WorldWideScience

Sample records for network address lookup

  1. An Ad Hoc Adaptive Hashing Technique forNon-Uniformly Distributed IP Address Lookup in Computer Networks

    Directory of Open Access Journals (Sweden)

    Christopher Martinez

    2007-02-01

    Full Text Available Hashing algorithms long have been widely adopted to design a fast address look-up process which involves a search through a large database to find a record associated with a given key. Hashing algorithms involve transforming a key inside each target data to a hash value hoping that the hashing would render the database a uniform distribution with respect to this new hash value. The close the final distribution is to uniform, the less search time would be required when a query is made. When the database is already key-wise uniformly distributed, any regular hashing algorithm, such as bit-extraction, bit-group XOR, etc., would easily lead to a statistically perfect uniform distribution after the hashing. On the other hand, if records in the database are instead not uniformly distributed as in almost all known practical applications, then even different regular hash functions would lead to very different performance. When the target database has a key with a highly skewed distributed value, performance delivered by regular hashing algorithms usually becomes far from desirable. This paper aims at designing a hashing algorithm to achieve the highest probability in leading to a uniformly distributed hash result from a non-uniformly distributed database. An analytical pre-process on the original database is first performed to extract critical information that would significantly benefit the design of a better hashing algorithm. This process includes sorting on the bits of the key to prioritize the use of them in the XOR hashing sequence, or in simple bit extraction, or even a combination of both. Such an ad hoc hash design is critical to adapting to all real-time situations when there exists a changing (and/or expanding database with an irregular non-uniform distribution. Significant improvement from simulation results is obtained in randomly generated data as well as real data.

  2. A Pipelined IP Address Lookup Module for 100 Gbps Line Rates and beyond

    Science.gov (United States)

    Teuchert, Domenic; Hauger, Simon

    New Internet services and technologies call for higher packet switching capacities in the core network. Thus, a performance bottleneck arises at the backbone routers, as forwarding of Internet Protocol (IP) packets requires to search the most specific entry in a forwarding table that contains up to several hundred thousand address prefixes. The Tree Bitmap algorithm provides a well-balanced solution in respect of storage needs as well as of search and update complexity. In this paper, we present a pipelined lookup module based on this algorithm, which allows for an easy adaption to diverse protocol and hardware constraints. We determined the pipelining degree required to achieve the throughput for a 100 Gbps router line card by analyzing a representative sub-unit for various configured sizes. The module supports IPv4 and IPv6 configurations providing this throughput, as we determined the performance of our design to achieve a processing rate of 178 million packets per second.

  3. Integrated Optical Content Addressable Memories (CAM and Optical Random Access Memories (RAM for Ultra-Fast Address Look-Up Operations

    Directory of Open Access Journals (Sweden)

    Christos Vagionas

    2017-07-01

    Full Text Available Electronic Content Addressable Memories (CAM implement Address Look-Up (AL table functionalities of network routers; however, they typically operate in the MHz regime, turning AL into a critical network bottleneck. In this communication, we demonstrate the first steps towards developing optical CAM alternatives to enable a re-engineering of AL memories. Firstly, we report on the photonic integration of Semiconductor Optical Amplifier-Mach Zehnder Interferometer (SOA-MZI-based optical Flip-Flop and Random Access Memories on a monolithic InP platform, capable of storing the binary prefix-address data-bits and the outgoing port information for next hop routing, respectively. Subsequently the first optical Binary CAM cell (B-CAM is experimentally demonstrated, comprising an InP Flip-Flop and a SOA-MZI Exclusive OR (XOR gate for fast search operations through an XOR-based bit comparison, yielding an error-free 10 Gb/s operation. This is later extended via physical layer simulations in an optical Ternary-CAM (T-CAM cell and a 4-bit Matchline (ML configuration, supporting a third state of the “logical X” value towards wildcard bits of network subnet masks. The proposed functional CAM and Random Access Memories (RAM sub-circuits may facilitate light-based Address Look-Up tables supporting search operations at 10 Gb/s and beyond, paving the way towards minimizing the disparity with the frantic optical transmission linerates, and fast re-configurability through multiple simultaneous Wavelength Division Multiplexed (WDM memory access requests.

  4. Integrated data lookup and replication scheme in mobile ad hoc networks

    Science.gov (United States)

    Chen, Kai; Nahrstedt, Klara

    2001-11-01

    Accessing remote data is a challenging task in mobile ad hoc networks. Two problems have to be solved: (1) how to learn about available data in the network; and (2) how to access desired data even when the original copy of the data is unreachable. In this paper, we develop an integrated data lookup and replication scheme to solve these problems. In our scheme, a group of mobile nodes collectively host a set of data to improve data accessibility for all members of the group. They exchange data availability information by broadcasting advertising (ad) messages to the group using an adaptive sending rate policy. The ad messages are used by other nodes to derive a local data lookup table, and to reduce data redundancy within a connected group. Our data replication scheme predicts group partitioning based on each node's current location and movement patterns, and replicates data to other partitions before partitioning occurs. Our simulations show that data availability information can quickly propagate throughout the network, and that the successful data access ratio of each node is significantly improved.

  5. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  6. The 2005 CHF look-up table

    International Nuclear Information System (INIS)

    Groeneveld, D.C.; Vasic, A.Z.; Leung, L.K.H.; Durmayaz, A.; Shan, J.Q.; Yang, J.; Cheng, S.C.

    2005-01-01

    Full text of publication follows: CHF Look-up tables have been used widely for the prediction of the Critical Heat Flux (CHF) The CHF look-up table is basically a normalized data bank. The first CHF look-up table was constructed by Doroshchuk et al. (1975), using a limited database of 5 000 data points. This table, and all subsequent tables, contain normalized CHF values for a vertical 8 mm water-cooled tube for various pressures, mass fluxes and qualities. The CHF table development work has since been in progress at various institutions (e.g. CENG-Grenoble, University of Ottawa (UO), Ottawa, IPPE, Obninsk, and AECL, Chalk River) using an ever increasing data base. The 1995 CHF look-up table employs a data base containing about 30 000 CHF points and provides CHF values for an 8 mm ID, water-cooled tube, for 19 pressures, 20 mass fluxes, and 23 qualities. covering the full range of conditions of practical interest. The 2005 CHF LUT is an update to the 1995 LUT and addresses several concerns raised in the literature. The major improvements made are: - enhancement of the quality of the data base of the CHF look-up table (identify outliers, improve screening procedures); - increase in the data base by adding recently obtained data; - employment of greater subdivision of the look-up table by using smaller intervals in the independent parameters (pressure, mass flux and quality) at conditions where the variation in CHF is significant; - improvement of the smoothness of the CHF look-up table. This was done by the use of logarithmic functions for CHF, using optimum Spline functions etc. A discussion of the impact of these changes on the prediction accuracy and table smoothness is presented. It will be shown that the 2005 CHF look-up table is characterized by a significant improvement in accuracy and smoothness. [1] D. Groeneveld is the corresponding author. He is an Adjunct Professor at the University of Ottawa. (authors)

  7. An IPv6 routing lookup algorithm using weight-balanced tree based on prefix value for virtual router

    Science.gov (United States)

    Chen, Lingjiang; Zhou, Shuguang; Zhang, Qiaoduo; Li, Fenghua

    2016-10-01

    Virtual router enables the coexistence of different networks on the same physical facility and has lately attracted a great deal of attention from researchers. As the number of IPv6 addresses is rapidly increasing in virtual routers, designing an efficient IPv6 routing lookup algorithm is of great importance. In this paper, we present an IPv6 lookup algorithm called weight-balanced tree (WBT). WBT merges Forwarding Information Bases (FIBs) of virtual routers into one spanning tree, and compresses the space cost. WBT's average time complexity and the worst case time complexity of lookup and update process are both O(logN) and space complexity is O(cN) where N is the size of routing table and c is a constant. Experiments show that WBT helps reduce more than 80% Static Random Access Memory (SRAM) cost in comparison to those separation schemes. WBT also achieves the least average search depth comparing with other homogeneous algorithms.

  8. Laboratory Demographics Lookup Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This website provides demographic information about laboratories, including CLIA number, facility name and address, where the laboratory testing is performed, the...

  9. Research of future network with multi-layer IP address

    Science.gov (United States)

    Li, Guoling; Long, Zhaohua; Wei, Ziqiang

    2018-04-01

    The shortage of IP addresses and the scalability of routing systems [1] are challenges for the Internet. The idea of dividing existing IP addresses between identities and locations is one of the important research directions. This paper proposed a new decimal network architecture based on IPv9 [11], and decimal network IP address from E.164 principle of traditional telecommunication network, the IP address level, which helps to achieve separation and identification and location of IP address, IP address form a multilayer network structure, routing scalability problem in remission at the same time, to solve the problem of IPv4 address depletion. On the basis of IPv9, a new decimal network architecture is proposed, and the IP address of the decimal network draws on the E.164 principle of the traditional telecommunication network, and the IP addresses are hierarchically divided, which helps to realize the identification and location separation of IP addresses, the formation of multi-layer IP address network structure, while easing the scalability of the routing system to find a way out of IPv4 address exhausted. In addition to modifying DNS [10] simply and adding the function of digital domain, a DDNS [12] is formed. At the same time, a gateway device is added, that is, IPV9 gateway. The original backbone network and user network are unchanged.

  10. IP lookup with low memory requirement and fast update

    DEFF Research Database (Denmark)

    Berger, Michael Stübert

    2003-01-01

    The paper presents an IP address lookup algorithm with low memory requirement and fast updates. The scheme, which is denoted prefix-tree, uses a combination of a trie and a tree search, which is efficient in memory usage because the tree contains exactly one node for each prefix in the routing...

  11. Networking: Addressing Urban Students' Self-Esteem.

    Science.gov (United States)

    Tobias, Randolf; Turner, Thomas M.

    1997-01-01

    Describes Network in the Schools (NIS), a project to enhance teens' academic achievement and self-esteem, which uses small group classroom discussions regarding self-affirmation, social concerns, self-improvement, and reflection, and meetings for group sharing and self-expression. Presents findings that the program results in enhanced parent…

  12. Addressing therapeutic boundaries in social networking.

    Science.gov (United States)

    Ginory, Almari; Sabatier, Laura Mayol; Eth, Spencer

    2012-01-01

    Facebook is the leading social networking website, with over 500 million users. Prior studies have shown an increasing number of housestaff accessing the site. While Facebook can be used to foster camaraderie, it can also create difficulties in the doctor-patient relationship, especially when boundaries are crossed. This study explored the prevalence of such boundary crossings and offers recommendations for training. An anonymous voluntary survey regarding Facebook use was distributed to current psychiatry residents through the American Psychiatric Association (APA) listserv. Of the 182 respondents, 95.7% had current Facebook profiles, and 9.7% had received friend requests from patients. In addition, 18.7% admitted to viewing patient profiles on Facebook. There is a substantial utilization of Facebook among psychiatric residents as compared with prior studies. Specific guidance regarding social media websites and the potential for ethical difficulties should be offered to trainees. © 2012 Guilford Publications, Inc.

  13. IP Address Management Principles and Practice

    CERN Document Server

    Rooney, Timothy

    2010-01-01

    This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send a

  14. Name-Based Address Mapping for Virtual Private Networks

    Science.gov (United States)

    Surányi, Péter; Shinjo, Yasushi; Kato, Kazuhiko

    IPv4 private addresses are commonly used in local area networks (LANs). With the increasing popularity of virtual private networks (VPNs), it has become common that a user connects to multiple LANs at the same time. However, private address ranges for LANs frequently overlap. In such cases, existing systems do not allow the user to access the resources on all LANs at the same time. In this paper, we propose name-based address mapping for VPNs, a novel method that allows connecting to hosts through multiple VPNs at the same time, even when the address ranges of the VPNs overlap. In name-based address mapping, rather than using the IP addresses used on the LANs (the real addresses), we assign a unique virtual address to each remote host based on its domain name. The local host uses the virtual addresses to communicate with remote hosts. We have implemented name-based address mapping for layer 3 OpenVPN connections on Linux and measured its performance. The communication overhead of our system is less than 1.5% for throughput and less than 0.2ms for each name resolution.

  15. Tool Support for Software Lookup Table Optimization

    Directory of Open Access Journals (Sweden)

    Chris Wilcox

    2011-01-01

    Full Text Available A number of scientific applications are performance-limited by expressions that repeatedly call costly elementary functions. Lookup table (LUT optimization accelerates the evaluation of such functions by reusing previously computed results. LUT methods can speed up applications that tolerate an approximation of function results, thereby achieving a high level of fuzzy reuse. One problem with LUT optimization is the difficulty of controlling the tradeoff between performance and accuracy. The current practice of manual LUT optimization adds programming effort by requiring extensive experimentation to make this tradeoff, and such hand tuning can obfuscate algorithms. In this paper we describe a methodology and tool implementation to improve the application of software LUT optimization. Our Mesa tool implements source-to-source transformations for C or C++ code to automate the tedious and error-prone aspects of LUT generation such as domain profiling, error analysis, and code generation. We evaluate Mesa with five scientific applications. Our results show a performance improvement of 3.0× and 6.9× for two molecular biology algorithms, 1.4× for a molecular dynamics program, 2.1× to 2.8× for a neural network application, and 4.6× for a hydrology calculation. We find that Mesa enables LUT optimization with more control over accuracy and less effort than manual approaches.

  16. Duplicate Address Detection Table in IPv6 Mobile Networks

    Science.gov (United States)

    Alisherov, Farkhod; Kim, Taihoon

    In IP networks, each computer or communication equipment needs an IP address. To supply enough IP addresses, the new Internet protocol IPv6 is used in next generatoion mobile communication. Although IPv6 improves the existing IPv4 Internet protocol, Duplicate Address Detection (DAD) mechanism may consume resources and suffer from long delay. DAD is used to ensure whether the IP address is unique or not. When a mobile node performs an inter-domain handoff, it will first generate a new IP and perform a DAD procedure. The DAD procedure not only wastes time but also increases the signaling load on Internet. In this paper, the author proposes a new DAD mechanism to speed up the DAD procedure. A DAD table is created in access or mobility routers in IP networks and record all IP addresses of the area. When a new IP address needs to perform DAD, it can just search in the DAD table to confirm the uniqueness of the address.

  17. Addressing congestion on single allocation hub-and-spoke networks

    Directory of Open Access Journals (Sweden)

    Ricardo Saraiva de Camargo

    2012-12-01

    Full Text Available When considering hub-and-spoke networks with single allocation, the absence of alternative routes makes this kind of systems specially vulnerable to congestion effects. In order to improve the design of such networks, congestion costs must be addressed. This article deploys two different techniques for addressing congestion on single allocation hub-and-spoke networks: the Generalized Benders Decomposition and the Outer Approximation method. Both methods are able to solve large scale instances. Computational experiments show how the adoption of advanced solution strategies, such as Pareto-optimal cut generation on the Master Problem branch-and-bound tree, may be decisive. They also demonstrate that the solution effort is not only associated with the size of the instances, but also with their combination of the installation and congestion costs.

  18. CAN Tree Routing for Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao LI

    2014-01-01

    Full Text Available We propose a novel topology to improve the routing performance of Content- Addressable Network overlays while minimizing the maintenance overhead during nodes churn. The key idea of our approach is to establish a P2P tree structure (CAN tree by means of equipping each node with a few long links towards some distant nodes. The long links enhance routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is O(log n, which is much better than a uniform greedy routing, while each node maintains two long links in average.

  19. Addresses

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — Point features representing locations of all street addresses in Orange County, NC including Chapel Hill, NC. Data maintained by Orange County, the Town of Chapel...

  20. UnoHop: Efficient Distributed Hash Table with O(1 Lookup Performance

    Directory of Open Access Journals (Sweden)

    Herry Sitepu

    2008-05-01

    Full Text Available Distributed Hash Tables (DHTs with O(1 lookup performance strive to minimize the maintenance traffic which required for propagating membership changes information (events. These events distribution allows each node in the peer-to-peer network maintains accurate routing tables with complete membership information. We present UnoHop, a novel DHT protocol with O(1 lookup performance. The protocol uses an efficient mechanism to distribute events through a dissemination tree that constructed dynamically rooted at the node that detect the events. Our protocol produces symmetric bandwidth usage at all nodes while decreasing the events propagation delay.

  1. Parallel inverse halftoning by look-up table (LUT) partitioning

    International Nuclear Information System (INIS)

    Siddiqui, Umair F.; Sait, Sadiq M.

    2008-01-01

    The Look-Up Table (LUT) method for inverse halftoning is not only computation-less and fast but yields good results. The method employs a single LUT that is stored in a ROM and contains pre-computed contone (gray level) values for inverse halftone operation. This paper proposes an algorithm that can perform parallel inverse halftone operations by partitioning the single LUT into N smaller look-Up Tables (s- LUTs). Therefore, up to k (k<-N) pixels can be concurrently fetched from the halftone image and their contone values fetched concurrently from separate s- LUT. Obviously, this parallelization increases the speed of inverse halftoning by upto k times. In this proposed method, the total entries in all s- LUTs remain equal to the entries in the single LUT of the serial LUT method. Some degradation in image quality is also possible due to pixel loss during fetching. This is because some other contone value is being fetched from that s-LUT. The complete implementation of the algorithm requires two CPLDs (Complex Programmable Logic Devices) for the computational portion, external content addressable memories (CAM) and static RAMs to store s-LUTs. (author)

  2. The effect of DAD timeout period on address autoconfiguration in wireless ad-hoc networks

    CSIR Research Space (South Africa)

    Mutanga, MB

    2011-09-01

    Full Text Available Lack of manual management mechanisms in wireless ad-hoc networks means that automatic configuration of IP addresses and other related network parameters are very crucial. Many IP address autoconfiguration mechanisms have been proposed in literature...

  3. Implementation of a Network Address Translation Mechanism Over IPv6

    National Research Council Canada - National Science Library

    Baumgartner, Trevor

    2004-01-01

    ...; however, NAT provides several other benefits. NAT can be used to mask the internal IP addresses of an Intranet - IPv6, the emerging standard for Internet addressing, provides three times the number of bits for IP addressing...

  4. Medicare Physician and Other Supplier Look-up Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This look-up tool is a searchable database that allows you to look up a provider by National Provider Identifier (NPI), or by name and location. The look-up tool...

  5. Exploring social recommenders for teacher networks to address challenges of starting teachers

    NARCIS (Netherlands)

    Fazeli, Soude; Drachsler, Hendrik; Brouns, Francis; Sloep, Peter

    2012-01-01

    Fazeli, S., Drachsler, H., Brouns, F., & Sloep, P. B. (2012, 4 April). Exploring social recommenders for teacher networks to address challenges of starting teachers. Presentation at the Eighth International Conference on Networked Learning 2012, Maastricht, The Netherlands.

  6. Address Translation Problems in IMS Based Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Balazs Godor

    2006-01-01

    Full Text Available The development of packed based multimedia networks reached a turning point when the ITU-T and the ETSIhave incorporated the IMS to the NGN. With the fast development of mobile communication more and more services andcontent are available. In contrast with fix network telephony both the services and the devices are personalized in the “mobileworld”. Services, known from the Internet - like e-mail, chat, browsing, presence, etc. – are already available via mobiledevices as well. The IMS originally wanted to exploit both the benefits of mobile networks and the fancy services of theInternet. But today it is already more than that. IMS is the core of the next generation telecommunication networks and abasis for fix-mobile convergent services. The fact however that IMS was originally a “mobile” standard, where IPv6 was notoddity generated some problems for the fix networks, where IPv4 is used. In this article I give an overview of these problemsand mention some solutions as well.

  7. Addressing water incidents by using pipe network models

    CSIR Research Space (South Africa)

    Yoyo, Sonwabiso

    2016-05-01

    Full Text Available quantities like flow rate and pressure with water meters. Such an approach provides a highly exact and realistic understanding, but is potentially very expensive to implement. This is especially so in view of the large number water infrastructure networks...

  8. Address autoconfiguration in wireless ad hoc networks : Protocols and techniques

    NARCIS (Netherlands)

    Cempaka Wangi, N.I.; Prasad, R.V.; Jacobsson, M.; Niemegeers, I.

    2008-01-01

    With the advent of smaller devices having higher computational capacity and wireless communication capabilities, the world is becoming completely networked. Although, the mobile nature of these devices provides ubiquitous services, it also poses many challenges. In this article, we look in depth at

  9. A Cheap Linear Attention Mechanism with Fast Lookups and Fixed-Size Representations

    OpenAIRE

    de Brébisson, Alexandre; Vincent, Pascal

    2016-01-01

    The softmax content-based attention mechanism has proven to be very beneficial in many applications of recurrent neural networks. Nevertheless it suffers from two major computational limitations. First, its computations for an attention lookup scale linearly in the size of the attended sequence. Second, it does not encode the sequence into a fixed-size representation but instead requires to memorize all the hidden states. These two limitations restrict the use of the softmax attention mechani...

  10. A theoretical design for learning model addressing the networked society

    DEFF Research Database (Denmark)

    Levinsen, Karin; Nielsen, Janni; Sørensen, Birgitte Holm

    2010-01-01

    The transition from the industrial to the networked society produces contradictions that challenges the educational system and force it to adapt to new conditions. In a Danish virtual Master in Information and Communication Technologies and Learning (MIL) these contradictions appear as a field of...... which enables students to develop Networked Society competencies and maintain progression in the learning process also during the online periods. Additionally we suggest that our model contributes to the innovation of a networked society's design for learning....... is continuously decreasing. We teach for deep learning but are confronted by students' cost-benefit strategies when they navigate through the study programme under time pressure. To meet these challenges a Design for Learning Model has been developed. The aim is to provide a scaffold that ensures students......' acquisition of the subject matter within a time limit and at a learning quality that support their deep learning process during a subsequent period of on-line study work. In the process of moving from theory to application the model passes through three stages: 1) Conceptual modelling; 2) Orchestration, and 3...

  11. Addressing cancer disparities via community network mobilization and intersectoral partnerships: a social network analysis.

    Directory of Open Access Journals (Sweden)

    Shoba Ramanadhan

    Full Text Available Community mobilization and collaboration among diverse partners are vital components of the effort to reduce and eliminate cancer disparities in the United States. We studied the development and impact of intersectoral connections among the members of the Massachusetts Community Network for Cancer Education, Research, and Training (MassCONECT. As one of the Community Network Program sites funded by the National Cancer Institute, this infrastructure-building initiative utilized principles of Community-based Participatory Research (CBPR to unite community coalitions, researchers, policymakers, and other important stakeholders to address cancer disparities in three Massachusetts communities: Boston, Lawrence, and Worcester. We conducted a cross-sectional, sociometric network analysis four years after the network was formed. A total of 38 of 55 members participated in the study (69% response rate. Over four years of collaboration, the number of intersectoral connections reported by members (intersectoral out-degree increased, as did the extent to which such connections were reported reciprocally (intersectoral reciprocity. We assessed relationships between these markers of intersectoral collaboration and three intermediate outcomes in the effort to reduce and eliminate cancer disparities: delivery of community activities, policy engagement, and grants/publications. We found a positive and statistically significant relationship between intersectoral out-degree and community activities and policy engagement (the relationship was borderline significant for grants/publications. We found a positive and statistically significant relationship between intersectoral reciprocity and community activities and grants/publications (the relationship was borderline significant for policy engagement. The study suggests that intersectoral connections may be important drivers of diverse intermediate outcomes in the effort to reduce and eliminate cancer disparities

  12. Medicare Part D Prescriber Look-up Tool

    Data.gov (United States)

    U.S. Department of Health & Human Services — This look-up tool is a searchable database that allows you to look up a Medicare Part D prescriber by National Provider Identifier (NPI), or by name and location....

  13. Technical note: New table look-up lossless compression method ...

    African Journals Online (AJOL)

    Technical note: New table look-up lossless compression method based on binary index archiving. ... International Journal of Engineering, Science and Technology ... This paper intends to present a common use archiver, made up following the dictionary technique and using the index archiving method as a simple and ...

  14. Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge

    Science.gov (United States)

    2016-04-10

    Group Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge Bow-Nan Cheng, Greg Kuperman, Patricia Deutsch, Logan...been a large push in the U.S. Department of Defense to move to an all Internet Protocol (IP) infrastructure, particularly on the tactical edge . IP and...lossy links, and scaling to large numbers of users. Unfortunately, these are the exact conditions military tactical edge networks must operate within

  15. Software Defined Networking to support IP address mobility in future LTE network

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; van den Berg, Hans Leo; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    The existing LTE network architecture dose not scale well to increasing demands due to its highly centralized and hierarchical composition. In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture. Next, we develop two IP

  16. Exploring social recommenders for teacher networks to address challenges of starting teachers

    NARCIS (Netherlands)

    Fazeli, Soude; Brouns, Francis; Drachsler, Hendrik; Sloep, Peter

    2012-01-01

    Fazeli, S., Brouns, F., Drachsler, H., & Sloep, P. B. (2012). Exploring social recommenders for teacher networks to address challenges of starting teachers. In V. Hodgson, C. Jones, M. de Laat, D. McConnell, T. Ryberg, & P. Sloep (Eds.), Proceedings of the Eighth International Conference on

  17. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks: A fuzzy set Qualitative Comparative Analysis.

    Science.gov (United States)

    Peters, D T J M; Verweij, S; Grêaux, K; Stronks, K; Harting, J

    2017-12-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different policy instruments. However, such network diversity may increase network complexity and therefore hamper network performance. Network complexity may be reduced by network management and the provision of financial resources. This study examined whether network diversity - amidst the other conditions - is indeed needed to address environmental determinants of health behavior. We included 25 intersectoral policy networks in Dutch municipalities aimed at reducing overweight, smoking, and alcohol/drugs abuse. For our fuzzy set Qualitative Comparative Analysis we used data from three web-based surveys among (a) project leaders regarding network diversity and size (n = 38); (b) project leaders and project partners regarding management (n = 278); and (c) implementation professionals regarding types of environmental determinants addressed (n = 137). Data on budgets were retrieved from project application forms. Contrary to their intentions, most policy networks typically addressed personal determinants. If the environment was addressed too, it was mostly the social environment. To address environmental determinants of health behavior, network diversity (>50% of the actors are non-public health) was necessary in networks that were either small (policy networks in improving health behaviors by addressing a variety of environmental determinants. Copyright © 2017. Published by Elsevier Ltd.

  18. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Choi Jeonghee

    2008-01-01

    Full Text Available Abstract So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  19. An Efficient Addressing Scheme and Its Routing Algorithm for a Large-Scale Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yongwan Park

    2008-12-01

    Full Text Available So far, various addressing and routing algorithms have been extensively studied for wireless sensor networks (WSNs, but many of them were limited to cover less than hundreds of sensor nodes. It is largely due to stringent requirements for fully distributed coordination among sensor nodes, leading to the wasteful use of available address space. As there is a growing need for a large-scale WSN, it will be extremely challenging to support more than thousands of nodes, using existing standard bodies. Moreover, it is highly unlikely to change the existing standards, primarily due to backward compatibility issue. In response, we propose an elegant addressing scheme and its routing algorithm. While maintaining the existing address scheme, it tackles the wastage problem and achieves no additional memory storage during a routing. We also present an adaptive routing algorithm for location-aware applications, using our addressing scheme. Through a series of simulations, we prove that our approach can achieve two times lesser routing time than the existing standard in a ZigBee network.

  20. Multiple Lookup Table-Based AES Encryption Algorithm Implementation

    Science.gov (United States)

    Gong, Jin; Liu, Wenyi; Zhang, Huixin

    Anew AES (Advanced Encryption Standard) encryption algorithm implementation was proposed in this paper. It is based on five lookup tables, which are generated from S-box(the substitution table in AES). The obvious advantages are reducing the code-size, improving the implementation efficiency, and helping new learners to understand the AES encryption algorithm and GF(28) multiplication which are necessary to correctly implement AES[1]. This method can be applied on processors with word length 32 or above, FPGA and others. And correspondingly we can implement it by VHDL, Verilog, VB and other languages.

  1. Towards Terabit Carrier Ethernet and Energy Efficient Optical Transport Networks

    DEFF Research Database (Denmark)

    Rasmussen, Anders

    This thesis focuses on the challenges of scaling current network node technology to support connection speeds of 100Gbps and beyond. Out of the many exiting aspects of reaching this goal, the main scope of this thesis is to investigate packet processing (address lookup and scheduling), forward....... The more advanced schemes also require more complex calculations to process each bit. This thesis will investigate how both the standard OTN FEC as well as more advanced FEC schemes can be implemented for 100G and above operation. As the networks are expanded to run at increasingly higher speeds...... error correction and energy efficiency. Scheduling and address lookup are key functions and potential bottle necks in high speed network nodes, as the minimum packet/frame sizes in both the popular Ethernet protocol, as well as the Internet Protocol (IP) still remains constant (84B and 40B, respectively...

  2. Network-oriented modeling addressing complexity of cognitive, affective and social interactions

    CERN Document Server

    Treur, Jan

    2016-01-01

    This book presents a new approach that can be applied to complex, integrated individual and social human processes. It provides an alternative means of addressing complexity, better suited for its purpose than and effectively complementing traditional strategies involving isolation and separation assumptions. Network-oriented modeling allows high-level cognitive, affective and social models in the form of (cyclic) graphs to be constructed, which can be automatically transformed into executable simulation models. The modeling format used makes it easy to take into account theories and findings about complex cognitive and social processes, which often involve dynamics based on interrelating cycles. Accordingly, it makes it possible to address complex phenomena such as the integration of emotions within cognitive processes of all kinds, of internal simulations of the mental processes of others, and of social phenomena such as shared understandings and collective actions. A variety of sample models – including ...

  3. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the sub-systems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  4. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the subsystems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  5. Detection of Spoofed MAC Addresses in 802.11 Wireless Networks

    Science.gov (United States)

    Tao, Kai; Li, Jing; Sampalli, Srinivas

    Medium Access Control (MAC) address spoofing is considered as an important first step in a hacker's attempt to launch a variety of attacks on 802.11 wireless networks. Unfortunately, MAC address spoofing is hard to detect. Most current spoofing detection systems mainly use the sequence number (SN) tracking technique, which has drawbacks. Firstly, it may lead to an increase in the number of false positives. Secondly, such techniques cannot be used in systems with wireless cards that do not follow standard 802.11 sequence number patterns. Thirdly, attackers can forge sequence numbers, thereby causing the attacks to go undetected. We present a new architecture called WISE GUARD (Wireless Security Guard) for detection of MAC address spoofing on 802.11 wireless LANs. It integrates three detection techniques - SN tracking, Operating System (OS) fingerprinting & tracking and Received Signal Strength (RSS) fingerprinting & tracking. It also includes the fingerprinting of Access Point (AP) parameters as an extension to the OS fingerprinting for detection of AP address spoofing. We have implemented WISE GUARD on a test bed using off-the-shelf wireless devices and open source drivers. Experimental results show that the new design enhances the detection effectiveness and reduces the number of false positives in comparison with current approaches.

  6. Filling gaps in a large reserve network to address freshwater conservation needs.

    Science.gov (United States)

    Hermoso, Virgilio; Filipe, Ana Filipa; Segurado, Pedro; Beja, Pedro

    2015-09-15

    Freshwater ecosystems and biodiversity are among the most threatened at global scale, but efforts for their conservation have been mostly peripheral to terrestrial conservation. For example, Natura 2000, the world's largest network of protected areas, fails to cover adequately the distribution of rare and endangered aquatic species, and lacks of appropriate spatial design to make conservation for freshwater biodiversity effective. Here, we develop a framework to identify a complementary set of priority areas and enhance the conservation opportunities of Natura 2000 for freshwater biodiversity, using the Iberian Peninsula as a case study. We use a systematic planning approach to identify a minimum set of additional areas that would help i) adequately represent all freshwater fish, amphibians and aquatic reptiles at three different target levels, ii) account for key ecological processes derived from riverscape connectivity, and iii) minimize the impact of threats, both within protected areas and propagated from upstream unprotected areas. Addressing all these goals would need an increase in area between 7 and 46%, depending on the conservation target used and strength of connectivity required. These new priority areas correspond to subcatchments inhabited by endangered and range restricted species, as well as additional subcatchments required to improve connectivity among existing protected areas and to increase protection against upstream threats. Our study should help guide future revisions of the design of Natura 2000, while providing a framework to address deficiencies in reserve networks for adequately protecting freshwater biodiversity elsewhere. Copyright © 2015 Elsevier Ltd. All rights reserved.

  7. A Novel CAN Tree Coordinate Routing in Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao Li

    2014-09-01

    Full Text Available In this paper, we propose a novel approach to improve coordination routing while minimizing the maintenance overhead during nodes churn. It bases on “CAN Tree Routing for Content- Addressable Network” 1 which is a solution for peer-to-peer routing. We concentrated on coordinate routing in this paper. The key idea of our approach is a recursion process to calculate target zone code and search in CAN tree 1. Because the hops are via long links in CAN, it enhances routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is , which is much better than a uniform greedy routing, while each node maintains two long links in average.

  8. Generic and updatable XML value indices covering equality and range lookups

    NARCIS (Netherlands)

    E. Sidirourgos (Eleftherios); P.A. Boncz (Peter)

    2008-01-01

    htmlabstractWe describe a collection of indices for XML text, element, and attribute node values that (i) consume little storage, (ii) have low maintenance overhead, (iii) permit fast equi-lookup on string values, and (iv) support range-lookup on any XML typed value (e.g., double, dateTime). The

  9. Addressing practical challenges in utility optimization of mobile wireless sensor networks

    Science.gov (United States)

    Eswaran, Sharanya; Misra, Archan; La Porta, Thomas; Leung, Kin

    2008-04-01

    This paper examines the practical challenges in the application of the distributed network utility maximization (NUM) framework to the problem of resource allocation and sensor device adaptation in a mission-centric wireless sensor network (WSN) environment. By providing rich (multi-modal), real-time information about a variety of (often inaccessible or hostile) operating environments, sensors such as video, acoustic and short-aperture radar enhance the situational awareness of many battlefield missions. Prior work on the applicability of the NUM framework to mission-centric WSNs has focused on tackling the challenges introduced by i) the definition of an individual mission's utility as a collective function of multiple sensor flows and ii) the dissemination of an individual sensor's data via a multicast tree to multiple consuming missions. However, the practical application and performance of this framework is influenced by several parameters internal to the framework and also by implementation-specific decisions. This is made further complex due to mobile nodes. In this paper, we use discrete-event simulations to study the effects of these parameters on the performance of the protocol in terms of speed of convergence, packet loss, and signaling overhead thereby addressing the challenges posed by wireless interference and node mobility in ad-hoc battlefield scenarios. This study provides better understanding of the issues involved in the practical adaptation of the NUM framework. It also helps identify potential avenues of improvement within the framework and protocol.

  10. Addressing the Issue of Routing Unfairness in Opportunistic Backhaul Networks for Collecting Sensed Data

    Directory of Open Access Journals (Sweden)

    Tekenate E. Amah

    2017-12-01

    Full Text Available Widely deploying sensors in the environment and embedding them in physical objects is a crucial step towards realizing smart and sustainable cities. To cope with rising resource demands and limited budgets, opportunistic networks (OppNets offer a scalable backhaul option for collecting delay-tolerant data from sensors to gateways in order to enable efficient urban operations and services. While pervasive devices such as smartphones and tablets contribute significantly to the scalability of OppNets, closely following human movement patterns and social structure introduces network characteristics that pose routing challenges. Our study on the impact of these characteristics reveals that existing routing protocols subject a key set of devices to higher resource consumption, to which their users may respond by withdrawing participation. Unfortunately, existing solutions addressing this unfairness do not guarantee achievable throughput since they are not specifically designed for sensed data collection scenarios. Based on concepts derived from the study, we suggest design guidelines for adapting applicable routing protocols to sensed data collection scenarios. We also follow our design guidelines to propose the Fair Locality Aware Routing (FLARoute technique. Evaluating FLARoute within an existing routing protocol confirms improved fairness and throughput under conditions that compromise the performance of existing solutions.

  11. An addressable conducting network for autonomic structural health management of composite structures

    International Nuclear Information System (INIS)

    Takahashi, Kosuke; Park, Jong Se; Thomas Hahn, H

    2010-01-01

    The electrical resistance change method (ERCM) has long been an area of interest as an in-service health monitoring system. To apply the ERCM to existing structures, a new concept, the addressable conducting network (ACN), is proposed for autonomic structural health management of graphite/polymer composites. The ACN consists of two sets of conducting lines normal to each other, where one set resides on the top surface of the laminate and the other on the bottom surface. Damage can be detected by monitoring the resistance change 'through the laminate thickness' between two lines. By using a thermally mendable polymer as the matrix, the same conducting lines can be used to supply the electric current needed for resistive heating, thereby allowing the detected damage to be healed. As shown experimentally, the electrical resistance change method using an ACN distinguishes between laminates made of properly and improperly cured prepreg as well as revealing damage generated during three-point bending tests. Finite element analysis was performed to examine the feasibility of the ACN and indicated that the damage can be easily located from the spatial distribution of resistance changes and that the damaged area can be locally heated by supplying a large amount of current to selected conducting lines

  12. Developing a European research network to address unmet needs in anxiety disorders.

    Science.gov (United States)

    Baldwin, David S; Pallanti, Stefano; Zwanzger, Peter

    2013-12-01

    Anxiety disorders are common, typically have an early onset, run a chronic or relapsing course, cause substantial personal distress, impair social and occupational function, reduce quality of life, and impose a substantial economic burden: they are often comorbid with major depression, bipolar disorder, schizophrenia, substance misuse and physical illness, and are associated with increased risks of suicidal behaviour. As such, anxiety disorders should be regarded as a significant public health problem. However the causes of anxiety disorders remain largely unknown, which hinders accurate diagnosis, the prediction of prognosis, and the development of refined treatment approaches. In clinical practice, many patients with anxiety disorders do not present or are not recognised, the standard of care they receive is often sub-optimal, and the effectiveness of pharmacological and psychological treatment interventions in real-world clinical practice can be disappointing. The current substantial unmet public health, clinical and research needs in anxiety disorders could be addressed in part by developing independent collaborative European networks. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Addressing challenges for future strategic-level emergency management: reframing, networking, and capacity-building.

    Science.gov (United States)

    Bosomworth, Karyn; Owen, Christine; Curnin, Steven

    2017-04-01

    The mounting frequency and intensity of natural hazards, alongside growing interdependencies between social-technical and ecological systems, are placing increased pressure on emergency management. This is particularly true at the strategic level of emergency management, which involves planning for and managing non-routine, high-consequence events. Drawing on the literature, a survey, and interviews and workshops with Australia's senior emergency managers, this paper presents an analysis of five core challenges that these pressures are creating for strategic-level emergency management. It argues that emphasising 'emergency management' as a primary adaptation strategy is a retrograde step that ignores the importance of addressing socio-political drivers of vulnerabilities. Three key suggestions are presented that could assist the country's strategic-level emergency management in tackling these challenges: (i) reframe emergency management as a component of disaster risk reduction rather than them being one and the same; (ii) adopt a network governance approach; and (iii) further develop the capacities of strategic-level emergency managers. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  14. An addressable conducting network for autonomic structural health management of composite structures

    Science.gov (United States)

    Takahashi, Kosuke; Park, Jong Se; Hahn, H. Thomas

    2010-10-01

    The electrical resistance change method (ERCM) has long been an area of interest as an in-service health monitoring system. To apply the ERCM to existing structures, a new concept, the addressable conducting network (ACN), is proposed for autonomic structural health management of graphite/polymer composites. The ACN consists of two sets of conducting lines normal to each other, where one set resides on the top surface of the laminate and the other on the bottom surface. Damage can be detected by monitoring the resistance change 'through the laminate thickness' between two lines. By using a thermally mendable polymer as the matrix, the same conducting lines can be used to supply the electric current needed for resistive heating, thereby allowing the detected damage to be healed. As shown experimentally, the electrical resistance change method using an ACN distinguishes between laminates made of properly and improperly cured prepreg as well as revealing damage generated during three-point bending tests. Finite element analysis was performed to examine the feasibility of the ACN and indicated that the damage can be easily located from the spatial distribution of resistance changes and that the damaged area can be locally heated by supplying a large amount of current to selected conducting lines.

  15. SDN-enabled dynamic WDM networks to address routing information inaccuracy

    CSIR Research Space (South Africa)

    Ravhuanzwo, Lusani

    2016-11-01

    Full Text Available Large dynamic wavelength-division multiplexed (WDM) networks based on the distributed control mechanism are susceptible to routing information inaccuracies. Factors such as non-negligible propagation delays, infrequent network state updates...

  16. Addressing the Influence of Hidden State on Wireless Network Optimizations using Performance Maps

    DEFF Research Database (Denmark)

    Højgaard-Hansen, Kim; Madsen, Tatiana Kozlova; Schwefel, Hans-Peter

    2015-01-01

    be used to optimize the use of the wireless net- work by predicting future network performance and scheduling the net- work communication for certain applications on mobile devices. However, other important factors influence the performance of the wireless communication such as changes in the propagation...... environment and resource sharing. In this work we extend the framework of performance maps for wireless networks by introducing network state as an abstraction for all other factors than location that influence the performance. Since network state might not always be directly observable the framework......Performance of wireless connectivity for network client devices is location dependent. It has been shown that it can be beneficial to collect network performance metrics along with location information to generate maps of the location dependent network performance. These performance maps can...

  17. A look-up table for fully developed film-boiling heat transfer

    International Nuclear Information System (INIS)

    Groeneveld, D.C.; Leung, L.K.H.; Vasic, A.Z.; Guo, Y.J.; Cheng, S.C.

    2003-01-01

    An improved look-up table for film-boiling heat-transfer coefficients has been derived for steam-water flow inside vertical tubes. Compared to earlier versions of the look-up table, the following improvements were made: - The database has been expanded significantly. The present database contains 77,234 film-boiling data points obtained from 36 sources. - The upper limit of the thermodynamic quality range was increased from 1.2 to 2.0. The wider range was needed as non-equilibrium effects at low flows can extend well beyond the point where the thermodynamic quality equals unity. - The surface heat flux has been replaced by the surface temperature as an independent parameter. - The new look-up table is based only on fully developed film-boiling data. - The table entries at flow conditions for which no data are available is based on the best of five different film-boiling prediction methods. The new film-boiling look-up table predicts the database for fully developed film-boiling data with an overall rms error in heat-transfer coefficient of 10.56% and an average error of 1.71%. A comparison of the prediction accuracy of the look-up table with other leading film-boiling prediction methods shows that the look-up table results in a significant improvement in prediction accuracy

  18. GA(2)LEN (Global Allergy and Asthma European Network) addresses the allergy and asthma 'epidemic'

    NARCIS (Netherlands)

    Bousquet, J.; Burney, P. G.; Zuberbier, T.; Cauwenberge, P. V.; Akdis, C. A.; Bindslev-Jensen, C.; Bonini, S.; Fokkens, W. J.; Kauffmann, F.; Kowalski, M. L.; Lodrup-Carlsen, K.; Mullol, J.; Nizankowska-Mogilnicka, E.; Papadopoulos, N.; Toskala, E.; Wickman, M.; Anto, J.; Auvergne, N.; Bachert, C.; Bousquet, P. J.; Brunekreef, B.; Canonica, G. W.; Carlsen, K. H.; Gjomarkaj, M.; Haahtela, T.; Howarth, P.; Lenzen, G.; Lotvall, J.; Radon, K.; Ring, J.; Salapatas, M.; Schünemann, H. J.; Szczecklik, A.; Todo-Bom, A.; Valovirta, E.; von Mutius, E.; Zock, J. P.

    2009-01-01

    Allergic diseases represent a major health problem in Europe. They are increasing in prevalence, severity and costs. The Global Allergy and Asthma European Network (GA(2)LEN), a Sixth EU Framework Program for Research and Technological Development (FP6) Network of Excellence, was created in 2005 as

  19. Creative Coercion in Post-Katrina New Orleans: a Neighborhood Strategy to Address Conflict in Networks

    Directory of Open Access Journals (Sweden)

    Stephen Danley

    2015-03-01

    Full Text Available The study of relationships within networks has traditionally focused on concepts such as cooperation, collaboration and other forms of partnership (Brown & Keast 2003. The assumption has been that actors in a network have shared vision and are working together. This study tests that idea by using mixed methods and ethnography to examine 15 neighborhood associations in post-Katrina New Orleans, and 71 of their relationships within policy networks. Contrary to our typical understanding of networks, neighborhood associations engage not just in partnership, but also in power struggles. When excluded from policy networks, neighborhood associations use creative coercion to ensure their voice is heard. Facing a power deficit, these associations look for informal levers to assert themselves into policy negotiation. The result is creative and coercive measures, such as co-opting elections, bribery, blackmail and what one neighborhood activist calls ‘guerrilla warfare.’ These conflicts force a reconsideration of networks. Networks are not solely homes of collaborative action; they are also the location of sharp power struggles over priorities.

  20. Exploiting Rating Abstention Intervals for Addressing Concept Drift in Social Network Recommender Systems

    Directory of Open Access Journals (Sweden)

    Dionisis Margaris

    2018-04-01

    Full Text Available One of the major problems that social networks face is the continuous production of successful, user-targeted information in the form of recommendations, which are produced exploiting technology from the field of recommender systems. Recommender systems are based on information about users’ past behavior to formulate recommendations about their future actions. However, as time goes by, social network users may change preferences and likings: they may like different types of clothes, listen to different singers or even different genres of music and so on. This phenomenon has been termed as concept drift. In this paper: (1 we establish that when a social network user abstains from rating submission for a long time, it is a strong indication that concept drift has occurred and (2 we present a technique that exploits the abstention interval concept, to drop from the database ratings that do not reflect the current social network user’s interests, thus improving prediction quality.

  1. The film boiling look-up table: an improvement in predicting post-chf temperatures

    International Nuclear Information System (INIS)

    Groeneveld, D.C.; Leung, L.K.H.; Vasic, A.Z.; Guo, Y.J.; El Nakla, M.; Cheng, S.C.

    2002-01-01

    During the past 50 years more than 60 film boiling prediction methods have been proposed (Groeneveld and Leung, 2000). These prediction methods generally are applicable over limited ranges of flow conditions and do not provide reasonable predictions when extrapolated well outside the range of their respective database. Leung et al. (1996, 1997) and Kirillov et al. (1996) have proposed the use of a film-boiling look-up table as an alternative to the many models, equations and correlations for the inverted annular film boiling (IAFB) and the dispersed flow film-boiling (DFFB) regime. The film-boiling look-up table is a logical follow-up to the development of the successful CHF look-up table (Groeneveld et al., 1996). It is basically a normalized data bank of heat-transfer coefficients for discrete values of pressure, mass flux, quality and heat flux or surface-temperature. The look-up table proposed by Leung et al. (1996, 1997), and referred to as PDO-LW-96, was based on 14,687 data and predicted the surface temperature with an average error of 1.2% and an rms error of 6.73%. The heat-transfer coefficient was predicted with an average error of -4.93% and an rms error of 16.87%. Leung et al. clearly showed that the look-up table approach, as a general predictive tool for film-boiling heat transfer, was superior to the correlation or model approach. Error statistics were not provided for the look-up table proposed by Kirillov et al. (1996). This paper reviews the look-up table approach and describes improvements to the derivation of the film-boiling look-up table. These improvements include: (i) a larger data base, (ii) a wider range of thermodynamic qualities, (iii) use of the wall temperature instead of the heat flux as an independent parameter, (iv) employment of fully-developed film-boiling data only for the derivation of the look-up table, (v) a finer subdivision and thus more table entries, (vi) smoother table, and (vii) use of the best of five prediction methods

  2. IMPLEMENTASI NETWORK ADDRESS TRANSLATION (NAT MENGGUNAKAN KERIO CONTROL VERSI 7.4.1 DI PUSAT PENELITIAN BIOTEKNOLOGI – LIPI

    Directory of Open Access Journals (Sweden)

    Tutang Tutang

    2016-03-01

    Full Text Available Biotechnology Research Center as an institution engaged in the research, the need for data and updated information is an absolute thing. This requirement can be met one of them is the use of information technology either by using the internet. With the increasing number of Internet users in Biotechnology Research Center and order for all users who are members of the Local Area Network (LAN can utilize the internet needed a good network management. While, during the network management Indonesian Institute of Sciences (LIPI, under the supervision of the Joint Network Team (TGJ – LIPI only provide one local IP segment which is limited to only 250 users. While number of internet users in Biotechnology Research Center and more than that number will continue to grow. To overcome these problems, then the LAN network at the Research Center for Biotechnology service facility utilizes Network Address Translation (NAT contained in Kerio Control software version 7.4.1. The subject of this article is limited to the implementation and configuration of NAT using Kerio Control 7.4.1 version. From these results, we concluded that the implementation of NAT helps all users in the network LAN Biotechnology Research Center get Public IP, so that it can connect to the internet properly.

  3. To address surface reaction network complexity using scaling relations machine learning and DFT calculations

    International Nuclear Information System (INIS)

    Ulissi, Zachary W.; Medford, Andrew J.; Bligaard, Thomas; Nørskov, Jens K.

    2017-01-01

    Surface reaction networks involving hydrocarbons exhibit enormous complexity with thousands of species and reactions for all but the very simplest of chemistries. We present a framework for optimization under uncertainty for heterogeneous catalysis reaction networks using surrogate models that are trained on the fly. The surrogate model is constructed by teaching a Gaussian process adsorption energies based on group additivity fingerprints, combined with transition-state scaling relations and a simple classifier for determining the rate-limiting step. The surrogate model is iteratively used to predict the most important reaction step to be calculated explicitly with computationally demanding electronic structure theory. Applying these methods to the reaction of syngas on rhodium(111), we identify the most likely reaction mechanism. Lastly, propagating uncertainty throughout this process yields the likelihood that the final mechanism is complete given measurements on only a subset of the entire network and uncertainty in the underlying density functional theory calculations.

  4. Introducing the PEC Network: Mailing Addresses of the Peace Education Commission. Peace Education Miniprints No. 1.

    Science.gov (United States)

    Bjerstedt, Ake, Ed.

    The Peace Education Commission (PEC) was established to facilitate international cooperation among individuals interested in peace education and research related to the field. The major ambition of PEC is to serve as a useful network for transnational information and support in the peace education area. This document gives current mailing…

  5. Application of the Critical Heat Flux Look-Up Table to Large Diameter Tubes

    Directory of Open Access Journals (Sweden)

    M. El Nakla

    2013-01-01

    Full Text Available The critical heat flux look-up table was applied to a large diameter tube, namely 67 mm inside diameter tube, to predict the occurrence of the phenomenon for both vertical and horizontal uniformly heated tubes. Water was considered as coolant. For the vertical tube, a diameter correction factor was directly applied to the 1995 critical heat flux look-up table. To predict the occurrence of critical heat flux in horizontal tube, an extra correction factor to account for flow stratification was applied. Both derived tables were used to predict the effect of high heat flux and tube blockage on critical heat flux occurrence in boiler tubes. Moreover, the horizontal tube look-up table was used to predict the safety limits of the operation of boiler for 50% allowable heat flux.

  6. Vocal Imitation in Parrots Allows Addressing of Specific Individuals in a Dynamic Communication Network

    DEFF Research Database (Denmark)

    Balsby, T.J.S.; Momberg, J.V.; Dabelsteen, T.

    2012-01-01

    €“fronted conures live in fission-fusion flocks where they encounter many different individuals every day, and it is possible that their vocal imitation ability is a flexible means to address a specific individual within a flock. We tested this via playback to short-term captive wild conures. Test birds were placed...... together in pairs in outdoor aviaries to form simple flocks. To simulate imitation of a specific individual these pairs received playback of contact calls that primarily imitate one of the two birds. Overall, individuals that received simulated vocal imitations of its calls responded more frequently...... and faster than the other individual. This suggests that orange-fronted conures can use imitations of contact calls to address specific individuals of a flock. In the discussion we argue that the fission-fusion flock dynamics of many parrot species has been an important factor in evolving conures´ and other...

  7. Network of siren, public address and display system to preparedness and response for nuclear emergencies

    International Nuclear Information System (INIS)

    Joshi, G.H.; Padmanabhan, N.; Raman, N.; Pradeepkumar, K.S.; Sharma, D.N.; Abani, M.C.

    2003-01-01

    For an effective emergency response and implementation of counter measures, communication during a nuclear emergency is a very important aspect. The declaration of a nuclear emergency must be immediately conveyed to all those working in the plant and around the nuclear site. Besides this, the nature of emergency also needs to be conveyed unambiguously along with corresponding counter measures, such as stay in, evacuation or all clear signal for the relevant plants. This requirement has necessitated the need for a networked signaling system. Based on this requirement, a microcontroller based signaling and a telephone/wireless based communication and display system has been designed at Bhabha Atomic Research Centre. It is proposed to be used as a part of emergency preparedness and response programme at the nuclear facility sites. As per the design made for Bhabha Atomic Research Centre, Trombay site, each plant or area in the site is identified by a unique identification code. The main Site Emergency Control Centre/Emergency Response Centre at Mod. Labs. selectively calls the various plants and declares the nature of emergency to be followed In that plant/area through different siren signals along with display and announcement of instructions. This paper describes the details of the system that is designed for Bhabha Atomic Research Centre, Trombay site and proposed for other nuclear power plant sites. (author)

  8. Improving the dictionary lookup approach for disease normalization using enhanced dictionary and query expansion.

    Science.gov (United States)

    Jonnagaddala, Jitendra; Jue, Toni Rose; Chang, Nai-Wen; Dai, Hong-Jie

    2016-01-01

    The rapidly increasing biomedical literature calls for the need of an automatic approach in the recognition and normalization of disease mentions in order to increase the precision and effectivity of disease based information retrieval. A variety of methods have been proposed to deal with the problem of disease named entity recognition and normalization. Among all the proposed methods, conditional random fields (CRFs) and dictionary lookup method are widely used for named entity recognition and normalization respectively. We herein developed a CRF-based model to allow automated recognition of disease mentions, and studied the effect of various techniques in improving the normalization results based on the dictionary lookup approach. The dataset from the BioCreative V CDR track was used to report the performance of the developed normalization methods and compare with other existing dictionary lookup based normalization methods. The best configuration achieved an F-measure of 0.77 for the disease normalization, which outperformed the best dictionary lookup based baseline method studied in this work by an F-measure of 0.13.Database URL: https://github.com/TCRNBioinformatics/DiseaseExtract. © The Author(s) 2016. Published by Oxford University Press.

  9. Improving the dictionary lookup approach for disease normalization using enhanced dictionary and query expansion

    Science.gov (United States)

    Jonnagaddala, Jitendra; Jue, Toni Rose; Chang, Nai-Wen; Dai, Hong-Jie

    2016-01-01

    The rapidly increasing biomedical literature calls for the need of an automatic approach in the recognition and normalization of disease mentions in order to increase the precision and effectivity of disease based information retrieval. A variety of methods have been proposed to deal with the problem of disease named entity recognition and normalization. Among all the proposed methods, conditional random fields (CRFs) and dictionary lookup method are widely used for named entity recognition and normalization respectively. We herein developed a CRF-based model to allow automated recognition of disease mentions, and studied the effect of various techniques in improving the normalization results based on the dictionary lookup approach. The dataset from the BioCreative V CDR track was used to report the performance of the developed normalization methods and compare with other existing dictionary lookup based normalization methods. The best configuration achieved an F-measure of 0.77 for the disease normalization, which outperformed the best dictionary lookup based baseline method studied in this work by an F-measure of 0.13. Database URL: https://github.com/TCRNBioinformatics/DiseaseExtract PMID:27504009

  10. An Efficient Similarity Digests Database Lookup - A Logarithmic Divide & Conquer Approach

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n. This paper presents a concept to extend existing approximate matching algorithms, which reduces the lookup complexity from O(n to O(log(n. Our proposed approach is based on the well-known divide and conquer paradigm and builds a Bloom filter-based tree data structure in order to enable an efficient lookup of similarity digests. Further, it is demonstrated that the presented technique is highly scalable operating a trade-off between storage requirements and computational efficiency. We perform a theoretical assessment based on recently published results and reasonable magnitudes of input data, and show that the complexity reduction achieved by the proposed technique yields a 220-fold acceleration of look-up costs.

  11. Effect of menus on EFL learners' look-up processes | Tono | Lexikos

    African Journals Online (AJOL)

    This paper emphasizes the importance of empirical research on dictionary users and, in particular, investigates the effect of the so-called "menu" (a list of definitions at the beginning of a polysemous article) on the EFL (English as a Foreign Language) learners' dictionary look-up processes. The menu has been increasingly ...

  12. Generic and Updatable XML Value Indices Covering Equality and Range Lookups

    NARCIS (Netherlands)

    E. Sidirourgos (Eleftherios); P.A. Boncz (Peter)

    2009-01-01

    textabstractWe describe a collection of indices for XML text, element, and attribute node values that (i) consume little storage, (ii) have low maintenance overhead, (iii) permit fast equilookup on string values, and (iv) support range-lookup on any XML typed value (e.g., double, dateTime). The

  13. Optoelectronic switch matrix as a look-up table for residue arithmetic.

    Science.gov (United States)

    Macdonald, R I

    1987-10-01

    The use of optoelectronic matrix switches to perform look-up table functions in residue arithmetic processors is proposed. In this application, switchable detector arrays give the advantage of a greatly reduced requirement for optical sources by comparison with previous optoelectronic residue processors.

  14. OLS Dialog: An open-source front end to the Ontology Lookup Service

    Directory of Open Access Journals (Sweden)

    Eidhammer Ingvar

    2010-01-01

    Full Text Available Abstract Background With the growing amount of biomedical data available in public databases it has become increasingly important to annotate data in a consistent way in order to allow easy access to this rich source of information. Annotating the data using controlled vocabulary terms and ontologies makes it much easier to compare and analyze data from different sources. However, finding the correct controlled vocabulary terms can sometimes be a difficult task for the end user annotating these data. Results In order to facilitate the location of the correct term in the correct controlled vocabulary or ontology, the Ontology Lookup Service was created. However, using the Ontology Lookup Service as a web service is not always feasible, especially for researchers without bioinformatics support. We have therefore created a Java front end to the Ontology Lookup Service, called the OLS Dialog, which can be plugged into any application requiring the annotation of data using controlled vocabulary terms, making it possible to find and use controlled vocabulary terms without requiring any additional knowledge about web services or ontology formats. Conclusions As a user-friendly open source front end to the Ontology Lookup Service, the OLS Dialog makes it straightforward to include controlled vocabulary support in third-party tools, which ultimately makes the data even more valuable to the biomedical community.

  15. Addressing unknown constants and metabolic network behaviors through petascale computing: understanding H2 production in green algae

    International Nuclear Information System (INIS)

    Chang, Christopher; Alber, David; Graf, Peter; Kim, Kwiseon; Seibert, Michael

    2007-01-01

    The Genomics Revolution has resulted in a massive and growing quantity of whole-genome DNA sequences, which encode the metabolic catalysts necessary for life. However, gene annotations can rarely be complete, and measurement of the kinetic constants associated with the encoded enzymes can not possibly keep pace, necessitating the use of careful modeling to explore plausible network behaviors. Key challenges are (1) quantitatively formulating kinetic laws governing each transformation in a fixed model network; (2) characterizing the stable solution (if any) of the associated ordinary differential equations (ODEs); (3) fitting the latter to metabolomics data as it becomes available; and (4) optimizing a model output against the possible space of kinetic parameters, with respect to properties such as robustness of network response, or maximum consumption/production. This SciDAC-2 project addresses this large-scale uncertainty in the genome-scale metabolic network of the water-splitting, H 2 -producing green alga Chlamydomonas reinhardtii. Each metabolic transformation is formulated as an irreversible steady-state process, such that the vast literature on known enzyme mechanisms may be incorporated directly. To start, glycolysis, the tricarboxylic acid cycle, and basic fermentation pathways have been encoded in Systems Biology Markup Language (SBML) with careful annotation and consistency with the KEGG database, yielding a model with 3 compartments, 95 species, 38 reactions, and 109 kinetic constants. To study and optimize such models with a view toward larger models, we have developed a system which takes as input an SBML model, and automatically produces C code that when compiled and executed optimizes the model's kinetic parameters according to test criteria. We describe the system and present numerical results. Further development, including overlaying of a parallel multistart algorithm, will allow optimization of thousands of parameters on high-performance systems

  16. Addressing unknown constants and metabolic network behaviors through petascale computing: understanding H{sub 2} production in green algae

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Christopher; Alber, David; Graf, Peter; Kim, Kwiseon; Seibert, Michael [National Renewable Energy Laboratory (NREL), Golden, CO 80401 (United States)

    2007-07-15

    The Genomics Revolution has resulted in a massive and growing quantity of whole-genome DNA sequences, which encode the metabolic catalysts necessary for life. However, gene annotations can rarely be complete, and measurement of the kinetic constants associated with the encoded enzymes can not possibly keep pace, necessitating the use of careful modeling to explore plausible network behaviors. Key challenges are (1) quantitatively formulating kinetic laws governing each transformation in a fixed model network; (2) characterizing the stable solution (if any) of the associated ordinary differential equations (ODEs); (3) fitting the latter to metabolomics data as it becomes available; and (4) optimizing a model output against the possible space of kinetic parameters, with respect to properties such as robustness of network response, or maximum consumption/production. This SciDAC-2 project addresses this large-scale uncertainty in the genome-scale metabolic network of the water-splitting, H{sub 2}-producing green alga Chlamydomonas reinhardtii. Each metabolic transformation is formulated as an irreversible steady-state process, such that the vast literature on known enzyme mechanisms may be incorporated directly. To start, glycolysis, the tricarboxylic acid cycle, and basic fermentation pathways have been encoded in Systems Biology Markup Language (SBML) with careful annotation and consistency with the KEGG database, yielding a model with 3 compartments, 95 species, 38 reactions, and 109 kinetic constants. To study and optimize such models with a view toward larger models, we have developed a system which takes as input an SBML model, and automatically produces C code that when compiled and executed optimizes the model's kinetic parameters according to test criteria. We describe the system and present numerical results. Further development, including overlaying of a parallel multistart algorithm, will allow optimization of thousands of parameters on high

  17. An On-Chip Learning Neuromorphic Autoencoder With Current-Mode Transposable Memory Read and Virtual Lookup Table.

    Science.gov (United States)

    Cho, Hwasuk; Son, Hyunwoo; Seong, Kihwan; Kim, Byungsub; Park, Hong-June; Sim, Jae-Yoon

    2018-02-01

    This paper presents an IC implementation of on-chip learning neuromorphic autoencoder unit in a form of rate-based spiking neural network. With a current-mode signaling scheme embedded in a 500 × 500 6b SRAM-based memory, the proposed architecture achieves simultaneous processing of multiplications and accumulations. In addition, a transposable memory read for both forward and backward propagations and a virtual lookup table are also proposed to perform an unsupervised learning of restricted Boltzmann machine. The IC is fabricated using 28-nm CMOS process and is verified in a three-layer network of encoder-decoder pair for training and recovery of images with two-dimensional pixels. With a dataset of 50 digits, the IC shows a normalized root mean square error of 0.078. Measured energy efficiencies are 4.46 pJ per synaptic operation for inference and 19.26 pJ per synaptic weight update for learning, respectively. The learning performance is also estimated by simulations if the proposed hardware architecture is extended to apply to a batch training of 60 000 MNIST datasets.

  18. Intrinsic fluorescence of protein in turbid media using empirical relation based on Monte Carlo lookup table

    Science.gov (United States)

    Einstein, Gnanatheepam; Udayakumar, Kanniyappan; Aruna, Prakasarao; Ganesan, Singaravelu

    2017-03-01

    Fluorescence of Protein has been widely used in diagnostic oncology for characterizing cellular metabolism. However, the intensity of fluorescence emission is affected due to the absorbers and scatterers in tissue, which may lead to error in estimating exact protein content in tissue. Extraction of intrinsic fluorescence from measured fluorescence has been achieved by different methods. Among them, Monte Carlo based method yields the highest accuracy for extracting intrinsic fluorescence. In this work, we have attempted to generate a lookup table for Monte Carlo simulation of fluorescence emission by protein. Furthermore, we fitted the generated lookup table using an empirical relation. The empirical relation between measured and intrinsic fluorescence is validated using tissue phantom experiments. The proposed relation can be used for estimating intrinsic fluorescence of protein for real-time diagnostic applications and thereby improving the clinical interpretation of fluorescence spectroscopic data.

  19. Improved look-up table method of computer-generated holograms.

    Science.gov (United States)

    Wei, Hui; Gong, Guanghong; Li, Ni

    2016-11-10

    Heavy computation load and vast memory requirements are major bottlenecks of computer-generated holograms (CGHs), which are promising and challenging in three-dimensional displays. To solve these problems, an improved look-up table (LUT) method suitable for arbitrarily sampled object points is proposed and implemented on a graphics processing unit (GPU) whose reconstructed object quality is consistent with that of the coherent ray-trace (CRT) method. The concept of distance factor is defined, and the distance factors are pre-computed off-line and stored in a look-up table. The results show that while reconstruction quality close to that of the CRT method is obtained, the on-line computation time is dramatically reduced compared with the LUT method on the GPU and the memory usage is lower than that of the novel-LUT considerably. Optical experiments are carried out to validate the effectiveness of the proposed method.

  20. Water property lookup table (sanwat) for use with the two-phase computational code shaft

    International Nuclear Information System (INIS)

    Sherman, M.P.; Eaton, R.R.

    1980-10-01

    A lookup table for water thermodynamic and transport properties (SANWAT) has been constructed for use with the two-phase computational code, SHAFT. The table, which uses density and specific internal energy as independent variables, covers the liquid, two-phase, and vapor regions. The liquid properties of water are contained in a separate subtable in order to obtain high accuracy for this nearly incompressible region that is frequently encountered in studies of the characteristics of nuclear-waste repositories

  1. Generation of Look-Up Tables for Dynamic Job Shop Scheduling Decision Support Tool

    Science.gov (United States)

    Oktaviandri, Muchamad; Hassan, Adnan; Mohd Shaharoun, Awaluddin

    2016-02-01

    Majority of existing scheduling techniques are based on static demand and deterministic processing time, while most job shop scheduling problem are concerned with dynamic demand and stochastic processing time. As a consequence, the solutions obtained from the traditional scheduling technique are ineffective wherever changes occur to the system. Therefore, this research intends to develop a decision support tool (DST) based on promising artificial intelligent that is able to accommodate the dynamics that regularly occur in job shop scheduling problem. The DST was designed through three phases, i.e. (i) the look-up table generation, (ii) inverse model development and (iii) integration of DST components. This paper reports the generation of look-up tables for various scenarios as a part in development of the DST. A discrete event simulation model was used to compare the performance among SPT, EDD, FCFS, S/OPN and Slack rules; the best performances measures (mean flow time, mean tardiness and mean lateness) and the job order requirement (inter-arrival time, due dates tightness and setup time ratio) which were compiled into look-up tables. The well-known 6/6/J/Cmax Problem from Muth and Thompson (1963) was used as a case study. In the future, the performance measure of various scheduling scenarios and the job order requirement will be mapped using ANN inverse model.

  2. Learning Receptive Fields and Quality Lookups for Blind Quality Assessment of Stereoscopic Images.

    Science.gov (United States)

    Shao, Feng; Lin, Weisi; Wang, Shanshan; Jiang, Gangyi; Yu, Mei; Dai, Qionghai

    2016-03-01

    Blind quality assessment of 3D images encounters more new challenges than its 2D counterparts. In this paper, we propose a blind quality assessment for stereoscopic images by learning the characteristics of receptive fields (RFs) from perspective of dictionary learning, and constructing quality lookups to replace human opinion scores without performance loss. The important feature of the proposed method is that we do not need a large set of samples of distorted stereoscopic images and the corresponding human opinion scores to learn a regression model. To be more specific, in the training phase, we learn local RFs (LRFs) and global RFs (GRFs) from the reference and distorted stereoscopic images, respectively, and construct their corresponding local quality lookups (LQLs) and global quality lookups (GQLs). In the testing phase, blind quality pooling can be easily achieved by searching optimal GRF and LRF indexes from the learnt LQLs and GQLs, and the quality score is obtained by combining the LRF and GRF indexes together. Experimental results on three publicly 3D image quality assessment databases demonstrate that in comparison with the existing methods, the devised algorithm achieves high consistent alignment with subjective assessment.

  3. Enhancing continental-scale understanding of agriculture: Integrating the National Ecological Observatory Network (NEON) with existing research networks to address global change.

    Science.gov (United States)

    Kelly, G.

    2015-12-01

    Over the past decade, there has been a resurgence of interest in the sustainability of the world's food system and its contributions to feeding the world's population as well as to ensuring environmental sustainability of the planet. The elements of this grand challenge are by now well known. Analysis of agricultural sustainability is made more challenging by the fact that the local responses to these global drivers of change are extremely variable in space and time due to the biophysical and geopolitical heterogeneity across the United States, and the world. Utilizing research networks allows the scientific community to leverage existing knowledge, models and data to develop a framework for understanding the interplay between global change drivers, regional, and continental sustainability of US agriculture. For example, well-established instrumented and calibrated research networks will allow for the examination of the potential tradeoffs between: 1) crop production, 2) land use and carbon emissions and sequestration, 3) groundwater depletion, and 4) nitrogen dynamics. NEON represents a major investment in scientific infrastructure in support of ecological research at a continental scale and is intended to address multiple ecological grand challenges. NEON will collect data from automated sensors and sample organisms and ecological variables in 20 eco-climatic domains. We will provide examples of how NEON's full potential can be realized when these data are combined with long term experimental results and other sensor networks [e.g., Ameriflux, Fluxnet, the Long-term Ecological Research Program (LTER), the Long-term Agroecosystem Research Network (LTAR)], Critical Zone Observatory (CZO).

  4. NKS - The Nordic region's cooperative network for addressing challenges in nuclear safety and emergency preparedness

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, K.G. [NKS/Technical University of Denmark (Denmark); Andgren, K. [NKS/Vattenfall R and D (Sweden); Leino, K. [NKS/Fortum Power and Heat Oy (Finland); Magnusson, S. [NKS/Icelandic Radiation Safety Authority (Iceland); Physant, F. [NKS/FRIT, Roskilde (Denmark)

    2014-07-01

    Based on the foundation of a common cultural and historical heritage and a long tradition of collaboration, NKS aims to facilitate a common Nordic view on nuclear and radiation safety. A common understanding of rules, practice and measures, and national differences in this context, is here an essential requirement. Problems can generally be tackled quicker, more efficiently, more consistently and at a lower cost through collaboration, bearing in mind that key competencies are not equally distributed in the different Nordic countries. For instance common Nordic challenges emerge in relation to nuclear installations, where nuclear power plants are in operation in Finland and Sweden, and research reactors have been operated in Denmark, Finland, Norway and Sweden. There is an obvious benefit in exchanging ideas and technologies in relation to plant operation, and since a number of reactors in different Nordic countries are under decommissioning, a collaborative benefit can also be realised in that context. Sweden also has a nuclear fuel production plant, and its collaboration with other Nordic nuclear installations can also be beneficial. Further, a number of large radiological installations are projected in Nordic areas (e.g., the MAX-LAB/MAX IV synchrotron radiation source and the European spallation source ESS), where Nordic organisations are collaborating in addressing, e.g., potential environmental implications. On the emergency preparedness side, the Fukushima accident in March 2011 was a reminder that large accidents at nuclear installations can lead to widespread radioactive contamination in the environment. In order to respond to nuclear or radiological emergencies, should they affect Nordic populations, it is necessary to maintain an operational emergency preparedness. By continuously improving detection, response and decision aiding tools while maintaining an informal collaborative network between relevant stakeholders in the Nordic countries (including

  5. A Lookup-Table-Based Approach to Estimating Surface Solar Irradiance from Geostationary and Polar-Orbiting Satellite Data

    Directory of Open Access Journals (Sweden)

    Hailong Zhang

    2018-03-01

    Full Text Available Incoming surface solar irradiance (SSI is essential for calculating Earth’s surface radiation budget and is a key parameter for terrestrial ecological modeling and climate change research. Remote sensing images from geostationary and polar-orbiting satellites provide an opportunity for SSI estimation through directly retrieving atmospheric and land-surface parameters. This paper presents a new scheme for estimating SSI from the visible and infrared channels of geostationary meteorological and polar-orbiting satellite data. Aerosol optical thickness and cloud microphysical parameters were retrieved from Geostationary Operational Environmental Satellite (GOES system images by interpolating lookup tables of clear and cloudy skies, respectively. SSI was estimated using pre-calculated offline lookup tables with different atmospheric input data of clear and cloudy skies. The lookup tables were created via the comprehensive radiative transfer model, Santa Barbara Discrete Ordinate Radiative Transfer (SBDART, to balance computational efficiency and accuracy. The atmospheric attenuation effects considered in our approach were water vapor absorption and aerosol extinction for clear skies, while cloud parameters were the only atmospheric input for cloudy-sky SSI estimation. The approach was validated using one-year pyranometer measurements from seven stations in the SURFRAD (SURFace RADiation budget network. The results of the comparison for 2012 showed that the estimated SSI agreed with ground measurements with correlation coefficients of 0.94, 0.69, and 0.89 with a bias of 26.4 W/m2, −5.9 W/m2, and 14.9 W/m2 for clear-sky, cloudy-sky, and all-sky conditions, respectively. The overall root mean square error (RMSE of instantaneous SSI was 80.0 W/m2 (16.8%, 127.6 W/m2 (55.1%, and 99.5 W/m2 (25.5% for clear-sky, cloudy-sky (overcast sky and partly cloudy sky, and all-sky (clear-sky and cloudy-sky conditions, respectively. A comparison with other state

  6. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  7. A Cross Layer Solution to Address TCP Intra-flow Performance Degradation in Multihop Ad hoc Networks

    OpenAIRE

    Rakocevic, V.; Hamadani, E.

    2008-01-01

    Incorporating the concept of TCP end-to-end congestion control for wireless networks is one of the primary concerns in designing ad hoc networks since TCP was primarily designed and optimized based on the assumptions for wired networks. In this study, our interest lies on tackling the TCP instability and in particular intra-flow instability problem since due to the nature of applications in multihop ad hoc networks, connection instability or starvation even for a short period of time can have...

  8. A shower look-up table to trace the dynamics of meteoroid streams and their sources

    Science.gov (United States)

    Jenniskens, Petrus

    2018-04-01

    Meteor showers are caused by meteoroid streams from comets (and some primitive asteroids). They trace the comet population and its dynamical evolution, warn of dangerous long-period comets that can pass close to Earth's orbit, outline volumes of space with a higher satellite impact probability, and define how meteoroids evolve in the interplanetary medium. Ongoing meteoroid orbit surveys have mapped these showers in recent years, but the surveys are now running up against a more and more complicated scene. The IAU Working List of Meteor Showers has reached 956 entries to be investigated (per March 1, 2018). The picture is even more complicated with the discovery that radar-detected streams are often different, or differently distributed, than video-detected streams. Complicating matters even more, some meteor showers are active over many months, during which their radiant position gradually changes, which makes the use of mean orbits as a proxy for a meteoroid stream's identity meaningless. The dispersion of the stream in space and time is important to that identity and contains much information about its origin and dynamical evolution. To make sense of the meteor shower zoo, a Shower Look-Up Table was created that captures this dispersion. The Shower Look-Up Table has enabled the automated identification of showers in the ongoing CAMS video-based meteoroid orbit survey, results of which are presented now online in near-real time at http://cams.seti.org/FDL/. Visualization tools have been built that depict the streams in a planetarium setting. Examples will be presented that sample the range of meteoroid streams that this look-up table describes. Possibilities for further dynamical studies will be discussed.

  9. Image Coding Based on Address Vector Quantization.

    Science.gov (United States)

    Feng, Yushu

    Image coding is finding increased application in teleconferencing, archiving, and remote sensing. This thesis investigates the potential of Vector Quantization (VQ), a relatively new source coding technique, for compression of monochromatic and color images. Extensions of the Vector Quantization technique to the Address Vector Quantization method have been investigated. In Vector Quantization, the image data to be encoded are first processed to yield a set of vectors. A codeword from the codebook which best matches the input image vector is then selected. Compression is achieved by replacing the image vector with the index of the code-word which produced the best match, the index is sent to the channel. Reconstruction of the image is done by using a table lookup technique, where the label is simply used as an address for a table containing the representative vectors. A code-book of representative vectors (codewords) is generated using an iterative clustering algorithm such as K-means, or the generalized Lloyd algorithm. A review of different Vector Quantization techniques are given in chapter 1. Chapter 2 gives an overview of codebook design methods including the Kohonen neural network to design codebook. During the encoding process, the correlation of the address is considered and Address Vector Quantization is developed for color image and monochrome image coding. Address VQ which includes static and dynamic processes is introduced in chapter 3. In order to overcome the problems in Hierarchical VQ, Multi-layer Address Vector Quantization is proposed in chapter 4. This approach gives the same performance as that of the normal VQ scheme but the bit rate is about 1/2 to 1/3 as that of the normal VQ method. In chapter 5, a Dynamic Finite State VQ based on a probability transition matrix to select the best subcodebook to encode the image is developed. In chapter 6, a new adaptive vector quantization scheme, suitable for color video coding, called "A Self -Organizing

  10. Complexity attack resistant flow lookup achemes for IPv6: a measurement based comparison

    OpenAIRE

    Malone, David; Tobin, R. Joshua

    2008-01-01

    In this paper we look at the problem of choosing a good flow state lookup scheme for IPv6 firewalls. We want to choose a scheme which is fast when dealing with typical traffic, but whose performance will not degrade unnecessarily when subject to a complexity attack. We demonstrate the existing problem and, using captured traffic, assess a number of replacement schemes that are hash and tree based. Our aim is to improve FreeBSD’s ipfw firewall, and so finally we implement the most pro...

  11. The Ontology Lookup Service: more data and better tools for controlled vocabulary queries.

    Science.gov (United States)

    Côté, Richard G; Jones, Philip; Martens, Lennart; Apweiler, Rolf; Hermjakob, Henning

    2008-07-01

    The Ontology Lookup Service (OLS) (http://www.ebi.ac.uk/ols) provides interactive and programmatic interfaces to query, browse and navigate an ever increasing number of biomedical ontologies and controlled vocabularies. The volume of data available for querying has more than quadrupled since it went into production and OLS functionality has been integrated into several high-usage databases and data entry tools. Improvements have been made to both OLS query interfaces, based on user feedback and requirements, to improve usability and service interoperability and provide novel ways to perform queries.

  12. Expanding the National Drug Abuse Treatment Clinical Trials Network to address the management of substance use disorders in general medical settings

    Directory of Open Access Journals (Sweden)

    Tai B

    2014-07-01

    Full Text Available Betty Tai, Steven Sparenborg, Udi E Ghitza, David Liu Center for the Clinical Trials Network, National Institute on Drug Abuse, National Institutes of Health, Bethesda, Maryland, USA Abstract: The Patient Protection and Affordable Care Act (2010 and the Mental Health Parity and Addiction Equity Act (2008 expand substance use disorder (SUD care services in the USA into general medical settings. Care offered in these settings will engage substance-using patients in an integrated and patient-centered environment that addresses physical and mental health comorbidities and follows a chronic care model. This expansion of SUD services presents a great need for evidence-based practices useful in general medical settings, and reveals several research gaps to be addressed. The National Drug Abuse Treatment Clinical Trials Network of the National Institute on Drug Abuse can serve an important role in this endeavor. High-priority research gaps are highlighted in this commentary. A discussion follows on how the National Drug Abuse Treatment Clinical Trials Network can transform to address changing patterns in SUD care to efficiently generate evidence to guide SUD treatment practice within the context of recent US health care legislation. Keywords: Patient Protection and Affordable Care Act, National Drug Abuse Treatment Clinical Trials Network, substance use disorders, practice-based research network, electronic health records

  13. On the look-up tables for the critical heat flux in tubes (history and problems)

    International Nuclear Information System (INIS)

    Kirillov, P.L.; Smogalev, I.P.

    1995-01-01

    The complication of critical heat flux (CHF) problem for boiling in channels is caused by the large number of variable factors and the variety of two-phase flows. The existence of several hundreds of correlations for the prediction of CHF demonstrates the unsatisfactory state of this problem. The phenomenological CHF models can provide only the qualitative predictions of CHF primarily in annular-dispersed flow. The CHF look-up tables covered the results of numerous experiments received more recognition in the last 15 years. These tables are based on the statistical averaging of CHF values for each range of pressure, mass flux and quality. The CHF values for regions, where no experimental data is available, are obtained by extrapolation. The correction of these tables to account for the diameter effect is a complicated problem. There are ranges of conditions where the simple correlations cannot produce the reliable results. Therefore, diameter effect on CHF needs additional study. The modification of look-up table data for CHF in tubes to predict CHF in rod bundles must include a method which to take into account the nonuniformity of quality in a rod bundle cross section

  14. A region segmentation based algorithm for building a crystal position lookup table in a scintillation detector

    International Nuclear Information System (INIS)

    Wang Haipeng; Fan Xin; Yun Mingkai; Liu Shuangquan; Cao Xuexiang; Chai Pei; Shan Baoci

    2015-01-01

    In a scintillation detector, scintillation crystals are typically made into a 2-dimensional modular array. The location of incident gamma-ray needs be calibrated due to spatial response nonlinearity. Generally, position histograms-the characteristic flood response of scintillation detectors-are used for position calibration. In this paper, a position calibration method based on a crystal position lookup table which maps the inaccurate location calculated by Anger logic to the exact hitting crystal position has been proposed. Firstly, the position histogram is preprocessed, such as noise reduction and image enhancement. Then the processed position histogram is segmented into disconnected regions, and crystal marking points are labeled by finding the centroids of regions. Finally, crystal boundaries are determined and the crystal position lookup table is generated. The scheme is evaluated by the whole-body positron emission tomography (PET) scanner and breast dedicated single photon emission computed tomography scanner developed by the Institute of High Energy Physics, Chinese Academy of Sciences. The results demonstrate that the algorithm is accurate, efficient, robust and applicable to any configurations of scintillation detector. (authors)

  15. On the look-up tables for the critical heat flux in tubes (history and problems)

    Energy Technology Data Exchange (ETDEWEB)

    Kirillov, P.L.; Smogalev, I.P. [Institute of Physics and Power Engineering, Kaluga (Russian Federation)

    1995-09-01

    The complication of critical heat flux (CHF) problem for boiling in channels is caused by the large number of variable factors and the variety of two-phase flows. The existence of several hundreds of correlations for the prediction of CHF demonstrates the unsatisfactory state of this problem. The phenomenological CHF models can provide only the qualitative predictions of CHF primarily in annular-dispersed flow. The CHF look-up tables covered the results of numerous experiments received more recognition in the last 15 years. These tables are based on the statistical averaging of CHF values for each range of pressure, mass flux and quality. The CHF values for regions, where no experimental data is available, are obtained by extrapolation. The correction of these tables to account for the diameter effect is a complicated problem. There are ranges of conditions where the simple correlations cannot produce the reliable results. Therefore, diameter effect on CHF needs additional study. The modification of look-up table data for CHF in tubes to predict CHF in rod bundles must include a method which to take into account the nonuniformity of quality in a rod bundle cross section.

  16. Extending the Domain Name System (DNS) to Provide Geographical Addressing Towards Vehicular Ad-Hoc Networks (VANETs)

    NARCIS (Netherlands)

    Fioreze, Tiago; Heijenk, Geert

    2011-01-01

    Geographical addressing is a key communication paradigm in emerging Intelligent Transportation Systems (ITS). In this paper, we address the issue of how to direct messages to roadside units (RSUs) in order to have them forwarded by the RSUs to the on-board units (OBUs) of vehicles in a certain

  17. Moving from theory to practice: A participatory social network mapping approach to address unmet need for family planning in Benin.

    Science.gov (United States)

    Igras, Susan; Diakité, Mariam; Lundgren, Rebecka

    2017-07-01

    In West Africa, social factors influence whether couples with unmet need for family planning act on birth-spacing desires. Tékponon Jikuagou is testing a social network-based intervention to reduce social barriers by diffusing new ideas. Individuals and groups judged socially influential by their communities provide entrée to networks. A participatory social network mapping methodology was designed to identify these diffusion actors. Analysis of monitoring data, in-depth interviews, and evaluation reports assessed the methodology's acceptability to communities and staff and whether it produced valid, reliable data to identify influential individuals and groups who diffuse new ideas through their networks. Results indicated the methodology's acceptability. Communities were actively and equitably engaged. Staff appreciated its ability to yield timely, actionable information. The mapping methodology also provided valid and reliable information by enabling communities to identify highly connected and influential network actors. Consistent with social network theory, this methodology resulted in the selection of informal groups and individuals in both informal and formal positions. In-depth interview data suggest these actors were diffusing new ideas, further confirming their influence/connectivity. The participatory methodology generated insider knowledge of who has social influence, challenging commonly held assumptions. Collecting and displaying information fostered staff and community learning, laying groundwork for social change.

  18. A source-controlled data center network model.

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS.

  19. A source-controlled data center network model

    Science.gov (United States)

    Yu, Yang; Liang, Mangui; Wang, Zhe

    2017-01-01

    The construction of data center network by applying SDN technology has become a hot research topic. The SDN architecture has innovatively separated the control plane from the data plane which makes the network more software-oriented and agile. Moreover, it provides virtual multi-tenancy, effective scheduling resources and centralized control strategies to meet the demand for cloud computing data center. However, the explosion of network information is facing severe challenges for SDN controller. The flow storage and lookup mechanisms based on TCAM device have led to the restriction of scalability, high cost and energy consumption. In view of this, a source-controlled data center network (SCDCN) model is proposed herein. The SCDCN model applies a new type of source routing address named the vector address (VA) as the packet-switching label. The VA completely defines the communication path and the data forwarding process can be finished solely relying on VA. There are four advantages in the SCDCN architecture. 1) The model adopts hierarchical multi-controllers and abstracts large-scale data center network into some small network domains that has solved the restriction for the processing ability of single controller and reduced the computational complexity. 2) Vector switches (VS) developed in the core network no longer apply TCAM for table storage and lookup that has significantly cut down the cost and complexity for switches. Meanwhile, the problem of scalability can be solved effectively. 3) The SCDCN model simplifies the establishment process for new flows and there is no need to download flow tables to VS. The amount of control signaling consumed when establishing new flows can be significantly decreased. 4) We design the VS on the NetFPGA platform. The statistical results show that the hardware resource consumption in a VS is about 27% of that in an OFS. PMID:28328925

  20. An independent assessment of Groeneveld et al.'s 1995 CHF look-up table

    International Nuclear Information System (INIS)

    Baek, W.-P.; Kim, H.-C.; Heung Chang, S.

    1997-01-01

    The prediction capability of the 1995 CHF look-up table (Groeneveld D.C., et al., Nucl. Eng. Des. 163 (1996) 1-23) is independently assessed based on the KAIST data base consisting of 10822 data for uniformly-heated, vertical, round tubes. This confirms the error statistics for the heat balance method reported by Groeneveld et al. and shows overall average and RMS errors of 4.2 and 36.7%, respectively, for the direct substitution method. The new 1995 table shows better prediction capability than the 1986 AECL-UO table (Groeneveld et al., 1986), especially for the low-pressure, low-flow region. The error analysis indicates the length effect even for significantly long tubes. (orig.)

  1. A Table Lookup Method for Exact Analytical Solutions of Nonlinear Fractional Partial Differential Equations

    Directory of Open Access Journals (Sweden)

    Ji Juan-Juan

    2017-01-01

    Full Text Available A table lookup method for solving nonlinear fractional partial differential equations (fPDEs is proposed in this paper. Looking up the corresponding tables, we can quickly obtain the exact analytical solutions of fPDEs by using this method. To illustrate the validity of the method, we apply it to construct the exact analytical solutions of four nonlinear fPDEs, namely, the time fractional simplified MCH equation, the space-time fractional combined KdV-mKdV equation, the (2+1-dimensional time fractional Zoomeron equation, and the space-time fractional ZKBBM equation. As a result, many new types of exact analytical solutions are obtained including triangular periodic solution, hyperbolic function solution, singular solution, multiple solitary wave solution, and Jacobi elliptic function solution.

  2. The Ontology Lookup Service, a lightweight cross-platform tool for controlled vocabulary queries

    Directory of Open Access Journals (Sweden)

    Apweiler Rolf

    2006-02-01

    Full Text Available Abstract Background With the vast amounts of biomedical data being generated by high-throughput analysis methods, controlled vocabularies and ontologies are becoming increasingly important to annotate units of information for ease of search and retrieval. Each scientific community tends to create its own locally available ontology. The interfaces to query these ontologies tend to vary from group to group. We saw the need for a centralized location to perform controlled vocabulary queries that would offer both a lightweight web-accessible user interface as well as a consistent, unified SOAP interface for automated queries. Results The Ontology Lookup Service (OLS was created to integrate publicly available biomedical ontologies into a single database. All modified ontologies are updated daily. A list of currently loaded ontologies is available online. The database can be queried to obtain information on a single term or to browse a complete ontology using AJAX. Auto-completion provides a user-friendly search mechanism. An AJAX-based ontology viewer is available to browse a complete ontology or subsets of it. A programmatic interface is available to query the webservice using SOAP. The service is described by a WSDL descriptor file available online. A sample Java client to connect to the webservice using SOAP is available for download from SourceForge. All OLS source code is publicly available under the open source Apache Licence. Conclusion The OLS provides a user-friendly single entry point for publicly available ontologies in the Open Biomedical Ontology (OBO format. It can be accessed interactively or programmatically at http://www.ebi.ac.uk/ontology-lookup/.

  3. Membership Directory of the PEC Network: Mailing Addresses of the Peace Education Commission. Peace Education Miniprints No. 21.

    Science.gov (United States)

    Bjerstedt, Ake, Ed.

    The Peace Education Commission (PEC) was established to facilitate international cooperation among individuals interested in peace education and research related to peace education. The main ambition of PEC is to serve as a useful network for transnational information and support in the peace education area. This document provides current mailing…

  4. Implementation of a fast digital optical matrix-vector multiplier using a holographic look-up table and residue arithmetic

    Science.gov (United States)

    Habiby, Sarry F.; Collins, Stuart A., Jr.

    1987-01-01

    The design and implementation of a digital (numerical) optical matrix-vector multiplier are presented. A Hughes liquid crystal light valve, the residue arithmetic representation, and a holographic optical memory are used to construct position coded optical look-up tables. All operations are performed in effectively one light valve response time with a potential for a high information density.

  5. Experimental Evaluation of the IP Address Space Randomisation (IASR) Technique and Its Disruption to Selected Network Services

    Science.gov (United States)

    2014-11-01

    experiment has some similarities with that reported by Dunlop et al. [5]. In that work, the authors, who used IPv6 for their testing, experienced...M., Groat, S., Marchany, R., and Tront, J. (2011), Implementing an IPv6 moving target defense on a live network, In Moving Target Research Symposium...Tront, J. (2011), MT6D: A moving target IPv6 defense, In MILCOM 2011: Military Communications Conference, pp. 1321–1326. [14] Department of National

  6. Addressing climate and energy misconceptions - teaching tools offered by the Climate Literacy and Energy Awareness Network (CLEAN)

    Science.gov (United States)

    Gold, A. U.; Ledley, T. S.; Kirk, K. B.; Grogan, M.; McCaffrey, M. S.; Buhr, S. M.; Manduca, C. A.; Fox, S.; Niepold, F.; Howell, C.; Lynds, S. E.

    2011-12-01

    Despite a prevalence of peer-reviewed scientific research and high-level reports by intergovernmental agencies (e.g., IPCC) that document changes in our climate and consequences for human societies, the public discourse regards these topics as controversial and sensitive. The chasm between scientific-based understanding of climate systems and public understanding can most easily be addressed via high quality, science-based education on these topics. Well-trained and confident educators are required to provide this education. However, climate science and energy awareness are complex topics that are rapidly evolving and have a great potential for controversy. Furthermore, the interdisciplinary nature of climate science further increases the difficulty for teachers to stay abreast of the science and the policy. Research has shown that students and educators alike hold misconceptions about the climate system in general and the causes and effects of climate change in particular. The NSF-funded CLEAN Pathway (http://cleanet.org) as part of the National Science Digital Library (http://www.nsdl.org) strives to address these needs and help educators address misconceptions by providing high quality learning resources and professional development opportunities to support educators of grade levels 6 through 16. The materials focus on teaching climate science and energy use. The scope and framework of the CLEAN Pathway is defined by the Essential Principles of Climate Science (CCSP, 2009) and the Energy Literacy Principles recently developed by the Department of Energy. Following this literacy-based approach, CLEAN helps with developing mental models to address misconceptions around climate science and energy awareness through a number of different avenues. These are: 1) Professional development opportunities for educators - interactive webinars for secondary teachers and virtual workshops for college faculty, 2) A collection of scientifically and pedagogically reviewed, high

  7. Informing Environmental Water Management Decisions: Using Conditional Probability Networks to Address the Information Needs of Planning and Implementation Cycles

    Science.gov (United States)

    Horne, Avril C.; Szemis, Joanna M.; Webb, J. Angus; Kaur, Simranjit; Stewardson, Michael J.; Bond, Nick; Nathan, Rory

    2018-03-01

    One important aspect of adaptive management is the clear and transparent documentation of hypotheses, together with the use of predictive models (complete with any assumptions) to test those hypotheses. Documentation of such models can improve the ability to learn from management decisions and supports dialog between stakeholders. A key challenge is how best to represent the existing scientific knowledge to support decision-making. Such challenges are currently emerging in the field of environmental water management in Australia, where managers are required to prioritize the delivery of environmental water on an annual basis, using a transparent and evidence-based decision framework. We argue that the development of models of ecological responses to environmental water use needs to support both the planning and implementation cycles of adaptive management. Here we demonstrate an approach based on the use of Conditional Probability Networks to translate existing ecological knowledge into quantitative models that include temporal dynamics to support adaptive environmental flow management. It equally extends to other applications where knowledge is incomplete, but decisions must still be made.

  8. Informing Environmental Water Management Decisions: Using Conditional Probability Networks to Address the Information Needs of Planning and Implementation Cycles.

    Science.gov (United States)

    Horne, Avril C; Szemis, Joanna M; Webb, J Angus; Kaur, Simranjit; Stewardson, Michael J; Bond, Nick; Nathan, Rory

    2018-03-01

    One important aspect of adaptive management is the clear and transparent documentation of hypotheses, together with the use of predictive models (complete with any assumptions) to test those hypotheses. Documentation of such models can improve the ability to learn from management decisions and supports dialog between stakeholders. A key challenge is how best to represent the existing scientific knowledge to support decision-making. Such challenges are currently emerging in the field of environmental water management in Australia, where managers are required to prioritize the delivery of environmental water on an annual basis, using a transparent and evidence-based decision framework. We argue that the development of models of ecological responses to environmental water use needs to support both the planning and implementation cycles of adaptive management. Here we demonstrate an approach based on the use of Conditional Probability Networks to translate existing ecological knowledge into quantitative models that include temporal dynamics to support adaptive environmental flow management. It equally extends to other applications where knowledge is incomplete, but decisions must still be made.

  9. Understanding veterinary students' use of and attitudes toward the social networking site, Facebook, to assist in developing curricula to address online professionalism.

    Science.gov (United States)

    Coe, Jason B; Weijs, Cynthia A; Muise, Amy; Christofides, Emily; Desmarais, Serge

    2012-01-01

    Social media is an increasingly common form of communication, with Facebook being the preferred social-networking site among post-secondary students. Numerous studies suggest post-secondary students practice high self-disclosure on Facebook. Research evaluating veterinary students' use of social media found a notable proportion of student-posted content deemed inappropriate. Lack of discretion in posting content can have significant repercussions for aspiring veterinary professionals, their college of study, and the veterinary profession they represent. Veterinarians-in-training at three veterinary colleges across Canada were surveyed to explore their use of and attitude toward the social networking site, Facebook. Students were invited to complete an online survey with questions relating to their knowledge of privacy in relation to using Facebook, their views on the acceptability of posting certain types of information, and their level of professional accountability online. Linear regression modeling was used to further examine factors related to veterinary students' disclosure of personal information on Facebook. Need for popularity (pFacebook. Understanding veterinary students' use of and attitudes toward social media, such as Facebook, reveals a need, and provides a basis, for developing educational programs to address online professionalism. Educators and administrators at veterinary schools may use this information to assist in developing veterinary curricula that addresses the escalating issue of online professionalism.

  10. Design and optimization of color lookup tables on a simplex topology.

    Science.gov (United States)

    Monga, Vishal; Bala, Raja; Mo, Xuan

    2012-04-01

    An important computational problem in color imaging is the design of color transforms that map color between devices or from a device-dependent space (e.g., RGB/CMYK) to a device-independent space (e.g., CIELAB) and vice versa. Real-time processing constraints entail that such nonlinear color transforms be implemented using multidimensional lookup tables (LUTs). Furthermore, relatively sparse LUTs (with efficient interpolation) are employed in practice because of storage and memory constraints. This paper presents a principled design methodology rooted in constrained convex optimization to design color LUTs on a simplex topology. The use of n simplexes, i.e., simplexes in n dimensions, as opposed to traditional lattices, recently has been of great interest in color LUT design for simplex topologies that allow both more analytically tractable formulations and greater efficiency in the LUT. In this framework of n-simplex interpolation, our central contribution is to develop an elegant iterative algorithm that jointly optimizes the placement of nodes of the color LUT and the output values at those nodes to minimize interpolation error in an expected sense. This is in contrast to existing work, which exclusively designs either node locations or the output values. We also develop new analytical results for the problem of node location optimization, which reduces to constrained optimization of a large but sparse interpolation matrix in our framework. We evaluate our n -simplex color LUTs against the state-of-the-art lattice (e.g., International Color Consortium profiles) and simplex-based techniques for approximating two representative multidimensional color transforms that characterize a CMYK xerographic printer and an RGB scanner, respectively. The results show that color LUTs designed on simplexes offer very significant benefits over traditional lattice-based alternatives in improving color transform accuracy even with a much smaller number of nodes.

  11. Can Health 2.0 Address Critical Healthcare Challenges? Insights from the Case of How Online Social Networks Can Assist in Combatting the Obesity Epidemic

    Directory of Open Access Journals (Sweden)

    Janine Hacker

    2017-03-01

    Full Text Available One of the serious concerns in healthcare in this 21st century is obesity. While the causes of obesity are multifaceted, social networks have been identified as one of the most important dimensions of people's social environment that may influence the adoption of many behaviours, including health-promoting behaviours. In this article, we examine the possibility of harnessing the appeal of online social networks to address the obesity epidemic currently plaguing society. Specifically, a design science research methodology is adopted to design, implement and test the Health 2.0 application called “Calorie Cruncher”. The application is designed specifically to explore the influence of online social networks on individual’s health-related behaviour. In this regard, pilot data collected based on qualitative interviews indicate that online social networks may influence health-related behaviours in several ways. Firstly, they can influence people’s norms and value system that have an impact on their health-related behaviours. Secondly, social control and pressure of social connections may also shape health-related behaviours, and operate implicitly when people make food selection decisions. Thirdly, social relationships may provide emotional support. Our study has implications for research and practice. From a theoretical perspective, the article inductively identifies three factors that influence specific types of health outcomes in the context of obesity. From a practical perspective, the study underscores the benefits of adopting a design science methodology to design and implement a technology solution for a healthcare issue as well as the key role for online social media to assist with health and wellness management and maintenance.

  12. Convocation address.

    Science.gov (United States)

    Swaminathan, M S

    1998-07-01

    This address delivered to the 40th convocation of the International Institute for Population Sciences in India in 1998 opens by noting that a shortage of jobs for youth is India's most urgent problem but that the problems that attend the increasing numbers of elderly also require serious attention. The address then notes that the Earth's population is growing at an unsustainable rate while economic inequities among countries are increasing, so that, while intellectual property is becoming the most important asset in developed countries, nutritional anemia among pregnant women causes their offspring to be unable to achieve their full intellectual potential from birth. Next, the address uses a discussion of the 18th-century work on population of the Marquis de Condorcet and of Thomas Malthus to lead into a consideration of estimated increased needs of countries like India and China to import food grains in the near future. Next, the progress of demographic transition in Indian states is covered and applied to Mahbub ul Haq's measure of human deprivation developed for and applied to the region of the South Asian Association for Regional Cooperation (India, Pakistan, Bangladesh, Nepal, Sri Lanka, Bhutan, and the Maldives). The address continues by reiterating some of the major recommendations forwarded by a government of India committee charged in 1995 with drafting a national population policy. Finally, the address suggests specific actions that could be important components of the Hunger-Free India Programme and concludes that all success rests on the successful implementation of appropriate population policies.

  13. Opening Address

    African Journals Online (AJOL)

    1974-05-25

    May 25, 1974 ... This, in large measure, accounts for the wide range of differential diagnoses ... traffic. We have certainly advanced far from that phase to our present state. .... success on a well-established and efficient network of basic health services ... collection of information and data on a country's health situation and ...

  14. inaugral address

    African Journals Online (AJOL)

    While political reorientation and economic redress were of immediate concern, ... South African context, where widespread changes have been proposed for education at all ... education at school and other levels and needs to be addressed so as to ..... the major national curriculum intervention in environmental education.

  15. Opening address

    International Nuclear Information System (INIS)

    Ianko, L.

    1993-01-01

    This short talk was the opening remarks to the attendees at this conference, presented by the Scientific Secretary, IWG-LMNPP, of the IAEA. This meeting is an effort to aid research on problems related to the general area of nuclear plant aging and life management. In particular it addresses fracture properties of reactor materials and components, both as installed, and at end of service condition. A major concern is relating measurements made on laboratory samples to properties displayed by actual reactor components

  16. Convocation address.

    Science.gov (United States)

    Zakaria, R

    1996-07-01

    By means of this graduation address at the International Institute for Population Sciences (IIPS) in Bombay, the Chancellor of Urdu University voiced his concerns about overpopulation in India. During the speaker's tenure as Health Minister of Maharashtra, he implemented a sterilization incentive program that resulted in the state's having the best family planning (FP) statistics in India for almost 10 years. The incentive program, however, was misused by overenthusiastic officials in other states, with the result that the FP program was renamed the Family Welfare Programme. Population is growing in India because of improvements in health care, but the population education necessary to change fertility will require more time than the seriousness of the population problem allows. In the longterm, poverty and illiteracy must be addressed to control population. In the meanwhile, the graduate program at the IIPS should be expanded to include an undergraduate program, marriage age laws should be enforced, and misconceptions about religious objections to FP must be addressed. India can not afford to use the measures forwarded by developed countries to control population growth. India must integrate population control efforts with the provision of health care because if population continues to grow in the face of reduced infant mortality and longer life expectancy, future generations will be forced to live in a state of poverty and economic degradation.

  17. A 3D simulation look-up library for real-time airborne gamma-ray spectroscopy

    Science.gov (United States)

    Kulisek, Jonathan A.; Wittman, Richard S.; Miller, Erin A.; Kernan, Warnick J.; McCall, Jonathon D.; McConn, Ron J.; Schweppe, John E.; Seifert, Carolyn E.; Stave, Sean C.; Stewart, Trevor N.

    2018-01-01

    A three-dimensional look-up library consisting of simulated gamma-ray spectra was developed to leverage, in real-time, the abundance of data provided by a helicopter-mounted gamma-ray detection system consisting of 92 CsI-based radiation sensors and exhibiting a highly angular-dependent response. We have demonstrated how this library can be used to help effectively estimate the terrestrial gamma-ray background, develop simulated flight scenarios, and to localize radiological sources. Source localization accuracy was significantly improved, particularly for weak sources, by estimating the entire gamma-ray spectra while accounting for scattering in the air, and especially off the ground.

  18. A Low-Complexity and High-Performance 2D Look-Up Table for LDPC Hardware Implementation

    Science.gov (United States)

    Chen, Jung-Chieh; Yang, Po-Hui; Lain, Jenn-Kaie; Chung, Tzu-Wen

    In this paper, we propose a low-complexity, high-efficiency two-dimensional look-up table (2D LUT) for carrying out the sum-product algorithm in the decoding of low-density parity-check (LDPC) codes. Instead of employing adders for the core operation when updating check node messages, in the proposed scheme, the main term and correction factor of the core operation are successfully merged into a compact 2D LUT. Simulation results indicate that the proposed 2D LUT not only attains close-to-optimal bit error rate performance but also enjoys a low complexity advantage that is suitable for hardware implementation.

  19. Keynote address

    International Nuclear Information System (INIS)

    Herzog, R.

    1985-01-01

    This paper addresses various aspects of the bases underlying the nuclear third party liability regime, and also analyses the distinction between danger and risk and the manner in which damage caused by flood, mass unemployment (economic damage mainly) and certain diseases is dealt with in the absence of liability provisions similar to those applicable to nuclear incidents. It also is suggested that the State because of its duty under the Basic Law to ensure adequate energy supplies, should be co-responsible for liability questions along with the nuclear operator. (NEA) [fr

  20. Artificial Neural Networks for differential diagnosis of breast lesions in MR-Mammography: A systematic approach addressing the influence of network architecture on diagnostic performance using a large clinical database

    International Nuclear Information System (INIS)

    Dietzel, Matthias; Baltzer, Pascal A.T.; Dietzel, Andreas; Zoubi, Ramy; Gröschel, Tobias; Burmeister, Hartmut P.; Bogdan, Martin; Kaiser, Werner A.

    2012-01-01

    Rationale and objectives: Differential diagnosis of lesions in MR-Mammography (MRM) remains a complex task. The aim of this MRM study was to design and to test robustness of Artificial Neural Network architectures to predict malignancy using a large clinical database. Materials and methods: For this IRB-approved investigation standardized protocols and study design were applied (T1w-FLASH; 0.1 mmol/kgBW Gd-DTPA; T2w-TSE; histological verification after MRM). All lesions were evaluated by two experienced (>500 MRM) radiologists in consensus. In every lesion, 18 previously published descriptors were assessed and documented in the database. An Artificial Neural Network (ANN) was developed to process this database (The-MathWorks/Inc., feed-forward-architecture/resilient back-propagation-algorithm). All 18 descriptors were set as input variables, whereas histological results (malignant vs. benign) was defined as classification variable. Initially, the ANN was optimized in terms of “Training Epochs” (TE), “Hidden Layers” (HL), “Learning Rate” (LR) and “Neurons” (N). Robustness of the ANN was addressed by repeated evaluation cycles (n: 9) with receiver operating characteristics (ROC) analysis of the results applying 4-fold Cross Validation. The best network architecture was identified comparing the corresponding Area under the ROC curve (AUC). Results: Histopathology revealed 436 benign and 648 malignant lesions. Enhancing the level of complexity could not increase diagnostic accuracy of the network (P: n.s.). The optimized ANN architecture (TE: 20, HL: 1, N: 5, LR: 1.2) was accurate (mean-AUC 0.888; P: <0.001) and robust (CI: 0.885–0.892; range: 0.880–0.898). Conclusion: The optimized neural network showed robust performance and high diagnostic accuracy for prediction of malignancy on unknown data.

  1. Artificial Neural Networks for differential diagnosis of breast lesions in MR-Mammography: a systematic approach addressing the influence of network architecture on diagnostic performance using a large clinical database.

    Science.gov (United States)

    Dietzel, Matthias; Baltzer, Pascal A T; Dietzel, Andreas; Zoubi, Ramy; Gröschel, Tobias; Burmeister, Hartmut P; Bogdan, Martin; Kaiser, Werner A

    2012-07-01

    Differential diagnosis of lesions in MR-Mammography (MRM) remains a complex task. The aim of this MRM study was to design and to test robustness of Artificial Neural Network architectures to predict malignancy using a large clinical database. For this IRB-approved investigation standardized protocols and study design were applied (T1w-FLASH; 0.1 mmol/kgBW Gd-DTPA; T2w-TSE; histological verification after MRM). All lesions were evaluated by two experienced (>500 MRM) radiologists in consensus. In every lesion, 18 previously published descriptors were assessed and documented in the database. An Artificial Neural Network (ANN) was developed to process this database (The-MathWorks/Inc., feed-forward-architecture/resilient back-propagation-algorithm). All 18 descriptors were set as input variables, whereas histological results (malignant vs. benign) was defined as classification variable. Initially, the ANN was optimized in terms of "Training Epochs" (TE), "Hidden Layers" (HL), "Learning Rate" (LR) and "Neurons" (N). Robustness of the ANN was addressed by repeated evaluation cycles (n: 9) with receiver operating characteristics (ROC) analysis of the results applying 4-fold Cross Validation. The best network architecture was identified comparing the corresponding Area under the ROC curve (AUC). Histopathology revealed 436 benign and 648 malignant lesions. Enhancing the level of complexity could not increase diagnostic accuracy of the network (P: n.s.). The optimized ANN architecture (TE: 20, HL: 1, N: 5, LR: 1.2) was accurate (mean-AUC 0.888; P: <0.001) and robust (CI: 0.885-0.892; range: 0.880-0.898). The optimized neural network showed robust performance and high diagnostic accuracy for prediction of malignancy on unknown data. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  2. Keynote address

    International Nuclear Information System (INIS)

    Farlinger, W.

    1997-01-01

    In this second keynote address of the conference Mr. Farlinger, Chairman of Ontario Hydro, attempted to respond to some of the criticisms levelled at the Corporation in the course of the Macdonald Committee process. He appeared to be particularly vexed by the criticism of IPPSO, saying that in effect, they are' beating up on their only customer', at a time when Hydro is being pulled in several different directions, and was facing pressure from jurisdictional dispute with municipal utilities, (MEUs). Nevertheless, he agreed with the need for restructuring. He defended Hydro by saying that the Macdonald Report in fact represented a vindication of the position Ontario Hydro had taken, particularly on such issues as open competition, customer choice, rationalization of the distribution system, and termination of Hydro's monopoly position. At the same time, he objected to the Report's assertion that dismantling the generation system into smaller units would be in the best interest of the people of Ontario. He suggested that there would be several large US utility companies willing and able to fill the vacuum if there was no large company with its head office in Ontario to stake its claim to the provincial market

  3. Opening address

    International Nuclear Information System (INIS)

    Boening, K.

    2003-01-01

    The program of this 9th Meeting of the International Group on Research Reactors IGORR includes are quite a number of fascinating new research reactor projects in France, Germany, Russia, Canada, China, Thailand, and in Australia. In addition to the session about New Facilities there are interesting sessions on the Upgrades and on the Optimization of Operation and Utilization of existing research reactors, on Secondary Neutron Sources, on Neutron Scattering applications, and on the aspects of Safety, Licensing and Decommissioning. Two particular projects of new research reactors are mentioned specially: the TRR-II project in Taiwan, has unfortunately been terminated last year because of a change to anti-nuclear of the ruling parties in the government - and the new FRM-II in Munich, Germany, which will hopefully survive such a political change and receive its green light for nuclear start up in the very near future. The charter of IGORR and its objectives are part of this address: The International Group on Research Reactors IGORR was formed to facilitate the sharing of knowledge and experience among those institutions and individuals who are actively working to design, build, and promote new research reactors or to make significant upgrades to existing facilities. The main IGORR objectives are to promote contacts between its members, to identify and discuss problems of common interest, to distribute newsletters about once or twice every year and to organize meetings about once every one-and-a-half years

  4. Non-tables look-up search algorithm for efficient H.264/AVC context-based adaptive variable length coding decoding

    Science.gov (United States)

    Han, Yishi; Luo, Zhixiao; Wang, Jianhua; Min, Zhixuan; Qin, Xinyu; Sun, Yunlong

    2014-09-01

    In general, context-based adaptive variable length coding (CAVLC) decoding in H.264/AVC standard requires frequent access to the unstructured variable length coding tables (VLCTs) and significant memory accesses are consumed. Heavy memory accesses will cause high power consumption and time delays, which are serious problems for applications in portable multimedia devices. We propose a method for high-efficiency CAVLC decoding by using a program instead of all the VLCTs. The decoded codeword from VLCTs can be obtained without any table look-up and memory access. The experimental results show that the proposed algorithm achieves 100% memory access saving and 40% decoding time saving without degrading video quality. Additionally, the proposed algorithm shows a better performance compared with conventional CAVLC decoding, such as table look-up by sequential search, table look-up by binary search, Moon's method, and Kim's method.

  5. Opening Address

    Science.gov (United States)

    Yamada, T.

    2014-12-01

    Ladies and Gentlemen, it is my great honor and pleasure to present an opening address of the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3). On the behalf of the organizing committee, I certainly welcome all your visits to KGU Kannai Media Center belonging to Kanto Gakuin University, and stay in Yokohama. In particular, to whom come from abroad more than 17 countries, I would appreciate your participations after long long trips from your homeland to Yokohama. The first international workshop on "State of the Art in Nuclear Cluster Physics", called SOTANCP, was held in Strasbourg, France, in 2008, and the second one was held in Brussels, Belgium, in 2010. Then the third workshop is now held in Yokohama. In this period, we had the traditional 10th cluster conference in Debrecen, Hungary, in 2012. Thus we have the traditional cluster conference and SOTANCP, one after another, every two years. This obviously shows our field of nuclear cluster physics is very active and flourishing. It is for the first time in about 10 years to hold the international workshop on nuclear cluster physics in Japan, because the last cluster conference held in Japan was in Nara in 2003, about 10 years ago. The president in Nara conference was Prof. K. Ikeda, and the chairpersons were Prof. H. Horiuchi and Prof. I. Tanihata. I think, quite a lot of persons in this room had participated at the Nara conference. Since then, about ten years passed. So, this workshop has profound significance for our Japanese colleagues. The subjects of this workshop are to discuss "the state of the art in nuclear cluster physics" and also discuss the prospect of this field. In a couple of years, we saw significant progresses of this field both in theory and in experiment, which have brought better and new understandings on the clustering aspects in stable and unstable nuclei. I think, the concept of clustering has been more important than ever. This is true also in the

  6. Keynote address

    International Nuclear Information System (INIS)

    Davis, J.M.

    1991-01-01

    DOE biomass R ampersand D programs have the potential to provide America with both plentiful, clean-burning domestic transportation fuels and cost-competitive industrial and utility fuels, benefiting energy security in the United States. Biofuels developed under our programs will also help improve air quality, reduce greenhouse gases, reduce the large daily quantities of waste we produce, and revitalize rural America. These research motivations have been documented in the National Energy Strategy. DOE looks forward to expanding its biofuels research program and to forging a partnership with private sector for cost-shared commercialization of new fuels and vehicle technologies. Many alternative fuels (e.g., ethanol, methanol, compressed natural gas, propane, or electricity) are candidates for gaining market share. Indeed, there may be significant regional variation in the future fuel mix. Alcohol fuels from biomass, particularly ethanol, have the potential to make a major contribution. Currently, ethanol in the United States is almost entirely made from corn; and the limitations of that process are well known (e.g., costly feedstock, end product requiring subsidy to be competitive, use of fossil fuels in renewable feedstock production and processing, and potential adverse impact of corn ethanol production on the price of food). To address these concerns, the DOE biofuels program is pursuing an ambitious research program to develop the technologies needed to convert these crops into alternative transportation fuels, primarily cellulose-based ethanol and methanol. Program R ampersand D has reduced the estimated cost per gallon of cellulose-based ethanol from $3.60 in 1980 to the current $1.35, with a program goal of $0.60 by the year 2000. DOE is also investigating the thermochemical conversion of biomass to methanol. The program goal is to achieve commercial production of methanol (like ethanol) at the gasoline equivalent of $0.90 per gallon by the year 2000. 4 figs

  7. Stakeholders' expectations on connectivity research for water and land management addressed by a survey in the collaborative EU-COST Connecteur network

    Science.gov (United States)

    Smetanova, Anna; Paton, Eva N.; Keesstra, Saskia

    2016-04-01

    Transfer of knowledge across the science-society interface is essential for both, ethical and economic reasons, and inevitable for successful climate change adaptation and integrated management of sustainable, resilient landscapes. The transdisciplinary research of connectivity (which is the degree to which a system facilitates the movement of matter and energy through itself. It is an emergent property of the system state, Connecteur web resources,2015) has the potential to supply monitoring, modelling and management tools to land and water managers in order to reach these goals. The research of water and sediment connectivity has received significant and increasing scientific attention across the entire realm of the environmental disciplines, and the COST Action ES 1306 Connecteur facilitates the multi-sectorial collaboration in connectivity research at EU level. In order to appropriately address the transfer of the cutting edge research developments of the Connecteur network, the collaborative research project on stakeholders' perception of connectivity was conducted by the Working Group 5 "Transition of connectivity research towards sustainable land and water management". The questionnaire survey on stakeholder perception was conducted by volunteering scientist involved in the Connecteur network together from 19 European countries. Together 84 stakeholders from all mayor sectors in water and land management were asked about the main challenges of their work, their understanding of connectivity, the desired areas of cooperation with connectivity science, and the best tools for transferring knowledge. The results showed differences between different stakeholders groups in the way they percept and work with connectivity, as well as their requirement of knowledge transfers. While farmers, and (in lower extend) the agricultural administration officers articulated no, or little need for connectivity management, the majority of stakeholders involved in land and water

  8. Welcome Address

    Science.gov (United States)

    Kiku, H.

    2014-12-01

    Ladies and Gentlemen, It is an honor for me to present my welcome address in the 3rd International Workshop on "State of the Art in Nuclear Cluster Physics"(SOTANCP3), as the president of Kanto Gakuin University. Particularly to those from abroad more than 17 countries, I am very grateful for your participation after long long trips from your home to Yokohama. On the behalf of the Kanto Gakuin University, we certainly welcome your visit to our university and stay in Yokohama. First I would like to introduce Kanto Gakuin University briefly. Kanto Gakuin University, which is called KGU, traces its roots back to the Yokohama Baptist Seminary founded in 1884 in Yamate, Yokohama. The seminary's founder was Albert Arnold Bennett, alumnus of Brown University, who came to Japan from the United States to establish a theological seminary for cultivating and training Japanese missionaries. Now KGU is a major member of the Kanto Gakuin School Corporation, which is composed of two kindergartens, two primary schools, two junior high schools, two senior high schools as well as KGU. In this university, we have eight faculties with graduate school including Humanities, Economics, Law, Sciences and Engineering, Architecture and Environmental Design, Human and Environmental Studies, Nursing, and Law School. Over eleven thousands students are currently learning in our university. By the way, my major is the geotechnical engineering, and I belong to the faculty of Sciences and Engineering in my university. Prof. T. Yamada, here, is my colleague in the same faculty. I know that the nuclear physics is one of the most active academic fields in the world. In fact, about half of the participants, namely, more than 50 scientists, come from abroad in this conference. Moreover, I know that the nuclear physics is related to not only the other fundamental physics such as the elementary particle physics and astrophysics but also chemistry, medical sciences, medical cares, and radiation metrology

  9. A Memory-Based Programmable Logic Device Using Look-Up Table Cascade with Synchronous Static Random Access Memories

    Science.gov (United States)

    Nakamura, Kazuyuki; Sasao, Tsutomu; Matsuura, Munehiro; Tanaka, Katsumasa; Yoshizumi, Kenichi; Nakahara, Hiroki; Iguchi, Yukihiro

    2006-04-01

    A large-scale memory-technology-based programmable logic device (PLD) using a look-up table (LUT) cascade is developed in the 0.35-μm standard complementary metal oxide semiconductor (CMOS) logic process. Eight 64 K-bit synchronous SRAMs are connected to form an LUT cascade with a few additional circuits. The features of the LUT cascade include: 1) a flexible cascade connection structure, 2) multi phase pseudo asynchronous operations with synchronous static random access memory (SRAM) cores, and 3) LUT-bypass redundancy. This chip operates at 33 MHz in 8-LUT cascades at 122 mW. Benchmark results show that it achieves a comparable performance to field programmable gate array (FPGAs).

  10. Design of a magnetic-tunnel-junction-oriented nonvolatile lookup table circuit with write-operation-minimized data shifting

    Science.gov (United States)

    Suzuki, Daisuke; Hanyu, Takahiro

    2018-04-01

    A magnetic-tunnel-junction (MTJ)-oriented nonvolatile lookup table (LUT) circuit, in which a low-power data-shift function is performed by minimizing the number of write operations in MTJ devices is proposed. The permutation of the configuration memory cell for read/write access is performed as opposed to conventional direct data shifting to minimize the number of write operations, which results in significant write energy savings in the data-shift function. Moreover, the hardware cost of the proposed LUT circuit is small since the selector is shared between read access and write access. In fact, the power consumption in the data-shift function and the transistor count are reduced by 82 and 52%, respectively, compared with those in a conventional static random-access memory-based implementation using a 90 nm CMOS technology.

  11. An empirical correlation for the entrainment fraction at the onset of annular flow based on 2006 CHF look-up table

    Energy Technology Data Exchange (ETDEWEB)

    Jiao, Bo; Yang, Dongyu [Department of Mechanical Engineering, Rongcheng Campus, Harbin University of Science and Technology, Rongcheng 264300, Shandong (China); Gan, Zhihua, E-mail: gan_zhihua@zju.edu.cn [Institute of Refrigeration and Cryogenics, Zhejiang University, Hangzhou (China); Key Laboratory of Refrigeration and Cryogenic Technology of Zhejiang Province, Hangzhou (China); National Quality Inspection Center of Refrigeration Equipment (Henan), Minquan (China)

    2017-06-15

    Highlights: • A parallel look-up table for the entrainment fraction at annular point was developed. • A correlation was given based on the selected database from 2006 CHF look-up table. • Its reliability on the other conditions in the look-up table was discussed. - Abstract: The critical heat flux (CHF) of gas-liquid flow plays an important role in the safety of industrial equipment. At present, the liquid film dryout model is widely used for predicting CHF in gas-liquid annular flow. Most parameters in this model can be determined by some empirical correlations which are valid under different conditions. However, up to now, the entrainment fraction at the onset of annular flow is always assumed due to the lack of relevant experimental data. In this paper, the normalized data of the 2006 CHF look-up table (LUT) which has been adopted widely, especially in the nuclear industry, were used. Firstly, the empirical correlations, provided for the onset of annular flow and the limiting quality, were employed. In the valid pressure and mass flux range of these correlations, the selected database from LUT was confirmed. Secondly, the liquid film model was built. The entrainment fraction at the onset of annular flow was obtained when the calculated CHF by the model agreed with the corresponding value in LUT. A parallel look-up table for it was developed. Its correlation including the Weber and the liquid Reynolds number at outlet was proposed. The errors are mostly within ±30%. Finally, its reliability on the other conditions in LUT, which are beyond the valid range of the empirical correlations used for determining the database, was discussed. All the conditions whose errors are outside ±30% of the predictions by the provided correlation were marked in the tables.

  12. SU-F-T-406: Verification of Total Body Irradiation Commissioned MU Lookup Table Accuracy Using Treatment Planning System for Wide Range of Patient Sizes

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, D; Chi, P; Tailor, R; Aristophanous, M; Tung, S [UT MD Anderson Cancer Center, Houston, TX (United States)

    2016-06-15

    Purpose: To verify the accuracy of total body irradiation (TBI) measurement commissioning data using the treatment planning system (TPS) for a wide range of patient separations. Methods: Our institution conducts TBI treatments with an 18MV photon beam at 380cm extended SSD using an AP/PA technique. Currently, the monitor units (MU) per field for patient treatments are determined using a lookup table generated from TMR measurements in a water phantom (75 × 41 × 30.5 cm3). The dose prescribed to an umbilicus midline point at spine level is determined based on patient separation, dose/ field and dose rate/MU. One-dimensional heterogeneous dose calculations from Pinnacle TPS were validated with thermoluminescent dosimeters (TLD) placed in an average adult anthropomorphic phantom and also in-vivo on four patients with large separations. Subsequently, twelve patients with various separations (17–47cm) were retrospectively analyzed. Computed tomography (CT) scans were acquired in the left and right decubitus positions from vertex to knee. A treatment plan for each patient was generated. The ratio of the lookup table MU to the heterogeneous TPS MU was compared. Results: TLD Measurements in the anthropomorphic phantom and large TBI patients agreed with Pinnacle calculated dose within 2.8% and 2%, respectively. The heterogeneous calculation compared to the lookup table agreed within 8.1% (ratio range: 1.014–1.081). A trend of reduced accuracy was observed when patient separation increases. Conclusion: The TPS dose calculation accuracy was confirmed by TLD measurements, showing that Pinnacle can model the extended SSD dose without commissioning a special beam model for the extended SSD geometry. The difference between the lookup table and TPS calculation potentially comes from lack of scatter during commissioning when compared to extreme patient sizes. The observed trend suggests the need for development of a correction factor between the lookup table and TPS dose

  13. A Fuzzy Obstacle Avoidance Controller Using a Lookup-Table Sharing Method and Its Applications for Mobile Robots

    Directory of Open Access Journals (Sweden)

    Jinwook Kim

    2011-11-01

    Full Text Available A Lookup-Table (LUT based design enhances the processing speed of a fuzzy obstacle avoidance controller by reducing the operation time. Also, a LUT sharing method provides efficient ways of reducing the LUT memory size. In order to share the LUT which is used for a fuzzy obstacle avoidance controller, an idea of using a basis function is developed. As applications of the shared LUT-based fuzzy controller, a laser-sensor-based fuzzy controller and an ultrasonic-sensor-based fuzzy controller are introduced in this paper. This paper suggests a LUT sharing method that reduces the LUT buffer size without a significant degradation of the performance. The LUT sharing method makes the buffer size independent of the fuzzy system's complexity. A simulation using MSRDS (Microsoft Robotics Developer Studio is used to evaluate the proposed method. To investigate the performance of the controller, experiments are carried out using a Pioneer P3-DX with LabVIEW as an integration tool. Although the simulation and experiments show little difference between the fully valued LUT-based method and the LUT sharing method in terms of the operation time, the LUT sharing method reduces almost 95% of the full-valued LUT-based buffer size.

  14. Implementation of a digital optical matrix-vector multiplier using a holographic look-up table and residue arithmetic

    Science.gov (United States)

    Habiby, Sarry F.

    1987-01-01

    The design and implementation of a digital (numerical) optical matrix-vector multiplier are presented. The objective is to demonstrate the operation of an optical processor designed to minimize computation time in performing a practical computing application. This is done by using the large array of processing elements in a Hughes liquid crystal light valve, and relying on the residue arithmetic representation, a holographic optical memory, and position coded optical look-up tables. In the design, all operations are performed in effectively one light valve response time regardless of matrix size. The features of the design allowing fast computation include the residue arithmetic representation, the mapping approach to computation, and the holographic memory. In addition, other features of the work include a practical light valve configuration for efficient polarization control, a model for recording multiple exposures in silver halides with equal reconstruction efficiency, and using light from an optical fiber for a reference beam source in constructing the hologram. The design can be extended to implement larger matrix arrays without increasing computation time.

  15. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2007-01-01

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the

  16. Knowledge to serve the city: insights from an emerging knowledge-action network to address vulnerability and sustainability in San Juan, Puerto Rico

    Science.gov (United States)

    T.A. Munoz-Erickson; A.E. Lugo; E. Melendez-Ackerman; L.E. Santiago-Acevedo; J. Seguinot-Barbosa; P. Mendez-Lazaro

    2014-01-01

    This paper presents initial efforts to establish the San Juan Urban Long-Term Research Area Exploratory (ULTRA-Ex), a long-term program aimed at developing transdisciplinary social-ecological system (SES) research to address vulnerability and sustainability for the municipality of San Juan. Transdisciplinary approaches involve the collaborations between researchers,...

  17. Using social network methods to reach out-of-care or ART-nonadherent HIV+ injection drug users in Russia: addressing a gap in the treatment cascade.

    Science.gov (United States)

    Amirkhanian, Yuri; Kelly, Jeffrey; Kuznetsova, Anna; Meylakhs, Anastasia; Yakovlev, Alexey; Musatov, Vladimir; Chaika, Nikolay

    2014-01-01

    HIV treatment to reduce downstream HIV incidence and to decrease disease mortality and morbidity at a population level both require that hidden, out-of-care people living with HIV (PLH) in the community be reached and engaged to enter care. This research evaluated the feasibility of reaching out-of-care or non-adherent PLH through members of their social networks in St Petersburg, Russia. To recruit a social network sample of HIV-positive injection drug users, 16 HIV+ seeds were enrolled into the study through PLH-oriented websites and online forums using recruitment ads or approached in needle exchange sites. Interested persons called the study phone number and completed a brief eligibility interview. Seed inclusion criteria were HIV+ status, being 18 years or older, having ever injected drugs, and having not visited an HIV doctor in the past 6 months. Seeds provided blood specimens tested for HIV to confirm their self-reported status. Eligible seeds were enrolled, completed brief network elicitation interview, and were asked to invite their own HIV+ friends into the study. Incentives were provided as compensation for participants' time and additional smaller incentives were provided for inviting each HIV+ network member to also participate. The seed's PLH friends established the first ring of participants who, in turn were asked to invite their own PLH friends (second ring). All study participants completed assessment of psychosocial wellbeing and sexual and injection-related HIV risk behaviour. Blood samples were collected from all participants to confirm their HIV+ status. Through this chain referral process, the initial 16 seeds led to the enrolment of a total of 66 PLH from the community (mean=4 per initial seed), most of whom - like the seed - were not presently in HIV care or were ART non-adherent. Implementation of treatment cascade goals requires complementing conventional paths of identifying PLH with feasible and effective community-based approaches

  18. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  19. Energy, a networked Europe. Twelve proposals for a common energy infrastructure policy. Report addressed to Francois Hollande, President of the French Republic

    International Nuclear Information System (INIS)

    Derdevet, Michel

    2015-01-01

    The Europeans were the first to make the fight against climate change a large structural policy of this half-century. As pioneers, we therefore find ourselves in the front line in meeting the challenges that are technological, societal and economic that structure the energy transition. How these challenges can be met will depend on the choices made in each Member State, but what the solutions found will have in common is that they will have to fit into energy systems whose networks, covering millions of kilometres, already provide the architecture. Continuing to 'provide a system', thanks to the networks for delivering energy under the best conditions of effectiveness and cost, is thus an absolute imperative for the security of supply for Europeans, their quality of life and the competitiveness of their businesses and therefore their jobs. Europe is the area of the world that offers the best quality energy services; this advantage must be reinforced. However, the role required of Europe's energy networks is being profoundly reshaped in this context of energy transition, since their organisation must now: - Accompany decentralisation, the means of renewable energy production being dispersed in hundreds of thousands of sites over all the territories. This requires radically reorganising the networks, in particular the distribution networks, which were not originally designed for this renewable energy collecting function. - Managing complexity of a new kind due to the variability of certain renewable energies, but also the emergence of new uses, such as electric vehicles. - Ensuring solidarity between the States and regions, in a context where the technological uncertainties of the new sectors are added to the older ones of a geopolitical nature. - Continuing to ensure equal access to energy services, without the transition becoming a discriminating factor against those citizens who are economically the weakest. Pooling knowledge and thinking to adapt

  20. Introduction to IP address management

    CERN Document Server

    Rooney, Tim

    2010-01-01

    "The book begins with a basic overview of IP networking, followed by chapters describing each of the three core IPAM technologies: IPv4 and IPv6 addressing, DHCP, and DNS. The next three chapters describe IPAM management techniques and practice, followed by chapters on IPv4-IPv6 co-existence, security and the IPAM business case"--

  1. Geography Lookup 2017

    Data.gov (United States)

    Federal Communications Commission — Summary data of fixed broadband coverage by geographic area. License and Attribution: Broadband data from FCC Form 477, and data from the U.S. Census Bureau that are...

  2. Reclaiming unused IPv4 addresses

    CERN Multimedia

    IT Department

    2016-01-01

    As many people might know, the number of IPv4 addresses is limited and almost all have been allocated (see here and here for more information).   Although CERN has been allocated some 340,000 addresses, the way these are allocated across the site is not as efficient as we would like. As we face an increasing demand for IPv4 addresses with the growth in virtual machines, the IT Department’s Communication Systems Group will be reorganising address allocation during 2016 to make more efficient use of the IPv4 address ranges that have been allocated to CERN. We aim, wherever possible, to avoid giving out fixed IP addresses, and have all devices connected to the campus network obtain an address dynamically each time they connect. As a first stage, starting in February, IP addresses that have not been used for more than 9 months will be reclaimed. No information about the devices concerned will be deleted from LANDB, but a new IP address will have to be requested if they are ever reconnected to t...

  3. Searching in small-world networks

    International Nuclear Information System (INIS)

    Moura, Alessandro P.S. de; Motter, Adilson E.; Grebogi, Celso

    2003-01-01

    We study the average time it takes to find a desired node in the Watts-Strogatz family of networks. We consider the case when the look-up time can be neglected and when it is important, where the look-up time is the time needed to choose one among all the neighboring nodes of a node at each step in the search. We show that in both cases, the search time is minimum in the small-world regime, when an appropriate distance between the nodes is defined. Through an analytical model, we show that the search time scales as N 1/D(D+1) for small-world networks, where N is the number of nodes and D is the dimension of the underlying lattice. This model is shown to be in agreement with numerical simulations

  4. Control Of DC 30V/15A Power Supply Using AT89C Micro controller By Look-Up Table Method For Magnetization System Application

    International Nuclear Information System (INIS)

    Abdillah, Arieko; Hermanto, Lingga; Manaf, Azwar

    2003-01-01

    Experiment of Control System Dc current based on micro controller Atm el AT89C52 has been done. Micro controller controls the transistors that will be activate. These transistors will allow the DC current passed trough to produce a homogeneous of magnetic field. This system produce DC current from 1,8 A to 12 A that produce the magnetic field measures from 23 mT to 325 mT. All manner of data using look-up table method. Micro controller and power supply circuit were isolated by optocoupler. This system can be used as first prototypes of control system of magnetic field for magnetize purpose

  5. Allegheny County Addressing Landmarks

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  6. Allegheny County Address Points

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — This dataset contains address points which represent physical address locations assigned by the Allegheny County addressing authority. Data is updated by County...

  7. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    We propose an energy-efficient service discovery protocol for wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the communication

  8. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    We propose an energy-efficient service discovery protocol for wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the communication

  9. License Address List

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Address list generated from National Saltwater Angler Registry. Used in conjunction with an address-based sample as per survey design.

  10. Reach Address Database (RAD)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Reach Address Database (RAD) stores the reach address of each Water Program feature that has been linked to the underlying surface water features (streams,...

  11. Networking

    OpenAIRE

    Rauno Lindholm, Daniel; Boisen Devantier, Lykke; Nyborg, Karoline Lykke; Høgsbro, Andreas; Fries, de; Skovlund, Louise

    2016-01-01

    The purpose of this project was to examine what influencing factor that has had an impact on the presumed increasement of the use of networking among academics on the labour market and how it is expressed. On the basis of the influence from globalization on the labour market it can be concluded that the globalization has transformed the labour market into a market based on the organization of networks. In this new organization there is a greater emphasis on employees having social qualificati...

  12. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  13. Addressing Ozone Layer Depletion

    Science.gov (United States)

    Access information on EPA's efforts to address ozone layer depletion through regulations, collaborations with stakeholders, international treaties, partnerships with the private sector, and enforcement actions under Title VI of the Clean Air Act.

  14. Recurrent fuzzy neural network by using feedback error learning approaches for LFC in interconnected power system

    International Nuclear Information System (INIS)

    Sabahi, Kamel; Teshnehlab, Mohammad; Shoorhedeli, Mahdi Aliyari

    2009-01-01

    In this study, a new adaptive controller based on modified feedback error learning (FEL) approaches is proposed for load frequency control (LFC) problem. The FEL strategy consists of intelligent and conventional controllers in feedforward and feedback paths, respectively. In this strategy, a conventional feedback controller (CFC), i.e. proportional, integral and derivative (PID) controller, is essential to guarantee global asymptotic stability of the overall system; and an intelligent feedforward controller (INFC) is adopted to learn the inverse of the controlled system. Therefore, when the INFC learns the inverse of controlled system, the tracking of reference signal is done properly. Generally, the CFC is designed at nominal operating conditions of the system and, therefore, fails to provide the best control performance as well as global stability over a wide range of changes in the operating conditions of the system. So, in this study a supervised controller (SC), a lookup table based controller, is addressed for tuning of the CFC. During abrupt changes of the power system parameters, the SC adjusts the PID parameters according to these operating conditions. Moreover, for improving the performance of overall system, a recurrent fuzzy neural network (RFNN) is adopted in INFC instead of the conventional neural network, which was used in past studies. The proposed FEL controller has been compared with the conventional feedback error learning controller (CFEL) and the PID controller through some performance indices

  15. Addressing the nuclear misconception

    International Nuclear Information System (INIS)

    Taylor, J.J.

    1998-01-01

    There is a perception, fostered and encouraged by the anti-nuclear groups, that the nuclear industry generates large quantities of waste with no idea how to deal with it, that it is unsafe, uneconomic, and environmentally damaging. The task is to change these perceptions, by demonstrating that the industry is not a problem in itself, but in fact provides solutions to problems. This paper, while primarily concerned with waste, addresses all of these issues as each has a bearing on the perception of the industry and therefore must be considered when addressing the issue of waste. The paper concludes that evidence exists to support the industry view, but that the mission of the industry should be to change the perception of the industry, by influencing and working together with its stake holders to address their concerns, rather than merely presenting more and more facts. (author)

  16. Addressing Sexual Harassment

    Science.gov (United States)

    Young, Ellie L.; Ashbaker, Betty Y.

    2008-01-01

    This article discusses ways on how to address the problem of sexual harassment in schools. Sexual harassment--simply defined as any unwanted and unwelcome sexual behavior--is a sensitive topic. Merely providing students, parents, and staff members with information about the school's sexual harassment policy is insufficient; schools must take…

  17. Fast computation of hologram patterns of a 3D object using run-length encoding and novel look-up table methods.

    Science.gov (United States)

    Kim, Seung-Cheol; Kim, Eun-Soo

    2009-02-20

    In this paper we propose a new approach for fast generation of computer-generated holograms (CGHs) of a 3D object by using the run-length encoding (RLE) and the novel look-up table (N-LUT) methods. With the RLE method, spatially redundant data of a 3D object are extracted and regrouped into the N-point redundancy map according to the number of the adjacent object points having the same 3D value. Based on this redundancy map, N-point principle fringe patterns (PFPs) are newly calculated by using the 1-point PFP of the N-LUT, and the CGH pattern for the 3D object is generated with these N-point PFPs. In this approach, object points to be involved in calculation of the CGH pattern can be dramatically reduced and, as a result, an increase of computational speed can be obtained. Some experiments with a test 3D object are carried out and the results are compared to those of the conventional methods.

  18. Fingerprinting Software Defined Networks and Controllers

    Science.gov (United States)

    2015-03-01

    rps requests per second RTT Round-Trip Time SDN Software Defined Networking SOM Self-Organizing Map STP Spanning Tree Protocol TRW-CB Threshold Random...Protocol ( STP ) updates), in which case the frame will be “punted” from the forwarding lookup process and processed by the route processor [9]. The act of...environment 20 to accomplish the needs of B4. In addition to Google, the SDN market is expected to grow beyond $35 billion by April 2018 [31]. The rate

  19. Analyzing the Messages of the State of the Union Address

    Science.gov (United States)

    Kissling, Mark T.; Martell, Christopher C.

    2014-01-01

    In the era of smartphones and 24-hour news networks, the State of the Union address is a major event. All national media outlets--in print, on television, on the Internet--report on the address, some almost exclusively in the days leading up to and after the speech. In this article, considering their experiences teaching about the address, and…

  20. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar; Rashid, Abdul B M Harun Ur; Hussain, Muhammad Mustafa

    2010-01-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  1. A novel match-line selective charging scheme for high-speed, low-power and noise-tolerant content-addressable memory

    KAUST Repository

    Hasan, Muhammad Mubashwar

    2010-06-01

    Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line selective charging technique to increase speed and reduce the energy per bit per search while increasing the noise-tolerance. Simulation in TSMC 0.18 μm technology with 64×72 Ternary CAM shows the match-line energy reduction of 45% compared to the conventional currentsaving scheme with the reduction of minimum cycle time by 68% and the improvement of noise-tolerance by 96%.

  2. Metropolitan Area Look-Up

    Data.gov (United States)

    Department of Housing and Urban Development — This system provides the user with a facility to select a state and county combination to determine if the selected county is part of an Office of Management and...

  3. Reducing Lookups for Invariant Checking

    DEFF Research Database (Denmark)

    Thomsen, Jakob Grauenkjær; Clausen, Christian; Andersen, Kristoffer Just

    2013-01-01

    This paper helps reduce the cost of invariant checking in cases where access to data is expensive. Assume that a set of variables satisfy a given invariant and a request is received to update a subset of them. We reduce the set of variables to inspect, in order to verify that the invariant is still...

  4. Parallel Lookups in String Indexes

    DEFF Research Database (Denmark)

    Christiansen, Anders Roy; Farach-Colton, Martín

    2016-01-01

    Recently, the first PRAM algorithms were presented for looking up a pattern in a suffix tree. We improve the bounds, achieving optimal results.......Recently, the first PRAM algorithms were presented for looking up a pattern in a suffix tree. We improve the bounds, achieving optimal results....

  5. Counting addressing method: Command addressable element and extinguishing module

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2009-01-01

    Full Text Available The specific requirements that appear in addressable fire detection and alarm systems and the shortcomings of the existing addressing methods were discussed. A new method of addressing of detectors was proposed. The basic principles of addressing and responding of a called element are stated. Extinguishing module is specific subsystem in classic fire detection and alarm systems. Appearing of addressable fire detection and alarm systems didn't caused essential change in the concept of extinguishing module because of long calling period of such systems. Addressable fire security system based on counting addressing method reaches high calling rates and enables integrating of the extinguishing module in addressable system. Solutions for command addressable element and integrated extinguishing module are given in this paper. The counting addressing method was developed for specific requirements in fire detection and alarm systems, yet its speed and reliability justifies its use in the acquisition of data on slowly variable parameters under industrial conditions. .

  6. EDA-EMERGE : An FP7 initial training network to equip the next generation of young scientists with the skills to address the complexity of environmental contamination with emerging pollutants

    NARCIS (Netherlands)

    Brack, Werner; Govender, Selvan; Schulze, Tobias; Krauss, Martin; Hu, Meng; Muz, Melis; Hollender, Juliane; Schirmer, Kristin; Schollee, Jennifer; Hidasi, Anita; Slobodnik, Jaroslav; Rabova, Zuzana; Ait-Aissa, Selim; Sonavane, Manoj; Carere, Mario; Lamoree, Marja; Leonards, Pim; Tufi, Sara; Ouyang, Xiyu; Schriks, Merijn; Thomas, Kevin; De Almeida, Ana Catarina; Froment, Jean; Hammers-Wirtz, Monika; Ahel, Marijan; Koprivica, Sanja; Hollert, Henner; Seiler, Thomas Benjamin; Di Paolo, Carolina; Tindall, Andrew; Spirhanzlova, Petra

    2013-01-01

    The initial training network consortium novel tools in effect-directed analysis to support the identification and monitoring of emerging toxicants on a European scale (EDA-EMERGE) was formed in response to the seventh EU framework program call to train a new generation of young scientists (13 PhD

  7. Quantitative analysis of the z-spectrum using a numerically simulated look-up table: Application to the healthy human brain at 7T.

    Science.gov (United States)

    Geades, Nicolas; Hunt, Benjamin A E; Shah, Simon M; Peters, Andrew; Mougin, Olivier E; Gowland, Penny A

    2017-08-01

    To develop a method that fits a multipool model to z-spectra acquired from non-steady state sequences, taking into account the effects of variations in T1 or B1 amplitude and the results estimating the parameters for a four-pool model to describe the z-spectrum from the healthy brain. We compared measured spectra with a look-up table (LUT) of possible spectra and investigated the potential advantages of simultaneously considering spectra acquired at different saturation powers (coupled spectra) to provide sensitivity to a range of different physicochemical phenomena. The LUT method provided reproducible results in healthy controls. The average values of the macromolecular pool sizes measured in white matter (WM) and gray matter (GM) of 10 healthy volunteers were 8.9% ± 0.3% (intersubject standard deviation) and 4.4% ± 0.4%, respectively, whereas the average nuclear Overhauser effect pool sizes in WM and GM were 5% ± 0.1% and 3% ± 0.1%, respectively, and average amide proton transfer pool sizes in WM and GM were 0.21% ± 0.03% and 0.20% ± 0.02%, respectively. The proposed method demonstrated increased robustness when compared with existing methods (such as Lorentzian fitting and asymmetry analysis) while yielding fully quantitative results. The method can be adjusted to measure other parameters relevant to the z-spectrum. Magn Reson Med 78:645-655, 2017. © 2016 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. © 2016 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine.

  8. Estimating effective particle size of tropical deep convective clouds with a look-up table method using satellite measurements of brightness temperature differences

    Science.gov (United States)

    Hong, Gang; Minnis, Patrick; Doelling, David; Ayers, J. Kirk; Sun-Mack, Szedung

    2012-03-01

    A method for estimating effective ice particle radius Re at the tops of tropical deep convective clouds (DCC) is developed on the basis of precomputed look-up tables (LUTs) of brightness temperature differences (BTDs) between the 3.7 and 11.0 μm bands. A combination of discrete ordinates radiative transfer and correlated k distribution programs, which account for the multiple scattering and monochromatic molecular absorption in the atmosphere, is utilized to compute the LUTs as functions of solar zenith angle, satellite zenith angle, relative azimuth angle, Re, cloud top temperature (CTT), and cloud visible optical thickness τ. The LUT-estimated DCC Re agrees well with the cloud retrievals of the Moderate Resolution Imaging Spectroradiometer (MODIS) for the NASA Clouds and Earth's Radiant Energy System with a correlation coefficient of 0.988 and differences of less than 10%. The LUTs are applied to 1 year of measurements taken from MODIS aboard Aqua in 2007 to estimate DCC Re and are compared to a similar quantity from CloudSat over the region bounded by 140°E, 180°E, 0°N, and 20°N in the Western Pacific Warm Pool. The estimated DCC Re values are mainly concentrated in the range of 25-45 μm and decrease with CTT. Matching the LUT-estimated Re with ice cloud Re retrieved by CloudSat, it is found that the ice cloud τ values from DCC top to the vertical location where LUT-estimated Re is located at the CloudSat-retrieved Re profile are mostly less than 2.5 with a mean value of about 1.3. Changes in the DCC τ can result in differences of less than 10% for Re estimated from LUTs. The LUTs of 0.65 μm bidirectional reflectance distribution function (BRDF) are built as functions of viewing geometry and column amount of ozone above upper troposphere. The 0.65 μm BRDF can eliminate some noncore portions of the DCCs detected using only 11 μm brightness temperature thresholds, which result in a mean difference of only 0.6 μm for DCC Re estimated from BTD LUTs.

  9. Activities to Address Challenges in Digital Innovation

    OpenAIRE

    Lund , Jesper

    2014-01-01

    Part 3: Structures and Networks; International audience; Based on a literature review, this paper identifies four socio-technical challenges relating to innovation actor’s interactions in digital innovation. Furthermore, the paper explores how these challenges can be addressed. The challenges are investigated in a case study of digital innovation. The study is based on a two year long research and development project where an e-newspaper concept and a demonstrator based on e-paper technology ...

  10. Forms of address in Isizulu

    OpenAIRE

    2014-01-01

    M.A. (African Studies) The study deals with forms of address in isiZulu. Therefore, the various aspects of speech that play roles when addressing a person, the factors affecting forms of address in isiZulu and the effect of languages such as English, Afrikaans and other African languages on the forms of address in isiZulu are of interest. Research was conducted on forms of address in isiZulu in parts of Soweto and it was discovered that form of address are determined by different factors i...

  11. Experimental demonstrations of all-optical networking functions for WDM optical networks

    Science.gov (United States)

    Gurkan, Deniz

    The deployment of optical networks will enable high capacity links between users but will introduce the problems associated with transporting and managing more channels. Many network functions should be implemented in optical domain; main reasons are: to avoid electronic processing bottlenecks, to achieve data-format and data-rate independence, to provide reliable and cost efficient control and management information, to simultaneously process multiple wavelength channel operation for wavelength division multiplexed (WDM) optical networks. The following novel experimental demonstrations of network functions in the optical domain are presented: Variable-bit-rate recognition of the header information in a data packet. The technique is reconfigurable for different header sequences and uses optical correlators as look-up tables. The header is processed and a signal is sent to the switch for a series of incoming data packets at 155 Mb/s, 622 Mb/s, and 2.5 Gb/s in a reconfigurable network. Simultaneous optical time-slot-interchange and wavelength conversion of the bits in a 2.5-Gb/s data stream to achieve a reconfigurable time/wavelength switch. The technique uses difference-frequency-generation (DFG) for wavelength conversion and fiber Bragg gratings (FBG) as wavelength-dependent optical time buffers. The WDM header recognition module simultaneously recognizing two header bits on each of two 2.5-Gbit/s WDM packet streams. The module is tunable to enable reconfigurable look-up tables. Simultaneous and independent label swapping and wavelength conversion of two WDM channels for a multi-protocol label switching (MPLS) network. Demonstration of label swapping of distinct 8-bit-long labels for two WDM data channels is presented. Two-dimensional code conversion module for an optical code-division multiple-access (O-CDMA) local area network (LAN) system. Simultaneous wavelength conversion and time shifting is achieved to enable flexible code conversion and increase code re

  12. Introduction to Artificial Neural Networks

    DEFF Research Database (Denmark)

    Larsen, Jan

    1999-01-01

    The note addresses introduction to signal analysis and classification based on artificial feed-forward neural networks.......The note addresses introduction to signal analysis and classification based on artificial feed-forward neural networks....

  13. CIRM Alpha Stem Cell Clinics: Collaboratively Addressing Regenerative Medicine Challenges.

    Science.gov (United States)

    Jamieson, Catriona H M; Millan, Maria T; Creasey, Abla A; Lomax, Geoff; Donohoe, Mary E; Walters, Mark C; Abedi, Mehrdad; Bota, Daniela A; Zaia, John A; Adams, John S

    2018-06-01

    The California Institute for Regenerative Medicine (CIRM) Alpha Stem Cell Clinic (ASCC) Network was launched in 2015 to address a compelling unmet medical need for rigorous, FDA-regulated, stem cell-related clinical trials for patients with challenging, incurable diseases. Here, we describe our multi-center experiences addressing current and future challenges. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. Sistema de otto-codificação modificado para endereçamento de redes hidrográficas An improved stream network addressing system: the modified pfafstetter coding scheme

    Directory of Open Access Journals (Sweden)

    Natanael dos Santos Silva

    2008-10-01

    .This paper presents a new numbering system based on the Pfafstetter codification scheme developed for stream networks. Its main advantage is the use of the segments' length instead of the catchments' areas for establishing the Pfafstetter code, therefore eliminating the need for elevation data. This methodology was then implemented in a software named Otto-Sys, developed for Arc/INFO workstation in AML. In order to present the results of this new approach, a case study was carried out for the stream network of the Caeté River, a tributary of Iaco River, belonging to the Amazon River basin. The details of such a digital hydrographic dataset led to 5 level-deep codes. Each codification level is stored as a new column of the attribute table and the corresponding level dictates the number of digits of the code. Once this codification scheme has been established, network-tracing tasks can be performed in any geographic information system using only attribute queries. This strategy speeds up such processes enabling them to be extended to real-time web-based devices.

  15. Port virtual addressing for PC

    International Nuclear Information System (INIS)

    Bolanos, L.; Arista, E.; Osorio Deliz, J.F.

    1997-01-01

    Instruments for nuclear signal measurements based on add-on card for a personal computer (PC) are designed often. Then one faces the problem of the addressing of data input/output devices which show an integration level or intelligence that makes the use of several port address indispensable, and these are limited in the PC. The virtual addressing offers the advantage of the occupation of few addresses to accede to many of these devices. The principles of this technique and the appliances of a solution in radiometric in a radiometric card based on programmed logic are discussed in this paper

  16. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  17. Application of a neural network to control a pressurized water reactor

    International Nuclear Information System (INIS)

    Lin, C.; Ku, C.C.; Lee, C.S.

    1993-01-01

    A neural network has been trained to control a pressurized water reactor. The inputs of the training pattern are the plant signals, and the outputs are the control rod actions. The training patterns are some kind of lookup table of control action. The table is designed by the heuristic method, which is based on the designer's knowledge of the controlled system and the operation experience. This method has two advantages: The controller's performance does not depend on the mathematical model of the plant, and the controller could be a nonlinear one. The advantages of using neural networks to implement the controller are to save computing time and overcome partial hardware failure

  18. SU-E-T-275: Dose Verification in a Small Animal Image-Guided Radiation Therapy X-Ray Machine: A Dose Comparison between TG-61 Based Look-Up Table and MOSFET Method for Various Collimator Sizes.

    Science.gov (United States)

    Rodrigues, A; Nguyen, G; Li, Y; Roy Choudhury, K; Kirsch, D; Das, S; Yoshizumi, T

    2012-06-01

    To verify the accuracy of TG-61 based dosimetry with MOSFET technology using a tissue-equivalent mouse phantom. Accuracy of mouse dose between a TG-61 based look-up table was verified with MOSFET technology. The look-up table followed a TG-61 based commissioning and used a solid water block and radiochromic film. A tissue-equivalent mouse phantom (2 cm diameter, 8 cm length) was used for the MOSFET method. Detectors were placed in the phantom at the head and center of the body. MOSFETs were calibrated in air with an ion chamber and f-factor was applied to derive the dose to tissue. In CBCT mode, the phantom was positioned such that the system isocenter coincided with the center of the MOSFET with the active volume perpendicular to the beam. The absorbed dose was measured three times for seven different collimators, respectively. The exposure parameters were 225 kVp, 13 mA, and an exposure time of 20 s. For a 10 mm, 15 mm, and 20 mm circular collimator, the dose measured by the phantom was 4.3%, 2.7%, and 6% lower than TG-61 based measurements, respectively. For a 10 × 10 mm, 20 × 20 mm, and 40 × 40 mm collimator, the dose difference was 4.7%, 7.7%, and 2.9%, respectively. The MOSFET data was systematically lower than the commissioning data. The dose difference is due to the increased scatter radiation in the solid water block versus the dimension of the mouse phantom leading to an overestimation of the actual dose in the solid water block. The MOSFET method with the use of a tissue- equivalent mouse phantom provides less labor intensive geometry-specific dosimetry and accuracy with better dose tolerances of up to ± 2.7%. © 2012 American Association of Physicists in Medicine.

  19. An Aerosol Extinction-to-Backscatter Ratio Database Derived from the NASA Micro-Pulse Lidar Network: Applications for Space-based Lidar Observations

    Science.gov (United States)

    Welton, Ellsworth J.; Campbell, James R.; Spinhime, James D.; Berkoff, Timothy A.; Holben, Brent; Tsay, Si-Chee; Bucholtz, Anthony

    2004-01-01

    Backscatter lidar signals are a function of both backscatter and extinction. Hence, these lidar observations alone cannot separate the two quantities. The aerosol extinction-to-backscatter ratio, S, is the key parameter required to accurately retrieve extinction and optical depth from backscatter lidar observations of aerosol layers. S is commonly defined as 4*pi divided by the product of the single scatter albedo and the phase function at 180-degree scattering angle. Values of S for different aerosol types are not well known, and are even more difficult to determine when aerosols become mixed. Here we present a new lidar-sunphotometer S database derived from Observations of the NASA Micro-Pulse Lidar Network (MPLNET). MPLNET is a growing worldwide network of eye-safe backscatter lidars co-located with sunphotometers in the NASA Aerosol Robotic Network (AERONET). Values of S for different aerosol species and geographic regions will be presented. A framework for constructing an S look-up table will be shown. Look-up tables of S are needed to calculate aerosol extinction and optical depth from space-based lidar observations in the absence of co-located AOD data. Applications for using the new S look-up table to reprocess aerosol products from NASA's Geoscience Laser Altimeter System (GLAS) will be discussed.

  20. Firewall for Dynamic IP Address in Mobile IPv6

    Science.gov (United States)

    Qiu, Ying; Bao, Feng; Zhou, Jianying

    Mobile communication is becoming the mainstream with the rapid growth of mobile devices penetrating our daily life. More and more mobile devices such as mobile phones, personal digital assistants, notebooks etc, are capable of Internet access. Mobile devices frequently change their communication IP addresses in mobile IPv6 network following its current attached domain. This raises a big challenge for building firewall for mobile devices. The conventional firewalls are primarily based on IPv4 networks where the security criteria are specified only to the fixed IP addresses or subnets, which apparently do not apply to mobile IPv6. In this paper we propose three solutions for mobile IPv6 firewall. Our approaches make the firewall adaptive to dynamic IP addresses in mobile IPv6 network. They have different expense and weight corresponding to different degree of universality. The paper focuses the study more from practical aspect.

  1. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  2. Addressing problems of employee performance.

    Science.gov (United States)

    McConnell, Charles R

    2011-01-01

    Employee performance problems are essentially of 2 kinds: those that are motivational in origin and those resulting from skill deficiencies. Both kinds of problems are the province of the department manager. Performance problems differ from problems of conduct in that traditional disciplinary processes ordinarily do not apply. Rather, performance problems are addressed through educational and remedial processes. The manager has a basic responsibility in ensuring that everything reasonable is done to help each employee succeed. There are a number of steps the manager can take to address employee performance problems.

  3. Zone memories and pseudorandom addressing

    International Nuclear Information System (INIS)

    Marino, D.; Mirizzi, N.; Stella, R.; Visaggio, G.

    1975-01-01

    A quantitative comparison between zone memories, pseudorandom addressed memories and an alternative special purpose memory (spread zone memory) in which the distance between any two transformed descriptors, at first adjacent, is independent of the descriptors pair and results the maximum one is presented. This memory has not been particularly considered at present in spite of its efficiency and its simple implementation

  4. Shuttle user analysis (study 2.2): Volume 3. Business Risk And Value of Operations in space (BRAVO). Part 4: Computer programs and data look-up

    Science.gov (United States)

    1974-01-01

    Computer program listings as well as graphical and tabulated data needed by the analyst to perform a BRAVO analysis were examined. Graphical aid which can be used to determine the earth coverage of satellites in synchronous equatorial orbits was described. A listing for satellite synthesis computer program as well as a sample printout for the DSCS-11 satellite program and a listing of the symbols used in the program were included. The APL language listing for the payload program cost estimating computer program was given. This language is compatible with many of the time sharing remote terminals computers used in the United States. Data on the intelsat communications network was studied. Costs for telecommunications systems leasing, line of sight microwave relay communications systems, submarine telephone cables, and terrestrial power generation systems were also described.

  5. Addressing the workforce pipeline challenge

    Energy Technology Data Exchange (ETDEWEB)

    Leonard Bond; Kevin Kostelnik; Richard Holman

    2006-11-01

    A secure and affordable energy supply is essential for achieving U.S. national security, in continuing U.S. prosperity and in laying the foundations to enable future economic growth. To meet this goal the next generation energy workforce in the U.S., in particular those needed to support instrumentation, controls and advanced operations and maintenance, is a critical element. The workforce is aging and a new workforce pipeline, to support both current generation and new build has yet to be established. The paper reviews the challenges and some actions being taken to address this need.

  6. Integration between WSNs and Internet based on Address Internetworking for Web

    OpenAIRE

    Jeong Hee Kim; Do Hyeun Kim; Ho Young Kwak; Yung Cheol Byun

    2012-01-01

    There has been an increasing interest in wireless sensor networks as a new technology to realize ubiquitous computing, and demands for internetworking technology between the wireless sensor networks and the Internet which is based on IP address. For this purpose, this paper proposes and implements the internetworking scheme which assigns IP addresses to the sensor nodes and internetworks based on the gateway-based integration for internetworking between the wireless sensor networks and the In...

  7. A Life’s Addresses

    DEFF Research Database (Denmark)

    Balle, Søren Hattesen

    According to Jonathan Culler’s essay ”Apostrophe”, ”…post-enlightenment poetry seeks to overcome the alienation of subject from object”, and “apostrophe takes the crucial step of constituting the object as another subject with whom the poetic subject might hope to strike up a harmonious relations......According to Jonathan Culler’s essay ”Apostrophe”, ”…post-enlightenment poetry seeks to overcome the alienation of subject from object”, and “apostrophe takes the crucial step of constituting the object as another subject with whom the poetic subject might hope to strike up a harmonious...... to a number of different aspects of Koch’s own life such as marijuana, the Italian language, World War Two, etc. In this way, the book quite conventionally inscribes itself in the tradition of post-enlightenment apostrophic poetry as characterized by Culler, just as all its poems belong to the favourite......, are literally troped as and addressed in the manner of so many acquaintances, personal connections, relatives, friends, lovers, and family members in Koch’s life. My main claim is that Koch’s poetics in New Addresses is one that slightly dislocates the romantic dichotomy between the world of things...

  8. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  9. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  10. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  11. Three-directional motion-compensation mask-based novel look-up table on graphics processing units for video-rate generation of digital holographic videos of three-dimensional scenes.

    Science.gov (United States)

    Kwon, Min-Woo; Kim, Seung-Cheol; Kim, Eun-Soo

    2016-01-20

    A three-directional motion-compensation mask-based novel look-up table method is proposed and implemented on graphics processing units (GPUs) for video-rate generation of digital holographic videos of three-dimensional (3D) scenes. Since the proposed method is designed to be well matched with the software and memory structures of GPUs, the number of compute-unified-device-architecture kernel function calls can be significantly reduced. This results in a great increase of the computational speed of the proposed method, allowing video-rate generation of the computer-generated hologram (CGH) patterns of 3D scenes. Experimental results reveal that the proposed method can generate 39.8 frames of Fresnel CGH patterns with 1920×1080 pixels per second for the test 3D video scenario with 12,088 object points on dual GPU boards of NVIDIA GTX TITANs, and they confirm the feasibility of the proposed method in the practical application fields of electroholographic 3D displays.

  12. Application of the new IAPWS Guideline on the fast and accurate calculation of steam and water properties with the Spline-Based Table Look-Up Method (SBTL) in RELAP-7

    Energy Technology Data Exchange (ETDEWEB)

    Kunick, Matthias; Kretzschmar, Hans-Joachim [Zittau/Goerlitz Univ. of Applied Sciences, Zittau (Germany). Dept. of Technical Thermodynamics; Berry, Ray A.; Martineau, Richard C. [Idaho National Laboratory, Idaho Falls, ID (United States). Nuclear Science and Technology; Gampe, Uwe [Dresden Univ. of Technology (Germany). Chair of Thermal Power Machinery and Plants

    2017-07-15

    The numerical simulation of thermalhydraulic processes in nuclear power plants requires very accurate and extremely fast algorithms for calculating the thermophysical properties of water and steam. In order to provide such algorithms, the International Association for the Properties of Water and Steam (IAPWS) has adopted the new ''IAPWS Guideline on the Fast Calculation of Steam and Water Properties with the Spline-Based Table Look-Up Method (SBTL)''. In this article, the SBTL method is applied to property functions of specific volume and specific internal energy (v,e) based on the scientific formulation IAPWS-95 and the latest IAPWS formulations for transport properties. From the newly generated SBTL functions, thermodynamic and transport properties as well as their derivatives and inverse functions are calculable in the fluid range of state for pressures up to 100 MPa and for temperatures up to 1273 K, including the metastable liquid and the metastable vapor regions. The SBTL functions reproduce the underlying formulations with an accuracy of 10-100 ppm and significantly reduced computing times. The SBTL method has been implemented into the nuclear reactor system safety analysis code RELAP-7 [2] to consider the real fluid behavior of water and steam in a novel 7-equation two-phase flow model.

  13. How Dynamic is the ISPs Address Space? Towards Internet-Wide DHCP Churn Estimation

    NARCIS (Netherlands)

    Moreira Moura, G.C.; Ganan, C.H.G.; Lone, Q.B.; Poursaied, P.; Asghari, H.; Van Eeten, M.J.G.

    2015-01-01

    IP address counts are typically used as a surrogate metric for the number of hosts in a network, as in the case of ISP rankings based on botnet infected addresses. However, due to effects of dynamic IP address allocation, such counts tend to overestimate the number of hosts, sometimes by an order of

  14. The exploitation of neural networks in automotive engine management systems

    Energy Technology Data Exchange (ETDEWEB)

    Shayler, P.J.; Goodman, M. [University of Nottingham (United Kingdom); Ma, T. [Ford Motor Company, Dagenham (United Kingdom). Research and Engineering Centre

    2000-07-01

    The use of electronic engine control systems on spark ignition engines has enabled a high degree of performance optimisation to be achieved. The range of functions performed by these systems, and the level of performance demanded, is rising and thus so are development times and costs. Neural networks have attracted attention as having the potential to simplify software development and improve the performance of this software. The scope and nature of possible applications is described. In particular, the pattern recognition and classification abilities of networks are applied to crankshaft speed fluctuation data for engine-fault diagnosis, and multidimensional mapping capabilities are investigated as an alternative to large 'lookup' tables and calibration functions. (author)

  15. Application of artificial neural networks in analysis of CHF experimental data in round tubes

    International Nuclear Information System (INIS)

    Huang Yanping; Chen Bingde; Lang Xuemei; Wang Xiaojun; Shan Jianqiang; Jia Dounan

    2004-01-01

    Artificial neural networks (ANNs) are applied successfully to analyze the critical heat flux (CHF) experimental data from some round tubes in this paper. A set of software adopting artificial neural network method for predicting CHF in round tube and a set of CHF database are gotten. Comparing with common CHF correlations and CHF look-up table, ANN method has stronger ability of allow-wrong and nice robustness. The CHF predicting software adopting artificial neural network technology can improve the predicting accuracy in a wider parameter range, and is easier to update and to use. The artificial neural network method used in this paper can be applied to some similar physical problems. (authors)

  16. Final Report on Internet Addressable Lightswitch; TOPICAL

    International Nuclear Information System (INIS)

    Rubinstein, Francis; Pettler, Peter

    2001-01-01

    This report describes the work performed to develop and test a new switching system and communications network that is useful for economically switching lighting circuits in existing commercial buildings. The first section of the report provides the general background of the IBECS (Integrated Building Environmental Communications System) research and development work as well as the context for the development of the new switching system. The research and development effort that went into producing the first proof-of-concept (the IBECS Addressable Power Switch or APS) and the physical prototype of that concept is detailed in the second section. In the third section of the report, we detail the refined Powerline Carrier Based IBECS Title 24 Wall Switch system that evolved from the APS prototype. The refined system provided a path for installing IBECS switching technology in existing buildings that may not be already wired for light level switching control. The final section of the report describes the performance of the IBECS Title 24 Switch system as applied to a small demonstration in two offices at LBNL's Building 90. We learned that the new Powerline Carrier control systems (A-10 technology) that have evolved from the early X-10 systems have solved most of the noise problems that dogged the successful application of X-10 technologies in commercial buildings. We found that the new A-10 powerline carrier control technology can be reliable and effective for switching lighting circuits even in electrically noisy office environments like LBNL. Thus we successfully completed the task objectives by designing, building and demonstrating a new switching system that can provide multiple levels of light which can be triggered either from specially designed wall switches or from a digital communications network. By applying commercially available powerline carrier based technologies that communicate over the in-place lighting wiring system, this type of control can be

  17. GEOSS: Addressing Big Data Challenges

    Science.gov (United States)

    Nativi, S.; Craglia, M.; Ochiai, O.

    2014-12-01

    In the sector of Earth Observation, the explosion of data is due to many factors including: new satellite constellations, the increased capabilities of sensor technologies, social media, crowdsourcing, and the need for multidisciplinary and collaborative research to face Global Changes. In this area, there are many expectations and concerns about Big Data. Vendors have attempted to use this term for their commercial purposes. It is necessary to understand whether Big Data is a radical shift or an incremental change for the existing digital infrastructures. This presentation tries to explore and discuss the impact of Big Data challenges and new capabilities on the Global Earth Observation System of Systems (GEOSS) and particularly on its common digital infrastructure called GCI. GEOSS is a global and flexible network of content providers allowing decision makers to access an extraordinary range of data and information at their desk. The impact of the Big Data dimensionalities (commonly known as 'V' axes: volume, variety, velocity, veracity, visualization) on GEOSS is discussed. The main solutions and experimentation developed by GEOSS along these axes are introduced and analyzed. GEOSS is a pioneering framework for global and multidisciplinary data sharing in the Earth Observation realm; its experience on Big Data is valuable for the many lessons learned.

  18. The Standardization Method of Address Information for POIs from Internet Based on Positional Relation

    Directory of Open Access Journals (Sweden)

    WANG Yong

    2016-05-01

    Full Text Available As points of interest (POIon the internet, exists widely incomplete addresses and inconsistent literal expressions, a fast standardization processing method of network POIs address information based on spatial constraints was proposed. Based on the model of the extensible address expression, first of all, address information of POI was segmented and extracted. Address elements are updated by means of matching with the address tree layer by layer. Then, by defining four types of positional relations, corresponding set are selected from standard POI library as candidate for enrichment and amendment of non-standard address. At last, the fast standardized processing of POI address information was achieved with the help of backtracking address elements with minimum granularity. Experiments in this paper proved that the standardization processing of an address can be realized by means of this method with higher accuracy in order to build the address database.

  19. First keynote address - biological monitoring

    International Nuclear Information System (INIS)

    Turner, J.E.

    1984-01-01

    The author describes the interplay of physical research and the practice of radiation protection. There are both analogies in and differences between the problems of health protection from radiation and chemical pollutants. In formulating research objectives for synfuel technologies, it is important to take what lessons there are to be learned from the radiation experience. The regulation of the exposure of persons to radiation probably rests on a firmer scientific basis than does the regulation of exposure to many toxic chemicals. Some things in radiation protection - in both applied work and in research - should help to guide in approaching chemicals. The second section of this paper gives a brief description of the practice of radiation protection. The next section mentions some fundamental deficiencies that exist in radiation protection. Some physical research avenues illustrate how such deficiencies are being addressed as part of an integrated radiation research program. In the fourth section the author focuses on chemical pollutants, drawing some lessons from the radiation experience

  20. A region addresses patient safety.

    Science.gov (United States)

    Feinstein, Karen Wolk; Grunden, Naida; Harrison, Edward I

    2002-06-01

    The Pittsburgh Regional Healthcare Initiative (PRHI) is a coalition of 35 hospitals, 4 major insurers, more than 30 major and small-business health care purchasers, dozens of corporate and civic leaders, organized labor, and partnerships with state and federal government all working together to deliver perfect patient care throughout Southwestern Pennsylvania. PRHI believes that in pursuing perfection, many of the challenges facing today's health care delivery system (eg, waste and error in the delivery of care, rising costs, frustration and shortage among clinicians and workers, financial distress, overcapacity, and lack of access to care) will be addressed. PRHI has identified patient safety (nosocomial infections and medication errors) and 5 clinical areas (obstetrics, orthopedic surgery, cardiac surgery, depression, and diabetes) as ideal starting points. In each of these areas of work, PRHI partners have assembled multifacility/multidisciplinary groups charged with defining perfection, establishing region-wide reporting systems, and devising and implementing recommended improvement strategies and interventions. Many design and conceptual elements of the PRHI strategy are adapted from the Toyota Production System and its Pittsburgh derivative, the Alcoa Business System. PRHI is in the proof-of-concept phase of development.

  1. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  2. Networks: structure and action : steering in and steering by policy networks

    NARCIS (Netherlands)

    Dassen, A.

    2010-01-01

    This thesis explores the opportunities to build a structural policy network model that is rooted in social network theories. By making a distinction between a process of steering in networks, and a process of steering by networks, it addresses the effects of network structures on network dynamics as

  3. Addressing uncertainty in atomistic machine learning

    DEFF Research Database (Denmark)

    Peterson, Andrew A.; Christensen, Rune; Khorshidi, Alireza

    2017-01-01

    Machine-learning regression has been demonstrated to precisely emulate the potential energy and forces that are output from more expensive electronic-structure calculations. However, to predict new regions of the potential energy surface, an assessment must be made of the credibility of the predi......Machine-learning regression has been demonstrated to precisely emulate the potential energy and forces that are output from more expensive electronic-structure calculations. However, to predict new regions of the potential energy surface, an assessment must be made of the credibility...... of the predictions. In this perspective, we address the types of errors that might arise in atomistic machine learning, the unique aspects of atomistic simulations that make machine-learning challenging, and highlight how uncertainty analysis can be used to assess the validity of machine-learning predictions. We...... suggest this will allow researchers to more fully use machine learning for the routine acceleration of large, high-accuracy, or extended-time simulations. In our demonstrations, we use a bootstrap ensemble of neural network-based calculators, and show that the width of the ensemble can provide an estimate...

  4. Modeling and simulation of adaptive Neuro-fuzzy based intelligent system for predictive stabilization in structured overlay networks

    Directory of Open Access Journals (Sweden)

    Ramanpreet Kaur

    2017-02-01

    Full Text Available Intelligent prediction of neighboring node (k well defined neighbors as specified by the dht protocol dynamism is helpful to improve the resilience and can reduce the overhead associated with topology maintenance of structured overlay networks. The dynamic behavior of overlay nodes depends on many factors such as underlying user’s online behavior, geographical position, time of the day, day of the week etc. as reported in many applications. We can exploit these characteristics for efficient maintenance of structured overlay networks by implementing an intelligent predictive framework for setting stabilization parameters appropriately. Considering the fact that human driven behavior usually goes beyond intermittent availability patterns, we use a hybrid Neuro-fuzzy based predictor to enhance the accuracy of the predictions. In this paper, we discuss our predictive stabilization approach, implement Neuro-fuzzy based prediction in MATLAB simulation and apply this predictive stabilization model in a chord based overlay network using OverSim as a simulation tool. The MATLAB simulation results present that the behavior of neighboring nodes is predictable to a large extent as indicated by the very small RMSE. The OverSim based simulation results also observe significant improvements in the performance of chord based overlay network in terms of lookup success ratio, lookup hop count and maintenance overhead as compared to periodic stabilization approach.

  5. Using Neural Networks to Improve the Performance of Radiative Transfer Modeling Used for Geometry Dependent LER Calculations

    Science.gov (United States)

    Fasnacht, Z.; Qin, W.; Haffner, D. P.; Loyola, D. G.; Joiner, J.; Krotkov, N. A.; Vasilkov, A. P.; Spurr, R. J. D.

    2017-12-01

    In order to estimate surface reflectance used in trace gas retrieval algorithms, radiative transfer models (RTM) such as the Vector Linearized Discrete Ordinate Radiative Transfer Model (VLIDORT) can be used to simulate the top of the atmosphere (TOA) radiances with advanced models of surface properties. With large volumes of satellite data, these model simulations can become computationally expensive. Look up table interpolation can improve the computational cost of the calculations, but the non-linear nature of the radiances requires a dense node structure if interpolation errors are to be minimized. In order to reduce our computational effort and improve the performance of look-up tables, neural networks can be trained to predict these radiances. We investigate the impact of using look-up table interpolation versus a neural network trained using the smart sampling technique, and show that neural networks can speed up calculations and reduce errors while using significantly less memory and RTM calls. In future work we will implement a neural network in operational processing to meet growing demands for reflectance modeling in support of high spatial resolution satellite missions.

  6. Realization and Addressing Analysis In Blockchain Bitcoin

    Science.gov (United States)

    Sakti Arief Daulay, Raja; Michrandi Nasution, Surya; Paryasto, Marisa W.

    2017-11-01

    The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.

  7. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  8. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  9. Network survivability performance

    Science.gov (United States)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  10. Miniaturized wireless sensor network

    OpenAIRE

    Lecointre , Aubin; Dragomirescu , Daniela; Dubuc , David; Grenier , Katia; Pons , Patrick; Aubert , Hervé; Müller , A.; Berthou , Pascal; Gayraud , Thierry; Plana , Robert

    2006-01-01

    This paper addresses an overview of the wireless sensor networks. It is shown that MEMS/NEMS technologies and SIP concept are well suited for advanced architectures. It is also shown analog architectures have to be compatible with digital signal techniques to develop smart network of microsystem.

  11. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  12. Reliability in automotive ethernet networks

    DEFF Research Database (Denmark)

    Soares, Fabio L.; Campelo, Divanilson R.; Yan, Ying

    2015-01-01

    This paper provides an overview of in-vehicle communication networks and addresses the challenges of providing reliability in automotive Ethernet in particular.......This paper provides an overview of in-vehicle communication networks and addresses the challenges of providing reliability in automotive Ethernet in particular....

  13. Flow whitelisting in SCADA networks

    DEFF Research Database (Denmark)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    and the Internet. This paper describes an approach for improving the security of SCADA networks using flow whitelisting. A flow whitelist describes legitimate traffic based on four properties of network packets: client address, server address, server-side port and transport protocol. The proposed approach...

  14. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  15. Geographically Locating an Internet Node Using Network Latency Measurement

    National Research Council Canada - National Science Library

    Turnbaugh, Eugene

    2004-01-01

    .... The difficulties include accurate latency measure, network address translation (NAT) masking, service blocking, disparate physical configuration, dissimilar network hardware, and inaccurate and limited measuring tools...

  16. Remote MIB item look-up service

    NARCIS (Netherlands)

    Pras, Aiko; Boros, S.; Helthuis, Bert

    Despite some deficiencies, the Internet management framework is widely deployed and thousands of Management Information Base (MIB) modules have been defined thus far. These modules are used by implementors of agent software, as well as by managers and management applications, to understand the

  17. 33 CFR 135.9 - Fund address.

    Science.gov (United States)

    2010-07-01

    ... FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND General § 135.9 Fund address. The address to which correspondence relating to the Coast Guard's administration of the Fund... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Fund address. 135.9 Section 135.9...

  18. Addressing barriers to low carbon energy

    International Nuclear Information System (INIS)

    Berry, Fiona; Dunstan, Chris

    2012-01-01

    Full text: Two energy solutions gaining attention are cogeneration and trigeneration, mostly fuelled by natural gas, although other renewable sources can be used, such as sewage, agricultural waste and municipal waste. Trigeneration has become increasingly popular in Australia's urban centres as a relatively cost-effective means to cut the carbon-intensity of energy supply by more than half compared to traditional coal- fired electricity. Some examples of trigeneration projects include the City of Sydney's planned 360 megawatt trigeneration networks by 2030, the University of Technology Sydney's campus master plan and the six star Green Star Commonwealth Bank Place building in Sydney. Trigeneration and cogeneration can present opportunities such as addressing the issue of rising peak demand, which is a major driver for the current $9 billion per annum of network infrastructure spending. They can also face barriers. For example, depending on the current state of the network, additional network costs can be required to accommodate trigeneration. Furthermore, under the current National Electricity Market regulations and conventions, challenges do exist to timely and financially viable connection to the grid. Here we present two examples of barriers to trigeneration and cogeneration and solutions being considered and implemented. The University of Technology Sydney campus master plan is underway, with approximately 100,000sq.m of floor area being built by 2019 and includes plans for trigeneration. During the master planning phase of development, the university considered small trigeneration units in individual buildings in order to reduce the carbon intensity of electricity supply and deliver high ratings under Green Star ratings. When considering connecting trigeneration with the grid at multiple buildings on an individual basis, a number of barriers were encountered by UTS. The largest barrier was appropriate charging for connecting to and using the grid. However

  19. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  20. Reading handprinted addresses on IRS tax forms

    Science.gov (United States)

    Ramanaprasad, Vemulapati; Shin, Yong-Chul; Srihari, Sargur N.

    1996-03-01

    The hand-printed address recognition system described in this paper is a part of the Name and Address Block Reader (NABR) system developed by the Center of Excellence for Document Analysis and Recognition (CEDAR). NABR is currently being used by the IRS to read address blocks (hand-print as well as machine-print) on fifteen different tax forms. Although machine- print address reading was relatively straightforward, hand-print address recognition has posed some special challenges due to demands on processing speed (with an expected throughput of 8450 forms/hour) and recognition accuracy. We discuss various subsystems involved in hand- printed address recognition, including word segmentation, word recognition, digit segmentation, and digit recognition. We also describe control strategies used to make effective use of these subsystems to maximize recognition accuracy. We present system performance on 931 address blocks in recognizing various fields, such as city, state, ZIP Code, street number and name, and personal names.

  1. Semaphore network encryption report

    Science.gov (United States)

    Johnson, Karen L.

    1994-03-01

    This paper documents the results of a preliminary assessment performed on the commercial off-the-shelf (COTS) Semaphore Communications Corporation (SCC) Network Security System (NSS). The Semaphore NSS is a family of products designed to address important network security concerns, such as network source address authentication and data privacy. The assessment was performed in the INFOSEC Core Integration Laboratory, and its scope was product usability focusing on interoperability and system performance in an existing operational network. Included in this paper are preliminary findings. Fundamental features and functionality of the Semaphore NSS are identified, followed by details of the assessment, including test descriptions and results. A summary of test results and future plans are also included. These findings will be useful to those investigating the use of commercially available solutions to network authentication and data privacy.

  2. Inferring general relations between network characteristics from specific network ensembles.

    Science.gov (United States)

    Cardanobile, Stefano; Pernice, Volker; Deger, Moritz; Rotter, Stefan

    2012-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their ability to generate networks with large structural variability. In particular, we consider the statistical constraints which the respective construction scheme imposes on the generated networks. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This makes it possible to infer global features from local ones using regression models trained on networks with high generalization power. Our results confirm and extend previous findings regarding the synchronization properties of neural networks. Our method seems especially relevant for large networks, which are difficult to map completely, like the neural networks in the brain. The structure of such large networks cannot be fully sampled with the present technology. Our approach provides a method to estimate global properties of under-sampled networks in good approximation. Finally, we demonstrate on three different data sets (C. elegans neuronal network, R. prowazekii metabolic network, and a network of synonyms extracted from Roget's Thesaurus) that real-world networks have statistical relations compatible with those obtained using regression models.

  3. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  4. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  5. Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking

    Science.gov (United States)

    2016-11-01

    Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory...performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are...devices, and the ad-hoc nature of the network . Group Centric Networking (GCN) is a proposed networking protocol that addresses challenges specific to

  6. Three neural network based sensor systems for environmental monitoring

    International Nuclear Information System (INIS)

    Keller, P.E.; Kouzes, R.T.; Kangas, L.J.

    1994-05-01

    Compact, portable systems capable of quickly identifying contaminants in the field are of great importance when monitoring the environment. One of the missions of the Pacific Northwest Laboratory is to examine and develop new technologies for environmental restoration and waste management at the Hanford Site. In this paper, three prototype sensing systems are discussed. These prototypes are composed of sensing elements, data acquisition system, computer, and neural network implemented in software, and are capable of automatically identifying contaminants. The first system employs an array of tin-oxide gas sensors and is used to identify chemical vapors. The second system employs an array of optical sensors and is used to identify the composition of chemical dyes in liquids. The third system contains a portable gamma-ray spectrometer and is used to identify radioactive isotopes. In these systems, the neural network is used to identify the composition of the sensed contaminant. With a neural network, the intense computation takes place during the training process. Once the network is trained, operation consists of propagating the data through the network. Since the computation involved during operation consists of vector-matrix multiplication and application of look-up tables unknown samples can be rapidly identified in the field

  7. Toward Petascale Biologically Plausible Neural Networks

    Science.gov (United States)

    Long, Lyle

    This talk will describe an approach to achieving petascale neural networks. Artificial intelligence has been oversold for many decades. Computers in the beginning could only do about 16,000 operations per second. Computer processing power, however, has been doubling every two years thanks to Moore's law, and growing even faster due to massively parallel architectures. Finally, 60 years after the first AI conference we have computers on the order of the performance of the human brain (1016 operations per second). The main issues now are algorithms, software, and learning. We have excellent models of neurons, such as the Hodgkin-Huxley model, but we do not know how the human neurons are wired together. With careful attention to efficient parallel computing, event-driven programming, table lookups, and memory minimization massive scale simulations can be performed. The code that will be described was written in C + + and uses the Message Passing Interface (MPI). It uses the full Hodgkin-Huxley neuron model, not a simplified model. It also allows arbitrary network structures (deep, recurrent, convolutional, all-to-all, etc.). The code is scalable, and has, so far, been tested on up to 2,048 processor cores using 107 neurons and 109 synapses.

  8. Organization of Control Units with Operational Addressing

    OpenAIRE

    Alexander A. Barkalov; Roman M. Babakov; Larysa A. Titarenko

    2012-01-01

    The using of operational addressing unit as the block of control unit is proposed. The new structure model of Moore finite-state machine with reduced hardware amount is developed. The generalized structure of operational addressing unit is suggested. An example of synthesis process for Moore finite-state machine with operational addressing unit is given. The analytical researches of proposed structure of control unit are executed.

  9. Network survivability performance (computer diskette)

    Science.gov (United States)

    1993-11-01

    File characteristics: Data file; 1 file. Physical description: 1 computer diskette; 3 1/2 in.; high density; 2.0MB. System requirements: Mac; Word. This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunication networks to user expectations for network survivability.

  10. Smart Multiple Access Topologi Employing Intelligent Physical Layer for addressing the Mobile Node

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi

    2014-01-01

    of the mobile users, the cell size of the mobile network will shrink. Eventually, there will be an upsurge of signaling messages interchanged between the device and the network due to an increase in handover related operations. Attempt should be made to reduce the interaction with the network and simplify...... the mobility and location management related processes. In this thesis we set out a technical architecture of a mobile network to abridge the intricate mobility and location management processes as well as the addressing principle to render more operational efficiency and cater to the needs of the data hungry......, for example, addressing of a node. If we have a method to actuate user identification for the purpose of mobility management by implementing lower layer processes, we can simplify or eliminate the layer 7 processes and hence reduce the intricacy and costs of mobile network elements and user equipment...

  11. Geodetic Networks, This is udated by the use of GPS and updated weekely. It consist of interstate highways, state highways, major roads and local roads as well as private streets with address range, speed limit and elevation data associated to each segement., Published in 2007, Johnson County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — Geodetic Networks dataset current as of 2007. This is udated by the use of GPS and updated weekely. It consist of interstate highways, state highways, major roads...

  12. A New Method of Chinese Address Extraction Based on Address Tree Model

    Directory of Open Access Journals (Sweden)

    KANG Mengjun

    2015-01-01

    Full Text Available Address is a spatial location encoding method of individual geographical area. In China, address planning is relatively backward due to the rapid development of the city, resulting in the presence of large number of non-standard address. The space constrain relationship of standard address model is analyzed in this paper and a new method of standard address extraction based on the tree model is proposed, which regards topological relationship as consistent criteria of space constraints. With this method, standard address can be extracted and errors can be excluded from non-standard address. Results indicate that higher math rate can be obtained with this method.

  13. Generative Street Addresses from Satellite Imagery

    Directory of Open Access Journals (Sweden)

    İlke Demir

    2018-03-01

    Full Text Available We describe our automatic generative algorithm to create street addresses from satellite images by learning and labeling roads, regions, and address cells. Currently, 75% of the world’s roads lack adequate street addressing systems. Recent geocoding initiatives tend to convert pure latitude and longitude information into a memorable form for unknown areas. However, settlements are identified by streets, and such addressing schemes are not coherent with the road topology. Instead, we propose a generative address design that maps the globe in accordance with streets. Our algorithm starts with extracting roads from satellite imagery by utilizing deep learning. Then, it uniquely labels the regions, roads, and structures using some graph- and proximity-based algorithms. We also extend our addressing scheme to (i cover inaccessible areas following similar design principles; (ii be inclusive and flexible for changes on the ground; and (iii lead as a pioneer for a unified street-based global geodatabase. We present our results on an example of a developed city and multiple undeveloped cities. We also compare productivity on the basis of current ad hoc and new complete addresses. We conclude by contrasting our generative addresses to current industrial and open solutions.

  14. Forms of Address in Chilean Spanish

    Science.gov (United States)

    Bishop, Kelley; Michnowicz, Jim

    2010-01-01

    The present investigation examines possible social and linguistic factors that influence forms of address used in Chilean Spanish with various interlocutors. A characteristic of the Spanish of Chile is the use of a variety of forms of address for the second person singular, "tu", "vos", and "usted", with corresponding…

  15. 29 CFR 4245.7 - PBGC address.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false PBGC address. 4245.7 Section 4245.7 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION INSOLVENCY, REORGANIZATION, TERMINATION, AND OTHER RULES APPLICABLE TO MULTIEMPLOYER PLANS NOTICE OF INSOLVENCY § 4245.7 PBGC address. See...

  16. NASA Communications Augmentation network

    Science.gov (United States)

    Omidyar, Guy C.; Butler, Thomas E.; Laios, Straton C.

    1990-01-01

    The NASA Communications (Nascom) Division of the Mission Operations and Data Systems Directorate (MO&DSD) is to undertake a major initiative to develop the Nascom Augmentation (NAUG) network to achieve its long-range service objectives for operational data transport to support the Space Station Freedom Program, the Earth Observing System (EOS), and other projects. The NAUG is the Nascom ground communications network being developed to accommodate the operational traffic of the mid-1990s and beyond. The NAUG network development will be based on the Open Systems Interconnection Reference Model (OSI-RM). This paper describes the NAUG network architecture, subsystems, topology, and services; addresses issues of internetworking the Nascom network with other elements of the Space Station Information System (SSIS); discusses the operations environment. This paper also notes the areas of related research and presents the current conception of how the network will provide broadband services in 1998.

  17. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  18. Development of a Scale to Address the Acceptance and Use of Online Social Networking Sites for Instructional Purposes [Çevrimiçi Sosyal Ağların Öğretim Amaçlı Kabul ve Kullanımı Ölçeğinin Geliştirilmesi

    Directory of Open Access Journals (Sweden)

    Elif Buğra Kuzu Demir

    2017-04-01

    Full Text Available The current study aimed to develop a scale to address the acceptance and use of online social networking sites (SNSs for instructional purposes among information technology teachers. The theoretical framework of the scale was based on The Unified Theory of Acceptance and Use of Technology (UTAUT. Data were collected from computer education departments of three state universities to conduct an exploratory factor analysis (n: 302 followed by a confirmatory factor analysis (n: 210. Analyses revealed a four-factor structure which sheltered 36 items. It was observed that acceptance and use of SNSs for instructional purposes were composed of performance expectancy, effort expectancy, social influence and behavioral intention, which explained 67.02 percent of the total variance with a high internal consistency coefficient (α=.97. The confirmatory analysis on the four-factor structure revealed acceptable fit indices as well (RMSEA= 0.075; SRMR=0.080; NNFI= .094; CFI= .094; α=.93. Higher scores from the scale can be interpreted as higher acceptance rate and tendency to use SNSs for instructional purposes. [Bu çalışmada bilişim teknolojileri (BT öğretmen adaylarının çevrimiçi sosyal ağları (ÇSA öğretim amaçlı kabul ve kullanım süreçlerine ilişkin bir ölçek geliştirilmiştir. Geliştirilen ölçeğin kuramsal çerçevesini teknoloji kabul modellerinden “Teknoloji Kabul ve Kullanım Birleştirilmiş Model”i oluşturmuştur. Açımlayıcı faktör analizi (AFA için 302, doğrulayıcı faktör analizi (DFA için 210 olmak üzere üç farklı devlet üniversitesinin Bilgisayar ve Öğretim Teknolojileri Eğitimi (BÖTE bölümü öğrencilerinden veri toplanmıştır. Analizler sonucunda 36 maddeden oluşan dört faktörlü bir yapı ortaya konmuştur. ÇSA’ları öğretim amaçlı olarak kabul ve kullanım durumlarının performans beklentisi, çaba beklentisi, sosyal etki ve kullanma niyetlerinden etkilendiği sonucuna ula

  19. Group Coordination Support in Networked Multimedia Systems

    National Research Council Canada - National Science Library

    Dommel, Hans-Peter

    1999-01-01

    .... In this dissertation, we address network control and coordination functions to orchestrate synchronous multimedia groupwork, establishing a sharing discipline on multimedia resources and guaranteeing...

  20. Security for Network Attached Storage Devices

    National Research Council Canada - National Science Library

    Gobioff, Howard

    1997-01-01

    This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a different...

  1. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  2. Local address and emergency contact details

    CERN Multimedia

    2013-01-01

    The HR Department would like to remind members of the personnel that they are responsible for ensuring that their personal data concerning local address and preferred emergency contact details remains valid and up-to-date.   Both are easily accessible via the links below: Local address: https://edh.cern.ch/Document/Personnel/LocalAddressChange   Emergency contacts: https://edh.cern.ch/Document/Personnel/EC   Please take a few minutes to check your details and modify if necessary. Thank you in advance. HR Department Head Office

  3. Evaluating Community Partnerships Addressing Community Resilience in Los Angeles, California

    Directory of Open Access Journals (Sweden)

    Malcolm V. Williams

    2018-03-01

    Full Text Available Community resilience has grown in importance in national disaster response and recovery efforts. However, measurement of community resilience, particularly the content and quality of relationships aimed at improving resilience, is lacking. To address this gap, we used a social network survey to measure the number, type, and quality of relationships among organizations participating in 16 coalitions brought together to address community resilience in the Los Angeles Community Disaster Resilience project. These coalitions were randomized to one of two approaches (community resilience or preparedness. Resilience coalitions received training and support to develop these partnerships and implement new activities. Both coalition types received expert facilitation by a public health nurse or community educator. We also measured the activities each coalition engaged in and the extent to which partners participated in these activities at two time points. We found that the community resilience coalitions were initially larger and had lower trust among members than the preparedness communities. Over time, these trust differences dissipated. While both coalitions grew, the resilience community coalitions maintained their size difference throughout the project. We also found differences in the types of activities implemented by the resilience communities; these differences were directly related to the trainings provided. This information is useful to organizations seeking guidance on expanding the network of community-based organizations that participate in community resilience activities.

  4. Radiation and occupational health: opening address

    International Nuclear Information System (INIS)

    Mohammad Taib Osman

    1995-01-01

    The part of address discusses the following issue: benefits of radiological protection in Malaysia, traceability and accountability as assurance of the validity of radiation measurement, Laboratory Accreditation Scheme, Atomic Energy Licensing Act

  5. VT E911 ESITE geocoder - address points

    Data.gov (United States)

    Vermont Center for Geographic Information — VT E911 ESITE geocoder - address points. VCGI, in collaboration with the VT E911 Board, has created a suite of geocoding services that can be used to batch geocode...

  6. What is an address in South Africa?

    CSIR Research Space (South Africa)

    Coetzee, S

    2007-11-01

    Full Text Available Puccini Street, Constantia Park 546 Puccini Street, Glenstantia, 0181 A recent study in Denmark analysed the qualitative and quantitative impact of address ambiguities. The qualitative analysis confirmed that the ambiguities affect people every day... description consists of a land parcel number together with a registered name and registration division, and is recorded at a Surveyor-General’s office. An address complements a land parcel description with information such as the street name and the street...

  7. Research Note Consumer Addressability and Customized Pricing

    OpenAIRE

    Yuxin Chen; Ganesh Iyer

    2002-01-01

    The increasing availability of customer information is giving many firms the ability to reach and customize price and other marketing efforts to the tastes of the individual consumer. This ability is labeled as consumer addressability. Consumer addressability through sophisticated databases is particularly important for direct-marketing firms, catalog retailers such as L.L Bean and Land's End, credit card-issuing banks, and firms in the long-distance telephone market. We examine the strategic...

  8. South African address standard and initiatives towards an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-10-01

    Full Text Available ; visiting friends; and providing a reference context for presenting other information. The benefits of an international address standards include: enabling address interoperability across boundaries; reducing service delivery costs; enabling development...

  9. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  10. Policy issues in interconnecting networks

    Science.gov (United States)

    Leiner, Barry M.

    1989-01-01

    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented.

  11. Pervasive Sensing: Addressing the Heterogeneity Problem

    International Nuclear Information System (INIS)

    O'Grady, Michael J; Murdoch, Olga; Kroon, Barnard; Lillis, David; Carr, Dominic; Collier, Rem W; O'Hare, Gregory M P

    2013-01-01

    Pervasive sensing is characterized by heterogeneity across a number of dimensions. This raises significant problems for those designing, implementing and deploying sensor networks, irrespective of application domain. Such problems include for example, issues of data provenance and integrity, security, and privacy amongst others. Thus engineering a network that is fit-for-purpose represents a significant challenge. In this paper, the issue of heterogeneity is explored from the perspective of those who seek to harness a pervasive sensing element in their applications. A initial solution is proposed based on the middleware construct.

  12. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  13. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  14. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  15. Addressing the Issue: Bullying and LGBTQ Youth

    Directory of Open Access Journals (Sweden)

    Kimberly Allen

    2014-09-01

    Full Text Available Each day, thousands of youth experience bullying and as many of 70% of all youth report having experienced bullying, either directly or indirectly (Cantor, 2005. For Gay, Lesbian, Bi-sexual, Transgender and Questioning (LGBTQ youth, the chances of experiencing bullying are much higher than for youth in the general population (Russell, Horn, Kosciw, & Saewyc, 2010. Although many youth serving organizations have begun to address the issue of bullying with bullying prevention programs, there is a deficit of information and a lack of inclusion of prevention efforts that specifically address LGBTQ youth. This article address the role of youth organizations in creating safe and inclusive environments for all youth, with specific attention paid to resources and strategies for inclusive environments for LGBTQ youth.

  16. Centrally managed unified shared virtual address space

    Science.gov (United States)

    Wilkes, John

    2018-02-13

    Systems, apparatuses, and methods for managing a unified shared virtual address space. A host may execute system software and manage a plurality of nodes coupled to the host. The host may send work tasks to the nodes, and for each node, the host may externally manage the node's view of the system's virtual address space. Each node may have a central processing unit (CPU) style memory management unit (MMU) with an internal translation lookaside buffer (TLB). In one embodiment, the host may be coupled to a given node via an input/output memory management unit (IOMMU) interface, where the IOMMU frontend interface shares the TLB with the given node's MMU. In another embodiment, the host may control the given node's view of virtual address space via memory-mapped control registers.

  17. Address rituals as heuristics of social structure

    Directory of Open Access Journals (Sweden)

    E.F. Kotze

    2013-02-01

    Full Text Available The address form as linguistic variable has more realisation possibilities than any other, because semantic variation is involved and it reflects all the different interpersonal relations in the societal structure. Factors such as religious status, sex, kinship and age differences play a key role in the choice of the address form. It is hypothesised that the way in which address forms vary in a speech community is a linguistic reflection of the social norms determining the hierarchical structure of the community. Die aanspreekvorm as linguistiese veranderlike het meer verwesenlikingsmoontlikhede as enige ander vorm, want semantiese verskeidenheid is betrokke en dit reflekteer die verskillende interpersoonlike verhoudings in die gemeenskapstruktuur. Faktore soos religieuse status, geslag, verwantskap en ouderdomsverskille speel 'n sleutelrol in die aanspreekvorm. Daar word gehipotetiseer dat die wyse waarop aanspreekvorms in 'n spraakgemeenskap wissel, 'n linguistiese refleksie is van die sosiale norme wat die hierargiese struktuur van die gemeenskap bepaal.

  18. Centrally managed unified shared virtual address space

    Energy Technology Data Exchange (ETDEWEB)

    Wilkes, John

    2018-02-13

    Systems, apparatuses, and methods for managing a unified shared virtual address space. A host may execute system software and manage a plurality of nodes coupled to the host. The host may send work tasks to the nodes, and for each node, the host may externally manage the node's view of the system's virtual address space. Each node may have a central processing unit (CPU) style memory management unit (MMU) with an internal translation lookaside buffer (TLB). In one embodiment, the host may be coupled to a given node via an input/output memory management unit (IOMMU) interface, where the IOMMU frontend interface shares the TLB with the given node's MMU. In another embodiment, the host may control the given node's view of virtual address space via memory-mapped control registers.

  19. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  20. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  1. Content addressable memories in scientific instruments

    International Nuclear Information System (INIS)

    Lotto, I. de; Golinelli, S.

    1975-01-01

    The content-addressable-memory feature of a new system designed in these laboratories for non-destructive testing of nuclear reactor pressure vessels based on acoustic emission analysis is presented. The content addressable memory is divided into two parts: the first selects the most frequent events among incoming ones (FES: Frequent Event Selection memory), the second stores the frequent events singled out (FEM: Frequent Event Memory). The statistical behaviour of FES is analyzed, and experimental results are compared with theoretical ones; the model presented proved to be a useful tool in dimensioning the instrument store capacity. (Auth.)

  2. ADDRESS SEQUENCES FOR MULTI RUN RAM TESTING

    Directory of Open Access Journals (Sweden)

    V. N. Yarmolik

    2014-01-01

    Full Text Available A universal approach for generation of address sequences with specified properties is proposed and analyzed. A modified version of the Antonov and Saleev algorithm for Sobol sequences genera-tion is chosen as a mathematical description of the proposed method. Within the framework of the proposed universal approach, the Sobol sequences form a subset of the address sequences. Other sub-sets are also formed, which are Gray sequences, anti-Gray sequences, counter sequences and sequenc-es with specified properties.

  3. World Federation of Vascular Societies: presidential address

    DEFF Research Database (Denmark)

    Sillesen, Henrik Hegaard

    2010-01-01

    The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally imp...... throughout the world. In addition, for introduction of new treatments, training issues and dissemination of science a global organisation like the WFVS is needed.......The presidential address describes briefly the history of the World Federation for Vascular Societies (WFVS) and its objectives. Vascular Surgery today includes interventional procedures (open surgical and endovascular) in addition to risk factor reduction and medical treatment. It is equally...

  4. Addressing techniques of liquid crystal displays

    CERN Document Server

    Ruckmongathan, Temkar N

    2014-01-01

    Unique reference source that can be used from the beginning to end of a design project to aid choosing an appropriate LCD addressing technique for a given application This book will be aimed at design engineers who are likely to embed LCD drivers and controllers in many systems including systems on chip. Such designers face the challenge of making the right choice of an addressing technique that will serve them with best performance at minimal cost and complexity. Readers will be able to learn about various methods available for driving matrix LCDs and the comparisons at the end of each chap

  5. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  6. When Is Network Lasso Accurate?

    Directory of Open Access Journals (Sweden)

    Alexander Jung

    2018-01-01

    Full Text Available The “least absolute shrinkage and selection operator” (Lasso method has been adapted recently for network-structured datasets. In particular, this network Lasso method allows to learn graph signals from a small number of noisy signal samples by using the total variation of a graph signal for regularization. While efficient and scalable implementations of the network Lasso are available, only little is known about the conditions on the underlying network structure which ensure network Lasso to be accurate. By leveraging concepts of compressed sensing, we address this gap and derive precise conditions on the underlying network topology and sampling set which guarantee the network Lasso for a particular loss function to deliver an accurate estimate of the entire underlying graph signal. We also quantify the error incurred by network Lasso in terms of two constants which reflect the connectivity of the sampled nodes.

  7. Querying Large Biological Network Datasets

    Science.gov (United States)

    Gulsoy, Gunhan

    2013-01-01

    New experimental methods has resulted in increasing amount of genetic interaction data to be generated every day. Biological networks are used to store genetic interaction data gathered. Increasing amount of data available requires fast large scale analysis methods. Therefore, we address the problem of querying large biological network datasets.…

  8. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  9. Improving ecosystem service frameworks to address wicked problems

    Directory of Open Access Journals (Sweden)

    Kathryn K. Davies

    2015-06-01

    Full Text Available Complex problems often result from the multiple interactions between human activities and ecosystems. The interconnected nature of ecological and social systems should be considered if these "wicked problems" are to be addressed. Ecosystem service approaches provide an opportunity to link ecosystem function with social values, but in practice the essential role that social dynamics play in the delivery of outcomes remains largely unexplored. Social factors such as management regimes, power relationships, skills, and values, can dramatically affect the definition and delivery of ecosystem services. Input from a diverse group of stakeholders improves the capacity of ecosystem service approaches to address wicked problems by acknowledging diverse sets of values and accounting for conflicting world views. Participatory modeling can incorporate both social and ecological dynamics into decision making that involves stakeholders, but is itself a complex social undertaking that may not yield precise or predictable outcomes. We explore the efficacy of different types of participatory modeling in relation to the integration of social values into ecosystem services frameworks and the generation of four important elements of social capital needed to address wicked problems: enhancing social learning and capacity building; increasing transparency; mediating power; and building trust. Our findings indicate that mediated modeling, group mapping, and mental/conceptual modeling are likely to generate elements of social capital that can improve ecosystem service frameworks. Participatory simulation, system dynamic modeling, and Bayesian belief networks, if utilized in isolation, were found to have a low likelihood of generating the social capital needed to improve ecosystem services frameworks. Scenario planning, companion modeling, group model building, and participatory mapping all generate a moderate to high level of social capital elements that improve the

  10. The Effectiveness of Transgovernmental Networks

    DEFF Research Database (Denmark)

    Martinsen, Dorte Sindbjerg; Hobolth, Mogens

    2016-01-01

    participating in Solvit, an internal market problem-solving network, this paper investigates the role of transgovernmental networks in enforcing and managing the daily application of EU legislation by national authorities. We show that informal conflict resolution has become an important and effective tool...... for addressing misapplication of EU law. Anchored in national public administrations yet working under the ‘shadow of hierarchy’ (namely the Commission) transgovermental networks are in fact able to improve the compliance of domestic authorities....

  11. Social entrepreneurship and social networks

    OpenAIRE

    Dufays, Frédéric

    2013-01-01

    In this presentation, we argue that the sociology of social networks may provide interesting insights with regard to the emergence of social entrepreneurship both at micro and macro levels. There have already been several calls for research on social networks in the context of social entrepreneurship (Certo & Miller 2008; Gedajlovic, et al. 2013; Haugh 2007; Mair & Marti 2006; Short, et al. 2009). These calls often address the differences in structure and effects of social networks in a socia...

  12. ADDRESSING THE RISKS OF GLOBAL PRODUCT DEVELOPMENT

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Ahmed-Kristensen, Saeema

    2011-01-01

    to rework, misunderstandings, miscommunication and lower quality. This paper investigates how the organisation can reduce the negative aspects of offshoring by presenting two possible approaches; one which lessens the exposure to situations in which these negative impacts happen and another which addresses...

  13. Addressing Diversity: A Call for Action.

    Science.gov (United States)

    Henderson, Ingeborg

    1991-01-01

    Suggests a series of steps that individuals in the foreign language profession can take to effectively address the issue of demographic changes in the U.S. college student populations and keeping foreign language learning a feasible discipline in the future. (26 references) (GLR)

  14. Road Map to Address Cognitive Health

    Centers for Disease Control (CDC) Podcasts

    2014-06-09

    In this podcast, CDC’s Dr. Lynda Anderson highlights the important roles that states and communities can play in addressing cognitive health as part of overall health.  Created: 6/9/2014 by National Center for Chronic Disease Prevention and Health Promotion (NCCDPHP).   Date Released: 6/9/2014.

  15. Addressing food waste reduction in Denmark

    DEFF Research Database (Denmark)

    Halloran, Afton Marina Szasz; Clement, Jesper; Kornum, Niels

    2014-01-01

    , improvements in technology have made it more efficient to utilize food waste for biogas and compost, which improves nutrient cycling through the food system. Major efforts to address food waste in Denmark have mainly been promoted through civil society groups with governmental support, as well as by industry...

  16. 40 CFR 65.14 - Addresses.

    Science.gov (United States)

    2010-07-01

    ... 75202. Region VII (Iowa, Kansas, Missouri, Nebraska), Director, Air and Toxics Division, U.S. Environmental Protection Agency, 726 Minnesota Avenue, Kansas City, Kansas 66101. Region VIII (Colorado, Montana... authority has been delegated under section 112(l) of the Act. The mailing addresses for State agencies are...

  17. Addressing the Global Burden of Breast Cancer

    Science.gov (United States)

    The US National Cancer Institute’s Center for Global Health (CGH) has been a key partner in a multi-institutional expert team that has developed a set of publications to address foundational concerns in breast cancer care across the cancer care continuum and within limited resource settings.

  18. Addressing production stops in the food industry

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Herbert, Luke Thomas; Jacobsen, Peter

    2014-01-01

    This paper investigates the challenges in the food industry which causes the production lines to stop, illustrated by a case study of an SME size company in the baked goods sector in Denmark. The paper proposes key elements this sector needs to be aware of to effectively address production stops......, and gives examples of the unique challenges faced by the SME food industry....

  19. Rational Rhymes for Addressing Common Childhood Issues

    Science.gov (United States)

    Warren, Jeffrey M.

    2011-01-01

    Music-based interventions are valuable tools counselors can use when working with children. Specific types of music-based interventions, such as songs or rhymes, can be especially pertinent in addressing the thoughts, feelings, and behaviors of children. Rational-emotive behavior therapy (REBT) provides a therapeutic framework that encourages…

  20. 76 FR 80903 - Mandatory Declassification Review Addresses

    Science.gov (United States)

    2011-12-27

    ... John J. Kingman Road, Fort Belvoir, VA 22060-6201. (13) Missile Defense Agency. Missile Defense Agency... DEPARTMENT OF DEFENSE Office of the Secretary Mandatory Declassification Review Addresses AGENCY: Department of Defense. ACTION: Notice. SUMMARY: Pursuant to the Information Security Oversight Office's...

  1. Addressing Student Debt in the Classroom

    Science.gov (United States)

    Perkins, David; Johnston, Tim; Lytle, Rick

    2016-01-01

    Student debt is a national concern. The authors address debt in the classroom to enhance students' understanding of the consequences of debt and the need for caution when financing their education. However, student feedback indicates this understanding has a delayed effect on borrowing behavior and underscores the importance of making difficult…

  2. 37 CFR 301.2 - Official addresses.

    Science.gov (United States)

    2010-07-01

    ..., Room LM-401 in the James Madison Memorial Building, Monday through Friday, between 8:30 a.m. and 5 p.m., and be addressed as follows: Copyright Royalty Board, Library of Congress, James Madison Memorial... Royalty Board, Library of Congress, James Madison Memorial Building, 101 Independence Avenue, SE...

  3. Registering Names and Addresses for Information Technology.

    Science.gov (United States)

    Knapp, Arthur A.

    The identification of administrative authorities and the development of associated procedures for registering and accessing names and addresses of communications data systems are considered in this paper. It is noted that, for data communications systems using standards based on the Open Systems Interconnection (OSI) Reference Model specified by…

  4. Addressing Measurement Issues Related to Bullying Involvement

    Science.gov (United States)

    Casper, Deborah M.; Meter, Diana J.; Card, Noel A.

    2015-01-01

    In this article, we address measurement issues related to select aspects of bullying involvement with the goal of moving psychometrically sound measurement practices toward applied bullying research. We first provide a nontechnical introduction to psychometric considerations in measuring bullying involvement, highlighting the importance of…

  5. Volume 1: president's address, CNA committee reports

    International Nuclear Information System (INIS)

    The president's address summarizes the 1974-75 activities of the CNA and reports are given by CNA subcommittees on codes, standards and practices, economic development, education and manpower, international affairs, nuclear insurance, nuclear safety and environment, public relations, and technology. (E.C.B.)

  6. How Sociology Texts Address Gun Control

    Science.gov (United States)

    Tonso, William R.

    2004-01-01

    William R. Tonso has chosen an issue that he knows something about to examine how sociology textbooks address controversy. Appealing for gun control is fashionable, but it is at odds with a fondness that ordinary Americans have for their firearms--one that is supported by a growing body of research on deterrence to crime. There are two sides to…

  7. Transition through Teamwork: Professionals Address Student Access

    Science.gov (United States)

    Bube, Sue Ann; Carrothers, Carol; Johnson, Cinda

    2016-01-01

    Prior to 2013, there was no collaboration around the transition services for deaf and hard of hearing students in Washington State. Washington had numerous agencies providing excellent support, but those agencies were not working together. It was not until January 29, 2013, when pepnet 2 hosted the Building State Capacity to Address Critical…

  8. Addressing Sexual Violence as Student Affairs Work

    Science.gov (United States)

    Landreman, Lisa M.; Williamsen, Kaaren M.

    2018-01-01

    In this chapter, we outline the challenges campuses face in addressing sexual violence and Title IX compliance. We argue that there are critical roles for student affairs professionals in Title IX work in developing effective campus sexual violence prevention and response strategies.

  9. Programming chemistry in DNA-addressable bioreactors

    DEFF Research Database (Denmark)

    Fellermann, H.; Cardelli, L.

    2014-01-01

    . These markers serve as compartment addresses and allow for their targeted transport and fusion, thereby enabling reactions of previously separated chemicals. The overall system organization allows for the set-up of programmable chemistry in microfluidic or other automated environments. We introduce a simple...

  10. THE ROLE OF NUTRITIONAL INFORMATION IN ADDRESSING ...

    African Journals Online (AJOL)

    The paper discusses the role of nutritional information for addressing under-five child malnutrition in Tanzania. The paper is based on a master's dissertation whose objective was to determine the sources of nutritional information used to provide nutritional information to mothers in Maternal and Child Health (MCH) clinics, ...

  11. Machine-to-Machine networks: integration of M2M networks into companies' administrative networks

    OpenAIRE

    Pointereau, Romain

    2013-01-01

    This analysis will address the technical, economic and regulatory aspects and will identify the position taken by the various market actors. Integration of M2M Networks into Companies' Administrative Networks. Integración de redes M2M en redes administrativas de las empresas. Integració de xarxes M2M en xarxes administratives de les empreses.

  12. PCI bus content-addressable-memory (CAM) implementation on FPGA for pattern recognition/image retrieval in a distributed environment

    Science.gov (United States)

    Megherbi, Dalila B.; Yan, Yin; Tanmay, Parikh; Khoury, Jed; Woods, C. L.

    2004-11-01

    Recently surveillance and Automatic Target Recognition (ATR) applications are increasing as the cost of computing power needed to process the massive amount of information continues to fall. This computing power has been made possible partly by the latest advances in FPGAs and SOPCs. In particular, to design and implement state-of-the-Art electro-optical imaging systems to provide advanced surveillance capabilities, there is a need to integrate several technologies (e.g. telescope, precise optics, cameras, image/compute vision algorithms, which can be geographically distributed or sharing distributed resources) into a programmable system and DSP systems. Additionally, pattern recognition techniques and fast information retrieval, are often important components of intelligent systems. The aim of this work is using embedded FPGA as a fast, configurable and synthesizable search engine in fast image pattern recognition/retrieval in a distributed hardware/software co-design environment. In particular, we propose and show a low cost Content Addressable Memory (CAM)-based distributed embedded FPGA hardware architecture solution with real time recognition capabilities and computing for pattern look-up, pattern recognition, and image retrieval. We show how the distributed CAM-based architecture offers a performance advantage of an order-of-magnitude over RAM-based architecture (Random Access Memory) search for implementing high speed pattern recognition for image retrieval. The methods of designing, implementing, and analyzing the proposed CAM based embedded architecture are described here. Other SOPC solutions/design issues are covered. Finally, experimental results, hardware verification, and performance evaluations using both the Xilinx Virtex-II and the Altera Apex20k are provided to show the potential and power of the proposed method for low cost reconfigurable fast image pattern recognition/retrieval at the hardware/software co-design level.

  13. Address-event-based platform for bioinspired spiking systems

    Science.gov (United States)

    Jiménez-Fernández, A.; Luján, C. D.; Linares-Barranco, A.; Gómez-Rodríguez, F.; Rivas, M.; Jiménez, G.; Civit, A.

    2007-05-01

    Address Event Representation (AER) is an emergent neuromorphic interchip communication protocol that allows a real-time virtual massive connectivity between huge number neurons, located on different chips. By exploiting high speed digital communication circuits (with nano-seconds timings), synaptic neural connections can be time multiplexed, while neural activity signals (with mili-seconds timings) are sampled at low frequencies. Also, neurons generate "events" according to their activity levels. More active neurons generate more events per unit time, and access the interchip communication channel more frequently, while neurons with low activity consume less communication bandwidth. When building multi-chip muti-layered AER systems, it is absolutely necessary to have a computer interface that allows (a) reading AER interchip traffic into the computer and visualizing it on the screen, and (b) converting conventional frame-based video stream in the computer into AER and injecting it at some point of the AER structure. This is necessary for test and debugging of complex AER systems. In the other hand, the use of a commercial personal computer implies to depend on software tools and operating systems that can make the system slower and un-robust. This paper addresses the problem of communicating several AER based chips to compose a powerful processing system. The problem was discussed in the Neuromorphic Engineering Workshop of 2006. The platform is based basically on an embedded computer, a powerful FPGA and serial links, to make the system faster and be stand alone (independent from a PC). A new platform is presented that allow to connect up to eight AER based chips to a Spartan 3 4000 FPGA. The FPGA is responsible of the network communication based in Address-Event and, at the same time, to map and transform the address space of the traffic to implement a pre-processing. A MMU microprocessor (Intel XScale 400MHz Gumstix Connex computer) is also connected to the FPGA

  14. Network topology mapper

    Science.gov (United States)

    Quist, Daniel A [Los Alamos, NM; Gavrilov, Eugene M [Los Alamos, NM; Fisk, Michael E [Jemez, NM

    2008-01-15

    A method enables the topology of an acyclic fully propagated network to be discovered. A list of switches that comprise the network is formed and the MAC address cache for each one of the switches is determined. For each pair of switches, from the MAC address caches the remaining switches that see the pair of switches are located. For each pair of switches the remaining switches are determined that see one of the pair of switches on a first port and the second one of the pair of switches on a second port. A list of insiders is formed for every pair of switches. It is determined whether the insider for each pair of switches is a graph edge and adjacent ones of the graph edges are determined. A symmetric adjacency matrix is formed from the graph edges to represent the topology of the data link network.

  15. So you've got IPv6 address space. Can you defend it?

    OpenAIRE

    Sande, Mikal

    2014-01-01

    Internet Protocol version 6 (IPv6) is the successor of Internet Protocol version 4 (IPv4). IPv6 will become the next standard networking protocol on the Internet. It brings with it a great increase in address space, changes to network operations, and new network security concerns. In this thesis we examine IPv6 from a security perspective. The security of IPv6 is important to all protocols that use IPv6 on the Internet. The goal of this thesis is to introduce the reader to existing IPv6 secur...

  16. The Role of Local Authorities in Addressing Human Trafficking

    Directory of Open Access Journals (Sweden)

    Kathryn Rossiter

    2009-05-01

    Full Text Available Worldwide, it is estimated that nearly 4 million people fall victim to people traffickers every year. Trafficking is carried out mainly by Organised Criminal Networks and the victims are forced into prostitution, illegal labour, domestic slavery and petty crime. ROSSITER & BENFIELD: The Role of Local Authorities in Addressing Human Trafficking CJLG May 2009 128 On 1 April 2009, the United Kingdom signed up to the Council of Europe Convention on Action against Trafficking in Human Beings.1 The Convention, which has to date been ratified by 20 European countries, is legally binding and aims to promote and protect the rights of victims who have been tricked or forced into leaving their homes, moved to another country, or within their own country, and then exploited. Whilst it is national governments who are signatories to the Council of Europe Convention, local authorities have a key role to play in its successful implementation.

  17. GRACEnet: addressing policy needs through coordinated cross-location research

    Science.gov (United States)

    Jawson, Michael D.; Walthall, Charles W.; Shafer, Steven R.; Liebig, Mark; Franzluebbers, Alan J.; Follett, Ronald F.

    2012-01-01

    GRACEnet (Greenhouse gas Reduction through Agricultural Carbon Enhancement network) was conceived to build upon ongoing USDA Agricultural Research Service (ARS) research to improve soil productivity, while addressing the challenges and opportunities of interest in C sequestration from a climate change perspective. The vision for GRACEnet was and remains: Knowledge and information used to implement scientifically based agricultural management practices from the field to national policy scales on C sequestration, greenhouse gas (GHG) emissions, and environmental benefits. The national focus of GRACEnet uses a standardized approach by ARS laboratories and university and land manager (e.g. farmer and rancher) cooperators to assess C sequestration and GHG emission from different crop and grassland systems. Since 2002, GRACEnet has significantly expanded GHG mitigation science and delivered usable information to agricultural research and policy organizations. Recent developments suggest GRACEnet will have international impact by contributing leadership and technical guidance for the Global Research Alliance on Agricultural Greenhouse Gases.

  18. Adverse Outcome Pathway Networks II: Network Analytics.

    Science.gov (United States)

    Villeneuve, Daniel L; Angrish, Michelle M; Fortin, Marie C; Katsiadaki, Ioanna; Leonard, Marc; Margiotta-Casaluci, Luigi; Munn, Sharon; O'Brien, Jason M; Pollesch, Nathan L; Smith, L Cody; Zhang, Xiaowei; Knapen, Dries

    2018-02-28

    Toxicological responses to stressors are more complex than the simple one biological perturbation to one adverse outcome model portrayed by individual adverse outcome pathways (AOPs). Consequently, the AOP framework was designed to facilitate de facto development of AOP networks that can aid understanding and prediction of pleiotropic and interactive effects more common to environmentally realistic, complex exposure scenarios. The present paper introduces nascent concepts related to the qualitative analysis of AOP networks. First, graph theory-based approaches for identifying important topological features are illustrated using two example AOP networks derived from existing AOP descriptions. Second, considerations for identifying the most significant path(s) through an AOP network from either a biological or risk assessment perspective are described. Finally, approaches for identifying interactions among AOPs that may result in additive, synergistic, or antagonistic responses, or previously undefined emergent patterns of response, are introduced. Along with a companion article (Knapen et al. part I), these concepts set the stage for development of tools and case studies that will facilitate more rigorous analysis of AOP networks, and the utility of AOP network-based predictions, for use in research and regulatory decision-making. Collectively, this work addresses one of the major themes identified through a SETAC Horizon Scanning effort focused on advancing the AOP framework. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  19. Interdisciplinary and physics challenges of network theory

    Science.gov (United States)

    Bianconi, Ginestra

    2015-09-01

    Network theory has unveiled the underlying structure of complex systems such as the Internet or the biological networks in the cell. It has identified universal properties of complex networks, and the interplay between their structure and dynamics. After almost twenty years of the field, new challenges lie ahead. These challenges concern the multilayer structure of most of the networks, the formulation of a network geometry and topology, and the development of a quantum theory of networks. Making progress on these aspects of network theory can open new venues to address interdisciplinary and physics challenges including progress on brain dynamics, new insights into quantum technologies, and quantum gravity.

  20. Innovation in Multiple Networks and Networks of Networks: The Case of the Fruit Sector in Emilia‐Romagna

    Directory of Open Access Journals (Sweden)

    Davide Viaggi

    2013-02-01

    Full Text Available In the paper we examine the issue of food systems in which farms participate in multiple networks that, for their part, tend also to be members of networks of networks. The issue is addressed through a descriptive analysis of the fruit sector in Emilia‐Romagna (Italy. The farms in the area tend to join a different network for each product/product type. Innovation networks are embedded in commercialization or input provider networks, but separate (parallel networks also exist, particularly for basic research activities. Networks of networks are largely a product of the cooperative system. The paper concludes by emphasising the need for further research in multiple networking strategies and the connection betweencommercialisation networks and innovation.

  1. ALI (Autonomous Lunar Investigator): Revolutionary Approach to Exploring the Moon with Addressable Reconfigurable Technology

    Science.gov (United States)

    Clark, P. E.; Curtis, S. A.; Rilee, M. L.; Floyd, S. R.

    2005-01-01

    Addressable Reconfigurable Technology (ART) based structures: Mission Concepts based on Addressable Reconfigurable Technology (ART), originally studied for future ANTS (Autonomous Nanotechnology Swarm) Space Architectures, are now being developed as rovers for nearer term use in lunar and planetary surface exploration. The architecture is based on the reconfigurable tetrahedron as a building block. Tetrahedra are combined to form space-filling networks, shaped for the required function. Basic structural components are highly modular, addressable arrays of robust nodes (tetrahedral apices) from which highly reconfigurable struts (tetrahedral edges), acting as supports or tethers, are efficiently reversibly deployed/stowed, transforming and reshaping the structures as required.

  2. Forms of Address as Discrete Modal Operators

    Directory of Open Access Journals (Sweden)

    Wojciech Paweł Sosnowski

    2016-12-01

    Full Text Available Forms of Address as Discrete Modal Operators The category of expressions of politeness includes, among others, forms of address. Forms of address express honorification. Honorification can be defined as a special type of meaning that consists of information about the social and interpersonal relations between the speaker and the addressee, the speaker and the hearer, and the speaker and the protagonist of the predication. As far as their place in the syntactic structure is concerned, forms of address can either be integrated with the other elements of a predication or not. However, they are always part of a predication’s semantic structure. Moreover, forms of address convey the speaker’s attitude to the meaning of the predicate that they want to convey, which consequently means that forms of address also carry a modal element. Modality can be defined as a situation in which an individual is in a particular mental state, i.e. exhibits some kind of attitude to a situation or a type of situations. Forms of address can be categorised as modal operators conveying imperatives, requests, suppositions, etc. The term "operator" can be used for a unit of language when it changes the semantic structure of the predication. My research on honorification is mainly based on contemporary corpora, both monolingual and multilingual. In the present study, I analyse forms of address which carry imperative and optative meanings.   Formy adresatywne jako dyskretne operatory modalne W obrębie wyrażeń realizujących funkcje grzecznościowe znajduje się grupa form adresatywnych. Są one częścią kategorii honoryfikatywności rozumianej jako szczególny rodzaj znaczenia zawartego w treści wypowiedzi, informację o towarzysko-społecznej relacji między nadawcą a odbiorcą, nadawcą a słuchaczem oraz nadawcą a bohaterem wypowiedzi. Gramatycznie formy adresatywne mogą być zarówno zintegrowane, jak i niezintegrowane syntaktycznie z resztą wypowiedzi, ale

  3. Privacy Breach Analysis in Social Networks

    Science.gov (United States)

    Nagle, Frank

    This chapter addresses various aspects of analyzing privacy breaches in social networks. We first review literature that defines three types of privacy breaches in social networks: interactive, active, and passive. We then survey the various network anonymization schemes that have been constructed to address these privacy breaches. After exploring these breaches and anonymization schemes, we evaluate a measure for determining the level of anonymity inherent in a network graph based on its topological structure. Finally, we close by emphasizing the difficulty of anonymizing social network data while maintaining usability for research purposes and offering areas for future work.

  4. Advanced communication and network requirements in Europe

    DEFF Research Database (Denmark)

    Falch, Morten; Enemark, Rasmus

    The report address diffusion of new tele-application, focusing on potential use and potential tele-trafic genrated as a consequense. The applications investigated are: Teleworking, distance learning, research and university network, applications aimed at SMEs, health networks, a trans European pu...... public administation network, city information highway, road-trafic manegement, air traffic control and electronic quotation.......The report address diffusion of new tele-application, focusing on potential use and potential tele-trafic genrated as a consequense. The applications investigated are: Teleworking, distance learning, research and university network, applications aimed at SMEs, health networks, a trans European...

  5. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  6. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  7. Bayesian networks and food security - An introduction

    NARCIS (Netherlands)

    Stein, A.

    2004-01-01

    This paper gives an introduction to Bayesian networks. Networks are defined and put into a Bayesian context. Directed acyclical graphs play a crucial role here. Two simple examples from food security are addressed. Possible uses of Bayesian networks for implementation and further use in decision

  8. Addressing mixed waste in plutonium processing

    International Nuclear Information System (INIS)

    Christensen, D.C.; Sohn, C.L.; Reid, R.A.

    1991-01-01

    The overall goal is the minimization of all waste generated in actinide processing facilities. Current emphasis is directed toward reducing and managing mixed waste in plutonium processing facilities. More specifically, the focus is on prioritizing plutonium processing technologies for development that will address major problems in mixed waste management. A five step methodological approach to identify, analyze, solve, and initiate corrective action for mixed waste problems in plutonium processing facilities has been developed

  9. Do pediatric gastroenterology doctors address pediatric obesity?

    OpenAIRE

    Batra, Suruchi; Yee, Caitlin; Diez, Bernadette; Nguyen, Nicholas; Sheridan, Michael J; Tufano, Mark; Sikka, Natalie; Townsend, Stacie; Hourigan, Suchitra

    2017-01-01

    Objectives: To assess how often obesity is acknowledged at pediatric gastroenterology outpatient visits. Methods: A retrospective chart review was performed to identify obese children seen at a gastroenterology subspecialty clinic over a 1-year period of time; 132 children were identified. Demographics, obesity comorbidities, reasons for referral, diagnosis of obesity, and a plan to address obesity were abstracted. Chi-square or Fisher?s exact tests were used to examine statistical associatio...

  10. Forest Policies Addressing Climate Change in China

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    As a developing country with a large population and a fragile ecological environment, China is particularly vulnerable to the adverse effects of climate change. Beginning with the Rio Conference of 1992 China has played a progressively enhanced role in combating climate change. A series of policies and measures to address climate change have been taken in the overall context of national sustainable development strategy, making positive contributions to the mitigation and adaptation to climate change, among ...

  11. Opening address; Allocution d`ouverture

    Energy Technology Data Exchange (ETDEWEB)

    Carle, R

    1996-12-31

    In this opening address the president of WANO underlines the relative isolation of the Kozloduy NPP from the international nuclear community due to the lack of information and contacts. The need for eliminating the isolation is stressed and the following measures are proposed: to make the Kozloduy NPP an active member of the international community; to improve and maintain the safety level; to contribute to the electricity exchange system of Southeastern Europe.

  12. Addressing consumerization of IT risks with nudging

    OpenAIRE

    Iryna Yevseyeva; James Turland; Charles Morisset; Lynne Coventry; Thomas Groß

    2015-01-01

    In this work we address the main issues of Information Technology (IT) consumerisation that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabil...

  13. Transformed composite sequences for improved qubit addressing

    Science.gov (United States)

    Merrill, J. True; Doret, S. Charles; Vittorini, Grahame; Addison, J. P.; Brown, Kenneth R.

    2014-10-01

    Selective laser addressing of a single atom or atomic ion qubit can be improved using narrow-band composite pulse sequences. We describe a Lie-algebraic technique to generalize known narrow-band sequences and introduce sequences related by dilation and rotation of sequence generators. Our method improves known narrow-band sequences by decreasing both the pulse time and the residual error. Finally, we experimentally demonstrate these composite sequences using 40Ca+ ions trapped in a surface-electrode ion trap.

  14. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  15. SIMS: addressing the problem of heterogeneity in databases

    Science.gov (United States)

    Arens, Yigal

    1997-02-01

    The heterogeneity of remotely accessible databases -- with respect to contents, query language, semantics, organization, etc. -- presents serious obstacles to convenient querying. The SIMS (single interface to multiple sources) system addresses this global integration problem. It does so by defining a single language for describing the domain about which information is stored in the databases and using this language as the query language. Each database to which SIMS is to provide access is modeled using this language. The model describes a database's contents, organization, and other relevant features. SIMS uses these models, together with a planning system drawing on techniques from artificial intelligence, to decompose a given user's high-level query into a series of queries against the databases and other data manipulation steps. The retrieval plan is constructed so as to minimize data movement over the network and maximize parallelism to increase execution speed. SIMS can recover from network failures during plan execution by obtaining data from alternate sources, when possible. SIMS has been demonstrated in the domains of medical informatics and logistics, using real databases.

  16. Hydrocomplexity: Addressing water security and emergent environmental risks

    Science.gov (United States)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  17. What Would Peggy Do? 14th Annual Peggy Glanville-Hicks Address 2012

    Science.gov (United States)

    Harvey, Michael Kieran

    2012-01-01

    The New Music Network established the Peggy Glanville-Hicks Address in 1999 in honour of one of Australia's great international composers. It is an annual forum for ideas relating to the creation and performance of Australian music. In the spirit of the great Australian composer Peggy Glanville-Hicks, an outstanding advocate of Australian music…

  18. A scalable addressing method when using IMS as a service bus infrastructure

    NARCIS (Netherlands)

    Stokking, H.M.; Hartog, F.T.H. den; Walraven, F.A.

    2009-01-01

    The dynamic provisioning of SIP addresses is a challenge when many devices and services are dynamically attached to an IMS network. Manual provisioning is too labor intensive for a telecommunications operator, and it is difficult to do it in a way that allows those devices and services access to all

  19. Game theory in communication networks cooperative resolution of interactive networking scenarios

    CERN Document Server

    Antoniou, Josephina

    2012-01-01

    A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game T

  20. Urban networks of tomorrow

    International Nuclear Information System (INIS)

    Bothe, D; Kaufmann, T.

    2016-01-01

    The requirements for urban utility grids are subject to a considerable change. The diversification of the energy supply and the changing feed-in structure (central -> decentral) also influence the operation of the existing networks considerably. Therefore, the focus of future studies will be on the flexibility of energy supply and the energy-carrier-wide network analysis or planning. These aspects are addressed, among other things, within the URBEM project, with a focus on a holistic, interdisciplinary approach. On the basis of separately performed thermal and electrical network calculations an optimization task is defined (for example, minimization of operating resources, minimization of CO2 emissions) and solved under technical conditions. The scenarios for the period 2030 and 2050 developed in the URBEM project serve as the basis for the optimization. The results of the calculations show current utilization or bottlenecks in the supply networks as well as optimum future supply structures for development areas in urban areas. (rössner) [de

  1. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  2. Keynote address on prospects for new electricity

    International Nuclear Information System (INIS)

    Dominioni, F.C.; )

    1996-01-01

    The electricity industry will undoubtedly experience an expansion. This problem constitutes a major challenge for the electricity industry in all its sectors: production, transmission and distribution. The increased use of electricity can, at the same time, improve both the environment and social well-being. Examples of advancement are the progressive introduction of electric vehicles into urban traffic and to the implementation of telecommunications networks. Such measures are likely to considerably reduce pollution in cities caused by conventional means of transport. What is now necessary is to identify the means to reconcile this expansion with the introduction of an electricity supply system which is both sustainable and respects the environment. (R.P.)

  3. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  4. Overview of an address and purpose of the workshop [ISO Workshop on address standards: Considering the issues related to an international address standard

    CSIR Research Space (South Africa)

    Cooper, Antony K

    2008-05-01

    Full Text Available ) (ISO 19112) Precision Redirectable Standards Postal address Street delivery address Y N N Y N Y Fine Y UPU S42 PO Box or Private Bag Y N N Y Fine to Coarse Y UPU S42 Post Restante Y N N Y N Y Coarse Y UPU S42 Delivery address... (for goods, etc) Street address Y N N Y N Y Fine N Intersection address Y N N Y N Y Fine N Landmark address Y N N Y N Y Fine to Moderate N Building address Y N N Y N Y Fine N Site address Y N N Y N Y Fine to Coarse N Farm...

  5. MATCHING ALTERNATIVE ADDRESSES: A SEMANTIC WEB APPROACH

    Directory of Open Access Journals (Sweden)

    S. Ariannamazi

    2015-12-01

    Full Text Available Rapid development of crowd-sourcing or volunteered geographic information (VGI provides opportunities for authoritatives that deal with geospatial information. Heterogeneity of multiple data sources and inconsistency of data types is a key characteristics of VGI datasets. The expansion of cities resulted in the growing number of POIs in the OpenStreetMap, a well-known VGI source, which causes the datasets to outdate in short periods of time. These changes made to spatial and aspatial attributes of features such as names and addresses might cause confusion or ambiguity in the processes that require feature’s literal information like addressing and geocoding. VGI sources neither will conform specific vocabularies nor will remain in a specific schema for a long period of time. As a result, the integration of VGI sources is crucial and inevitable in order to avoid duplication and the waste of resources. Information integration can be used to match features and qualify different annotation alternatives for disambiguation. This study enhances the search capabilities of geospatial tools with applications able to understand user terminology to pursuit an efficient way for finding desired results. Semantic web is a capable tool for developing technologies that deal with lexical and numerical calculations and estimations. There are a vast amount of literal-spatial data representing the capability of linguistic information in knowledge modeling, but these resources need to be harmonized based on Semantic Web standards. The process of making addresses homogenous generates a helpful tool based on spatial data integration and lexical annotation matching and disambiguating.

  6. Best Practices in Hiring: Addressing Unconscious Bias

    Science.gov (United States)

    Simpson, Caroline E.

    2012-01-01

    Research has shown that implementing certain hiring practices will increase diversity in the workplace while enhancing academic quality. All of these practices rely on addressing the issue of 'unconscious bias.' A brief overview of unconscious bias--what it is, how it works, and simple measures to counter it--will be presented. Successful strategies, actions, and recommendations for implementing best recruiting and hiring practices, which have been proven to enhance academic excellence by ensuring a deep and diverse applicant pool, will also be presented.

  7. Building technology services that address student needs.

    Science.gov (United States)

    Le Ber, Jeanne M; Lombardo, Nancy T; Wimmer, Erin

    2015-01-01

    A 16-question technology use survey was conducted to assess incoming health sciences students' knowledge of and interest in current technologies, and to identify student device and tool preferences. Survey questions were developed by colleagues at a peer institution and then edited to match this library's student population. Two years of student responses have been compiled, compared, and reviewed as a means for informing library decisions related to technology and resource purchases. Instruction and event programming have been revised to meet student preferences. Based on the number of students using Apple products, librarians are addressing the need to become more proficient with this platform.

  8. HEP technologies to address medical imaging challenges

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Developments in detector technologies aimed at solving challenges in present and future CERN experiments, particularly at the LHC, have triggered exceptional advances in the performance of medical imaging devices, allowing for a spectacular progress in in-vivo molecular imaging procedures, which are opening the way for tailored therapies of major diseases. This talk will briefly review the recent history of this prime example of technology transfer from HEP experiments to society, will describe the technical challenges being addressed by some ongoing projects, and will present a few new ideas for further developments and their foreseeable impact.

  9. Addressing Circuitous Currents MVDC Power Systems Protection

    Science.gov (United States)

    2017-12-31

    Addressing Circuitous Currents MVDC Power Systems Protection 5b. GRANT NUMBER N00014-16-1-3113 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR($) Sd. PROJECT NUMBER...efficiency. A challenge with DC distribution is electrical protection . Z-source DC breakers alt! an pti n b&i g cvr.sidcrcd and this w rk ~xplores...zonal distribution, electric ship 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT u u u uu 18. NUMBER

  10. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  11. Addressing Longevity’ Heterogeneity in Pension Scheme Design

    OpenAIRE

    Ayuso, Mercedes; Bravo, Jorge Miguel; Holzmann, Robert

    2017-01-01

    Ayuso, M., Bravo, J. M., & Holzmann, R. (2017). Addressing Longevity’ Heterogeneity in Pension Scheme Design. Journal of Finance and Economics, 6(1), 1-21. DOI: 10.12735/jfe.v6n1p1 This paper demonstrates that the link between heterogeneity in longevity and lifetime income across countries is mostly high and often increasing; that it translates into an implicit tax/subsidy, with rates reaching 20 percent and higher in some countries; that such rates risk perverting redistributive objective...

  12. Global Operations Networks in Motion

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Wæhrens, Brian Vejrum

    2009-01-01

    This paper addresses the phenomenon of global operations networks and how they change over time. The paper is based on the cases of three Danish companies and their global operations networks. It finds a number of common patterns highlighting some organisational effects and managerial challenges...... the companies face regarding rapid changes in their networks configurations and capabilities. The paper details the variables determining these changes and suggests how the on-going interplay between the focal organisation, its network partners, and their various contextual conditions can be approached....

  13. TCP/IP Network Administration

    CERN Document Server

    Hunt, Craig

    2002-01-01

    This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial

  14. Network management, status and directions

    International Nuclear Information System (INIS)

    Cottrell, R.L.A.; Streater, T.C.

    1992-09-01

    It has been said that the ''network is the system''. This implies providing levels of service, reliability, predictability and availability that are commensurate with or better than those that individual computers provide today. To provide this requires integrated network management for interconnected networks of heterogeneous devices covering both the local campus and across the world and spanning many administrative domains. This talk will review the status of existing tools to address management for networks. It draws on experience from both within and outside the HEP community

  15. Interactive Network Exploration with Orange

    Directory of Open Access Journals (Sweden)

    Miha Štajdohar

    2013-04-01

    Full Text Available Network analysis is one of the most widely used techniques in many areas of modern science. Most existing tools for that purpose are limited to drawing networks and computing their basic general characteristics. The user is not able to interactively and graphically manipulate the networks, select and explore subgraphs using other statistical and data mining techniques, add and plot various other data within the graph, and so on. In this paper we present a tool that addresses these challenges, an add-on for exploration of networks within the general component-based environment Orange.

  16. Artificial neural network applications in the calibration of spark-ignition engines: An overview

    Directory of Open Access Journals (Sweden)

    Richard Fiifi Turkson

    2016-09-01

    Full Text Available Emission legislation has become progressively tighter, making the development of new internal combustion engines very challenging. New engine technologies for complying with these regulations introduce an exponential dependency between the number of test combinations required for obtaining optimum results and the time and cost outlays. This makes the calibration task very expensive and virtually impossible to carry out. The potential use of trained neural networks in combination with Design of Experiments (DoE methods for engine calibration has been a subject of research activities in recent times. This is because artificial neural networks, compared with other data-driven modeling techniques, perform better in satisfying a majority of the modeling requirements for engine calibration including the curse of dimensionality; the use of DoE for obtaining few measurements as practicable, with the aim of reducing engine calibration costs; the required flexibility that allows model parameters to be optimized to avoid overfitting; and the facilitation of automated online optimization during the engine calibration process that eliminates the need for user intervention. The purpose of this review is to give an overview of the various applications of neural networks in the calibration of spark-ignition engines. The identified and discussed applications include system identification for rapid prototyping, virtual sensing, use of neural networks as look-up table surrogates, emerging control strategies and On-Board Diagnostic (OBD applications. The demerits of neural networks, future possibilities and alternatives were also discussed.

  17. Optical storage networking

    Science.gov (United States)

    Mohr, Ulrich

    2001-11-01

    For efficient business continuance and backup of mission- critical data an inter-site storage network is required. Where traditional telecommunications costs are prohibitive for all but the largest organizations, there is an opportunity for regional carries to deliver an innovative storage service. This session reveals how a combination of optical networking and protocol-aware SAN gateways can provide an extended storage networking platform with the lowest cost of ownership and the highest possible degree of reliability, security and availability. Companies of every size, with mainframe and open-systems environments, can afford to use this integrated service. Three mayor applications are explained; channel extension, Network Attached Storage (NAS), Storage Area Networks (SAN) and how optical networks address the specific requirements. One advantage of DWDM is the ability for protocols such as ESCON, Fibre Channel, ATM and Gigabit Ethernet, to be transported natively and simultaneously across a single fiber pair, and the ability to multiplex many individual fiber pairs over a single pair, thereby reducing fiber cost and recovering fiber pairs already in use. An optical storage network enables a new class of service providers, Storage Service Providers (SSP) aiming to deliver value to the enterprise by managing storage, backup, replication and restoration as an outsourced service.

  18. Addressing firefighter safety around solar PV systems

    Energy Technology Data Exchange (ETDEWEB)

    Harris, B. [Sustainable Energy Technologies, Calgary, AB (Canada)

    2010-11-15

    The article discussed new considerations for installing photovoltaic (PV) systems that address the needs of fire service personnel. The presence of a PV system presents a multitude of dangers for firefighters, including electrical shock, the inhalation of toxic gases from being unable to cut a hole through the roof, falling debris and flying glass, and dead loading on a compromised structure and tripping on conduits. Mapping systems should be modified so that buildings with PV systems are identified for first responders, including firefighters who should learn that solar modules present an electrical hazard during the day but not at night; covering PV modules with foam or salvage covers may not shut the system down to a safe level; it takes a few moments for the power in PV modules to reduce to zero; and PV modules or conduit should never be cut, broke, chopped, or walked upon. The California Department of Forestry and Fire Protection recommends creating pathways and allowing easier access to the roof by setting the modules back from roof edges, creating a structurally sound pathway for firefighters to walk on and space to cut ventilation holes. However, the setback rule makes the economics of solar installation less viable for residential applications. The technological innovations aimed at addressing system safety all focus on limiting firefighter contact with live electrical components to within the extra-low-voltage (ELV) band. Some of the inverters on the market that support ELV system architecture were described. 1 fig.

  19. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  20. Technological Developments in Networking, Education and Automation

    CERN Document Server

    Elleithy, Khaled; Iskander, Magued; Kapila, Vikram; Karim, Mohammad A; Mahmood, Ausif

    2010-01-01

    "Technological Developments in Networking, Education and Automation" includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent

  1. Home networking architecture for IPv6

    OpenAIRE

    Arkko, Jari; Weil, Jason; Troan, Ole; Brandt, Anders

    2012-01-01

    This text describes evolving networking technology within increasingly large residential home networks. The goal of this document is to define an architecture for IPv6-based home networking while describing the associated principles, considerations and requirements. The text briefly highlights the specific implications of the introduction of IPv6 for home networking, discusses the elements of the architecture, and suggests how standard IPv6 mechanisms and addressing can be employed in home ne...

  2. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  3. Addressing submarine geohazards through scientific drilling

    Science.gov (United States)

    Camerlenghi, A.

    2009-04-01

    Natural submarine geohazards (earthquakes, volcanic eruptions, landslides, volcanic island flank collapses) are geological phenomena originating at or below the seafloor leading to a situation of risk for off-shore and on-shore structures and the coastal population. Addressing submarine geohazards means understanding their spatial and temporal variability, the pre-conditioning factors, their triggers, and the physical processes that control their evolution. Such scientific endeavour is nowadays considered by a large sector of the international scientific community as an obligation in order to contribute to the mitigation of the potentially destructive societal effects of submarine geohazards. The study of submarine geohazards requires a multi-disciplinary scientific approach: geohazards must be studied through their geological record; active processes must be monitored; geohazard evolution must be modelled. Ultimately, the information must be used for the assessment of vulnerability, risk analysis, and development of mitigation strategies. In contrast with the terrestrial environment, the oceanic environment is rather hostile to widespread and fast application of high-resolution remote sensing techniques, accessibility for visual inspection, sampling and installation of monitoring stations. Scientific Drilling through the IODP (including the related pre site-survey investigations, sampling, logging and in situ measurements capability, and as a platform for deployment of long term observatories at the surface and down-hole) can be viewed as the centre of gravity of an international, coordinated, multi-disciplinary scientific approach to address submarine geohazards. The IODP Initial Science Plan expiring in 2013 does not address openly geohazards among the program scientific objectives. Hazards are referred to mainly in relation to earthquakes and initiatives towards the understanding of seismogenesis. Notably, the only drilling initiative presently under way is the

  4. Event generators for address event representation transmitters

    Science.gov (United States)

    Serrano-Gotarredona, Rafael; Serrano-Gotarredona, Teresa; Linares Barranco, Bernabe

    2005-06-01

    Address Event Representation (AER) is an emergent neuromorphic interchip communication protocol that allows for real-time virtual massive connectivity between huge number neurons located on different chips. By exploiting high speed digital communication circuits (with nano-seconds timings), synaptic neural connections can be time multiplexed, while neural activity signals (with mili-seconds timings) are sampled at low frequencies. Also, neurons generate 'events' according to their activity levels. More active neurons generate more events per unit time, and access the interchip communication channel more frequently, while neurons with low activity consume less communication bandwidth. In a typical AER transmitter chip, there is an array of neurons that generate events. They send events to a peripheral circuitry (let's call it "AER Generator") that transforms those events to neurons coordinates (addresses) which are put sequentially on an interchip high speed digital bus. This bus includes a parallel multi-bit address word plus a Rqst (request) and Ack (acknowledge) handshaking signals for asynchronous data exchange. There have been two main approaches published in the literature for implementing such "AER Generator" circuits. They differ on the way of handling event collisions coming from the array of neurons. One approach is based on detecting and discarding collisions, while the other incorporates arbitration for sequencing colliding events . The first approach is supposed to be simpler and faster, while the second is able to handle much higher event traffic. In this article we will concentrate on the second arbiter-based approach. Boahen has been publishing several techniques for implementing and improving the arbiter based approach. Originally, he proposed an arbitration squeme by rows, followed by a column arbitration. In this scheme, while one neuron was selected by the arbiters to transmit his event out of the chip, the rest of neurons in the array were

  5. Addressing health literacy in patient decision aids

    Science.gov (United States)

    2013-01-01

    Background Effective use of a patient decision aid (PtDA) can be affected by the user’s health literacy and the PtDA’s characteristics. Systematic reviews of the relevant literature can guide PtDA developers to attend to the health literacy needs of patients. The reviews reported here aimed to assess: 1. a) the effects of health literacy / numeracy on selected decision-making outcomes, and b) the effects of interventions designed to mitigate the influence of lower health literacy on decision-making outcomes, and 2. the extent to which existing PtDAs a) account for health literacy, and b) are tested in lower health literacy populations. Methods We reviewed literature for evidence relevant to these two aims. When high-quality systematic reviews existed, we summarized their evidence. When reviews were unavailable, we conducted our own systematic reviews. Results Aim 1: In an existing systematic review of PtDA trials, lower health literacy was associated with lower patient health knowledge (14 of 16 eligible studies). Fourteen studies reported practical design strategies to improve knowledge for lower health literacy patients. In our own systematic review, no studies reported on values clarity per se, but in 2 lower health literacy was related to higher decisional uncertainty and regret. Lower health literacy was associated with less desire for involvement in 3 studies, less question-asking in 2, and less patient-centered communication in 4 studies; its effects on other measures of patient involvement were mixed. Only one study assessed the effects of a health literacy intervention on outcomes; it showed that using video to improve the salience of health states reduced decisional uncertainty. Aim 2: In our review of 97 trials, only 3 PtDAs overtly addressed the needs of lower health literacy users. In 90% of trials, user health literacy and readability of the PtDA were not reported. However, increases in knowledge and informed choice were reported in those studies

  6. Global Optimization for Transport Network Expansion and Signal Setting

    OpenAIRE

    Liu, Haoxiang; Wang, David Z. W.; Yue, Hao

    2015-01-01

    This paper proposes a model to address an urban transport planning problem involving combined network design and signal setting in a saturated network. Conventional transport planning models usually deal with the network design problem and signal setting problem separately. However, the fact that network capacity design and capacity allocation determined by network signal setting combine to govern the transport network performance requires the optimal transport planning to consider the two pr...

  7. Adresse inconnue / Address unknown / Suchwiin Bulmyeong

    Directory of Open Access Journals (Sweden)

    Serge Gruzinski

    2005-03-01

    Full Text Available Tous les films asiatiques parlent de métissage, même ceux qui se présentent comme de vastes fresques historiques perdues dans le temps. Les emprunts aux traditions hollywoodiennes et européennes n'ont cessé d'enrichir une cinématographie aussi ancienne que celle du monde occidental. Dans Adresse inconnue (Address unknown le cinéaste coréen Kim Ki-duk explore l'expérience du métissage et le corps du métis à la frontière entre Corée du Nord et Corée du sud. Fils d'un GI américain et noir et d...

  8. Adresse inconnue / Address unknown / Suchwiin Bulmyeong

    OpenAIRE

    Serge Gruzinski

    2005-01-01

    Tous les films asiatiques parlent de métissage, même ceux qui se présentent comme de vastes fresques historiques perdues dans le temps. Les emprunts aux traditions hollywoodiennes et européennes n'ont cessé d'enrichir une cinématographie aussi ancienne que celle du monde occidental. Dans Adresse inconnue (Address unknown) le cinéaste coréen Kim Ki-duk explore l'expérience du métissage et le corps du métis à la frontière entre Corée du Nord et Corée du sud. Fils d'un GI américain et noir et d'...

  9. How is environmental conflict addressed by SIA?

    International Nuclear Information System (INIS)

    Barrow, C.J.

    2010-01-01

    The fields of Environmental Conflict Management (ECM), Environmental Conflict Resolution (ECR), and Peace and Conflict Impact Assessment (PCIA) have become well established; however, as yet there has not been much use of Social Impact Assessment (SIA) to manage environmental conflicts. ECM, ECR and PCIA are mainly undertaken when problems are advanced or, more likely, have run their course (post-conflict). This paper examines how conflict is addressed by SIA and whether there is potential to develop it for more proactive assessment of conflicts (pre-conflict or while things develop). SIA has the potential to identify and clarify the cause(s) of environmental and natural resources conflicts, and could possibly enable some avoidance or early mitigation. A promising approach may be for 'conflict-aware' SIA to watch for critical conflict stages or thresholds and to monitor stakeholders. Effective conflict-aware SIA might also significantly contribute to efforts to achieve sustainable development.

  10. Applying evolutionary biology to address global challenges

    Science.gov (United States)

    Carroll, Scott P.; Jørgensen, Peter Søgaard; Kinnison, Michael T.; Bergstrom, Carl T.; Denison, R. Ford; Gluckman, Peter; Smith, Thomas B.; Strauss, Sharon Y.; Tabashnik, Bruce E.

    2014-01-01

    Two categories of evolutionary challenges result from escalating human impacts on the planet. The first arises from cancers, pathogens and pests that evolve too quickly, and the second from the inability of many valued species to adapt quickly enough. Applied evolutionary biology provides a suite of strategies to address these global challenges that threaten human health, food security, and biodiversity. This review highlights both progress and gaps in genetic, developmental and environmental manipulations across the life sciences that either target the rate and direction of evolution, or reduce the mismatch between organisms and human-altered environments. Increased development and application of these underused tools will be vital in meeting current and future targets for sustainable development. PMID:25213376

  11. Addressing Safeguards Challenges for the Future

    Energy Technology Data Exchange (ETDEWEB)

    Majali, Raed; Yim, Man-Sung [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2015-10-15

    IAEA safeguard system is considered the corner stone of the international nuclear nonproliferation regime. Effective implementation of this legal instrument enables the IAEA to draw a conclusion with a high degree of confidence on the peaceful use of nuclear material and activities in the state. This paper aims to provide an opportunity to address various challenges encountered by IAEA. Strengthening safeguards system for verification is one of the most urgent challenges facing the IAEA. The IAEA should be able to provide credible assurance not only about declared use of nuclear material and facilities but also about the absence of undeclared material and activities. Implementation of IAEA safeguards continue to play a vital role within the nuclear non-proliferation regime. IAEA must move towards more enhanced safeguards system that is driven by the full use of all the safeguards available relevant information. Safeguards system must be responsive to evolving challenges and continue innovation through efficient implementations of more effective safeguards.

  12. Addressing Complexity in Environmental Management and Governance

    Directory of Open Access Journals (Sweden)

    Sabrina Kirschke

    2017-06-01

    Full Text Available Governance for complex problem solving has been increasingly discussed in environmental sustainability research. Above all, researchers continuously observe that sustainability problems are complex or “wicked”, and suggest participatory models to address these problems in practice. In order to add to this debate, this study suggests a more differentiated theoretical approach to define governance for complex environmental problem solving than in previous studies. The approach consists of two vital steps: First, we operationalize complexity and define management strategies for solving environmental sustainability problems based on findings from psychology research. Second, we identify governance strategies that facilitate these management strategies. Linking those strategies suggests that the role of diverse institutions, actors, and interactions differs for five key dimensions of complexity: goals, variables, dynamics, interconnections, and informational uncertainty. The results strengthen systematic analyses of environmental sustainability problems in both theory and practice.

  13. Selected international efforts to address climate change

    Energy Technology Data Exchange (ETDEWEB)

    Seki, M.; Christ, R. [Atmosphere Unit, United Nations Environment Programme UNEP, Nairobi (Kenya)

    1995-12-31

    Over the past two decades, concern about human-induced climate change has become an increasingly important item on the environmental and political agenda. The signing of the United Nations Framework Convention on Climate Change and the adoption of Agenda 21 at the United Nations Conference on Environment and Development in Rio de Janeiro in 1992 provided international organizations and the nations of the world with a new focus for climate-related activities. Although there remains considerable scientific uncertainty about the extent, magnitude, and rate of climate change and the impacts of such change, actions to address climate change have been initiated both internationally and nationally. Major international activities include the World Climate Programme, the Intergovernmental Panel on Climate Change, the United Nations Framework Convention on Climate Change. and the United Nations Environment Program me. 16 refs.

  14. Battling with breast cancer - addressing the issues

    Energy Technology Data Exchange (ETDEWEB)

    Amin, S; Wahid, N; Wasim, B; Tabassum, S [Patel Hospital Gulshan-e-Iqbal, Karachi (Pakistan)

    2011-06-15

    In the background of the current situation of breast cancer in Pakistan, with its rising incidence and mortality, non afford ability and inaccessibility to screening, diagnosis and treatment, Patel Hospital took up the task of addressing these issues at a local level, by initiating an annual free breast camp in the year 2006. In 2008 an inclusion criteria was defined to focus on high risk women for breast cancer. A comparative analysis over a period of three years was done. In the focused camps, in which 28% patients were found to have a positive family history. Most women were symptomatic. Total 11 patients were diagnosed to have cancer after evaluation. Six patients underwent definitive treatment. A problem with lack of awareness, regarding screening and treatment protocols was identified. Family history seems to be an important risk factor in our set up signifying the need to introduce extensive screening programmes. (author)

  15. Battling with breast cancer - addressing the issues

    International Nuclear Information System (INIS)

    Amin, S.; Wahid, N.; Wasim, B.; Tabassum, S.

    2011-01-01

    In the background of the current situation of breast cancer in Pakistan, with its rising incidence and mortality, non afford ability and inaccessibility to screening, diagnosis and treatment, Patel Hospital took up the task of addressing these issues at a local level, by initiating an annual free breast camp in the year 2006. In 2008 an inclusion criteria was defined to focus on high risk women for breast cancer. A comparative analysis over a period of three years was done. In the focused camps, in which 28% patients were found to have a positive family history. Most women were symptomatic. Total 11 patients were diagnosed to have cancer after evaluation. Six patients underwent definitive treatment. A problem with lack of awareness, regarding screening and treatment protocols was identified. Family history seems to be an important risk factor in our set up signifying the need to introduce extensive screening programmes. (author)

  16. Hybrid content addressable memory MSD arithmetic

    Science.gov (United States)

    Li, Yao; Kim, Dai Hyun; Kostrzewski, Andrew A.; Eichmann, George

    1990-07-01

    The modified signed-digit (MSD) number system, because of its inherent weak interdigit dependance, has been suggested as a useful means for a fast and parallel digital arithmetic. To maintain a fast processing speed, a single-stage holographic optical content-addressable memory (CAM) based MSD algorithm was suggested. In this paper, a novel non-holographic opto-electronic CAM based fast MSD addition processing architecture is proposed. The proposed concept has been verified with our first-order proof-of-principle experiments. A figure of merit comparison of this and other existing approaches is also presented. Based on this key opto-electronic CAM element, implementation of more sophisticated I'VISD arithmetic, such as optical MSD subtraction and multiplication operations, are proposed.

  17. Addressing consumerization of IT risks with nudging

    Directory of Open Access Journals (Sweden)

    Iryna Yevseyeva

    2015-01-01

    Full Text Available In this work we address the main issues of Information Technology (IT consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD strategy in particular. We propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk assessment of device vulnerabilities and threats to corporate data and devices, combined with a strategy of influencing security behavior by nudging. We argue that nudging, by taking into account the context of the decision-making environment, and the fact that the employee may be in better position to make a more appropriate decision, may be more suitable than strict policies in situations of uncertainty of security-related decisions. Several examples of nudging are considered for different tested and potential scenarios in security context.

  18. In-Network Adaptation of Video Streams Using Network Processors

    Directory of Open Access Journals (Sweden)

    Mohammad Shorfuzzaman

    2009-01-01

    problem can be addressed, near the network edge, by applying dynamic, in-network adaptation (e.g., transcoding of video streams to meet available connection bandwidth, machine characteristics, and client preferences. In this paper, we extrapolate from earlier work of Shorfuzzaman et al. 2006 in which we implemented and assessed an MPEG-1 transcoding system on the Intel IXP1200 network processor to consider the feasibility of in-network transcoding for other video formats and network processor architectures. The use of “on-the-fly” video adaptation near the edge of the network offers the promise of simpler support for a wide range of end devices with different display, and so forth, characteristics that can be used in different types of environments.

  19. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  20. Recall Performance for Content-Addressable Memory Using Adiabatic Quantum Optimization

    Energy Technology Data Exchange (ETDEWEB)

    Imam, Neena [ORNL; Humble, Travis S. [ORNL; McCaskey, Alex [ORNL; Schrock, Jonathan [ORNL; Hamilton, Kathleen E. [ORNL

    2017-09-01

    A content-addressable memory (CAM) stores key-value associations such that the key is recalled by providing its associated value. While CAM recall is traditionally performed using recurrent neural network models, we show how to solve this problem using adiabatic quantum optimization. Our approach maps the recurrent neural network to a commercially available quantum processing unit by taking advantage of the common underlying Ising spin model. We then assess the accuracy of the quantum processor to store key-value associations by quantifying recall performance against an ensemble of problem sets. We observe that different learning rules from the neural network community influence recall accuracy but performance appears to be limited by potential noise in the processor. The strong connection established between quantum processors and neural network problems supports the growing intersection of these two ideas.

  1. Towards Optimal Buffer Size in Wi-Fi Networks

    KAUST Repository

    Showail, Ahmad

    2016-01-01

    extensively for wired networks. However, there is little work addressing the unique challenges of wireless environment. In this dissertation, we discuss buffer sizing challenges in wireless networks, classify the state-of-the-art solutions, and propose two

  2. The Role of Functional Interdependencies in Global Operations Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum

    2011-01-01

    The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that managing their interfaces in global operations context is becoming strategically...

  3. Optical Network Testbeds Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Joe Mambretti

    2007-06-01

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking

  4. Temporal networks

    CERN Document Server

    Saramäki, Jari

    2013-01-01

    The concept of temporal networks is an extension of complex networks as a modeling framework to include information on when interactions between nodes happen. Many studies of the last decade examine how the static network structure affect dynamic systems on the network. In this traditional approach  the temporal aspects are pre-encoded in the dynamic system model. Temporal-network methods, on the other hand, lift the temporal information from the level of system dynamics to the mathematical representation of the contact network itself. This framework becomes particularly useful for cases where there is a lot of structure and heterogeneity both in the timings of interaction events and the network topology. The advantage compared to common static network approaches is the ability to design more accurate models in order to explain and predict large-scale dynamic phenomena (such as, e.g., epidemic outbreaks and other spreading phenomena). On the other hand, temporal network methods are mathematically and concept...

  5. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  6. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  7. Public management and policy networks: foundations of a network approach to governance

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)

    2006-01-01

    markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy

  8. S-curve networks and an approximate method for estimating degree distributions of complex networks

    OpenAIRE

    Guo, Jin-Li

    2010-01-01

    In the study of complex networks almost all theoretical models have the property of infinite growth, but the size of actual networks is finite. According to statistics from the China Internet IPv4 (Internet Protocol version 4) addresses, this paper proposes a forecasting model by using S curve (Logistic curve). The growing trend of IPv4 addresses in China is forecasted. There are some reference value for optimizing the distribution of IPv4 address resource and the development of IPv6. Based o...

  9. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  10. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  11. Competitive Liner Shipping Network Design

    DEFF Research Database (Denmark)

    Karsten, Christian Vad

    .The contributions of this thesis cover modeling, methodology, and applications.The developed methods address operational (cargo routing), tactical (speed optimization and service selection), and strategic (network design) planning problems faced by liner shipping companies. Ultimately, the proposed methods help...... take the container transportation times that can be realized in the network nor the number of transshipments into consideration. This is mainly because the optimization problem is based on other transportation networks where these constraints are not decisive to the quality of the network. Furthermore......, the problem in itself is challenging to optimize due to its size and complexity. However, the field has seen crucial progress and is mature to include handling of competitiveness in the actual design of the network.As a liner shipping network is an organic entity, which is constantly changed to reflect...

  12. MIMO Communication for Cellular Networks

    CERN Document Server

    Huang, Howard; Venkatesan, Sivarama

    2012-01-01

    As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, there is a growing need to understand the performance limits of MIMO in practical networks. To address this need, MIMO Communication for Cellular Networks presents a systematic description of MIMO technology classes and a framework for MIMO system design that takes into account the essential physical-layer features of practical cellular networks. In contrast to works that focus on the theoretical performance of abstract MIMO channels, MIMO Communication for Cellular Networks emphasizes the practical performance of realistic MIMO systems. A unified set of system simulation results highlights relative performance gains of different MIMO techniques and provides insights into how best to use multiple antennas in cellular networks under various conditions. MIMO Communication for Cellular Networks describes single-user,...

  13. Addressing security issues related to virtual institute distributed activities

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  14. A Sociological Framework to Address Gender Equity in the Geosciences

    Science.gov (United States)

    Holmes, Mary Anne

    2017-04-01

    Lack of equity in the science workforce is a sociological problem; those wishing to seek its amelioration can benefit by viewing the issue with a sociological lens (and a sociologist). One useful framework that we have used to think strategically about how to lower barriers to equity is Barbara Risman's (2004): this framework views barriers to equity as individual, interpersonal ("interactional"), and institutional. Any given barrier may fit into one or more of these frames. Individual barriers include those intrinsic to an individual and may include: lack of access to vital networks and mentors, lack of preparation, etc. Such barriers can be addressed through mentoring programs and attention to building networks (e.g., through professional society memberships). Interpersonal or "interactional" barriers are those that arise from how we perceive and treat one another. Implicit bias underlies many of these barriers, including whether we perceive women as scientists, as competent, as dedicated (etc) as men. Such barriers can be reduced through implicit bias awareness. Institutional barriers arise from the structure and history of the academy itself, from its policies and procedures. Many such policies and procedures have a differential impact on men or women, generally without that intention. Policies that reduce equity barriers include family leave, childcare facilities, search committee training, clearly articulated practices for evaluation of applications and personnel reviews, equal starting pay and startup packages, equable canvassing for names to consider for nominations for honors and awards, to name a few. By viewing the issue through such a framework, the appropriate response can be generated for a more effective result.

  15. Reversible Control of Anisotropic Electrical Conductivity using Colloidal Microfluidic Networks

    National Research Council Canada - National Science Library

    Beskok, Ali; Bevan, Michael; Lagoudas, Dimitris; Ounaies, Zoubeida; Bahukudumbi, Pradipkumar; Everett, William

    2007-01-01

    This research addresses the tunable assembly of reversible colloidal structures within microfluidic networks to engineer multifunctional materials that exhibit a wide range of electrical properties...

  16. Addressing Data Veracity in Big Data Applications

    Energy Technology Data Exchange (ETDEWEB)

    Aman, Saima [Univ. of Southern California, Los Angeles, CA (United States). Dept. of Computer Science; Chelmis, Charalampos [Univ. of Southern California, Los Angeles, CA (United States). Dept. of Electrical Engineering; Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States). Dept. of Electrical Engineering

    2014-10-27

    Big data applications such as in smart electric grids, transportation, and remote environment monitoring involve geographically dispersed sensors that periodically send back information to central nodes. In many cases, data from sensors is not available at central nodes at a frequency that is required for real-time modeling and decision-making. This may be due to physical limitations of the transmission networks, or due to consumers limiting frequent transmission of data from sensors located at their premises for security and privacy concerns. Such scenarios lead to partial data problem and raise the issue of data veracity in big data applications. We describe a novel solution to the problem of making short term predictions (up to a few hours ahead) in absence of real-time data from sensors in Smart Grid. A key implication of our work is that by using real-time data from only a small subset of influential sensors, we are able to make predictions for all sensors. We thus reduce the communication complexity involved in transmitting sensory data in Smart Grids. We use real-world electricity consumption data from smart meters to empirically demonstrate the usefulness of our method. Our dataset consists of data collected at 15-min intervals from 170 smart meters in the USC Microgrid for 7 years, totaling 41,697,600 data points.

  17. Basic Physics Questions Addressed by Astrophysics

    Science.gov (United States)

    Mather, John C.

    2009-01-01

    Dark matter, dark energy, the Big Bang, testing relativity -- all are physics questions accessible to astrophysicists -- but all require new equipment. As Harwit's "Cosmic Discovery" pointed out, almost all great surprises in astronomy came from new equipment or new uses of equipment designed for other purposes, and many of those had military applications. I will outline prospects for new equipment and discuss how that equipment can be developed and built. Bigger and lighter mirrors, wavefront sensing and control, new detector technology, cryogenics -- each has its own social network, its own special possibilities, and its own funding sources outside science. I will discuss some examples drawn from real-life experience with the James Webb Space Telescope, a telescope that was said to have a "giggle factor" when it was proposed in 1995. Now each of the 10 major technologies has been brought to maturity, flight hardware is being built, and launch is planned for 2014. As an instrument builder all my life, I will speculate a little on what may be within our reach over the next few decades.

  18. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  19. 75 FR 41790 - Address Management Services-Elimination of the Manual Card Option for Address Sequencing Services

    Science.gov (United States)

    2010-07-19

    .... The authority citation for 39 CFR Part 111 continues to read as follows: Authority: 5 U.S.C. 552(a... addresses (including rural address conversions to city-style addressing). For each 5-digit ZIP Code grouping... customer includes a rural-style address (RR/box number) in an address file submitted for sequencing, and a...

  20. Global Governance Mechanisms to Address Antimicrobial Resistance.

    Science.gov (United States)

    Padiyara, Ponnu; Inoue, Hajime; Sprenger, Marc

    2018-01-01

    Since their discovery, antibiotics, and more broadly, antimicrobials, have been a cornerstone of modern medicine. But the overuse and misuse of these drugs have led to rising rates of antimicrobial resistance, which occurs when bacteria adapt in ways that render antibiotics ineffective. A world without effective antibiotics can have drastic impacts on population health, global development, and the global economy. As a global common good, antibiotic effectiveness is vulnerable to the tragedy of the commons, where a shared limited resource is overused by a community when each individual exploits the finite resource for their own benefit. A borderless threat like antimicrobial resistance requires global governance mechanisms to mitigate its emergence and spread, and it is the responsibility of all countries and relevant multilateral organizations. These mechanisms can be in the form of legally binding global governance mechanisms such as treaties and regulatory standards or nonbinding mechanisms such as political declarations, resolutions, or guidelines. In this article, we argue that while both are effective methods, the strong, swift, and coordinated action needed to address rising rates of antimicrobial resistance will be better served through legally binding governance mechanisms.

  1. Addressing terrain masking in orbital reconnaissance

    Science.gov (United States)

    Mehta, Sharad; Cico, Luke

    2012-06-01

    During aerial orbital reconnaissance, a sensor system is mounted on an airborne platform for imaging a region on the ground. The latency between the image acquisition and delivery of information to the end-user is critical and must be minimized. Due to fine ground pixel resolution and a large field-of-view for wide-area surveillance applications, a massive volume of data is gathered and imagery products are formed using a real-time multi-processor system. The images are taken at oblique angles, stabilized and ortho-rectified. The line-of-sight of the sensor to the ground is often interrupted by terrain features such as mountains or tall structures as depicted in Figure1. The ortho-rectification process renders the areas hidden from the line-of sight of the sensor with spurious information. This paper discusses an approach for addressing terrain masking in size, weight, and power (SWaP) and memory-restricted onboard processing systems.

  2. Addressing Underrepresentation: Physics Teaching for All

    Science.gov (United States)

    Rifkin, Moses

    2016-02-01

    Every physics teacher wants to give his or her students the opportunity to learn physics well. Despite these intentions, certain groups of students—including women and underrepresented minorities (URMs)—are not taking and not remaining in physics. In many cases, these disturbing trends are more significant in physics than in any other science. This is a missed opportunity for our discipline because demographic diversity strengthens science. The question is what we can do about these trends in our classrooms, as very few physics teachers have been explicitly prepared to address them. In this article, I will share some steps that I've taken in my classroom that have moved my class in the right direction. In the words of Nobel Prize-winning physicist Carl Wieman and psychologists Lauren Aguilar and Gregory Walton: "By investing a small amount of class time in carefully designed and implemented interventions, physics teachers can promote greater success among students from diverse backgrounds. Ultimately, we hope such efforts will indeed improve the diversity and health of the physics profession."

  3. Understanding and addressing the Schoolies phenomenon.

    Science.gov (United States)

    Pettigrew, Simone; Biagioni, Nicole; Daube, Mike; Jones, Sandra C; Chikritzhs, Tanya; Kirby, Gary

    2015-04-01

    This study qualitatively explored Western Australian school leavers' alcohol-related experiences during the Schoolies period to generate insights for the purpose of intervention design. This is in the context of an impending change in the age of Western Australian students completing secondary school which, for the first time, will see around half being of legal age to purchase alcohol. Fifty-four 18-21-year-olds provided reflections via an emailed introspection on their experiences in the immediate post-school period. This provided access to the views of those who chose to attend events and consume large amounts of alcohol, those who attended events but refrained from excessive alcohol consumption, and those who elected to either avoid Schoolies events or engage in alternative celebrations. The data were coded and analysed using NVivo10. Three primary themes were identified that related to the perceived role of alcohol during Schoolies, the range of associated rite-of-passage rituals, and the strategies used by some Leavers to avoid alcohol and its consequences during the Schoolies period. Students and parents constitute important target groups for interventions designed to address alcohol-related harms during Schoolies. In the WA context, legislation on secondary supply and controlled purchase, as recommended by health and police authorities, could reduce harms that are likely to result from the change in the age of school leavers. Suggestions for alternative pastimes to promote to school leavers are provided. © 2015 Public Health Association of Australia.

  4. Quantitative tools for addressing hospital readmissions

    Directory of Open Access Journals (Sweden)

    Lagoe Ronald J

    2012-11-01

    Full Text Available Abstract Background Increased interest in health care cost containment is focusing attention on reduction of hospital readmissions. Major payors have already developed financial penalties for providers that generate excess readmissions. This subject has benefitted from the development of resources such as the Potentially Preventable Readmissions software. This process has encouraged hospitals to renew efforts to improve these outcomes. The aim of this study was to describe quantitative tools such as definitions, risk estimation, and tracking of patients for reducing hospital readmissions. Findings This study employed the Potentially Preventable Readmissions software to develop quantitative tools for addressing hospital readmissions. These tools included two definitions of readmissions that support identification and management of patients. They also included analytical approaches for estimation of the risk of readmission for individual patients by age, discharge status of the initial admission, and severity of illness. They also included patient specific spreadsheets for tracking of target populations and for evaluation of the impact of interventions. Conclusions The study demonstrated that quantitative tools including the development of definitions of readmissions, estimation of the risk of readmission, and patient specific spreadsheets could contribute to the improvement of patient outcomes in hospitals.

  5. Assessing what to address in science communication.

    Science.gov (United States)

    Bruine de Bruin, Wändi; Bostrom, Ann

    2013-08-20

    As members of a democratic society, individuals face complex decisions about whether to support climate change mitigation, vaccinations, genetically modified food, nanotechnology, geoengineering, and so on. To inform people's decisions and public debate, scientific experts at government agencies, nongovernmental organizations, and other organizations aim to provide understandable and scientifically accurate communication materials. Such communications aim to improve people's understanding of the decision-relevant issues, and if needed, promote behavior change. Unfortunately, existing communications sometimes fail when scientific experts lack information about what people need to know to make more informed decisions or what wording people use to describe relevant concepts. We provide an introduction for scientific experts about how to use mental models research with intended audience members to inform their communication efforts. Specifically, we describe how to conduct interviews to characterize people's decision-relevant beliefs or mental models of the topic under consideration, identify gaps and misconceptions in their knowledge, and reveal their preferred wording. We also describe methods for designing follow-up surveys with larger samples to examine the prevalence of beliefs as well as the relationships of beliefs with behaviors. Finally, we discuss how findings from these interviews and surveys can be used to design communications that effectively address gaps and misconceptions in people's mental models in wording that they understand. We present applications to different scientific domains, showing that this approach leads to communications that improve recipients' understanding and ability to make informed decisions.

  6. Addressing Issues for Land Change Science

    Science.gov (United States)

    Braimoh, Ademola; Huang, He Qing

    2009-09-01

    Workshop on Vulnerability and Resilience of Land Systems in Asia; Beijing, China, 15-17 June 2009; There is a growing international community of scholars who work within the interdisciplinary field of land change science, a scientific domain that seeks to understand the dynamics of the land system as a coupled human-environment system. A coupled human-environment system is one in which the social and biophysical subsystems are intertwined so that the system's condition and responses to external forcing are based on the synergy of the two subsystems. Research on land system vulnerability, defined as a function of exposure and sensitivity to natural and anthropogenic perturbations, such as climate variability and sudden changes in macroeconomic conditions and the ability to cope with the impacts of those perturbations, is a fundamental component of land change science. To address issues related to land system vulnerability, the Global Land Project (GLP; http://www.glp-beijing.org.cn/index.php and http://www.glp.hokudai.ac.jp) brought together an interdisciplinary group of researchers with backgrounds ranging from environmental to social sciences. Participants came from both developed and developing countries. The workshop sought to (1) improve knowledge of the causal processes that affect a system's vulnerability and capacity to cope with different perturbations and (2) identify factors that hinder the integration of vulnerability assessment into policies and decision making.

  7. Convolving optically addressed VLSI liquid crystal SLM

    Science.gov (United States)

    Jared, David A.; Stirk, Charles W.

    1994-03-01

    We designed, fabricated, and tested an optically addressed spatial light modulator (SLM) that performs a 3 X 3 kernel image convolution using ferroelectric liquid crystal on VLSI technology. The chip contains a 16 X 16 array of current-mirror-based convolvers with a fixed kernel for finding edges. The pixels are located on 75 micron centers, and the modulators are 20 microns on a side. The array successfully enhanced edges in illumination patterns. We developed a high-level simulation tool (CON) for analyzing the performance of convolving SLM designs. CON has a graphical interface and simulates SLM functions using SPICE-like device models. The user specifies the pixel function along with the device parameters and nonuniformities. We discovered through analysis, simulation and experiment that the operation of current-mirror-based convolver pixels is degraded at low light levels by the variation of transistor threshold voltages inherent to CMOS chips. To function acceptable, the test SLM required the input image to have an minimum irradiance of 10 (mu) W/cm2. The minimum required irradiance can be further reduced by adding a photodarlington near the photodetector or by increasing the size of the transistors used to calculate the convolution.

  8. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  9. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  10. Network Convergence

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Network Convergence. User is interested in application and content - not technical means of distribution. Boundaries between distribution channels fade out. Network convergence leads to seamless application and content solutions.

  11. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...

  12. Network Science

    National Research Council Canada - National Science Library

    Leland, Will

    2006-01-01

    OVERVIEW: (1) A committee of technical experts, military officers and R&D managers was assembled by the National Research Council to reach consensus on the nature of networks and network research. (2...

  13. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  14. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2011-01-01

    is becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about how companies can organize these networks and coordinate between them effectively. The propositions are developed by employing the design science approach based on a literature......Production, innovation and service networks of companies all over the world become increasingly decentralized, specialized and interdependent. The three characteristics combined inevitably lead to the formation of complex configurations of assets and capabilities crossing both national...... and organisational borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that coordinating them and managing their interfaces in global operations context...

  15. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2012-01-01

    Production, innovation and service networks of companies all over the world become increasingly decentralised, specialised and interdependent. These three characteristics combined inevitably lead to the formation of complex configurations of resources, crossing both national and organisational...... borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gaps between these networks mean that coordinating them and managing their interfaces in a global operations context...... are becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about the development and organisation of these networks. The paper highlights the critical importance of engineering operations in this process. The propositions are developed...

  16. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  17. Functional Module Analysis for Gene Coexpression Networks with Network Integration.

    Science.gov (United States)

    Zhang, Shuqin; Zhao, Hongyu; Ng, Michael K

    2015-01-01

    Network has been a general tool for studying the complex interactions between different genes, proteins, and other small molecules. Module as a fundamental property of many biological networks has been widely studied and many computational methods have been proposed to identify the modules in an individual network. However, in many cases, a single network is insufficient for module analysis due to the noise in the data or the tuning of parameters when building the biological network. The availability of a large amount of biological networks makes network integration study possible. By integrating such networks, more informative modules for some specific disease can be derived from the networks constructed from different tissues, and consistent factors for different diseases can be inferred. In this paper, we have developed an effective method for module identification from multiple networks under different conditions. The problem is formulated as an optimization model, which combines the module identification in each individual network and alignment of the modules from different networks together. An approximation algorithm based on eigenvector computation is proposed. Our method outperforms the existing methods, especially when the underlying modules in multiple networks are different in simulation studies. We also applied our method to two groups of gene coexpression networks for humans, which include one for three different cancers, and one for three tissues from the morbidly obese patients. We identified 13 modules with three complete subgraphs, and 11 modules with two complete subgraphs, respectively. The modules were validated through Gene Ontology enrichment and KEGG pathway enrichment analysis. We also showed that the main functions of most modules for the corresponding disease have been addressed by other researchers, which may provide the theoretical basis for further studying the modules experimentally.

  18. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  19. Mobile data offloading addressing the service quality vs. resource utilisation dilemma

    OpenAIRE

    Whittier, Alicia; Kulkarni, Parag; Cao, Fengming; Armour, Simon

    2016-01-01

    Mobile operators are integrating WiFi into their cellular networks as a way to address the issue of mobile data deluge. Although prominently used for its high data rates and unlicensed frequency band of operation, WiFi's contention based medium access does not guarantee that a user's quality of service will necessarily be met, especially if mobile devices simply `offload' to WiFi in preference to cellular. A network selection algorithm offers a way to enhance user experience, by always select...

  20. Computer Networks and Globalization

    Directory of Open Access Journals (Sweden)

    J. Magliaro

    2007-07-01

    Full Text Available Communication and information computer networks connect the world in ways that make globalization more natural and inequity more subtle. As educators, we look at these phenomena holistically analyzing them from the realist’s view, thus exploring tensions, (in equity and (injustice, and from the idealist’s view, thus embracing connectivity, convergence and development of a collective consciousness. In an increasingly market- driven world we find examples of openness and human generosity that are based on networks, specifically the Internet. After addressing open movements in publishing, software industry and education, we describe the possibility of a dialectic equilibrium between globalization and indigenousness in view of ecologically designed future smart networks

  1. Optically addressed ultra-wideband phased antenna array

    Science.gov (United States)

    Bai, Jian

    Demands for high data rate and multifunctional apertures from both civilian and military users have motivated development of ultra-wideband (UWB) electrically steered phased arrays. Meanwhile, the need for large contiguous frequency is pushing operation of radio systems into the millimeter-wave (mm-wave) range. Therefore, modern radio systems require UWB performance from VHF to mm-wave. However, traditional electronic systems suffer many challenges that make achieving these requirements difficult. Several examples includes: voltage controlled oscillators (VCO) cannot provide a tunable range of several octaves, distribution of wideband local oscillator signals undergo high loss and dispersion through RF transmission lines, and antennas have very limited bandwidth or bulky sizes. Recently, RF photonics technology has drawn considerable attention because of its advantages over traditional systems, with the capability of offering extreme power efficiency, information capacity, frequency agility, and spatial beam diversity. A hybrid RF photonic communication system utilizing optical links and an RF transducer at the antenna potentially provides ultra-wideband data transmission, i.e., over 100 GHz. A successful implementation of such an optically addressed phased array requires addressing several key challenges. Photonic generation of an RF source with over a seven-octave bandwidth has been demonstrated in the last few years. However, one challenge which still remains is how to convey phased optical signals to downconversion modules and antennas. Therefore, a feed network with phase sweeping capability and low excessive phase noise needs to be developed. Another key challenge is to develop an ultra-wideband array antenna. Modern frontends require antennas to be compact, planar, and low-profile in addition to possessing broad bandwidth, conforming to stringent space, weight, cost, and power constraints. To address these issues, I will study broadband and miniaturization

  2. Address Points - COUNTY_ADDRESS_POINTS_IDHS_IN: Address Points Maintained by County Agencies in Indiana (Indiana Department of Homeland Security, Point feature class)

    Data.gov (United States)

    NSGIC State | GIS Inventory — COUNTY_ADDRESS_POINTS_IDHS_IN is an ESRI Geodatabase point feature class that contains address points maintained by county agencies in Indiana, provided by personnel...

  3. DDT and Malaria Prevention: Addressing the Paradox

    Science.gov (United States)

    Bouwman, Hindrik; van den Berg, Henk; Kylin, Henrik

    2011-01-01

    Background The debate regarding dichlorodiphenyltrichloroethane (DDT) in malaria prevention and human health is polarized and can be classified into three positions: anti-DDT, centrist-DDT, pro-DDT. Objective We attempted to arrive at a synthesis by matching a series of questions on the use of DDT for indoor residual spraying (IRS) with literature and insights, and to identify options and opportunities. Discussion Overall, community health is significantly improved through all available malaria control measures, which include IRS with DDT. Is DDT “good”? Yes, because it has saved many lives. Is DDT safe as used in IRS? Recent publications have increasingly raised concerns about the health implications of DDT. Therefore, an unqualified statement that DDT used in IRS is safe is untenable. Are inhabitants and applicators exposed? Yes, and to high levels. Should DDT be used? The fact that DDT is “good” because it saves lives, and “not safe” because it has health and environmental consequences, raises ethical issues. The evidence of adverse human health effects due to DDT is mounting. However, under certain circumstances, malaria control using DDT cannot yet be halted. Therefore, the continued use of DDT poses a paradox recognized by a centrist-DDT position. At the very least, it is now time to invoke precaution. Precautionary actions could include use and exposure reduction. Conclusions There are situations where DDT will provide the best achievable health benefit, but maintaining that DDT is safe ignores the cumulative indications of many studies. In such situations, addressing the paradox from a centrist-DDT position and invoking precaution will help design choices for healthier lives. PMID:21245017

  4. Nuclear techniques to address HAB concerns

    International Nuclear Information System (INIS)

    Vu Nhu Ngoc; Phan Son; Nguyen Ngoc Lam and Chu Van Thuoc

    2004-01-01

    In December, 1998, The Project Formulation meeting on application of Nuclear Techniques to address red tide (Harmful Algal Bloom concerns) was held in Manila Philippines. This is an IAEA/RCA project with the participation of Australia, China, Indonesia, Malaysia, Pakistan, The Philippines, Thailand and Vietnam. The main objectives of this project (RAS/8/076) included: - Conduct of segmentation studies to gain information on the natural histories of sediments and to correlated these with Red Tide occurrences. - Development of descriptive and predictive of the behaviour of Algal Bloom as affected by the interplay of the causative organism with the environment parameters in the water column and sediments. - Development and field testing of a rapid assay technique based on tritium - labeled saxitoxin for toxin determination. The first phase has been completed in 2002 and the second phase will be completed in 2004. In the two years of 2001 - 2002 Ted Tide occurred in very larger area in Vietnam, for example, in the coast of Binh Thuan Province with the density of 39.10 9 cells/litre. The Ministry of science - technology environment of Vietnam has support 5.000 USD each years for sediment and algal sampling in Cam Ranh Bay (Nha Trang, 11 o 45N and 10 o 15E) and Ha Long Bay in the North - East of Vietnam (21 o 15 and 107 o 3E) and in 2003 in Tuy Phong Bay (Binh Thuan province) (10 o 15N, 108 o 45E). Three sediment core has been taken from Cam Ranh Bay, Ha Long Bay and Tuy Phong Bay. The volume of sediment core is Φ = 8 cm and h = 60 cm. The algal samples have been collected by Bongo nets in Cam Ranh, Ha Long Bay and Tuy Phong Bay. (author)

  5. Building partnerships to address the HIV epidemic.

    Science.gov (United States)

    Chua, A C; Leo, Y S; Lee, C C

    2008-05-01

    Batam is one of the islands comprising the Riau Province in Indonesia, and is closest to Singapore. It is a popular destination of many Singaporeans. Surveillance reports among commercial sex workers conducted in Batam showed the prevalence rate of human immunodeficiency virus (HIV) is 16.2 percent. At the end of 2006, the total number of HIV-infected Singaporeans was 3,060, the majority being infected via heterosexual transmission. The aim of the Indonesian government is to rapidly scale up HIV treatment to those needing it. One of the factors critical to the rapid scale-up is healthcare worker training. An intersectoral collaboration addressing the issue of HIV care and treatment with a hospital in Batam was created. The first activity of the collaboration was a two-day HIV training course conducted in February 2007. The aim of the course was to provide a basic understanding of HIV, as well as knowledge on common opportunistic infections that may present to a general hospital or clinical setting. 34 doctors from 23 institutions in Batam and three doctors from two hospitals in the Riau Islands attended the two-day HIV training course. The participants found the training very useful and highly relevant. This first HIV training provided a foundation to build on further HIV education. It is our belief that through the HIV training programme, there will be more awareness of HIV among the various medical institutions in Batam. As the HIV epidemic knows no borders, working with neighbouring countries is one strategy that deserves attention.

  6. State of the Union Address, 1997. Remarks by the President in State of the Union Address.

    Science.gov (United States)

    Executive Office of the President, Washington, DC.

    This document contains the text of President Clinton's State of the Union Address, delivered on February 4, 1997. The President issues a call to action to work together to prepare America for the twenty-first century. The United States must attend to the unfinished business of balancing the budget, enacting bipartisan campaign-finance reform, and…

  7. Routing architecture and security for airborne networks

    Science.gov (United States)

    Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato

    2009-05-01

    Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.

  8. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  9. Networking activism: implications for Greece

    Directory of Open Access Journals (Sweden)

    Pantelis Vatikiotis

    2011-12-01

    Full Text Available The outbreak of December 2008 against police brutality through a wave of demonstrations and street protests in Athens, which was strongly advocated by protest activities and practices across the world, addresses several issues in relation to the transformative potentials of mediated collective action. The paper critically evaluates different accounts of December events, probing then into thevery networking of that movement. From this perspective, it points out another aspect of the local-global interplay in protest culture along new mediating practices (beyond the creation of transnational publics, that of the implications of transnational networking for local social activism and identification, addressing relevant questions in the Greek context.

  10. Strategies for addressing barriers to publishing pediatric quality improvement research.

    Science.gov (United States)

    Van Cleave, Jeanne; Dougherty, Denise; Perrin, James M

    2011-09-01

    Advancing the science of quality improvement (QI) requires dissemination of the results of QI. However, the results of few QI interventions reach publication. To identify barriers to publishing results of pediatric QI research and provide practical strategies that QI researchers can use to enhance publishability of their work. We reviewed and summarized a workshop conducted at the Pediatric Academic Societies 2007 meeting in Toronto, Ontario, Canada, on conducting and publishing QI research. We also interviewed 7 experts (QI researchers, administrators, journal editors, and health services researchers who have reviewed QI manuscripts) about common reasons that QI research fails to reach publication. We also reviewed recently published pediatric QI articles to find specific examples of tactics to enhance publishability, as identified in interviews and the workshop. We found barriers at all stages of the QI process, from identifying an appropriate quality issue to address to drafting the manuscript. Strategies for overcoming these barriers included collaborating with research methodologists, creating incentives to publish, choosing a study design to include a control group, increasing sample size through research networks, and choosing appropriate process and clinical quality measures. Several well-conducted, successfully published QI studies in pediatrics offer guidance to other researchers in implementing these strategies in their own work. Specific, feasible approaches can be used to improve opportunities for publication in pediatric, QI, and general medical journals.

  11. Biodiversity data provision and decision-making - addressing the challenges

    Directory of Open Access Journals (Sweden)

    Katherine Despot-Belmonte

    2017-02-01

    Full Text Available Essential Biodiversity Variables (EBVs are measurements required for study, reporting, and management of biodiversity change. They are being developed to support consistency, from the collection to the reporting of biodiversity data at the national, regional and global scales. However, "EBV stakeholders" need to strike a balance between 'doing innovative research' and 'having positive impact' on biodiversity management decisions. This paper reports on a workshop entitled Identifying joint pathways to address the challenges of biodiversity data provision and decision-making and presents the main workshop’s output, a “researcher’s brief” entitled Guiding principles for promoting the application of EBVs for current and future needs of decision-makers. These guiding principles are: Speak with a common voice; Clearly define what is an EBV and how it relates to indicators; Engage beyond the research world; Be realistic about what can be done now and later; Define criteria for good EBVs; Use EBV as a clearing house; Convey the limitations of EBVs; Clarify what impact EBVs should have; Be salient, credible, legitimate, iterative; Don't put an EBV skin on everything you do; Don't create too many EBVs; and Don't reduce EBVs to building blocks of indicators. This brief is of relevance to the wider GEO BON (Group on Earth Observation Biodoversity Observation Network community, and in particular those scientists/researchers interested in the application of EBVs.

  12. Distributed photovoltaic systems - Addressing the utility interface issues

    Science.gov (United States)

    Firstman, S. I.; Vachtsevanos, G. J.

    This paper reviews work conducted in the United States on the impact of dispersed photovoltaic sources upon utility operations. The photovoltaic (PV) arrays are roof-mounted on residential houses and connected, via appropriate power conditioning equipment, to the utility grid. The presence of such small (4-6 Kw) dispersed generators on the distribution network raises questions of a technical, economic and institutional nature. After a brief identification of utility interface issues, the paper addresses such technical concerns as protection of equipment and personnel safety, power quality and utility operational stability. A combination of experimental and analytical approaches has been adopted to arrive at solutions to these problems. Problem areas, under various PV system penetration scenarios, are identified and conceptual designs of protection and control equipment and operating policies are developed so that system reliability is maintained while minimizing capital costs. It is hoped that the resolution of balance-of-system and grid interface questions will ascertain the economic viability of photovoltaic systems and assist in their widespread utilization in the future.

  13. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  14. Network Support for Group Coordination

    Science.gov (United States)

    2000-01-01

    telecommuting and ubiquitous computing [40], the advent of networked multimedia, and less expensive technology have shifted telecollaboration into...of Computer Engineering,Santa Cruz,CA,95064 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/ MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10...participants A and B, the payoff structure for choosing two actions i and j is P = Aij + Bij . If P = 0, then the interaction is called a zero -sum game, and

  15. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  16. Addressing contrasting cognitive models in scientific collaboration

    Science.gov (United States)

    Diviacco, P.

    2012-04-01

    If the social aspects of scientific communities and their internal dynamics is starting to be recognized and acknowledged in the everyday lives of scientists, it is rather difficult for them to find tools that could support their activities consistently with this perspective. Issues span from gathering researchers to mutual awareness, from information sharing to building meaning, with the last one being particularly critical in research fields as the geo-sciences, that deal with the reconstruction of unique, often non-reproducible, and contingent processes. Reasoning here is, in fact, mainly abductive, allowing multiple and concurrent explanations for the same phenomenon to coexist. Scientists bias one hypothesis over another not only on strictly logical but also on sociological motivations. Following a vision, scientists tend to evolve and isolate themselves from other scientists creating communities characterized by different cognitive models, so that after some time these become incompatible and scientists stop understanding each other. We address these problems as a communication issue so that the classic distinction into three levels (syntactic, semantic and pragmatic) can be used. At the syntactic level, we highlight non-technical obstacles that condition interoperability and data availability and transparency. At the semantic level, possible incompatibilities of cognitive models are particularly evident, so that using ontologies, cross-domain reconciliation should be applied. This is a very difficult task to perform since the projection of knowledge by scientists, in the designated community, is political and thus can create a lot of tension. The strategy we propose to overcome these issues pertains to pragmatics, in the sense that it is intended to acknowledge the cultural and personal factors each partner brings into the collaboration and is based on the idea that meaning should remain a flexible and contingent representation of possibly divergent views

  17. Evaluating Judicial Performance and Addressing Gender Bias

    Directory of Open Access Journals (Sweden)

    Angela Melville

    2014-12-01

    Full Text Available Elek and Rottman argue that judicial evaluation is often biased against women and minority judges. The need to address bias is important, however often the desire for diversity seems so self-evident as to belie deeper analysis. This paper examines the two main rationales for gender equality on the bench. First, female judges are often considered necessary in order to bring a gendered perspective to judging, however it is argued that this rationale is flawed. Second, an alternative rationale based on equality and legitimacy is offered which avoids gender essentialism. While debates typically focus on these two rationales, a third rationale embraces both difference and equality/legitimacy. The presence of female judges has an important symbolic value which destabilises existing fraternal legal norms. Finally, increasing the number of female judges may not necessarily change judging, and this paper also analyses how the transformative potential offered by judicial diversity can work in practice. Elek y Rottman defienden que la evaluación judicial suele estar sesgada en contra de las mujeres y los jueces pertenecientes a minorías. La necesidad de abordar el sesgo es importante, sin embargo a menudo el deseo de diversidad parece tan evidente como para contradecir un análisis más profundo. Este artículo examina los dos motivos principales para la igualdad de género en el banquillo. En primer lugar, las mujeres jueces a menudo se consideran necesarias para aportar una perspectiva de género al hecho de juzgar, sin embargo, se defiende que este razonamiento es erróneo. En segundo lugar, se ofrece una alternativa lógica basada en la igualdad y la legitimidad que evita el esencialismo de género. Mientras que los debates suelen centrarse en estas dos razones, una tercera justificación abarca tanto la diferencia como la igualdad/legitimidad. La presencia de mujeres en la judicatura tiene un importante valor simbólico que desestabiliza las normas

  18. Moving to world's best uranium address

    International Nuclear Information System (INIS)

    Noakes, Frank

    2006-01-01

    Most exploration dollars spent in South Australia are focused on exploiting uranium. This is for good reason as South Australia is the world's best address for uranium. Pressure to cut CO 2 emissions and the ballistic growth of the Chinese and Indian economies has heightened expectations that the worldwide use of uranium for power generation will mushroom beyond its current 17% market share. The recent Australia-China deal only seems to confirm this; hence uranium's growing popularity among miners and explorers. Such is the attractiveness of uranium-related floats, when Toro Energy sought $18m in March it was swamped with more than three times share application volume. In the north west, Southern Gold and Hindmarsh Resources are expectantly drilling for commercial uranium deposits all around the acreage that hosts the Challenger gold mine in the Gawler Craton. The first exploration drilling for uranium in quaternary-age river channels will take place in South Australia's far north in May. Red Metal says while older and deeper tertiary river channels in the area that host the Beverley uranium mine were explored for uranium, the younger near-surface channel has not had a single hole drilled for uranium. This is despite the area being one of the 'hottest radiogenic terrains in South Australia'. The company will target calcrete-style uranium mineralisation similar to the Yerrlirrie deposit in Western Australia (52,000t U308). Tasman Resources will start drilling to test seven uranium targets within 30km of Olympic Dam, the world's largest known uranium deposit, later this year. Tasman also holds tenements adjoining the Warrior uranium deposit near Tarcoola that contains known radiometric anomalies within the 40km-long Wynbring paleochannels. They are the fourth largest uranium explorer in South Australia. Alliance Resources and its JV partner Quasar Resources are exploring the Beverley 4 Mile uranium prospect at Arkaroola. Quasar is an affiliate of Heathgate Resources

  19. The 2016 Ferno Award Address: Three Things.

    Science.gov (United States)

    Baker, Timothy B

    2017-08-01

    Researchers may optimize smoking treatment by addressing three research topics that have been relatively neglected. First, researchers have neglected to intensively explore how counseling contents affect smoking cessation success. Worldwide, millions of smokers are exposed to different smoking cessation contents and messages, yet existing research evidence does not permit strong inference about the value of particular counseling contents or strategies. Research in this area could enhance smoking outcomes and yield new insights into smoking motivation. Second, researchers have focused great attention on inducing smokers to make quit attempts when they contact healthcare systems; the success of such efforts may have plateaued. Also, the vast majority of quit attempts are self-quit attempts, largely unsuccessful, that occur outside such contacts. Researchers should explore strategies for using healthcare systems as conduits for digital- and other population-based interventions independent of healthcare visits. Such resources should be used to graft timely access to evidence-based intervention onto self-quitting, yielding evidence-based, patient-managed quit attempts. Third, most smoking treatments are assembled via selection of components based on informal synthesis of empirical and impressionistic evidence and are evaluated as a package. However, recent factorial experiments show that components of smoking treatments often interact meaningfully; for example, some components may interfere with the effectiveness of other components. Many extant treatments likely comprise suboptimal sets of components; future treatment development should routinely use factorial experiments to permit the assembly of components that yield additive or synergistic effects.Research in the above three areas should significantly advance our understanding of tobacco use and its treatment. A lack of relevant research, and the likely prospect of significant clinical and public health benefit

  20. Multi Sensor Approach to Address Sustainable Development

    Science.gov (United States)

    Habib, Shahid

    2007-01-01

    The main objectives of Earth Science research are many folds: to understand how does this planet operates, can we model her operation and eventually develop the capability to predict such changes. However, the underlying goals of this work are to eventually serve the humanity in providing societal benefits. This requires continuous, and detailed observations from many sources in situ, airborne and space. By and large, the space observations are the way to comprehend the global phenomena across continental boundaries and provide credible boundary conditions for the mesoscale studies. This requires a multiple sensors, look angles and measurements over the same spot in accurately solving many problems that may be related to air quality, multi hazard disasters, public health, hydrology and more. Therefore, there are many ways to address these issues and develop joint implementation, data sharing and operating strategies for the benefit of the world community. This is because for large geographical areas or regions and a diverse population, some sound observations, scientific facts and analytical models must support the decision making. This is crucial for the sustainability of vital resources of the world and at the same time to protect the inhabitants, endangered species and the ecology. Needless to say, there is no single sensor, which can answer all such questions effectively. Due to multi sensor approach, it puts a tremendous burden on any single implementing entity in terms of information, knowledge, budget, technology readiness and computational power. And, more importantly, the health of planet Earth and its ability to sustain life is not governed by a single country, but in reality, is everyone's business on this planet. Therefore, with this notion, it is becoming an impractical problem by any single organization/country to bear this colossal responsibility. So far, each developed country within their means has proceeded along satisfactorily in implementing

  1. Cluster emergence and network evolution A longitudinal analysis of the inventor network in Sophia-Antipolis

    OpenAIRE

    Anne L. J. ter Wal

    2008-01-01

    Abstract It is increasingly acknowledged that clusters do not necessarily exhibit networks of local collective learning. This paper addresses the question under which conditions this is the case. Through a longitudinal case study of the business park Sophia-Antipolis it investigates how networks of collective learning emerged throughout the growth of the cluster. Network reconstruction with patent data shows that an innovation network emerged only in Information Technology, in whic...

  2. Spatial networks

    Science.gov (United States)

    Barthélemy, Marc

    2011-02-01

    Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, and neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields, ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated with the length of edges which in turn has dramatic effects on the topological structure of these networks. We will thoroughly explain the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spatial networks, such as phase transitions, random walks, synchronization, navigation, resilience, and disease spread.

  3. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  4. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  5. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  6. 21 CFR 1321.01 - DEA mailing addresses.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false DEA mailing addresses. 1321.01 Section 1321.01 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE DEA MAILING ADDRESSES § 1321.01 DEA mailing addresses. The following table provides information regarding mailing addresses to be used...

  7. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  8. Statistical Mechanics of Temporal and Interacting Networks

    Science.gov (United States)

    Zhao, Kun

    a new framework to quantify the information encoded in these networks and to answer a fundamental problem in network science: how complex are temporal and growing networks. Finally, we consider two examples of critical phenomena in interacting networks. In particular, on one side we investigate the percolation of interacting networks by introducing antagonistic interactions. On the other side, we investigate a model of political election based on the percolation of antagonistic networks. The aim of this research is to show how antagonistic interactions change the physics of critical phenomena on interacting networks. We believe that the work presented in these thesis offers the possibility to appreciate the large variability of problems that can be addressed in the new framework of temporal and interacting networks.

  9. General Purpose (office) Network reorganisation

    CERN Multimedia

    IT Department

    2016-01-01

    On Saturday 27 August, the IT Department’s Communication Systems group will perform a major reorganisation of CERN’s General Purpose Network.   This reorganisation will cause network interruptions on Saturday 27 August (and possibly Sunday 28 August) and will be followed by a change to the IP addresses of connected systems that will come into effect on Monday 3 October. For further details and information about the actions you may need to take, please see: https://information-technology.web.cern.ch/news/general-purpose-office-network-reorganisation.

  10. An integrated approach to addressing addiction and depression in college students.

    Science.gov (United States)

    Eisen, Arri; Kushner, Howard; McLeod, Mark; Queen, Edward; Gordon, Jonathan; Ford, John L

    2009-01-01

    The authors present an integrated, interdisciplinary approach to address the problem of increasing student mental health issues on college campuses. The model uses addiction and depression as lenses into the problem and links residence life and academic and community internship experiences. The project has a positive impact on student attitudes and actions and strengthens and broadens the campus network required to ensure optimal student mental health.

  11. Analyzing Evolving Social Network 2 (EVOLVE2)

    Science.gov (United States)

    2015-04-01

    WORK UNIT NUMBER N2 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) University of Southern California 3720 S. Flower Street, Third Floor Los...score, and resource allocation. Below the double line are link prediction heuristics introduced in this paper. name symbol definition common neighbors...LIST OF SYMBOLS , ABBREVIATIONS AND ACRONYMS A adjacency matrix of a network D diagonal out-degree matrix DW out-degree matrix of the reweighted network

  12. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  13. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  14. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  15. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    For many globally dispersed organisations, the home base (HB) is a historic locus of integrative and coordinating efforts that safeguard overall performance. However, the dynamism of global operations networks is increasingly pulling the centre of gravity away from the HB and dispersing it across...... the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  16. Evolutionary dynamics of complex communications networks

    CERN Document Server

    Karyotis, Vasileios; Papavassiliou, Symeon

    2013-01-01

    Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology-closing the network design loop in an evolutionary fashion similar to

  17. Cross-layer design in optical networks

    CERN Document Server

    Brandt-Pearce, Maïté; Demeester, Piet; Saradhi, Chava

    2013-01-01

    Optical networks have become an integral part of the communications infrastructure needed to support society’s demand for high-speed connectivity.  Cross-Layer Design in Optical Networks addresses topics in optical network design and analysis with a focus on physical-layer impairment awareness and network layer service requirements, essential for the implementation and management of robust scalable networks.  The cross-layer treatment includes bottom-up impacts of the physical and lambda layers, such as dispersion, noise, nonlinearity, crosstalk, dense wavelength packing, and wavelength line rates, as well as top-down approaches to handle physical-layer impairments and service requirements.

  18. Electricity networks: how 'natural' is the monopoly?

    International Nuclear Information System (INIS)

    Kuenneke, Rolf W.

    1999-01-01

    This article deals with the changing economic characteristics of the electricity network. Traditionally, electricity networks are considered natural monopolies for various kinds of market failures coincide in this essential part of the electricity infrastructure. Technological induced complementarities between nodes and links are causing network externalities, economies of scale, a high degree of mono-functionality, collective good characteristics and an inherent tendency towards concentrated market structures. It is argued that recent technological trends imply a dramatic change of the network economics, leading to possibilities of inter- and intra-network competition, as well as inter fuel competition. The possible implications for the regulatory framework of this sector are addressed. (Author)

  19. Eviction of Misbehaving and Faulty Nodes in Vehicular Networks

    OpenAIRE

    Raya, Maxim; Papadimitratos, Panagiotis; Aad, Imad; Jungels, Daniel; Hubaux, Jean-Pierre

    2007-01-01

    Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor and a significant challenge to be met. Misbehaving or faulty network nodes have to be detected and prevented from disrupting network operation, a problem particularly hard to address in the life-critical VN environment. Existing networks rely mainly on node certificate revocation for attacker eviction, but the lack of an ...

  20. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  1. A Novel Addressing Scheme for PMIPv6 Based Global IP-WSNs

    Directory of Open Access Journals (Sweden)

    Md. Motaharul Islam

    2011-08-01

    Full Text Available IP based Wireless Sensor Networks (IP-WSNs are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  2. A novel addressing scheme for PMIPv6 based global IP-WSNs.

    Science.gov (United States)

    Islam, Md Motaharul; Huh, Eui-Nam

    2011-01-01

    IP based Wireless Sensor Networks (IP-WSNs) are being used in healthcare, home automation, industrial control and agricultural monitoring. In most of these applications global addressing of individual IP-WSN nodes and layer-three routing for mobility enabled IP-WSN with special attention to reliability, energy efficiency and end to end delay minimization are a few of the major issues to be addressed. Most of the routing protocols in WSN are based on layer-two approaches. For reliability and end to end communication enhancement the necessity of layer-three routing for IP-WSNs is generating significant attention among the research community, but due to the hurdle of maintaining routing state and other communication overhead, it was not possible to introduce a layer-three routing protocol for IP-WSNs. To address this issue we propose in this paper a global addressing scheme and layer-three based hierarchical routing protocol. The proposed addressing and routing approach focuses on all the above mentioned issues. Simulation results show that the proposed addressing and routing approach significantly enhances the reliability, energy efficiency and end to end delay minimization. We also present architecture, message formats and different routing scenarios in this paper.

  3. Brocade: Optimal flow placement in SDN networks

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Today' network poses several challanges to network providers. These challanges fall in to a variety of areas ranging from determining efficient utilization of network bandwidth to finding out which user applications consume majority of network resources. Also, how to protect a given network from volumetric and botnet attacks. Optimal placement of flows deal with identifying network issues and addressing them in a real-time. The overall solution helps in building new services where a network is more secure and more efficient. Benefits derived as a result are increased network efficiency due to better capacity and resource planning, better security with real-time threat mitigation, and improved user experience as a result of increased service velocity.

  4. Social Networking and Academic Performance: A Review

    Science.gov (United States)

    Doleck, Tenzin; Lajoie, Susanne

    2018-01-01

    The ubiquitous use of social networking sites by students and the potential impacts of such use on academic performance are of both theoretical and practical importance. Hence, this paper addresses the question: how does the use of social networking sites influence academic performance? The present review synthesizes the empirical findings of the…

  5. MPE inference in conditional linear gaussian networks

    DEFF Research Database (Denmark)

    Salmerón, Antonio; Rumí, Rafael; Langseth, Helge

    2015-01-01

    Given evidence on a set of variables in a Bayesian network, the most probable explanation (MPE) is the problem of finding a configuration of the remaining variables with maximum posterior probability. This problem has previously been addressed for discrete Bayesian networks and can be solved using...

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago V. V.; Giannitsarou, Chryssi; Johnson, Charles R.

    2016-01-01

    This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s00199-016-0992-1 We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and d...

  8. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  9. Large developing receptive fields using a distributed and locally reprogrammable address-event receiver.

    Science.gov (United States)

    Bamford, Simeon A; Murray, Alan F; Willshaw, David J

    2010-02-01

    A distributed and locally reprogrammable address-event receiver has been designed, in which incoming address-events are monitored simultaneously by all synapses, allowing for arbitrarily large axonal fan-out without reducing channel capacity. Synapses can change the address of their presynaptic neuron, allowing the distributed implementation of a biologically realistic learning rule, with both synapse formation and elimination (synaptic rewiring). Probabilistic synapse formation leads to topographic map development, made possible by a cross-chip current-mode calculation of Euclidean distance. As well as synaptic plasticity in rewiring, synapses change weights using a competitive Hebbian learning rule (spike-timing-dependent plasticity). The weight plasticity allows receptive fields to be modified based on spatio-temporal correlations in the inputs, and the rewiring plasticity allows these modifications to become embedded in the network topology.

  10. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  11. EYES -- Energy Efficient Sensor Networks

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Etalle, Sandro; Karl, Holger; Petrioli, Chiara; Zorzi, Michele; Kip, Harry; Lentsch, Thomas; Conti, M.; Giordano, S.; Gregori, E.; Olariu, S.

    The EYES project (IST-2001-34734) is a three years European research project on self-organizing and collaborative energy-efficient sensor networks. It will address the convergence of distributed information processing, wireless communications, and mobile computing. The goal of the project is to

  12. Structural integration and performance of inter-sectoral public health-related policy networks: An analysis across policy phases

    NARCIS (Netherlands)

    Peters, D. T. J. M.; Raab, J.; Grêaux, K. M.; Stronks, K.; Harting, J.

    2017-01-01

    Background: Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structural network characteristics (i.e., composition and integration) and network performance, such as

  13. Structural integration and performance of inter-sectoral public health-related policy networks : An analysis across policy phases

    NARCIS (Netherlands)

    Peters, Dorothee; Raab, J.; Grêaux, Kimberley M.; Stronks, Karien; Harting, Janneke

    2017-01-01

    Background: Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structure and network characteristics (i.e., composition and integration) and network performance, such

  14. Social Networking Sites: A premise on enhancement

    OpenAIRE

    MANINDERPAL SINGH SAINI; GYEWON MOON

    2013-01-01

    This article address five constructs that are paramount toward continued evolution of social networking sites (SNS`s) they include, - stabilisation, visual, language, security and flexibility. These constructs add to our proposed framework. Firmly grounded research on social networking sites and literature, we propose that user feedback, is the critical component that stimulates the development and growth of social networking sites online. We offer a framework that can aid new and current soc...

  15. Resilience against Misbehaving Nodes in Asynchronous Networks

    OpenAIRE

    Senejohnny, D.; Sundaram, S.; De Persis, C.; Tesi, P.

    2018-01-01

    Network systems are one of the most active research areas in the engineering community as they feature a paradigm shift from centralized to distributed control and computation. When dealing with network systems, a fundamental challenge is to ensure their functioning even when some of the network nodes do not operate as intended due to faults or attacks. The objective of this paper is to address the problem of resilient consensus in a context where the nodes have their own clocks, possibly ope...

  16. Training trajectories by continuous recurrent multilayer networks.

    Science.gov (United States)

    Leistritz, L; Galicki, M; Witte, H; Kochs, E

    2002-01-01

    This paper addresses the problem of training trajectories by means of continuous recurrent neural networks whose feedforward parts are multilayer perceptrons. Such networks can approximate a general nonlinear dynamic system with arbitrary accuracy. The learning process is transformed into an optimal control framework where the weights are the controls to be determined. A training algorithm based upon a variational formulation of Pontryagin's maximum principle is proposed for such networks. Computer examples demonstrating the efficiency of the given approach are also presented.

  17. Wireless communications networks for the smart grid

    CERN Document Server

    Ho, Quang-Dung; Rajalingham, Gowdemy; Le-Ngoc, Tho

    2014-01-01

    This brief presents a comprehensive review of the network architecture and communication technologies of the smart grid communication network (SGCN). It then studies the strengths, weaknesses and applications of two promising wireless mesh routing protocols that could be used to implement the SGCN. Packet transmission reliability, latency and robustness of these two protocols are evaluated and compared by simulations in various practical SGCN scenarios. Finally, technical challenges and open research opportunities of the SGCN are addressed. Wireless Communications Networks for Smart Grid provi

  18. Science and societal partnerships to address cumulative impacts

    Directory of Open Access Journals (Sweden)

    Carolyn J Lundquist

    2016-02-01

    Full Text Available Funding and priorities for ocean research are not separate from the underlying sociological, economic, and political landscapes that determine values attributed to ecological systems. Here we present a variation on science prioritisation exercises, focussing on inter-disciplinary research questions with the objective of shifting broad scale management practices to better address cumulative impacts and multiple users. Marine scientists in New Zealand from a broad range of scientific and social-scientific backgrounds ranked 48 statements of research priorities. At a follow up workshop, participants discussed five over-arching themes based on survey results. These themes were used to develop mechanisms to increase the relevance and efficiency of scientific research while acknowledging socio-economic and political drivers of research agendas in New Zealand’s ocean ecosystems. Overarching messages included the need to: 1 determine the conditions under which ‘surprises’ (sudden and substantive undesirable changes are likely to occur and the socio-ecological implications of such changes; 2 develop methodologies to reveal the complex and cumulative effects of change in marine systems, and their implications for resource use, stewardship, and restoration; 3 assess potential solutions to management issues that balance long-term and short-term benefits and encompass societal engagement in decision-making; 4 establish effective and appropriately resourced institutional networks to foster collaborative, solution-focused marine science; and 5 establish cross-disciplinary dialogues to translate diverse scientific and social-scientific knowledge into innovative regulatory, social and economic practice. In the face of multiple uses and cumulative stressors, ocean management frameworks must be adapted to build a collaborative framework across science, governance and society that can help stakeholders navigate uncertainties and socio-ecological surprises.

  19. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  20. Network migration for printers

    CERN Multimedia

    2016-01-01

    Further to the recent General Purpose (office) Network reorganisation (as announced in the Bulletin - see here), please note that the majority of print devices will be automatically migrated to the new network IP address range on Tuesday 27 September.   This change should be transparent for these devices and therefore end-users, provided you have installed the printers from the Print Service website. A small number of devices will require manual intervention from the Printer Support team in order to migrate correctly. These devices will not change their IP address until the manual intervention, which will be carried out before Monday 3rd October. However, if you have mistakenly connected directly to the printer’s IP address, then your printing will be affected – please uninstall the printer (for help, see: KB3785), and re-install it from the Print Service website (or follow instructions for visitor machines). Please do this as soon as possible in order to avoid printing issues, t...

  1. Proxy SDN Controller for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2016-01-01

    Full Text Available Management of wireless networks as well as wired networks by using software-defined networking (SDN has been highlighted continually. However, control features of a wireless network differ from those of a wired network in several aspects. In this study, we identify the various inefficient points when controlling and managing wireless networks by using SDN and propose SDN-based control architecture called Proxcon to resolve these problems. Proxcon introduces the concept of a proxy SDN controller (PSC for the wireless network control, and the PSC entrusted with the role of a main controller performs control operations and provides the latest network state for a network administrator. To address the control inefficiency, Proxcon supports offloaded SDN operations for controlling wireless networks by utilizing the PSC, such as local control by each PSC, hybrid control utilizing the PSC and the main controller, and locally cooperative control utilizing the PSCs. The proposed architecture and the newly supported control operations can enhance scalability and response time when the logically centralized control plane responds to the various wireless network events. Through actual experiments, we verified that the proposed architecture could address the various control issues such as scalability, response time, and control overhead.

  2. Is prophetic discourse adequate to address global economic justice?

    African Journals Online (AJOL)

    Test

    2011-02-15

    Feb 15, 2011 ... of moral discourse adequately addresses issues of economic injustice. ... plays an indispensable role in addressing issues of global economic justice, but ...... governance in their business practices, to provide a tool for a.

  3. Using ICTs to Address Water Challenges in Uganda | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Using ICTs to Address Water Challenges in Uganda ... the adaptive capacity of communities to address the issue of climate-induced water stress. ... It will do so by testing the electronic dissemination of seasonal forecasts, early warning ...

  4. Using ICTs to Address Water Challenges in Uganda | CRDI - Centre ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    15 janv. 2012 ... Using ICTs to Address Water Challenges in Uganda ... adaptive capacity of communities to address the issue of climate-induced water stress. ... It will do so by testing the electronic dissemination of seasonal forecasts, early ...

  5. Cooperative Cloudlet for Pervasive Networks

    Directory of Open Access Journals (Sweden)

    Tauseef Jamal

    2017-05-01

    Full Text Available The notion of cooperation in wireless communication has got significant attention from both academia and industrial persons towards to address the performance drawbacks of wireless sensor network due to reason of user’s high mobility and lack of resources of network. The future wireless systems should be highly heterogeneous and interconnected because motivating cooperative relaying has to apply on the future mobile network for efficient results and future demand. As currently the mobile computing is facing latency and battery drainage issues which need to address and solve hence in this work we are proposed mobile - centric and opportunistic communication architecture. In this work mobile devices which are in the range of Wi - Fi of each other can create cluste r with each other and can create an ad - hoc cooperative cloud using Relay Spot[1 - 4]. The Collaboration between these devices can enable them to resourcefully use the augmentation without any infrastructure.

  6. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  7. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  8. Bipartite Networks

    NARCIS (Netherlands)

    Agneessens, F.; Moser, C.; Barnett, G.A.

    2011-01-01

    Bipartite networks refer to a specific kind of network in which the nodes (or actors) can be partitioned into two subsets based on the fact that no links exist between actors within each subset, but only between the two subsets. Due to the partition of actors in two sets and the absence of relations

  9. Assessing Opinions in Community Leadership Networks to Address Health Inequalities: A Case Study from Project IMPACT

    Science.gov (United States)

    McCauley, M. P.; Ramanadhan, S.; Viswanath, K.

    2015-01-01

    This study demonstrates a novel approach that those engaged in promoting social change in health can use to analyze community power, mobilize it and enhance community capacity to reduce health inequalities. We used community reconnaissance methods to select and interview 33 participants from six leadership sectors in "Milltown", the New…

  10. A new fixation strategy for addressable nano-network building blocks

    KAUST Repository

    Lundberg, Erik P.; El-Sagheer, Afaf H.; Kocalka, Petr; Wilhelmsson, L. Marcus; Brown, Tom; Nordé n, Bengt

    2010-01-01

    Rapid controlled self-assembly makes DNA ideal for building nanostructures. A problem using hybridized intermediates in hierarchic assembly is their thermodynamic lability. We demonstrate a click-fixation technology by which robust hexagonal DNA modules can be made. This principle is applicable to a wide variety of DNA nanoconstructs. © 2010 The Royal Society of Chemistry.

  11. Addressing LV network power quality issues through the implementation of a microgrid

    NARCIS (Netherlands)

    Lava, J.R.T.; Cobben, J.F.G.; Kling, W.L.; Overbeeke, van F.

    2010-01-01

    The results of the implementation of an actual microgrid in the Netherlands are presented. This microgrid has photovoltaic panels as microsources, energy storage, and a flexible AC distribution system (FACDS) that can operate connected to the public grid or autonomously where it regulates the site’s

  12. Addressing low voltage network power quality issues through the implementation of a microgrid

    NARCIS (Netherlands)

    Lava, J.R.T.; Cobben, J.F.G.; Kling, W.L.; Overbeeke, van F.

    2011-01-01

    The results of the implementation of an actual microgrid in the Netherlands are presented. This microgrid has photovoltaic panels as microsources, energy storage, and a flexible AC distribution interfacing system that can operate connected to the public grid or autonomously where it regulates the

  13. Research-informed strategies to address educational challenges in a digitally networked world

    NARCIS (Netherlands)

    Voogt, J.; Knezek, G.; Pareja Roblin, N.

    2015-01-01

    This special issue represents the scholarly work that emerged from the EDUsummIT 2013. EDUsummIT is a growing and active community of researchers, policy makers and practitioners that is committed to promote research-informed strategies to effectively integrate ICT in educational policy and

  14. Networked Special Operations: Addressing Transnational Threats, Homeland Defense, and Breached Seams in the Western Hemisphere

    Science.gov (United States)

    2017-04-20

    security agenda” that also involves “ policy tradeoffs and hard choices” regarding the allocation of finite resources.3 The President’s first priority...China, and in 2011 Venezuela became the largest importer of Russian arms in the world. In addition to extra-regional state actors, violent...Frail countries such as Venezuela , Chinese expansion in to Brazil, and various other source zones that could bed inbound foreign fighters requires

  15. Networking of integrated pest management: A powerful approach to address common challenges in agriculture

    DEFF Research Database (Denmark)

    Lamichhane, Jay Ram; Aubertot, J-N; Begg, Graham

    2016-01-01

    in agriculture. A large number of stakeholders (researchers, policy makers, growers and industries) are involved in the sector of crop protection, which needs to be coordinated through effective communications and dynamic collaboration to make any IPM strategy successful. Here we discuss a decade-long IPM...

  16. Vocatives and Other Direct Address Forms: A Contrastive Study

    OpenAIRE

    Lilli Parrott

    2010-01-01

    In this paper I analyze Russian direct address forms, both the distinct truncated vocative and nominative-case direct address forms. I contrast the formal and functional restrictions on the truncated vocative with vocatives in other languages (e.g. Czech and Polish), and I compare the interpolation of Russian direct address forms in an utterance to the situation in English. While similarities are found both in the form and the usage of Russian direct address forms with those in other language...

  17. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  18. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  19. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  20. Networking activities in technology-based entrepreneurial teams

    DEFF Research Database (Denmark)

    Neergaard, Helle

    2005-01-01

    Based on social network theoy, this article investigates the distribution of networking roles and responsibilities in entrepreneurial founding teams. Its focus is on the team as a collection of individuals, thus allowing the research to address differences in networking patterns. It identifies six...... central networking activities and shows that not all founding team members are equally active 'networkers'. The analyses show that team members prioritize different networking activities and that one member in particular has extensive networking activities whereas other memebrs of the team are more...

  1. Hardware-Efficient On-line Learning through Pipelined Truncated-Error Backpropagation in Binary-State Networks

    Directory of Open Access Journals (Sweden)

    Hesham Mostafa

    2017-09-01

    Full Text Available Artificial neural networks (ANNs trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks. Significant effort has been devoted to developing custom silicon devices to accelerate inference in ANNs. Accelerating the training phase, however, has attracted relatively little attention. In this paper, we describe a hardware-efficient on-line learning technique for feedforward multi-layer ANNs that is based on pipelined backpropagation. Learning is performed in parallel with inference in the forward pass, removing the need for an explicit backward pass and requiring no extra weight lookup. By using binary state variables in the feedforward network and ternary errors in truncated-error backpropagation, the need for any multiplications in the forward and backward passes is removed, and memory requirements for the pipelining are drastically reduced. Further reduction in addition operations owing to the sparsity in the forward neural and backpropagating error signal paths contributes to highly efficient hardware implementation. For proof-of-concept validation, we demonstrate on-line learning of MNIST handwritten digit classification on a Spartan 6 FPGA interfacing with an external 1Gb DDR2 DRAM, that shows small degradation in test error performance compared to an equivalently sized binary ANN trained off-line using standard back-propagation and exact errors. Our results highlight an attractive synergy between pipelined backpropagation and binary-state networks in substantially reducing computation and memory requirements, making pipelined on-line learning practical in deep networks.

  2. Hardware-Efficient On-line Learning through Pipelined Truncated-Error Backpropagation in Binary-State Networks.

    Science.gov (United States)

    Mostafa, Hesham; Pedroni, Bruno; Sheik, Sadique; Cauwenberghs, Gert

    2017-01-01

    Artificial neural networks (ANNs) trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks. Significant effort has been devoted to developing custom silicon devices to accelerate inference in ANNs. Accelerating the training phase, however, has attracted relatively little attention. In this paper, we describe a hardware-efficient on-line learning technique for feedforward multi-layer ANNs that is based on pipelined backpropagation. Learning is performed in parallel with inference in the forward pass, removing the need for an explicit backward pass and requiring no extra weight lookup. By using binary state variables in the feedforward network and ternary errors in truncated-error backpropagation, the need for any multiplications in the forward and backward passes is removed, and memory requirements for the pipelining are drastically reduced. Further reduction in addition operations owing to the sparsity in the forward neural and backpropagating error signal paths contributes to highly efficient hardware implementation. For proof-of-concept validation, we demonstrate on-line learning of MNIST handwritten digit classification on a Spartan 6 FPGA interfacing with an external 1Gb DDR2 DRAM, that shows small degradation in test error performance compared to an equivalently sized binary ANN trained off-line using standard back-propagation and exact errors. Our results highlight an attractive synergy between pipelined backpropagation and binary-state networks in substantially reducing computation and memory requirements, making pipelined on-line learning practical in deep networks.

  3. NETWORKS AND QUALITY IMPROVEMENT

    Directory of Open Access Journals (Sweden)

    Miodrag Hadžistević

    2009-12-01

    Full Text Available Tools used in the past to analyze business value creation, such as value chain and process models, are simply too slow, inadequate, or inappropriate to address this new level of business complexity. In stead of that, company has to find way to create quality management system in a multi-layered supply chain. The problem can be solved by networking in the cluster. Cluster can be known as a competitive cooperation in the purpose to gain higher level of competitiveness and success. Bat there is another problem: Organization of the production process in a company is extremely complex process itself, and when we transfer it to the cluster level, we get a complex task which is difficult to solve. For that purpose, this paper analyses the conditions and possibilities that would enable those structures to adapt to changes in the surroundings - flexibility and management adequacy of production and organizational structures - by creating network value system.

  4. Neural networks in economic modelling : An empirical study

    NARCIS (Netherlands)

    Verkooijen, W.J.H.

    1996-01-01

    This dissertation addresses the statistical aspects of neural networks and their usability for solving problems in economics and finance. Neural networks are discussed in a framework of modelling which is generally accepted in econometrics. Within this framework a neural network is regarded as a

  5. Value-Creating Networks: Organizational Issues and Challenges

    Science.gov (United States)

    Allee, Verna

    2009-01-01

    Purpose: The purpose of this paper is to provide examples of evaluating value-creating networks and to address the organizational issues and challenges of a network orientation. Design/methodology/approach: Value network analysis was first developed in 1993 and was adapted in 1997 for intangible asset management. It has been applied from shopfloor…

  6. A joint classification method to integrate scientific and social networks

    NARCIS (Netherlands)

    Neshati, Mahmood; Asgari, Ehsaneddin; Hiemstra, Djoerd; Beigy, Hamid

    In this paper, we address the problem of scientific-social network integration to find a matching relationship between members of these networks. Utilizing several name similarity patterns and contextual properties of these networks, we design a focused crawler to find high probable matching pairs,

  7. An integrated control for overvoltage mitigation in the distribution network

    NARCIS (Netherlands)

    Viyathukattuva Mohamed Ali, M.M.; Nguyen, P.H.; Kling, W.L.

    2014-01-01

    Increasing share of distributed renewable energy sources (DRES) in the distribution network raises new operational and power quality challenges like overvoltage in the network feeders. Such power quality challenge limits the penetration of DRES in the distribution network. This paper addresses a

  8. Dynamic Mobile IP routers in ad hoc networks

    NARCIS (Netherlands)

    Kock, B.A.; Schmidt, J.R.

    2005-01-01

    This paper describes a concept combining mobile IP and ad hoc routing to create a robust mobile network. In this network all nodes are mobile and globally and locally reachable under the same IP address. Essential for implementing this network are the dynamic mobile IP routers. They act as gateways

  9. Dynamic defense and network randomization for computer systems

    Science.gov (United States)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.; Lee, Erik James; Martin, Mitchell Tyler

    2018-05-29

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissance stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.

  10. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  11. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  12. Strategies for optical transport network recovery under epidemic network failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova; Kosteas, Vasileios

    2015-01-01

    The current trend in deploying automatic control plane solutions for increased flexibility in the optical transport layer leads to numerous advantages for both the operators and the customers, but also pose challenges related to the stability of the network and its ability to operate in a robust...... manner under different failure scenarios. This work evaluates two rerouting strategies and proposes four policies for failure handling in a connection-oriented optical transport network, under generalized multiprotocol label switching control plane. The performance of the strategies and the policies......, and that there exist a clear trade-off between policy performance and network resource consumption, which must be addressed by network operators for improved robustness of their transport infrastructures. Applying proactive methods for avoiding areas where epidemic failures spread results in 50% less connections...

  13. Accelerating networks

    International Nuclear Information System (INIS)

    Smith, David M D; Onnela, Jukka-Pekka; Johnson, Neil F

    2007-01-01

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  14. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  15. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  16. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  17. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  18. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  19. Future High Capacity Backbone Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan

    are proposed. The work focuses on energy efficient routing algorithms in a dynamic optical core network environment, with Generalized MultiProtocol Label Switching (GMPLS) as the control plane. Energy ef- ficient routing algorithms for energy savings and CO2 savings are proposed, and their performance...... aiming for reducing the dynamic part of the energy consumption of the network may increase the fixed part of the energy consumption meanwhile. In the second half of the thesis, the conflict between energy efficiency and Quality of Service (QoS) is addressed by introducing a novel software defined......This thesis - Future High Capacity Backbone Networks - deals with the energy efficiency problems associated with the development of future optical networks. In the first half of the thesis, novel approaches for using multiple/single alternative energy sources for improving energy efficiency...

  20. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.