WorldWideScience

Sample records for network address lookup

  1. An Ad Hoc Adaptive Hashing Technique forNon-Uniformly Distributed IP Address Lookup in Computer Networks

    Directory of Open Access Journals (Sweden)

    Christopher Martinez

    2007-02-01

    Full Text Available Hashing algorithms long have been widely adopted to design a fast address look-up process which involves a search through a large database to find a record associated with a given key. Hashing algorithms involve transforming a key inside each target data to a hash value hoping that the hashing would render the database a uniform distribution with respect to this new hash value. The close the final distribution is to uniform, the less search time would be required when a query is made. When the database is already key-wise uniformly distributed, any regular hashing algorithm, such as bit-extraction, bit-group XOR, etc., would easily lead to a statistically perfect uniform distribution after the hashing. On the other hand, if records in the database are instead not uniformly distributed as in almost all known practical applications, then even different regular hash functions would lead to very different performance. When the target database has a key with a highly skewed distributed value, performance delivered by regular hashing algorithms usually becomes far from desirable. This paper aims at designing a hashing algorithm to achieve the highest probability in leading to a uniformly distributed hash result from a non-uniformly distributed database. An analytical pre-process on the original database is first performed to extract critical information that would significantly benefit the design of a better hashing algorithm. This process includes sorting on the bits of the key to prioritize the use of them in the XOR hashing sequence, or in simple bit extraction, or even a combination of both. Such an ad hoc hash design is critical to adapting to all real-time situations when there exists a changing (and/or expanding database with an irregular non-uniform distribution. Significant improvement from simulation results is obtained in randomly generated data as well as real data.

  2. Data structure, method and system for address lookup

    NARCIS (Netherlands)

    Stefanakis, G.; Sourdis, I.; Nedeltchev, G.G.; De Smet, R.

    2010-01-01

    Method and computer system for constructing a decision tree for use in address lookup of a requested address in an address space. The address space is arranged as a set of basic address ranges. Each basic address range is defined by a lower and an upper bound address, and an address in the address

  3. Integrated Optical Content Addressable Memories (CAM and Optical Random Access Memories (RAM for Ultra-Fast Address Look-Up Operations

    Directory of Open Access Journals (Sweden)

    Christos Vagionas

    2017-07-01

    Full Text Available Electronic Content Addressable Memories (CAM implement Address Look-Up (AL table functionalities of network routers; however, they typically operate in the MHz regime, turning AL into a critical network bottleneck. In this communication, we demonstrate the first steps towards developing optical CAM alternatives to enable a re-engineering of AL memories. Firstly, we report on the photonic integration of Semiconductor Optical Amplifier-Mach Zehnder Interferometer (SOA-MZI-based optical Flip-Flop and Random Access Memories on a monolithic InP platform, capable of storing the binary prefix-address data-bits and the outgoing port information for next hop routing, respectively. Subsequently the first optical Binary CAM cell (B-CAM is experimentally demonstrated, comprising an InP Flip-Flop and a SOA-MZI Exclusive OR (XOR gate for fast search operations through an XOR-based bit comparison, yielding an error-free 10 Gb/s operation. This is later extended via physical layer simulations in an optical Ternary-CAM (T-CAM cell and a 4-bit Matchline (ML configuration, supporting a third state of the “logical X” value towards wildcard bits of network subnet masks. The proposed functional CAM and Random Access Memories (RAM sub-circuits may facilitate light-based Address Look-Up tables supporting search operations at 10 Gb/s and beyond, paving the way towards minimizing the disparity with the frantic optical transmission linerates, and fast re-configurability through multiple simultaneous Wavelength Division Multiplexed (WDM memory access requests.

  4. A Peer-Tree Based Location Lookup Service in Mobile Wireless Networks

    Directory of Open Access Journals (Sweden)

    Jun Liu

    2010-01-01

    Full Text Available We present a location look-up service for aiding location-based routing in wireless networks with mobile hosts. This location look up service is constructed based on a peer-tree indexing structure which represents the friendship relations among mobile hosts. The friendship is derived from the relations of sharing various-length common suffixes of host identifiers. A friendship relation determines the cooperation relation among mobile hosts. The Peer-Tree indexing structure provides a guideline for propagating location updates and queries in an organized manner. Each host periodically propagates its up-to-date location to a small number of its friends. Location queries are forwarded to and serviced at one of the hosts which hold a copy of the location under query. Paths for forwarding location updates or queries are jointly determined by the Peer-Tree indexing structure and the temporary connectivity in a network. The goals of this location look-up service include achieving a high success rate on location discovery, having low demands on network resources, and being robust to frequent changes of network topology.

  5. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  6. Precomputing method lookup

    DEFF Research Database (Denmark)

    Jul, Eric

    2008-01-01

    This paper looks at Method Lookup and discusses the Emerald approach to making Method Lookup more efficient by precomputing method lookup as early as possible — even moving it back into the compilation phase, if possible, thus eliminating method lookup entirely for many simple procedure calls. ...

  7. A critical appraisal of logistic regression-based nomograms, artificial neural networks, classification and regression-tree models, look-up tables and risk-group stratification models for prostate cancer.

    Science.gov (United States)

    Chun, Felix K-H; Karakiewicz, Pierre I; Briganti, Alberto; Walz, Jochen; Kattan, Michael W; Huland, Hartwig; Graefen, Markus

    2007-04-01

    To evaluate several methods of predicting prostate cancer-related outcomes, i.e. nomograms, look-up tables, artificial neural networks (ANN), classification and regression tree (CART) analyses and risk-group stratification (RGS) models, all of which represent valid alternatives. We present four direct comparisons, where a nomogram was compared to either an ANN, a look-up table, a CART model or a RGS model. In all comparisons we assessed the predictive accuracy and performance characteristics of both models. Nomograms have several advantages over ANN, look-up tables, CART and RGS models, the most fundamental being a higher predictive accuracy and better performance characteristics. These results suggest that nomograms are more accurate and have better performance characteristics than their alternatives. However, ANN, look-up tables, CART analyses and RGS models all rely on methodologically sound and valid alternatives, which should not be abandoned.

  8. A Scatter Storage Scheme for Dictionary Lookups

    Directory of Open Access Journals (Sweden)

    D. M. Murray

    1970-09-01

    Full Text Available Scatter storage schemes are examined with respect to their applicability to dictionary lookup procedures. Of particular interest are virtual scatter methods which combine the advantages of rapid search speed and reasonable storage requirements. The theoretical aspects of computing hash addresses are developed, and several algorithms are evaluated. Finally, experiments with an actual text lookup process are described, and a possible library application is discussed.

  9. Addressing behavior in collaborative networks

    NARCIS (Netherlands)

    Shadi, M.; Afsarmanesh, H.

    2011-01-01

    Many factors such as weak partner commitment, lack of proper partners’ alignment on interest and values, individualism, lack of flexibility, and loss of autonomy may cause partnership’s failures in collaborative networks. Most of these serious causes for conflicts in collaborative networks are

  10. IP lookup with low memory requirement and fast update

    DEFF Research Database (Denmark)

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...... table. The time complexity for update operations is low for the prefix-tree. The lookup operation for the basic binary prefix-tree may require that a high number of nodes be traversed. The paper presents improvements to decrease lookup time, including shortcut tables and multi-bit trees. The prefix-tree...

  11. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  12. Laboratory Demographics Lookup Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This website provides demographic information about laboratories, including CLIA number, facility name and address, where the laboratory testing is performed, the...

  13. Cache directory look-up re-use as conflict check mechanism for speculative memory requests

    Science.gov (United States)

    Ohmacht, Martin

    2013-09-10

    In a cache memory, energy and other efficiencies can be realized by saving a result of a cache directory lookup for sequential accesses to a same memory address. Where the cache is a point of coherence for speculative execution in a multiprocessor system, with directory lookups serving as the point of conflict detection, such saving becomes particularly advantageous.

  14. Addressing false discoveries in network inference.

    Science.gov (United States)

    Petri, Tobias; Altmann, Stefan; Geistlinger, Ludwig; Zimmer, Ralf; Küffner, Robert

    2015-09-01

    Experimentally determined gene regulatory networks can be enriched by computational inference from high-throughput expression profiles. However, the prediction of regulatory interactions is severely impaired by indirect and spurious effects, particularly for eukaryotes. Recently, published methods report improved predictions by exploiting the a priori known targets of a regulator (its local topology) in addition to expression profiles. We find that methods exploiting known targets show an unexpectedly high rate of false discoveries. This leads to inflated performance estimates and the prediction of an excessive number of new interactions for regulators with many known targets. These issues are hidden from common evaluation and cross-validation setups, which is due to Simpson's paradox. We suggest a confidence score recalibration method (CoRe) that reduces the false discovery rate and enables a reliable performance estimation. CoRe considerably improves the results of network inference methods that exploit known targets. Predictions then display the biological process specificity of regulators more correctly and enable the inference of accurate genome-wide regulatory networks in eukaryotes. For yeast, we propose a network with more than 22 000 confident interactions. We point out that machine learning approaches outside of the area of network inference may be affected as well. Results, executable code and networks are available via our website http://www.bio.ifi.lmu.de/forschung/CoRe. robert.kueffner@helmholtz-muenchen.de Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  15. Coherent and automatic address resolution for vehicular ad hoc networks

    OpenAIRE

    Urquiza Aguiar, Luis; Tripp Barba, Carolina; Rebollo Monedero, David; Mezher, Ahmad Mohamad; Aguilar Igartua, Mónica; Forné Muñoz, Jorge

    2015-01-01

    The interest in vehicular communications has increased notably. In this paper, the use of the address resolution (AR) procedures is studied for vehicular ad hoc networks (VANETs).We analyse the poor performance of AR transactions in such networks and we present a new proposal called coherent, automatic address resolution (CAAR). Our approach inhibits the use of AR transactions and instead increases the usefulness of routing signalling to automatically match the IP and MAC addresses. Through e...

  16. Name-Based Address Mapping for Virtual Private Networks

    Science.gov (United States)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  17. Tool Support for Software Lookup Table Optimization

    Directory of Open Access Journals (Sweden)

    Chris Wilcox

    2011-01-01

    Full Text Available A number of scientific applications are performance-limited by expressions that repeatedly call costly elementary functions. Lookup table (LUT optimization accelerates the evaluation of such functions by reusing previously computed results. LUT methods can speed up applications that tolerate an approximation of function results, thereby achieving a high level of fuzzy reuse. One problem with LUT optimization is the difficulty of controlling the tradeoff between performance and accuracy. The current practice of manual LUT optimization adds programming effort by requiring extensive experimentation to make this tradeoff, and such hand tuning can obfuscate algorithms. In this paper we describe a methodology and tool implementation to improve the application of software LUT optimization. Our Mesa tool implements source-to-source transformations for C or C++ code to automate the tedious and error-prone aspects of LUT generation such as domain profiling, error analysis, and code generation. We evaluate Mesa with five scientific applications. Our results show a performance improvement of 3.0× and 6.9× for two molecular biology algorithms, 1.4× for a molecular dynamics program, 2.1× to 2.8× for a neural network application, and 4.6× for a hydrology calculation. We find that Mesa enables LUT optimization with more control over accuracy and less effort than manual approaches.

  18. Addressing congestion on single allocation hub-and-spoke networks

    Directory of Open Access Journals (Sweden)

    Ricardo Saraiva de Camargo

    2012-12-01

    Full Text Available When considering hub-and-spoke networks with single allocation, the absence of alternative routes makes this kind of systems specially vulnerable to congestion effects. In order to improve the design of such networks, congestion costs must be addressed. This article deploys two different techniques for addressing congestion on single allocation hub-and-spoke networks: the Generalized Benders Decomposition and the Outer Approximation method. Both methods are able to solve large scale instances. Computational experiments show how the adoption of advanced solution strategies, such as Pareto-optimal cut generation on the Master Problem branch-and-bound tree, may be decisive. They also demonstrate that the solution effort is not only associated with the size of the instances, but also with their combination of the installation and congestion costs.

  19. Addresses

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — Point features representing locations of all street addresses in Orange County, NC including Chapel Hill, NC. Data maintained by Orange County, the Town of Chapel...

  20. Hierarchical auto-configuration addressing in mobile ad hoc networks (HAAM)

    Science.gov (United States)

    Ram Srikumar, P.; Sumathy, S.

    2017-11-01

    Addressing plays a vital role in networking to identify devices uniquely. A device must be assigned with a unique address in order to participate in the data communication in any network. Different protocols defining different types of addressing are proposed in literature. Address auto-configuration is a key requirement for self organizing networks. Existing auto-configuration based addressing protocols require broadcasting probes to all the nodes in the network before assigning a proper address to a new node. This needs further broadcasts to reflect the status of the acquired address in the network. Such methods incur high communication overheads due to repetitive flooding. To address this overhead, a new partially stateful address allocation scheme, namely Hierarchical Auto-configuration Addressing (HAAM) scheme is extended and proposed. Hierarchical addressing basically reduces latency and overhead caused during address configuration. Partially stateful addressing algorithm assigns addresses without the need for flooding and global state awareness, which in turn reduces the communication overhead and space complexity respectively. Nodes are assigned addresses hierarchically to maintain the graph of the network as a spanning tree which helps in effectively avoiding the broadcast storm problem. Proposed algorithm for HAAM handles network splits and merges efficiently in large scale mobile ad hoc networks incurring low communication overheads.

  1. Optimizing available network resources to address questions in environmental biogeochemistry

    Science.gov (United States)

    Hinckley, Eve-Lyn; Suzanne Andersen,; Baron, Jill S.; Peter Blanken,; Gordon Bonan,; William Bowman,; Sarah Elmendorf,; Fierer, Noah; Andrew Fox,; Keli Goodman,; Katherine Jones,; Danica Lombardozzi,; Claire Lunch,; Jason Neff,; Michael SanClements,; Katherine Suding,; Will Wieder,

    2016-01-01

    An increasing number of network observatories have been established globally to collect long-term biogeochemical data at multiple spatial and temporal scales. Although many outstanding questions in biogeochemistry would benefit from network science, the ability of the earth- and environmental-sciences community to conduct synthesis studies within and across networks is limited and seldom done satisfactorily. We identify the ideal characteristics of networks, common problems with using data, and key improvements to strengthen intra- and internetwork compatibility. We suggest that targeted improvements to existing networks should include promoting standardization in data collection, developing incentives to promote rapid data release to the public, and increasing the ability of investigators to conduct their own studies across sites. Internetwork efforts should include identifying a standard measurement suite—we propose profiles of plant canopy and soil properties—and an online, searchable data portal that connects network, investigator-led, and citizen-science projects.

  2. Address Translation Problems in IMS Based Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Balazs Godor

    2006-01-01

    Full Text Available The development of packed based multimedia networks reached a turning point when the ITU-T and the ETSIhave incorporated the IMS to the NGN. With the fast development of mobile communication more and more services andcontent are available. In contrast with fix network telephony both the services and the devices are personalized in the “mobileworld”. Services, known from the Internet - like e-mail, chat, browsing, presence, etc. – are already available via mobiledevices as well. The IMS originally wanted to exploit both the benefits of mobile networks and the fancy services of theInternet. But today it is already more than that. IMS is the core of the next generation telecommunication networks and abasis for fix-mobile convergent services. The fact however that IMS was originally a “mobile” standard, where IPv6 was notoddity generated some problems for the fix networks, where IPv4 is used. In this article I give an overview of these problemsand mention some solutions as well.

  3. Medicare Physician and Other Supplier Look-up Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This look-up tool is a searchable database that allows you to look up a provider by National Provider Identifier (NPI), or by name and location. The look-up tool...

  4. A piecewise lookup table for calculating nonbonded pairwise atomic interactions.

    Science.gov (United States)

    Luo, Jinping; Liu, Lijun; Su, Peng; Duan, Pengbo; Lu, Daihui

    2015-11-01

    A critical challenge for molecular dynamics simulations of chemical or biological systems is to improve the calculation efficiency while retaining sufficient accuracy. The main bottleneck in improving the efficiency is the evaluation of nonbonded pairwise interactions. We propose a new piecewise lookup table method for rapid and accurate calculation of interatomic nonbonded pairwise interactions. The piecewise lookup table allows nonuniform assignment of table nodes according to the slope of the potential function and the pair interaction distribution. The proposed method assigns the nodes more reasonably than in general lookup tables, and thus improves the accuracy while requiring fewer nodes. To obtain the same level of accuracy, our piecewise lookup table accelerates the calculation via the efficient usage of cache memory. This new method is straightforward to implement and should be broadly applicable. Graphical Abstract Illustration of piecewise lookup table method.

  5. Addressing water incidents by using pipe network models

    CSIR Research Space (South Africa)

    Yoyo, Sonwabiso

    2016-05-01

    Full Text Available NETWORK MODELS Sonwabiso YOYO, Philip R. PAGE, S’Bonelo ZULU, Frances A’BEAR 1 1 Built Environment, Council for Scientific and Industrial Research (CSIR), 11 Jan Cilliers Road, Stellenbosch, South Africa, 7600. Tel: +27 (21) 888 2478. Email: syoyo...

  6. Addressing cancer disparities via community network mobilization and intersectoral partnerships: a social network analysis.

    Science.gov (United States)

    Ramanadhan, Shoba; Salhi, Carmel; Achille, Erline; Baril, Nashira; D'Entremont, Kerrie; Grullon, Milagro; Judge, Christine; Oppenheimer, Sarah; Reeves, Chrasandra; Savage, Clara; Viswanath, Kasisomayajula

    2012-01-01

    Community mobilization and collaboration among diverse partners are vital components of the effort to reduce and eliminate cancer disparities in the United States. We studied the development and impact of intersectoral connections among the members of the Massachusetts Community Network for Cancer Education, Research, and Training (MassCONECT). As one of the Community Network Program sites funded by the National Cancer Institute, this infrastructure-building initiative utilized principles of Community-based Participatory Research (CBPR) to unite community coalitions, researchers, policymakers, and other important stakeholders to address cancer disparities in three Massachusetts communities: Boston, Lawrence, and Worcester. We conducted a cross-sectional, sociometric network analysis four years after the network was formed. A total of 38 of 55 members participated in the study (69% response rate). Over four years of collaboration, the number of intersectoral connections reported by members (intersectoral out-degree) increased, as did the extent to which such connections were reported reciprocally (intersectoral reciprocity). We assessed relationships between these markers of intersectoral collaboration and three intermediate outcomes in the effort to reduce and eliminate cancer disparities: delivery of community activities, policy engagement, and grants/publications. We found a positive and statistically significant relationship between intersectoral out-degree and community activities and policy engagement (the relationship was borderline significant for grants/publications). We found a positive and statistically significant relationship between intersectoral reciprocity and community activities and grants/publications (the relationship was borderline significant for policy engagement). The study suggests that intersectoral connections may be important drivers of diverse intermediate outcomes in the effort to reduce and eliminate cancer disparities. The findings

  7. Pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks

    Science.gov (United States)

    Wu, Shaochuan; Tan, Xuezhi

    2007-11-01

    By analyzing all kinds of address configuration algorithms, this paper provides a new pseudo-random dynamic address configuration (PRDAC) algorithm for mobile ad hoc networks. Based on PRDAC, the first node that initials this network randomly chooses a nonlinear shift register that can generates an m-sequence. When another node joins this network, the initial node will act as an IP address configuration sever to compute an IP address according to this nonlinear shift register, and then allocates this address and tell the generator polynomial of this shift register to this new node. By this means, when other node joins this network, any node that has obtained an IP address can act as a server to allocate address to this new node. PRDAC can also efficiently avoid IP conflicts and deal with network partition and merge as same as prophet address (PA) allocation and dynamic configuration and distribution protocol (DCDP). Furthermore, PRDAC has less algorithm complexity, less computational complexity and more sufficient assumption than PA. In addition, PRDAC radically avoids address conflicts and maximizes the utilization rate of IP addresses. Analysis and simulation results show that PRDAC has rapid convergence, low overhead and immune from topological structures.

  8. Medicare Part D Prescriber Look-up Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This look-up tool is a searchable database that allows you to look up a Medicare Part D prescriber by National Provider Identifier (NPI), or by name and location....

  9. Domain enhanced lookup time accelerated BLAST

    Directory of Open Access Journals (Sweden)

    Boratyn Grzegorz M

    2012-04-01

    Full Text Available Abstract Background BLAST is a commonly-used software package for comparing a query sequence to a database of known sequences; in this study, we focus on protein sequences. Position-specific-iterated BLAST (PSI-BLAST iteratively searches a protein sequence database, using the matches in round i to construct a position-specific score matrix (PSSM for searching the database in round i + 1. Biegert and Söding developed Context-sensitive BLAST (CS-BLAST, which combines information from searching the sequence database with information derived from a library of short protein profiles to achieve better homology detection than PSI-BLAST, which builds its PSSMs from scratch. Results We describe a new method, called domain enhanced lookup time accelerated BLAST (DELTA-BLAST, which searches a database of pre-constructed PSSMs before searching a protein-sequence database, to yield better homology detection. For its PSSMs, DELTA-BLAST employs a subset of NCBI’s Conserved Domain Database (CDD. On a test set derived from ASTRAL, with one round of searching, DELTA-BLAST achieves a ROC5000 of 0.270 vs. 0.116 for CS-BLAST. The performance advantage diminishes in iterated searches, but DELTA-BLAST continues to achieve better ROC scores than CS-BLAST. Conclusions DELTA-BLAST is a useful program for the detection of remote protein homologs. It is available under the “Protein BLAST” link at http://blast.ncbi.nlm.nih.gov. Reviewers This article was reviewed by Arcady Mushegian, Nick V. Grishin, and Frank Eisenhaber.

  10. SDN-enabled dynamic WDM networks to address routing information inaccuracy

    CSIR Research Space (South Africa)

    Ravhuanzwo, Lusani

    2016-11-01

    Full Text Available International Conference on Advances in Computing, Communication, & Engineering (ICACCE-2016), Coastlands Umhlanga Hotel & Resorts, Durban, 28-29 November 2016 SDN-enabled dynamic WDM networks to address routing information inaccuracy L. Ravhuanzwo, A...

  11. On the Evaluation of Self-Addressing Strategies for Ad-Hoc Networks

    NARCIS (Netherlands)

    de Oliveira Schmidt, R.; Pras, Aiko; Gomes, Reinaldo; Lehnert, Ralf

    Ad-hoc networks are supposed to operate autonomously and, therefore, self-* technologies are fundamental to their deployment. Several of these solutions have been proposed during the last few years, covering most layers and functionalities of networking systems. Addressing is one of the critical

  12. Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach

    CERN Document Server

    Haldar, Rishin

    2011-01-01

    Dictionary lookup methods are popular in dealing with ambiguous letters which were not recognized by Optical Character Readers. However, a robust dictionary lookup method can be complex as apriori probability calculation or a large dictionary size increases the overhead and the cost of searching. In this context, Levenshtein distance is a simple metric which can be an effective string approximation tool. After observing the effectiveness of this method, an improvement has been made to this method by grouping some similar looking alphabets and reducing the weighted difference among members of the same group. The results showed marked improvement over the traditional Levenshtein distance technique.

  13. Cryptanalysis of dynamic look-up table based chaotic cryptosystems

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G

    2004-06-07

    In recent years many chaotic cryptosystems based on Baptista's seminal work have been proposed. We analyze the security of two of the newest and most interesting ones, which use a dynamically updated look-up table and also work as stream ciphers. We provide different attack techniques to recover the keystream used by the algorithms. The knowledge of this keystream provides the attacker with the same information as the key and thus the security is broken. We also show that the dependence on the plaintext, and not on the key, of the look-up table updating mechanism facilitates cryptanalysis.

  14. Software Defined Networking to support IP address mobility in future LTE network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; van den Berg, Hans Leo; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    The existing LTE network architecture dose not scale well to increasing demands due to its highly centralized and hierarchical composition. In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture. Next, we develop two IP

  15. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks: A fuzzy set Qualitative Comparative Analysis.

    Science.gov (United States)

    Peters, D T J M; Verweij, S; Grêaux, K; Stronks, K; Harting, J

    2017-12-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different policy instruments. However, such network diversity may increase network complexity and therefore hamper network performance. Network complexity may be reduced by network management and the provision of financial resources. This study examined whether network diversity - amidst the other conditions - is indeed needed to address environmental determinants of health behavior. We included 25 intersectoral policy networks in Dutch municipalities aimed at reducing overweight, smoking, and alcohol/drugs abuse. For our fuzzy set Qualitative Comparative Analysis we used data from three web-based surveys among (a) project leaders regarding network diversity and size (n = 38); (b) project leaders and project partners regarding management (n = 278); and (c) implementation professionals regarding types of environmental determinants addressed (n = 137). Data on budgets were retrieved from project application forms. Contrary to their intentions, most policy networks typically addressed personal determinants. If the environment was addressed too, it was mostly the social environment. To address environmental determinants of health behavior, network diversity (>50% of the actors are non-public health) was necessary in networks that were either small (network diversity, environmental determinants also were addressed by small networks with large budgets, and by large networks with small budgets, when both provided network management. We conclude that network diversity is important - although not necessary - for resource pooling to address environmental determinants of health behavior, but only effective in the presence of network management. Our findings may support intersectoral

  16. Design Guidelines to Address Global Challenges: Lessons from Global Action Networks

    Directory of Open Access Journals (Sweden)

    Steve Waddell

    2012-12-01

    Full Text Available Traditional organizations appear to be incapable of adequately addressing critical global issues such as war, climate change, and economic inequality. Addressing these issues suggests the need for organizational innovation to develop global social contracts. Successful innovation must address four integration imperatives: (1 integrate effort and resources across organizational sectors (business, government, civil society and sense-making, (2 create successful individual to global aggregations, (3 integrate the short and long term, and (4 integrate major issue areas. A new type of organization, Global Action Networks, aims for this integration. Based upon analysis of this new type of organization, five design principles for global social contract organizations are proposed.

  17. A Table Look-Up Parser in Online ILTS Applications

    Science.gov (United States)

    Chen, Liang; Tokuda, Naoyuki; Hou, Pingkui

    2005-01-01

    A simple table look-up parser (TLUP) has been developed for parsing and consequently diagnosing syntactic errors in semi-free formatted learners' input sentences of an intelligent language tutoring system (ILTS). The TLUP finds a parse tree for a correct version of an input sentence, diagnoses syntactic errors of the learner by tracing and…

  18. The GÉANT network: addressing current and future needs of the HEP community

    Science.gov (United States)

    Capone, Vincenzo; Usman, Mian

    2015-12-01

    The GÉANT infrastructure is the backbone that serves the scientific communities in Europe for their data movement needs and their access to international research and education networks. Using the extensive fibre footprint and infrastructure in Europe the GÉANT network delivers a portfolio of services aimed to best fit the specific needs of the users, including Authentication and Authorization Infrastructure, end-to-end performance monitoring, advanced network services (dynamic circuits, L2-L3VPN, MD-VPN). This talk will outline the factors that help the GÉANT network to respond to the needs of the High Energy Physics community, both in Europe and worldwide. The Pan-European network provides the connectivity between 40 European national research and education networks. In addition, GÉANT also connects the European NRENs to the R&E networks in other world region and has reach to over 110 NREN worldwide, making GÉANT the best connected Research and Education network, with its multiple intercontinental links to different continents e.g. North and South America, Africa and Asia-Pacific. The High Energy Physics computational needs have always had (and will keep having) a leading role among the scientific user groups of the GÉANT network: the LHCONE overlay network has been built, in collaboration with the other big world REN, specifically to address the peculiar needs of the LHC data movement. Recently, as a result of a series of coordinated efforts, the LHCONE network has been expanded to the Asia-Pacific area, and is going to include some of the main regional R&E network in the area. The LHC community is not the only one that is actively using a distributed computing model (hence the need for a high-performance network); new communities are arising, as BELLE II. GÉANT is deeply involved also with the BELLE II Experiment, to provide full support to their distributed computing model, along with a perfSONAR-based network monitoring system. GÉANT has also

  19. Insights Into Collaborative Networks Of Nonprofit, Private, And Public Organizations That Address Complex Health Issues.

    Science.gov (United States)

    Hogg, Rachel A; Varda, Danielle

    2016-11-01

    Community networks that include nonprofit, public, and private organizations have formed around many health issues, such as chronic disease management and healthy living and eating. Despite the increases in the numbers of and funding for cross-sector networks, and the growing literature about them, there are limited data and methods that can be used to assess their effectiveness and analyze their designs. We addressed this gap in knowledge by analyzing the characteristics of 260 cross-sector community health networks that collectively consisted of 7,816 organizations during the period 2008-15. We found that nonprofit organizations were more prevalent than private firms or government agencies in these networks. Traditional types of partners in community health networks such as hospitals, community health centers, and public health agencies were the most trusted and valued by other members of their networks. However, nontraditional partners, such as employer or business groups and colleges or universities, reported contributing relatively high numbers of resources to their networks. Further evidence is needed to inform collaborative management processes and policies as a mechanism for building what the Robert Wood Johnson Foundation describes as a culture of health. Project HOPE—The People-to-People Health Foundation, Inc.

  20. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Choi Jeonghee

    2008-01-01

    Full Text Available Abstract So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  1. An improved genetic algorithm for increasing the addressing accuracy of encoding fiber Bragg grating sensor network

    Science.gov (United States)

    Liu, Huanlin; Wang, Chujun; Chen, Yong

    2018-01-01

    Large-capacity encoding fiber Bragg grating (FBG) sensor network is widely used in modern long-term health monitoring system. Encoding FBG sensors have greatly improved the capacity of distributed FBG sensor network. However, the error of addressing increases correspondingly with the enlarging of capacity. To address the issue, an improved algorithm called genetic tracking algorithm (GTA) is proposed in the paper. In the GTA, for improving the success rate of matching and reducing the large number of redundant matching operations generated by sequential matching, the individuals are designed based on the feasible matching. Then, two kinds of self-crossover ways and a dynamic variation during mutation process are designed to increase the diversity of individuals and to avoid falling into local optimum. Meanwhile, an assistant decision is proposed to handle the issue that the GTA cannot solve when the variation of sensor information is highly overlapped. The simulation results indicate that the proposed GTA has higher accuracy compared with the traditional tracking algorithm and the enhanced tracking algorithm. In order to address the problems of spectrum fragmentation and low sharing degree of spectrum resources in survivable.

  2. Generic Network Location Service

    Directory of Open Access Journals (Sweden)

    Laban Mwansa

    2010-11-01

    Full Text Available This work presents the Generic Network Location Service based on the Chord implementation utilizing data structures called distributed hash tables (DHT or structured overlay networks, which are used to build scalable self-managing distributed systems. The provided algorithms guarantee resilience in the presence of dynamism: they guarantee consistent lookup results in the presence of nodes failing and leaving. Generic Network Location Service provides a Location Service system based on DHT technology, which is storing device location records in nodes within a Chord DHT. Location records are consisting of network device identification keys as attributes, which are used to create replicas of additional location records through established Chord hashing mechanisms. Storing device location records, in places address-able (using the DHT lookup by individual location record keys provides a simple way of implementing transla¬tion functions similar to well¬ known network services (e.g. ARP, DNS, ENUM. The generic network location ser¬vice presented in the paper is not supposed to be a substitu¬tion of the existing translation techniques (e.g. ARP, DNS, ENUM, but it is considered as an overlay service that uses data available in existing systems and provides some translations currently unavailable.

  3. A network of peers and practices for addressing Learner Variability: UDLnet.

    Science.gov (United States)

    Riviou, Katerina; Kouroupetroglou, Georgios; Oikonomidis, Nikolaos

    2015-01-01

    Grounded on new research in neuroscience and the Design for All principles, Universal Design for Learning (UDL) constitutes an educational approach that promotes access, participation and progress in the general curriculum for all learners. The difficulty is in all cases translating the UDL principles and guidelines into practice. Though the UDL policy context supports a shift to inclusion, professionals need more support to develop their practice. In order to bridge the gap between policies and practice the UDLnet network aspires to address this necessity collecting and creating good practices under the framework of Universal Design for Learning. This paper presents the UDLnet project, its aims, the methodological framework, as well as the envisaged themes. UDLnet is a European network that aims to contribute to the improvement of teachers' practice in all areas of their work, combining ICT skills with UDL-based innovations in pedagogy, curriculum, and institutional organization.

  4. Analytical modeling of address allocation protocols in wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Ahmad Radaideh

    2011-09-01

    Full Text Available Detailed descriptions of Internet Protocol Address Assignment (IPAA and Mobile Ad Hoc Network Configuration (MANETconf are presented and state diagrams for their behavior are constructed. Formulae for the expected latency and communication overhead of the IPAA protocol are derived, with the results being given as functions of the number of nodes in the network with message loss rate, contention window size, coverage ratio, and the counter threshold as parameters. Simulation is used to validate the analytical results and also to compare performance of the two protocols. The results show that the latency and communication overhead for MANETconf are significantly higher than the measures of the IPAA protocol. Results of extensive sensitivity analyses for the IPAA protocol are also presented.

  5. Network-oriented modeling addressing complexity of cognitive, affective and social interactions

    CERN Document Server

    Treur, Jan

    2016-01-01

    This book presents a new approach that can be applied to complex, integrated individual and social human processes. It provides an alternative means of addressing complexity, better suited for its purpose than and effectively complementing traditional strategies involving isolation and separation assumptions. Network-oriented modeling allows high-level cognitive, affective and social models in the form of (cyclic) graphs to be constructed, which can be automatically transformed into executable simulation models. The modeling format used makes it easy to take into account theories and findings about complex cognitive and social processes, which often involve dynamics based on interrelating cycles. Accordingly, it makes it possible to address complex phenomena such as the integration of emotions within cognitive processes of all kinds, of internal simulations of the mental processes of others, and of social phenomena such as shared understandings and collective actions. A variety of sample models – including ...

  6. Scientific networking to address the causes, timing, emplacement mechanisms, and consequences of the Messinian Salinity Crisis

    Science.gov (United States)

    Camerlenghi, Angelo; Lofi, Johanna; Aloisi, Vanni; Flecker, Rachel

    2017-04-01

    The origin of the Mediterranean salt giant is linked to an extraordinary event in the geological history of the Mediterranean region, commonly referred to as the Messinian Salinity Crisis (MSC). After 45 years of intense yet disunited research efforts, the international scientific community at large faces a unique opportunity to access the deep and marginal basins Messinian depositional successions in the Mediterranean through scientific drilling, namely through the Integrated Ocean Discovery Program (IODP) and the International Continental Drilling Program (ICDP). Scientific activity to promote scientific drilling offshore and onshore is in progress under the broad umbrella of the Uncovering a Salt Giant' IODP Multi-Platform Drilling proposal, that has generated the Deep-Sea Records of the Messinian Salinity Crisis (DREAM) site-specific pre-proposal for riserless drilling on Messinian marginal basins and the related ICDP-IODP amphibious initiative Investigating Miocene Mediterranean- Atlantic gateway exchange (IMMAGE). Scientific networking has begun to establish a broad cross-disciplinary research community embracing geology, geophysics, geochemistry, microbiology, and paleoclimatology. Formal networking activities represent an opportunity for the scientific community to share objectives, data, expertise and tools with industry since there is considerable interest in oil and gas exploration, and consequent hazards, targeting the Mediterranean's deep salt deposits. With the acronym MEDSALT, we have established two networks working in close cooperation: (1) COST Action CA15103 Uncovering the Mediterranean salt giant (MEDSALT) (https://medsalt.eu/) is a 4-year long network established in May 2016 comprising scientific institutions from 28 states. This COST Action will provide an opportunity to develop further our knowledge of salt rock formation addressing four overarching scientific questions: a) What are the causes, timing and emplacement mechanisms of the

  7. Filling gaps in a large reserve network to address freshwater conservation needs.

    Science.gov (United States)

    Hermoso, Virgilio; Filipe, Ana Filipa; Segurado, Pedro; Beja, Pedro

    2015-09-15

    Freshwater ecosystems and biodiversity are among the most threatened at global scale, but efforts for their conservation have been mostly peripheral to terrestrial conservation. For example, Natura 2000, the world's largest network of protected areas, fails to cover adequately the distribution of rare and endangered aquatic species, and lacks of appropriate spatial design to make conservation for freshwater biodiversity effective. Here, we develop a framework to identify a complementary set of priority areas and enhance the conservation opportunities of Natura 2000 for freshwater biodiversity, using the Iberian Peninsula as a case study. We use a systematic planning approach to identify a minimum set of additional areas that would help i) adequately represent all freshwater fish, amphibians and aquatic reptiles at three different target levels, ii) account for key ecological processes derived from riverscape connectivity, and iii) minimize the impact of threats, both within protected areas and propagated from upstream unprotected areas. Addressing all these goals would need an increase in area between 7 and 46%, depending on the conservation target used and strength of connectivity required. These new priority areas correspond to subcatchments inhabited by endangered and range restricted species, as well as additional subcatchments required to improve connectivity among existing protected areas and to increase protection against upstream threats. Our study should help guide future revisions of the design of Natura 2000, while providing a framework to address deficiencies in reserve networks for adequately protecting freshwater biodiversity elsewhere. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. A Novel CAN Tree Coordinate Routing in Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao Li

    2014-09-01

    Full Text Available In this paper, we propose a novel approach to improve coordination routing while minimizing the maintenance overhead during nodes churn. It bases on “CAN Tree Routing for Content- Addressable Network” 1 which is a solution for peer-to-peer routing. We concentrated on coordinate routing in this paper. The key idea of our approach is a recursion process to calculate target zone code and search in CAN tree 1. Because the hops are via long links in CAN, it enhances routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is , which is much better than a uniform greedy routing, while each node maintains two long links in average.

  9. Addressing practical challenges in utility optimization of mobile wireless sensor networks

    Science.gov (United States)

    Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin

    2008-04-01

    This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.

  10. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    tion well with fixed infrastructure and stable links where routes are maintained to enable all-to-all unicast connections. While cellular networks...each collaborative group can tune the network for its tolerances. C. Dynamic Network Adaptation In traditional IP networks, routing parameters such as...enables dynamic network adaptation on a per-group basis, giving greater fidelity in tactical mission planning. D. Group ID Mapping In GCN, interest

  11. Addressing challenges for future strategic-level emergency management: reframing, networking, and capacity-building.

    Science.gov (United States)

    Bosomworth, Karyn; Owen, Christine; Curnin, Steven

    2017-04-01

    The mounting frequency and intensity of natural hazards, alongside growing interdependencies between social-technical and ecological systems, are placing increased pressure on emergency management. This is particularly true at the strategic level of emergency management, which involves planning for and managing non-routine, high-consequence events. Drawing on the literature, a survey, and interviews and workshops with Australia's senior emergency managers, this paper presents an analysis of five core challenges that these pressures are creating for strategic-level emergency management. It argues that emphasising 'emergency management' as a primary adaptation strategy is a retrograde step that ignores the importance of addressing socio-political drivers of vulnerabilities. Three key suggestions are presented that could assist the country's strategic-level emergency management in tackling these challenges: (i) reframe emergency management as a component of disaster risk reduction rather than them being one and the same; (ii) adopt a network governance approach; and (iii) further develop the capacities of strategic-level emergency managers. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  12. Networks, Norms, and Trust: The Social Psychology of Social Capital. 2004 Cooley Mead Award Address

    Science.gov (United States)

    Cook, Karen Schweers

    2005-01-01

    Networks of trust relations often emerge under conditions of uncertainty or risk to facilitate social exchange. Under some conditions, such networks represent a form of social capital that can be mobilized in support of general social cooperation in the society. Under other conditions, however, such networks may have negative effects on the degree…

  13. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...... be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework...

  14. Design Guidelines to Address Global Challenges: Lessons from Global Action Networks

    OpenAIRE

    Steve Waddell

    2012-01-01

    Traditional organizations appear to be incapable of adequately addressing critical global issues such as war, climate change, and economic inequality. Addressing these issues suggests the need for organizational innovation to develop global social contracts. Successful innovation must address four integration imperatives: (1) integrate effort and resources across organizational sectors (business, government, civil society) and sense-making, (2) create successful individual to global aggregati...

  15. GA2LEN (Global Allergy and Asthma European Network) addresses the allergy and asthma 'epidemic'

    DEFF Research Database (Denmark)

    Bousquet, J; Burney, P G; Zuberbier, T

    2009-01-01

    Allergic diseases represent a major health problem in Europe. They are increasing in prevalence, severity and costs. The Global Allergy and Asthma European Network (GA(2)LEN), a Sixth EU Framework Program for Research and Technological Development (FP6) Network of Excellence, was created in 2005 ...

  16. FLASH: a fast look-up algorithm for string homology.

    Science.gov (United States)

    Califano, A; Rigoutsos, I

    1993-01-01

    A key issue in managing today's large amounts of genetic data is the availability of efficient, accurate, and selective techniques for detecting homologies (similarities) between newly discovered and already stored sequences. A common characteristic of today's most advanced algorithms, such as FASTA, BLAST, and BLAZE is the need to scan the contents of the entire database, in order to find one or more matches. This design decision results in either excessively long search times or, as is the case of BLAST, in a sharp trade-off between the achieved accuracy and the required amount of computation. The homology detection algorithm presented in this paper, on the other hand, is based on a probabilistic indexing framework. The algorithm requires minimal access to the database in order to determine matches. This minimal requirement is achieved by using the sequences of interest to generate a highly redundant number of very descriptive tuples; these tuples are subsequently used as indices in a table look-up paradigm. In addition to the description of the algorithm, theoretical and experimental results on the sensitivity and accuracy of the suggested approach are provided. The storage and computational requirements are described and the probability of correct matches and false alarms is derived. Sensitivity and accuracy are shown to be close to those of dynamic programming techniques. A prototype system has been implemented using the described ideas. It contains the full Swiss-Prot database rel 25 (10 MR) and the genome of E. Coli (2 MR). The system is currently being expanded to include the complete Genbank database.(ABSTRACT TRUNCATED AT 250 WORDS)

  17. MetaFlow: a Scalable Metadata Lookup Service for Distributed File Systems in Data Centers

    OpenAIRE

    Sun, Peng; Wen, Yonggang; Duong, Ta Nguyen Binh; Xie, Haiyong

    2016-01-01

    In large-scale distributed file systems, efficient meta- data operations are critical since most file operations have to interact with metadata servers first. In existing distributed hash table (DHT) based metadata management systems, the lookup service could be a performance bottleneck due to its significant CPU overhead. Our investigations showed that the lookup service could reduce system throughput by up to 70%, and increase system latency by a factor of up to 8 compared to ideal scenario...

  18. The effect of DAD timeout period on address autoconfiguration in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2011-09-01

    Full Text Available . These approaches can be categorized as either being stateful or stateless. Stateless protocols employ a Duplicate Address Detection (DAD) mechanism during the auto-configuration process. Using this mechanism, new nodes generate their own IP address and broadcast a...

  19. Creative Coercion in Post-Katrina New Orleans: a Neighborhood Strategy to Address Conflict in Networks

    Directory of Open Access Journals (Sweden)

    Stephen Danley

    2015-03-01

    Full Text Available The study of relationships within networks has traditionally focused on concepts such as cooperation, collaboration and other forms of partnership (Brown & Keast 2003. The assumption has been that actors in a network have shared vision and are working together. This study tests that idea by using mixed methods and ethnography to examine 15 neighborhood associations in post-Katrina New Orleans, and 71 of their relationships within policy networks. Contrary to our typical understanding of networks, neighborhood associations engage not just in partnership, but also in power struggles. When excluded from policy networks, neighborhood associations use creative coercion to ensure their voice is heard. Facing a power deficit, these associations look for informal levers to assert themselves into policy negotiation. The result is creative and coercive measures, such as co-opting elections, bribery, blackmail and what one neighborhood activist calls ‘guerrilla warfare.’ These conflicts force a reconsideration of networks. Networks are not solely homes of collaborative action; they are also the location of sharp power struggles over priorities.

  20. IMPLEMENTASI NETWORK ADDRESS TRANSLATION (NAT MENGGUNAKAN KERIO CONTROL VERSI 7.4.1 DI PUSAT PENELITIAN BIOTEKNOLOGI – LIPI

    Directory of Open Access Journals (Sweden)

    Tutang Tutang

    2016-03-01

    Full Text Available Biotechnology Research Center as an institution engaged in the research, the need for data and updated information is an absolute thing. This requirement can be met one of them is the use of information technology either by using the internet. With the increasing number of Internet users in Biotechnology Research Center and order for all users who are members of the Local Area Network (LAN can utilize the internet needed a good network management. While, during the network management Indonesian Institute of Sciences (LIPI, under the supervision of the Joint Network Team (TGJ – LIPI only provide one local IP segment which is limited to only 250 users. While number of internet users in Biotechnology Research Center and more than that number will continue to grow. To overcome these problems, then the LAN network at the Research Center for Biotechnology service facility utilizes Network Address Translation (NAT contained in Kerio Control software version 7.4.1. The subject of this article is limited to the implementation and configuration of NAT using Kerio Control 7.4.1 version. From these results, we concluded that the implementation of NAT helps all users in the network LAN Biotechnology Research Center get Public IP, so that it can connect to the internet properly.

  1. Addressing the Movement of a Freescale Robotic Car Using Neural Network

    Science.gov (United States)

    Horváth, Dušan; Cuninka, Peter

    2016-12-01

    This article deals with the management of a Freescale small robotic car along the predefined guide line. Controlling of the direction of movement of the robot is performed by neural networks, and scales (memory) of neurons are calculated by Hebbian learning from the truth tables as learning with a teacher. Reflexive infrared sensors serves as inputs. The results are experiments, which are used to compare two methods of mobile robot control - tracking lines.

  2. Addressing the Movement of a Freescale Robotic Car Using Neural Network

    Directory of Open Access Journals (Sweden)

    Horváth Dušan

    2016-12-01

    Full Text Available This article deals with the management of a Freescale small robotic car along the predefined guide line. Controlling of the direction of movement of the robot is performed by neural networks, and scales (memory of neurons are calculated by Hebbian learning from the truth tables as learning with a teacher. Reflexive infrared sensors serves as inputs. The results are experiments, which are used to compare two methods of mobile robot control - tracking lines.

  3. Secure Naming and Addressing Operations for Store, Carry and Forward Networks

    Science.gov (United States)

    Eddy, Wesley M.; Ivancic, William D.; Iannicca, Dennis C.; Ishac, Joseph; Hylton, Alan G.

    2014-01-01

    This paper describes concepts for secure naming and addressing directed at Store, Carry and Forward (SCF) distributed applications, where disconnection and intermittent connectivity between forwarding systems is the norm. The paper provides a brief overview of store, carry and forward distributed applications followed by an in depth discussion of how to securely: create a namespace; allocate names within the namespace; query for names known within a local processing system or connected subnetwork; validate ownership of a given name; authenticate data from a given name; and, encrypt data to a given name. Critical issues such as revocation of names, mobility and the ability to use various namespaces to secure operations or for Quality-of-Service are also presented. Although the concepts presented for naming and addressing have been developed for SCF, they are directly applicable to fully connected systems.

  4. Implementation of an advanced table look-up classifier for large area land-use classification

    Science.gov (United States)

    Jones, C.

    1974-01-01

    Software employing Eppler's improved table look-up approach to pattern recognition has been developed, and results from this software are presented. The look-up table for each class is a computer representation of a hyperellipsoid in four dimensional space. During implementation of the software Eppler's look-up procedure was modified to include multiple ranges in order to accommodate hollow regions in the ellipsoids. In a typical ERTS classification run less than 6000 36-bit computer words were required to store tables for 24 classes. Classification results from the improved table look-up are identical with those produced by the conventional method, i.e., by calculation of the maximum likelihood decision rule at the moment of classification. With the new look-up approach an entire ERTS MSS frame can be classified into 24 classes in 1.3 hours, compared to 22.5 hours required by the conventional method. The new software is coded completely in FORTRAN to facilitate transfer to other digital computers.

  5. Architectures of electro-optical packet switched networks

    DEFF Research Database (Denmark)

    Berger, Michael Stubert

    2004-01-01

    of an additional speedup of 10%. Lastly, the address lookup and classification problem is addressed, and an IP lookup algorithm with low memory requirement and fast updates is presented. The scheme uses a combination of trie and tree search, which is efficient in memory usage because the structure contains exactly...

  6. Addressing a Paradox: Dual Strategies for Creative Performance in Introspective and Extrospective Networks.

    Science.gov (United States)

    Pinho, Ana Luísa; Ullén, Fredrik; Castelo-Branco, Miguel; Fransson, Peter; de Manzano, Örjan

    2016-07-01

    Neuroimaging studies of internally generated behaviors have shown seemingly paradoxical results regarding the dorsolateral prefrontal cortex (DLPFC), which has been found to activate, not activate or even deactivate relative to control conditions. On the one hand, the DLPFC has been argued to exert top-down control over generative thought by inhibiting habitual responses; on the other hand, a deactivation and concomitant decrease in monitoring and focused attention has been suggested to facilitate spontaneous associations and novel insights. Here, we demonstrate that prefrontal engagement in creative cognition depends dramatically on experimental conditions, that is, the goal of the task. We instructed professional pianists to perform improvisations on a piano keyboard during fMRI and play, either with a certain emotional content (happy/fearful), or using certain keys (tonal/atonal pitch-sets). We found lower activity in primarily the right DLPFC, dorsal premotor cortex and inferior parietal cortex during emotional conditions compared with pitch-set conditions. Furthermore, the DLPFC was functionally connected to the default mode network during emotional conditions and to the premotor network during pitch-set conditions. The results thus support the notion of two broad cognitive strategies for creative problem solving, relying on extrospective and introspective neural circuits, respectively. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  7. Vocal imitation in parrots allows addressing of specific individuals in a dynamic communication network.

    Directory of Open Access Journals (Sweden)

    Thorsten J S Balsby

    Full Text Available Parrots in captivity are known for their ability to vocally imitate humans and recently it has been shown that wild-living orange-fronted conures are able to immediately imitate other individuals' contact calls. The function of this exceptional ability to imitate remains unclear. However, orange-fronted conures live in fission-fusion flocks where they encounter many different individuals every day, and it is possible that their vocal imitation ability is a flexible means to address a specific individual within a flock. We tested this via playback to short-term captive wild conures. Test birds were placed together in pairs in outdoor aviaries to form simple flocks. To simulate imitation of a specific individual these pairs received playback of contact calls that primarily imitate one of the two birds. Overall, individuals that received simulated vocal imitations of its calls responded more frequently and faster than the other individual. This suggests that orange-fronted conures can use imitations of contact calls to address specific individuals of a flock. In the discussion we argue that the fission-fusion flock dynamics of many parrot species has been an important factor in evolving conures' and other parrots' exceptional ability to imitate.

  8. Vocal imitation in parrots allows addressing of specific individuals in a dynamic communication network.

    Science.gov (United States)

    Balsby, Thorsten J S; Momberg, Jane Vestergaard; Dabelsteen, Torben

    2012-01-01

    Parrots in captivity are known for their ability to vocally imitate humans and recently it has been shown that wild-living orange-fronted conures are able to immediately imitate other individuals' contact calls. The function of this exceptional ability to imitate remains unclear. However, orange-fronted conures live in fission-fusion flocks where they encounter many different individuals every day, and it is possible that their vocal imitation ability is a flexible means to address a specific individual within a flock. We tested this via playback to short-term captive wild conures. Test birds were placed together in pairs in outdoor aviaries to form simple flocks. To simulate imitation of a specific individual these pairs received playback of contact calls that primarily imitate one of the two birds. Overall, individuals that received simulated vocal imitations of its calls responded more frequently and faster than the other individual. This suggests that orange-fronted conures can use imitations of contact calls to address specific individuals of a flock. In the discussion we argue that the fission-fusion flock dynamics of many parrot species has been an important factor in evolving conures' and other parrots' exceptional ability to imitate.

  9. Application of the Critical Heat Flux Look-Up Table to Large Diameter Tubes

    Directory of Open Access Journals (Sweden)

    M. El Nakla

    2013-01-01

    Full Text Available The critical heat flux look-up table was applied to a large diameter tube, namely 67 mm inside diameter tube, to predict the occurrence of the phenomenon for both vertical and horizontal uniformly heated tubes. Water was considered as coolant. For the vertical tube, a diameter correction factor was directly applied to the 1995 critical heat flux look-up table. To predict the occurrence of critical heat flux in horizontal tube, an extra correction factor to account for flow stratification was applied. Both derived tables were used to predict the effect of high heat flux and tube blockage on critical heat flux occurrence in boiler tubes. Moreover, the horizontal tube look-up table was used to predict the safety limits of the operation of boiler for 50% allowable heat flux.

  10. State of the (net)work address Developing criteria for applying social networking to the work environment.

    Science.gov (United States)

    Valdez, André Calero; Schaar, Anne Kathrin; Ziefle, Martina

    2012-01-01

    In an increasingly faster paced innovative world, maintaining the ability to innovate in spite of an aging work force will become every company's strongest leverage for success. Tapping the latent knowledge resources and creativity of overlooked employees and persisting crucial information for business conduct are promising results for social networking sites (SNS) in a working context. Usability and usefulness are exponential factors in creating a successful SNS. In order to make a SNS usable for a heterogeneous user group, analyses of user diversity in regard to social media need to be done. Furthermore differences in communication medium and frequency in regard to age, content, hierarchy position, departmental thresholds and company size need to be analyzed. For analysis purposes both qualitative and quantitative research methods were applied. Strong effects of age and communication content were found in survey with 194 participants.

  11. Vocal Imitation in Parrots Allows Addressing of Specific Individuals in a Dynamic Communication Network

    DEFF Research Database (Denmark)

    Balsby, T.J.S.; Momberg, J.V.; Dabelsteen, T.

    2012-01-01

    Parrots in captivity are known for their ability to vocally imitate humans and recently it has been shown that wild-living orange-fronted conures are able to immediately imitate other individuals´ contact calls. The function of this exceptional ability to imitate remains unclear. However, orangeâ......€“fronted conures live in fission-fusion flocks where they encounter many different individuals every day, and it is possible that their vocal imitation ability is a flexible means to address a specific individual within a flock. We tested this via playback to short-term captive wild conures. Test birds were placed...... together in pairs in outdoor aviaries to form simple flocks. To simulate imitation of a specific individual these pairs received playback of contact calls that primarily imitate one of the two birds. Overall, individuals that received simulated vocal imitations of its calls responded more frequently...

  12. Improving the dictionary lookup approach for disease normalization using enhanced dictionary and query expansion.

    Science.gov (United States)

    Jonnagaddala, Jitendra; Jue, Toni Rose; Chang, Nai-Wen; Dai, Hong-Jie

    2016-01-01

    The rapidly increasing biomedical literature calls for the need of an automatic approach in the recognition and normalization of disease mentions in order to increase the precision and effectivity of disease based information retrieval. A variety of methods have been proposed to deal with the problem of disease named entity recognition and normalization. Among all the proposed methods, conditional random fields (CRFs) and dictionary lookup method are widely used for named entity recognition and normalization respectively. We herein developed a CRF-based model to allow automated recognition of disease mentions, and studied the effect of various techniques in improving the normalization results based on the dictionary lookup approach. The dataset from the BioCreative V CDR track was used to report the performance of the developed normalization methods and compare with other existing dictionary lookup based normalization methods. The best configuration achieved an F-measure of 0.77 for the disease normalization, which outperformed the best dictionary lookup based baseline method studied in this work by an F-measure of 0.13.Database URL: https://github.com/TCRNBioinformatics/DiseaseExtract. © The Author(s) 2016. Published by Oxford University Press.

  13. Effect of menus on EFL learners' look-up processes | Tono | Lexikos

    African Journals Online (AJOL)

    This paper emphasizes the importance of empirical research on dictionary users and, in particular, investigates the effect of the so-called "menu" (a list of definitions at the beginning of a polysemous article) on the EFL (English as a Foreign Language) learners' dictionary look-up processes. The menu has been increasingly ...

  14. An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n. This paper presents a concept to extend existing approximate matching algorithms, which reduces the lookup complexity from O(n to O(log(n. Our proposed approach is based on the well-known divide and conquer paradigm and builds a Bloom filter-based tree data structure in order to enable an efficient lookup of similarity digests. Further, it is demonstrated that the presented technique is highly scalable operating a trade-off between storage requirements and computational efficiency. We perform a theoretical assessment based on recently published results and reasonable magnitudes of input data, and show that the complexity reduction achieved by the proposed technique yields a 220-fold acceleration of look-up costs.

  15. OLS Dialog: An open-source front end to the Ontology Lookup Service

    Directory of Open Access Journals (Sweden)

    Eidhammer Ingvar

    2010-01-01

    Full Text Available Abstract Background With the growing amount of biomedical data available in public databases it has become increasingly important to annotate data in a consistent way in order to allow easy access to this rich source of information. Annotating the data using controlled vocabulary terms and ontologies makes it much easier to compare and analyze data from different sources. However, finding the correct controlled vocabulary terms can sometimes be a difficult task for the end user annotating these data. Results In order to facilitate the location of the correct term in the correct controlled vocabulary or ontology, the Ontology Lookup Service was created. However, using the Ontology Lookup Service as a web service is not always feasible, especially for researchers without bioinformatics support. We have therefore created a Java front end to the Ontology Lookup Service, called the OLS Dialog, which can be plugged into any application requiring the annotation of data using controlled vocabulary terms, making it possible to find and use controlled vocabulary terms without requiring any additional knowledge about web services or ontology formats. Conclusions As a user-friendly open source front end to the Ontology Lookup Service, the OLS Dialog makes it straightforward to include controlled vocabulary support in third-party tools, which ultimately makes the data even more valuable to the biomedical community.

  16. Cache directory lookup reader set encoding for partial cache line speculation support

    Science.gov (United States)

    Gara, Alan; Ohmacht, Martin

    2014-10-21

    In a multiprocessor system, with conflict checking implemented in a directory lookup of a shared cache memory, a reader set encoding permits dynamic recordation of read accesses. The reader set encoding includes an indication of a portion of a line read, for instance by indicating boundaries of read accesses. Different encodings may apply to different types of speculative execution.

  17. Enhancing continental-scale understanding of agriculture: Integrating the National Ecological Observatory Network (NEON) with existing research networks to address global change.

    Science.gov (United States)

    Kelly, G.

    2015-12-01

    Over the past decade, there has been a resurgence of interest in the sustainability of the world's food system and its contributions to feeding the world's population as well as to ensuring environmental sustainability of the planet. The elements of this grand challenge are by now well known. Analysis of agricultural sustainability is made more challenging by the fact that the local responses to these global drivers of change are extremely variable in space and time due to the biophysical and geopolitical heterogeneity across the United States, and the world. Utilizing research networks allows the scientific community to leverage existing knowledge, models and data to develop a framework for understanding the interplay between global change drivers, regional, and continental sustainability of US agriculture. For example, well-established instrumented and calibrated research networks will allow for the examination of the potential tradeoffs between: 1) crop production, 2) land use and carbon emissions and sequestration, 3) groundwater depletion, and 4) nitrogen dynamics. NEON represents a major investment in scientific infrastructure in support of ecological research at a continental scale and is intended to address multiple ecological grand challenges. NEON will collect data from automated sensors and sample organisms and ecological variables in 20 eco-climatic domains. We will provide examples of how NEON's full potential can be realized when these data are combined with long term experimental results and other sensor networks [e.g., Ameriflux, Fluxnet, the Long-term Ecological Research Program (LTER), the Long-term Agroecosystem Research Network (LTAR)], Critical Zone Observatory (CZO).

  18. Vision-based technique for circle detection and measurement using lookup table and bitwise center accumulator.

    Science.gov (United States)

    Yu, Hancheng; Wang, Tuo

    2017-03-01

    In this paper, we proposed a fast algorithm for circle detection and measurement, which uses a lookup table and bitwise center accumulator (LUT-BCA). The LUT-BCA is a two-stage procedure. The first stage determines the candidate circle centers with normal lines produced by the lookup table and recorded by the bitwise center accumulator. The second stage computes the radius of each candidate circle center and validates these centers, which eliminates the false detections. The proposed LUT-BCA can also be easily implemented on massively parallel high-performance graphics hardware using the compute unified device architecture. Experimental results indicate that the LUT-BCA can locate circle centers and measure their radii accurately and is very suitable for real-time circle detection and measurement.

  19. Improved look-up table method of computer-generated holograms.

    Science.gov (United States)

    Wei, Hui; Gong, Guanghong; Li, Ni

    2016-11-10

    Heavy computation load and vast memory requirements are major bottlenecks of computer-generated holograms (CGHs), which are promising and challenging in three-dimensional displays. To solve these problems, an improved look-up table (LUT) method suitable for arbitrarily sampled object points is proposed and implemented on a graphics processing unit (GPU) whose reconstructed object quality is consistent with that of the coherent ray-trace (CRT) method. The concept of distance factor is defined, and the distance factors are pre-computed off-line and stored in a look-up table. The results show that while reconstruction quality close to that of the CRT method is obtained, the on-line computation time is dramatically reduced compared with the LUT method on the GPU and the memory usage is lower than that of the novel-LUT considerably. Optical experiments are carried out to validate the effectiveness of the proposed method.

  20. Optical Digital Parallel Truth-Table Look-Up Processing

    Science.gov (United States)

    Mirsalehi, Mir Mojtaba

    During the last decade, a number of optical digital processors have been proposed that combine the parallelism and speed of optics with the accuracy and flexibility of a digital representation. In this thesis, two types of such processors (an EXCLUSIVE OR-based processor and a NAND-based processor) that function as content-addressable memories (CAM's) are analyzed. The main factors that affect the performance of the EXCLUSIVE OR-based processor are found to be the Gaussian nature of the reference beam and the finite square aperture of the crystal. A quasi-one-dimensional model is developed to analyze the effect of the Gaussian reference beam, and a circular aperture is used to increase the dynamic range in the output power. The main factors that affect the performance of the NAND-based processor are found to be the variations in the amplitudes and the relative phase of the laser beams during the recording process. A mathematical model is developed for analyzing the probability of error in the output of the processor. Using this model, the performance of the processor for some practical cases is analyzed. Techniques that have been previously used to reduce the number of reference patterns in a CAM include: using the residue number system and applying logical minimization methods. In the present work, these and additional techniques are investigated. A systematic procedure is developed for selecting the optimum set of moduli. The effect of coding is investigated and it is shown that multi-level coding, when used in conjunction with logical minimization techniques, significantly reduces the number of reference patterns. The Quine-McCluskey method is extended to multiple -valued logic and a computer program based on this extension is used for logical minimization. The results show that for moduli expressable as p('n), where p is a prime number and n is an integer greater than one, p-level coding provides significant reduction. The NAND-based processor is modified for

  1. Quick Lookup Laptops in the Library: Leveraging Linux with a SLAX LiveCD

    Directory of Open Access Journals (Sweden)

    Kevin Beswick

    2008-03-01

    Full Text Available This article discusses the experiences over the past year at Laurentian University in deploying a Linux live CD solution to create customized kiosk browsers on 'quick lookup' laptops. This provides security, reliability, ease of use, and improved response time compared to other options. We explain why we chose this solution, reveal techniques we used to achieve some of our goals, and reflect on possible future iterations of this project.

  2. NKS - The Nordic region's cooperative network for addressing challenges in nuclear safety and emergency preparedness

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, K.G. [NKS/Technical University of Denmark (Denmark); Andgren, K. [NKS/Vattenfall R and D (Sweden); Leino, K. [NKS/Fortum Power and Heat Oy (Finland); Magnusson, S. [NKS/Icelandic Radiation Safety Authority (Iceland); Physant, F. [NKS/FRIT, Roskilde (Denmark)

    2014-07-01

    Based on the foundation of a common cultural and historical heritage and a long tradition of collaboration, NKS aims to facilitate a common Nordic view on nuclear and radiation safety. A common understanding of rules, practice and measures, and national differences in this context, is here an essential requirement. Problems can generally be tackled quicker, more efficiently, more consistently and at a lower cost through collaboration, bearing in mind that key competencies are not equally distributed in the different Nordic countries. For instance common Nordic challenges emerge in relation to nuclear installations, where nuclear power plants are in operation in Finland and Sweden, and research reactors have been operated in Denmark, Finland, Norway and Sweden. There is an obvious benefit in exchanging ideas and technologies in relation to plant operation, and since a number of reactors in different Nordic countries are under decommissioning, a collaborative benefit can also be realised in that context. Sweden also has a nuclear fuel production plant, and its collaboration with other Nordic nuclear installations can also be beneficial. Further, a number of large radiological installations are projected in Nordic areas (e.g., the MAX-LAB/MAX IV synchrotron radiation source and the European spallation source ESS), where Nordic organisations are collaborating in addressing, e.g., potential environmental implications. On the emergency preparedness side, the Fukushima accident in March 2011 was a reminder that large accidents at nuclear installations can lead to widespread radioactive contamination in the environment. In order to respond to nuclear or radiological emergencies, should they affect Nordic populations, it is necessary to maintain an operational emergency preparedness. By continuously improving detection, response and decision aiding tools while maintaining an informal collaborative network between relevant stakeholders in the Nordic countries (including

  3. Generation of Look-Up Tables for Dynamic Job Shop Scheduling Decision Support Tool

    Science.gov (United States)

    Oktaviandri, Muchamad; Hassan, Adnan; Mohd Shaharoun, Awaluddin

    2016-02-01

    Majority of existing scheduling techniques are based on static demand and deterministic processing time, while most job shop scheduling problem are concerned with dynamic demand and stochastic processing time. As a consequence, the solutions obtained from the traditional scheduling technique are ineffective wherever changes occur to the system. Therefore, this research intends to develop a decision support tool (DST) based on promising artificial intelligent that is able to accommodate the dynamics that regularly occur in job shop scheduling problem. The DST was designed through three phases, i.e. (i) the look-up table generation, (ii) inverse model development and (iii) integration of DST components. This paper reports the generation of look-up tables for various scenarios as a part in development of the DST. A discrete event simulation model was used to compare the performance among SPT, EDD, FCFS, S/OPN and Slack rules; the best performances measures (mean flow time, mean tardiness and mean lateness) and the job order requirement (inter-arrival time, due dates tightness and setup time ratio) which were compiled into look-up tables. The well-known 6/6/J/Cmax Problem from Muth and Thompson (1963) was used as a case study. In the future, the performance measure of various scheduling scenarios and the job order requirement will be mapped using ANN inverse model.

  4. Efficient generation of 3D hologram for American Sign Language using look-up table

    Science.gov (United States)

    Park, Joo-Sup; Kim, Seung-Cheol; Kim, Eun-Soo

    2010-02-01

    American Sign Language (ASL) is one of the languages giving the greatest help for communication of the hearing impaired person. Current 2-D broadcasting, 2-D movies are used the ASL to give some information, help understand the situation of the scene and translate the foreign language. These ASL will not be disappeared in future three-dimensional (3-D) broadcasting or 3-D movies because the usefulness of the ASL. On the other hands, some approaches for generation of CGH patterns have been suggested like the ray-tracing method and look-up table (LUT) method. However, these methods have some drawbacks that needs much time or needs huge memory size for look-up table. Recently, a novel LUT (N-LUT) method for fast generation of CGH patterns of 3-D objects with a dramatically reduced LUT without the loss of computational speed was proposed. Therefore, we proposed the method to efficiently generate the holographic ASL in holographic 3DTV or 3-D movies using look-up table method. The proposed method is largely consisted of five steps: construction of the LUT for each ASL images, extraction of characters in scripts or situation, call the fringe patterns for characters in the LUT for each ASL, composition of hologram pattern for 3-D video and hologram pattern for ASL and reconstruct the holographic 3D video with ASL. Some simulation results confirmed the feasibility of the proposed method in efficient generation of CGH patterns for ASL.

  5. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  6. Retrieval of aerosol optical depth from surface solar radiation measurements using machine learning algorithms, non-linear regression and a radiative transfer-based look-up table

    Directory of Open Access Journals (Sweden)

    J. Huttunen

    2016-07-01

    Full Text Available In order to have a good estimate of the current forcing by anthropogenic aerosols, knowledge on past aerosol levels is needed. Aerosol optical depth (AOD is a good measure for aerosol loading. However, dedicated measurements of AOD are only available from the 1990s onward. One option to lengthen the AOD time series beyond the 1990s is to retrieve AOD from surface solar radiation (SSR measurements taken with pyranometers. In this work, we have evaluated several inversion methods designed for this task. We compared a look-up table method based on radiative transfer modelling, a non-linear regression method and four machine learning methods (Gaussian process, neural network, random forest and support vector machine with AOD observations carried out with a sun photometer at an Aerosol Robotic Network (AERONET site in Thessaloniki, Greece. Our results show that most of the machine learning methods produce AOD estimates comparable to the look-up table and non-linear regression methods. All of the applied methods produced AOD values that corresponded well to the AERONET observations with the lowest correlation coefficient value being 0.87 for the random forest method. While many of the methods tended to slightly overestimate low AODs and underestimate high AODs, neural network and support vector machine showed overall better correspondence for the whole AOD range. The differences in producing both ends of the AOD range seem to be caused by differences in the aerosol composition. High AODs were in most cases those with high water vapour content which might affect the aerosol single scattering albedo (SSA through uptake of water into aerosols. Our study indicates that machine learning methods benefit from the fact that they do not constrain the aerosol SSA in the retrieval, whereas the LUT method assumes a constant value for it. This would also mean that machine learning methods could have potential in reproducing AOD from SSR even though SSA would have

  7. Expanding the National Drug Abuse Treatment Clinical Trials Network to address the management of substance use disorders in general medical settings

    Directory of Open Access Journals (Sweden)

    Tai B

    2014-07-01

    Full Text Available Betty Tai, Steven Sparenborg, Udi E Ghitza, David Liu Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, Maryland, USA Abstract: The Patient Protection and Affordable Care Act (2010 and the Mental Health Parity and Addiction Equity Act (2008 expand substance use disorder (SUD care services in the USA into general medical settings. Care offered in these settings will engage substance-using patients in an integrated and patient-centered environment that addresses physical and mental health comorbidities and follows a chronic care model. This expansion of SUD services presents a great need for evidence-based practices useful in general medical settings, and reveals several research gaps to be addressed. The National Drug Abuse Treatment Clinical Trials Network of the National Institute on Drug Abuse can serve an important role in this endeavor. High-priority research gaps are highlighted in this commentary. A discussion follows on how the National Drug Abuse Treatment Clinical Trials Network can transform to address changing patterns in SUD care to efficiently generate evidence to guide SUD treatment practice within the context of recent US health care legislation. Keywords: Patient Protection and Affordable Care Act, National Drug Abuse Treatment Clinical Trials Network, substance use disorders, practice-based research network, electronic health records

  8. A source-controlled data center network model.

    Directory of Open Access Journals (Sweden)

    Yang Yu

    Full Text Available The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1 The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2 Vector switches (VS developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3 The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4 We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  9. A source-controlled data center network model.

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  10. A source-controlled data center network model

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS. PMID:28328925

  11. Moving from theory to practice: A participatory social network mapping approach to address unmet need for family planning in Benin.

    Science.gov (United States)

    Igras, Susan; Diakité, Mariam; Lundgren, Rebecka

    2017-07-01

    In West Africa, social factors influence whether couples with unmet need for family planning act on birth-spacing desires. Tékponon Jikuagou is testing a social network-based intervention to reduce social barriers by diffusing new ideas. Individuals and groups judged socially influential by their communities provide entrée to networks. A participatory social network mapping methodology was designed to identify these diffusion actors. Analysis of monitoring data, in-depth interviews, and evaluation reports assessed the methodology's acceptability to communities and staff and whether it produced valid, reliable data to identify influential individuals and groups who diffuse new ideas through their networks. Results indicated the methodology's acceptability. Communities were actively and equitably engaged. Staff appreciated its ability to yield timely, actionable information. The mapping methodology also provided valid and reliable information by enabling communities to identify highly connected and influential network actors. Consistent with social network theory, this methodology resulted in the selection of informal groups and individuals in both informal and formal positions. In-depth interview data suggest these actors were diffusing new ideas, further confirming their influence/connectivity. The participatory methodology generated insider knowledge of who has social influence, challenging commonly held assumptions. Collecting and displaying information fostered staff and community learning, laying groundwork for social change.

  12. Leveraging social influence to address overweight and obesity using agent-based models: the role of adolescent social networks.

    Science.gov (United States)

    Zhang, J; Tong, L; Lamberson, P J; Durazo-Arvizu, R A; Luke, A; Shoham, D A

    2015-01-01

    The prevalence of adolescent overweight and obesity (hereafter, simply "overweight") in the US has increased over the past several decades. Individually-targeted prevention and treatment strategies targeting individuals have been disappointing, leading some to propose leveraging social networks to improve interventions. We hypothesized that social network dynamics (social marginalization; homophily on body mass index, BMI) and the strength of peer influence would increase or decrease the proportion of network member (agents) becoming overweight over a simulated year, and that peer influence would operate differently in social networks with greater overweight. We built an agent-based model (ABM) using results from R-SIENA. ABMs allow for the exploration of potential interventions using simulated agents. Initial model specifications were drawn from Wave 1 of the National Longitudinal Study of Adolescent Health (Add Health). We focused on a single saturation school with complete network and BMI data over two waves (n = 624). The model was validated against empirical observations at Wave 2. We focused on overall overweight prevalence after a simulated year. Five experiments were conducted: (1) changing attractiveness of high-BMI agents; (2) changing homophily on BMI; (3) changing the strength of peer influence; (4) shifting the overall BMI distribution; and (5) targeting dietary interventions to highly connected individuals. Increasing peer influence showed a dramatic decrease in the prevalence of overweight; making peer influence negative (i.e., doing the opposite of friends) increased overweight. However, the effect of peer influence varied based on the underlying distribution of BMI; when BMI was increased overall, stronger peer influence increased proportion of overweight. Other interventions, including targeted dieting, had little impact. Peer influence may be a viable target in overweight interventions, but the distribution of body size in the population needs to

  13. The Mountain Invasion Research Network (MIREN): Linking Local and Global Scales for Addressing an Ecological Consequence of Global Change

    Science.gov (United States)

    Christoph Kueffer; Curtis Daehler; Hansjörg Dietz; Keith McDougall; Catherine Parks; Aníbal Pauchard; Lisa Rew

    2014-01-01

    Many modern environmental problems span vastly different spatial scales, from the management of local ecosystems to understanding globally interconnected processes, and addressing them through international policy. MIREN tackles one such “glocal” (global/local) environmental problem – plant invasions in mountains – through a transdisciplinary, multi-scale learning...

  14. A Table Lookup Method for Exact Analytical Solutions of Nonlinear Fractional Partial Differential Equations

    Directory of Open Access Journals (Sweden)

    Ji Juan-Juan

    2017-01-01

    Full Text Available A table lookup method for solving nonlinear fractional partial differential equations (fPDEs is proposed in this paper. Looking up the corresponding tables, we can quickly obtain the exact analytical solutions of fPDEs by using this method. To illustrate the validity of the method, we apply it to construct the exact analytical solutions of four nonlinear fPDEs, namely, the time fractional simplified MCH equation, the space-time fractional combined KdV-mKdV equation, the (2+1-dimensional time fractional Zoomeron equation, and the space-time fractional ZKBBM equation. As a result, many new types of exact analytical solutions are obtained including triangular periodic solution, hyperbolic function solution, singular solution, multiple solitary wave solution, and Jacobi elliptic function solution.

  15. Fast software-oriented hash function based on data-dependent lookup operations

    Directory of Open Access Journals (Sweden)

    Moldovyan N.A.

    2003-04-01

    Full Text Available The paper considers a method of the construction of the iterated hash function on the bases of the data-dependent lookup operations used previously in the design of the fast software suitable ciphers. To transform encryption function into a block one-way function we use the data-dependent initial condition at each transformation cycle of the round function except the first cycle. The variable initial conditions has been also used to strengthen chaining while constructing the iterated hash function. While fixing initial condition the round function can be transformed into a block cipher suitable to perform fast disk encryption. The size of the input data block of the round function and of the block cipher is parameterized defining their suitability for different practical applications.

  16. Addressing climate and energy misconceptions - teaching tools offered by the Climate Literacy and Energy Awareness Network (CLEAN)

    Science.gov (United States)

    Gold, A. U.; Ledley, T. S.; Kirk, K. B.; Grogan, M.; McCaffrey, M. S.; Buhr, S. M.; Manduca, C. A.; Fox, S.; Niepold, F.; Howell, C.; Lynds, S. E.

    2011-12-01

    Despite a prevalence of peer-reviewed scientific research and high-level reports by intergovernmental agencies (e.g., IPCC) that document changes in our climate and consequences for human societies, the public discourse regards these topics as controversial and sensitive. The chasm between scientific-based understanding of climate systems and public understanding can most easily be addressed via high quality, science-based education on these topics. Well-trained and confident educators are required to provide this education. However, climate science and energy awareness are complex topics that are rapidly evolving and have a great potential for controversy. Furthermore, the interdisciplinary nature of climate science further increases the difficulty for teachers to stay abreast of the science and the policy. Research has shown that students and educators alike hold misconceptions about the climate system in general and the causes and effects of climate change in particular. The NSF-funded CLEAN Pathway (http://cleanet.org) as part of the National Science Digital Library (http://www.nsdl.org) strives to address these needs and help educators address misconceptions by providing high quality learning resources and professional development opportunities to support educators of grade levels 6 through 16. The materials focus on teaching climate science and energy use. The scope and framework of the CLEAN Pathway is defined by the Essential Principles of Climate Science (CCSP, 2009) and the Energy Literacy Principles recently developed by the Department of Energy. Following this literacy-based approach, CLEAN helps with developing mental models to address misconceptions around climate science and energy awareness through a number of different avenues. These are: 1) Professional development opportunities for educators - interactive webinars for secondary teachers and virtual workshops for college faculty, 2) A collection of scientifically and pedagogically reviewed, high

  17. Towards Terabit Carrier Ethernet and Energy Efficient Optical Transport Networks

    DEFF Research Database (Denmark)

    Rasmussen, Anders

    error correction and energy efficiency. Scheduling and address lookup are key functions and potential bottle necks in high speed network nodes, as the minimum packet/frame sizes in both the popular Ethernet protocol, as well as the Internet Protocol (IP) still remains constant (84B and 40B, respectively...... to squeeze more traffic onto the existing physical transmission systems. To do this, while keeping the bit error rate (BER) below acceptable levels, more advanced FEC schemes are required. This is a challenge: Not only do we need to increase the processing speed of the FEC to handle the higher throughputs....... The more advanced schemes also require more complex calculations to process each bit. This thesis will investigate how both the standard OTN FEC as well as more advanced FEC schemes can be implemented for 100G and above operation. As the networks are expanded to run at increasingly higher speeds...

  18. Understanding veterinary students' use of and attitudes toward the social networking site, Facebook, to assist in developing curricula to address online professionalism.

    Science.gov (United States)

    Coe, Jason B; Weijs, Cynthia A; Muise, Amy; Christofides, Emily; Desmarais, Serge

    2012-01-01

    Social media is an increasingly common form of communication, with Facebook being the preferred social-networking site among post-secondary students. Numerous studies suggest post-secondary students practice high self-disclosure on Facebook. Research evaluating veterinary students' use of social media found a notable proportion of student-posted content deemed inappropriate. Lack of discretion in posting content can have significant repercussions for aspiring veterinary professionals, their college of study, and the veterinary profession they represent. Veterinarians-in-training at three veterinary colleges across Canada were surveyed to explore their use of and attitude toward the social networking site, Facebook. Students were invited to complete an online survey with questions relating to their knowledge of privacy in relation to using Facebook, their views on the acceptability of posting certain types of information, and their level of professional accountability online. Linear regression modeling was used to further examine factors related to veterinary students' disclosure of personal information on Facebook. Need for popularity (pstudents' personal disclosure of information on Facebook. Understanding veterinary students' use of and attitudes toward social media, such as Facebook, reveals a need, and provides a basis, for developing educational programs to address online professionalism. Educators and administrators at veterinary schools may use this information to assist in developing veterinary curricula that addresses the escalating issue of online professionalism.

  19. Efficient Lookup Table-Based Adaptive Baseband Predistortion Architecture for Memoryless Nonlinearity

    Directory of Open Access Journals (Sweden)

    Waheed Khurram

    2010-01-01

    Full Text Available Digital predistortion is an effective means to compensate for the nonlinear effects of a memoryless system. In case of a cellular transmitter, a digital baseband predistorter can mitigate the undesirable nonlinear effects along the signal chain, particularly the nonlinear impairments in the radiofrequency (RF amplifiers. To be practically feasible, the implementation complexity of the predistorter must be minimized so that it becomes a cost-effective solution for the resource-limited wireless handset. This paper proposes optimizations that facilitate the design of a low-cost high-performance adaptive digital baseband predistorter for memoryless systems. A comparative performance analysis of the amplitude and power lookup table (LUT indexing schemes is presented. An optimized low-complexity amplitude approximation and its hardware synthesis results are also studied. An efficient LUT predistorter training algorithm that combines the fast convergence speed of the normalized least mean squares (NLMSs with a small hardware footprint is proposed. Results of fixed-point simulations based on the measured nonlinear characteristics of an RF amplifier are presented.

  20. Fast generation of three-dimensional video holograms by combined use of data compression and lookup table techniques.

    Science.gov (United States)

    Kim, Seung-Cheol; Yoon, Jung-Hoon; Kim, Eun-Soo

    2008-11-10

    Even though there are many types of methods to generate CGH (computer-generated hologram) patterns of three-dimensional (3D) objects, most of them have been applied to still images but not to video images due to their computational complexity in applications of 3D video holograms. A new method for fast computation of CGH patterns for 3D video images is proposed by combined use of data compression and lookup table techniques. Temporally redundant data of the 3D video images are removed with the differential pulse code modulation (DPCM) algorithm, and then the CGH patterns for these compressed videos are generated with the novel lookup table (N-LUT) technique. To confirm the feasibility of the proposed method, some experiments with test 3D videos are carried out, and the results are comparatively discussed with the conventional methods in terms of the number of object points and computation time.

  1. Fast track-finding processor based on RAM look-up table for the VENUS detector at KEK

    Energy Technology Data Exchange (ETDEWEB)

    Ohsugi, T.; Chiba, Y.; Hayashibara, I.; Taketani, A.; Yasuishi, S.; Arai, Y.; Sakamoto, H.; Uehara, S.

    1988-06-20

    We have developed a fast track-finding processor using signals from the central tracking chamber of the VENUS detector in the TRISTAN experiments. Particle tracks are recognized by a look-up table made with a high-speed static RAM. This method enables us to implement the track finder in the first level triggering. The track finder has been working excellently under heavy background due to synchroton radiation. A processing time of 110 ns is attained.

  2. Can Health 2.0 Address Critical Healthcare Challenges? Insights from the Case of How Online Social Networks Can Assist in Combatting the Obesity Epidemic

    Directory of Open Access Journals (Sweden)

    Janine Hacker

    2017-03-01

    Full Text Available One of the serious concerns in healthcare in this 21st century is obesity. While the causes of obesity are multifaceted, social networks have been identified as one of the most important dimensions of people's social environment that may influence the adoption of many behaviours, including health-promoting behaviours. In this article, we examine the possibility of harnessing the appeal of online social networks to address the obesity epidemic currently plaguing society. Specifically, a design science research methodology is adopted to design, implement and test the Health 2.0 application called “Calorie Cruncher”. The application is designed specifically to explore the influence of online social networks on individual’s health-related behaviour. In this regard, pilot data collected based on qualitative interviews indicate that online social networks may influence health-related behaviours in several ways. Firstly, they can influence people’s norms and value system that have an impact on their health-related behaviours. Secondly, social control and pressure of social connections may also shape health-related behaviours, and operate implicitly when people make food selection decisions. Thirdly, social relationships may provide emotional support. Our study has implications for research and practice. From a theoretical perspective, the article inductively identifies three factors that influence specific types of health outcomes in the context of obesity. From a practical perspective, the study underscores the benefits of adopting a design science methodology to design and implement a technology solution for a healthcare issue as well as the key role for online social media to assist with health and wellness management and maintenance.

  3. Design and optimization of color lookup tables on a simplex topology.

    Science.gov (United States)

    Monga, Vishal; Bala, Raja; Mo, Xuan

    2012-04-01

    An important computational problem in color imaging is the design of color transforms that map color between devices or from a device-dependent space (e.g., RGB/CMYK) to a device-independent space (e.g., CIELAB) and vice versa. Real-time processing constraints entail that such nonlinear color transforms be implemented using multidimensional lookup tables (LUTs). Furthermore, relatively sparse LUTs (with efficient interpolation) are employed in practice because of storage and memory constraints. This paper presents a principled design methodology rooted in constrained convex optimization to design color LUTs on a simplex topology. The use of n simplexes, i.e., simplexes in n dimensions, as opposed to traditional lattices, recently has been of great interest in color LUT design for simplex topologies that allow both more analytically tractable formulations and greater efficiency in the LUT. In this framework of n-simplex interpolation, our central contribution is to develop an elegant iterative algorithm that jointly optimizes the placement of nodes of the color LUT and the output values at those nodes to minimize interpolation error in an expected sense. This is in contrast to existing work, which exclusively designs either node locations or the output values. We also develop new analytical results for the problem of node location optimization, which reduces to constrained optimization of a large but sparse interpolation matrix in our framework. We evaluate our n -simplex color LUTs against the state-of-the-art lattice (e.g., International Color Consortium profiles) and simplex-based techniques for approximating two representative multidimensional color transforms that characterize a CMYK xerographic printer and an RGB scanner, respectively. The results show that color LUTs designed on simplexes offer very significant benefits over traditional lattice-based alternatives in improving color transform accuracy even with a much smaller number of nodes.

  4. Convocation address.

    Science.gov (United States)

    Swaminathan, M S

    1998-07-01

    This address delivered to the 40th convocation of the International Institute for Population Sciences in India in 1998 opens by noting that a shortage of jobs for youth is India's most urgent problem but that the problems that attend the increasing numbers of elderly also require serious attention. The address then notes that the Earth's population is growing at an unsustainable rate while economic inequities among countries are increasing, so that, while intellectual property is becoming the most important asset in developed countries, nutritional anemia among pregnant women causes their offspring to be unable to achieve their full intellectual potential from birth. Next, the address uses a discussion of the 18th-century work on population of the Marquis de Condorcet and of Thomas Malthus to lead into a consideration of estimated increased needs of countries like India and China to import food grains in the near future. Next, the progress of demographic transition in Indian states is covered and applied to Mahbub ul Haq's measure of human deprivation developed for and applied to the region of the South Asian Association for Regional Cooperation (India, Pakistan, Bangladesh, Nepal, Sri Lanka, Bhutan, and the Maldives). The address continues by reiterating some of the major recommendations forwarded by a government of India committee charged in 1995 with drafting a national population policy. Finally, the address suggests specific actions that could be important components of the Hunger-Free India Programme and concludes that all success rests on the successful implementation of appropriate population policies.

  5. The Platte River - High Plains Aquifer (PR-HPA) Long Term Agroecosystem Research (LTAR) Network - Data and Technological Resources to Address Current and Emerging Issues in Agroecosystems.

    Science.gov (United States)

    Okalebo, J. A.; Wienhold, B.; Suyker, A.; Erickson, G.; Hayes, M. J.; Awada, T.

    2015-12-01

    The Platte River - High Plains Aquifer (PR-HPA) is one of 18 established Long Term Agroecosystem Research (LTAR) networks across the US. PR-HPA is a partnership between the Institute of Agriculture and Natural Resources at the University of Nebraska-Lincoln (UNL), the USDA-ARS Agroecosystem Management Research Unit (AMRU) in Lincoln, and the USDA-ARS Environmental Management Research Unit (EMRU) in Clay Center, NE. The PR-HPA network encompasses 27,750 ha of research sites with data going back to the early 1900s. A partial list of on-going research projects include those encompassing long-term manuring and continuous corn (Est. 1912), dryland tillage plots (Est. 1970), soil nutrients and tillage (Est. 1983), biofuel feedstock studies (Est. 2001), and carbon sequestration study (Est. 2000). Affiliated partners include the National Drought Mitigation Center (NDMC) that develops measures to improve preparedness and adaptation to climate variability and drought; the High Plains Regional Climate Center (HPRCC) that coordinates data acquisition from over 170 automated weather stations and around 50 automated soil moisture network across NE and beyond; the AMERIFLUX and NEBFLUX networks that coordinate the water vapor and carbon dioxide flux measurements across NE with emphasis on rainfed and irrigated crop lands; the ARS Greenhouse gas Reduction through Agricultural Carbon Enhancement network (GRACEnet) and the Resilient Economic Agricultural Practices (REAP) project; and the Center for Advanced Land Management Information Technologies (CALMIT) that assists with the use of geospatial technologies for agriculture and natural resource applications. Current emphases are on addressing present-day and emerging issues related to profitability and sustainability of agroecosystems. The poster will highlight some of the ongoing and planned efforts in research pertaining to climate variability and change, water sustainability, and ecological and agronomic challenges associated

  6. Allegheny County Addressing Address Points

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset shows the address points in Allegheny County. If viewing this description on the Western Pennsylvania Regional Data Center’s open data portal...

  7. Towards a Cross-domain Infrastructure to Support Electronic Identification and Capability Lookup for Cross-border ePrescription/Patient Summary Services.

    Science.gov (United States)

    Katehakis, Dimitrios G; Masi, Massimiliano; Wisniewski, Francois; Bittins, Sören

    2016-01-01

    Seamless patient identification, as well as locating capabilities of remote services, are considered to be key enablers for large scale deployment of facilities to support the delivery of cross-border healthcare. This work highlights challenges investigated within the context of the Electronic Simple European Networked Services (e-SENS) large scale pilot (LSP) project, aiming to assist the deployment of cross-border, digital, public services through generic, re-usable technical components or Building Blocks (BBs). Through the case for the cross-border ePrescription/Patient Summary (eP/PS) service the paper demonstrates how experience coming from other domains, in regard to electronic identification (eID) and capability lookup, can be utilized in trying to raise technology readiness levels in disease diagnosis and treatment. The need for consolidating the existing outcomes of non-health specific BBs is examined, together with related issues that need to be resolved, for improving technical certainty and making it easier for citizens who travel to use innovative eHealth services, and potentially share personal health records (PHRs) with other providers abroad, in a regulated manner.

  8. A 3D simulation look-up library for real-time airborne gamma-ray spectroscopy

    Science.gov (United States)

    Kulisek, Jonathan A.; Wittman, Richard S.; Miller, Erin A.; Kernan, Warnick J.; McCall, Jonathon D.; McConn, Ron J.; Schweppe, John E.; Seifert, Carolyn E.; Stave, Sean C.; Stewart, Trevor N.

    2018-01-01

    A three-dimensional look-up library consisting of simulated gamma-ray spectra was developed to leverage, in real-time, the abundance of data provided by a helicopter-mounted gamma-ray detection system consisting of 92 CsI-based radiation sensors and exhibiting a highly angular-dependent response. We have demonstrated how this library can be used to help effectively estimate the terrestrial gamma-ray background, develop simulated flight scenarios, and to localize radiological sources. Source localization accuracy was significantly improved, particularly for weak sources, by estimating the entire gamma-ray spectra while accounting for scattering in the air, and especially off the ground.

  9. Opening Address

    Science.gov (United States)

    Abalakin, V. K.

    1997-03-01

    Dear Colleagues, It is a great pleasure and honor for me to invite you on the occasion of the IAU Colloquium International Cooperation in Dissemination of the Astronomical Data to the Central (Pulkovo) Astronomical Observatory of the Russian Academy of Sciences. This distinguished gathering of experts in the vast field of modern methods for archiving and managing almost infinite astronomical data files of everlasting value will doubtlessly make a considerable and important contribution to success in the present and future research in astronomy. All of us are witnesses of a great technological, even psychological upturn that occurs in the everyday astronomical practice. The small but the most powerful handy devices known as desktop, laptop, or even palm-top PCs, have rendered a tedious calculating work and stressing search in the card-file or book-form catalogs to a pure pleasure and raised an admiration for those brilliant minds that have invented such a kind of hard- and software. The networks of all kinds and sorts -- Internet, Bitnet, World Wide Web, etc. -- have realized ancient dreams of a Man to fly with thought all over the world communicating with other human beings. But ... don't forget that the most real and valuable communication is the live one, when one can see the face and the eyes of his (or her) partner, listen to his voice as large as life, and the only opportunity for this is to stay together. And this just occurs at the colloquium like ours! So, let me heartily welcome you to the Pulkovo Observatory.

  10. Stakeholders' expectations on connectivity research for water and land management addressed by a survey in the collaborative EU-COST Connecteur network

    Science.gov (United States)

    Smetanova, Anna; Paton, Eva N.; Keesstra, Saskia

    2016-04-01

    Transfer of knowledge across the science-society interface is essential for both, ethical and economic reasons, and inevitable for successful climate change adaptation and integrated management of sustainable, resilient landscapes. The transdisciplinary research of connectivity (which is the degree to which a system facilitates the movement of matter and energy through itself. It is an emergent property of the system state, Connecteur web resources,2015) has the potential to supply monitoring, modelling and management tools to land and water managers in order to reach these goals. The research of water and sediment connectivity has received significant and increasing scientific attention across the entire realm of the environmental disciplines, and the COST Action ES 1306 Connecteur facilitates the multi-sectorial collaboration in connectivity research at EU level. In order to appropriately address the transfer of the cutting edge research developments of the Connecteur network, the collaborative research project on stakeholders' perception of connectivity was conducted by the Working Group 5 "Transition of connectivity research towards sustainable land and water management". The questionnaire survey on stakeholder perception was conducted by volunteering scientist involved in the Connecteur network together from 19 European countries. Together 84 stakeholders from all mayor sectors in water and land management were asked about the main challenges of their work, their understanding of connectivity, the desired areas of cooperation with connectivity science, and the best tools for transferring knowledge. The results showed differences between different stakeholders groups in the way they percept and work with connectivity, as well as their requirement of knowledge transfers. While farmers, and (in lower extend) the agricultural administration officers articulated no, or little need for connectivity management, the majority of stakeholders involved in land and water

  11. Opening Address

    Science.gov (United States)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  12. Performance of global look-up table strategy in digital image correlation with cubic B-spline interpolation and bicubic interpolation

    Directory of Open Access Journals (Sweden)

    Zhiwei Pan

    2016-05-01

    Full Text Available Global look-up table strategy proposed recently has been proven to be an efficient method to accelerate the interpolation, which is the most time-consuming part in the iterative sub-pixel digital image correlation (DIC algorithms. In this paper, a global look-up table strategy with cubic B-spline interpolation is developed for the DIC method based on the inverse compositional Gauss–Newton (IC-GN algorithm. The performance of this strategy, including accuracy, precision, and computation efficiency, is evaluated through a theoretical and experimental study, using the one with widely employed bicubic interpolation as a benchmark. The global look-up table strategy with cubic B-spline interpolation improves significantly the accuracy of the IC-GN algorithm-based DIC method compared with the one using the bicubic interpolation, at a trivial price of computation efficiency.

  13. Lookup Table Hough Transform for Real Time Range Image Segmentation and Featureless Co-Registration

    NARCIS (Netherlands)

    Gorte, B.G.H.; Sithole, G.

    2012-01-01

    The paper addresses range image segmentation, particularly of data recorded by range cameras, such as the Microsoft Kinect and the Mesa Swissranger SR4000. These devices record range images at video frame rates and allow for acqui-sition of 3-dimensional measurement sequences that can be used for 3D

  14. An empirical correlation for the entrainment fraction at the onset of annular flow based on 2006 CHF look-up table

    Energy Technology Data Exchange (ETDEWEB)

    Jiao, Bo; Yang, Dongyu [Department of Mechanical Engineering, Rongcheng Campus, Harbin University of Science and Technology, Rongcheng 264300, Shandong (China); Gan, Zhihua, E-mail: gan_zhihua@zju.edu.cn [Institute of Refrigeration and Cryogenics, Zhejiang University, Hangzhou (China); Key Laboratory of Refrigeration and Cryogenic Technology of Zhejiang Province, Hangzhou (China); National Quality Inspection Center of Refrigeration Equipment (Henan), Minquan (China)

    2017-06-15

    Highlights: • A parallel look-up table for the entrainment fraction at annular point was developed. • A correlation was given based on the selected database from 2006 CHF look-up table. • Its reliability on the other conditions in the look-up table was discussed. - Abstract: The critical heat flux (CHF) of gas-liquid flow plays an important role in the safety of industrial equipment. At present, the liquid film dryout model is widely used for predicting CHF in gas-liquid annular flow. Most parameters in this model can be determined by some empirical correlations which are valid under different conditions. However, up to now, the entrainment fraction at the onset of annular flow is always assumed due to the lack of relevant experimental data. In this paper, the normalized data of the 2006 CHF look-up table (LUT) which has been adopted widely, especially in the nuclear industry, were used. Firstly, the empirical correlations, provided for the onset of annular flow and the limiting quality, were employed. In the valid pressure and mass flux range of these correlations, the selected database from LUT was confirmed. Secondly, the liquid film model was built. The entrainment fraction at the onset of annular flow was obtained when the calculated CHF by the model agreed with the corresponding value in LUT. A parallel look-up table for it was developed. Its correlation including the Weber and the liquid Reynolds number at outlet was proposed. The errors are mostly within ±30%. Finally, its reliability on the other conditions in LUT, which are beyond the valid range of the empirical correlations used for determining the database, was discussed. All the conditions whose errors are outside ±30% of the predictions by the provided correlation were marked in the tables.

  15. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks that interact with the users in open and dynamic environments. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in

  16. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2007-01-01

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the

  17. Knowledge to serve the city: insights from an emerging knowledge-action network to address vulnerability and sustainability in San Juan, Puerto Rico

    Science.gov (United States)

    T.A. Munoz-Erickson; A.E. Lugo; E. Melendez-Ackerman; L.E. Santiago-Acevedo; J. Seguinot-Barbosa; P. Mendez-Lazaro

    2014-01-01

    This paper presents initial efforts to establish the San Juan Urban Long-Term Research Area Exploratory (ULTRA-Ex), a long-term program aimed at developing transdisciplinary social-ecological system (SES) research to address vulnerability and sustainability for the municipality of San Juan. Transdisciplinary approaches involve the collaborations between researchers,...

  18. A Fuzzy Obstacle Avoidance Controller Using a Lookup-Table Sharing Method and Its Applications for Mobile Robots

    Directory of Open Access Journals (Sweden)

    Jinwook Kim

    2011-11-01

    Full Text Available A Lookup-Table (LUT based design enhances the processing speed of a fuzzy obstacle avoidance controller by reducing the operation time. Also, a LUT sharing method provides efficient ways of reducing the LUT memory size. In order to share the LUT which is used for a fuzzy obstacle avoidance controller, an idea of using a basis function is developed. As applications of the shared LUT-based fuzzy controller, a laser-sensor-based fuzzy controller and an ultrasonic-sensor-based fuzzy controller are introduced in this paper. This paper suggests a LUT sharing method that reduces the LUT buffer size without a significant degradation of the performance. The LUT sharing method makes the buffer size independent of the fuzzy system's complexity. A simulation using MSRDS (Microsoft Robotics Developer Studio is used to evaluate the proposed method. To investigate the performance of the controller, experiments are carried out using a Pioneer P3-DX with LabVIEW as an integration tool. Although the simulation and experiments show little difference between the fully valued LUT-based method and the LUT sharing method in terms of the operation time, the LUT sharing method reduces almost 95% of the full-valued LUT-based buffer size.

  19. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  20. NRL Hyperspectral Imagery Trafficability Tool (HITT): Software andSpectral-Geotechnical Look-up Tables for Estimation and Mapping of Soil Bearing Strength from Hyperspectral Imagery

    Science.gov (United States)

    2012-09-28

    Environmental Sensing 2009 (HI-HARES’09), TALISMAN SABER’09, and Mariana Island Hyperspectral Airborne Remote Environmental Sensing 2010 (MI-HARES’10...spectral-geotechnical look-up tables from the VCR’07, HI-HARES’09, TALISMAN SABER’09, and MI-HARES’10 campaigns (Bachmann, Nichols et al, 2012d, 2012e...campaigns (VCR’07, HI-HARES’09, TALISMAN SABER’09, and MI- HARES’10) appears in the directory with filename

  1. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  2. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  3. Allegheny County Address Points

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  4. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    We propose an energy-efficient service discovery protocol for wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the communication

  5. A look-up table-based ray integration framework for 2D/3D forward and back-projection in X-ray CT.

    Science.gov (United States)

    Ha, Sungsoo; Mueller, Klaus

    2017-08-18

    Iterative algorithms have become increasingly popular in Computed Tomography (CT) image reconstruction since they better deal with the adverse image artifacts arising from low radiation dose image acquisition. But iterative methods remain computationally expensive. The main cost emerges in the projection and backprojection operations where accurate CT system modeling can greatly improve the quality of the reconstructed image. We present a framework that improves upon one particular aspect - the accurate projection of the image basis functions. It differs from current methods in that it substitutes the high computational complexity associated with accurate voxel projection by a small number of memory operations. Coefficients are computed in advance and stored in look-up tables parameterized by the CT system's projection geometry. The look-up tables only require a few kilobytes of storage and can be efficiently accelerated on the GPU. We demonstrate our framework with both numerical and clinical experiments and compare its performance with the current state of the art scheme - the separable footprint method.

  6. License Address List

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Address list generated from National Saltwater Angler Registry. Used in conjunction with an address-based sample as per survey design.

  7. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  8. Multi-Algorithm Indices and Look-Up Table for Chlorophyll-a Retrieval in Highly Turbid Water Bodies Using Multispectral Data

    Directory of Open Access Journals (Sweden)

    Salem Ibrahim Salem

    2017-06-01

    Full Text Available Many approaches have been proposed for monitoring the eutrophication of Case 2 waters using remote sensing data. Semi-analytical algorithms and spectrum matching are two major approaches for chlorophyll-a (Chla retrieval. Semi-analytical algorithms provide indices correlated with phytoplankton characteristics, (e.g., maximum and minimum absorption peaks. Algorithms’ indices are correlated with measured Chla through the regression process. The main drawback of the semi-analytical algorithms is that the derived relation is location and data limited. Spectrum matching and the look-up table approach rely on matching the measured reflectance with a large library of simulated references corresponding to wide ranges of water properties. The spectral matching approach taking hyperspectral measured reflectance as an input, leading to difficulties in incorporating data from multispectral satellites. Consequently, multi-algorithm indices and the look-up table (MAIN-LUT technique is proposed to combine the merits of semi-analytical algorithms and look-up table, which can be applied to multispectral data. Eight combinations of four algorithms (i.e., 2-band, 3-band, maximum chlorophyll index, and normalized difference chlorophyll index are investigated for the MAIN-LUT technique. In situ measurements and Medium Resolution Imaging Spectrometer (MERIS sensor data are used to validate MAIN-LUT. In general, the MAIN-LUT provide a comparable retrieval accuracy with locally tuned algorithms. The most accurate of the locally tuned algorithms varied among datasets, revealing the limitation of these algorithms to be applied universally. In contrast, the MAIN-LUT provided relatively high retrieval accuracy for Tokyo Bay (R2 = 0.692, root mean square error (RMSE = 21.4 mg m−3, Lake Kasumigaura (R2 = 0.866, RMSE = 11.3 mg m−3, and MERIS data over Lake Kasumigaura (R2 = 0.57, RMSE = 36.5 mg m−3. The simulated reflectance library of MAIN-LUT was generated based on

  9. Effective reduction of the novel look-up table memory size based on a relationship between the pixel pitch and reconstruction distance of a computer-generated hologram.

    Science.gov (United States)

    Kim, Seung-Cheol; Kim, Jae-Ho; Kim, Eun-Soo

    2011-07-01

    In this paper, we propose an approach, new to our knowledge, to effectively generate and reconstruct the resolution-enhanced computer-generated hologram (CGH) of three-dimensional (3-D) objects with a significantly reduced in memory size novel look-up table (N-LUT) by taking into account a relationship between the pixel pitch and reconstruction distance of the hologram pattern. In the proposed method, a CGH pattern composed of shifted versions of the principal fringe patterns (PFPs) with a short pixel pitch can be reconstructed just by using the CGH generated with a much longer pixel pitch by controlling the hologram reconstruction distance. Accordingly, the corresponding N-LUT memory size required for resolution-enhanced hologram patterns can be significantly reduced in the proposed method. To confirm the feasibility of the proposed method, experiments are carried out and the results are discussed.

  10. Allegheny County Addressing Landmarks

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This table contains the Addressing Landmarks in Allegheny County. If viewing this description on the Western Pennsylvania Regional Data Center’s open data portal...

  11. Addressivity in cogenerative dialogues

    Science.gov (United States)

    Hsu, Pei-Ling

    2014-03-01

    Ashraf Shady's paper provides a first-hand reflection on how a foreign teacher used cogens as culturally adaptive pedagogy to address cultural misalignments with students. In this paper, Shady drew on several cogen sessions to showcase his journey of using different forms of cogens with his students. To improve the quality of cogens, one strategy he used was to adjust the number of participants in cogens. As a result, some cogens worked and others did not. During the course of reading his paper, I was impressed by his creative and flexible use of cogens and at the same time was intrigued by the question of why some cogens work and not others. In searching for an answer, I found that Mikhail Bakhtin's dialogism, especially the concept of addressivity, provides a comprehensive framework to address this question. In this commentary, I reanalyze the cogen episodes described in Shady's paper in the light of dialogism. My analysis suggests that addressivity plays an important role in mediating the success of cogens. Cogens with high addressivity function as internally persuasive discourse that allows diverse consciousnesses to coexist and so likely affords productive dialogues. The implications of addressivity in teaching and learning are further discussed.

  12. Addressing Sexual Harassment

    Science.gov (United States)

    Young, Ellie L.; Ashbaker, Betty Y.

    2008-01-01

    This article discusses ways on how to address the problem of sexual harassment in schools. Sexual harassment--simply defined as any unwanted and unwelcome sexual behavior--is a sensitive topic. Merely providing students, parents, and staff members with information about the school's sexual harassment policy is insufficient; schools must take…

  13. Addressing Social Issues.

    Science.gov (United States)

    Schoebel, Susan

    1991-01-01

    Maintains that advertising can help people become more aware of social responsibilities. Describes a successful nationwide newspaper advertising competition for college students in which ads address social issues such as literacy, drugs, teen suicide, and teen pregnancy. Notes how the ads have helped grassroots programs throughout the United…

  14. Sesotho Address Forms

    Directory of Open Access Journals (Sweden)

    Akindele, Dele Femi

    2008-01-01

    Full Text Available Address forms constitute an integral part of Basotho sociolinguistic etiquette. They are regarded as a kind of emotional capital that may be invested in putting others at ease. They are indicators of deference, politeness and markers of social distance. (Fasold 1990, Akindele 1990, 1991, 1993 This paper examines the address forms used by the Basotho people. It analyzes and discusses the various types and the factors determining their use. The discussion of address forms in Sesotho focuses on First Name, Title plus First Name, Title plus Last Name, Nickname, Multiple Names, and Teknonym. Drawing data from semi-literate and literate urban and rural population of Maseru district of Lesotho, it was found that the commonest form of address used by the Basotho people is title plus first name. e.g. ntate Thabo (father Thabo, 'm'e Puleng (mother Puleng, ausi Maneo (sister Maneo, abuti Mahao (brother Mahao. It is used by close relations, associates, and familiar people in both formal and informal situations.

  15. Addressing the innovation gap.

    Science.gov (United States)

    Jeffrey, Phillip; Warne, Peter; Williams, Robert

    2007-05-01

    The 10 years since the mid-1990s have witnessed an unprecedented investment in Drug Discovery driven by both the unraveling of the human genome and the parallel introduction of various high-throughput technologies. During the same period, industry metrics describe a decline in the numbers of new molecular entities launched upon the global pharmaceutical markets. The Society for Medicines Research (SMR) meeting entitled "Addressing the Innovation Gap" brought together a program of expert speakers to comment upon the challenges currently facing the pharmaceutical industry and some of the measures being undertaken to enable future success.

  16. Bioreactors Addressing Diabetes Mellitus

    Science.gov (United States)

    Minteer, Danielle M.; Gerlach, Jorg C.

    2014-01-01

    The concept of bioreactors in biochemical engineering is a well-established process; however, the idea of applying bioreactor technology to biomedical and tissue engineering issues is relatively novel and has been rapidly accepted as a culture model. Tissue engineers have developed and adapted various types of bioreactors in which to culture many different cell types and therapies addressing several diseases, including diabetes mellitus types 1 and 2. With a rising world of bioreactor development and an ever increasing diagnosis rate of diabetes, this review aims to highlight bioreactor history and emerging bioreactor technologies used for diabetes-related cell culture and therapies. PMID:25160666

  17. Addressing Environmental Health Inequalities

    Directory of Open Access Journals (Sweden)

    Nelson Gouveia

    2016-08-01

    Full Text Available Environmental health inequalities refer to health hazards disproportionately or unfairly distributed among the most vulnerable social groups, which are generally the most discriminated, poor populations and minorities affected by environmental risks. Although it has been known for a long time that health and disease are socially determined, only recently has this idea been incorporated into the conceptual and practical framework for the formulation of policies and strategies regarding health. In this Special Issue of the International Journal of Environmental Research and Public Health (IJERPH, “Addressing Environmental Health Inequalities—Proceedings from the ISEE Conference 2015”, we incorporate nine papers that were presented at the 27th Conference of the International Society for Environmental Epidemiology (ISEE, held in Sao Paulo, Brazil, in 2015. This small collection of articles provides a brief overview of the different aspects of this topic. Addressing environmental health inequalities is important for the transformation of our reality and for changing the actual development model towards more just, democratic, and sustainable societies driven by another form of relationship between nature, economy, science, and politics.

  18. Addressing Environmental Health Inequalities.

    Science.gov (United States)

    Gouveia, Nelson

    2016-08-27

    Environmental health inequalities refer to health hazards disproportionately or unfairly distributed among the most vulnerable social groups, which are generally the most discriminated, poor populations and minorities affected by environmental risks. Although it has been known for a long time that health and disease are socially determined, only recently has this idea been incorporated into the conceptual and practical framework for the formulation of policies and strategies regarding health. In this Special Issue of the International Journal of Environmental Research and Public Health (IJERPH), "Addressing Environmental Health Inequalities-Proceedings from the ISEE Conference 2015", we incorporate nine papers that were presented at the 27th Conference of the International Society for Environmental Epidemiology (ISEE), held in Sao Paulo, Brazil, in 2015. This small collection of articles provides a brief overview of the different aspects of this topic. Addressing environmental health inequalities is important for the transformation of our reality and for changing the actual development model towards more just, democratic, and sustainable societies driven by another form of relationship between nature, economy, science, and politics.

  19. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar

    2010-06-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  20. Addressing Semantic Geographic Information Systems

    Directory of Open Access Journals (Sweden)

    Salvatore F. Pileggi

    2013-11-01

    Full Text Available The progressive consolidation of information technologies on a large scale has been facilitating and progressively increasing the production, collection, and diffusion of geographic data, as well as facilitating the integration of a large amount of external information into geographic information systems (GIS. Traditional GIS is transforming into a consolidated information infrastructure. This consolidated infrastructure is affecting more and more aspects of internet computing and services. Most popular systems (such as social networks, GPS, and decision support systems involve complex GIS and significant amounts of information. As a web service, GIS is affected by exactly the same problems that affect the web as a whole. Therefore, next generation GIS solutions have to address further methodological and data engineering challenges in order to accommodate new applications’ extended requirements (in terms of scale, interoperability, and complexity. The conceptual and semantic modeling of GIS, as well as the integration of semantics into current GIS, provide highly expressive environments that are capable of meeting the needs and requirements of a wide range of applications.

  1. Parallel Lookups in String Indexes

    DEFF Research Database (Denmark)

    Christiansen, Anders Roy; Farach-Colton, Martín

    2016-01-01

    Recently, the first PRAM algorithms were presented for looking up a pattern in a suffix tree. We improve the bounds, achieving optimal results.......Recently, the first PRAM algorithms were presented for looking up a pattern in a suffix tree. We improve the bounds, achieving optimal results....

  2. Reducing Lookups for Invariant Checking

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just

    2013-01-01

    This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is still...

  3. Metropolitan Area Look-Up

    Data.gov (United States)

    Department of Housing and Urban Development — This system provides the user with a facility to select a state and county combination to determine if the selected county is part of an Office of Management and...

  4. Introduction to Artificial Neural Networks

    DEFF Research Database (Denmark)

    Larsen, Jan

    1999-01-01

    The note addresses introduction to signal analysis and classification based on artificial feed-forward neural networks.......The note addresses introduction to signal analysis and classification based on artificial feed-forward neural networks....

  5. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6)

    National Research Council Canada - National Science Library

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    .... The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices...

  6. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  7. Sistema de otto-codificação modificado para endereçamento de redes hidrográficas An improved stream network addressing system: the modified pfafstetter coding scheme

    Directory of Open Access Journals (Sweden)

    Natanael dos Santos Silva

    2008-10-01

    .This paper presents a new numbering system based on the Pfafstetter codification scheme developed for stream networks. Its main advantage is the use of the segments' length instead of the catchments' areas for establishing the Pfafstetter code, therefore eliminating the need for elevation data. This methodology was then implemented in a software named Otto-Sys, developed for Arc/INFO workstation in AML. In order to present the results of this new approach, a case study was carried out for the stream network of the Caeté River, a tributary of Iaco River, belonging to the Amazon River basin. The details of such a digital hydrographic dataset led to 5 level-deep codes. Each codification level is stored as a new column of the attribute table and the corresponding level dictates the number of digits of the code. Once this codification scheme has been established, network-tracing tasks can be performed in any geographic information system using only attribute queries. This strategy speeds up such processes enabling them to be extended to real-time web-based devices.

  8. A Life’s Addresses

    DEFF Research Database (Denmark)

    Balle, Søren Hattesen

    to a number of different aspects of Koch’s own life such as marijuana, the Italian language, World War Two, etc. In this way, the book quite conventionally inscribes itself in the tradition of post-enlightenment apostrophic poetry as characterized by Culler, just as all its poems belong to the favourite...... relationship” (143). Apostrophe is called the figure of address in classical rhetoric, and it is precisely this meaning of the word which American poet Kenneth Koch puns upon in the title of his 2000 collection of poetry New Addresses. In fact, its fifty poems literally represent acts of poetic address......, are literally troped as and addressed in the manner of so many acquaintances, personal connections, relatives, friends, lovers, and family members in Koch’s life. My main claim is that Koch’s poetics in New Addresses is one that slightly dislocates the romantic dichotomy between the world of things...

  9. The Knowledge Level: Presidential Address

    OpenAIRE

    Newell, Allen

    1981-01-01

    This is the first presidential address of AAAI, the American Association for Artificial Intelligence. In the grand scheme of history of artificial intelligence (AI), this is surely a minor event. The field this scientific society represents has been thriving for quite some time. No doubt the society itself will make solid contributions to the health of our field. But it is too much to expect a presidential address to have a major impact. So what is the role of the presidential address and wha...

  10. SU-E-T-275: Dose Verification in a Small Animal Image-Guided Radiation Therapy X-Ray Machine: A Dose Comparison between TG-61 Based Look-Up Table and MOSFET Method for Various Collimator Sizes.

    Science.gov (United States)

    Rodrigues, A; Nguyen, G; Li, Y; Roy Choudhury, K; Kirsch, D; Das, S; Yoshizumi, T

    2012-06-01

    To verify the accuracy of TG-61 based dosimetry with MOSFET technology using a tissue-equivalent mouse phantom. Accuracy of mouse dose between a TG-61 based look-up table was verified with MOSFET technology. The look-up table followed a TG-61 based commissioning and used a solid water block and radiochromic film. A tissue-equivalent mouse phantom (2 cm diameter, 8 cm length) was used for the MOSFET method. Detectors were placed in the phantom at the head and center of the body. MOSFETs were calibrated in air with an ion chamber and f-factor was applied to derive the dose to tissue. In CBCT mode, the phantom was positioned such that the system isocenter coincided with the center of the MOSFET with the active volume perpendicular to the beam. The absorbed dose was measured three times for seven different collimators, respectively. The exposure parameters were 225 kVp, 13 mA, and an exposure time of 20 s. For a 10 mm, 15 mm, and 20 mm circular collimator, the dose measured by the phantom was 4.3%, 2.7%, and 6% lower than TG-61 based measurements, respectively. For a 10 × 10 mm, 20 × 20 mm, and 40 × 40 mm collimator, the dose difference was 4.7%, 7.7%, and 2.9%, respectively. The MOSFET data was systematically lower than the commissioning data. The dose difference is due to the increased scatter radiation in the solid water block versus the dimension of the mouse phantom leading to an overestimation of the actual dose in the solid water block. The MOSFET method with the use of a tissue- equivalent mouse phantom provides less labor intensive geometry-specific dosimetry and accuracy with better dose tolerances of up to ± 2.7%. © 2012 American Association of Physicists in Medicine.

  11. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  12. Addressing adolescent pregnancy with legislation.

    Science.gov (United States)

    Montgomery, Tiffany M; Folken, Lori; Seitz, Melody A

    2014-01-01

    Adolescent pregnancy is a concern among many women's health practitioners. While it is practical and appropriate to work to prevent adolescent pregnancy by educating adolescents in health care clinics, schools and adolescent-friendly community-based organizations, suggesting and supporting legislative efforts to reduce adolescent pregnancy can help address the issue on an even larger scale. This article aims to help nurses better understand current legislation that addresses adolescent pregnancy, and to encourage support of future adolescent pregnancy prevention legislation. © 2014 AWHONN.

  13. Netcitizenship : Addressing Cyberevenge and Sexbullying

    OpenAIRE

    Cohen-Almagor, Raphael

    2015-01-01

    This article discusses the phenomena of Cyberevenge, sexbullying, and sextortion, especially among young people. The discussion, based on extensive review of books, research reports, newspapers, journal articles and pertinent websites, analyzes these challenges. The article suggests some remedies to counter these online social ills which pertain to promoting responsibility of netcitizens, schools, governments, Non-Governmental Organizations (NGOs) and social networking sites.

  14. Laws of Network Value

    Directory of Open Access Journals (Sweden)

    Juan M.C. Larrosa

    2016-12-01

    Full Text Available The valuation of a social network is an issue that has been addressed based on simplifying approaches. Various value laws have been stipulated, which are largely atheoretical but have been effectively used to estimate the potential economic value of social network-based firms. This review highlights the various contributions used in the recent literature on networks valuation laws.

  15. What TQM Does Not Address.

    Science.gov (United States)

    Kochner, Curt; McMahon, Timothy R.

    1996-01-01

    Explores the importance of leadership, vision, purpose, organizational culture, motivation, and change as aspects of organizational life that Total Quality Management (TQM) does not adequately address. Offers the concept of learning organizations as a preferable approach, arguing that this method is a needed element in the leadership and…

  16. A theoretical design for learning model addressing the networked society

    DEFF Research Database (Denmark)

    Levinsen, Karin; Nielsen, Janni; Sørensen, Birgitte Holm

    2010-01-01

    of their collaboration and students are required to document their choices, deselections, decisions and arguments and reflect on their learning process during the role-play. In the final paragraph we discuss our experimental work with the Design for Learning Model. We argue that our model gives birth to scaffolding...

  17. Addressing uncertainty in atomistic machine learning

    DEFF Research Database (Denmark)

    Peterson, Andrew A.; Christensen, Rune; Khorshidi, Alireza

    2017-01-01

    suggest this will allow researchers to more fully use machine learning for the routine acceleration of large, high-accuracy, or extended-time simulations. In our demonstrations, we use a bootstrap ensemble of neural network-based calculators, and show that the width of the ensemble can provide an estimate......Machine-learning regression has been demonstrated to precisely emulate the potential energy and forces that are output from more expensive electronic-structure calculations. However, to predict new regions of the potential energy surface, an assessment must be made of the credibility...... of the predictions. In this perspective, we address the types of errors that might arise in atomistic machine learning, the unique aspects of atomistic simulations that make machine-learning challenging, and highlight how uncertainty analysis can be used to assess the validity of machine-learning predictions. We...

  18. Atomic clusters with addressable complexity

    Science.gov (United States)

    Wales, David J.

    2017-02-01

    A general formulation for constructing addressable atomic clusters is introduced, based on one or more reference structures. By modifying the well depths in a given interatomic potential in favour of nearest-neighbour interactions that are defined in the reference(s), the potential energy landscape can be biased to make a particular permutational isomer the global minimum. The magnitude of the bias changes the resulting potential energy landscape systematically, providing a framework to produce clusters that should self-organise efficiently into the target structure. These features are illustrated for small systems, where all the relevant local minima and transition states can be identified, and for the low-energy regions of the landscape for larger clusters. For a 55-particle cluster, it is possible to design a target structure from a transition state of the original potential and to retain this structure in a doubly addressable landscape. Disconnectivity graphs based on local minima that have no direct connections to a lower minimum provide a helpful way to visualise the larger databases. These minima correspond to the termini of monotonic sequences, which always proceed downhill in terms of potential energy, and we identify them as a class of biminimum. Multiple copies of the target cluster are treated by adding a repulsive term between particles with the same address to maintain distinguishable targets upon aggregation. By tuning the magnitude of this term, it is possible to create assemblies of the target cluster corresponding to a variety of structures, including rings and chains.

  19. Shuttle user analysis (study 2.2): Volume 3. Business Risk And Value of Operations in space (BRAVO). Part 4: Computer programs and data look-up

    Science.gov (United States)

    1974-01-01

    Computer program listings as well as graphical and tabulated data needed by the analyst to perform a BRAVO analysis were examined. Graphical aid which can be used to determine the earth coverage of satellites in synchronous equatorial orbits was described. A listing for satellite synthesis computer program as well as a sample printout for the DSCS-11 satellite program and a listing of the symbols used in the program were included. The APL language listing for the payload program cost estimating computer program was given. This language is compatible with many of the time sharing remote terminals computers used in the United States. Data on the intelsat communications network was studied. Costs for telecommunications systems leasing, line of sight microwave relay communications systems, submarine telephone cables, and terrestrial power generation systems were also described.

  20. Addressing the workforce pipeline challenge

    Energy Technology Data Exchange (ETDEWEB)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  1. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  2. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  3. The Standardization Method of Address Information for POIs from Internet Based on Positional Relation

    Directory of Open Access Journals (Sweden)

    WANG Yong

    2016-05-01

    Full Text Available As points of interest (POIon the internet, exists widely incomplete addresses and inconsistent literal expressions, a fast standardization processing method of network POIs address information based on spatial constraints was proposed. Based on the model of the extensible address expression, first of all, address information of POI was segmented and extracted. Address elements are updated by means of matching with the address tree layer by layer. Then, by defining four types of positional relations, corresponding set are selected from standard POI library as candidate for enrichment and amendment of non-standard address. At last, the fast standardized processing of POI address information was achieved with the help of backtracking address elements with minimum granularity. Experiments in this paper proved that the standardization processing of an address can be realized by means of this method with higher accuracy in order to build the address database.

  4. Application of the new IAPWS Guideline on the fast and accurate calculation of steam and water properties with the Spline-Based Table Look-Up Method (SBTL) in RELAP-7

    Energy Technology Data Exchange (ETDEWEB)

    Kunick, Matthias; Kretzschmar, Hans-Joachim [Zittau/Goerlitz Univ. of Applied Sciences, Zittau (Germany). Dept. of Technical Thermodynamics; Berry, Ray A.; Martineau, Richard C. [Idaho National Laboratory, Idaho Falls, ID (United States). Nuclear Science and Technology; Gampe, Uwe [Dresden Univ. of Technology (Germany). Chair of Thermal Power Machinery and Plants

    2017-07-15

    The numerical simulation of thermalhydraulic processes in nuclear power plants requires very accurate and extremely fast algorithms for calculating the thermophysical properties of water and steam. In order to provide such algorithms, the International Association for the Properties of Water and Steam (IAPWS) has adopted the new ''IAPWS Guideline on the Fast Calculation of Steam and Water Properties with the Spline-Based Table Look-Up Method (SBTL)''. In this article, the SBTL method is applied to property functions of specific volume and specific internal energy (v,e) based on the scientific formulation IAPWS-95 and the latest IAPWS formulations for transport properties. From the newly generated SBTL functions, thermodynamic and transport properties as well as their derivatives and inverse functions are calculable in the fluid range of state for pressures up to 100 MPa and for temperatures up to 1273 K, including the metastable liquid and the metastable vapor regions. The SBTL functions reproduce the underlying formulations with an accuracy of 10-100 ppm and significantly reduced computing times. The SBTL method has been implemented into the nuclear reactor system safety analysis code RELAP-7 [2] to consider the real fluid behavior of water and steam in a novel 7-equation two-phase flow model.

  5. What is an address in South Africa?

    CSIR Research Space (South Africa)

    Coetzee, S

    2007-11-01

    Full Text Available In this paper, the authors illustrate the need for standardized addresses in South Africa by describing scenarios where standardized addresses are required, or where standardized addresses would improve the current situation. They present the eleven...

  6. GEOSS: Addressing Big Data Challenges

    Science.gov (United States)

    Nativi, S.; Craglia, M.; Ochiai, O.

    2014-12-01

    In the sector of Earth Observation, the explosion of data is due to many factors including: new satellite constellations, the increased capabilities of sensor technologies, social media, crowdsourcing, and the need for multidisciplinary and collaborative research to face Global Changes. In this area, there are many expectations and concerns about Big Data. Vendors have attempted to use this term for their commercial purposes. It is necessary to understand whether Big Data is a radical shift or an incremental change for the existing digital infrastructures. This presentation tries to explore and discuss the impact of Big Data challenges and new capabilities on the Global Earth Observation System of Systems (GEOSS) and particularly on its common digital infrastructure called GCI. GEOSS is a global and flexible network of content providers allowing decision makers to access an extraordinary range of data and information at their desk. The impact of the Big Data dimensionalities (commonly known as 'V' axes: volume, variety, velocity, veracity, visualization) on GEOSS is discussed. The main solutions and experimentation developed by GEOSS along these axes are introduced and analyzed. GEOSS is a pioneering framework for global and multidisciplinary data sharing in the Earth Observation realm; its experience on Big Data is valuable for the many lessons learned.

  7. Modeling and simulation of adaptive Neuro-fuzzy based intelligent system for predictive stabilization in structured overlay networks

    Directory of Open Access Journals (Sweden)

    Ramanpreet Kaur

    2017-02-01

    Full Text Available Intelligent prediction of neighboring node (k well defined neighbors as specified by the dht protocol dynamism is helpful to improve the resilience and can reduce the overhead associated with topology maintenance of structured overlay networks. The dynamic behavior of overlay nodes depends on many factors such as underlying user’s online behavior, geographical position, time of the day, day of the week etc. as reported in many applications. We can exploit these characteristics for efficient maintenance of structured overlay networks by implementing an intelligent predictive framework for setting stabilization parameters appropriately. Considering the fact that human driven behavior usually goes beyond intermittent availability patterns, we use a hybrid Neuro-fuzzy based predictor to enhance the accuracy of the predictions. In this paper, we discuss our predictive stabilization approach, implement Neuro-fuzzy based prediction in MATLAB simulation and apply this predictive stabilization model in a chord based overlay network using OverSim as a simulation tool. The MATLAB simulation results present that the behavior of neighboring nodes is predictable to a large extent as indicated by the very small RMSE. The OverSim based simulation results also observe significant improvements in the performance of chord based overlay network in terms of lookup success ratio, lookup hop count and maintenance overhead as compared to periodic stabilization approach.

  8. NASA's unique networking environment

    Science.gov (United States)

    Johnson, Marjory J.

    1988-01-01

    Networking is an infrastructure technology; it is a tool for NASA to support its space and aeronautics missions. Some of NASA's networking problems are shared by the commercial and/or military communities, and can be solved by working with these communities. However, some of NASA's networking problems are unique and will not be addressed by these other communities. Individual characteristics of NASA's space-mission networking enviroment are examined, the combination of all these characteristics that distinguish NASA's networking systems from either commercial or military systems is explained, and some research areas that are important for NASA to pursue are outlined.

  9. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  10. Core Benefits of Network Participation

    OpenAIRE

    Kheiri Pileh Roud, Ensieh

    2015-01-01

    This study deals with the core benefits of network participation from the maritime companies’ perspective. It mainly focuses on the area of innovation, network qualities and absorptive capacities. A single case study has been conducted to address two research questions; 1) what are the core benefits of network participation for a maritime company? 2) Which qualities of network events influence the benefits for the participants? The main findings show that, the networks are valuable communi...

  11. Addressing uncertainty in atomistic machine learning.

    Science.gov (United States)

    Peterson, Andrew A; Christensen, Rune; Khorshidi, Alireza

    2017-05-10

    Machine-learning regression has been demonstrated to precisely emulate the potential energy and forces that are output from more expensive electronic-structure calculations. However, to predict new regions of the potential energy surface, an assessment must be made of the credibility of the predictions. In this perspective, we address the types of errors that might arise in atomistic machine learning, the unique aspects of atomistic simulations that make machine-learning challenging, and highlight how uncertainty analysis can be used to assess the validity of machine-learning predictions. We suggest this will allow researchers to more fully use machine learning for the routine acceleration of large, high-accuracy, or extended-time simulations. In our demonstrations, we use a bootstrap ensemble of neural network-based calculators, and show that the width of the ensemble can provide an estimate of the uncertainty when the width is comparable to that in the training data. Intriguingly, we also show that the uncertainty can be localized to specific atoms in the simulation, which may offer hints for the generation of training data to strategically improve the machine-learned representation.

  12. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  13. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, A. J.; Moreno-Sanchez, P.; Skarmeta, A. F.; Varakliotis, S.; Kirstein, P.

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  14. Realization and Addressing Analysis In Blockchain Bitcoin

    Science.gov (United States)

    Sakti Arief Daulay, Raja; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.

  15. Reliability in automotive ethernet networks

    DEFF Research Database (Denmark)

    Soares, Fabio L.; Campelo, Divanilson R.; Yan, Ying

    2015-01-01

    This paper provides an overview of in-vehicle communication networks and addresses the challenges of providing reliability in automotive Ethernet in particular.......This paper provides an overview of in-vehicle communication networks and addresses the challenges of providing reliability in automotive Ethernet in particular....

  16. An address geocoding solution for Chinese cities

    Science.gov (United States)

    Zhang, Xuehu; Ma, Haoming; Li, Qi

    2006-10-01

    We introduce the challenges of address geocoding for Chinese cities and present a potential solution along with a prototype system that deal with these challenges by combining and extending current geocoding solutions developed for United States and Japan. The proposed solution starts by separating city addresses into "standard" addresses which meet a predefined address model and non-standard ones. The standard addresses are stored in a structured relational database in their normalized forms, while a selected portion of the non-standard addresses are stored as aliases to the standard addresses. An in-memory address index is then constructed from the address database and serves as the basis for real-time address matching. Test results were obtained from two trials conducted in the city Beijing. On average 80% matching rate were achieved. Possible improvements to the current design are also discussed.

  17. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  18. Module identification in bipartite and directed networks

    OpenAIRE

    Guimera, R.; Sales-Pardo, M.; Amaral, L. A. N.

    2007-01-01

    Modularity is one of the most prominent properties of real-world complex networks. Here, we address the issue of module identification in two important classes of networks: bipartite networks and directed unipartite networks. Nodes in bipartite networks are divided into two non-overlapping sets, and the links must have one end node from each set. Directed unipartite networks only have one type of nodes, but links have an origin and an end. We show that directed unipartite networks can be conv...

  19. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses th...... introduce some signaling overhead, the results show that the performance is yet improved....

  20. Selective Activation of Resting-State Networks following Focal Stimulation in a Connectome-Based Network Model of the Human Brain.

    Science.gov (United States)

    Spiegler, Andreas; Hansen, Enrique C A; Bernard, Christophe; McIntosh, Anthony R; Jirsa, Viktor K

    2016-01-01

    When the brain is stimulated, for example, by sensory inputs or goal-oriented tasks, the brain initially responds with activities in specific areas. The subsequent pattern formation of functional networks is constrained by the structural connectivity (SC) of the brain. The extent to which information is processed over short- or long-range SC is unclear. Whole-brain models based on long-range axonal connections, for example, can partly describe measured functional connectivity dynamics at rest. Here, we study the effect of SC on the network response to stimulation. We use a human whole-brain network model comprising long- and short-range connections. We systematically activate each cortical or thalamic area, and investigate the network response as a function of its short- and long-range SC. We show that when the brain is operating at the edge of criticality, stimulation causes a cascade of network recruitments, collapsing onto a smaller space that is partly constrained by SC. We found both short- and long-range SC essential to reproduce experimental results. In particular, the stimulation of specific areas results in the activation of one or more resting-state networks. We suggest that the stimulus-induced brain activity, which may indicate information and cognitive processing, follows specific routes imposed by structural networks explaining the emergence of functional networks. We provide a lookup table linking stimulation targets and functional network activations, which potentially can be useful in diagnostics and treatments with brain stimulation.

  1. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  2. Detecting Problematic Lookup Functions in Spreadsheets

    NARCIS (Netherlands)

    Hermans, F.; Aivaloglou, E.; Jansen, B.

    2015-01-01

    Spreadsheets are used heavily in many business domains around the world. They are easy to use and as such enable end-user programmers to and build and maintain all sorts of reports and analyses. In addition to using spreadsheets for modeling and calculation, spreadsheets are often also used for

  3. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  4. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  5. Toward Petascale Biologically Plausible Neural Networks

    Science.gov (United States)

    Long, Lyle

    This talk will describe an approach to achieving petascale neural networks. Artificial intelligence has been oversold for many decades. Computers in the beginning could only do about 16,000 operations per second. Computer processing power, however, has been doubling every two years thanks to Moore's law, and growing even faster due to massively parallel architectures. Finally, 60 years after the first AI conference we have computers on the order of the performance of the human brain (1016 operations per second). The main issues now are algorithms, software, and learning. We have excellent models of neurons, such as the Hodgkin-Huxley model, but we do not know how the human neurons are wired together. With careful attention to efficient parallel computing, event-driven programming, table lookups, and memory minimization massive scale simulations can be performed. The code that will be described was written in C + + and uses the Message Passing Interface (MPI). It uses the full Hodgkin-Huxley neuron model, not a simplified model. It also allows arbitrary network structures (deep, recurrent, convolutional, all-to-all, etc.). The code is scalable, and has, so far, been tested on up to 2,048 processor cores using 107 neurons and 109 synapses.

  6. Scalable Virtual Network Mapping Algorithm for Internet-Scale Networks

    Science.gov (United States)

    Yang, Qiang; Wu, Chunming; Zhang, Min

    The proper allocation of network resources from a common physical substrate to a set of virtual networks (VNs) is one of the key technical challenges of network virtualization. While a variety of state-of-the-art algorithms have been proposed in an attempt to address this issue from different facets, the challenge still remains in the context of large-scale networks as the existing solutions mainly perform in a centralized manner which requires maintaining the overall and up-to-date information of the underlying substrate network. This implies the restricted scalability and computational efficiency when the network scale becomes large. This paper tackles the virtual network mapping problem and proposes a novel hierarchical algorithm in conjunction with a substrate network decomposition approach. By appropriately transforming the underlying substrate network into a collection of sub-networks, the hierarchical virtual network mapping algorithm can be carried out through a global virtual network mapping algorithm (GVNMA) and a local virtual network mapping algorithm (LVNMA) operated in the network central server and within individual sub-networks respectively with their cooperation and coordination as necessary. The proposed algorithm is assessed against the centralized approaches through a set of numerical simulation experiments for a range of network scenarios. The results show that the proposed hierarchical approach can be about 5-20 times faster for VN mapping tasks than conventional centralized approaches with acceptable communication overhead between GVNCA and LVNCA for all examined networks, whilst performs almost as well as the centralized solutions.

  7. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  8. Generalization performance of regularized neural network models

    DEFF Research Database (Denmark)

    Larsen, Jan; Hansen, Lars Kai

    1994-01-01

    Architecture optimization is a fundamental problem of neural network modeling. The optimal architecture is defined as the one which minimizes the generalization error. This paper addresses estimation of the generalization performance of regularized, complete neural network models. Regularization...

  9. Introducing Synchronisation in Deterministic Network Models

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Jessen, Jan Jakob; Nielsen, Jens Frederik D.

    2006-01-01

    The paper addresses performance analysis for distributed real time systems through deterministic network modelling. Its main contribution is the introduction and analysis of models for synchronisation between tasks and/or network elements. Typical patterns of synchronisation are presented leading...

  10. Complex Dynamics in Communication Networks

    CERN Document Server

    Kocarev, Ljupco

    2005-01-01

    Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks without central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node diversity, or dynamical evolution. The present volume is the first book entirely devoted to the new and emerging field of nonlinear dynamics of TCP/IP networks. It addresses both scientists and engineers working in the general field of communication networks.

  11. Dynamic protocol stack composition: protocol independent addressing

    OpenAIRE

    Michiels, Sam; Mahieu, Tom; Matthijs, Frank; Verbaeten, Pierre

    2001-01-01

    This paper presents a generic addressing framework (GAF) which enables the development of protocol stack independent applications. This framework has been developed in the context of dynamic protocol stack composition. Having a way to compose and build protocol stacks is not sufficient. The protocol layers a stack is composed of have an impact on the addressing used inside the stack. Since addresses are used by applications, the impact of modifying the stack dynamically is not automaticall...

  12. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  13. Organizational empowerment in community mobilization to address youth violence.

    Science.gov (United States)

    Griffith, Derek M; Allen, Julie Ober; Zimmerman, Marc A; Morrel-Samuels, Susan; Reischl, Thomas M; Cohen, Sarah E; Campbell, Katie A

    2008-03-01

    Community mobilization efforts to address youth violence are often disconnected, uncoordinated, and lacking adequate resources. An organizational empowerment theory for community partnerships provides a useful framework for organizing and evaluating a coalition's community mobilization efforts and benefits for individual organizations, partnerships, and communities. Based on a qualitative analysis of steering committee interviews and other primary data, the results of a case study suggest that the intraorganizational infrastructure; interorganizational membership practices and networking; and extraorganizational research, training, and organizing activities facilitate the community mobilization efforts of the Youth Violence Prevention Center in Flint, Michigan. The organizational empowerment framework, and its focus on organizational structures and processes, illustrates the importance of recognizing and incorporating the organizational systems and structures that provide the foundation on which a community mobilization effort may build. This framework also highlights how organizational structures and processes are central components of multilevel strategies for organizing and mobilizing community efforts to address youth violence.

  14. A memory efficient implementation scheme of Gauss error function in a Laguerre-Volterra network for neuroprosthetic devices

    Science.gov (United States)

    Li, Will X. Y.; Cui, Ke; Zhang, Wei

    2017-04-01

    Cognitive neural prosthesis is a manmade device which can be used to restore or compensate for lost human cognitive modalities. The generalized Laguerre-Volterra (GLV) network serves as a robust mathematical underpinning for the development of such prosthetic instrument. In this paper, a hardware implementation scheme of Gauss error function for the GLV network targeting reconfigurable platforms is reported. Numerical approximations are formulated which transform the computation of nonelementary function into combinational operations of elementary functions, and memory-intensive look-up table (LUT) based approaches can therefore be circumvented. The computational precision can be made adjustable with the utilization of an error compensation scheme, which is proposed based on the experimental observation of the mathematical characteristics of the error trajectory. The precision can be further customizable by exploiting the run-time characteristics of the reconfigurable system. Compared to the polynomial expansion based implementation scheme, the utilization of slice LUTs, occupied slices, and DSP48E1s on a Xilinx XC6VLX240T field-programmable gate array has decreased by 94.2%, 94.1%, and 90.0%, respectively. While compared to the look-up table based scheme, 1.0 ×1017 bits of storage can be spared under the maximum allowable error of 1.0 ×10-3 . The proposed implementation scheme can be employed in the study of large-scale neural ensemble activity and in the design and development of neural prosthetic device.

  15. Geodetic Networks, This is udated by the use of GPS and updated weekely. It consist of interstate highways, state highways, major roads and local roads as well as private streets with address range, speed limit and elevation data associated to each segement., Published in 2007, Johnson County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Geodetic Networks dataset current as of 2007. This is udated by the use of GPS and updated weekely. It consist of interstate highways, state highways, major roads...

  16. 27 CFR 41. 228 - Change in address.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Change in address. 41. 228 Section 41. 228 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU..., AND PROCESSED TOBACCO Changes After Original Qualification of Importers Changes in Location Or Address...

  17. 29 CFR 4245.7 - PBGC address.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false PBGC address. 4245.7 Section 4245.7 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION INSOLVENCY, REORGANIZATION, TERMINATION, AND OTHER RULES APPLICABLE TO MULTIEMPLOYER PLANS NOTICE OF INSOLVENCY § 4245.7 PBGC address. See...

  18. Between Being and Knowing: Addressing the Fundamental ...

    African Journals Online (AJOL)

    Christopher R Stones

    Between Being and Knowing: Addressing the Fundamental Hesitation in. Hermeneutic Phenomenological Writing by Tone Saevi. Abstract. Starting from the practice of hermeneutic phenomenological writing as it has been advanced by van Manen, this paper addresses the understanding of an 'experiential givenness' of the ...

  19. Dynamic Network Topologies

    Science.gov (United States)

    2013-06-13

    possible network configurations. It is important to address the impacts this modification has to the cryptanalysis of AES. In [19], the creators address...differential and linear cryptanalysis through the propagation of bit patterns over the algorithm steps. Daemen and Rijmen state the ShiftRow has the...linear cryptanalysis . The ShiftInterfaces step provides further diffusion of the bit pattern, since the step moves bits of one layer into another. The

  20. Local address and emergency contact details

    CERN Multimedia

    2013-01-01

    The HR Department would like to remind members of the personnel that they are responsible for ensuring that their personal data concerning local address and preferred emergency contact details remains valid and up-to-date.   Both are easily accessible via the links below: Local address: https://edh.cern.ch/Document/Personnel/LocalAddressChange   Emergency contacts: https://edh.cern.ch/Document/Personnel/EC   Please take a few minutes to check your details and modify if necessary. Thank you in advance. HR Department Head Office

  1. Design of survivable networks

    CERN Document Server

    Stoer, Mechthild

    1992-01-01

    The problem of designing a cost-efficient network that survives the failure of one or more nodes or edges of the network is critical to modern telecommunications engineering. The method developed in this book is designed to solve such problems to optimality. In particular, a cutting plane approach is described, based on polyhedral combinatorics, that is ableto solve real-world problems of this type in short computation time. These results are of interest for practitioners in the area of communication network design. The book is addressed especially to the combinatorial optimization community, but also to those who want to learn polyhedral methods. In addition, interesting new research problemsare formulated.

  2. Self-organizing networks

    DEFF Research Database (Denmark)

    Marchetti, Nicola; Prasad, Neeli R.; Johansson, Johan

    2010-01-01

    In this paper, a general overview of Self-Organizing Networks (SON), and the rationale and state-of-the-art of wireless SON are first presented. The technical and business requirements are then briefly treated, and the research challenges within the field of SON are highlighted. Thereafter......, the relation between SON and Cognitive Networks (CN) is covered. At last, the application of Algorithmic Information Theory (AIT) as a possible theoretical tool to support SON in addressing the growing complexity of networks is discussed....

  3. Innovative Legal Approaches to Address Obesity

    OpenAIRE

    Pomeranz, Jennifer L.; Teret, Stephen P.; Sugarman, Stephen D; Rutkow, Lainie; Brownell, Kelly D.

    2009-01-01

    Context: The law is a powerful public health tool with considerable potential to address the obesity issue. Scientific advances, gaps in the current regulatory environment, and new ways of conceptualizing rights and responsibilities offer a foundation for legal innovation.

  4. 76 FR 80903 - Mandatory Declassification Review Addresses

    Science.gov (United States)

    2011-12-27

    ... Agency/Central Security Service. National Security Agency, Declassification Office, DJP5, 9800 Savage... of the Secretary Mandatory Declassification Review Addresses AGENCY: Department of Defense. ACTION: Notice. SUMMARY: Pursuant to the Information Security Oversight Office's Classified National Security...

  5. VT E911 ESITE geocoder - address points

    Data.gov (United States)

    Vermont Center for Geographic Information — VT E911 ESITE geocoder - address points. VCGI, in collaboration with the VT E911 Board, has created a suite of geocoding services that can be used to batch geocode...

  6. VT E911 road address range geocoder

    Data.gov (United States)

    Vermont Center for Geographic Information — VT E911 road address range geocoder. VCGI, in collaboration with the VT E911 Board, has created a suite of geocoding services that can be used to batch geocode...

  7. Addressing Transition Issues in Languages Education.

    Science.gov (United States)

    Steigler-Peters, Susi; Moran, Wendy; Piccioli, Maria Teresa; Chesterton, Paul

    2003-01-01

    Focuses on what has been learned from the implementation and evaluation of the Australian Language and Continuity Initiative (LCI) in relation to addressing transition issues in language education. (Author/VWL)

  8. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  9. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  10. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  11. Simulation Of Networking Protocols On Software Emulated Network Stack

    Directory of Open Access Journals (Sweden)

    Hrushikesh Nimkar

    2015-08-01

    Full Text Available With the increasing number and complexity of network based applications the need to easy configuration development and integration of network applications has taken a high precedence. Trivial activities such as configuration can be carried out efficiently if network services are software based rather than hardware based. Project aims at enabling the network engineers to easily include network functionalities into hisher configuration and define hisher own network stack without using the kernel network stack. Having thought of this we have implemented two functionalities UPNP and MDNS. The multicast Domain Name System MDNS resolves host names to IP addresses within small ad-hoc networks and without having need of special DNS server and its configuration. MDNS application provides every host with functionality to register itself to the router make a multicast DNS request and its resolution. To make adding network devices and networked programs to a network as easy as it is to plug in a piece of hardware into a PC we make use of UPnP. The devices and programs find out about the network setup and other networked devices and programs through discovery and advertisements of services and configure themselves accordingly. UPNP application provides every host with functionality of discovering services of other hosts and serving requests on demand. To implement these applications we have used snabbswitch framework which an open source virtualized ethernet networking stack.

  12. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  13. 46 CFR 67.113 - Managing owner designation; address; requirement to report change of address.

    Science.gov (United States)

    2010-10-01

    ... change of address. The owner of each vessel must designate a managing owner on the Application for...) Whenever the address of the managing owner changes, the managing owner shall notify the Director, National... 46 Shipping 2 2010-10-01 2010-10-01 false Managing owner designation; address; requirement to...

  14. Global Operations Networks in Motion

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Wæhrens, Brian Vejrum

    2009-01-01

    This paper addresses the phenomenon of global operations networks and how they change over time. The paper is based on the cases of three Danish companies and their global operations networks. It finds a number of common patterns highlighting some organisational effects and managerial challenges...

  15. When Is Network Lasso Accurate?

    Directory of Open Access Journals (Sweden)

    Alexander Jung

    2018-01-01

    Full Text Available The “least absolute shrinkage and selection operator” (Lasso method has been adapted recently for network-structured datasets. In particular, this network Lasso method allows to learn graph signals from a small number of noisy signal samples by using the total variation of a graph signal for regularization. While efficient and scalable implementations of the network Lasso are available, only little is known about the conditions on the underlying network structure which ensure network Lasso to be accurate. By leveraging concepts of compressed sensing, we address this gap and derive precise conditions on the underlying network topology and sampling set which guarantee the network Lasso for a particular loss function to deliver an accurate estimate of the entire underlying graph signal. We also quantify the error incurred by network Lasso in terms of two constants which reflect the connectivity of the sampled nodes.

  16. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  17. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  18. National Diffusion Network.

    Science.gov (United States)

    Hartjen, Raymond H.

    1981-01-01

    Address at the 66th Convention of the International Association of Pupil Personnel Workers, Baltimore, Maryland, October 1980, describes the National Diffusion Network, the marketing arm of the Department of Education. State facilitators share innovations in education with school systems. Many adaptions from Maryland schools are usable in other…

  19. On Identities in Modern Networks

    OpenAIRE

    Libor Polcak; Radek Hranicky; Tomas Martinek

    2014-01-01

    Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception ...

  20. Addressing the Issue: Bullying and LGBTQ Youth

    Directory of Open Access Journals (Sweden)

    Kimberly Allen

    2014-09-01

    Full Text Available Each day, thousands of youth experience bullying and as many of 70% of all youth report having experienced bullying, either directly or indirectly (Cantor, 2005. For Gay, Lesbian, Bi-sexual, Transgender and Questioning (LGBTQ youth, the chances of experiencing bullying are much higher than for youth in the general population (Russell, Horn, Kosciw, & Saewyc, 2010. Although many youth serving organizations have begun to address the issue of bullying with bullying prevention programs, there is a deficit of information and a lack of inclusion of prevention efforts that specifically address LGBTQ youth. This article address the role of youth organizations in creating safe and inclusive environments for all youth, with specific attention paid to resources and strategies for inclusive environments for LGBTQ youth.

  1. Address rituals as heuristics of social structure

    Directory of Open Access Journals (Sweden)

    E.F. Kotze

    2013-02-01

    Full Text Available The address form as linguistic variable has more realisation possibilities than any other, because semantic variation is involved and it reflects all the different interpersonal relations in the societal structure. Factors such as religious status, sex, kinship and age differences play a key role in the choice of the address form. It is hypothesised that the way in which address forms vary in a speech community is a linguistic reflection of the social norms determining the hierarchical structure of the community. Die aanspreekvorm as linguistiese veranderlike het meer verwesenlikingsmoontlikhede as enige ander vorm, want semantiese verskeidenheid is betrokke en dit reflekteer die verskillende interpersoonlike verhoudings in die gemeenskapstruktuur. Faktore soos religieuse status, geslag, verwantskap en ouderdomsverskille speel 'n sleutelrol in die aanspreekvorm. Daar word gehipotetiseer dat die wyse waarop aanspreekvorms in 'n spraakgemeenskap wissel, 'n linguistiese refleksie is van die sosiale norme wat die hierargiese struktuur van die gemeenskap bepaal.

  2. Centrally managed unified shared virtual address space

    Science.gov (United States)

    Wilkes, John

    2018-02-13

    Systems, apparatuses, and methods for managing a unified shared virtual address space. A host may execute system software and manage a plurality of nodes coupled to the host. The host may send work tasks to the nodes, and for each node, the host may externally manage the node's view of the system's virtual address space. Each node may have a central processing unit (CPU) style memory management unit (MMU) with an internal translation lookaside buffer (TLB). In one embodiment, the host may be coupled to a given node via an input/output memory management unit (IOMMU) interface, where the IOMMU frontend interface shares the TLB with the given node's MMU. In another embodiment, the host may control the given node's view of virtual address space via memory-mapped control registers.

  3. Centrally managed unified shared virtual address space

    Energy Technology Data Exchange (ETDEWEB)

    Wilkes, John

    2018-02-13

    Systems, apparatuses, and methods for managing a unified shared virtual address space. A host may execute system software and manage a plurality of nodes coupled to the host. The host may send work tasks to the nodes, and for each node, the host may externally manage the node's view of the system's virtual address space. Each node may have a central processing unit (CPU) style memory management unit (MMU) with an internal translation lookaside buffer (TLB). In one embodiment, the host may be coupled to a given node via an input/output memory management unit (IOMMU) interface, where the IOMMU frontend interface shares the TLB with the given node's MMU. In another embodiment, the host may control the given node's view of virtual address space via memory-mapped control registers.

  4. Network topology mapper

    Science.gov (United States)

    Quist, Daniel A [Los Alamos, NM; Gavrilov, Eugene M [Los Alamos, NM; Fisk, Michael E [Jemez, NM

    2008-01-15

    A method enables the topology of an acyclic fully propagated network to be discovered. A list of switches that comprise the network is formed and the MAC address cache for each one of the switches is determined. For each pair of switches, from the MAC address caches the remaining switches that see the pair of switches are located. For each pair of switches the remaining switches are determined that see one of the pair of switches on a first port and the second one of the pair of switches on a second port. A list of insiders is formed for every pair of switches. It is determined whether the insider for each pair of switches is a graph edge and adjacent ones of the graph edges are determined. A symmetric adjacency matrix is formed from the graph edges to represent the topology of the data link network.

  5. Addressing techniques of liquid crystal displays

    CERN Document Server

    Ruckmongathan, Temkar N

    2014-01-01

    Unique reference source that can be used from the beginning to end of a design project to aid choosing an appropriate LCD addressing technique for a given application This book will be aimed at design engineers who are likely to embed LCD drivers and controllers in many systems including systems on chip. Such designers face the challenge of making the right choice of an addressing technique that will serve them with best performance at minimal cost and complexity. Readers will be able to learn about various methods available for driving matrix LCDs and the comparisons at the end of each chap

  6. Discovering universal statistical laws of complex networks

    CERN Document Server

    Cardanobile, Stefano; Deger, Moritz; Rotter, Stefan

    2011-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their generalisation power, which we identify with large structural variability and absence of constraints imposed by the construction scheme. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This allows, for instance, to infer global features from local ones usi...

  7. Improving ecosystem service frameworks to address wicked problems

    Directory of Open Access Journals (Sweden)

    Kathryn K. Davies

    2015-06-01

    Full Text Available Complex problems often result from the multiple interactions between human activities and ecosystems. The interconnected nature of ecological and social systems should be considered if these "wicked problems" are to be addressed. Ecosystem service approaches provide an opportunity to link ecosystem function with social values, but in practice the essential role that social dynamics play in the delivery of outcomes remains largely unexplored. Social factors such as management regimes, power relationships, skills, and values, can dramatically affect the definition and delivery of ecosystem services. Input from a diverse group of stakeholders improves the capacity of ecosystem service approaches to address wicked problems by acknowledging diverse sets of values and accounting for conflicting world views. Participatory modeling can incorporate both social and ecological dynamics into decision making that involves stakeholders, but is itself a complex social undertaking that may not yield precise or predictable outcomes. We explore the efficacy of different types of participatory modeling in relation to the integration of social values into ecosystem services frameworks and the generation of four important elements of social capital needed to address wicked problems: enhancing social learning and capacity building; increasing transparency; mediating power; and building trust. Our findings indicate that mediated modeling, group mapping, and mental/conceptual modeling are likely to generate elements of social capital that can improve ecosystem service frameworks. Participatory simulation, system dynamic modeling, and Bayesian belief networks, if utilized in isolation, were found to have a low likelihood of generating the social capital needed to improve ecosystem services frameworks. Scenario planning, companion modeling, group model building, and participatory mapping all generate a moderate to high level of social capital elements that improve the

  8. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  9. Road Map to Address Cognitive Health

    Centers for Disease Control (CDC) Podcasts

    2014-06-09

    In this podcast, CDC’s Dr. Lynda Anderson highlights the important roles that states and communities can play in addressing cognitive health as part of overall health.  Created: 6/9/2014 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 6/9/2014.

  10. Addressing uncertainty in vulnerability assessments [Chapter 5

    Science.gov (United States)

    Linda Joyce; Molly Cross; Evan Girvatz

    2011-01-01

    This chapter addresses issues and approaches for dealing with uncertainty specifically within the context of conducting climate change vulnerability assessments (i.e., uncertainties related to identifying and modeling the sensitivities, levels of exposure, and adaptive capacity of the assessment targets).

  11. 77 FR 48429 - Commission Address Change

    Science.gov (United States)

    2012-08-14

    ... because the amendments are of a minor and administrative nature dealing with only a change in address. The... Sunshine Act. 29 CFR Part 2702 Freedom of information. 29 CFR Part 2704 Claims, Equal access to justice... 520N, Washington, DC 20004-1710''. PART 2704--IMPLEMENTATION OF THE EQUAL ACCESS TO JUSTICE ACT IN...

  12. Addressing Student Debt in the Classroom

    Science.gov (United States)

    Perkins, David; Johnston, Tim; Lytle, Rick

    2016-01-01

    Student debt is a national concern. The authors address debt in the classroom to enhance students' understanding of the consequences of debt and the need for caution when financing their education. However, student feedback indicates this understanding has a delayed effect on borrowing behavior and underscores the importance of making difficult…

  13. Addressing Undernutrition in Mothers and Children

    African Journals Online (AJOL)

    supplementation, micronutrient supplementation, balanced protein- energy supplementation, and antimalarial therapy in areas where the malaria incidence is high. All of these have been shown to improve birth weight overall and reduce the incidence of intrauterine growth restriction. Addressing Undernutrition in Mothers ...

  14. Addressing African feminism | Chidammodzi | Journal of Humanities

    African Journals Online (AJOL)

    Journal of Humanities. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 8-9, No 1 (1995) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register. Addressing African feminism. HF Chidammodzi. Abstract.

  15. Addressing production stops in the food industry

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Herbert, Luke Thomas; Jacobsen, Peter

    2014-01-01

    This paper investigates the challenges in the food industry which causes the production lines to stop, illustrated by a case study of an SME size company in the baked goods sector in Denmark. The paper proposes key elements this sector needs to be aware of to effectively address production stops,...

  16. Naming and Address in Afghan Society.

    Science.gov (United States)

    Miran, M. Alam

    Forms of address in Afghan society reflect the relationships between the speakers as well as the society's structure. In Afghan Persian, or Dari, first, second, and last names have different semantic dimensions. Boys' first names usually consist of two parts or morphemes, of which one may be part of the father's name. Girls' names usually consist…

  17. 49 CFR 369.6 - Address.

    Science.gov (United States)

    2010-10-01

    ... Administration, Office of Information Technology (MC-RI), 1200 New Jersey Ave., SE., Washington, DC 20590-0001... 49 Transportation 5 2010-10-01 2010-10-01 false Address. 369.6 Section 369.6 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL MOTOR CARRIER SAFETY ADMINISTRATION, DEPARTMENT OF...

  18. Addressing Measurement Issues Related to Bullying Involvement

    Science.gov (United States)

    Casper, Deborah M.; Meter, Diana J.; Card, Noel A.

    2015-01-01

    In this article, we address measurement issues related to select aspects of bullying involvement with the goal of moving psychometrically sound measurement practices toward applied bullying research. We first provide a nontechnical introduction to psychometric considerations in measuring bullying involvement, highlighting the importance of…

  19. THE ROLE OF NUTRITIONAL INFORMATION IN ADDRESSING ...

    African Journals Online (AJOL)

    The paper discusses the role of nutritional information for addressing under-five child malnutrition in Tanzania. The paper is based on a master's dissertation whose objective was to determine the sources of nutritional information used to provide nutritional information to mothers in Maternal and Child Health (MCH) clinics, ...

  20. How Sociology Texts Address Gun Control

    Science.gov (United States)

    Tonso, William R.

    2004-01-01

    William R. Tonso has chosen an issue that he knows something about to examine how sociology textbooks address controversy. Appealing for gun control is fashionable, but it is at odds with a fondness that ordinary Americans have for their firearms--one that is supported by a growing body of research on deterrence to crime. There are two sides to…

  1. Addressing Psychosocial Factors with Library Mentoring

    Science.gov (United States)

    Farrell, Bridget; Alabi, Jaena; Whaley, Pambanisha; Jenda, Claudine

    2017-01-01

    The majority of articles on mentoring in the library and information science field address career development by emphasizing the orientation process for new librarians and building the requisite skills for a specific job. Few articles deal with the psychological and social challenges that many early-career and minority librarians face, which can…

  2. Address-event-based platform for bioinspired spiking systems

    Science.gov (United States)

    Jiménez-Fernández, A.; Luján, C. D.; Linares-Barranco, A.; Gómez-Rodríguez, F.; Rivas, M.; Jiménez, G.; Civit, A.

    2007-05-01

    Address Event Representation (AER) is an emergent neuromorphic interchip communication protocol that allows a real-time virtual massive connectivity between huge number neurons, located on different chips. By exploiting high speed digital communication circuits (with nano-seconds timings), synaptic neural connections can be time multiplexed, while neural activity signals (with mili-seconds timings) are sampled at low frequencies. Also, neurons generate "events" according to their activity levels. More active neurons generate more events per unit time, and access the interchip communication channel more frequently, while neurons with low activity consume less communication bandwidth. When building multi-chip muti-layered AER systems, it is absolutely necessary to have a computer interface that allows (a) reading AER interchip traffic into the computer and visualizing it on the screen, and (b) converting conventional frame-based video stream in the computer into AER and injecting it at some point of the AER structure. This is necessary for test and debugging of complex AER systems. In the other hand, the use of a commercial personal computer implies to depend on software tools and operating systems that can make the system slower and un-robust. This paper addresses the problem of communicating several AER based chips to compose a powerful processing system. The problem was discussed in the Neuromorphic Engineering Workshop of 2006. The platform is based basically on an embedded computer, a powerful FPGA and serial links, to make the system faster and be stand alone (independent from a PC). A new platform is presented that allow to connect up to eight AER based chips to a Spartan 3 4000 FPGA. The FPGA is responsible of the network communication based in Address-Event and, at the same time, to map and transform the address space of the traffic to implement a pre-processing. A MMU microprocessor (Intel XScale 400MHz Gumstix Connex computer) is also connected to the FPGA

  3. Privacy Breach Analysis in Social Networks

    Science.gov (United States)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  4. Advanced communication and network requirements in Europe

    DEFF Research Database (Denmark)

    Falch, Morten; Enemark, Rasmus

    The report address diffusion of new tele-application, focusing on potential use and potential tele-trafic genrated as a consequense. The applications investigated are: Teleworking, distance learning, research and university network, applications aimed at SMEs, health networks, a trans European pu...... public administation network, city information highway, road-trafic manegement, air traffic control and electronic quotation....

  5. Bayesian networks and food security - An introduction

    NARCIS (Netherlands)

    Stein, A.

    2004-01-01

    This paper gives an introduction to Bayesian networks. Networks are defined and put into a Bayesian context. Directed acyclical graphs play a crucial role here. Two simple examples from food security are addressed. Possible uses of Bayesian networks for implementation and further use in decision

  6. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  7. Mapping virtual addresses to different physical addresses for value disambiguation for thread memory access requests

    Science.gov (United States)

    Gala, Alan; Ohmacht, Martin

    2014-09-02

    A multiprocessor system includes nodes. Each node includes a data path that includes a core, a TLB, and a first level cache implementing disambiguation. The system also includes at least one second level cache and a main memory. For thread memory access requests, the core uses an address associated with an instruction format of the core. The first level cache uses an address format related to the size of the main memory plus an offset corresponding to hardware thread meta data. The second level cache uses a physical main memory address plus software thread meta data to store the memory access request. The second level cache accesses the main memory using the physical address with neither the offset nor the thread meta data after resolving speculation. In short, this system includes mapping of a virtual address to a different physical addresses for value disambiguation for different threads.

  8. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  9. GRACEnet: addressing policy needs through coordinated cross-location research

    Science.gov (United States)

    Jawson, Michael D.; Walthall, Charles W.; Shafer, Steven R.; Liebig, Mark; Franzluebbers, Alan J.; Follett, Ronald F.

    2012-01-01

    GRACEnet (Greenhouse gas Reduction through Agricultural Carbon Enhancement network) was conceived to build upon ongoing USDA Agricultural Research Service (ARS) research to improve soil productivity, while addressing the challenges and opportunities of interest in C sequestration from a climate change perspective. The vision for GRACEnet was and remains: Knowledge and information used to implement scientifically based agricultural management practices from the field to national policy scales on C sequestration, greenhouse gas (GHG) emissions, and environmental benefits. The national focus of GRACEnet uses a standardized approach by ARS laboratories and university and land manager (e.g. farmer and rancher) cooperators to assess C sequestration and GHG emission from different crop and grassland systems. Since 2002, GRACEnet has significantly expanded GHG mitigation science and delivered usable information to agricultural research and policy organizations. Recent developments suggest GRACEnet will have international impact by contributing leadership and technical guidance for the Global Research Alliance on Agricultural Greenhouse Gases.

  10. The Role of Local Authorities in Addressing Human Trafficking

    Directory of Open Access Journals (Sweden)

    Kathryn Rossiter

    2009-05-01

    Full Text Available Worldwide, it is estimated that nearly 4 million people fall victim to people traffickers every year. Trafficking is carried out mainly by Organised Criminal Networks and the victims are forced into prostitution, illegal labour, domestic slavery and petty crime. ROSSITER & BENFIELD: The Role of Local Authorities in Addressing Human Trafficking CJLG May 2009 128 On 1 April 2009, the United Kingdom signed up to the Council of Europe Convention on Action against Trafficking in Human Beings.1 The Convention, which has to date been ratified by 20 European countries, is legally binding and aims to promote and protect the rights of victims who have been tricked or forced into leaving their homes, moved to another country, or within their own country, and then exploited. Whilst it is national governments who are signatories to the Council of Europe Convention, local authorities have a key role to play in its successful implementation.

  11. TRACTOGRAPHY DENSITY AND NETWORK MEASURES IN ALZHEIMER'S DISEASE.

    Science.gov (United States)

    Prasad, Gautam; Nir, Talia M; Toga, Arthur W; Thompson, Paul M

    2013-04-01

    Brain connectivity declines in Alzheimer's disease (AD), both functionally and structurally. Connectivity maps and networks derived from diffusion-based tractography offer new ways to track disease progression and to understand how AD affects the brain. Here we set out to identify (1) which fiber network measures show greatest differences between AD patients and controls, and (2) how these effects depend on the density of fibers extracted by the tractography algorithm. We computed brain networks from diffusion-weighted images (DWI) of the brain, in 110 subjects (28 normal elderly, 56 with early and 11 with late mild cognitive impairment, and 15 with AD). We derived connectivity matrices and network topology measures, for each subject, from whole-brain tractography and cortical parcellations. We used an ODF lookup table to speed up fiber extraction, and to exploit the full information in the orientation distribution function (ODF). This made it feasible to compute high density connectivity maps. We used accelerated tractography to compute a large number of fibers to understand what effect fiber density has on network measures and in distinguishing different disease groups in our data. We focused on global efficiency, transitivity, path length, mean degree, density, modularity, small world, and assortativity measures computed from weighted and binary undirected connectivity matrices. Of all these measures, the mean nodal degree best distinguished diagnostic groups. High-density fiber matrices were most helpful for picking up the more subtle clinical differences, e.g. between mild cognitively impaired (MCI) and normals, or for distinguishing subtypes of MCI (early versus late). Care is needed in clinical analyses of brain connectivity, as the density of extracted fibers may affect how well a network measure can pick up differences between patients and controls.

  12. Game theory in communication networks cooperative resolution of interactive networking scenarios

    CERN Document Server

    Antoniou, Josephina

    2012-01-01

    A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game T

  13. Using Active Networking to Detect and Troubleshoot Issues in Tactical Data Networks

    Science.gov (United States)

    2014-06-01

    team SDN software defined networking SIPRnet Secret Internet Protocol Router Network SSH secure shell xiv SVG Scalable Vector Graphics SNMP Simple...networking ( SDN ) paradigm, which has gained popularity in recent years, has its roots in the idea of programmable networks [6]. By extending the...addressed by SDN [6]. While there are simi- larities between SDN and active networking, SDN is primarily concerned with the idea of separating the control

  14. Addressing health disparities through multi-institutional, multidisciplinary collaboratories.

    Science.gov (United States)

    Fleming, Erik S; Perkins, James; Easa, David; Conde, José G; Baker, Richard S; Southerland, William M; Dottin, Robert; Benabe, Julio E; Ofili, Elizabeth O; Bond, Vincent C; McClure, Shelia A; Sayre, Michael H; Beanan, Maureen J; Norris, Keith C

    2008-01-01

    The national research leadership has recently become aware of the tremendous potential of translational research as an approach to address health disparities. The Research Centers in Minority Institutions (RCMI) Translational Research Network (RTRN) is a research network that supports multi-institutional, multidisciplinary collaboration with a focus on key diseases and conditions for which disproportionately adverse racial and ethnic health disparities exist. The RTRN is designed to facilitate the movement of scientific advances across the translational research spectrum by providing researchers at different institutions with the infrastructure and tools necessary to collaborate on interdisciplinary and transdisciplinary research projects relating to specific health outcomes for which major racial/ethnic disparities exist. In the past, the difficulty of overcoming the restrictions imposed by time and space have made it difficult to carry out this type of large-scale, multilevel collaboration efficiently. To address this formidable challenge, the RTRN will deploy a translational research cluster system that uses "cyber workspaces" to bring researchers with similar interests together by using online collaboratory technology. These virtual meeting environments will provide a number of tools, including videoconferences (seminars, works in progress, meetings); project management tools (WebCT, Microsoft Share Point); and posting areas for projects, concepts, and other research and educational activities. This technology will help enhance access to resources across institutions with a common mission, minimize many of the logistical hurdles that impede intellectual exchange, streamline the planning and implementation of innovative interdisciplinary research, and assess the use of protocols and practices to assist researchers in interacting across and within cyber workspaces.

  15. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base......, and for the analyzed scenario it can assure synchronization on the nanosecond level, fulfilling mobile network requirements. Furthermore, mechanisms to lower delay and jitter have been identified, namely: source scheduling and preemption. An innovative source scheduling scheme which can minimize jitter has been...

  16. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  17. Network Cosmology

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S.; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology. PMID:23162688

  18. Discovering large network motifs from a complex biological network

    Science.gov (United States)

    Terada, Aika; Sese, Jun

    2009-12-01

    Graph structures representing relationships between entries have been studied in statistical analysis, and the results of these studies have been applied to biological networks, whose nodes and edges represent proteins and the relationships between them, respectively. Most of the studies have focused on only graph structures such as scale-free properties and cliques, but the relationships between nodes are also important features since most of the proteins perform their functions by connecting to other proteins. In order to determine such relationships, the problem of network motif discovery has been addressed; network motifs are frequently appearing graph structures in a given graph. However, the methods for network motif discovery are highly restrictive for the application to biological network because they can only be used to find small network motifs or they do not consider noise and uncertainty in observations. In this study, we introduce a new index to measure network motifs called AR index and develop a novel algorithm called ARIANA for finding large motifs even when the network has noise. Experiments using a synthetic network verify that our method can find better network motifs than an existing algorithm. By applying ARIANA to a real complex biological network, we find network motifs associated with regulations of start time of cell functions and generation of cell energies and discover that the cell cycle proteins can be categorized into two different groups.

  19. A stromal address code defined by fibroblasts.

    Science.gov (United States)

    Parsonage, Greg; Filer, Andrew D; Haworth, Oliver; Nash, Gerard B; Rainger, G Ed; Salmon, Michael; Buckley, Christopher D

    2005-03-01

    To navigate into and within tissues, leukocytes require guidance cues that enable them to recognize which tissues to enter and which to avoid. Such cues are partly provided at the time of extravasation from blood by an endothelial address code on the luminal surface of the vascular endothelium. Here, we review the evidence that fibroblasts help define an additional stromal address code that directs leukocyte behaviour within tissues. We examine how this stromal code regulates site-specific leukocyte accumulation, differentiation and survival in a variety of physiological stromal niches, and how the aberrant expression of components of this code in the wrong tissue at the wrong time contributes to the persistence of chronic inflammatory diseases.

  20. World Federation of Vascular Societies: presidential address

    DEFF Research Database (Denmark)

    Sillesen, Henrik Hegaard

    2010-01-01

    The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally imp...... throughout the world. In addition, for introduction of new treatments, training issues and dissemination of science a global organisation like the WFVS is needed.......The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally....... Similar, in order to be able to train with relevant case mix and numbers, and in order always to have both complex open and endovascular skills on call 24 hours per day, 365 days a year, centralisation into larger units is necessary. The WFVS is important simply looking at the huge demographic differences...

  1. Do pediatric gastroenterology doctors address pediatric obesity?

    OpenAIRE

    Batra, Suruchi; Yee, Caitlin; Diez, Bernadette; Nguyen, Nicholas; Sheridan, Michael J.; Tufano, Mark; Sikka, Natalie; Townsend, Stacie; Hourigan, Suchitra

    2017-01-01

    Objectives: To assess how often obesity is acknowledged at pediatric gastroenterology outpatient visits. Methods: A retrospective chart review was performed to identify obese children seen at a gastroenterology subspecialty clinic over a 1-year period of time; 132 children were identified. Demographics, obesity comorbidities, reasons for referral, diagnosis of obesity, and a plan to address obesity were abstracted. Chi-square or Fisher?s exact tests were used to examine statistical associatio...

  2. Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report.

    Science.gov (United States)

    Finn, Gregory G.

    This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…

  3. A scalable addressing method when using IMS as a service bus infrastructure

    NARCIS (Netherlands)

    Stokking, H.M.; Hartog, F.T.H. den; Walraven, F.A.

    2009-01-01

    The dynamic provisioning of SIP addresses is a challenge when many devices and services are dynamically attached to an IMS network. Manual provisioning is too labor intensive for a telecommunications operator, and it is difficult to do it in a way that allows those devices and services access to all

  4. Innovative Legal Approaches to Address Obesity

    Science.gov (United States)

    Pomeranz, Jennifer L; Teret, Stephen P; Sugarman, Stephen D; Rutkow, Lainie; Brownell, Kelly D

    2009-01-01

    Context: The law is a powerful public health tool with considerable potential to address the obesity issue. Scientific advances, gaps in the current regulatory environment, and new ways of conceptualizing rights and responsibilities offer a foundation for legal innovation. Methods: This article connects developments in public health and nutrition with legal advances to define promising avenues for preventing obesity through the application of the law. Findings: Two sets of approaches are defined: (1) direct application of the law to factors known to contribute to obesity and (2) original and innovative legal solutions that address the weak regulatory stance of government and the ineffectiveness of existing policies used to control obesity. Specific legal strategies are discussed for limiting children's food marketing, confronting the potential addictive properties of food, compelling industry speech, increasing government speech, regulating conduct, using tort litigation, applying nuisance law as a litigation strategy, and considering performance-based regulation as an alternative to typical regulatory actions. Finally, preemption is an overriding issue and can play both a facilitative and a hindering role in obesity policy. Conclusions: Legal solutions are immediately available to the government to address obesity and should be considered at the federal, state, and local levels. New and innovative legal solutions represent opportunities to take the law in creative directions and to link legal, nutrition, and public health communities in constructive ways. PMID:19298420

  5. Addressing fisheries bycatch in a changing world

    Directory of Open Access Journals (Sweden)

    Lisa Marie Komoroske

    2015-10-01

    Full Text Available Fisheries bycatch is a threat to species of marine megafauna across the world’s oceans. Work over the past several decades has greatly advanced our understanding of the species affected, the magnitude and the spatial extent of bycatch. In the same time period, there have been substantial advances in the development of mitigation strategies and best practices to reduce bycatch. In this paper, we take stock of bycatch knowledge and science to address the critical question Where do we go from here? First, we review the current state of global bycatch science, including bycatch rate estimation and biological effects of bycatch, and bycatch mitigation practices and gear. We then identify knowledge gaps as well as socio-cultural constraints that hamper effective knowledge transfer or implementation, and discuss emerging transdisciplinary approaches to address these issues. Finally, we discuss the need to consider bycatch in a changing ocean and socio-cultural context where species, ecosystems, and people are responding to multiple stressors and dynamic conditions. As the field of bycatch research moves into the 21st century, a new perspective is needed to develop responsive strategies that effectively address the shifting ecological, social, cultural and economic contexts of the global bycatch seascape.

  6. Addressing language barriers to healthcare in India.

    Science.gov (United States)

    Narayan, Lalit

    2013-01-01

    In spite of a growing recognition of the importance of doctor-patient communication, the issue of language barriers to healthcare has received very little attention in India. The Indian population speaks over 22 major languages with English used as the lingua franca for biomedicine. Large-scale internal migration has meant that health workers are encountering increasing instances of language discordance within clinical settings. Research done predominantly in the West has shown language discordance to significantly affect access to care, cause problems of comprehension and adherence, and decrease the satisfaction and quality of care. Addressing language barriers to healthcare in India requires a stronger political commitment to providing non-discriminatory health services, especially to vulnerable groups such as illiterate migrant workers. Research will have to address three broad areas: the ways in which language barriers affect health and healthcare, the efficacy of interventions to overcome language barriers, and the costs of language barriers and efforts to overcome them. There is a need to address such barriers in health worker education and clinical practice. Proven strategies such as hiring multilingual healthcare workers, providing language training to health providers, employing in situ translators or using telephone interpretation services will have to be evaluated for their appropriateness to the Indian context. Internet-based initiatives, the proliferation of mobile phones and recent advances in machine translation promise to contribute to the solution. Copyright 2013, NMJI.

  7. Matching Alternative Addresses: a Semantic Web Approach

    Science.gov (United States)

    Ariannamazi, S.; Karimipour, F.; Hakimpour, F.

    2015-12-01

    Rapid development of crowd-sourcing or volunteered geographic information (VGI) provides opportunities for authoritatives that deal with geospatial information. Heterogeneity of multiple data sources and inconsistency of data types is a key characteristics of VGI datasets. The expansion of cities resulted in the growing number of POIs in the OpenStreetMap, a well-known VGI source, which causes the datasets to outdate in short periods of time. These changes made to spatial and aspatial attributes of features such as names and addresses might cause confusion or ambiguity in the processes that require feature's literal information like addressing and geocoding. VGI sources neither will conform specific vocabularies nor will remain in a specific schema for a long period of time. As a result, the integration of VGI sources is crucial and inevitable in order to avoid duplication and the waste of resources. Information integration can be used to match features and qualify different annotation alternatives for disambiguation. This study enhances the search capabilities of geospatial tools with applications able to understand user terminology to pursuit an efficient way for finding desired results. Semantic web is a capable tool for developing technologies that deal with lexical and numerical calculations and estimations. There are a vast amount of literal-spatial data representing the capability of linguistic information in knowledge modeling, but these resources need to be harmonized based on Semantic Web standards. The process of making addresses homogenous generates a helpful tool based on spatial data integration and lexical annotation matching and disambiguating.

  8. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  9. The importance of systems thinking to address obesity.

    Science.gov (United States)

    Finegood, Diane T

    2012-01-01

    Obesity is clearly a complex problem for both the individual and for society. Complex or 'wicked' problems have common characteristics such as heterogeneity, nonlinearity, interdependence, and self-organization. As such they require solutions appropriate for complex problems, rather than a reductionist search for the causes. 'Systems thinking' provides new ways to consider how to collectively address complex societal problems like obesity, where biology interacts with social, cultural and built environmental factors in infinite permutations and combinations. The systems that give rise to the obesity epidemic function at multiple levels, and there are important interactions between these levels. At any given level, individual actors and organizations matter and system function is optimized when individual and organizational capacity to respond is well matched to the complexity of individual tasks. Providing system supports to help networks of individuals become 'communities of practice' and 'systems of influence' may also help to accelerate the pace of effective action against obesity. Research efforts need to move away from the relentless search for the specific isolated causes of obesity and focus on solutions that have been shown to work in addressing other 'wicked' problems. Copyright © 2012 Nestec Ltd., Vevey/S. Karger AG, Basel.

  10. Technologies for unattended network operations

    Science.gov (United States)

    Jaworski, Allan; Odubiyi, Jide; Holdridge, Mark; Zuzek, John

    1991-01-01

    The necessary network management functions for a telecommunications, navigation and information management (TNIM) system in the framework of an extension of the ISO model for communications network management are described. Various technologies that could substantially reduce the need for TNIM network management, automate manpower intensive functions, and deal with synchronization and control at interplanetary distances are presented. Specific technologies addressed include the use of the ISO Common Management Interface Protocol, distributed artificial intelligence for network synchronization and fault management, and fault-tolerant systems engineering.

  11. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  12. Interactive Network Exploration with Orange

    Directory of Open Access Journals (Sweden)

    Miha Štajdohar

    2013-04-01

    Full Text Available Network analysis is one of the most widely used techniques in many areas of modern science. Most existing tools for that purpose are limited to drawing networks and computing their basic general characteristics. The user is not able to interactively and graphically manipulate the networks, select and explore subgraphs using other statistical and data mining techniques, add and plot various other data within the graph, and so on. In this paper we present a tool that addresses these challenges, an add-on for exploration of networks within the general component-based environment Orange.

  13. Technologies for unattended network operations

    Science.gov (United States)

    Jaworski, Allan; Odubiyi, Jide; Holdridge, Mark; Zuzek, John

    1991-09-01

    The necessary network management functions for a telecommunications, navigation and information management (TNIM) system in the framework of an extension of the ISO model for communications network management are described. Various technologies that could substantially reduce the need for TNIM network management, automate manpower intensive functions, and deal with synchronization and control at interplanetary distances are presented. Specific technologies addressed include the use of the ISO Common Management Interface Protocol, distributed artificial intelligence for network synchronization and fault management, and fault-tolerant systems engineering.

  14. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  15. Coopetição em Redes Interpessoais: Redes são Redes/Coopetition in Interpersonal Networks: Networks are Networks

    National Research Council Canada - National Science Library

    Caio Cesar Giannini Oliveira; Humberto Elias Garcia Lopes

    2014-01-01

    .... These arrangements or network structures are usually addressed in management literature under an organizational perspective and, accordingly, may be formed in contexts ranging from competition...

  16. Technological Developments in Networking, Education and Automation

    CERN Document Server

    Elleithy, Khaled; Iskander, Magued; Kapila, Vikram; Karim, Mohammad A; Mahmood, Ausif

    2010-01-01

    "Technological Developments in Networking, Education and Automation" includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent

  17. Artificial neural network applications in the calibration of spark-ignition engines: An overview

    Directory of Open Access Journals (Sweden)

    Richard Fiifi Turkson

    2016-09-01

    Full Text Available Emission legislation has become progressively tighter, making the development of new internal combustion engines very challenging. New engine technologies for complying with these regulations introduce an exponential dependency between the number of test combinations required for obtaining optimum results and the time and cost outlays. This makes the calibration task very expensive and virtually impossible to carry out. The potential use of trained neural networks in combination with Design of Experiments (DoE methods for engine calibration has been a subject of research activities in recent times. This is because artificial neural networks, compared with other data-driven modeling techniques, perform better in satisfying a majority of the modeling requirements for engine calibration including the curse of dimensionality; the use of DoE for obtaining few measurements as practicable, with the aim of reducing engine calibration costs; the required flexibility that allows model parameters to be optimized to avoid overfitting; and the facilitation of automated online optimization during the engine calibration process that eliminates the need for user intervention. The purpose of this review is to give an overview of the various applications of neural networks in the calibration of spark-ignition engines. The identified and discussed applications include system identification for rapid prototyping, virtual sensing, use of neural networks as look-up table surrogates, emerging control strategies and On-Board Diagnostic (OBD applications. The demerits of neural networks, future possibilities and alternatives were also discussed.

  18. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  19. A Task Force to Address Bullying.

    Science.gov (United States)

    Keller, Ronald; Budin, Wendy C; Allie, Tammy

    2016-02-01

    Bullying in the workplace can create a dysfunctional environment that is associated with serious physical and psychological harm to the person being bullied. Nurses' experience with bullying has gained considerable attention in recent years, and warrants further discussion. Nurse leaders need to develop and implement effective bullying prevention initiatives that will foster the functioning of a professional and productive staff in a healthy work environment. The aim of this article is to review workplace bullying as experienced by nurses, and describe how nurses at a Magnet-designated academic medical center developed and implemented a bullying task force to address the problem.

  20. Grid Added Value to Address Malaria

    CERN Document Server

    Breton, V; Hofmann, M

    2008-01-01

    Through this paper, we call for a distributed, internet-based collaboration to address one of the worst plagues of our present world, malaria. The spirit is a non-proprietary peer-production of information-embedding goods. And we propose to use the grid technology to enable such a world wide "open source" like collaboration. The first step towards this vision has been achieved during the summer on the EGEE grid infrastructure where 46 million ligands were docked for a total amount of 80 CPU years in 6 weeks in the quest for new drugs.

  1. Best Practices in Hiring: Addressing Unconscious Bias

    Science.gov (United States)

    Simpson, Caroline E.

    2012-01-01

    Research has shown that implementing certain hiring practices will increase diversity in the workplace while enhancing academic quality. All of these practices rely on addressing the issue of 'unconscious bias.' A brief overview of unconscious bias--what it is, how it works, and simple measures to counter it--will be presented. Successful strategies, actions, and recommendations for implementing best recruiting and hiring practices, which have been proven to enhance academic excellence by ensuring a deep and diverse applicant pool, will also be presented.

  2. HEP technologies to address medical imaging challenges

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Developments in detector technologies aimed at solving challenges in present and future CERN experiments, particularly at the LHC, have triggered exceptional advances in the performance of medical imaging devices, allowing for a spectacular progress in in-vivo molecular imaging procedures, which are opening the way for tailored therapies of major diseases. This talk will briefly review the recent history of this prime example of technology transfer from HEP experiments to society, will describe the technical challenges being addressed by some ongoing projects, and will present a few new ideas for further developments and their foreseeable impact.

  3. Programming chemistry in DNA-addressable bioreactors

    DEFF Research Database (Denmark)

    Fellermann, H.; Cardelli, L.

    2014-01-01

    . These markers serve as compartment addresses and allow for their targeted transport and fusion, thereby enabling reactions of previously separated chemicals. The overall system organization allows for the set-up of programmable chemistry in microfluidic or other automated environments. We introduce a simple...... of the subcellular matrix. We provide a non-deterministic semantics of our programming language that enables us to analytically derive the computational and constructive power of our machinery. This semantics is used to derive the sets of all constructable chemicals and supermolecular structures that emerge from...

  4. South African address standard and initiatives towards an international address standard.

    CSIR Research Space (South Africa)

    Cooper, Anthony K

    2008-09-01

    Full Text Available was presented at the GSDI-10 Conference in Trinidad in February 2008. An ISO Workshop on address standards was held in Copenhagen in May 2008, attached to the meetings of ISO/TC 211, Geographic information/Geomatics. This paper reports on these activities... that use only simple address lines without trying to interpret international addresses. OASIS, an industry consortium, has a suite of XML specifications for party related data, where a party could be a person or an organisation, such as a company...

  5. South African address standard and initiatives towards an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-10-01

    Full Text Available was presented at the GSDI-10 Conference in Trinidad in February 2008. An ISO Workshop on address standards was held in Copenhagen in May 2008, attached to the meetings of ISO/TC 211, Geographic information/Geomatics. This paper reports on these activities... that use only simple address lines without trying to interpret international addresses. OASIS, an industry consortium, has a suite of XML specifications for party related data, where a party could be a person or an organisation, such as a company...

  6. In-Network Adaptation of Video Streams Using Network Processors

    Directory of Open Access Journals (Sweden)

    Mohammad Shorfuzzaman

    2009-01-01

    problem can be addressed, near the network edge, by applying dynamic, in-network adaptation (e.g., transcoding of video streams to meet available connection bandwidth, machine characteristics, and client preferences. In this paper, we extrapolate from earlier work of Shorfuzzaman et al. 2006 in which we implemented and assessed an MPEG-1 transcoding system on the Intel IXP1200 network processor to consider the feasibility of in-network transcoding for other video formats and network processor architectures. The use of “on-the-fly” video adaptation near the edge of the network offers the promise of simpler support for a wide range of end devices with different display, and so forth, characteristics that can be used in different types of environments.

  7. Integrated optical addressing of an ion qubit

    CERN Document Server

    Mehta, Karan K; McConnell, Robert; Ram, Rajeev J; Sage, Jeremy M; Chiaverini, John

    2015-01-01

    Scalable implementation of the optics required to control trapped atomic ions' quantum states will be required to construct large-scale ion trap quantum information processors. All experiments in ion traps so far have employed approaches cumbersome to scale to even a few tens of qubits, with the majority relying on manipulation of free space beams with bulk optics. Here we demonstrate lithographically defined nanophotonic dielectric waveguides integrated within a linear surface-electrode ion trap chip, and qubit addressing at multiple locations via focusing grating couplers that emit through openings in the trap electrodes to an ion trapped 50 $\\mu$m above the chip. We perform quantum coherent operations using visible light routed in and emitted from silicon nitride waveguides and couplers, on the optical qubit transition in individual $^{88}$Sr$^+$ ions. The addressing beam is focused near the ion position with a 2 $\\mu$m 1/$e^2$-radius along the trap axis, and we measure crosstalk errors between $10^{-2}$ a...

  8. The Gettysburg Address as Foreign Policy

    Directory of Open Access Journals (Sweden)

    Jared Peatman

    2016-05-01

    Full Text Available During the Cold War agents of the United States government frequently invoked the Gettysburg Address in an attempt to spread pro-American sentiment across the globe. Throughout this period the Cold War and Civil Rights Movement were the U.S.’s two main concerns. While the one was seemingly an international issue and the other a domestic one, in reality they were closely linked. At a time when America was competing with the Soviet Union for global influence, particularly in the newly independent nations in Africa, the racial discord in the country was a major tool used against the United States. Consequently, in the early 1960s American officials began to look for ways to counter the negative image racial discrimination was giving the country. An examination of the ways the Gettysburg Address was invoked in 1959 during the Lincoln Birth Sesquicentennial, and then in 1963 as a part of the Civil War Centennial, shows how the speech’s meaning was recast from democracy to equality.

  9. Addressing firefighter safety around solar PV systems

    Energy Technology Data Exchange (ETDEWEB)

    Harris, B. [Sustainable Energy Technologies, Calgary, AB (Canada)

    2010-11-15

    The article discussed new considerations for installing photovoltaic (PV) systems that address the needs of fire service personnel. The presence of a PV system presents a multitude of dangers for firefighters, including electrical shock, the inhalation of toxic gases from being unable to cut a hole through the roof, falling debris and flying glass, and dead loading on a compromised structure and tripping on conduits. Mapping systems should be modified so that buildings with PV systems are identified for first responders, including firefighters who should learn that solar modules present an electrical hazard during the day but not at night; covering PV modules with foam or salvage covers may not shut the system down to a safe level; it takes a few moments for the power in PV modules to reduce to zero; and PV modules or conduit should never be cut, broke, chopped, or walked upon. The California Department of Forestry and Fire Protection recommends creating pathways and allowing easier access to the roof by setting the modules back from roof edges, creating a structurally sound pathway for firefighters to walk on and space to cut ventilation holes. However, the setback rule makes the economics of solar installation less viable for residential applications. The technological innovations aimed at addressing system safety all focus on limiting firefighter contact with live electrical components to within the extra-low-voltage (ELV) band. Some of the inverters on the market that support ELV system architecture were described. 1 fig.

  10. Optical Network Testbeds Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Joe Mambretti

    2007-06-01

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking

  11. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  12. Notation for national and international telephone numbers, e-mail addresses and Web addresses

    CERN Document Server

    International Telecommunication Union. Geneva

    2001-01-01

    Recommendation E.123 defines a standard way to write telephone numbers, e-mail addresses, and web addresses. It recommends the following formats (when dialing the area code is optional for local calling): Telephone number: National notation (042) 123 4567 International notation +31 (0)42 123 4567 E-mail address: name@provider.com Internet address / URL: www.company.com It also recommends that a hypen (-), space ( ), or period (.) can be used to visually separate groups of numbers. The parentheses are used to indicate digits that are sometimes not dialed. a slash (/) is used to indicate alternate numbers. This information is important if you want to make sure people know how to dail a phone number in a specific country.

  13. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  14. Addressing submarine geohazards through scientific drilling

    Science.gov (United States)

    Camerlenghi, A.

    2009-04-01

    Natural submarine geohazards (earthquakes, volcanic eruptions, landslides, volcanic island flank collapses) are geological phenomena originating at or below the seafloor leading to a situation of risk for off-shore and on-shore structures and the coastal population. Addressing submarine geohazards means understanding their spatial and temporal variability, the pre-conditioning factors, their triggers, and the physical processes that control their evolution. Such scientific endeavour is nowadays considered by a large sector of the international scientific community as an obligation in order to contribute to the mitigation of the potentially destructive societal effects of submarine geohazards. The study of submarine geohazards requires a multi-disciplinary scientific approach: geohazards must be studied through their geological record; active processes must be monitored; geohazard evolution must be modelled. Ultimately, the information must be used for the assessment of vulnerability, risk analysis, and development of mitigation strategies. In contrast with the terrestrial environment, the oceanic environment is rather hostile to widespread and fast application of high-resolution remote sensing techniques, accessibility for visual inspection, sampling and installation of monitoring stations. Scientific Drilling through the IODP (including the related pre site-survey investigations, sampling, logging and in situ measurements capability, and as a platform for deployment of long term observatories at the surface and down-hole) can be viewed as the centre of gravity of an international, coordinated, multi-disciplinary scientific approach to address submarine geohazards. The IODP Initial Science Plan expiring in 2013 does not address openly geohazards among the program scientific objectives. Hazards are referred to mainly in relation to earthquakes and initiatives towards the understanding of seismogenesis. Notably, the only drilling initiative presently under way is the

  15. MIMO Communication for Cellular Networks

    CERN Document Server

    Huang, Howard; Venkatesan, Sivarama

    2012-01-01

    As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, MIMO Communication for Cellular Networks presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks. In contrast to works that focus on the theoretical performance of abstract MIMO channels, MIMO Communication for Cellular Networks emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions. MIMO Communication for Cellular Networks describes single-user,...

  16. Optimizations in Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana

    Heterogeneous Mobile Networks bring advantages over homogeneous deployments in achieving the demand for mobile network capacity and coverage not just outdoor rural and urban areas, but also to homes and enterprises where the large portion of the mobile traffic is generated. However......, the heterogeneity in the mobile networks bring many challenges that are discusses with this dissertation. More focus is placed on specific issues with indifferent areas of heterogeneity by proposing optimizations in order to overcome the considered problems.The heterogeneity of mobile networks, together...... with the densification of the base stations, bring into a very complex network management and operation control for the mobile operators. Furthermore, the need to provide always best connection and service with high quality demands for a joint overall network resource management. This thesis addresses this challenge...

  17. Flight Testing of Wireless Networking for Nanosat Launch Vehicles Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The innovation proposed here addresses the testing and evaluation of wireless networking technologies for small launch vehicles by leveraging existing nanosat launch...

  18. Reversible Control of Anisotropic Electrical Conductivity using Colloidal Microfluidic Networks

    National Research Council Canada - National Science Library

    Beskok, Ali; Bevan, Michael; Lagoudas, Dimitris; Ounaies, Zoubeida; Bahukudumbi, Pradipkumar; Everett, William

    2007-01-01

    This research addresses the tunable assembly of reversible colloidal structures within microfluidic networks to engineer multifunctional materials that exhibit a wide range of electrical properties...

  19. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  20. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  1. Recall Performance for Content-Addressable Memory Using Adiabatic Quantum Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Imam, Neena [ORNL; Humble, Travis S. [ORNL; McCaskey, Alex [ORNL; Schrock, Jonathan [ORNL; Hamilton, Kathleen E. [ORNL

    2017-09-01

    A content-addressable memory (CAM) stores key-value associations such that the key is recalled by providing its associated value. While CAM recall is traditionally performed using recurrent neural network models, we show how to solve this problem using adiabatic quantum optimization. Our approach maps the recurrent neural network to a commercially available quantum processing unit by taking advantage of the common underlying Ising spin model. We then assess the accuracy of the quantum processor to store key-value associations by quantifying recall performance against an ensemble of problem sets. We observe that different learning rules from the neural network community influence recall accuracy but performance appears to be limited by potential noise in the processor. The strong connection established between quantum processors and neural network problems supports the growing intersection of these two ideas.

  2. Addressing food waste reduction in Denmark

    DEFF Research Database (Denmark)

    Halloran, Afton Marina Szasz; Clement, Jesper; Kornum, Niels

    2014-01-01

    . In order to better understand food waste and loss more research must be conducted on the total amount of food waste at every level of the food supply chain. Solutions can be found through improved communication, more efficient food packaging, and better in interpretation of food labels by consumers......Global food demand is driven by population and economic growth, and urbanization. One important instrument to meet this increasing demand and to decrease the pressure on food production is to minimize food losses and food waste. Food waste and loss is a major societal, economic, nutritional...... and environmental challenge. Using the case of Denmark, this paper analyses causes of food waste, and discusses how different stakeholders address the prevention and reuse of the €1.18. billion of annual edible food waste. Currently, the majority of food waste is still incinerated with energy recovery. However...

  3. Addressing Dynamic Issues of Program Model Checking

    Science.gov (United States)

    Lerda, Flavio; Visser, Willem

    2001-01-01

    Model checking real programs has recently become an active research area. Programs however exhibit two characteristics that make model checking difficult: the complexity of their state and the dynamic nature of many programs. Here we address both these issues within the context of the Java PathFinder (JPF) model checker. Firstly, we will show how the state of a Java program can be encoded efficiently and how this encoding can be exploited to improve model checking. Next we show how to use symmetry reductions to alleviate some of the problems introduced by the dynamic nature of Java programs. Lastly, we show how distributed model checking of a dynamic program can be achieved, and furthermore, how dynamic partitions of the state space can improve model checking. We support all our findings with results from applying these techniques within the JPF model checker.

  4. Addressing Complexity in Environmental Management and Governance

    Directory of Open Access Journals (Sweden)

    Sabrina Kirschke

    2017-06-01

    Full Text Available Governance for complex problem solving has been increasingly discussed in environmental sustainability research. Above all, researchers continuously observe that sustainability problems are complex or “wicked”, and suggest participatory models to address these problems in practice. In order to add to this debate, this study suggests a more differentiated theoretical approach to define governance for complex environmental problem solving than in previous studies. The approach consists of two vital steps: First, we operationalize complexity and define management strategies for solving environmental sustainability problems based on findings from psychology research. Second, we identify governance strategies that facilitate these management strategies. Linking those strategies suggests that the role of diverse institutions, actors, and interactions differs for five key dimensions of complexity: goals, variables, dynamics, interconnections, and informational uncertainty. The results strengthen systematic analyses of environmental sustainability problems in both theory and practice.

  5. Adresse inconnue / Address unknown / Suchwiin Bulmyeong

    Directory of Open Access Journals (Sweden)

    Serge Gruzinski

    2005-03-01

    Full Text Available Tous les films asiatiques parlent de métissage, même ceux qui se présentent comme de vastes fresques historiques perdues dans le temps. Les emprunts aux traditions hollywoodiennes et européennes n'ont cessé d'enrichir une cinématographie aussi ancienne que celle du monde occidental. Dans Adresse inconnue (Address unknown le cinéaste coréen Kim Ki-duk explore l'expérience du métissage et le corps du métis à la frontière entre Corée du Nord et Corée du sud. Fils d'un GI américain et noir et d...

  6. Grid-added value to address malaria.

    Science.gov (United States)

    Breton, V; Jacq, N; Kasam, V; Hofmann-Apitius, M

    2008-03-01

    Through this paper, we call for a distributed, Internet-based collaboration to address one of the worst plagues of our present world, malaria. The spirit is a nonproprietary peer-production of information-embedding goods. And we propose to use the grid technology to enable such a worldwide "open-source" like collaboration. The first step toward this vision has been achieved during the summer 2005 on the enabling grids for E-scienceE (EGEE) grid infrastructure where 42 million ligands were docked for a total amount of 80 CPU years in 6 weeks in the quest for new drugs. The impact of this first deployment has significantly raised the interest of the research community so that several laboratories all around the world expressed interest to propose targets for a second large-scale deployment against malaria.

  7. Addressing consumerization of IT risks with nudging

    Directory of Open Access Journals (Sweden)

    Iryna Yevseyeva

    2015-01-01

    Full Text Available In this work we address the main issues of Information Technology (IT consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.

  8. Advancing efforts to address youth violence involvement.

    Science.gov (United States)

    Weist, M D; Cooley-Quille, M

    2001-06-01

    Discusses the increased public attention on violence-related problems among youth and the concomitant increased diversity in research. Youth violence involvement is a complex construct that includes violence experienced in multiple settings (home, school, neighborhood) and in multiple forms (as victims, witnesses, perpetrators, and through family members, friends, and the media). Potential impacts of such violence involvement are considerable, including increased internalizing and externalizing behaviors among youth and future problems in school adjustment and life-course development. This introductory article reviews key dimensions of youth-related violence, describes an American Psychological Association Task Force (Division 12) developed to advance relevant research, and presents examples of national resources and efforts that attempt to address this critical public health issue.

  9. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  10. Controllability of Complex Networks

    Science.gov (United States)

    Liu, Yang; Slotine, Jean-Jacques; Barabasi, Albert-Laszlo

    2011-03-01

    The ultimate proof of our understanding of natural or technological systems is reflected in our ability to control them. While control theory offers mathematical tools to steer engineered systems towards a desired state, we lack a general framework to control complex self-organized systems, like the regulatory network of a cell or the Internet. Here we develop analytical tools to study the controllability of an arbitrary complex directed network, identifying the set of driver nodes whose time-dependent control can guide the system's dynamics. We apply these tools to real and model networks, finding that sparse inhomogeneous networks, which emerge in many real complex systems, are the most difficult to control. In contrast, dense and homogeneous networks can be controlled via a few driver nodes. Counterintuitively, we find that in both model and real systems the driver nodes tend to avoid the hubs. We show that the robustness of control to link failure is determined by a core percolation problem, helping us understand why many complex systems are relatively insensitive to link deletion. The developed approach offers a framework to address the controllability of an arbitrary network, representing a key step towards the eventual control of complex systems.

  11. Addressing Earth Science Data Access Challenges through User Experience Research

    Science.gov (United States)

    Hemmings, S. N.; Banks, B.; Kendall, J.; Lee, C. M.; Irwin, D.; Toll, D. L.; Searby, N. D.

    2013-12-01

    The NASA Capacity Building Program (Earth Science Division, Applied Sciences Program) works to enhance end-user capabilities to employ Earth observation and Earth science (EO/ES) data in decision-making. Open data access and user-tailored data delivery strategies are critical elements towards this end. User Experience (UX) and User Interface (UI) research methods can offer important contributions towards addressing data access challenges, particularly at the interface of science application/product development and product transition to end-users. This presentation focuses on developing nation contexts and describes methods, results, and lessons learned from two recent UX/UI efforts conducted in collaboration with NASA: the SERVIRglobal.net redesign project and the U.S. Water Partnership (USWP) Portal development effort. SERVIR, a collaborative venture among NASA, USAID, and global partners, seeks to improve environmental management and climate change response by helping governments and other stakeholders integrate EO and geospatial technologies into decision-making. The USWP, a collaboration among U.S. public and private sectors, harnesses U.S.-based resources and expertise to address water challenges in developing nations. SERVIR's study, conducted from 2010-2012, assessed and tested user needs, preferences, and online experiences to generate a more user-friendly online data portal at SERVIRglobal.net. The portal provides a central access interface to data and products from SERVIR's network of hubs in East Africa, the Hindu Kush Himalayas, and Mesoamerica. The second study, conducted by the USWP Secretariat and funded by the U.S. Department of State, seeks to match U.S.-based water information resources with developing nation stakeholder needs. The USWP study utilizes a multi-pronged approach to identify key design requirements and to understand the existing water data portal landscape. Adopting UX methods allows data distributors to design customized UIs that

  12. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 h2>Backgroundh2> With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access

  13. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2012-01-01

    Production, innovation and service networks of companies all over the world become increasingly decentralised, specialised and interdependent. These three characteristics combined inevitably lead to the formation of complex configurations of resources, crossing both national and organisational...... borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gaps between these networks mean that coordinating them and managing their interfaces in a global operations context...... are becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about the development and organisation of these networks. The paper highlights the critical importance of engineering operations in this process. The propositions are developed...

  14. Network neuroscience.

    Science.gov (United States)

    Bassett, Danielle S; Sporns, Olaf

    2017-02-23

    Despite substantial recent progress, our understanding of the principles and mechanisms underlying complex brain function and cognition remains incomplete. Network neuroscience proposes to tackle these enduring challenges. Approaching brain structure and function from an explicitly integrative perspective, network neuroscience pursues new ways to map, record, analyze and model the elements and interactions of neurobiological systems. Two parallel trends drive the approach: the availability of new empirical tools to create comprehensive maps and record dynamic patterns among molecules, neurons, brain areas and social systems; and the theoretical framework and computational tools of modern network science. The convergence of empirical and computational advances opens new frontiers of scientific inquiry, including network dynamics, manipulation and control of brain networks, and integration of network processes across spatiotemporal domains. We review emerging trends in network neuroscience and attempt to chart a path toward a better understanding of the brain as a multiscale networked system.

  15. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  16. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...... network methodology in one’s research might supersede the perceived benefits of doing so. As a response to that problem, we argue that workshops can act as a road towards meaningful engagement with networks and highlight that network methodology promises new ways of interpreting data to answer questions...

  17. A Sociological Framework to Address Gender Equity in the Geosciences

    Science.gov (United States)

    Holmes, Mary Anne

    2017-04-01

    Lack of equity in the science workforce is a sociological problem; those wishing to seek its amelioration can benefit by viewing the issue with a sociological lens (and a sociologist). One useful framework that we have used to think strategically about how to lower barriers to equity is Barbara Risman's (2004): this framework views barriers to equity as individual, interpersonal ("interactional"), and institutional. Any given barrier may fit into one or more of these frames. Individual barriers include those intrinsic to an individual and may include: lack of access to vital networks and mentors, lack of preparation, etc. Such barriers can be addressed through mentoring programs and attention to building networks (e.g., through professional society memberships). Interpersonal or "interactional" barriers are those that arise from how we perceive and treat one another. Implicit bias underlies many of these barriers, including whether we perceive women as scientists, as competent, as dedicated (etc) as men. Such barriers can be reduced through implicit bias awareness. Institutional barriers arise from the structure and history of the academy itself, from its policies and procedures. Many such policies and procedures have a differential impact on men or women, generally without that intention. Policies that reduce equity barriers include family leave, childcare facilities, search committee training, clearly articulated practices for evaluation of applications and personnel reviews, equal starting pay and startup packages, equable canvassing for names to consider for nominations for honors and awards, to name a few. By viewing the issue through such a framework, the appropriate response can be generated for a more effective result.

  18. Social Networks

    OpenAIRE

    Martí, Joan; Zenou, Yves

    2009-01-01

    We survey the literature on social networks by putting together the economics, sociological and physics/applied mathematics approaches, showing their similarities and differences. We expose, in particular, the two main ways of modeling network formation. While the physics/applied mathematics approach is capable of reproducing most observed networks, it does not explain why they emerge. On the contrary, the economics approach is very precise in explaining why networks emerge but does a poor jo...

  19. Network acceleration techniques

    Science.gov (United States)

    Crowley, Patricia (Inventor); Awrach, James Michael (Inventor); Maccabe, Arthur Barney (Inventor)

    2012-01-01

    Splintered offloading techniques with receive batch processing are described for network acceleration. Such techniques offload specific functionality to a NIC while maintaining the bulk of the protocol processing in the host operating system ("OS"). The resulting protocol implementation allows the application to bypass the protocol processing of the received data. Such can be accomplished this by moving data from the NIC directly to the application through direct memory access ("DMA") and batch processing the receive headers in the host OS when the host OS is interrupted to perform other work. Batch processing receive headers allows the data path to be separated from the control path. Unlike operating system bypass, however, the operating system still fully manages the network resource and has relevant feedback about traffic and flows. Embodiments of the present disclosure can therefore address the challenges of networks with extreme bandwidth delay products (BWDP).

  20. Computer Networks and Globalization

    Directory of Open Access Journals (Sweden)

    J. Magliaro

    2007-07-01

    Full Text Available Communication and information computer networks connect the world in ways that make globalization more natural and inequity more subtle. As educators, we look at these phenomena holistically analyzing them from the realist’s view, thus exploring tensions, (in equity and (injustice, and from the idealist’s view, thus embracing connectivity, convergence and development of a collective consciousness. In an increasingly market- driven world we find examples of openness and human generosity that are based on networks, specifically the Internet. After addressing open movements in publishing, software industry and education, we describe the possibility of a dialectic equilibrium between globalization and indigenousness in view of ecologically designed future smart networks

  1. Management of space networks

    Science.gov (United States)

    Markley, R. W.; Williams, B. F.

    1993-01-01

    NASA has proposed missions to the Moon and Mars that reflect three areas of emphasis: human presence, exploration, and space resource development for the benefit of Earth. A major requirement for such missions is a robust and reliable communications architecture. Network management--the ability to maintain some degree of human and automatic control over the span of the network from the space elements to the end users on Earth--is required to realize such robust and reliable communications. This article addresses several of the architectural issues associated with space network management. Round-trip delays, such as the 5- to 40-min delays in the Mars case, introduce a host of problems that must be solved by delegating significant control authority to remote nodes. Therefore, management hierarchy is one of the important architectural issues. The following article addresses these concerns, and proposes a network management approach based on emerging standards that covers the needs for fault, configuration, and performance management, delegated control authority, and hierarchical reporting of events. A relatively simple approach based on standards was demonstrated in the DSN 2000 Information Systems Laboratory, and the results are described.

  2. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  3. Networking activism: implications for Greece

    Directory of Open Access Journals (Sweden)

    Pantelis Vatikiotis

    2011-12-01

    Full Text Available The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-global interplay in protest culture along new mediating practices (beyond the creation of transnational publics, that of the implications of transnational networking for local social activism and identification, addressing relevant questions in the Greek context.

  4. Basic Physics Questions Addressed by Astrophysics

    Science.gov (United States)

    Mather, John C.

    2009-01-01

    Dark matter, dark energy, the Big Bang, testing relativity -- all are physics questions accessible to astrophysicists -- but all require new equipment. As Harwit's "Cosmic Discovery" pointed out, almost all great surprises in astronomy came from new equipment or new uses of equipment designed for other purposes, and many of those had military applications. I will outline prospects for new equipment and discuss how that equipment can be developed and built. Bigger and lighter mirrors, wavefront sensing and control, new detector technology, cryogenics -- each has its own social network, its own special possibilities, and its own funding sources outside science. I will discuss some examples drawn from real-life experience with the James Webb Space Telescope, a telescope that was said to have a "giggle factor" when it was proposed in 1995. Now each of the 10 major technologies has been brought to maturity, flight hardware is being built, and launch is planned for 2014. As an instrument builder all my life, I will speculate a little on what may be within our reach over the next few decades.

  5. Addressing Data Veracity in Big Data Applications

    Energy Technology Data Exchange (ETDEWEB)

    Aman, Saima [Univ. of Southern California, Los Angeles, CA (United States). Dept. of Computer Science; Chelmis, Charalampos [Univ. of Southern California, Los Angeles, CA (United States). Dept. of Electrical Engineering; Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States). Dept. of Electrical Engineering

    2014-10-27

    Big data applications such as in smart electric grids, transportation, and remote environment monitoring involve geographically dispersed sensors that periodically send back information to central nodes. In many cases, data from sensors is not available at central nodes at a frequency that is required for real-time modeling and decision-making. This may be due to physical limitations of the transmission networks, or due to consumers limiting frequent transmission of data from sensors located at their premises for security and privacy concerns. Such scenarios lead to partial data problem and raise the issue of data veracity in big data applications. We describe a novel solution to the problem of making short term predictions (up to a few hours ahead) in absence of real-time data from sensors in Smart Grid. A key implication of our work is that by using real-time data from only a small subset of influential sensors, we are able to make predictions for all sensors. We thus reduce the communication complexity involved in transmitting sensory data in Smart Grids. We use real-world electricity consumption data from smart meters to empirically demonstrate the usefulness of our method. Our dataset consists of data collected at 15-min intervals from 170 smart meters in the USC Microgrid for 7 years, totaling 41,697,600 data points.

  6. Topological generalizations of network motifs

    Science.gov (United States)

    Kashtan, N.; Itzkovitz, S.; Milo, R.; Alon, U.

    2004-09-01

    Biological and technological networks contain patterns, termed network motifs, which occur far more often than in randomized networks. Network motifs were suggested to be elementary building blocks that carry out key functions in the network. It is of interest to understand how network motifs combine to form larger structures. To address this, we present a systematic approach to define “motif generalizations”: families of motifs of different sizes that share a common architectural theme. To define motif generalizations, we first define “roles” in a subgraph according to structural equivalence. For example, the feedforward loop triad—a motif in transcription, neuronal, and some electronic networks—has three roles: an input node, an output node, and an internal node. The roles are used to define possible generalizations of the motif. The feedforward loop can have three simple generalizations, based on replicating each of the three roles and their connections. We present algorithms for efficiently detecting motif generalizations. We find that the transcription networks of bacteria and yeast display only one of the three generalizations, the multi-output feedforward generalization. In contrast, the neuronal network of C. elegans mainly displays the multi-input generalization. Forward-logic electronic circuits display a multi-input, multi-output hybrid. Thus, networks which share a common motif can have very different generalizations of that motif. Using mathematical modeling, we describe the information processing functions of the different motif generalizations in transcription, neuronal, and electronic networks.

  7. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  8. Optically addressed ferroelectric memory with nondestructive readout.

    Science.gov (United States)

    Thakoor, S; Thakoor, A P

    1995-06-10

    We present a review of the emerging optically addressed ferroelectric memory with nondestructive readout as a nonvolatile memory technology, identify its high-impact applications, and project on some novel device designs and architectures that will enable its realization. Based on the high-speed bidirectional polarization-dependent photoresponse, simulation of a readout circuit for a 16-kbit VLSI ferromemory chip yields read-access times of ~20 ns and read-cycle times of ~30 ns (~34 ns and ~44 ns, respectively, within a framework of a radiation-hard environment), easily surpassing those of the conventional electrical destructive readout. Extension of the simulation for a 64-kbit memory shows that the read-access and -cycle times are only marginally increased to ~21 ns and ~31 ns, respectively (~38 ns and ~48 ns, with a radiation-hard readout circuitry). Commercial realization of the optical nondestructive readout, however, would require a reduction in the incident (optical) power by roughly an order of magnitude for the readout or an enhancement in the delivered power-to-size ratio of semiconductor lasers for compact implementation. We present a new two-capacitor memory-cell configuration that provides an enhanced bipolar optoelectronic response from the edges of the capacitor at incident power as low as ~ 2 mW/µm(2). A novel device design based on lead zirconate titanate with the c axis parallel to the substrate is suggested to reduce the requirement of incident optical power further by orders of magnitude.

  9. Quantitative tools for addressing hospital readmissions

    Directory of Open Access Journals (Sweden)

    Lagoe Ronald J

    2012-11-01

    Full Text Available Abstract Background Increased interest in health care cost containment is focusing attention on reduction of hospital readmissions. Major payors have already developed financial penalties for providers that generate excess readmissions. This subject has benefitted from the development of resources such as the Potentially Preventable Readmissions software. This process has encouraged hospitals to renew efforts to improve these outcomes. The aim of this study was to describe quantitative tools such as definitions, risk estimation, and tracking of patients for reducing hospital readmissions. Findings This study employed the Potentially Preventable Readmissions software to develop quantitative tools for addressing hospital readmissions. These tools included two definitions of readmissions that support identification and management of patients. They also included analytical approaches for estimation of the risk of readmission for individual patients by age, discharge status of the initial admission, and severity of illness. They also included patient specific spreadsheets for tracking of target populations and for evaluation of the impact of interventions. Conclusions The study demonstrated that quantitative tools including the development of definitions of readmissions, estimation of the risk of readmission, and patient specific spreadsheets could contribute to the improvement of patient outcomes in hospitals.

  10. Assessing what to address in science communication.

    Science.gov (United States)

    Bruine de Bruin, Wändi; Bostrom, Ann

    2013-08-20

    As members of a democratic society, individuals face complex decisions about whether to support climate change mitigation, vaccinations, genetically modified food, nanotechnology, geoengineering, and so on. To inform people's decisions and public debate, scientific experts at government agencies, nongovernmental organizations, and other organizations aim to provide understandable and scientifically accurate communication materials. Such communications aim to improve people's understanding of the decision-relevant issues, and if needed, promote behavior change. Unfortunately, existing communications sometimes fail when scientific experts lack information about what people need to know to make more informed decisions or what wording people use to describe relevant concepts. We provide an introduction for scientific experts about how to use mental models research with intended audience members to inform their communication efforts. Specifically, we describe how to conduct interviews to characterize people's decision-relevant beliefs or mental models of the topic under consideration, identify gaps and misconceptions in their knowledge, and reveal their preferred wording. We also describe methods for designing follow-up surveys with larger samples to examine the prevalence of beliefs as well as the relationships of beliefs with behaviors. Finally, we discuss how findings from these interviews and surveys can be used to design communications that effectively address gaps and misconceptions in people's mental models in wording that they understand. We present applications to different scientific domains, showing that this approach leads to communications that improve recipients' understanding and ability to make informed decisions.

  11. Addressing defeatist beliefs in work rehabilitation.

    Science.gov (United States)

    Mervis, Joshua E; Lysaker, Paul H; Fiszdon, Joanna M; Bell, Morris D; Chue, Amanda E; Pauls, Carol; Bisoglio, Joseph; Choi, Jimmy

    2016-08-01

    Adults with serious mental illness (SMI) may struggle with expectations of failure in vocational rehabilitation. These expectations can be global and trait-like or performance-specific and related to ability. To date, it has not been examined whether global or performance-specific defeatist beliefs are related to functional outcomes. The Indianapolis Vocational Intervention Program (IVIP) is a CBT intervention used to address expectations of failure and improve work performance. We examined the relationships between defeatist beliefs, self-esteem, social functioning, and work behaviors in 54 adults with SMI who completed IVIP within a work therapy program. Baseline work-specific defeatist beliefs were related to baseline self-esteem, employment attitude, and work behaviors. Decline in work-specific defeatist beliefs was associated with better social functioning, self-esteem, and work behaviors. Decline in global defeatist beliefs was only associated with improvements in social functioning. Performance-specific expectations about work may be an appropriate therapeutic target to enhance work outcome in SMI.

  12. Interventions addressing social impairment in autism.

    Science.gov (United States)

    Kasari, Connie; Patterson, Stephanie

    2012-12-01

    Children with an autism spectrum disorder have significant impairment in social skills. This area of development has also been the focus of many intervention studies. In this article we review intervention studies published over the past two years. Three topical areas were addressed in current interventions: social skills knowledge, peer relationships, and joint attention/joint engagement. Younger children most often received interventions on joint attention/joint engagement and older, higher functioning children received interventions on social knowledge and peer relationship development. Both single subject research designs and group designs were reviewed. One advancement was that more randomized controlled trials were reported, as well as effectiveness trials in the community. Study quality was also rated. More group than single subject designs were rated as adequate or strong in quality. Overall, moderate to large effects were found for interventions targeting joint attention/joint engagement and peer relationships with mixed effects on interventions targeting social skills knowledge. Future studies should focus on isolating the active ingredients of interventions and include broader participant representation.

  13. IPv6 Tactical Network Management

    Science.gov (United States)

    2009-09-01

    Advertisement messages and is required. Broadcast addresses are used to send traffic to all nodes on a subnet. There are no IPv6 broadcast addresses...dopplerVUE worked as advertised with a few exceptions. This experiment was not representative of a “true” network with an assortment of servers, routers, and...Applications Camera RAM Speed Sony Laptop NOC Vista Home Premium 1, 2, 3 Attached, not used 2 GB 2 GHz Toshiba Laptop Casualty Site Vista

  14. Cluster Emergence and Network Evolution: a Longitudinal Analysis of the Inventor Network in Sophia-Antipolis

    OpenAIRE

    Wal, Anne L.J. ter

    2010-01-01

    Abstract It is increasingly acknowledged that clusters do not necessarily exhibit networks of local collective learning. This paper addresses the question under which conditions this is the case. Through a longitudinal case study of the business park Sophia-Antipolis it investigates how networks of collective learning emerged throughout the growth of the cluster. Network reconstruction with patent data shows that an innovation network emerged only in Information Technology, in whic...

  15. Artificial language training reveals the neural substrates underlying addressed and assembled phonologies.

    Directory of Open Access Journals (Sweden)

    Leilei Mei

    Full Text Available Although behavioral and neuropsychological studies have suggested two distinct routes of phonological access, their neural substrates have not been clearly elucidated. Here, we designed an artificial language (based on Korean Hangul that can be read either through addressed (i.e., whole word mapping or assembled (i.e., grapheme-to-phoneme mapping phonology. Two matched groups of native English-speaking participants were trained in one of the two conditions, one hour per day for eight days. Behavioral results showed that both groups correctly named more than 90% of the trained words after training. At the neural level, we found a clear dissociation of the neural pathways for addressed and assembled phonologies: There was greater involvement of the anterior cingulate cortex, posterior cingulate cortex, right orbital frontal cortex, angular gyrus and middle temporal gyrus for addressed phonology, but stronger activation in the left precentral gyrus/inferior frontal gyrus and supramarginal gyrus for assembled phonology. Furthermore, we found evidence supporting the strategy-shift hypothesis, which postulates that, with practice, reading strategy shifts from assembled to addressed phonology. Specifically, compared to untrained words, trained words in the assembled phonology group showed stronger activation in the addressed phonology network and less activation in the assembled phonology network. Our results provide clear brain-imaging evidence for the dual-route models of reading.

  16. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  17. Application and Implementation of Network Coding for Cooperative Wireless Networks

    DEFF Research Database (Denmark)

    Pedersen, Morten Videbæk

    2012-01-01

    . 1) I have suggested the use of network coding as a key-enabler for technology- enabled cooperation. I refer to technology-enabled cooperation when we are able to provide all participating entities in the network a better performance by enabling user cooperation. In order to achieve this goal I apply...... ways that cooperative models may be implemented to cover a wide range of applications. This addresses the development of user cooperative protocols and how we in Device To Device (D2D) communication may reward users that contribute more to the network than they gain. In this area I suggest the use...

  18. Protecting and securing networked medical devices.

    Science.gov (United States)

    Riha, Chris

    2004-01-01

    Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.

  19. Learning Bayesian Network Model Structure from Data

    National Research Council Canada - National Science Library

    Margaritis, Dimitris

    2003-01-01

    In this thesis I address the important problem of the determination of the structure of directed statistical models, with the widely used class of Bayesian network models as a concrete vehicle of my ideas...

  20. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  1. Address Points - COUNTY_ADDRESS_POINTS_IDHS_IN: Address Points Maintained by County Agencies in Indiana (Indiana Department of Homeland Security, Point feature class)

    Data.gov (United States)

    NSGIC State | GIS Inventory — COUNTY_ADDRESS_POINTS_IDHS_IN is an ESRI Geodatabase point feature class that contains address points maintained by county agencies in Indiana, provided by personnel...

  2. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  3. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  4. DDT and Malaria Prevention: Addressing the Paradox

    Science.gov (United States)

    Bouwman, Hindrik; van den Berg, Henk; Kylin, Henrik

    2011-01-01

    Background The debate regarding dichlorodiphenyltrichloroethane (DDT) in malaria prevention and human health is polarized and can be classified into three positions: anti-DDT, centrist-DDT, pro-DDT. Objective We attempted to arrive at a synthesis by matching a series of questions on the use of DDT for indoor residual spraying (IRS) with literature and insights, and to identify options and opportunities. Discussion Overall, community health is significantly improved through all available malaria control measures, which include IRS with DDT. Is DDT “good”? Yes, because it has saved many lives. Is DDT safe as used in IRS? Recent publications have increasingly raised concerns about the health implications of DDT. Therefore, an unqualified statement that DDT used in IRS is safe is untenable. Are inhabitants and applicators exposed? Yes, and to high levels. Should DDT be used? The fact that DDT is “good” because it saves lives, and “not safe” because it has health and environmental consequences, raises ethical issues. The evidence of adverse human health effects due to DDT is mounting. However, under certain circumstances, malaria control using DDT cannot yet be halted. Therefore, the continued use of DDT poses a paradox recognized by a centrist-DDT position. At the very least, it is now time to invoke precaution. Precautionary actions could include use and exposure reduction. Conclusions There are situations where DDT will provide the best achievable health benefit, but maintaining that DDT is safe ignores the cumulative indications of many studies. In such situations, addressing the paradox from a centrist-DDT position and invoking precaution will help design choices for healthier lives. PMID:21245017

  5. USGS Science: Addressing Our Nation's Challenges

    Science.gov (United States)

    Larson, Tania M.

    2009-01-01

    With 6.6 billion people already living on Earth, and that number increasing every day, human influence on our planet is ever more apparent. Changes to the natural world combined with increasing human demands threaten our health and safety, our national security, our economy, and our quality of life. As a planet and a Nation, we face unprecedented challenges: loss of critical and unique ecosystems, the effects of climate change, increasing demand for limited energy and mineral resources, increasing vulnerability to natural hazards, the effects of emerging diseases on wildlife and human health, and growing needs for clean water. The time to respond to these challenges is now, but policymakers and decisionmakers face difficult choices. With competing priorities to balance, and potentially serious - perhaps irreversible - consequences at stake, our leaders need reliable scientific information to guide their decisions. As the Nation's earth and natural science agency, the USGS monitors and conducts scientific research on natural hazards and resources and how these elements and human activities influence our environment. Because the challenges we face are complex, the science needed to better understand and deal with these challenges must reflect the complex interplay among natural and human systems. With world-class expertise in biology, geology, geography, hydrology, geospatial information, and remote sensing, the USGS is uniquely capable of conducting the comprehensive scientific research needed to better understand the interdependent interactions of Earth's systems. Every day, the USGS helps decisionmakers to minimize loss of life and property, manage our natural resources, and protect and enhance our quality of life. This brochure provides examples of the challenges we face and how USGS science helps decisionmakers to address these challenges.

  6. Address burnout with a caring, nurturing environment.

    Science.gov (United States)

    2014-06-01

    With their hectic schedules and demanding work responsibilities, emergency physicians are particularly vulnerable to symptoms of burnout. One study showed that more than half of emergency providers reported at least one symptom of burnout when they were asked to fill out a survey tool used to measure burnout--more than any other type of provider. It's a concern because physicians experiencing burnout may be less attentive to their patients, and some ultimately choose to leave medicine because they are no longer satisfied with their work. However, there are steps health systems and administrators can take to help physicians who are struggling, and prevent isolated problems from escalating into larger issues. When a national sample of more than 7,200 physicians agreed to take the Maslach Burnout Inventory, a survey tool used to measure burnout, nearly half (45.8%) reported at least one symptom of burnout, and 65% of the emergency providers reported symptoms of burnout. Burnout is not just fatigue. It involves disappointment in a relationship or relationships, and lack of satisfaction or fulfillment with work, according to experts. Symptoms may include moodiness, irritability, sarcasm, and may result in performance issues as well. Further, there may be physical changes such as weight loss or changes in appetite. To prevent or address burnout, experts advise health systems to nurture a caring, collaborative environment, and to make sure that providers have mentors or resources to reach out to if they are experiencing any work-related problems. They also advise administrators to make sure that burnout is a safe topic of conversation.

  7. Biodiversity data provision and decision-making - addressing the challenges

    Directory of Open Access Journals (Sweden)

    Katherine Despot-Belmonte

    2017-02-01

    Full Text Available Essential Biodiversity Variables (EBVs are measurements required for study, reporting, and management of biodiversity change. They are being developed to support consistency, from the collection to the reporting of biodiversity data at the national, regional and global scales. However, "EBV stakeholders" need to strike a balance between 'doing innovative research' and 'having positive impact' on biodiversity management decisions. This paper reports on a workshop entitled Identifying joint pathways to address the challenges of biodiversity data provision and decision-making and presents the main workshop’s output, a “researcher’s brief” entitled Guiding principles for promoting the application of EBVs for current and future needs of decision-makers. These guiding principles are: Speak with a common voice; Clearly define what is an EBV and how it relates to indicators; Engage beyond the research world; Be realistic about what can be done now and later; Define criteria for good EBVs; Use EBV as a clearing house; Convey the limitations of EBVs; Clarify what impact EBVs should have; Be salient, credible, legitimate, iterative; Don't put an EBV skin on everything you do; Don't create too many EBVs; and Don't reduce EBVs to building blocks of indicators. This brief is of relevance to the wider GEO BON (Group on Earth Observation Biodoversity Observation Network community, and in particular those scientists/researchers interested in the application of EBVs.

  8. Statistical Mechanics of Temporal and Interacting Networks

    Science.gov (United States)

    Zhao, Kun

    a new framework to quantify the information encoded in these networks and to answer a fundamental problem in network science: how complex are temporal and growing networks. Finally, we consider two examples of critical phenomena in interacting networks. In particular, on one side we investigate the percolation of interacting networks by introducing antagonistic interactions. On the other side, we investigate a model of political election based on the percolation of antagonistic networks. The aim of this research is to show how antagonistic interactions change the physics of critical phenomena on interacting networks. We believe that the work presented in these thesis offers the possibility to appreciate the large variability of problems that can be addressed in the new framework of temporal and interacting networks.

  9. Personal Networks and 4G

    DEFF Research Database (Denmark)

    Prasad, Ramjee

    2007-01-01

    Uniting computers, mobile phones, and personal devices is the goal of Wireless Personal Area Network (WPAN), which is meant to become a major part of future mobile communication networks. Personal Networks (PNs) extend the local scope of PANs by addressing virtual personal environments that span...... over a variety of communication architectures, PN is seen as the future for the wirelsss and mobile communications. This paper provices a brief overview of PN, its basic concept, "WPAN" and decribes a relation between PN and the Fourth Generation (4G)....

  10. Fitting ERGMs on big networks.

    Science.gov (United States)

    An, Weihua

    2016-09-01

    The exponential random graph model (ERGM) has become a valuable tool for modeling social networks. In particular, ERGM provides great flexibility to account for both covariates effects on tie formations and endogenous network formation processes. However, there are both conceptual and computational issues for fitting ERGMs on big networks. This paper describes a framework and a series of methods (based on existent algorithms) to address these issues. It also outlines the advantages and disadvantages of the methods and the conditions to which they are most applicable. Selected methods are illustrated through examples. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. General Purpose (office) Network reorganisation

    CERN Multimedia

    IT Department

    2016-01-01

    On Saturday 27 August, the IT Department’s Communication Systems group will perform a major reorganisation of CERN’s General Purpose Network.   This reorganisation will cause network interruptions on Saturday 27 August (and possibly Sunday 28 August) and will be followed by a change to the IP addresses of connected systems that will come into effect on Monday 3 October. For further details and information about the actions you may need to take, please see: https://information-technology.web.cern.ch/news/general-purpose-office-network-reorganisation.

  12. Hierarchical Address Event Routing for Reconfigurable Large-Scale Neuromorphic Systems.

    Science.gov (United States)

    Park, Jongkil; Yu, Theodore; Joshi, Siddharth; Maier, Christoph; Cauwenberghs, Gert

    2017-10-01

    We present a hierarchical address-event routing (HiAER) architecture for scalable communication of neural and synaptic spike events between neuromorphic processors, implemented with five Xilinx Spartan-6 field-programmable gate arrays and four custom analog neuromophic integrated circuits serving 262k neurons and 262M synapses. The architecture extends the single-bus address-event representation protocol to a hierarchy of multiple nested buses, routing events across increasing scales of spatial distance. The HiAER protocol provides individually programmable axonal delay in addition to strength for each synapse, lending itself toward biologically plausible neural network architectures, and scales across a range of hierarchies suitable for multichip and multiboard systems in reconfigurable large-scale neuromorphic systems. We show approximately linear scaling of net global synaptic event throughput with number of routing nodes in the network, at 3.6×107 synaptic events per second per 16k-neuron node in the hierarchy.

  13. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  14. Addressing contrasting cognitive models in scientific collaboration

    Science.gov (United States)

    Diviacco, P.

    2012-04-01

    If the social aspects of scientific communities and their internal dynamics is starting to be recognized and acknowledged in the everyday lives of scientists, it is rather difficult for them to find tools that could support their activities consistently with this perspective. Issues span from gathering researchers to mutual awareness, from information sharing to building meaning, with the last one being particularly critical in research fields as the geo-sciences, that deal with the reconstruction of unique, often non-reproducible, and contingent processes. Reasoning here is, in fact, mainly abductive, allowing multiple and concurrent explanations for the same phenomenon to coexist. Scientists bias one hypothesis over another not only on strictly logical but also on sociological motivations. Following a vision, scientists tend to evolve and isolate themselves from other scientists creating communities characterized by different cognitive models, so that after some time these become incompatible and scientists stop understanding each other. We address these problems as a communication issue so that the classic distinction into three levels (syntactic, semantic and pragmatic) can be used. At the syntactic level, we highlight non-technical obstacles that condition interoperability and data availability and transparency. At the semantic level, possible incompatibilities of cognitive models are particularly evident, so that using ontologies, cross-domain reconciliation should be applied. This is a very difficult task to perform since the projection of knowledge by scientists, in the designated community, is political and thus can create a lot of tension. The strategy we propose to overcome these issues pertains to pragmatics, in the sense that it is intended to acknowledge the cultural and personal factors each partner brings into the collaboration and is based on the idea that meaning should remain a flexible and contingent representation of possibly divergent views

  15. Evaluating Judicial Performance and Addressing Gender Bias

    Directory of Open Access Journals (Sweden)

    Angela Melville

    2014-12-01

    Full Text Available Elek and Rottman argue that judicial evaluation is often biased against women and minority judges. The need to address bias is important, however often the desire for diversity seems so self-evident as to belie deeper analysis. This paper examines the two main rationales for gender equality on the bench. First, female judges are often considered necessary in order to bring a gendered perspective to judging, however it is argued that this rationale is flawed. Second, an alternative rationale based on equality and legitimacy is offered which avoids gender essentialism. While debates typically focus on these two rationales, a third rationale embraces both difference and equality/legitimacy. The presence of female judges has an important symbolic value which destabilises existing fraternal legal norms. Finally, increasing the number of female judges may not necessarily change judging, and this paper also analyses how the transformative potential offered by judicial diversity can work in practice. Elek y Rottman defienden que la evaluación judicial suele estar sesgada en contra de las mujeres y los jueces pertenecientes a minorías. La necesidad de abordar el sesgo es importante, sin embargo a menudo el deseo de diversidad parece tan evidente como para contradecir un análisis más profundo. Este artículo examina los dos motivos principales para la igualdad de género en el banquillo. En primer lugar, las mujeres jueces a menudo se consideran necesarias para aportar una perspectiva de género al hecho de juzgar, sin embargo, se defiende que este razonamiento es erróneo. En segundo lugar, se ofrece una alternativa lógica basada en la igualdad y la legitimidad que evita el esencialismo de género. Mientras que los debates suelen centrarse en estas dos razones, una tercera justificación abarca tanto la diferencia como la igualdad/legitimidad. La presencia de mujeres en la judicatura tiene un importante valor simbólico que desestabiliza las normas

  16. Multi Sensor Approach to Address Sustainable Development

    Science.gov (United States)

    Habib, Shahid

    2007-01-01

    The main objectives of Earth Science research are many folds: to understand how does this planet operates, can we model her operation and eventually develop the capability to predict such changes. However, the underlying goals of this work are to eventually serve the humanity in providing societal benefits. This requires continuous, and detailed observations from many sources in situ, airborne and space. By and large, the space observations are the way to comprehend the global phenomena across continental boundaries and provide credible boundary conditions for the mesoscale studies. This requires a multiple sensors, look angles and measurements over the same spot in accurately solving many problems that may be related to air quality, multi hazard disasters, public health, hydrology and more. Therefore, there are many ways to address these issues and develop joint implementation, data sharing and operating strategies for the benefit of the world community. This is because for large geographical areas or regions and a diverse population, some sound observations, scientific facts and analytical models must support the decision making. This is crucial for the sustainability of vital resources of the world and at the same time to protect the inhabitants, endangered species and the ecology. Needless to say, there is no single sensor, which can answer all such questions effectively. Due to multi sensor approach, it puts a tremendous burden on any single implementing entity in terms of information, knowledge, budget, technology readiness and computational power. And, more importantly, the health of planet Earth and its ability to sustain life is not governed by a single country, but in reality, is everyone's business on this planet. Therefore, with this notion, it is becoming an impractical problem by any single organization/country to bear this colossal responsibility. So far, each developed country within their means has proceeded along satisfactorily in implementing

  17. Cross-layer design in optical networks

    CERN Document Server

    Brandt-Pearce, Maïté; Demeester, Piet; Saradhi, Chava

    2013-01-01

    Optical networks have become an integral part of the communications infrastructure needed to support society’s demand for high-speed connectivity.  Cross-Layer Design in Optical Networks addresses topics in optical network design and analysis with a focus on physical-layer impairment awareness and network layer service requirements, essential for the implementation and management of robust scalable networks.  The cross-layer treatment includes bottom-up impacts of the physical and lambda layers, such as dispersion, noise, nonlinearity, crosstalk, dense wavelength packing, and wavelength line rates, as well as top-down approaches to handle physical-layer impairments and service requirements.

  18. Evolutionary dynamics of complex communications networks

    CERN Document Server

    Karyotis, Vasileios; Papavassiliou, Symeon

    2013-01-01

    Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology-closing the network design loop in an evolutionary fashion similar to

  19. Overview of an address and purpose of the workshop [ISO Workshop on address standards: Considering the issues related to an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-05-01

    Full Text Available of an international address standard. It brings together people involved in the development of address standards around the world, to give their perspectives on several key issues: • What is an address? We think that it would be more useful for an international.../TC211 WG 10, Ubiquitous public access). • Address data exchange in South Africa, Serena Coetzee, University of Pretoria, South Africa. • AS/NZS 4819:2003: Geographic information – Rural and urban addressing and AS/NZS 4590:2006: Interchange of client...

  20. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    . The inherent flexibility of both SDN and NC provides fertile ground to envision more efficient, robust, and secure networking designs, which may also incorporate content caching and storage, all of which are key challenges of the upcoming 5G networks. This article not only proposes the fundamentals......Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  1. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...... incorporate content caching and storage, all of which are key challenges of the future Internet and the upcoming 5G networks. This paper proposes some of the keys behind this intersection and supports it with use cases as well as a an implementation that integrated the Kodo library (NC) into OpenFlow (SDN...

  2. An Efficient Congestion Control Protocol for Wired/Wireless Networks

    OpenAIRE

    Hanaa Torkey; Gamal ATTIYA; Ahmed Abdel Nabi

    2014-01-01

    Recently, wide spectrum of heterogeneous wireless access networks integrate with high speed wired networks to deliver Internet services. End-to-end service delivery with satisfactory quality is challenging issue in such network architectures. Although the Internet transport control protocol (TCP) addresses such challenge, it has poor performance with high speed wired networks (i.e. high bandwidth-delay product). Moreover, it behaves badly with wireless access networks (i.e. misinterpretation ...

  3. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  4. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part...

  5. Social Networking and Academic Performance: A Review

    Science.gov (United States)

    Doleck, Tenzin; Lajoie, Susanne

    2018-01-01

    The ubiquitous use of social networking sites by students and the potential impacts of such use on academic performance are of both theoretical and practical importance. Hence, this paper addresses the question: how does the use of social networking sites influence academic performance? The present review synthesizes the empirical findings of the…

  6. Plant Evolution: A Manufacturing Network Perspective

    DEFF Research Database (Denmark)

    Yang, Cheng; Johansen, John; Boer, Harry

    2009-01-01

    Viewing them as portfolios of products and processes, we aim to address how plants evolve in the context of a manufacturing network and how the evolution of one plant impacts other plants in the same manufacturing network. Based on discussions of ten plants from three Danish companies, we identif...

  7. VOLTAGE COMPENSATION USING ARTIFICIAL NEURAL NETWORK

    African Journals Online (AJOL)

    A study of hourly voltage log taken over a period of six months from Rumuola Distribution network Port Harcourt, Rivers State indicates that power quality problems prevalent in the Network are undervoltage/voltage sags and overvoltage/voltage swells. This paper aims at addressing these power quality problems in the ...

  8. Successive interference cancellation in heterogeneous networks

    NARCIS (Netherlands)

    Wildemeersch, Matthias; Wildemeersch, Matthias; Quek, Tony Q.S.; Kountouris, Marios; Rabbachin, Alberto; Slump, Cornelis H.

    2014-01-01

    At present, operators address the explosive growth of mobile data demand by densification of the cellular network so as to reduce the transmitter-receiver distance and to achieve higher spectral efficiency. Due to such network densification and the intense proliferation of wireless devices, modern

  9. MPE inference in conditional linear gaussian networks

    DEFF Research Database (Denmark)

    Salmerón, Antonio; Rumí, Rafael; Langseth, Helge

    2015-01-01

    Given evidence on a set of variables in a Bayesian network, the most probable explanation (MPE) is the problem of finding a configuration of the remaining variables with maximum posterior probability. This problem has previously been addressed for discrete Bayesian networks and can be solved usin...

  10. Diagnosis of Subtraction Bugs Using Bayesian Networks

    Science.gov (United States)

    Lee, Jihyun; Corter, James E.

    2011-01-01

    Diagnosis of misconceptions or "bugs" in procedural skills is difficult because of their unstable nature. This study addresses this problem by proposing and evaluating a probability-based approach to the diagnosis of bugs in children's multicolumn subtraction performance using Bayesian networks. This approach assumes a causal network relating…

  11. Brocade: Optimal flow placement in SDN networks

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Today' network poses several challanges to network providers. These challanges fall in to a variety of areas ranging from determining efficient utilization of network bandwidth to finding out which user applications consume majority of network resources. Also, how to protect a given network from volumetric and botnet attacks. Optimal placement of flows deal with identifying network issues and addressing them in a real-time. The overall solution helps in building new services where a network is more secure and more efficient. Benefits derived as a result are increased network efficiency due to better capacity and resource planning, better security with real-time threat mitigation, and improved user experience as a result of increased service velocity.

  12. Maintenance of Acehnese terms of address in an intermarriage family

    Directory of Open Access Journals (Sweden)

    Maria Ulfa

    2017-03-01

    Full Text Available This study deals with the maintenance of terms of address of Acehnese young generation in intermarriage family. It employs a qualitative research design with a case study. This study aims to describe: (1 the factors that influence the Acehnese young generation in intermarriage families in maintaining Acehnese terms of address in their family, (2 the patterns of the maintenance of terms of address of Acehnese young generation in intermarriage families, and (3 the reasons why the Acehnese young generation from intermarriage families maintain the terms of address in Acehnese. The subjects were 20 children of intermarriage families, with ages ranging from 15 to 26. The instruments used in this study were a questionnaire and interviews. The results showed that there were 14 respondents (70% who maintained the terms of address and six (30% who shifted the terms of address. Moreover, four factors that influenced the younger generation to maintain the terms of address are parental roles, attitudes, environment and demography. Additionally, there were four patterns of the maintenance of terms of address: (1 children of Acehnese fathers maintaining the terms of address, (2 children of Acehnese mothers maintaining the terms of address, (3 children of Acehnese fathers partly maintaining the terms of address mixing Acehnese and Indonesian terms of addresses, and 4 children of Acehnese mothers partly maintaining the terms of address, mixing Acehnese and Indonesian terms of addresses. Finally, three reasons for the maintenance of terms of address are family traditions, ethnic identity and politeness in language.

  13. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  14. Enterpreneurial network

    OpenAIRE

    Thoma, Antonela; Nguyen, Lien; Kupsyte, Valdone

    2014-01-01

    Network has become more and more indispensable in the entrepreneurial world. Especially in startup businesses, network is crucial for new entrepreneurs. This project looks at how entrepreneurs in different sectors use network to become successful. We chose to work with three entrepreneurs from three companies that have been operational for a few years and conducted face to face interviews with them. Through the data from the interviews, we analyzed firstly what type of entrepreneurs they are,...

  15. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  16. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...... (WNF). Through the alumni network, Japan continues to infuse ideas to participants and alumni, who interpret and disseminate these ideas through alumni society networks and activities, but their discussions nationally and regionally also get reported back to Japan and affect future policies...

  17. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  18. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  19. Architectures for Wireless Sensor Networks

    NARCIS (Netherlands)

    Dulman, S.O.; Havinga, Paul J.M.

    2005-01-01

    Various architectures have been developed for wireless sensor networks. Many of them leave to the programmer important concepts as the way in which the inter-task communication and dynamic reconfigurations are addressed. In this paper we describe the characteristics of a new architecture we proposed

  20. [Analysis of the design and renovation of mid-sized hospital's local area network].

    Science.gov (United States)

    Cao, Yang; Li, Min; Guo, Yifeng

    2011-11-01

    To address several hospital network issues, this paper discusses the overall plan, design and renovation of hospital's Local Area Network, making full use of existing network facilities. The techniques, such as Physical Separation of Internal and External Network, HSRP, OSPF, All-Routers Networking Model, etc., create features of extensibility, manageability, high safety, stability and so on to the overall network, and provide a reliable network platform to the function of the information systems.

  1. Using networked technologies to support conferences

    OpenAIRE

    Kelly, B.; Tonkin, E.; Shabajee, P

    2005-01-01

    The increasing availability of WiFi networks in conference venues is an opportunity to provide additional services for conference delegates and to enhance and enrich the learning experience. This paper reviews experiences of use of networked applications in a conference environment and outlines a number of potentially useful technologies. The paper addresses potential concerns over use of networked technologies including dangers of disruption and distraction, legal and copyright issues as wel...

  2. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  3. Optimizing sentinel surveillance in temporal network epidemiology

    OpenAIRE

    Bai, Yuan; Yang, Bo; LIN, LIJUAN; Jose L Herrera; Du, Zhanwei; Holme, Petter

    2017-01-01

    To help health policy makers gain response time to mitigate infectious disease threats, it is essential to have an efficient epidemic surveillance. One common method of disease surveillance is to carefully select nodes (sentinels, or sensors) in the network to report outbreaks. One would like to choose sentinels so that they discover the outbreak as early as possible. The optimal choice of sentinels depends on the network structure. Studies have addressed this problem for static networks, but...

  4. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  5. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  6. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  7. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  8. Network migration for printers

    CERN Multimedia

    2016-01-01

    Further to the recent General Purpose (office) Network reorganisation (as announced in the Bulletin - see here), please note that the majority of print devices will be automatically migrated to the new network IP address range on Tuesday 27 September.   This change should be transparent for these devices and therefore end-users, provided you have installed the printers from the Print Service website. A small number of devices will require manual intervention from the Printer Support team in order to migrate correctly. These devices will not change their IP address until the manual intervention, which will be carried out before Monday 3rd October. However, if you have mistakenly connected directly to the printer’s IP address, then your printing will be affected – please uninstall the printer (for help, see: KB3785), and re-install it from the Print Service website (or follow instructions for visitor machines). Please do this as soon as possible in order to avoid printing issues, t...

  9. Address allocation for MANET merge and partition using cluster based routing.

    Science.gov (United States)

    Singh, Sugandha; Rajpal, Navin; Sharma, Ashok

    2014-01-01

    Network merges and partitions occur quite often in MANET wherein address auto-configuration is a critical requirement. There are various approaches for address auto-configuration in MANETs which allocate address to the nodes in a dynamic and distributed manner in which HOST ID and MANET ID are assigned on the basis of their Base value. MANET merges and partitions employing Cluster Based Routing Protocol require a node to be assigned as the Cluster Head (CH). This paper presents the Election Algorithm which assigns a node as the Cluster Head on the basis of its weight. Through simulation using the NS-2, it has been shown that the Election Algorithm improves the packet delivery ratio (PDR) significantly and decreases the packet delay to a great extent in comparison to the existing AODV protocol.

  10. Running Out of Numbers: Scarcity of IP Addresses and What to Do about It

    Science.gov (United States)

    Edelman, Benjamin

    The Internet’s current numbering system is nearing exhaustion: Existing protocols allow only a finite set of computer numbers (“IP addresses”), and central authorities will soon deplete their supply. I evaluate a series of possible responses to this shortage: Sharing addresses impedes new Internet applications and does not seem to be scalable. A new numbering system (“IPv6”) offers greater capacity, but network incentives impede transition. Paid transfers of IP addresses would better allocate resources to those who need them most, but unrestricted transfers might threaten the Internet’s routing system. I suggest policies to facilitate an IP address “market” while avoiding major negative externalities - mitigating the worst effects of v4 scarcity, while obtaining price discovery and allocative efficiency benefits of market transactions.

  11. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  12. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC...

  13. Sensor networks

    NARCIS (Netherlands)

    Chatterjea, Supriyo; Thurston, J.; Kininmonth, S.; Havinga, Paul J.M.

    2006-01-01

    This article describes the details of a sensor network that is currently being deployed at the Great Barrier Reef in Australia. The sensor network allows scientists to retrieve sensor data that has a high spatial and temporal resolution. We give an overview of the energy-efficient data aggregation

  14. Network Protocols

    NARCIS (Netherlands)

    Tanenbaum, A.S.

    1981-01-01

    Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere. From the experience obtamed with these networks, certain key design principles have begun to emerge, principles that can be used to

  15. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  16. Organizational Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Grande, Bård

    1996-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed.......The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed....

  17. Affective Networks

    OpenAIRE

    Jodi Dean

    2010-01-01

    This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  18. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  19. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  20. Networking activities in technology-based entrepreneurial teams

    DEFF Research Database (Denmark)

    Neergaard, Helle

    2005-01-01

    Based on social network theoy, this article investigates the distribution of networking roles and responsibilities in entrepreneurial founding teams. Its focus is on the team as a collection of individuals, thus allowing the research to address differences in networking patterns. It identifies six...... central networking activities and shows that not all founding team members are equally active 'networkers'. The analyses show that team members prioritize different networking activities and that one member in particular has extensive networking activities whereas other memebrs of the team are more...

  1. Science and societal partnerships to address cumulative impacts

    Directory of Open Access Journals (Sweden)

    Carolyn J Lundquist

    2016-02-01

    Full Text Available Funding and priorities for ocean research are not separate from the underlying sociological, economic, and political landscapes that determine values attributed to ecological systems. Here we present a variation on science prioritisation exercises, focussing on inter-disciplinary research questions with the objective of shifting broad scale management practices to better address cumulative impacts and multiple users. Marine scientists in New Zealand from a broad range of scientific and social-scientific backgrounds ranked 48 statements of research priorities. At a follow up workshop, participants discussed five over-arching themes based on survey results. These themes were used to develop mechanisms to increase the relevance and efficiency of scientific research while acknowledging socio-economic and political drivers of research agendas in New Zealand’s ocean ecosystems. Overarching messages included the need to: 1 determine the conditions under which ‘surprises’ (sudden and substantive undesirable changes are likely to occur and the socio-ecological implications of such changes; 2 develop methodologies to reveal the complex and cumulative effects of change in marine systems, and their implications for resource use, stewardship, and restoration; 3 assess potential solutions to management issues that balance long-term and short-term benefits and encompass societal engagement in decision-making; 4 establish effective and appropriately resourced institutional networks to foster collaborative, solution-focused marine science; and 5 establish cross-disciplinary dialogues to translate diverse scientific and social-scientific knowledge into innovative regulatory, social and economic practice. In the face of multiple uses and cumulative stressors, ocean management frameworks must be adapted to build a collaborative framework across science, governance and society that can help stakeholders navigate uncertainties and socio-ecological surprises.

  2. Fractional dynamics of complex networks

    Science.gov (United States)

    Turalska, Malgorzata; West, Bruce J.

    2014-03-01

    The relation between the behavior of a single element and the global dynamics of its host network is an open problem in the science of complex networks. Typically one attempts to infer the global dynamics by combining the behavior of single elements within the system, following a bottom-up approach. Here we address an inverse problem. We show that for a generic model within the Ising universality class it is possible to construct a description of the dynamics of an individual element, given the information about the network's global behavior. We demonstrate that the individual trajectory response to the collective motion of the network is described by a linear fractional differential equation, whose analytic solution is the Mittag-Leffler function. This solution is obtained through a subordination procedure without the necessity of linearizing the underlying dynamics, that is, the solution retains the influence of the nonlinear network dynamics on the individual. Moreover the solutions to the fractional equation of motion suggest a new direction for designing control mechanisms for complex networks. The implications of this new perspective are explored by introducing a control signal into a small number of network elements and analyzing the subsequent change in the network dynamics.

  3. Hyporheic network (Hyporheisches Netzwerk)

    Science.gov (United States)

    Lewandowski, J.; Fleckenstein, J.; Hoehn, E.; Nützmann, G.; Radke, M.; Saenger, N.; Schmidt, C.

    2009-04-01

    The transition zone between surface waters like streams and rivers and the adjacent aquifers is a zone of paramount ecological importance. Due to the complexity of exchange processes, their temporal variability, and the spatial heterogeneity of the ecotone, the understanding and ability to modell the hydrodynamic, hydrochemical, and (micro-)biological processes is still limited. Therefore, a network of scientists and practitioners involved in research and management of hyporheic zones in German-speaking countries (Germany, Switzerland, Austria) is propsed in analogy to the hyporheic network (www.hyporheic.net) in the UK. The initiators of the network anticipate that an intense scientific exchange of knowledge and methods will improve our understanding of hyporheic processes and in turn our ability to manage them. The network will facilitate the formation of research groups to identify and understand key processes and their interactions. Research will be focused at a few major study sites, to bring together different expertise to allow more detailed, interdisciplinary investigations. Those sites can serve as crystallisation points for new research projects. Exchange within the network will be organized via an internet platform (www.hyporheisches-netzwerk.de), regular workshops, and several working groups dealing with different topics. A fast knowledge transfer is a further aim of the collaboration in order to shorten the time-lag between scientific findings and their implementation into management practice. Water resources management authorities should also be involved in the network to address urgent problems and direct some capacities to answer those questions. For instance, changes in geomorphology, water and temperature regimes as well as other anthropogenic impacts might increase the need for cold water refugia and altered flow regimes to maintain biodiversity. Additional qualitative improvements are required by the EU water framework directive.

  4. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  5. The Embedded Self: A Social Networks Approach to Identity Theory

    Science.gov (United States)

    Walker, Mark H.; Lynn, Freda B.

    2013-01-01

    Despite the fact that key sociological theories of self and identity view the self as fundamentally rooted in networks of interpersonal relationships, empirical research investigating how personal network structure influences the self is conspicuously lacking. To address this gap, we examine links between network structure and role identity…

  6. Wi-Fi Network Communication Technology Design | Onibere ...

    African Journals Online (AJOL)

    This paper is concerned with chronicling the design issues of Wi -Fi network communication technology taking into consideration constraints and challenges addressed in the evolution of other communications networks, such as wired public switched telephone network (PSTN) for internet connectivity. These constraints ...

  7. 47 CFR 3.54 - Notification of change in address.

    Science.gov (United States)

    2010-10-01

    ... ACCOUNTING AUTHORITIES IN MARITIME AND MARITIME MOBILE-SATELLITE RADIO SERVICES Settlement Operations § 3.54... address of an accounting authority. Such written notification should be sent to the address shown in § 3...

  8. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  9. Integrating multiple networks for protein function prediction.

    Science.gov (United States)

    Yu, Guoxian; Zhu, Hailong; Domeniconi, Carlotta; Guo, Maozu

    2015-01-01

    High throughput techniques produce multiple functional association networks. Integrating these networks can enhance the accuracy of protein function prediction. Many algorithms have been introduced to generate a composite network, which is obtained as a weighted sum of individual networks. The weight assigned to an individual network reflects its benefit towards the protein functional annotation inference. A classifier is then trained on the composite network for predicting protein functions. However, since these techniques model the optimization of the composite network and the prediction tasks as separate objectives, the resulting composite network is not necessarily optimal for the follow-up protein function prediction. We address this issue by modeling the optimization of the composite network and the prediction problems within a unified objective function. In particular, we use a kernel target alignment technique and the loss function of a network based classifier to jointly adjust the weights assigned to the individual networks. We show that the proposed method, called MNet, can achieve a performance that is superior (with respect to different evaluation criteria) to related techniques using the multiple networks of four example species (yeast, human, mouse, and fly) annotated with thousands (or hundreds) of GO terms. MNet can effectively integrate multiple networks for protein function prediction and is robust to the input parameters. Supplementary data is available at https://sites.google.com/site/guoxian85/home/mnet. The Matlab code of MNet is available upon request.

  10. NETWORKS AND QUALITY IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    Miodrag Hadžistević

    2009-12-01

    Full Text Available Tools used in the past to analyze business value creation, such as value chain and process models, are simply too slow, inadequate, or inappropriate to address this new level of business complexity. In stead of that, company has to find way to create quality management system in a multi-layered supply chain. The problem can be solved by networking in the cluster. Cluster can be known as a competitive cooperation in the purpose to gain higher level of competitiveness and success. Bat there is another problem: Organization of the production process in a company is extremely complex process itself, and when we transfer it to the cluster level, we get a complex task which is difficult to solve. For that purpose, this paper analyses the conditions and possibilities that would enable those structures to adapt to changes in the surroundings - flexibility and management adequacy of production and organizational structures - by creating network value system.

  11. IOOC Organizational Network (ION) Project

    Science.gov (United States)

    Dean, H.

    2013-12-01

    In order to meet the growing need for ocean information, research communities at the national and international levels have responded most recently by developing organizational frameworks that can help to integrate information across systems of existing networks and standardize methods of data gathering, management, and processing that facilitate integration. To address recommendations and identified challenges related to the need for a better understanding of ocean observing networks, members of the U.S. Interagency Ocean Observation Committee (IOOC) supported pursuing a project that came to be titled the IOOC Organizational Network (ION). The ION tool employs network mapping approaches which mirror approaches developed in academic literature aimed at understanding political networks. Researchers gathered data on the list of global ocean observing organizations included in the Framework for Ocean Observing (FOO), developed in 2012 by the international Task Team for an Integrated Framework for Sustained Ocean Observing. At the international scale, researchers reviewed organizational research plans and documents, websites, and formal international agreement documents. At the U.S. national scale, researchers analyzed legislation, formal inter-agency agreements, work plans, charters, and policy documents. Researchers based analysis of relationships among global organizations and national federal organizations on four broad relationship categories: Communications, Data, Infrastructure, and Human Resources. In addition to the four broad relationship categories, researchers also gathered data on relationship instrument types, strength of relationships, and (at the global level) ocean observing variables. Using network visualization software, researchers then developed a series of dynamic webpages. Researchers used the tool to address questions identified by the ocean observing community, including identifying gaps in global relationships and the types of tools used to

  12. Networked Special Operations: Addressing Transnational Threats, Homeland Defense, and Breached Seams in the Western Hemisphere

    Science.gov (United States)

    2017-04-20

    seems to occur more via personal relationships and happenstance, vice a codified or doctrinal convergence of efforts. To use a football analogy... administrative borders. Additionally, the traditional threats resident within the Western Hemisphere are not the only customers interested in...Strategy Division 612th AOC. He is a Command Pilot with over 3400 hours and holds three Master’s Degrees: Masters in Business Administration : Airfield

  13. Generation of the Discrete Address Beacon System (DABS) Network Coverage Map.

    Science.gov (United States)

    1980-03-20

    Configuration ............Three--of -the f-our---senser-s--- compra -i-ng-the-netmorkare defined to be serving the TRACON/tower facilities at Washington National...near the line dividing regions II and III. It is therefore sufficient to extend that line to divide region I. Nearly all of region II lies closer to...Region VII is appropriately subdivided into four areas by proximity. The two central sub-areas are both closest to DCA, and the line dividing them may be

  14. Assessing Opinions in Community Leadership Networks to Address Health Inequalities: A Case Study from Project IMPACT

    Science.gov (United States)

    McCauley, M. P.; Ramanadhan, S.; Viswanath, K.

    2015-01-01

    This study demonstrates a novel approach that those engaged in promoting social change in health can use to analyze community power, mobilize it and enhance community capacity to reduce health inequalities. We used community reconnaissance methods to select and interview 33 participants from six leadership sectors in "Milltown", the New…

  15. A new fixation strategy for addressable nano-network building blocks

    KAUST Repository

    Lundberg, Erik P.

    2010-01-01

    Rapid controlled self-assembly makes DNA ideal for building nanostructures. A problem using hybridized intermediates in hierarchic assembly is their thermodynamic lability. We demonstrate a click-fixation technology by which robust hexagonal DNA modules can be made. This principle is applicable to a wide variety of DNA nanoconstructs. © 2010 The Royal Society of Chemistry.

  16. Networking of integrated pest management: A powerful approach to address common challenges in agriculture

    DEFF Research Database (Denmark)

    Lamichhane, Jay Ram; Aubertot, J-N; Begg, Graham

    2016-01-01

    Integrated pest management (IPM) is facing both external and internal challenges. External challenges include increasing needs to manage pests (pathogens, animal pests and weeds) due to climate change, evolution of pesticide resistance as well as virulence matching host resistance. The complexity...... of designing effective pest management strategies, which rely less heavily on the use of conventional pesticides, is another external challenge. Internal challenges include organizational aspects such as decreasing trend in budget allocated to IPM research, increasing scarcity of human expertise, lack...

  17. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  18. Address forms in Persian based on Iranian movies

    OpenAIRE

    Derakhshan Rokni, Tina

    2012-01-01

    The present thesis: “Address forms in Persian language based on Iranian movies”, investigates address forms as socio-linguistic forms which are directly related to social factors such as age, gender and social class. In the Persian language there is a strong tradition of addressing each other in various ways, changing from one context to another. Addressing is a universal phenomenon, but the rules that govern the choice are different from one language to another. So, the hierarchical struc...

  19. An Efficient Geographical Addressing Scheme for the Internet

    NARCIS (Netherlands)

    Meijerink, Berend Jan; Baratchi, Mitra; Heijenk, Geert

    Geocast is a scheme which allows packets to be sent to a destination area instead of an address. This allows the addressing of any device in a specific region without further knowledge. In this paper we present an addressing mechanism that allows efficient referral to areas of arbitrary size. The

  20. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics Agency...

  1. Pronouns and Terms of Address in "Neues Deutschland."

    Science.gov (United States)

    Kempf, Renate

    1985-01-01

    Describes a study that investigated the distribution of the pronouns of address in the German Democratic Republic by looking at the pronouns and terms of address in different newspaper tests. Pronoun use was dependent on the kind of text, on party membership, nationality, social class, and the roles of the addressee and addressed. (SED)

  2. Heterogenous networks and services

    DEFF Research Database (Denmark)

    Tan, Su-En

    2006-01-01

    of the market. If mainstream technology firms do not address the disruption, it is likely they will fail and the new disruptive firm will grow in size and importance in the industry. As we move to 3G (3rd Generation Mobile Services) and beyond 3G, one of the biggest challenges is to bridge network heterogeneity...... representations of strategy, will then help to determine the success or failure of the technology. This is shown typically in the case of WiFi. WiFi is a wireless technology that addressed a new market, but was soon adopted as a complement by mobile operators into their suite of services. However, the future......This thesis considers the development of the mobile industry from a techno-economic perspective. Theory of disruptive technologies and related theories are examined and further developed. While much of technology change has been analysed on either a technical level or a market level, another plane...

  3. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  4. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  5. Using neural networks and Dyna algorithm for integrated planning, reacting and learning in systems

    Science.gov (United States)

    Lima, Pedro; Beard, Randal

    1992-01-01

    The traditional AI answer to the decision making problem for a robot is planning. However, planning is usually CPU-time consuming, depending on the availability and accuracy of a world model. The Dyna system generally described in earlier work, uses trial and error to learn a world model which is simultaneously used to plan reactions resulting in optimal action sequences. It is an attempt to integrate planning, reactive, and learning systems. The architecture of Dyna is presented. The different blocks are described. There are three main components of the system. The first is the world model used by the robot for internal world representation. The input of the world model is the current state and the action taken in the current state. The output is the corresponding reward and resulting state. The second module in the system is the policy. The policy observes the current state and outputs the action to be executed by the robot. At the beginning of program execution, the policy is stochastic and through learning progressively becomes deterministic. The policy decides upon an action according to the output of an evaluation function, which is the third module of the system. The evaluation function takes the following as input: the current state of the system, the action taken in that state, the resulting state, and a reward generated by the world which is proportional to the current distance from the goal state. Originally, the work proposed was as follows: (1) to implement a simple 2-D world where a 'robot' is navigating around obstacles, to learn the path to a goal, by using lookup tables; (2) to substitute the world model and Q estimate function Q by neural networks; and (3) to apply the algorithm to a more complex world where the use of a neural network would be fully justified. In this paper, the system design and achieved results will be described. First we implement the world model with a neural network and leave Q implemented as a look up table. Next, we use a

  6. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  7. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  8. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  9. Seeded Bayesian Networks: Constructing genetic networks from microarray data

    Directory of Open Access Journals (Sweden)

    Quackenbush John

    2008-07-01

    Full Text Available Abstract Background DNA microarrays and other genomics-inspired technologies provide large datasets that often include hidden patterns of correlation between genes reflecting the complex processes that underlie cellular metabolism and physiology. The challenge in analyzing large-scale expression data has been to extract biologically meaningful inferences regarding these processes – often represented as networks – in an environment where the datasets are often imperfect and biological noise can obscure the actual signal. Although many techniques have been developed in an attempt to address these issues, to date their ability to extract meaningful and predictive network relationships has been limited. Here we describe a method that draws on prior information about gene-gene interactions to infer biologically relevant pathways from microarray data. Our approach consists of using preliminary networks derived from the literature and/or protein-protein interaction data as seeds for a Bayesian network analysis of microarray results. Results Through a bootstrap analysis of gene expression data derived from a number of leukemia studies, we demonstrate that seeded Bayesian Networks have the ability to identify high-confidence gene-gene interactions which can then be validated by comparison to other sources of pathway data. Conclusion The use of network seeds greatly improves the ability of Bayesian Network analysis to learn gene interaction networks from gene expression data. We demonstrate that the use of seeds derived from the biomedical literature or high-throughput protein-protein interaction data, or the combination, provides improvement over a standard Bayesian Network analysis, allowing networks involving dynamic processes to be deduced from the static snapshots of biological systems that represent the most common source of microarray data. Software implementing these methods has been included in the widely used TM4 microarray analysis package.

  10. Network meta-analysis, electrical networks and graph theory.

    Science.gov (United States)

    Rücker, Gerta

    2012-12-01

    Network meta-analysis is an active field of research in clinical biostatistics. It aims to combine information from all randomized comparisons among a set of treatments for a given medical condition. We show how graph-theoretical methods can be applied to network meta-analysis. A meta-analytic graph consists of vertices (treatments) and edges (randomized comparisons). We illustrate the correspondence between meta-analytic networks and electrical networks, where variance corresponds to resistance, treatment effects to voltage, and weighted treatment effects to current flows. Based thereon, we then show that graph-theoretical methods that have been routinely applied to electrical networks also work well in network meta-analysis. In more detail, the resulting consistent treatment effects induced in the edges can be estimated via the Moore-Penrose pseudoinverse of the Laplacian matrix. Moreover, the variances of the treatment effects are estimated in analogy to electrical effective resistances. It is shown that this method, being computationally simple, leads to the usual fixed effect model estimate when applied to pairwise meta-analysis and is consistent with published results when applied to network meta-analysis examples from the literature. Moreover, problems of heterogeneity and inconsistency, random effects modeling and including multi-armed trials are addressed. Copyright © 2012 John Wiley & Sons, Ltd. Copyright © 2012 John Wiley & Sons, Ltd.

  11. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of organisationalbehaviour developed by Miles and Snow (1978), this paper argues that thepatterns of network behaviour practiced by firms greatly depend on the businesstypology of the company. That is, a company's business typology will to a certaindegree dictate the network identity of the company. In this paper evidence...

  12. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    architecture of ‘Hovering Ad-hoc Network (HANET)’ for the latter will be deployed to assist and manage the overloaded primary base stations enhancing the on-demand coverage and capacity of the entire system. Proposed modes can either operate independently or as a cascaded architecture to form a Heterodox......It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide...

  13. Exchange Network

    Science.gov (United States)

    The Environmental Information Exchange Network (EIEN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.

  14. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  15. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  16. Network bursts in cortical neuronal cultures: 'noise - versus pacemaker'- driven neural network simulations

    NARCIS (Netherlands)

    Gritsun, T.; Stegenga, J.; le Feber, Jakob; Rutten, Wim

    2009-01-01

    In this paper we address the issue of spontaneous bursting activity in cortical neuronal cultures and explain what might cause this collective behavior using computer simulations of two different neural network models. While the common approach to acivate a passive network is done by introducing

  17. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  18. Affective Networks

    Directory of Open Access Journals (Sweden)

    Jodi Dean

    2010-02-01

    Full Text Available This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  19. Friendship Networks

    OpenAIRE

    Jan K. Brueckner

    2004-01-01

    Building upon a long tradition in sociology, economists have recently turned their attention to the analysis of social networks. The present paper adds to this emerging literature by proposing a different approach to social-network formation. As in the model of Jackson and Wolinsky (1996), formation of a link between two individuals requires two-sided investments in the present framework. But in contrast to their approach, where the required investments are exogenously specified and link form...

  20. Developer Network

    Energy Technology Data Exchange (ETDEWEB)

    2012-08-21

    NREL's Developer Network, developer.nrel.gov, provides data that users can access to provide data to their own analyses, mobile and web applications. Developers can retrieve the data through a Web services API (application programming interface). The Developer Network handles overhead of serving up web services such as key management, authentication, analytics, reporting, documentation standards, and throttling in a common architecture, while allowing web services and APIs to be maintained and managed independently.

  1. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  2. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  3. Sentient networks

    Energy Technology Data Exchange (ETDEWEB)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  4. Econometric Information Recovery in Behavioral Networks

    Directory of Open Access Journals (Sweden)

    George Judge

    2016-09-01

    Full Text Available In this paper, we suggest an approach to recovering behavior-related, preference-choice network information from observational data. We model the process as a self-organized behavior based random exponential network-graph system. To address the unknown nature of the sampling model in recovering behavior related network information, we use the Cressie-Read (CR family of divergence measures and the corresponding information theoretic entropy basis, for estimation, inference, model evaluation, and prediction. Examples are included to clarify how entropy based information theoretic methods are directly applicable to recovering the behavioral network probabilities in this fundamentally underdetermined ill posed inverse recovery problem.

  5. Principles of network and system administration

    CERN Document Server

    Burgess, Mark

    2002-01-01

    A practical guide for meeting the challenges of planning and designing a networkNetwork design has to be logical and efficient, decisions have to be made about what services are needed, and security concerns must be addressed. Focusing on general principles, this book will help make the process of setting up, configuring, and maintaining a network much easier. It outlines proven procedures for working in a global community of networked machines, and provides practical illustrations of technical specifics. Readers will also find broad coverage of Linux and other Unix versions, Windows(r), Macs,

  6. Picture this: Managed change and resistance in business network settings

    DEFF Research Database (Denmark)

    Kragh, Hanne; Andersen, Poul Houman

    2009-01-01

    This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...

  7. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2011-01-01

    Production, innovation and service networks of companies all over the world become increasingly decentralized, specialized and interdependent. The three characteristics combined inevitably lead to the formation of complex configurations of assets and capabilities crossing both national and organi......Production, innovation and service networks of companies all over the world become increasingly decentralized, specialized and interdependent. The three characteristics combined inevitably lead to the formation of complex configurations of assets and capabilities crossing both national...... and organisational borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that coordinating them and managing their interfaces in global operations context...... is becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about how companies can organize these networks and coordinate between them effectively. The propositions are developed by employing the design science approach based on a literature...

  8. A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Barbara Martini

    2016-06-01

    Full Text Available Emerging technologies such as Software-Defined Networks (SDN and Network Function Virtualization (NFV promise to address cost reduction and flexibility in network operation while enabling innovative network service delivery models. However, operational network service delivery solutions still need to be developed that actually exploit these technologies, especially at the multi-provider level. Indeed, the implementation of network functions as software running over a virtualized infrastructure and provisioned on a service basis let one envisage an ecosystem of network services that are dynamically and flexibly assembled by orchestrating Virtual Network Functions even across different provider domains, thereby coping with changeable user and service requirements and context conditions. In this paper we propose an approach that adopts Service-Oriented Architecture (SOA technology-agnostic architectural guidelines in the design of a solution for orchestrating and dynamically chaining Virtual Network Functions. We discuss how SOA, NFV, and SDN may complement each other in realizing dynamic network function chaining through service composition specification, service selection, service delivery, and placement tasks. Then, we describe the architecture of a SOA-inspired NFV orchestrator, which leverages SDN-based network control capabilities to address an effective delivery of elastic chains of Virtual Network Functions. Preliminary results of prototype implementation and testing activities are also presented. The benefits for Network Service Providers are also described that derive from the adaptive network service provisioning in a multi-provider environment through the orchestration of computing and networking services to provide end users with an enhanced service experience.

  9. Innovation networks in biotechnology : actors, relations and strategies

    OpenAIRE

    De Sousa, Cristina; Fontes, Margarida; Videira, Pedro

    2009-01-01

    The paper addresses innovation networks in a science-based sector, focusing on networks for scientific and technological knowledge access. It investigates the strategic choices made by new biotechnology firms regarding the type of actors and relations that prevail in accessing those networks. The results contribute to on-going debates in the area of innovation networks and knowledge management, both at the methodological and empirical levels. We develop a methodology to investigate the networ...

  10. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  11. ANDaNA: Anonymous Named Data Networking Application

    OpenAIRE

    DiBenedetto, Steven; Gasti, Paolo; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destin...

  12. MUPBED - interworking challenges in a multi-domain and multi-technology network environment

    DEFF Research Database (Denmark)

    Foisel, Hans-Martin; Spaeth, Jan; Cavazzoni, Carlo

    2007-01-01

    Todays data transport networks are evolving continuously towards customer oriented and application aware networks. This evolution happens in Europe in a highly diverse network environment, covering multiple network domains, layers, technologies, control and management approaches. In this paper......, the issues, challenges and the solutions developed in the IST project MUPBED (,,Multi-Partner European Test Beds for Research Networking; www.ist-mupbed.eu) for seamless interworking in a typical European heterogeneous network environment are described, addressing horizontal, interdomain, and vertical, inter...

  13. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  14. POWER, STATE AND NETWORK SOCIETY

    Directory of Open Access Journals (Sweden)

    Pedro Luz

    2017-12-01

    Full Text Available This paper intends to study the main changes that the classic conception of State suffered in the last century, with special focus in the three original constituent elements: sovereignty, population and territory. This paper addresses the conceptions of power and its contemporary journey, especially in the 20th century, using the works of Foucault, Agamben, Giddens and Galbraith. Then, the thoughts of Spanish sociologist Manuel Castells, who address new technologies and network society, are elucidated. Lastly, it is shown a great concern with a possible state control using new information technologies in the 21th century.

  15. Addressing Parenting Disputes Between Estranged Parents Through Community Mediation

    National Research Council Canada - National Science Library

    Palihapitiya, Madhawa; Eisenkraft, Kaila Obstfeld

    2014-01-01

    .... The present study addressed the question whether parents engaged in parenting disputes generated by divorce or separation received the promised benefits of mediation when services were delivered...

  16. Effects of budget constraints on conservation network design for biodiversity and ecosystem services

    NARCIS (Netherlands)

    Remme, Roy P.; Schröter, Matthias

    2016-01-01

    Limited budgets and budget cuts hamper the development of effective biodiversity conservation networks. Optimizing the spatial configuration of conservation networks given such budget constraints remains challenging. Systematic conservation planning addresses this challenge. Systematic

  17. Risk-based flood-planning strategy for Vermont's roadway network.

    Science.gov (United States)

    2015-06-01

    In this project, the authors extend the use of a previously established measure of link-specific criticality, the Network Robustness Index (NRI), to address disruptions in Vermonts federal-aid road network caused by summertime flooding. The goal o...

  18. Wide-address spaces - exploring the design space

    NARCIS (Netherlands)

    Bartoli, Alberto; Mullender, Sape J.; van der Valk, M.; van der Valk, Martijn

    1992-01-01

    In a recent issue of Operating System Review, Hayter and McAuley [1991] argue that future high-performance systems trade a traditional, bus-based organization for one where all components are linked together by network switches (the Desk-Area Network). In this issue of Operating System Review,

  19. Linking Environmental Orientation to Start-ups’ Networking Activities

    DEFF Research Database (Denmark)

    Dickel, Petra; Ritter, Thomas

    generation as their primary focus. Addressing this research gap, we develop hypotheses on the different networking activities of environmentally oriented start-ups arguing that their societal focus has a positive impact on the frequency of their networking and the size of their network. For empirically...... investigating such networking differences, we use data from 179 technology-based start-ups and show that start-ups with a strong external environmental orientation have significantly higher networking frequency and build larger networks. On the contrary, strong internal environmental orientation is linked...

  20. The Role of Environmental Orientation in Business Networks

    DEFF Research Database (Denmark)

    Ritter, Thomas; Dickel, Petra

    generation as their primary focus. Addressing this research gap, we develop hypotheses on the different networking activities of environmentally oriented start-ups arguing that their societal focus has a positive impact on the frequency of their networking and the size of their network. For empirically...... investigating such networking differences, we use data from 179 technology-based start-ups and show that start-ups with a strong external environmental orientation have significantly higher networking frequency and build larger networks. On the contrary, strong internal environmental orientation is linked...

  1. Hybrid Evolutionary Metaheuristics for Concurrent Multi-Objective Design of Urban Road and Public Transit Networks

    NARCIS (Netherlands)

    Miandoabchi, Elnaz; Farahani, Reza Zanjirani; Dullaert, Wout; Szeto, W. Y.

    This paper addresses a bi-modal multi-objective discrete urban road network design problem with automobile and bus flow interaction. The problem considers the concurrent urban road and bus network design in which the authorities play a major role in designing bus network topology. The road network

  2. A declarative approach to multi-layer path finding based on semantic network descriptions

    NARCIS (Netherlands)

    Xu, L.; Dijkstra, F.; Marchal, D.; Taal, A.; Grosso, P.; de Laat, C.

    2009-01-01

    With the increasing demand for dynamic network connections between multiple research networks, a number of issues on multi-layer hybrid networks need to be addressed, such as network representation, path finding, and path provisioning. This paper focuses on solving the multi-layer path finding

  3. Out of the shadow: Long term cost development of intelligent sensor networks

    NARCIS (Netherlands)

    Fledderus, E.R; Kester, L.J.H.M.; Kranenburg-Bruinsma, K. van

    2013-01-01

    The paper addresses intelligent sensor networks (ISNs) as a special version of networked wireless robotics. The success of these networks is partly explained by the technical advances, but as well by cutting down costs of these networks. Using a functional breakdown of intelligent ISNs, the trends

  4. Network interruptions

    CERN Document Server

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  5. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...... they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics....

  6. Nuclear networking.

    Science.gov (United States)

    Xie, Wei; Burke, Brian

    2017-07-04

    Nuclear lamins are intermediate filament proteins that represent important structural components of metazoan nuclear envelopes (NEs). By combining proteomics and superresolution microscopy, we recently reported that both A- and B-type nuclear lamins form spatially distinct filament networks at the nuclear periphery of mouse fibroblasts. In particular, A-type lamins exhibit differential association with nuclear pore complexes (NPCs). Our studies reveal that the nuclear lamina network in mammalian somatic cells is less ordered and more complex than that of amphibian oocytes, the only other system in which the lamina has been visualized at high resolution. In addition, the NPC component Tpr likely links NPCs to the A-type lamin network, an association that appears to be regulated by C-terminal modification of various A-type lamin isoforms. Many questions remain, however, concerning the structure and assembly of lamin filaments, as well as with their mode of association with other nuclear components such as peripheral chromatin.

  7. Social networks and fertility

    Directory of Open Access Journals (Sweden)

    Laura Bernardi

    2014-03-01

    Full Text Available Background: The fields of demography, sociology, and socio-psychology have been increasingly drawing on social network theories, which posit that individual fertility decision-making depends in part on the fertility behavior of other members of the population, and on the structure of the interactions between individuals. After reviewing this literature, we highlight the benefits of taking a social network perspective on fertility and family research. Objective: We review the literature that addresses the extent to which social mechanisms, such as social learning, social pressure, social contagion, and social support, influence childbearing decisions. Methods: We review the most recent contributions of the social networks approach for the explanation of fertility dynamics in contemporary post-industrial societies. Conclusions: We find that all of the social mechanisms reviewed influence the beliefs and norms individuals hold regarding childbearing, their perceptions of having children, and the context of opportunities and constraints in which childbearing choices are made. The actual impact of these mechanisms on fertility tempo and quantum strongly depends on the structure of social interaction.

  8. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  9. Distributed Semantic Overlay Networks

    Science.gov (United States)

    Doulkeridis, Christos; Vlachou, Akrivi; Nørvåg, Kjetil; Vazirgiannis, Michalis

    Semantic Overlay Networks (SONs) have been recently proposed as a way to organize content in peer-to-peer (P2P) networks. The main objective is to discover peers with similar content and then form thematically focused peer groups. Efficient content retrieval can be performed by having queries selectively forwarded only to relevant groups of peers to the query. As a result, less peers need to be contacted, in order to answer a query. In this context, the challenge is to generate SONs in a decentralized and distributed manner, as the centralized assembly of global information is not feasible. Different approaches for exploiting the generated SONs for content retrieval have been proposed in the literature, which are examined in this chapter, with a particular focus on SON interconnections for efficient search. Several applications, such as P2P document and image retrieval, can be deployed over generated SONs, motivating the need for distributed and truly scalable SON creation. Therefore, recently several research papers focus on SONs as stated in our comprehensive overview of related work in the field of semantic overlay networks. A classification of existing algorithms according to a set of qualitative criteria is also provided. In spite of the rich existing work in the field of SONs, several challenges have not been efficiently addressed yet, therefore, future promising research directions are pointed out and discussed at the end of this chapter.

  10. Exploring the potential of Web 2.0 to address health disparities.

    Science.gov (United States)

    Gibbons, M Chris; Fleisher, Linda; Slamon, Rachel E; Bass, Sarah; Kandadai, Venk; Beck, J Robert

    2011-01-01

    This article addresses use of the Internet and Web 2.0 technologies by racial and ethnic minorities and explores the potential opportunities and challenges in leveraging Web 2.0 approaches to impact health disparities. These opportunities and challenges include developing approaches and methods to (a) identify strategies for integrating social media into health promotion interventions focused on major health-related issues that affect members of medically underserved groups; (b) amalgamate techniques to leverage and connect social-media technologies to other evidence-informed online resources; (c) integrate health communication best practices, including addressing health literacy issues; (d) capitalize on social networking to enhance access and communication with health care providers; and (e) advance current efforts and ongoing expansion of research participation by individuals from underserved communities.

  11. Addressing the path-length-dependency confound in white matter tract segmentation.

    Directory of Open Access Journals (Sweden)

    Matthew G Liptrot

    Full Text Available We derive the Iterative Confidence Enhancement of Tractography (ICE-T framework to address the problem of path-length dependency (PLD, the streamline dispersivity confound inherent to probabilistic tractography methods. We show that PLD can arise as a non-linear effect, compounded by tissue complexity, and therefore cannot be handled using linear correction methods. ICE-T is an easy-to-implement framework that acts as a wrapper around most probabilistic streamline tractography methods, iteratively growing the tractography seed regions. Tract networks segmented with ICE-T can subsequently be delineated with a global threshold, even from a single-voxel seed. We investigated ICE-T performance using ex vivo pig-brain datasets where true positives were known via in vivo tracers, and applied the derived ICE-T parameters to a human in vivo dataset. We examined the parameter space of ICE-T: the number of streamlines emitted per voxel, and a threshold applied at each iteration. As few as 20 streamlines per seed-voxel, and a robust range of ICE-T thresholds, were shown to sufficiently segment the desired tract network. Outside this range, the tract network either approximated the complete white-matter compartment (too low threshold or failed to propagate through complex regions (too high threshold. The parameters were shown to be generalizable across seed regions. With ICE-T, the degree of both near-seed flare due to false positives, and of distal false negatives, are decreased when compared with thresholded probabilistic tractography without ICE-T. Since ICE-T only addresses PLD, the degree of remaining false-positives and false-negatives will consequently be mainly attributable to the particular tractography method employed. Given the benefits offered by ICE-T, we would suggest that future studies consider this or a similar approach when using tractography to provide tract segmentations for tract based analysis, or for brain network analysis.

  12. Redes de aprendizaje, aprendizaje en red Learning Networks, Networked Learning

    Directory of Open Access Journals (Sweden)

    Peter Sloep

    2011-10-01

    Full Text Available Las redes de aprendizaje (Learning Networks son redes sociales en línea mediante las cuales los participantes comparten información y colaboran para crear conocimiento. De esta manera, estas redes enriquecen la experiencia de aprendizaje en cualquier contexto de aprendizaje, ya sea de educación formal (en escuelas o universidades o educación no-formal (formación profesional. Aunque el concepto de aprendizaje en red suscita el interés de diferentes actores del ámbito educativo, aún existen muchos interrogantes sobre cómo debe diseñarse el aprendizaje en red para facilitar adecuadamente la educación y la formación. El artículo toma este interrogante como punto de partida, y posteriormente aborda cuestiones como la dinámica de la evolución de las redes de aprendizaje, la importancia de fomentar la confianza entre los participantes y el papel central que desempeña el perfil de usuario en la construcción de la confianza, así como el apoyo entre compañeros. Además, se elabora el proceso de diseño de una red de aprendizaje, y se describe un ejemplo en el contexto universitario. Basándonos en la investigación que actualmente se lleva a cabo en nuestro propio centro y en otros lugares, el capítulo concluye con una visión del futuro de las redes de aprendizaje.Learning Networks are on-line social networks through which users share knowledge with each other and jointly develop new knowledge. This way, Learning Networks may enrich the experience of formal, school-based learning and form a viable setting for professional development. Although networked learning enjoys an increasing interest, many questions remain on how exactly learning in such networked contexts can contribute to successful education and training. Put differently, how should networked learning be designed best to facilitate education and training? Taking this as its point of departure, the chapter addresses such issues as the dynamic evolution of Learning Networks

  13. Properties of healthcare teaming networks as a function of network construction algorithms.

    Science.gov (United States)

    Zand, Martin S; Trayhan, Melissa; Farooq, Samir A; Fucile, Christopher; Ghoshal, Gourab; White, Robert J; Quill, Caroline M; Rosenberg, Alexander; Barbosa, Hugo Serrano; Bush, Kristen; Chafi, Hassan; Boudreau, Timothy

    2017-01-01

    Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year), making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast United States and

  14. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    the focus of operations management from managing the own organization to continuously developing and managing a network of external and internal resources forming a production system. This perspective may be called managing an “extraprise” rather than an “enterprise.” It should be noted that “an industrial...... network” should not be seen as an organizational form but as a perspective that can be used to enrich one's understanding of organizations. The industrial network perspective has three basic building blocks: actors, resources, and activities. The three building blocks and their relations constitute...

  15. The Deep Structure of Organizational Online Networking

    DEFF Research Database (Denmark)

    Trier, Matthias; Richter, Alexander

    2015-01-01

    While research on organizational online networking recently increased significantly, most studies adopt quantitative research designs with a focus on the consequences of social network configurations. Very limited attention is paid to comprehensive theoretical conceptions of the complex phenomenon...... of organizational online networking. We address this gap by adopting a theoretical framework of the deep structure of organizational online networking with a focus on their emerging meaning for the employees. We apply and assess the framework in a qualitative case study of a large-scale implementation...... of a corporate social network site (SNS) in a global organization. We reveal organizational online networking as a multi-dimensional phenomenon with multiplex relationships that are unbalanced, primarily consist of weak ties and are subject to temporal change. Further, we identify discourse drivers...

  16. Neighborhood and Network Disadvantage among Urban Renters

    Directory of Open Access Journals (Sweden)

    Matthew Desmond

    2015-06-01

    Full Text Available Drawing on novel survey data, this study maps the distribution of neighborhood and network disadvantage in a population of Milwaukee renters and evaluates the relationship between each disadvantage and multiple social and health outcomes. We find that many families live in neighborhoods with above average disadvantage but are embedded in networks with below average disadvantage, and vice versa. Neighborhood (but not network disadvantage is associated with lower levels of neighborly trust but also with higher levels of community support (e.g., providing neighbors with food. Network (but not neighborhood disadvantage is associated with lower levels of civic engagement. Asthma and diabetes are associated exclusively with neighborhood disadvantage, but depression is associated exclusively with network disadvantage. These findings imply that some social problems may be better addressed by neighborhood interventions and others by network interventions.

  17. Evolutionary algorithms for mobile ad hoc networks

    CERN Document Server

    Dorronsoro, Bernabé; Danoy, Grégoire; Pigné, Yoann; Bouvry, Pascal

    2014-01-01

    Describes how evolutionary algorithms (EAs) can be used to identify, model, and minimize day-to-day problems that arise for researchers in optimization and mobile networking. Mobile ad hoc networks (MANETs), vehicular networks (VANETs), sensor networks (SNs), and hybrid networks—each of these require a designer’s keen sense and knowledge of evolutionary algorithms in order to help with the common issues that plague professionals involved in optimization and mobile networking. This book introduces readers to both mobile ad hoc networks and evolutionary algorithms, presenting basic concepts as well as detailed descriptions of each. It demonstrates how metaheuristics and evolutionary algorithms (EAs) can be used to help provide low-cost operations in the optimization process—allowing designers to put some “intelligence” or sophistication into the design. It also offers efficient and accurate information on dissemination algorithms topology management, and mobility models to address challenges in the ...

  18. A novel network module for medical devices.

    Science.gov (United States)

    Chen, Ping-Yu

    2008-01-01

    In order to allow medical devices to upload the vital signs to a server on a network without manually configuring for end-users, a new network module is proposed. The proposed network module, called Medical Hub (MH), functions as a bridge to fetch the data from all connecting medical devices, and then upload these data to the server. When powering on, the MH can immediately establish network configuration automatically. Network Address Translation (NAT) traversal is also supported by the MH with the UPnP Internet Gateway Device (IGD) methodology. Besides the network configuration, other configuration in the MH is automatically established by using the remote management protocol TR-069. On the other hand, a mechanism for updating software automatically according to the variant connected medical device is proposed. With this mechanism, newcome medical devices can be detected and supported by the MH without manual operation.

  19. MANAGING GLOBAL OPERATIONS NETWORKS IN MOTION

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Sørensen, Brian Vejrum

    2008-01-01

    in corporate strategic repositioning, re-configurations of sites, and changes to the underlying capabilities. The paper is based on cases of 3 Danish companies and their global supply networks. These networks are not in a steady state, they evolve as a consequence of the ongoing co-evolution between the focal...... organisation and network partners as well as various contexts that surround them. This paper addresses this ongoing co-evolution and finds a number of common patterns: strategic re-focusing of the focal organisation downstream; changing roles of individual sites within the supply network; and shifting...... capabilities and intensified need for transfer, assimilation and augmentation of activities and know-how within the network. Based on these the paper highlights some organisational effects and managerial challenges the companies face regarding rapid changes in their networks configurations and capabilities....

  20. Improved Bounds for Dictionary Look-up with One Error

    DEFF Research Database (Denmark)

    Brodal, Gerth Stølting; Srinivasan, Venkatesh

    2000-01-01

    Given a dictionary S of n binary strings each of length m , we consider the problem of designing a data structure for S that supports d -queries; given a binary query string q of length m , a d -query reports if there exists a string in S within Hamming distance d of q . We construct a data...

  1. Effective Look-up Techniques to Approach a Monolingual Dictionary

    Directory of Open Access Journals (Sweden)

    Nauman Al Amin Ali El Sayed

    2013-05-01

    Full Text Available A dictionary is (a learning tool that can help the language learner in acquiring great knowledge of and about a foreign language. Almost all language learners buy or at least possess, at one time, a monolingual or bilingual dictionary, to which the learner may refer to look up the meaning of words. Unfortunately, using dictionary to look up the meaning of words seems to be the most important service, which a dictionary is expected to provide to language learners. In fact, a dictionary provides much data about language to its readers such as telling them about: the word spelling, phonology, phonetics, etymology, stylistics and definitions among other aspects. This paper sheds light on how the dictionary can teach its readers with special focus on monolingual dictionary. Hence, the discussion of this paper will centre on how dictionaries can teach students rather than on how students can learn from them.

  2. EJSCREEN States Percentiles Lookup Table--2015 Public Release

    Data.gov (United States)

    U.S. Environmental Protection Agency — The States table provides percentile breaks of important EJSCREEN elements (demographic indicators and indexes, environmental indicators and indexes) at the state...

  3. EJSCREEN National Percentiles Lookup Table--2015 Public Release

    Data.gov (United States)

    U.S. Environmental Protection Agency — The USA table provides percentile breaks of important EJSCREEN elements (demographic indicators and indexes, environmental indicators and indexes) at the national...

  4. DICTIONARIES LOOKUP STRATEGIES FOR ARABIC-ENGLISH TRANSLATION

    Directory of Open Access Journals (Sweden)

    Mohammad Ahmad THAWABTEH

    2013-05-01

    Full Text Available Bien que les dictionnaires ont une extrême importance dans les cours de traduction, on les considère comme une épée à double tranchant. De grotesques traductions indiquent clairement que les étudiants utilisent les dictionnaires d’une façon incompétente. Les données de cette étude représentent les traductions d’une vingtaine d’étudiants de premier cycle d’Anglais à l’université d’Al-quds et l’université de Palestine Ahlyia. Les traductions sont examinées à base des stratégies de recherche en dictionnaire. Les résultats de l’étude montrent que les pièges des sorties de la traduction que les étudiants font sont dus au: 1-la dépendance exagérée du dictionnaire. 2- le manque de compréhension du texte dans sa langue d’origine. 3- le fait de choisir le premier sens. 4- le peu d’attention accordée aux exemples illustrés dans le dictionnaire. 5- favoriser la lecture attentive sur la lecture superficielle. 6- ignorance totale des collocations, des idioms, et des proverbes. 7- l’incapacité de comprendre le sens du contexte. Quelques stratégies de recherche dans le dictionnaire qui peuvent aider les étudiants de traduction à effectuer leur travail rapidement et efficacement sont proposées.

  5. EJSCREEN Regions Percentiles Lookup Table--2015 Public Release

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Regions table provides percentile breaks of important EJSCREEN elements (demographic indicators and indexes, environmental indicators and indexes) at the EPA...

  6. Methyl Bromide Commodity Fumigation Buffer Zone Lookup Tables

    Science.gov (United States)

    Product labels for methyl bromide used in commodity and structural fumigation include requirements for buffer zones around treated areas. The information on this page will allow you to find the appropriate buffer zone for your planned application.

  7. Microsensing networks for sustainable cities

    CERN Document Server

    Lambrechts, Johannes

    2016-01-01

    This book explores the microsensing technologies and systems now available to monitor the quality of air and water within the urban environment and examines their role in the creation of sustainable cities against the background of the challenges posed by rapid urbanization. The opening section addresses the theoretical and conceptual background of microsensing networks. The coverage includes detailed description of microsensors, supported by design-specific equations, and clear explanation of the ways in which devices that harvest energy from ambient sources can detect and quantify pollution. The practical application of such systems in addressing environmental impacts within cities and in sustainable urban planning is then discussed with the aid of case studies in developing countries. The book will be of interest to all who wish to understand the benefits of microsensing networks in promoting sustainable cities through better delivery of information on health hazards and improved provision of data to envir...

  8. Methods and applications for detecting structure in complex networks

    Science.gov (United States)

    Leicht, Elizabeth A.

    The use of networks to represent systems of interacting components is now common in many fields including the biological, physical, and social sciences. Network models are widely applicable due to their relatively simple framework of vertices and edges. Network structure, patterns of connection between vertices, impacts both the functioning of networks and processes occurring on networks. However, many aspects of network structure are still poorly understood. This dissertation presents a set of network analysis methods and applications to real-world as well as simulated networks. The methods are divided into two main types: linear algebra formulations and probabilistic mixture model techniques. Network models lend themselves to compact mathematical representation as matrices, making linear algebra techniques useful probes of network structure. We present methods for the detection of two distinct, but related, network structural forms. First, we derive a measure of vertex similarity based upon network structure. The method builds on existing ideas concerning calculation of vertex similarity, but generalizes and extends the scope to large networks. Second, we address the detection of communities or modules in a specific class of networks, directed networks. We propose a method for detecting community structure in directed networks, which is an extension of a community detection method previously only known for undirected networks. Moving away from linear algebra formulations, we propose two methods for network structure detection based on probabilistic techniques. In the first method, we use the machinery of the expectation-maximization (EM) algorithm to probe patterns of connection among vertices in static networks. The technique allows for the detection of a broad range of types of structure in networks. The second method focuses on time evolving networks. We propose an application of the EM algorithm to evolving networks that can reveal significant structural

  9. Importance of Addressing Sexuality in Certified Rehabilitation Counselor Practice

    Science.gov (United States)

    Kazukauskas, Kelly A.; Lam, Chow S.

    2009-01-01

    This study investigated Certified Rehabilitation Counselors' (CRCs) beliefs about the importance of addressing sexuality issues during rehabilitation. A modified version of the Family Life Sex Education Goals Questionnaire (FLSEGQ) was completed by 199 CRCs to determine which issues CRCs believe are most important to address. Six sexuality-related…

  10. 27 CFR 44.109 - Change in address.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Change in address. 44.109 Section 44.109 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT... Warehouse Proprietors Changes in Location and Premises § 44.109 Change in address. Whenever any change...

  11. 27 CFR 41.253 - Change in location or address.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false Change in location or address. 41.253 Section 41.253 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE... § 41.253 Change in location or address. Whenever an importer of processed tobacco intends to relocate...

  12. 10 CFR 501.11 - Address for filing documents.

    Science.gov (United States)

    2010-01-01

    ... communications to the following address: Office of Fossil Energy, Office of Fuels Programs, Coal and Electricity... 10 Energy 4 2010-01-01 2010-01-01 false Address for filing documents. 501.11 Section 501.11 Energy DEPARTMENT OF ENERGY (CONTINUED) ALTERNATE FUELS ADMINISTRATIVE PROCEDURES AND SANCTIONS General Provisions...

  13. 17 CFR 171.3 - Business address; hours.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 171.3 Section 171.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO... MEMBER RESPONSIBILITY ACTIONS General Provisions § 171.3 Business address; hours. The principal office of...

  14. 17 CFR 10.4 - Business address; hours.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 10.4 Section 10.4 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES OF PRACTICE General Provisions § 10.4 Business address; hours. The Office of Proceedings is located at Three Lafayette...

  15. 17 CFR 12.3 - Business address; hours.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Business address; hours. 12.3 Section 12.3 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS General Information and Preliminary Consideration of Pleadings § 12.3 Business address; hours. The...

  16. 43 CFR Appendix B to Part 2 - Internet Addresses

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Internet Addresses B Appendix B to Part 2 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Pt. 2, App. B Appendix B to Part 2—Internet Addresses 1. Department of the Interior (DOI) Home...

  17. The "Depreciation" and "Appreciation" of Some Address Terms in China.

    Science.gov (United States)

    Zhucheng, Ju

    1991-01-01

    Examines how the cultural revolution in China has changed, to some extent, the rules governing the use of address terms, discussing the close interrelation between the use of address terms and cultural values and how the change in mental outlook has led to the depreciation or appreciation of certain terms. (Author/CB)

  18. 27 CFR 40.112 - Change in address.

    Science.gov (United States)

    2010-04-01

    ... Location of Factory § 40.112 Change in address. Whenever any change occurs in the address, but not the location, of the factory of a manufacturer of tobacco products, as a result of action of local authorities, the manufacturer shall, within 30 days of such change, make application on Form 2098 for an amended...

  19. The 2012 NCTE Presidential Address: Literacy, Rhetoric, Education, Democracy

    Science.gov (United States)

    Gilyard, Keith

    2013-01-01

    This article presents the text of Keith Gilyard's presidential address, delivered at the National Council of Teachers of English (NCTE) Annual Convention in Las Vegas, Nevada, on November 18, 2012. In his address he proposes several core elements that he believes will instrumentally improve the education system in the United States: a rich…

  20. Opportunities and challenges of using technology to address health disparities.

    Science.gov (United States)

    Rivers, Brian M; Bernhardt, Jay M; Fleisher, Linda; Green, Bernard Lee

    2014-03-01

    During a panel presentation at the American Association for Cancer Research Cancer Health Disparities Conference titled 'Opportunities and challenges of using technology to address health disparities', the latest scientific advances in the application and utilization of mobile technology and/or mobile-health (mHealth) interventions to address cancer health disparities were discussed. The session included: an examination of overall population trends in the uptake of technology and the potential of addressing health disparities through such media; an exploration of the conceptual issues and challenges in the construction of mHealth interventions to address disparate and underserved populations; and a presentation of pilot study findings on the acceptability and feasibility of using mHealth interventions to address prostate cancer disparities among African-American men.