rather to automatically learn a more efficient set of features. Experimental results show that a computer aided detection system with a USFL system outperforms a hand-crafted approach. Moreover, since the two feature sets have complementary properties, a hybrid system that makes use of both hand-crafted and unsupervised learned features, shows a significant performance boost compared to each system separately, getting close to the performance of an independent human expert.

  19. Master Synchronization in Physical-Layer Communications of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zheng Lin

    2010-01-01

    Full Text Available Synchronization in physical layer of wireless sensor networks is critical in restricting complexity of tag node and power consumption. Considering the master-to-tag communication (i.e., receiving signal from a master or anchor node by tag nodes, we propose a scheme on the basis of the principles of feedback control, to transfer the signal acquisition functionality from the tag receivers to the master nodes in a cluster. Furthermore, the algorithm of timing acquisition and phase adjustment do work in the master transmitter, and the tag nodes just need feedback results of the phase detection. The tag nodes do not require complicated clock or phase adjustment circuit any more or estimation in synchronization either. Thus, this master synchronization method reduces the complexity of tag nodes and power consumption. Due to the large random time delay in the wireless feedback loop, there exists the problem of stability and convergence in the acquisition. We analyze it and present a feasible scheme for the proposed master synchronization. In order to reduce acquisition time and cost in feedback, a two-step master acquisition algorithm is proposed. The acquisition performance under nonideal channel is analyzed, and further verified by simulations.

  20. Self-assembled Ag nanoparticle network passivated by a nano-sized ZnO layer for transparent and flexible film heaters

    Energy Technology Data Exchange (ETDEWEB)

    Seo, Ki-Won; Kim, Han-Ki, E-mail: imdlhkkim@khu.ac.kr [Department of Advanced Materials Engineering for Information and Electronics, Kyung Hee University, 1 Seocheon-dong, Yongin-si, Gyeonggi-do 446-701 (Korea, Republic of); Kim, Min-Yi; Chang, Hyo-Sik [Graduate School of Energy Science and Technology, Chungnam National University, Daejeon, 305-764 (Korea, Republic of)

    2015-12-15

    We investigated a self-assembled Ag nanoparticle network electrode passivated by a nano-sized ZnO layer for use in high-performance transparent and flexible film heaters (TFFHs). The low temperature atomic layer deposition of a nano-sized ZnO layer effectively filled the uncovered area of Ag network and improved the current spreading in the self-assembled Ag network without a change in the sheet resistance and optical transmittance as well as mechanical flexibility. The time-temperature profiles and heat distribution analysis demonstrate that the performance of the TFTH with the ZnO/Ag network is superior to that of a TFFH with Ag nanowire electrodes. In addition, the TFTHs with ZnO/Ag network exhibited better stability than the TFFH with a bare Ag network due to the effective current spreading through the nano-sized ZnO layer.

  1. Self-assembled Ag nanoparticle network passivated by a nano-sized ZnO layer for transparent and flexible film heaters

    Directory of Open Access Journals (Sweden)

    Ki-Won Seo

    2015-12-01

    Full Text Available We investigated a self-assembled Ag nanoparticle network electrode passivated by a nano-sized ZnO layer for use in high-performance transparent and flexible film heaters (TFFHs. The low temperature atomic layer deposition of a nano-sized ZnO layer effectively filled the uncovered area of Ag network and improved the current spreading in the self-assembled Ag network without a change in the sheet resistance and optical transmittance as well as mechanical flexibility. The time-temperature profiles and heat distribution analysis demonstrate that the performance of the TFTH with the ZnO/Ag network is superior to that of a TFFH with Ag nanowire electrodes. In addition, the TFTHs with ZnO/Ag network exhibited better stability than the TFFH with a bare Ag network due to the effective current spreading through the nano-sized ZnO layer.

  2. Phylogenetic conservatism of environmental niches in mammals.

    Science.gov (United States)

    Cooper, Natalie; Freckleton, Rob P; Jetz, Walter

    2011-08-01

    Phylogenetic niche conservatism is the pattern where close relatives occupy similar niches, whereas distant relatives are more dissimilar. We suggest that niche conservatism will vary across clades in relation to their characteristics. Specifically, we investigate how conservatism of environmental niches varies among mammals according to their latitude, range size, body size and specialization. We use the Brownian rate parameter, σ(2), to measure the rate of evolution in key variables related to the ecological niche and define the more conserved group as the one with the slower rate of evolution. We find that tropical, small-ranged and specialized mammals have more conserved thermal niches than temperate, large-ranged or generalized mammals. Partitioning niche conservatism into its spatial and phylogenetic components, we find that spatial effects on niche variables are generally greater than phylogenetic effects. This suggests that recent evolution and dispersal have more influence on species' niches than more distant evolutionary events. These results have implications for our understanding of the role of niche conservatism in species richness patterns and for gauging the potential for species to adapt to global change.

  3. A Cross-Layer Approach for Minimizing Interference and Latency of Medium Access in Wireless Sensor Networks

    CERN Document Server

    Dezfouli, Behnam; Razak, Shukor Abd; 10.5121/ijcnc.2010.2411

    2010-01-01

    In low power wireless sensor networks, MAC protocols usually employ periodic sleep/wake schedule to reduce idle listening time. Even though this mechanism is simple and efficient, it results in high end-to-end latency and low throughput. On the other hand, the previously proposed CSMA/CA-based MAC protocols have tried to reduce inter-node interference at the cost of increased latency and lower network capacity. In this paper we propose IAMAC, a CSMA/CA sleep/wake MAC protocol that minimizes inter-node interference, while also reduces per-hop delay through cross-layer interactions with the network layer. Furthermore, we show that IAMAC can be integrated into the SP architecture to perform its inter-layer interactions. Through simulation, we have extensively evaluated the performance of IAMAC in terms of different performance metrics. Simulation results confirm that IAMAC reduces energy consumption per node and leads to higher network lifetime compared to S-MAC and Adaptive S-MAC, while it also provides lower l...

  4. Distributed Processing System for Restoration of Electric Power Distribution Network Using Two-Layered Contract Net Protocol

    Science.gov (United States)

    Kodama, Yu; Hamagami, Tomoki

    Distributed processing system for restoration of electric power distribution network using two-layered CNP is proposed. The goal of this study is to develop the restoration system which adjusts to the future power network with distributed generators. The state of the art of this study is that the two-layered CNP is applied for the distributed computing environment in practical use. The two-layered CNP has two classes of agents, named field agent and operating agent in the network. In order to avoid conflicts of tasks, operating agent controls privilege for managers to send the task announcement messages in CNP. This technique realizes the coordination between agents which work asynchronously in parallel with others. Moreover, this study implements the distributed processing system using a de-fact standard multi-agent framework, JADE(Java Agent DEvelopment framework). This study conducts the simulation experiments of power distribution network restoration and compares the proposed system with the previous system. We confirmed the results show effectiveness of the proposed system.

  5. Evolution of pollination niches and floral divergence in the generalist plant Erysimum mediohispanicum.

    Science.gov (United States)

    Gómez, J M; Muñoz-Pajares, A J; Abdelaziz, M; Lorite, J; Perfectti, F

    2014-01-01

    How generalist plants diverge in response to pollinator selection without becoming specialized is still unknown. This study explores this question, focusing on the evolution of the pollination system in the pollination generalist Erysimum mediohispanicum (Brassicaceae). Pollinator assemblages were surveyed from 2001 to 2010 in 48 geo-referenced populations covering the entire geographic distribution of E. mediohispanicum. Bipartite modularity, a complex network tool, was used to find the pollination niche of each population. Evolution of the pollination niches and the correlated evolution of floral traits and pollination niches were explored using within-species comparative analyses. Despite being generalists, the E. mediohispanicum populations studied can be classified into five pollination niches. The boundaries between niches were not sharp, the niches differing among them in the relative frequencies of the floral visitor functional groups. The absence of spatial autocorrelation and phylogenetic signal indicates that the niches were distributed in a phylogeographic mosaic. The ancestral E. mediohispanicum populations presumably belonged to the niche defined by a high number of beetle and ant visits. A correlated evolution was found between pollination niches and some floral traits, suggesting the existence of generalist pollination ecotypes. It is conjectured that the geographic variation in pollination niches has contributed to the observed floral divergence in E. mediohispanicum. The process mediating this floral divergence presumably has been adaptive wandering, but the adaptation to the local pollinator faunas has been not universal. The outcome is a landscape where a few populations locally adapted to their pollination environment (generalist pollination ecotypes) coexist with many populations where this local adaptation has failed and where the plant phenotype is not primarily shaped by pollinators.

  6. Spatial distributions of niche-constructing populations

    Directory of Open Access Journals (Sweden)

    Xiaozhuo Han

    2015-12-01

    Full Text Available Niche construction theory regards organisms not only as the object of natural selection but also an active subject that can change their own selective pressure through eco-evolutionary feedbacks. Through reviewing the existing works on the theoretical models of niche construction, here we present the progress made on how niche construction influences genetic structure of spatially structured populations and the spatial-temporal dynamics of metapopulations, with special focuses on mathematical models and simulation methods. The majority of results confirmed that niche construction can significantly alter the evolutionary trajectories of structured populations. Organism-environmental interactions induced by niche construction can have profound influence on the dynamics, competition and diversity of metapopulations. It can affect fine-scale spatially distribution of species and spatial heterogeneity of the environment. We further propose a few research directions with potentials, such as applying adaptive dynamics or spatial game theory to explore the effect of niche construction on phenotypic evolution and diversification.

  7. Niche-tracking migrants and niche-switching residents: evolution of climatic niches in New World warblers (Parulidae)

    Science.gov (United States)

    Gómez, Camila; Tenorio, Elkin A.; Montoya, Paola; Cadena, Carlos Daniel

    2016-01-01

    Differences in life-history traits between tropical and temperate lineages are often attributed to differences in their climatic niche dynamics. For example, the more frequent appearance of migratory behaviour in temperate-breeding species than in species originally breeding in the tropics is believed to have resulted partly from tropical climatic stability and niche conservatism constraining tropical species from shifting their ranges. However, little is known about the patterns and processes underlying climatic niche evolution in migrant and resident animals. We evaluated the evolution of overlap in climatic niches between seasons and its relationship to migratory behaviour in the Parulidae, a family of New World passerine birds. We used ordination methods to measure seasonal niche overlap and niche breadth of 54 resident and 49 migrant species and used phylogenetic comparative methods to assess patterns of climatic niche evolution. We found that despite travelling thousands of kilometres, migrants tracked climatic conditions across the year to a greater extent than tropical residents. Migrant species had wider niches than resident species, although residents as a group occupied a wider climatic space and niches of migrants and residents overlapped extensively. Neither breeding latitude nor migratory distance explained variation among species in climatic niche overlap between seasons. Our findings support the notion that tropical species have narrower niches than temperate-breeders, but does not necessarily constrain their ability to shift or expand their geographical ranges and become migratory. Overall, the tropics may have been historically less likely to experience the suite of components that generate strong selection pressures for the evolution of migratory behaviour. PMID:26865303

  8. Niche-tracking migrants and niche-switching residents: evolution of climatic niches in New World warblers (Parulidae).

    Science.gov (United States)

    Gómez, Camila; Tenorio, Elkin A; Montoya, Paola; Cadena, Carlos Daniel

    2016-02-10

    Differences in life-history traits between tropical and temperate lineages are often attributed to differences in their climatic niche dynamics. For example, the more frequent appearance of migratory behaviour in temperate-breeding species than in species originally breeding in the tropics is believed to have resulted partly from tropical climatic stability and niche conservatism constraining tropical species from shifting their ranges. However, little is known about the patterns and processes underlying climatic niche evolution in migrant and resident animals. We evaluated the evolution of overlap in climatic niches between seasons and its relationship to migratory behaviour in the Parulidae, a family of New World passerine birds. We used ordination methods to measure seasonal niche overlap and niche breadth of 54 resident and 49 migrant species and used phylogenetic comparative methods to assess patterns of climatic niche evolution. We found that despite travelling thousands of kilometres, migrants tracked climatic conditions across the year to a greater extent than tropical residents. Migrant species had wider niches than resident species, although residents as a group occupied a wider climatic space and niches of migrants and residents overlapped extensively. Neither breeding latitude nor migratory distance explained variation among species in climatic niche overlap between seasons. Our findings support the notion that tropical species have narrower niches than temperate-breeders, but does not necessarily constrain their ability to shift or expand their geographical ranges and become migratory. Overall, the tropics may have been historically less likely to experience the suite of components that generate strong selection pressures for the evolution of migratory behaviour.

  9. On the Transformation Mechanism for Formulating a Multiproduct Two-Layer Supply Chain Network Design Problem as a Network Flow Model

    Directory of Open Access Journals (Sweden)

    Mi Gan

    2014-01-01

    Full Text Available The multiproduct two-layer supply chain is very common in various industries. In this paper, we introduce a possible modeling and algorithms to solve a multiproduct two-layer supply chain network design problem. The decisions involved are the DCs location and capacity design decision and the initial distribution planning decision. First we describe the problem and give a mixed integer programming (MIP model; such problem is NP-hard and it is not easy to reduce the complexity. Inspired by it, we develop a transformation mechanism of relaxing the fixed cost and adding some virtual nodes and arcs to the original network. Thus, a network flow problem (NFP corresponding to the original problem has been formulated. Given that we could solve the NFP as a minimal cost flow problem. The solution procedures and network simplex algorithm (INS are discussed. To verify the effectiveness and efficiency of the model and algorithms, the performance measure experimental has been conducted. The experiments and result showed that comparing with MIP model solved by genetic algorithm (GA and Benders, decomposition algorithm (BD the NFP model and INS are also effective and even more efficient for both small-scale and large-scale problems.

  10. Interactions between structural and chemical biomimetism in synthetic stem cell niches.

    Science.gov (United States)

    Nava, Michele M; Raimondi, Manuela T; Credi, Caterina; De Marco, Carmela; Turri, Stefano; Cerullo, Giulio; Osellame, Roberto

    2015-01-16

    Advancements in understanding stem cell functions and differentiation are of key importance for the clinical success of stem-cell-based therapies. 3D structural niches fabricated by two-photon polymerization are a powerful platform for controlling stem cell growth and differentiation. In this paper, we investigate the possibility of further controlling stem cell fate by tuning the mechanical properties of such niches through coating with thin layers of biomimetic hyaluronan-based and gelatin-based hydrogels. We first assess the biocompatibility of chemical coatings and then study the interactions between structural and chemical biomimetism on the response of MSCs in terms of proliferation and differentiation. We observed a clear effect of the hydrogel coating on otherwise identical 3D scaffolds. In particular, in gelatin-coated niches we observed a stronger metabolic activity and commitment toward the osteo-chondral lineage with respect to hyaluronan-coated niches. Conversely, a reduction in the homing effect was observed in all the coated niches, especially in gelatin-coated niches. This study demonstrates the feasibility of controlling independently different mechanical cues, in bioengineered stem cell niches, i.e. the 3D scaffold geometry and the surface stiffness. This will allow, on the one hand, understanding their specific role in stem cell proliferation and differentiation and, on the other hand, finely tuning their synergistic effect.

  11. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    Science.gov (United States)

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  12. Internal-state analysis in layered artificial neural network trained to categorize lung sounds

    NARCIS (Netherlands)

    Oud, M

    2002-01-01

    In regular use of artificial neural networks, only input and output states of the network are known to the user. Weight and bias values can be extracted but are difficult to interpret. We analyzed internal states of networks trained to map asthmatic lung sound spectra onto lung function parameters.

  13. Using Hybrid Algorithm to Improve Intrusion Detection in Multi Layer Feed Forward Neural Networks

    Science.gov (United States)

    Ray, Loye Lynn

    2014-01-01

    The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…

  14. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  15. Ditch the niche - is the niche a useful concept in ecology or species distribution modelling?

    NARCIS (Netherlands)

    McInerny, Greg J.; Etienne, Rampal S.

    2012-01-01

    In this first of three papers we examine the use of niche concepts in ecology and especially in species distribution modelling (SDM). This paper deliberately focuses on the lack of clarity found in the term niche. Because its meanings are so diverse, the term niche tends to create confusion and

  16. Competition at the Wireless Sensor Network MAC Layer: Low Power Probing interfering with X-MAC

    Science.gov (United States)

    Zacharias, Sven; Newe, Thomas

    2011-08-01

    Wireless Sensor Networks (WSNs) combine sensors with computer networks and enable very dense, in-situ and live measurements of data over a large area. Since this emerging technology has the potential to be embedded almost everywhere for numberless applications, interference between different networks can become a serious issue. For most WSNs, it is assumed today that the network medium access is non-competitive. On the basis of X-MAC interfered by Low Power Probing, this paper shows the danger and the effects of different sensor networks communicating on a single wireless channel of the 2.4 GHz band, which is used by the IEEE 802.15.4 standard.

  17. Forced phase-locked states and information retrieval in a two-layer network of oscillatory neurons with directional connectivity

    Science.gov (United States)

    Kazantsev, Victor; Pimashkin, Alexey

    2007-09-01

    We propose two-layer architecture of associative memory oscillatory network with directional interlayer connectivity. The network is capable to store information in the form of phase-locked (in-phase and antiphase) oscillatory patterns. The first (input) layer takes an input pattern to be recognized and their units are unidirectionally connected with all units of the second (control) layer. The connection strengths are weighted using the Hebbian rule. The output (retrieved) patterns appear as forced-phase locked states of the control layer. The conditions are found and analytically expressed for pattern retrieval in response on incoming stimulus. It is shown that the system is capable to recover patterns with a certain level of distortions or noises in their profiles. The architecture is implemented with the Kuramoto phase model and using synaptically coupled neural oscillators with spikes. It is found that the spiking model is capable to retrieve patterns using the spiking phase that translates memorized patterns into the spiking phase shifts at different time scales.

  18. Detectability of small communities in multilayer and temporal networks: Eigenvector localization, layer aggregation, and time series discretization

    CERN Document Server

    Taylor, Dane; Mucha, Peter J

    2016-01-01

    Inspired by real-world networks that are naturally represented by layers encoding different types of connections, such as different instances in time, we study the detectability of small-scale communities that are anomalies in that they are hidden in a multilayer network. Letting $K$ and $T$ respectively denote the community size and the number of layers in which it is present, we assume that it is unknown which of the $N\\gg K$ nodes are involved in the community or in which of the $L\\ge T$ layers it is present. We study fundamental limitations on the detectability of small communities by developing random matrix theory for the dominant eigenvectors of a modularity matrix that is associated with an aggregation of layers. We identify a phase transition in detectability that is caused by an eigenvector localization phenomenon that is analogous to localization arising for disordered media and occurs when $K$ surpasses a critical size $K^*\\varpropto \\sqrt{T^{-2}NL}$. We highlight several consequences of this scal...

  19. HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

    Directory of Open Access Journals (Sweden)

    Jasmine Norman

    2010-07-01

    Full Text Available A pervasive network consists of heterogeneous devices with different computing, storage, mobility and connectivity properties working together to solve real-world problems. The emergence of wireless sensor networks has enabled new classes of applications in pervasive world that benefit a large number of fields. Routing in wireless sensor networks is a demanding task. This demand has led to a number of routing protocols which efficiently utilize the limited resources available at the sensor nodes. Most of these protocols either support stationary sensor networks or mobile networks. This paper proposes an energy efficient routing protocol for heterogeneous sensor networks with the goal of finding the nearest base station or sink node. Hence the problem of routing is reduced to finding the nearest base station problem in heterogeneous networks. The protocol HLAODV when compared with popular routing protocols AODV and DSR is energy efficient. Also the mathematical model of the proposed system and its properties are studied.

  20. A Distributed Mechanism for Handling of Adaptive/Intelligent Selfish Misbehaviour at MAC Layer in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Raja Gunasekaran; Vaidheyanathan Rhymend Uthariaraj; Uamapathy Yamini; Rajagopalan Sudharsan; Selvaraj Sujitha Priyadarshini

    2009-01-01

    Medium access control (MAC) protocols such as IEEE 802.11 are used in wireless networks for sharing of the wireless medium.. The random nature of the protocol operation together with the inherent difficulty of monitoring in the open poses significant challenges. All nodes are expected to comply with the protocol rules. But, some nodes in order to gain greater benefits misbehave by not complying with the rules. One such selfish misbehavior is waiting for smaller back-off intervals when compared to the other nodes in the same subnet. Such selfish misbehavior is being tackled in this paper. A diagnosis scheme and a penalty scheme are being proposed for overcoming such selfish-misbehavior at MAC layer of mobile ad hoc networks which could be extended to other types of networks also.

  1. Target Article with Commentaries: Developmental Niche Construction

    Science.gov (United States)

    Flynn, Emma G.; Laland, Kevin N.; Kendal, Rachel L.; Kendal, Jeremy R.

    2013-01-01

    Niche construction is the modification of components of the environment through an organism's activities. Humans modify their environments mainly through ontogenetic and cultural processes, and it is this reliance on learning, plasticity and culture that lends human niche construction a special potency. In this paper we aim to facilitate…

  2. A Niche Width Model of Optimal Specialization

    NARCIS (Netherlands)

    Bruggeman, Jeroen; Ó Nualláin, Breanndán

    2000-01-01

    Niche width theory, a part of organizational ecology, predicts whether “specialist” or “generalist” forms of organizations have higher “fitness,” in a continually changing environment. To this end, niche width theory uses a mathematical model borrowed from biology. In this paper, we first loosen th

  3. An Integrated Multi-layer Approach for Seamless Soft Handoff in Mobile Ad Hoc Networks

    Science.gov (United States)

    2011-01-01

    networks. AODV routing protocol [14] is used in the MANET. Three different scenarios are selected for investigation in our simulation. It is worth noting...networks. The WiFi network consists of a number of nodes that form a MANET using the AODV [14] routing protocol . Certain nodes have dual wireless...only Figure 10(a) shows the AODV -WiFi only scenario where 12 nodes form a MANET using AODV routing protocol . Each node has exactly one WiFi

  4. The Cell as the First Niche Construction.

    Science.gov (United States)

    Torday, John S

    2016-04-28

    Niche construction nominally describes how organisms can form their own environments, increasing their capacity to adapt to their surroundings. It is hypothesized that the formation of the first cell as 'internal' Niche Construction was the foundation for life, and that subsequent niche constructions were iterative exaptations of that event. The first instantation of niche construction has been faithfully adhered to by returning to the unicellular state, suggesting that the life cycle is zygote to zygote, not adult to adult as is commonly held. The consequent interactions between niche construction and epigenetic inheritance provide a highly robust, interactive, mechanistic way of thinking about evolution being determined by initial conditions rather than merely by chance mutation and selection. This novel perspective offers an opportunity to reappraise the processes involved in evolution mechanistically, allowing for scientifically testable hypotheses rather than relying on metaphors, dogma, teleology and tautology.

  5. The Cell as the First Niche Construction

    Directory of Open Access Journals (Sweden)

    John S. Torday

    2016-04-01

    Full Text Available Niche construction nominally describes how organisms can form their own environments, increasing their capacity to adapt to their surroundings. It is hypothesized that the formation of the first cell as ‘internal’ Niche Construction was the foundation for life, and that subsequent niche constructions were iterative exaptations of that event. The first instantation of niche construction has been faithfully adhered to by returning to the unicellular state, suggesting that the life cycle is zygote to zygote, not adult to adult as is commonly held. The consequent interactions between niche construction and epigenetic inheritance provide a highly robust, interactive, mechanistic way of thinking about evolution being determined by initial conditions rather than merely by chance mutation and selection. This novel perspective offers an opportunity to reappraise the processes involved in evolution mechanistically, allowing for scientifically testable hypotheses rather than relying on metaphors, dogma, teleology and tautology.

  6. A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks

    CERN Document Server

    Rajaram, A

    2009-01-01

    In this paper, we develop a trust based security protocol based on a cross layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding by maintaining a trust counter for each node. A node is punished or rewarded by decreasing or increasing the trust counter. If the trust counter value falls below a trust threshold, the corresponding intermediate node is marked as malicious. In the next phase of the protocol, we provide link layer security using the CBCX mode of authentication and encryption. By simulation results, we show that the proposed cross layer security protocol achieves high packet delivery ratio while attaining low delay and overhead.

  7. Formation and Detection of Clay Network Structure in Poly(propylene)/Layered Silicate Nanocomposites

    NARCIS (Netherlands)

    Abranyi, Agnes; Szazdi, Laszlo; Pukanszky Jr., Bela; Vancso, G. Julius; Pukanszky, Bela

    2006-01-01

    The study of the structure and the rheological properties of poly(propylene) (PP)/montmorillonite (MMT)/maleinated PP (MAPP) composites strongly suggests that a silicate network may form under certain conditions. Network formation could not be proven unambiguously with the usual techniques, i.e., wi

  8. Formation and Detection of Clay Network Structure in Poly(propylene) /Layered Silicate Nanocomposites

    NARCIS (Netherlands)

    Abranyi, Agnes; Szazdi, Laszlo; Pukanszky Jr., Bela; Vancso, Gyula J.; Pukanszky, B.; Pukanszky, Bela

    2006-01-01

    The study of the structure and the rheological properties of poly(propylene) (PP)/montmorillonite (MMT)/maleinated PP (MAPP) composites strongly suggests that a silicate network may form under certain conditions. Network formation could not be proven unambiguously with the usual techniques, i.e.,

  9. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based routing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more reasonable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effectiveness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  10. Assessment of planetary boundary layer and residual layer heights in the Northeastern U.S. using Lidar, a network of surface observations, and the WRF-STILT model

    Science.gov (United States)

    Barrera, Y.; Nehrkorn, T.; Hegarty, J. D.; Wofsy, S. C.; Gottlieb, E.; Sargent, M. R.; Decola, P.; Jones, T.

    2015-12-01

    Simulation of the planetary boundary layer (PBL) and residual layer (RL) are key requirements for forecasting air quality in cities and detecting transboundary air pollution events. This study combines information from a network of Mini Micropulse Lidar (MPL) instruments, the CALIOP satellite, meteorological and air pollution measuring sensors, and a particle-transport model to critically test mesoscale transport models at the regional level. Aerosol backscattering measurements were continuously taken with MPL units in various locations within the Northeastern U.S., between September 2012 to August 2015. Data is analyzed using wavelet covariance transforms and image processing techniques. Initial results for the city of Boston show a PBL growth rate between approx. 150 and 300 meters per hour, in the morning to early afternoon (~12-19 UTC). The RL was present throughout the night and day at approx. 1.3 to 2.0 km. Transboundary air pollution events were detected and quantified, and variations in concentrations of greenhouse gases and aerosols were also evaluated. Results were compared to information retrieved from Weather and Research Forecasting (WRF) model and the Stochastic Time-Inverted Lagrangian Transport (STILT) model.

  11. An Optimized Technique of Increasing the Performance of Network Adapter on EML Layer

    Directory of Open Access Journals (Sweden)

    Prashanth L

    2012-08-01

    Full Text Available Simple Network Adapter initially which acts as an interface between the Transaction server and Network Elements communicates over the channel through tcppdu. Presently the disadvantage being involved in tcppdu is to maintain the channel contention, reservation of channel bandwidth. The disadvantage being involved is certain features, version of network elements communicates by receiving the xml over the socket. So, it’s not possible to change the entire framework, but by updating the framework an XML Over Socket(XOS formation should be supported. The XOS implementation is being performed using Java language through mainly in JVM. Such that by this deployment machines would become easier and form a good communication gap between them. This simple network adapter being developed should support operations of the North bounded server and gives an established authorized, secured, reliable portal. The interface being developed should provide a good performance in meeting the network demands and operated conversions of respective objects

  12. An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer

    CERN Document Server

    Kumar, Gulshan; 10.5121/ijnsa.2011.3413

    2011-01-01

    Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted 'malicious'. The second part of our protocol deals with the security in the link layer. For t...

  13. Dynamic boundary layer based neural network quasi-sliding mode control for soft touching down on asteroid

    Science.gov (United States)

    Liu, Xiaosong; Shan, Zebiao; Li, Yuanchun

    2017-04-01

    Pinpoint landing is a critical step in some asteroid exploring missions. This paper is concerned with the descent trajectory control for soft touching down on a small irregularly-shaped asteroid. A dynamic boundary layer based neural network quasi-sliding mode control law is proposed to track a desired descending path. The asteroid's gravitational acceleration acting on the spacecraft is described by the polyhedron method. Considering the presence of input constraint and unmodeled acceleration, the dynamic equation of relative motion is presented first. The desired descending path is planned using cubic polynomial method, and a collision detection algorithm is designed. To perform trajectory tracking, a neural network sliding mode control law is given first, where the sliding mode control is used to ensure the convergence of system states. Two radial basis function neural networks (RBFNNs) are respectively used as an approximator for the unmodeled term and a compensator for the difference between the actual control input with magnitude constraint and nominal control. To improve the chattering induced by the traditional sliding mode control and guarantee the reachability of the system, a specific saturation function with dynamic boundary layer is proposed to replace the sign function in the preceding control law. Through the Lyapunov approach, the reachability condition of the control system is given. The improved control law can guarantee the system state move within a gradually shrinking quasi-sliding mode band. Numerical simulation results demonstrate the effectiveness of the proposed control strategy.

  14. UNIVERSAL APPROXIMATION WITH NON-SIGMOID HIDDEN LAYER ACTIVATION FUNCTIONS BY USING ARTIFICIAL NEURAL NETWORK MODELING

    Directory of Open Access Journals (Sweden)

    R. Murugadoss

    2014-10-01

    Full Text Available Neural networks are modeled on the way the human brain. They are capable of learning and can automatically recognize by skillfully training and design complex relationships and hidden dependencies based on historical example patterns and use this information for forecasting. The main difference, and at the same time is biggest advantage of the model of neural networks over statistical techniques seen that the forecaster the exact functional structure between input and Output variables need not be specified, but this by the system with certain Learning algorithms is "learned" using a kind of threshold logic. Goal of the learning procedure is to define the training phase while those parameters of the network, with Help the network has one of those adequate for the problem behavior. Mathematically, the training phase is an iterative, converging towards a minimum error value process. They identify the processors of the network, minimize the "total error". The currently the most popular and most widely for business applications algorithm is the backpropagation algorithm. This paper opens the black box of Backpropagation networks and makes the optimization process in the network over time and locally comprehensible.

  15. Current and future niche of North and Central American sand flies (Diptera: psychodidae in climate change scenarios.

    Directory of Open Access Journals (Sweden)

    David Moo-Llanes

    Full Text Available Ecological niche models are useful tools to infer potential spatial and temporal distributions in vector species and to measure epidemiological risk for infectious diseases such as the Leishmaniases. The ecological niche of 28 North and Central American sand fly species, including those with epidemiological relevance, can be used to analyze the vector's ecology and its association with transmission risk, and plan integrated regional vector surveillance and control programs. In this study, we model the environmental requirements of the principal North and Central American phlebotomine species and analyze three niche characteristics over future climate change scenarios: i potential change in niche breadth, ii direction and magnitude of niche centroid shifts, iii shifts in elevation range. Niche identity between confirmed or incriminated Leishmania vector sand flies in Mexico, and human cases were analyzed. Niche models were constructed using sand fly occurrence datapoints from Canada, USA, Mexico, Guatemala and Belize. Nine non-correlated bioclimatic and four topographic data layers were used as niche components using GARP in OpenModeller. Both B2 and A2 climate change scenarios were used with two general circulation models for each scenario (CSIRO and HadCM3, for 2020, 2050 and 2080. There was an increase in niche breadth to 2080 in both scenarios for all species with the exception of Lutzomyia vexator. The principal direction of niche centroid displacement was to the northwest (64%, while the elevation range decreased greatest for tropical, and least for broad-range species. Lutzomyia cruciata is the only epidemiologically important species with high niche identity with that of Leishmania spp. in Mexico. Continued landscape modification in future climate change will provide an increased opportunity for the geographic expansion of NCA sand flys' ENM and human exposure to vectors of Leishmaniases.

  16. Current and future niche of North and Central American sand flies (Diptera: psychodidae) in climate change scenarios.

    Science.gov (United States)

    Moo-Llanes, David; Ibarra-Cerdeña, Carlos N; Rebollar-Téllez, Eduardo A; Ibáñez-Bernal, Sergio; González, Camila; Ramsey, Janine M

    2013-01-01

    Ecological niche models are useful tools to infer potential spatial and temporal distributions in vector species and to measure epidemiological risk for infectious diseases such as the Leishmaniases. The ecological niche of 28 North and Central American sand fly species, including those with epidemiological relevance, can be used to analyze the vector's ecology and its association with transmission risk, and plan integrated regional vector surveillance and control programs. In this study, we model the environmental requirements of the principal North and Central American phlebotomine species and analyze three niche characteristics over future climate change scenarios: i) potential change in niche breadth, ii) direction and magnitude of niche centroid shifts, iii) shifts in elevation range. Niche identity between confirmed or incriminated Leishmania vector sand flies in Mexico, and human cases were analyzed. Niche models were constructed using sand fly occurrence datapoints from Canada, USA, Mexico, Guatemala and Belize. Nine non-correlated bioclimatic and four topographic data layers were used as niche components using GARP in OpenModeller. Both B2 and A2 climate change scenarios were used with two general circulation models for each scenario (CSIRO and HadCM3), for 2020, 2050 and 2080. There was an increase in niche breadth to 2080 in both scenarios for all species with the exception of Lutzomyia vexator. The principal direction of niche centroid displacement was to the northwest (64%), while the elevation range decreased greatest for tropical, and least for broad-range species. Lutzomyia cruciata is the only epidemiologically important species with high niche identity with that of Leishmania spp. in Mexico. Continued landscape modification in future climate change will provide an increased opportunity for the geographic expansion of NCA sand flys' ENM and human exposure to vectors of Leishmaniases.

  17. Current and Future Niche of North and Central American Sand Flies (Diptera: Psychodidae) in Climate Change Scenarios

    Science.gov (United States)

    Moo-Llanes, David; Ibarra-Cerdeña, Carlos N.; Rebollar-Téllez, Eduardo A.; Ibáñez-Bernal, Sergio; González, Camila; Ramsey, Janine M.

    2013-01-01

    Ecological niche models are useful tools to infer potential spatial and temporal distributions in vector species and to measure epidemiological risk for infectious diseases such as the Leishmaniases. The ecological niche of 28 North and Central American sand fly species, including those with epidemiological relevance, can be used to analyze the vector's ecology and its association with transmission risk, and plan integrated regional vector surveillance and control programs. In this study, we model the environmental requirements of the principal North and Central American phlebotomine species and analyze three niche characteristics over future climate change scenarios: i) potential change in niche breadth, ii) direction and magnitude of niche centroid shifts, iii) shifts in elevation range. Niche identity between confirmed or incriminated Leishmania vector sand flies in Mexico, and human cases were analyzed. Niche models were constructed using sand fly occurrence datapoints from Canada, USA, Mexico, Guatemala and Belize. Nine non-correlated bioclimatic and four topographic data layers were used as niche components using GARP in OpenModeller. Both B2 and A2 climate change scenarios were used with two general circulation models for each scenario (CSIRO and HadCM3), for 2020, 2050 and 2080. There was an increase in niche breadth to 2080 in both scenarios for all species with the exception of Lutzomyia vexator. The principal direction of niche centroid displacement was to the northwest (64%), while the elevation range decreased greatest for tropical, and least for broad-range species. Lutzomyia cruciata is the only epidemiologically important species with high niche identity with that of Leishmania spp. in Mexico. Continued landscape modification in future climate change will provide an increased opportunity for the geographic expansion of NCA sand flys' ENM and human exposure to vectors of Leishmaniases. PMID:24069478

  18. Cross-layer resource allocation for QoS guarantee with finite queue constraint in multirate OFDMA wireless networks

    Institute of Scientific and Technical Information of China (English)

    XU Hai-bo; TIAN Hui; FENG Yuan

    2008-01-01

    Efficient radio resource allocation is essential to provide quality of service (QoS) for wireless networks. In this article, a cross-layer resource allocation scheme is presented with the objective of maximizing system throughput, while providing guaranteed QoS for users. With the assumption of a finite queue for arrival packets, the proposed scheme dynamically allocates radio resources based on user's channel characteristic and QoS metrics derived from a queuing model, which considers a packet arrival process modeled by discrete Markov modulated Poisson process (dMMPP), and a multirate transmission scheme achieved through adaptive modulation. The cross-layer resource allocation scheme operates over two steps. Specifically, the amount of bandwidth allocated to each user is first derived from a queuing analytical model, and then the algorithm finds the best subcarrier assignment for users. Simulation results show that the proposed scheme maximizes the system throughput while guaranteeing QoS for users.

  19. A Reinforcement Learning Algorithm Using Multi-Layer Artificial Neural Networks for Semi-Markov Decision Problems

    Directory of Open Access Journals (Sweden)

    Mustafa Ahmet Beyazıt Ocaktan

    2013-06-01

    Full Text Available Real life problems are generally large-scale and difficult to model. Therefore, these problems can't be mostly solved by classical optimisation methods. This paper presents a reinforcement learning algorithm using a multi-layer artificial neural network to find an approximate solution for large-scale semi Markov decision problems. Performance of the developed algorithm is measured and compared to the classical reinforcement algorithm on a small-scale numerical example. According to results of numerical examples, a number of hidden layer are the key success factors, and average cost of the solution generated by the developed algorithm is approximately equal to that generated by the classical reinforcement algorithm.

  20. Cross Layer QoS Support Architecture with Integrated CAC and Scheduling Algorithms for WiMAX BWA Networks

    CERN Document Server

    Chowdhury, Prasun; Sanyal, Salil K

    2012-01-01

    In this paper, a new technique for cross layer design, based on present Eb/N0 (bit energy per noise density) ratio of the connections and target values of the Quality of Service (QoS) information parameters from MAC layer, is proposed to dynamically select the Modulation and Coding Scheme (MCS) at the PHY layer for WiMAX Broadband Wireless Access (BWA) networks. The QoS information parameter includes New Connection Blocking Probability (NCBP), Hand off Connection Dropping Probability (HCDP) and Connection Outage Probability (COP). In addition, a Signal to Interference plus Noise Ratio (SINR) based Call Admission Control (CAC) algorithm and Queue based Scheduling algorithm are integrated for the cross layer design. An analytical model using the Continuous Time Markov Chain (CTMC) is developed for performance evaluation of the algorithms under various MCS. The effect of Eb/No is observed for QoS information parameters in order to determine its optimum range. Simulation results show that the integrated CAC and p...

  1. Identification model of multi-layered neural network parameters and its applications in the petroleum production

    Institute of Scientific and Technical Information of China (English)

    Liu Ranbing; Liu Leiming; Zhang Faqiang; Li Changhua

    2008-01-01

    This paper creates a LM (Levenberg-Marquardt) algorithm model which is appropriate to solve the problem a-bout weights value of feedforward neural network. On the base of this model, we provide two applications in the oilfield production. Firstly, we simulated the functional relationships between the petrophysical and electrical properties of the rock by neural networks model, and studied oil saturation. Under the precision of data is confirmed, this method can re-duce the number of experiments. Secondly, we simulated the relationships between investment and income by the neural networks model, and studied invest saturation point and income growth rate. It is very significant to guide the investment decision. The research result shows that the model is suitable for the modeling and identification of nonlinear systems due to the great fit characteristic of neural network and very fast convergence speed of LM algorithm.

  2. Master stability functions reveal diffusion-driven instabilities in multi-layer networks

    CERN Document Server

    Brechtel, Andreas; Ritterskamp, Daniel; Drossel, Barbara; Gross, Thilo

    2016-01-01

    Many systems in science and technology can be described as multilayer networks, which are known to exhibit phenomena such as catastrophic failure cascades and pattern-forming instabilities. A particular class of multilayer networks describes systems where different interacting copies of a local network exist in different spatial locations, including for instance regulatory and metabolic networks of identical cells and interacting habitats of ecological populations. Here, we show that such systems can be analyzed by a master stability function (MSF) approach, which reveals conditions for diffusion-driven instabilities (DDIs). We demonstrate the methodology on the example of state-of-the-art meta-foodweb models, where it reveals diffusion-driven instabilities that lead to localized dynamics and spatial patterns. This type of approach can be applied to a variety of systems from nature, science and engineering to aid the understanding and design of complex self-organizing systems.

  3. Robust, Multi-layered Plan Execution and Revision for Operation of a Network of Communication Antennas

    Science.gov (United States)

    Chien, S. A.; Hill, R. W., Jr.; Govindjee, A.; Wang, X.; Estlin, T.; Griesel, M. A.; Lam, R.; Fayyad, K. V.

    1996-01-01

    This paper describes a hierarchical scheduling, planning, control, and execution monitoring architecture for automating operations of a worldwide network of communications antennas. The purpose of this paper is to describe an architecture for automating the process of capturing spacecraft data.

  4. Predicting Subsurface Soil Layering and Landslide Risk with Artificial Neural Networks

    DEFF Research Database (Denmark)

    Farrokhzad, Farzad; Barari, Amin; Ibsen, Lars Bo

    2011-01-01

    the investigation of study area. The quality of the modeling is further improved by the application of some controlling techniques involved in ANN. Based on the obtained results and considering that the test data were not presented to the network in the training process, it can be stated that the trained neural...... networks are capable of predicting variations in the soil profile and assessing the landslide hazard with an acceptable level of confidence....

  5. LMEEC: Layered Multi-Hop Energy Efficient Cluster-based Routing Protocol for Wireless Sensor Networks

    CERN Document Server

    Khelifi, Manel

    2012-01-01

    In this paper, we propose LMEEC, a cluster-based rout- ing protocol with low energy consumption for wireless sensor networks. Our protocol is based on a strategy which aims to provide a more equitable exploitation of the selected nodes (cluster-heads) energy. Simulation results show the effective- ness of LMEEC in decreasing the energy consumption, and in prolonging the network lifetime, compared to LEACH.

  6. Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks

    OpenAIRE

    Ramsey, Benjamin; Mullins, Barry

    2013-01-01

    Part 2: Control Systems Security; International audience; ZigBee networks are integrating rapidly into critical infrastructures such as the smart grid and public health centers. Numerous ZigBee-based smart meters have been installed in metropolitan areas and hospitals commonly employ ZigBee technology for patient and equipment monitoring. The associated ZigBee networks transport sensitive information and must be secured against exfiltration and denial-of-service attacks. Indeed, novel tools t...

  7. Cross layer optimization for cloud-based radio over optical fiber networks

    Science.gov (United States)

    Shao, Sujie; Guo, Shaoyong; Qiu, Xuesong; Yang, Hui; Meng, Luoming

    2016-07-01

    To adapt the 5G communication, the cloud radio access network is a paradigm introduced by operators which aggregates all base stations computational resources into a cloud BBU pool. The interaction between RRH and BBU or resource schedule among BBUs in cloud have become more frequent and complex with the development of system scale and user requirement. It can promote the networking demand among RRHs and BBUs, and force to form elastic optical fiber switching and networking. In such network, multiple stratum resources of radio, optical and BBU processing unit have interweaved with each other. In this paper, we propose a novel multiple stratum optimization (MSO) architecture for cloud-based radio over optical fiber networks (C-RoFN) with software defined networking. Additionally, a global evaluation strategy (GES) is introduced in the proposed architecture. MSO can enhance the responsiveness to end-to-end user demands and globally optimize radio frequency, optical spectrum and BBU processing resources effectively to maximize radio coverage. The feasibility and efficiency of the proposed architecture with GES strategy are experimentally verified on OpenFlow-enabled testbed in terms of resource occupation and path provisioning latency.

  8. Cross Layer Analysis of P2MP Hybrid FSO/RF Network

    KAUST Repository

    Rakia, Tamer

    2017-02-22

    This paper presents and analyzes a point-tomultipoint (P2MP) network that uses a number of freespace optical (FSO) links for data transmission from the central node to the different remote nodes of the network. A common backup radio frequency (RF) link can be used by the central node for data transmission to any remote node in case any one of the FSO links fails. Each remote node is assigned a transmit buffer at the central node. Considering the transmission link from the central node to a tagged remote node, we study various performance metrics. Specifically,we study the throughput from the central node to the tagged node, the average transmit buffer size, the symbol queuing delay in the transmit buffer, the efficiency of the queuing system, the symbol loss probability, and the RF link utilization. Numerical examples are presented to compare the performance of the proposed P2MP hybrid FSO/RF network with that of a P2MP FSO-only network and show that the P2MP hybrid FSO/RF network achieves considerable performance improvement over the P2MP FSO-only network.

  9. Distributed beamforming designs to improve physical layer security in wireless relay networks

    Science.gov (United States)

    Qian, Mujun; Liu, Chen; Fu, Youhua

    2014-12-01

    This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.

  10. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  11. Niching method using clustering crowding

    Institute of Scientific and Technical Information of China (English)

    GUO Guan-qi; GUI Wei-hua; WU Min; YU Shou-yi

    2005-01-01

    This study analyzes drift phenomena of deterministic crowding and probabilistic crowding by using equivalence class model and expectation proportion equations. It is proved that the replacement errors of deterministic crowding cause the population converging to a single individual, thus resulting in premature stagnation or losing optional optima. And probabilistic crowding can maintain equilibrium multiple subpopulations as the population size is adequate large. An improved niching method using clustering crowding is proposed. By analyzing topology of fitness landscape using hill valley function and extending the search space for similarity analysis, clustering crowding determines the locality of search space more accurately, thus greatly decreasing replacement errors of crowding. The integration of deterministic and probabilistic replacement increases the capacity of both parallel local hill climbing and maintaining multiple subpopulations. The experimental results optimizing various multimodal functions show that,the performances of clustering crowding, such as the number of effective peaks maintained, average peak ratio and global optimum ratio are uniformly superior to those of the evolutionary algorithms using fitness sharing, simple deterministic crowding and probabilistic crowding.

  12. Embryonic anti-aging niche.

    Science.gov (United States)

    Conboy, Irina M; Yousef, Hanadie; Conboy, Michael J

    2011-05-01

    Although functional organ stem cells persist in the old, tissue damage invariably overwhelms tissue repair, ultimately causing the demise of an organism. The poor performance of stem cells in an aged organ, such as skeletal muscle, is caused by the changes in regulatory pathways such as Notch, MAPK and TGF-β, where old differentiated tissue actually inhibits its own regeneration. This perspective analyzes the current literature on regulation of organ stem cells by their young versus old niches and suggests that determinants of healthy and prolonged life might be under a combinatorial control of cell cycle check point proteins and mitogens, which need to be tightly balanced in order to promote tissue regeneration without tumor formation. While responses of adult stem cells are regulated extrinsically and age-specifically, we put forward experimental evidence suggesting that embryonic cells have an intrinsic youthful barrier to aging and produce soluble pro-regenerative proteins that signal the MAPK pathway for rejuvenating myogenesis. Future identification of this activity will improve our understanding of embryonic versus adult regulation of tissue regeneration suggesting novel strategies for organ rejuvenation. Comprehensively, the current intersection of aging and stem cell science indicates that if the age-imposed decline in the regenerative capacity of stem cells was understood, the debilitating lack of organ maintenance in the old could be ameliorated and perhaps, even reversed.

  13. Layers of epistasis: genome-wide regulatory networks and network approaches to genome-wide association studies

    Science.gov (United States)

    Cowper-Sal·lari, Richard; Cole, Michael D.; Karagas, Margaret R.; Lupien, Mathieu; Moore, Jason H.

    2010-01-01

    The conceptual foundation of the genome-wide association study (GWAS) has advanced unchecked since its conception. A revision might seem premature as the potential of GWAS has not been fully realized. Multiple technical and practical limitations need to be overcome before GWAS can be fairly criticized. But with the completion of hundreds of studies and a deeper understanding of the genetic architecture of disease, warnings are being raised. The results compiled to date indicate that risk-associated variants lie predominantly in non-coding regions of the genome. Additionally, alternative methodologies are uncovering large and heterogeneous sets of rare variants underlying disease. The fear is that, even in its fulfilment, the current GWAS paradigm might be incapable of dissecting all kinds of phenotypes. In the following text we review several initiatives that aim to overcome these limitations. The overarching theme of these studies is the inclusion of biological knowledge to both the analysis and interpretation of genotyping data. GWAS is uninformed of biology by design and although there is some virtue in its simplicity it is also its most conspicuous deficiency. We propose a framework in which to integrate these novel approaches, both empirical and theoretical, in the form of a genome-wide regulatory network (GWRN). By processing experimental data into networks, emerging data types based on chromatin-immunoprecipitation are made computationally tractable. This will give GWAS re-analysis efforts the most current and relevant substrates, and root them firmly on our knowledge of human disease. PMID:21197657

  14. Meta-food-chains as a many-layer epidemic process on networks

    Science.gov (United States)

    Barter, Edmund; Gross, Thilo

    2016-02-01

    Notable recent works have focused on the multilayer properties of coevolving diseases. We point out that very similar systems play an important role in population ecology. Specifically we study a meta-food-web model that was recently proposed by Pillai et al. [Theor. Ecol. 3, 223 (2009), 10.1007/s12080-009-0065-1]. This model describes a network of species connected by feeding interactions, which spread over a network of spatial patches. Focusing on the essential case, where the network of feeding interactions is a chain, we develop an analytical approach for the computation of the degree distributions of colonized spatial patches for the different species in the chain. This framework allows us to address ecologically relevant questions. Considering configuration model ensembles of spatial networks, we find that there is an upper bound for the fraction of patches that a given species can occupy, which depends only on the networks mean degree. For a given mean degree there is then an optimal degree distribution that comes closest to the upper bound. Notably scale-free degree distributions perform worse than more homogeneous degree distributions if the mean degree is sufficiently high. Because species experience the underlying network differently the optimal degree distribution for one particular species is generally not the optimal distribution for the other species in the same food web. These results are of interest for conservation ecology, where, for instance, the task of selecting areas of old-growth forest to preserve in an agricultural landscape, amounts to the design of a patch network.

  15. Human niche construction in interdisciplinary focus.

    Science.gov (United States)

    Kendal, Jeremy; Tehrani, Jamshid J; Odling-Smee, John

    2011-03-27

    Niche construction is an endogenous causal process in evolution, reciprocal to the causal process of natural selection. It works by adding ecological inheritance, comprising the inheritance of natural selection pressures previously modified by niche construction, to genetic inheritance in evolution. Human niche construction modifies selection pressures in environments in ways that affect both human evolution, and the evolution of other species. Human ecological inheritance is exceptionally potent because it includes the social transmission and inheritance of cultural knowledge, and material culture. Human genetic inheritance in combination with human cultural inheritance thus provides a basis for gene-culture coevolution, and multivariate dynamics in cultural evolution. Niche construction theory potentially integrates the biological and social aspects of the human sciences. We elaborate on these processes, and provide brief introductions to each of the papers published in this theme issue.

  16. Assisted living captures profitable market niche.

    Science.gov (United States)

    Pallarito, K

    1995-05-08

    The $15 billion assisted-living industry has captured a profitable market niche and created a star on Wall Street. Sunrise Retirement Home of Falls Church (Va.), right, is a facility of the nation's largest assisted-living provider.

  17. CROSS DRIFT ALCOVE/NICHE UTILITIES ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    S. Goodin

    1999-07-08

    The purpose of this analysis is to provide the design basis and general arrangement requirements of the non-potable water, waste water, compressed air and ventilation (post excavation) utilities required in support of the Cross Drift alcoves and niches.

  18. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  19. A cross-layer design approach on spectrum allocation and resource scheduling in cognitive PMP networks

    Institute of Scientific and Technical Information of China (English)

    Jie CHEN; Min-jian ZHAO; Qiao ZHOU; Shi-ju LI

    2008-01-01

    We propose the spectrum allocation and resource scheduling algorithms in cognitive point to multipoint (PMP)networks with rapid changes of spectrum opportunities and present a media access control (MAC) protocol based on these algorithms. The objective of spectrum allocation is to make efficient use of the spectrum while maintaining the transceiver synchronization on frequency and time in the network. The objective of resource scheduling is to guarantee the quality of service (QoS)requirements of different kinds of connections and to minimize the total energy consumption in the network as well. By sensing only a small set of possible channels in each slot based on the state transition probability of each channel, our spectrum allocation algorithm achieves high spectrum efficiency in the network. The resource scheduling problem is divided into three sub problems and we derive optimal solutions to these problems by greedy algorithm and convex optimization. The simulation results show that our algorithm can make efficient use of the spectrum and the network resources at a cost of low computational complexity.

  20. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  1. Research survey on physical layer network coding%物理层网络编码研究进展

    Institute of Scientific and Technical Information of China (English)

    赵明峰; 周亚建; 原泉; 杨义先

    2011-01-01

    It has been proved that Physical Layer Network Coding (PLNC) can also improve the system throughput and spectral efficiency by taking the advantage of the broadcast nature of electromagnetic waves in wireless cooperative environments. In this paper, the basic idea of the PLNC was introduced and its benefit over traditional forward and straightforward network coding under the two-way relay scenario was illustrated. Firstly, three types of physical layer network coding-Physical Network Coding over Finite Field (PNCF), Analog Network Coding (ANC) and Complex Field Network Coding (CFNC) were presented, the theory research development of the three kinds of PLNC were overviewed and new theory and technology related to it were introduced. Secondly, the application and implementation for the ANC scheme in the real wireless cooperative environments were overviewed. Finally, the opening issues and challenges for PLNC concerning both theory and implementation in near future were proposed. It is an important trend to improve the theory and implementation of PLNC, research the security of PLNC, and combine PLNC with other technologies, such as channel coding and modulation,relay choice, effective scheduling and resource allocation.%在无线协作环境下,充分利用无线电磁波的广播特性进行物理层网络编码(PLNC)可获得更大的吞吐量和频谱利用率.在物理层网络编码基本思想的基础上,首先着重介绍三类物理层网络编码技术--有限域上的物理层网络编码、模拟网络编码和复数域上的网络编码,给出它们相关理论的研究现状,并对与此相结合的新技术进行了介绍;然后论述目前物理层网络编码应用实现的现状;最后对物理层网络编码相关理论及其应用实现的发展趋势进行了分析与展望.物理层网络编码理论的进一步完善,相关安全性的研究,以及与协作通信理论,如信道编码与调制、中继选择、调度及资源分配等进一

  2. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  3. Three-dimensional Organization of Layered Apical Cytoskeletal Networks Associated with Mouse Airway Tissue Development

    Science.gov (United States)

    Tateishi, Kazuhiro; Nishida, Tomoki; Inoue, Kanako; Tsukita, Sachiko

    2017-03-01

    The cytoskeleton is an essential cellular component that enables various sophisticated functions of epithelial cells by forming specialized subcellular compartments. However, the functional and structural roles of cytoskeletons in subcellular compartmentalization are still not fully understood. Here we identified a novel network structure consisting of actin filaments, intermediate filaments, and microtubules directly beneath the apical membrane in mouse airway multiciliated cells and in cultured epithelial cells. Three-dimensional imaging by ultra-high voltage electron microscopy and immunofluorescence revealed that the morphological features of each network depended on the cell type and were spatiotemporally integrated in association with tissue development. Detailed analyses using Odf2 mutant mice, which lack ciliary basal feet and apical microtubules, suggested a novel contribution of the intermediate filaments to coordinated ciliary beating. These findings provide a new perspective for viewing epithelial cell differentiation and tissue morphogenesis through the structure and function of apical cytoskeletal networks.

  4. Conformal organic-inorganic hybrid network polymer thin films by molecular layer deposition using trimethylaluminum and glycidol.

    Science.gov (United States)

    Gong, Bo; Peng, Qing; Parsons, Gregory N

    2011-05-19

    Growing interest in nanoscale organic-inorganic hybrid network polymer materials is driving exploration of new bulk and thin film synthesis reaction mechanisms. Molecular layer deposition (MLD) is a vapor-phase deposition process, based on atomic layer deposition (ALD) which proceeds by exposing a surface to an alternating sequence of two or more reactant species, where each surface half-reaction goes to completion before the next reactant exposure. This work describes film growth using trimethyl aluminum and heterobifunctional glycidol at moderate temperatures (90-150 °C), producing a relatively stable organic-inorganic network polymer of the form (-Al-O-(C(4)H(8))-O-)(n). Film growth rate and in situ reaction analysis indicate that film growth does not initially follow a steady-state rate, but increases rapidly during early film growth. The mechanism is consistent with subsurface species transport and trapping, previously documented during MLD and ALD on polymers. A water exposure step after the TMA produces a more linear growth rate, likely by blocking TMA subsurface diffusion. Uniform and conformal films are formed on complex nonplanar substrates. Upon postdeposition annealing, films transform into microporous metal oxides with ∼5 Å pore size and surface area as high as ∼327 m(2)/g, and the resulting structures duplicate the shape of the original substrate. These hybrid films and porous materials could find uses in several research fields including gas separations and diffusion barriers, biomedical scaffolds, high surface area coatings, and others.

  5. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  6. Observations of Mixing Layer Heights from the Micropulse Lidar Network and Potential Implications for Regional and Global Models

    Science.gov (United States)

    Lewis, J. R.; Welton, E. J.; Hegarty, J. D.; Henderson, J.; McGrath-Spangler, E. L.; Scarino, A. J.; Berkoff, T.; Ferrare, R. A.; Stewart, S. A.; DeCola, P.

    2016-12-01

    Long-term, continuous measurements of the planetary boundary layer (PBL) height are rare, but necessary to ascertain its seasonal and diurnal changes. Autonomous ground-based lidar measurements from the NASA Micropulse Lidar Network (MPLNET) have the potential to contribute to our current knowledge of the PBL. MPLNET is a global network of micropulse lidars which has operated for over 16 years using a standard instrument and suite of processing algorithms. In this work, we investigate the daytime mixing layer height (MLH) determined from aerosol backscatter profiles using the wavelet covariance transform and a fuzzy-logic scheme. First, we evaluate simulations from the Weather Research and Forecasting (WRF) Model in the Washington D.C. - Baltimore, MD urban corridor during the July 2011 DISCOVER-AQ field campaign. In addition to MPLNET data, this field campaign utilizes data from field-deployed mini-Micropulse lidars, the CALIPSO satellite, and the NASA Langley Airborne High-Spectral Resolution Lidar. Next, we show a multi-year, multi-site comparison of MPLNET retrievals to PBL heights retrieved from the Modern-Era Retrospective analysis for Research and Applications, Version 2 (MERRA-2). We discuss differences between the modeled and observed quantities and the potential for future research.

  7. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Science.gov (United States)

    Hughes, Laurie; Wang, Xinheng; Chen, Tao

    2012-01-01

    The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN) integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient's own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring. PMID:23202185

  8. Power-Aware Multi-Layer Translucent Network Design: an Integrated OPEX/CAPEX Analysis

    DEFF Research Database (Denmark)

    Saldaña Cercos, Silvia; Resendo, Leandro C.; Ribeiro, Moisés R. N.;

    2014-01-01

    We propose a three-phase network design model minimizing CAPEX and OPEX in IP-over-WDM architectures. By forbidding reconfiguration (accounting for 58\\% of the OPEX) we achieve only 4.2\\% increase in power consumption at no CAPEX expenses.......We propose a three-phase network design model minimizing CAPEX and OPEX in IP-over-WDM architectures. By forbidding reconfiguration (accounting for 58\\% of the OPEX) we achieve only 4.2\\% increase in power consumption at no CAPEX expenses....

  9. Founder niche constrains evolutionary adaptive radiation.

    Science.gov (United States)

    Flohr, Régis C E; Blom, Carsten J; Rainey, Paul B; Beaumont, Hubertus J E

    2013-12-17

    Adaptive radiation of a lineage into a range of organisms with different niches underpins the evolution of life's diversity. Although the role of the environment in shaping adaptive radiation is well established, theory predicts that the evolvability and niche of the founding ancestor are also of importance. Direct demonstration of a causal link requires resolving the independent effects of these additional factors. Here, we accomplish this using experimental bacterial populations and demonstrate how the dynamics of adaptive radiation are constrained by the niche of the founder. We manipulated the propensity of the founder to undergo adaptive radiation and resolved the underlying causal changes in both its evolvability and niche. Evolvability did not change, but the propensity for adaptive radiation was altered by changes in the position and breadth of the niche of the founder. These observations provide direct empirical evidence for a link between the niche of organisms and their propensity for adaptive radiation. This general mechanism may have rendered the evolutionary dynamics of extant adaptive radiations dependent on chance events that determined their founding ancestors.

  10. Isotopic niches support the resource breadth hypothesis

    Science.gov (United States)

    Rader, Jonathan A.; Newsome, Seth D.; Sabat, Pablo; Chesser, R. Terry; Dillon, Michael E.; Martinez del Rio, Carlos

    2017-01-01

    Because a broad spectrum of resource use allows species to persist in a wide range of habitat types, and thus permits them to occupy large geographical areas, and because broadly distributed species have access to more diverse resource bases, the resource breadth hypothesis posits that the diversity of resources used by organisms should be positively related with the extent of their geographic ranges.We investigated isotopic niche width in a small radiation of South American birds in the genus Cinclodes. We analysed feathers of 12 species of Cinclodes to test the isotopic version of the resource breadth hypothesis and to examine the correlation between isotopic niche breadth and morphology.We found a positive correlation between the widths of hydrogen and oxygen isotopic niches (which estimate breadth of elevational range) and widths of the carbon and nitrogen isotopic niches (which estimates the diversity of resources consumed, and hence of habitats used). We also found a positive correlation between broad isotopic niches and wing morphology.Our study not only supports the resource breadth hypothesis but it also highlights the usefulness of stable isotope analyses as tools in the exploration of ecological niches. It is an example of a macroecological application of stable isotopes. It also illustrates the importance of scientific collections in ecological studies.

  11. Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Summerhill, Richard

    2009-08-14

    There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

  12. The layered sensing operations center: a modeling and simulation approach to developing complex ISR networks

    Science.gov (United States)

    Curtis, Christopher; Lenzo, Matthew; McClure, Matthew; Preiss, Bruce

    2010-04-01

    In order to anticipate the constantly changing landscape of global warfare, the United States Air Force must acquire new capabilities in the field of Intelligence, Surveillance, and Reconnaissance (ISR). To meet this challenge, the Air Force Research Laboratory (AFRL) is developing a unifying construct of "Layered Sensing" which will provide military decision-makers at all levels with the timely, actionable, and trusted information necessary for complete battlespace awareness. Layered Sensing is characterized by the appropriate combination of sensors and platforms (including those for persistent sensing), infrastructure, and exploitation capabilities to enable this synergistic awareness. To achieve the Layered Sensing vision, AFRL is pursuing a Modeling & Simulation (M&S) strategy through the Layered Sensing Operations Center (LSOC). An experimental ISR system-of-systems test-bed, the LSOC integrates DoD standard simulation tools with commercial, off-the-shelf video game technology for rapid scenario development and visualization. These tools will help facilitate sensor management performance characterization, system development, and operator behavioral analysis. Flexible and cost-effective, the LSOC will implement a non-proprietary, open-architecture framework with well-defined interfaces. This framework will incentivize the transition of current ISR performance models to service-oriented software design for maximum re-use and consistency. This paper will present the LSOC's development and implementation thus far as well as a summary of lessons learned and future plans for the LSOC.

  13. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Law, Y.W.; van Hoesel, L.F.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.; Atluri, V.; Samarati, P.; Ning, P.; Du, W.

    2005-01-01

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the

  14. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Law, Y.W.; Palaniswami, M; van Hoesel, L.F.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the

  15. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Law, Y.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help to prevent the jammer from taking actions based on the content of the

  16. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

    NARCIS (Netherlands)

    Law, Yee Wei; Hoesel, van Lodewijk; Doumen, Jeroen; Hartel, Pieter; Havinga, Paul

    2005-01-01

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energyefficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the packet

  17. A Cross-Layer Approach to Multi-Hop Networking with Cognitive Radios

    Science.gov (United States)

    2008-11-01

    recent investigations. In [2], Behzad and Rubin studied the special case that the same power level are used at each node and found that the maximum...Sep. 2, 2005. [2] A. Behzad and I. Rubin, “Impact of power control on the performance of ad hoc wireless networks,” in Proc. IEEE Infocom, pp. 102–113

  18. Bottom-up GGM algorithm for constructing multiple layered hierarchical gene regulatory networks

    Science.gov (United States)

    Multilayered hierarchical gene regulatory networks (ML-hGRNs) are very important for understanding genetics regulation of biological pathways. However, there are currently no computational algorithms available for directly building ML-hGRNs that regulate biological pathways. A bottom-up graphic Gaus...

  19. Cross-Layer Design Approach for Wireless Networks to Improve the Performance POSTPRINT)

    Science.gov (United States)

    2010-06-01

    Restrictions apply. 5 Non-contiguous MC- CDMA and Noncontiguous CI/MC- CDMA for Dynamic Spectrum Access”, CROWNCOM 2008, Dec 1-4. [18] J. Park, K...Networks, DSN 2008, November 16 – 18, 2008, Orlando, Florida, USA. 557 Authorized licensed use limited to: AFRL Technical Library. Downloaded on

  20. Precision requirements for single-layer feed-forward neural networks

    NARCIS (Netherlands)

    Annema, Anne J.; Hoen, K.; Hoen, Klaas; Wallinga, Hans

    1994-01-01

    This paper presents a mathematical analysis of the effect of limited precision analog hardware for weight adaptation to be used in on-chip learning feedforward neural networks. Easy-to-read equations and simple worst-case estimations for the maximum tolerable imprecision are presented. As an

  1. Bottom-Up Abstract Modelling of Optical Networks-on-Chip: From Physical to Architectural Layer

    Directory of Open Access Journals (Sweden)

    Alberto Parini

    2012-01-01

    Full Text Available This work presents a bottom-up abstraction procedure based on the design-flow FDTD + SystemC suitable for the modelling of optical Networks-on-Chip. In this procedure, a complex network is decomposed into elementary switching elements whose input-output behavior is described by means of scattering parameters models. The parameters of each elementary block are then determined through 2D-FDTD simulation, and the resulting analytical models are exported within functional blocks in SystemC environment. The inherent modularity and scalability of the S-matrix formalism are preserved inside SystemC, thus allowing the incremental composition and successive characterization of complex topologies typically out of reach for full-vectorial electromagnetic simulators. The consistency of the outlined approach is verified, in the first instance, by performing a SystemC analysis of a four-input, four-output ports switch and making a comparison with the results of 2D-FDTD simulations of the same device. Finally, a further complex network encompassing 160 microrings is investigated, the losses over each routing path are calculated, and the minimum amount of power needed to guarantee an assigned BER is determined. This work is a basic step in the direction of an automatic technology-aware network-level simulation framework capable of assembling complex optical switching fabrics, while at the same time assessing the practical feasibility and effectiveness at the physical/technological level.

  2. Characterizing dust aerosols in the atmospheric boundary layer over the deserts in Northwest China: monitoring network and field observation

    Science.gov (United States)

    He, Q.; Matimin, A.; Yang, X.

    2016-12-01

    TheTaklimakan, Gurbantunggut and BadainJaran Deserts with the total area of 43.8×104 km2 in Northwest China are the major dust emission sources in Central Asia. Understanding Central Asian dust emissions and the interaction with the atmospheric boundary layer has an important implication for regional and global climate and environment changes. In order to explore these scientific issues, a monitoring network of 63 sites was established over the vast deserts (Taklimakan Desert, Gurbantunggut Desert and Badain Jaran Desert) in Northwest China for the comprehensive measurements of dust aerosol emission, transport and deposition as well as the atmospheric boundary layer including the meteorological parameters of boundary layer, surface radiation, surface heat fluxes, soil parameters, dust aerosol properties, water vapor profiles, and dust emission. Based on the monitoring network, the field experiments have been conducted to characterize dust aerosols and the atmospheric boundary layer over the deserts. The experiment observation indicated that depth of the convective boundary layer can reach 5000m on summer afternoons. In desert regions, the diurnal mean net radiation was effected significantly by dust weather, and sensible heat was much greater than latent heat accounting about 40-50% in the heat balance of desert. The surface soil and dust size distributions of Northwest China Deserts were obtained through widely collecting samples, results showed that the dominant dust particle size was PM100within 80m height, on average accounting for 60-80% of the samples, with 0.9-2.5% for PM0-2.5, 3.5-7.0% for PM0-10 and 5.0-14.0% for PM0-20. The time dust emission of Taklimakan Desert, Gurbantunggut Desert and Badain Jaran Desert accounted for 0.48%, 7.3%×10-5and 1.9% of the total time within a year, and the threshold friction velocity for dust emission were 0.22-1.06m/s, 0.29-1.5m/s and 0.21-0.59m/s, respectively.

  3. Internet Connection of a Broadband Wireless IP Network Based on a Fast Mobile IP Algorithm with Link Layer Support

    Institute of Scientific and Technical Information of China (English)

    XIONGYan; MIAOFuyou; HUABei; WANGXingfu

    2003-01-01

    Commercialized wireless LANs (local area networks) are emerging one after another. Because a lot of useful information and resources are residing in the wired network, Internet, the strong requirement to access In-ternet for mobile hosts in wireless LANs is growing more and more. In this paper, we simply describe the topoi-ogy and feature of a broadband wireless Internet protocol network (BWIPN) in which data transmitted on wireless link is encapsulated within Internet protocol (IP) packets.To connect to Internet, there is an Internet connecting server (ICS) which is also a router within every BWIPN.A fast mobile IP hand-offalgorithm with link layer supportto reduce handoff overhead has been proposed to providemobility support for wireless terminals (WTs, i.e. note-book computers) roaming among BWIPNs without chang-ing their IP addresses. An indirect TCP (transfer control protocol) scheme is used to improve the performance ofwireless TCP. To match data transmission rate on the wire-less link with that on the wired link, an adaptive wireless congestion control algorithms are added at IP layers in the WT and the ICS. Both performance analysis and experi-mental result have shown that the fast mobile IP hand-off algorithm reduces the hand-off delay by about 10 times and TCP disconnection times is reduced greatly, compared with the three known mobile IP hand-off algorithms. By our work, users on WTs can explore Internet using Web browser, File Transfer Protocol, Telnet and Ping utilities while moving among different BWIPNs very well.

  4. Secondary link adaptation in cognitive radio networks: End-to-end performance with cross-layer design

    KAUST Repository

    Ma, Hao

    2012-04-01

    Under spectrum-sharing constraints, we consider the secondary link exploiting cross-layer combining of adaptive modulation and coding (AMC) at the physical layer with truncated automatic repeat request (T-ARQ) at the data link layer in cognitive radio networks. Both, basic AMC and aggressive AMC, are adopted to optimize the overall average spectral efficiency, subject to the interference constraints imposed by the primary user of the shared spectrum band and a target packet loss rate. We achieve the optimal boundary points in closed form to choose the AMC transmission modes by taking into account the channel state information from the secondary transmitter to both the primary receiver and the secondary receiver. Moreover, numerical results substantiate that, without any cost in the transmitter/receiver design nor the end-to-end delay, the scheme with aggressive AMC outperforms that with conventional AMC. The main reason is that, with aggressive AMC, different transmission modes utilized in the initial packet transmission and the following retransmissions match the time-varying channel conditions better than the basic pattern. © 2012 IEEE.

  5. A Cross-Layer Delay-Aware Node Disjoint Multipath Routing Algorithm for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mahadev A. Gawas

    2014-09-01

    Full Text Available Mobile Ad Hoc Networks (MANETS require reliable routing and Quality of Service(QoS mechanism to support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop count as the main metric for path selection, hence are not suitable for delay sensitive real time applications. To support such applications delay constrained routing protocols are employed. These Protocols makes path selection between source and destination based on the delay over the discovered links during routing discovery and routing table calculations. We propose a variation of a node-disjoint Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV based on delay constraint. It employs cross-layer communications between MAC and routing layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay incurred at each intermediate node. Performance of the proposed protocol is compared with single path AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and reduced overhead between intermediate nodes.

  6. Cross-Layer Resource Scheduling for Video Traffic in the Downlink of OFDMA-Based Wireless 4G Networks

    Directory of Open Access Journals (Sweden)

    Wong WilliamK

    2009-01-01

    Full Text Available Designing scheduling algorithms at the medium access control (MAC layer relies on a variety of parameters including quality of service (QoS requirements, resource allocation mechanisms, and link qualities from the corresponding layers. In this paper, we present an efficient cross-layer scheduling scheme, namely, Adaptive Token Bank Fair Queuing (ATBFQ algorithm, which is designed for packet scheduling and resource allocation in the downlink of OFDMA-based wireless 4G networks. This algorithm focuses on the mechanisms of efficiency and fairness in multiuser frequency-selective fading environments. We propose an adaptive method for ATBFQ parameter selection which integrates packet scheduling with resource mapping. The performance of the proposed scheme is compared to that of the round-robin (RR and the score-based (SB schedulers. It is observed from simulation results that the proposed scheme with adaptive parameter selection provides enhanced performance in terms of queuing delay, packet dropping rate, and cell-edge user performance, while the total sector throughput remains comparable. We further analyze and compare achieved fairness of the schemes in terms of different fairness indices available in literature.

  7. Cross-Layer Resource Scheduling for Video Traffic in the Downlink of OFDMA-Based Wireless 4G Networks

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available Designing scheduling algorithms at the medium access control (MAC layer relies on a variety of parameters including quality of service (QoS requirements, resource allocation mechanisms, and link qualities from the corresponding layers. In this paper, we present an efficient cross-layer scheduling scheme, namely, Adaptive Token Bank Fair Queuing (ATBFQ algorithm, which is designed for packet scheduling and resource allocation in the downlink of OFDMA-based wireless 4G networks. This algorithm focuses on the mechanisms of efficiency and fairness in multiuser frequency-selective fading environments. We propose an adaptive method for ATBFQ parameter selection which integrates packet scheduling with resource mapping. The performance of the proposed scheme is compared to that of the round-robin (RR and the score-based (SB schedulers. It is observed from simulation results that the proposed scheme with adaptive parameter selection provides enhanced performance in terms of queuing delay, packet dropping rate, and cell-edge user performance, while the total sector throughput remains comparable. We further analyze and compare achieved fairness of the schemes in terms of different fairness indices available in literature.

  8. Real-Time Transportation Mode Identification Using Artificial Neural Networks Enhanced with Mode Availability Layers: A Case Study in Dubai

    Directory of Open Access Journals (Sweden)

    Young-Ji Byon

    2017-09-01

    Full Text Available Traditionally, departments of transportation (DOTs have dispatched probe vehicles with dedicated vehicles and drivers for monitoring traffic conditions. Emerging assisted GPS (AGPS and accelerometer-equipped smartphones offer new sources of raw data that arise from voluntarily-traveling smartphone users provided that their modes of transportation can correctly be identified. By introducing additional raster map layers that indicate the availability of each mode, it is possible to enhance the accuracy of mode detection results. Even in its simplest form, an artificial neural network (ANN excels at pattern recognition with a relatively short processing timeframe once it is properly trained, which is suitable for real-time mode identification purposes. Dubai is one of the major cities in the Middle East and offers unique environments, such as a high density of extremely high-rise buildings that may introduce multi-path errors with GPS signals. This paper develops real-time mode identification ANNs enhanced with proposed mode availability geographic information system (GIS layers, firstly for a universal mode detection and, secondly for an auto mode detection for the particular intelligent transportation system (ITS application of traffic monitoring, and compares the results with existing approaches. It is found that ANN-based real-time mode identification, enhanced by mode availability GIS layers, significantly outperforms the existing methods.

  9. A multi-layered protein network stabilizes the Escherichia coli FtsZ-ring and modulates constriction dynamics.

    Directory of Open Access Journals (Sweden)

    Jackson Buss

    2015-04-01

    Full Text Available The prokaryotic tubulin homolog, FtsZ, forms a ring-like structure (FtsZ-ring at midcell. The FtsZ-ring establishes the division plane and enables the assembly of the macromolecular division machinery (divisome. Although many molecular components of the divisome have been identified and their interactions extensively characterized, the spatial organization of these proteins within the divisome is unclear. Consequently, the physical mechanisms that drive divisome assembly, maintenance, and constriction remain elusive. Here we applied single-molecule based superresolution imaging, combined with genetic and biophysical investigations, to reveal the spatial organization of cellular structures formed by four important divisome proteins in E. coli: FtsZ, ZapA, ZapB and MatP. We show that these interacting proteins are arranged into a multi-layered protein network extending from the cell membrane to the chromosome, each with unique structural and dynamic properties. Further, we find that this protein network stabilizes the FtsZ-ring, and unexpectedly, slows down cell constriction, suggesting a new, unrecognized role for this network in bacterial cell division. Our results provide new insight into the structure and function of the divisome, and highlight the importance of coordinated cell constriction and chromosome segregation.

  10. Evaluation of 1-D tracer concentration profile in a small river by means of Multi-Layer Perceptron Neural Networks

    Directory of Open Access Journals (Sweden)

    A. Piotrowski

    2007-12-01

    Full Text Available The prediction of temporal concentration profiles of a transported pollutant in a river is still a subject of ongoing research efforts worldwide. The present paper is aimed at studying the possibility of using Multi-Layer Perceptron Neural Networks to evaluate the whole concentration versus time profile at several cross-sections of a river under various flow conditions, using as little information about the river system as possible. In contrast with the earlier neural networks based work on longitudinal dispersion coefficients, this new approach relies more heavily on measurements of concentration collected during tracer tests over a range of flow conditions, but fewer hydraulic and morphological data are needed. The study is based upon 26 tracer experiments performed in a small river in Edinburgh, UK (Murray Burn at various flow rates in a 540 m long reach. The only data used in this study were concentration measurements collected at 4 cross-sections, distances between the cross-sections and the injection site, time, as well as flow rate and water velocity, obtained according to the data measured at the 1st and 2nd cross-sections.

    The four main features of concentration versus time profiles at a particular cross-section, namely the peak concentration, the arrival time of the peak at the cross-section, and the shapes of the rising and falling limbs of the profile are modeled, and for each of them a separately designed neural network was used. There was also a variant investigated in which the conservation of the injected mass was assured by adjusting the predicted peak concentration. The neural network methods were compared with the unit peak attenuation curve concept.

    In general the neural networks predicted the main features of the concentration profiles satisfactorily. The predicted peak concentrations were generally better than those obtained using the unit peak attenuation method, and the method with mass

  11. Wireless sensor networks in relic protection: deployment methodology and cross-layer design

    Institute of Scientific and Technical Information of China (English)

    Li Dong; Liu Wei; Hui Chunli; Huang Changcheng; Cui Li

    2009-01-01

    This paper describes the deployment optimization technology and the cross-layer design of a surveillance WSN system applied in relic protection. Facing the typical technical challenges in the application context of relic protection, we firstly propose a deployment technology based on ant colony optimization algorithm (DT-ACO) to overcome the difficulties in communication connectivity and sensing coverage. Meanwhile, DT-ACO minimizes the overall cost of the system as much as possible. Secondly we propose a novel power-aware cross-layer scheme (PACS) to facilitate adjustable system lifetime and surveillance accuracy. The performance analysis shows that we achieve lower device cost, significant extension of the system lifetime and improvement on the data delivery rate compared with the traditional methods.

  12. Multi-layer holographic bifurcative neural network system for real-time adaptive EOS data analysis

    Science.gov (United States)

    Liu, Hua-Kuang; Huang, K. S.; Diep, J.

    1993-01-01

    Optical data processing techniques have the inherent advantage of high data throughout, low weight and low power requirements. These features are particularly desirable for onboard spacecraft in-situ real-time data analysis and data compression applications. the proposed multi-layer optical holographic neural net pattern recognition technique will utilize the nonlinear photorefractive devices for real-time adaptive learning to classify input data content and recognize unexpected features. Information can be stored either in analog or digital form in a nonlinear photofractive device. The recording can be accomplished in time scales ranging from milliseconds to microseconds. When a system consisting of these devices is organized in a multi-layer structure, a feedforward neural net with bifurcating data classification capability is formed. The interdisciplinary research will involve the collaboration with top digital computer architecture experts at the University of Southern California.

  13. A Cross-Layer Route Discovery Framework for Mobile Ad Hoc Networks

    OpenAIRE

    Wu Jieyi; Zhou Bosheng; Marshall Alan; Lee Tsung-Han; Liu Jiakang

    2005-01-01

    Most reactive routing protocols in MANETs employ a random delay between rebroadcasting route requests (RREQ) in order to avoid "broadcast storms." However this can lead to problems such as "next hop racing" and "rebroadcast redundancy." In addition to this, existing routing protocols for MANETs usually take a single routing strategy for all flows. This may lead to inefficient use of resources. In this paper we propose a cross-layer route discovery framework (CRDF) to address these problems b...

  14. Multi-layered Security Approaches for a Modular Open Network Architecture-based Satellite

    OpenAIRE

    Shirley, Brandon; Young, Quinn; Wegner, Peter; Christensen, Jacob; Janicik, Jeffrey

    2014-01-01

    A growing trend in satellite development includes shortening the development lifecycle for hardware and software, cost reduction, and promoting reuse for future missions. Department of Defense (DoD) acquisition policies mandate system providers use Open Systems Architecture (OSA) where feasible. Modular Open Network Architecture (MONA) is a subset of OSA and paves the way to achieve cost reduction and reuse during a reduced development lifecycle. MONA approaches provide opportunities to enhan...

  15. Sleeping Cluster based Medium Access Control Layer Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    T. R. Rangaswamy

    2012-01-01

    Full Text Available Wireless sensor networks play a vital role in remote area applications, where human intervention is not possible. In a Wireless Sensor Network (WSN each and every node is strictly an energy as well as bandwidth constrained one. Problem statement: In a standard WSN, most of the routing techniques, move data from multiple sources to a single fixed base station. Because of the greater number of computational tasks, the existing routing protocol did not address the energy efficient problem properly. In order to overcome the problem of energy consumption due to more number of computational tasks, a new method is developed. Approach: The proposed algorithm divides the sensing field into three active clusters and one sleeping cluster. The cluster head selection is based on the distance between the base station and the normal nodes. The Time Division Multiple Access (TDMA mechanism is used to make the cluster remain in the active state as well as the sleeping state. In an active cluster 50% of nodes will be made active and the remaining 50% be in sleep state. A sleeping cluster will be made active after a period of time and periodically changes its functionality. Results: Due to this periodic change of state, energy consumption is minimized. The performance of the Low Energy Adaptive and Clustering Hierarchy (LEACH algorithm is also analyzed, using a network simulator NS2 based on the number of Cluster Heads (CH, Energy consumption, Lifetime and the number of nodes alive. Conclusion: The simulation studies were carried out using a network simulation tool NS2, for the proposed method and this is compared with the performance of the existing protocol. The superiority of the proposed method is highlighted.

  16. Physical layer one-time-pad data encryption through synchronized semiconductor laser networks

    Science.gov (United States)

    Argyris, Apostolos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-02-01

    Semiconductor lasers (SL) have been proven to be a key device in the generation of ultrafast true random bit streams. Their potential to emit chaotic signals under conditions with desirable statistics, establish them as a low cost solution to cover various needs, from large volume key generation to real-time encrypted communications. Usually, only undemanding post-processing is needed to convert the acquired analog timeseries to digital sequences that pass all established tests of randomness. A novel architecture that can generate and exploit these true random sequences is through a fiber network in which the nodes are semiconductor lasers that are coupled and synchronized to central hub laser. In this work we show experimentally that laser nodes in such a star network topology can synchronize with each other through complex broadband signals that are the seed to true random bit sequences (TRBS) generated at several Gb/s. The potential for each node to access real-time generated and synchronized with the rest of the nodes random bit streams, through the fiber optic network, allows to implement an one-time-pad encryption protocol that mixes the synchronized true random bit sequence with real data at Gb/s rates. Forward-error correction methods are used to reduce the errors in the TRBS and the final error rate at the data decoding level. An appropriate selection in the sampling methodology and properties, as well as in the physical properties of the chaotic seed signal through which network locks in synchronization, allows an error free performance.

  17. Exploiting Hidden Layer Responses of Deep Neural Networks for Language Recognition

    Science.gov (United States)

    2016-09-08

    Moreno, J. Gonzalez-Dominguez, O. Plchot, D. Martinez, J. Gonzalez-Rodriguez, and P. J. Moreno, “ Automatic Language Identification Using Deep Neural...for Language IDentification (LID) involves the extraction of bottleneck features from a network that was trained on auto- matic speech recognition...better in longer segment (10, 30 and 120 second) conditions. In this work we propose a technique to improve frame-by- frame DNN LID. The logistic

  18. Niche-modulated and niche-modulating genes in bone marrow cells

    Science.gov (United States)

    Cohen, Y; Garach-Jehoshua, O; Bar-Chaim, A; Kornberg, A

    2012-01-01

    Bone marrow (BM) cells depend on their niche for growth and survival. However, the genes modulated by niche stimuli have not been discriminated yet. For this purpose, we investigated BM aspirations from patients with various hematological malignancies. Each aspirate was fractionated, and the various samples were fixed at different time points and analyzed by microarray. Identification of niche-modulated genes relied on sustained change in expression following loss of niche regulation. Compared with the reference (‘authentic') samples, which were fixed immediately following aspiration, the BM samples fixed after longer stay out-of-niche acquired numerous changes in gene-expression profile (GEP). The overall genes modulated included a common subset of functionally diverse genes displaying prompt and sustained ‘switch' in expression irrespective of the tumor type. Interestingly, the ‘switch' in GEP was reversible and turned ‘off-and-on' again in culture conditions, resuming cell–cell–matrix contact versus respread into suspension, respectively. Moreover, the resuming of contact prolonged the survival of tumor cells out-of-niche, and the regression of the ‘contactless switch' was followed by induction of a new set of genes, this time mainly encoding extracellular proteins including angiogenic factors and extracellular matrix proteins. Our data set, being unique in authentic expression design, uncovered niche-modulated and niche-modulating genes capable of controlling homing, expansion and angiogenesis. PMID:23241658

  19. Why developmental niche construction is not selective niche construction: and why it matters.

    Science.gov (United States)

    Stotz, Karola

    2017-10-06

    In the last decade, niche construction has been heralded as the neglected process in evolution. But niche construction is just one way in which the organism's interaction with and construction of the environment can have potential evolutionary significance. The constructed environment does not just select for, it also produces new variation. Nearly 3 decades ago, and in parallel with Odling-Smee's article 'Niche-constructing phenotypes', West and King introduced the 'ontogenetic niche' to give the phenomena of exogenetic inheritance a formal name. Since then, a range of fields in the life sciences and medicine has amassed evidence that parents influence their offspring by means other than DNA (parental effects), and proposed mechanisms for how heritable variation can be environmentally induced and developmentally regulated. The concept of 'developmental niche construction' (DNC) elucidates how a diverse range of mechanisms contributes to the transgenerational transfer of developmental resources. My most central of claims is that whereas the selective niche of niche construction theory is primarily used to explain the active role of the organism in its selective environment, DNC is meant to indicate the active role of the organism in its developmental environment. The paper highlights the differences between the construction of the selective and the developmental niche, and explores the overall significance of DNC for evolutionary theory.

  20. Climatic niche divergence or conservatism? Environmental niches and range limits in ecologically similar damselflies.

    Science.gov (United States)

    Wellenreuther, Maren; Larson, Keith W; Svensson, Erik I

    2012-06-01

    The factors that determine species' range limits are of central interest to biologists. One particularly interesting group comprises odonates (dragonflies and damselflies), which show large differences in secondary sexual traits and respond quickly to climatic factors, but often have minor interspecific niche differences, challenging models of niche-based species coexistence. We quantified the environmental niches at two geographic scales to understand the ecological causes of northern range limits and the coexistence of two congeneric damselflies (Calopteryx splendens and C. virgo). Using environmental niche modeling, we quantified niche divergence first across the whole geographic range in Fennoscandia, and second only in the sympatric part of this range. We found evidence for interspecific divergence along the environmental axes of temperature and precipitation across the northern range in Fennoscandia, suggesting that adaptation to colder and wetter climate might have allowed C. virgo to expand farther north than C. splendens. However, in the sympatric zone in southern Fennoscandia we found only negligible and nonsignificant niche differences. Minor niche differences in sympatry lead to frequent encounters and intense interspecific sexual interactions at the local scale of populations. Nevertheless, niche differences across Fennoscandia suggest that species differences in physiological tolerances limit range expansions northward, and that current and future climate could have large effects on the distributional ranges of these and ecologically similar insects.